Some checks failed
Veza CI / Backend (Go) (push) Failing after 8m56s
Veza CI / Frontend (Web) (push) Has been cancelled
E2E Playwright / e2e (full) (push) Has been cancelled
Veza CI / Notify on failure (push) Blocked by required conditions
Veza CI / Rust (Stream Server) (push) Successful in 5m3s
Security Scan / Secret Scanning (gitleaks) (push) Failing after 53s
Three Incus containers, each running redis-server + redis-sentinel (co-located). redis-1 = master at first boot, redis-2/3 = replicas. Sentinel quorum=2 of 3 ; failover-timeout=30s satisfies the W3 acceptance criterion. - internal/config/redis_init.go : initRedis branches on REDIS_SENTINEL_ADDRS ; non-empty -> redis.NewFailoverClient with MasterName + SentinelAddrs + SentinelPassword. Empty -> existing single-instance NewClient (dev/local stays parametric). - internal/config/config.go : 3 new fields (RedisSentinelAddrs, RedisSentinelMasterName, RedisSentinelPassword) read from env. parseRedisSentinelAddrs trims+filters CSV. - internal/metrics/cache_hit_rate.go : new RecordCacheHit / Miss counters, labelled by subsystem. Cardinality bounded. - internal/middleware/rate_limiter.go : instrument 3 Eval call sites (DDoS, frontend log throttle, upload throttle). Hit = Redis answered, Miss = error -> in-memory fallback. - internal/services/chat_pubsub.go : instrument Publish + PublishPresence. - internal/websocket/chat/presence_service.go : instrument SetOnline / SetOffline / Heartbeat / GetPresence. redis.Nil counts as a hit (legitimate empty result). - infra/ansible/roles/redis_sentinel/ : install Redis 7 + Sentinel, render redis.conf + sentinel.conf, systemd units. Vault assertion prevents shipping placeholder passwords to staging/prod. - infra/ansible/playbooks/redis_sentinel.yml : provisions the 3 containers + applies common baseline + role. - infra/ansible/inventory/lab.yml : new groups redis_ha + redis_ha_master. - infra/ansible/tests/test_redis_failover.sh : kills the master container, polls Sentinel for the new master, asserts elapsed < 30s. - config/grafana/dashboards/redis-cache-overview.json : 3 hit-rate stats (rate_limiter / chat_pubsub / presence) + ops/s breakdown. - docs/ENV_VARIABLES.md §3 : 3 new REDIS_SENTINEL_* env vars. - veza-backend-api/.env.template : 3 placeholders (empty default). Acceptance (Day 11) : Sentinel failover < 30s ; cache hit-rate dashboard populated. Lab test pending Sentinel deployment. W3 verification gate progress : Redis Sentinel ✓ (this commit), MinIO EC4+2 ⏳ Day 12, CDN ⏳ Day 13, DMCA ⏳ Day 14, embed ⏳ Day 15. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
90 lines
2.6 KiB
Go
90 lines
2.6 KiB
Go
package config
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/redis/go-redis/v9"
|
|
"go.uber.org/zap"
|
|
)
|
|
|
|
// initRedis initialise la connexion Redis. v1.0.9 Day 11 : when
|
|
// `sentinelAddrs` is non-empty, we wire a Sentinel-aware FailoverClient
|
|
// instead of a direct connection. The URL is still consulted for
|
|
// password + DB index — Sentinel discovers the host:port pair.
|
|
func initRedis(redisURL string, sentinelAddrs []string, sentinelMasterName, sentinelPassword string, logger *zap.Logger) (*redis.Client, error) {
|
|
opts, err := redis.ParseURL(redisURL)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
// Configurer un logger filtré pour Redis pour éviter les warnings "maint_notifications"
|
|
redis.SetLogger(&filteredRedisLogger{logger: logger})
|
|
|
|
var client *redis.Client
|
|
if len(sentinelAddrs) > 0 {
|
|
// FailoverClient : Sentinel discovers the current master and
|
|
// transparently re-resolves on failover. `MasterName` MUST match
|
|
// the value in sentinel.conf (`monitor <name>`).
|
|
client = redis.NewFailoverClient(&redis.FailoverOptions{
|
|
MasterName: sentinelMasterName,
|
|
SentinelAddrs: sentinelAddrs,
|
|
SentinelPassword: sentinelPassword,
|
|
// Auth + db reused from the parsed URL so dev/prod stay parametric.
|
|
Password: opts.Password,
|
|
DB: opts.DB,
|
|
// TLS cherrypicked from the URL (rediss://).
|
|
TLSConfig: opts.TLSConfig,
|
|
})
|
|
logger.Info("Redis Sentinel HA wired",
|
|
zap.Strings("sentinels", sentinelAddrs),
|
|
zap.String("master", sentinelMasterName))
|
|
} else {
|
|
client = redis.NewClient(opts)
|
|
}
|
|
|
|
// Test de connexion
|
|
ctx := context.Background()
|
|
_, err = client.Ping(ctx).Result()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
return client, nil
|
|
}
|
|
|
|
// parseRedisSentinelAddrs splits the comma-separated REDIS_SENTINEL_ADDRS
|
|
// env into a clean slice. Empty input -> nil (initRedis falls back to
|
|
// single-instance). Trims whitespace + drops empty entries so a typo
|
|
// like "a, ,b" doesn't dial a phantom sentinel.
|
|
func parseRedisSentinelAddrs(raw string) []string {
|
|
if raw == "" {
|
|
return nil
|
|
}
|
|
parts := strings.Split(raw, ",")
|
|
out := make([]string, 0, len(parts))
|
|
for _, p := range parts {
|
|
p = strings.TrimSpace(p)
|
|
if p != "" {
|
|
out = append(out, p)
|
|
}
|
|
}
|
|
if len(out) == 0 {
|
|
return nil
|
|
}
|
|
return out
|
|
}
|
|
|
|
// filteredRedisLogger est un wrapper pour filtrer les logs de Redis
|
|
type filteredRedisLogger struct {
|
|
logger *zap.Logger
|
|
}
|
|
|
|
func (l *filteredRedisLogger) Printf(ctx context.Context, format string, v ...interface{}) {
|
|
msg := fmt.Sprintf(format, v...)
|
|
if strings.Contains(msg, "maint_notifications") {
|
|
return // Ignorer ce warning spécifique en mode auto-discovery
|
|
}
|
|
l.logger.Debug("Redis internal", zap.String("message", msg))
|
|
}
|