-
Notifications
You must be signed in to change notification settings - Fork 432
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Graceful shutdown of ServerFuture #1976
Comments
Sounds good to me to add something like this. Maybe look at how hyper models |
Sounds good, I'll take a look. I've already started some hacking using the linkerd drain crate, since that's what Istio is using currently. I'll compare and see what works best for |
This adds a dependency on [Linkerd drain](https://github.com/linkerd/drain-rs), which is used to allow the application to gracefully shutdown the DNS server. Fixes hickory-dns#1976.
Creating a `Server` object with a new interface to handle the various types of servers and their shutdown. Fixes hickory-dns#1976.
Creating a `Server` object with a new interface to handle the various types of servers and their shutdown. Fixes hickory-dns#1976.
Creating a `Server` object with a new interface to handle the various types of servers and their shutdown. Fixes hickory-dns#1976.
This is extremely apropos for us! Will be watching this, let us know if we can help. cc @zeeshanlakhani |
@blaine @zeeshanlakhani FYI #1977 is out for review if you're interested |
Is your feature request related to a problem? Please describe.
When running a DNS server (via
ServerFuture
) as part of a larger application, it's desirable to include the shutdown of the DNS server as part of the shutdown workflow for the process.Describe the solution you'd like
Ideally, the DNS server would support hooks to initiate a graceful shutdown, as well as notifying the application when the server shutdown has completed. During a graceful shutdown, the server would finish serving existing requests, but reject new requests.
Describe alternatives you've considered
NA
Additional context
This came up in an Istio PR, which adds a Trust-DNS-based proxy: istio/ztunnel#536 (comment)
The text was updated successfully, but these errors were encountered: