NETWORK ADMINISTRATIONSsnmp

Fabrízio de Royes Mello and Álvaro Hernández – OnGres – PostgreSQL Network Filter For EnvoyProxy

How do you monitor #Postgres? What information can you get out of it, and to what degree does this information help to troubleshoot operational issues? What if you want/need to log all the queries? That may bring heavy trafficked #databases down.

Comment 💬, Share 🔗, Like 👍, and Subscribe ✅ to our channel 📺, and turn on the 🔔 to be alerted to new videos about #OpenSource #Databases… and many other things!
https://percona.tv/subscribe

At OnGres we’re obsessed with improving PostgreSQL’s observability. So we worked together with Tetrate folks on an Envoy’s Network Filter extension for PostgreSQL, to provide and extend observability of the traffic inout a cluster infrastructure. This extension is public and open source. You can use it anywhere you use Envoy. It allows you to capture automated metrics and to debug network traffic. This talk will be a technical deep-dive into PostgreSQL’s protocol decoding, Envoy proxy filters and will cover all the capabilities of the tool and its usage and deployment in any environment.

Envoy [1] is a high performance C++ distributed proxy designed for single services and applications, as well as a communication bus and “universal data plane” designed for large microservice “service mesh” architectures. Built on the learnings of solutions such as NGINX, HAProxy, hardware load balancers, and cloud load balancers, Envoy runs alongside every application and abstracts the network by providing common features in a platform-agnostic manner. When all service traffic in an infrastructure flows via an Envoy mesh, it becomes easy to visualize problem areas via consistent observability, tune overall performance, and add substrate features in a single place.

Envoy can be used to proxy connections to PostgreSQL instances and in this talk we’ll see how we improve PostgreSQL observability without impacting the performance of the database and without needing to install and/or configure a bunch of things like logs, pgstatstatements, etc, using a Network Filter [2] for PostgreSQL we developed that decodes frontend and backend protocol to get transparently some metrics and metadata about it operation.

Even through an encrypted connection we can grab the metrics because the Postgres Network Filter have the ability to terminate SSL on Envoy [3]. This is a new cool feature for the upcomping 1.18 release of EnvoyProxy that is expected to March 31th [4].

Roadmap:
* Integrate Postgres parser to improve dynamic metadata and per-query tracking
* Individual (per-query) tracking of query performance
* Traffic mirroring for Postgres major upgrade testing and validations

[1] https://www.envoyproxy.io/
[2] https://www.envoyproxy.io/docs/envoy/latest/intro/archoverview/otherprotocols/postgres#arch-overview-postgres
[3] https://github.com/envoyproxy/envoy/commit/1aa31dd9ca07f88029101bdecca12173930cf342
[4] https://github.com/envoyproxy/envoy/blob/main/RELEASES.md#release-schedule

You can find more information about #PostgreSQL #Databases and Percona Database Events in these links 👇👇👇

Watch Percona Live 2021 Talks ⏩ https://percona.tv/PerconaLive2021
Postgresql Support ⏩ https://per.co.na/postgresql-support
Postgresql info ⏩ https://per.co.na/postgresql-info
Postgresql events ⏩ https://per.co.na/pl2020
Percona Distribution for PostgreSQL ⏩ https://per.co.na/postgresql
Monitor your PostgreSQL For Free ⏩ https://percona.tv/pmm-yt

Connect With us on our Social Networks 👇👇👇
Follow Percona on Twitter: https://per.co.na/twitter
Follow Percona on Facebook: https://per.co.na/facebook
Follow Percona on Instagram: https://per.co.na/instagram
Follow Percona on LinkedIn: https://per.co.na/linkedin

source

by Percona

simple network management protocol

Leave a Reply

Your email address will not be published. Required fields are marked *