Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support reloading the configuration file with SIGHUP #7037

Open
jsternberg opened this issue Jul 19, 2016 · 40 comments
Open

Support reloading the configuration file with SIGHUP #7037

jsternberg opened this issue Jul 19, 2016 · 40 comments

Comments

@jsternberg
Copy link
Contributor

Feature Request

Support the standard reloading of a configuration file with SIGHUP for anything that would be reasonable.

Proposal: Support reloading the configuration file with SIGHUP.

Current behavior: You must restart InfluxDB to load new configuration options.

Desired behavior: Configuration values that are easy to change (such as log levels or query limits) without requiring a potentially long restart.

Use case: It allows a DevOps person to be able to update certain settings when tuning the database without downtime.

@candlerb
Copy link

candlerb commented Sep 1, 2017

Relates to influxdata/telegraf#69

@Darkentik
Copy link

Relates to influxdata/telegraf#69

You missunderstand him. He not wanted to reload the telegraf instead of the database influxdb.
this is a feature we need too. I always have to restart the complete influxdb service and this ends up with some downtimes of the influxdb.
Or does this exists already? I didn´t found something in the docs.

@candlerb
Copy link

By "relates" I meant "similar feature requested in a different component of the TICK stack"

@galindro
Copy link

I need this feature too because I'm using letsencrypt to generate influxdb certificates and a reload configuration could be used to load the new certificate, avoiding database downtime.

@dgnorton dgnorton added the 1.x label Jan 7, 2019
@Genda1ph
Copy link

I'm bewildered how this still hasn't been implemented.
Is there a different way for online configuration change?

@stale
Copy link

stale bot commented Sep 12, 2019

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the wontfix label Sep 12, 2019
@Genda1ph
Copy link

Not having any activity doesn't mean it's not important.

@stale stale bot removed the wontfix label Sep 12, 2019
@phgogo
Copy link

phgogo commented Oct 4, 2019

This is a feature i expect in an production-ready application!

@m82labs
Copy link

m82labs commented Oct 25, 2019

Putting a vote in for this as well.

@ruairinewman
Copy link

We would definitely like to see this implemented also. With production cluster nodes taking as long as 4 hours to complete a restart due to the volume of data we hold, this would avoid many problems.

@m82labs
Copy link

m82labs commented Oct 25, 2019

We would definitely like to see this implemented also. With production cluster nodes taking as long as 4 hours to complete a restart due to the volume of data we hold, this would avoid many problems.

Just curious, but how much data do you have? I have about 1TB and a service restart takes about 5 minutes. Interested to know when I might get to 4 hour territory.

@stale
Copy link

stale bot commented Jan 24, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions.

@stale stale bot added the wontfix label Jan 24, 2020
@Genda1ph
Copy link

bump

@stale stale bot removed the wontfix label Jan 24, 2020
@lhanson
Copy link

lhanson commented Feb 25, 2020

Bumping again because it seems incredible that I can't update configuration without downtime.

@foobar
Copy link
Contributor

foobar commented Mar 17, 2020

any response from maintainers?

@vipulsharma21
Copy link

bump

@anandpathak
Copy link

anandpathak commented Apr 23, 2020

bumping! this is a must-have feature

@fmr-ap
Copy link

fmr-ap commented May 18, 2020

bump

@suhlig
Copy link

suhlig commented Jul 27, 2020

I'd like to have this.

@MonilCereBulb
Copy link

+1

3 similar comments
@TiagoMHCSantana
Copy link

+1

@Guzya
Copy link

Guzya commented Nov 12, 2020

+1

@sobos-office
Copy link

+1

@hardincm2
Copy link

+1

@Technoguyfication
Copy link

This is a big problem for me, I have to automatically restart influx whenever my SSL cert renews. I'm able to reload nginx with new certs each time, so why can't I reload influx?

@danielelopez1
Copy link

+1

2 similar comments
@sdrsdr
Copy link

sdrsdr commented Dec 6, 2021

+1

@dbivolaru
Copy link

+1

@emilbasv3
Copy link

+1 This is a must have for a production ready product.

@joelsdc
Copy link

joelsdc commented Apr 13, 2022

I have to admit I was surprised to see this issue still open from 2016, I would have expected to have a way to reload SSL certs since day 1.

As a workaround, we've added our load balancers (Kong) in the path to reach influxdb, but it would be nice to not have to proxy requests just for SSL.

@Genda1ph
Copy link

Thank you for reminding me to add this date to my anniversary calendar.
I ended up running Influx in Docker and passing requests through Traefik. A shame features essential to running huge databases are being ignored, but oh well.

@viveklanjekar
Copy link

is everyone still waiting for this basic feature in 2022?

@Genda1ph
Copy link

Sixth anniversary...

@abhi-jha
Copy link

So, what happened?

@Genda1ph
Copy link

checks notes
exactly... Nothing.

@Darkentik
Copy link

+1
Offtopic (sry for that, but i can't hold back my anger):
This is sadly not the only poor (missing) feature. Have you messed up with backup and restore?
It is a disaster, because they change the bucket ID and this brokes everything while using tokens with permissions for this bucket ID...we have figured out to get the same bucket ID as before but holy moly...seriously? This can't be the right way to handle this.

We ask us how influxdb2 can be used from so much users and then there are such holes in functionality.

@enspritz
Copy link

I'm going to take gamble and assume that I speak for everyone here in asking for a response from our friends on the Influx team.
The ability to hot-reload configuration is becoming table stakes, for TLS, for avoiding downtime, and myriad other reasons.
Hope to see this delivered soon ^_^

@Genda1ph
Copy link

I want to congratulate everyone with 7th anniversary of this bug!
Here's to meeting all of you in a year!

PS: labels need to be updated.

@SuperCoolAlan
Copy link

Hoping to see this feature soon! I am sending SIGHUP to influxdb2 when TLS keys are rotated, but influxdb is not exiting gracefully.

@sergejhorvat
Copy link

+1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests