Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Disable HTTP/2 #249

Merged
merged 3 commits into from
Aug 10, 2020
Merged

Disable HTTP/2 #249

merged 3 commits into from
Aug 10, 2020

Conversation

roidelapluie
Copy link
Member

HTTP/2 support is golang has many problematic cornercases where dead
connections would be kept.

golang/go#32388
golang/go#39337
golang/go#39750

I suggest we disable HTTP/2 for now and enable it manually on the
blackbox exporter.

Signed-off-by: Julien Pivotto [email protected]

@brian-brazil
Copy link
Contributor

How will the blackbox exporter turn it back on via this code? It doesn't do persistent connections, so those issues likely don't affect it.

Signed-off-by: Julien Pivotto <[email protected]>
@roidelapluie
Copy link
Member Author

What about this?

@brian-brazil
Copy link
Contributor

Let's not start hiding things in the YAML, we currently use function arguments for this - and the one that's there is already only used by blackbox.

Signed-off-by: Julien Pivotto <[email protected]>
@roidelapluie
Copy link
Member Author

@brian-brazil I have adapted it.

Copy link
Contributor

@brian-brazil brian-brazil left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

👍

err := http2.ConfigureTransport(rt.(*http.Transport))
if err != nil {
return nil, err
if enableHTTP2 {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we add a comment that this should go away once Go is fixed?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actually if we add a comment, could we tight the disabling to the disableKeepAlives arg?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In theory yes, but it feels pretty hacky.

Signed-off-by: Julien Pivotto <[email protected]>
@roidelapluie
Copy link
Member Author

I have put the golang issues in comment.

@roidelapluie roidelapluie merged commit 273427a into prometheus:master Aug 10, 2020
roidelapluie added a commit to roidelapluie/alertmanager that referenced this pull request Aug 14, 2020
- Disable HTTP2: prometheus/common#249
- Composite duration: prometheus/common#246

Signed-off-by: Julien Pivotto <[email protected]>
roidelapluie added a commit to roidelapluie/alertmanager that referenced this pull request Aug 14, 2020
- Disable HTTP2: prometheus/common#249
- Composite duration: prometheus/common#246

Signed-off-by: Julien Pivotto <[email protected]>
simonpasquier pushed a commit to prometheus/alertmanager that referenced this pull request Aug 25, 2020
- Disable HTTP2: prometheus/common#249
- Composite duration: prometheus/common#246

Signed-off-by: Julien Pivotto <[email protected]>
SuperQ added a commit to prometheus-community/json_exporter that referenced this pull request Nov 2, 2020
* Update changelog
* Bump Go modules.
* Update NewClientFromConfig use

prometheus/common#249 added option to disable HTTP/2.

Signed-off-by: Ben Kochie <[email protected]>
SuperQ added a commit to prometheus-community/json_exporter that referenced this pull request Nov 2, 2020
* Update changelog
* Bump Go modules.
* Update NewClientFromConfig use
* Bump Go to 1.15.

prometheus/common#249 added option to disable HTTP/2.

Signed-off-by: Ben Kochie <[email protected]>
alanprot pushed a commit to alanprot/common that referenced this pull request Mar 15, 2023
…ner-addr

server: Expose `http` and `grpc` listen addresses.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants