-
Notifications
You must be signed in to change notification settings - Fork 459
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Epic] Improve the usability and reliability of SSH TUNNEL
s
#18490
Comments
I'd propose skipping this one for now! It's a big lift to make it work reliably (how do you detect if a connection has stalled and needs to be restarted in the other SSH bastion?), and I think we have a good workaround (asking customers to ping their SSH bastions and restart them if they fail). |
@benesch I mentioned the order of priority here: https://materializeinc.slack.com/archives/C04DJT084KA/p1680117095320179, ill transfer this context to the issue! |
Awesome, thanks! |
Sentry issue: DATABASE-BACKEND-2P2 |
Wanted to record some thoughts from debugging SSH tunnels over the weekend:
|
yes! There is #17826, which we still need to flesh out |
I think we can actually print the chain of errors, see #18583. We might have to do some more work to ensure that all the errors are actually there. For |
SSH TUNNEL
sSSH TUNNEL
s
Closing as this is now complete enough! |
Product Outcome
SSH tunnel connections are resilient and observable
Context
Over the past few weeks, its become clear there are usability, reliability, and debuggability issues with
SSH TUNNEL
s, particularly when used with kafka. This issue tracks a set of improvements that can be madeSSH TUNNEL
s:Tasklist
Reliability
Usability
Debuggability (and documentation)
mz_source_status_history
mz_source_statuses
doesn't communicate whether or not the errors reported from rdkafka have ssh as an underlying causeThe text was updated successfully, but these errors were encountered: