2011-12-15 18:05:24 +01:00
|
|
|
|
.. _remoting-scala:
|
|
|
|
|
|
|
2014-02-04 12:25:27 +01:00
|
|
|
|
##########
|
2013-04-19 13:21:15 +02:00
|
|
|
|
Remoting
|
2014-02-04 12:25:27 +01:00
|
|
|
|
##########
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
|
|
|
|
|
For an introduction of remoting capabilities of Akka please see :ref:`remoting`.
|
|
|
|
|
|
|
2014-03-04 17:38:27 +01:00
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
As explained in that chapter Akka remoting is designed for communication in a
|
|
|
|
|
|
peer-to-peer fashion and it has limitations for client-server setups. In
|
2014-09-15 18:30:12 +03:00
|
|
|
|
particular Akka Remoting does not work transparently with Network Address Translation,
|
|
|
|
|
|
Load Balancers, or in Docker containers. For symmetric communication in these situations
|
|
|
|
|
|
network and/or Akka configuration will have to be changed as described in
|
2015-09-09 10:14:51 +02:00
|
|
|
|
:ref:`remote-configuration-nat`.
|
2014-02-04 12:25:27 +01:00
|
|
|
|
|
2011-12-15 18:05:24 +01:00
|
|
|
|
Preparing your ActorSystem for Remoting
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
2012-01-05 09:31:21 +01:00
|
|
|
|
The Akka remoting is a separate jar file. Make sure that you have the following dependency in your project::
|
2011-12-15 21:16:19 +01:00
|
|
|
|
|
2012-09-21 10:47:58 +02:00
|
|
|
|
"com.typesafe.akka" %% "akka-remote" % "@version@" @crossString@
|
2011-12-15 21:16:19 +01:00
|
|
|
|
|
2011-12-23 10:25:05 +01:00
|
|
|
|
To enable remote capabilities in your Akka project you should, at a minimum, add the following changes
|
|
|
|
|
|
to your ``application.conf`` file::
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
|
|
|
|
|
akka {
|
|
|
|
|
|
actor {
|
2011-12-23 10:25:05 +01:00
|
|
|
|
provider = "akka.remote.RemoteActorRefProvider"
|
2011-12-15 18:05:24 +01:00
|
|
|
|
}
|
2011-12-21 23:33:13 +01:00
|
|
|
|
remote {
|
2013-01-23 11:38:20 +01:00
|
|
|
|
enabled-transports = ["akka.remote.netty.tcp"]
|
|
|
|
|
|
netty.tcp {
|
2011-12-23 10:25:05 +01:00
|
|
|
|
hostname = "127.0.0.1"
|
2011-12-21 23:33:13 +01:00
|
|
|
|
port = 2552
|
|
|
|
|
|
}
|
2011-12-23 10:25:05 +01:00
|
|
|
|
}
|
2011-12-15 18:05:24 +01:00
|
|
|
|
}
|
|
|
|
|
|
|
2011-12-23 10:25:05 +01:00
|
|
|
|
As you can see in the example above there are four things you need to add to get started:
|
|
|
|
|
|
|
2011-12-23 12:11:55 +01:00
|
|
|
|
* Change provider from ``akka.actor.LocalActorRefProvider`` to ``akka.remote.RemoteActorRefProvider``
|
2012-02-02 09:40:17 +01:00
|
|
|
|
* Add host name - the machine you want to run the actor system on; this host
|
|
|
|
|
|
name is exactly what is passed to remote systems in order to identify this
|
|
|
|
|
|
system and consequently used for connecting back to this system if need be,
|
|
|
|
|
|
hence set it to a reachable IP address or resolvable name in case you want to
|
|
|
|
|
|
communicate across the network.
|
|
|
|
|
|
* Add port number - the port the actor system should listen on, set to 0 to have it chosen automatically
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2012-08-16 17:00:06 +02:00
|
|
|
|
.. note::
|
|
|
|
|
|
The port number needs to be unique for each actor system on the same machine even if the actor
|
2013-01-23 11:38:20 +01:00
|
|
|
|
systems have different names. This is because each actor system has its own networking subsystem
|
2012-08-16 17:00:06 +02:00
|
|
|
|
listening for connections and handling messages as not to interfere with other actor systems.
|
|
|
|
|
|
|
2011-12-23 10:25:05 +01:00
|
|
|
|
The example above only illustrates the bare minimum of properties you have to add to enable remoting.
|
2013-04-15 09:26:51 +02:00
|
|
|
|
All settings are described in :ref:`remote-configuration-scala`.
|
2012-10-05 11:56:59 -07:00
|
|
|
|
|
2011-12-23 10:25:05 +01:00
|
|
|
|
Types of Remote Interaction
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
|
|
|
|
|
Akka has two ways of using remoting:
|
|
|
|
|
|
|
2013-03-26 18:17:50 +01:00
|
|
|
|
* Lookup : used to look up an actor on a remote node with ``actorSelection(path)``
|
2011-12-23 12:11:55 +01:00
|
|
|
|
* Creation : used to create an actor on a remote node with ``actorOf(Props(...), actorName)``
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2011-12-23 11:29:51 +01:00
|
|
|
|
In the next sections the two alternatives are described in detail.
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2011-12-21 23:33:13 +01:00
|
|
|
|
Looking up Remote Actors
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
2013-03-26 18:17:50 +01:00
|
|
|
|
``actorSelection(path)`` will obtain an ``ActorSelection`` to an Actor on a remote node, e.g.::
|
2011-12-21 23:33:13 +01:00
|
|
|
|
|
2013-03-26 18:17:50 +01:00
|
|
|
|
val selection =
|
|
|
|
|
|
context.actorSelection("akka.tcp://actorSystemName@10.0.0.1:2552/user/actorName")
|
2011-12-21 23:33:13 +01:00
|
|
|
|
|
2013-03-26 18:17:50 +01:00
|
|
|
|
As you can see from the example above the following pattern is used to find an actor on a remote node::
|
2011-12-21 23:33:13 +01:00
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
akka.<protocol>://<actor system>@<hostname>:<port>/<actor path>
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2014-04-16 16:15:15 +02:00
|
|
|
|
Once you obtained a selection to the actor you can interact with it in the same way you would with a local actor, e.g.::
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2013-03-26 18:17:50 +01:00
|
|
|
|
selection ! "Pretty awesome feature"
|
|
|
|
|
|
|
|
|
|
|
|
To acquire an :class:`ActorRef` for an :class:`ActorSelection` you need to
|
|
|
|
|
|
send a message to the selection and use the ``sender`` reference of the reply from
|
|
|
|
|
|
the actor. There is a built-in ``Identify`` message that all Actors will understand
|
|
|
|
|
|
and automatically reply to with a ``ActorIdentity`` message containing the
|
2013-08-23 09:07:38 +02:00
|
|
|
|
:class:`ActorRef`. This can also be done with the ``resolveOne`` method of
|
|
|
|
|
|
the :class:`ActorSelection`, which returns a ``Future`` of the matching
|
2013-03-26 18:17:50 +01:00
|
|
|
|
:class:`ActorRef`.
|
2011-12-21 23:33:13 +01:00
|
|
|
|
|
2012-08-14 20:42:54 +02:00
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
For more details on how actor addresses and paths are formed and used, please refer to :ref:`addressing`.
|
2011-12-26 18:39:42 +01:00
|
|
|
|
|
2016-05-24 10:21:03 +01:00
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
Message sends to actors that are actually in the sending actor system do not
|
|
|
|
|
|
get delivered via the remote actor ref provider. They're delivered directly,
|
|
|
|
|
|
by the local actor ref provider.
|
|
|
|
|
|
|
|
|
|
|
|
Aside from providing better performance, this also means that if the hostname
|
|
|
|
|
|
you configure remoting to listen as cannot actually be resolved from within
|
|
|
|
|
|
the very same actor system, such messages will (perhaps counterintuitively)
|
|
|
|
|
|
be delivered just fine.
|
|
|
|
|
|
|
2011-12-21 23:33:13 +01:00
|
|
|
|
Creating Actors Remotely
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
2011-12-23 10:25:05 +01:00
|
|
|
|
If you want to use the creation functionality in Akka remoting you have to further amend the
|
2012-02-02 09:40:17 +01:00
|
|
|
|
``application.conf`` file in the following way (only showing deployment section)::
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
|
|
|
|
|
akka {
|
|
|
|
|
|
actor {
|
2012-02-02 09:40:17 +01:00
|
|
|
|
deployment {
|
|
|
|
|
|
/sampleActor {
|
2013-01-23 11:38:20 +01:00
|
|
|
|
remote = "akka.tcp://sampleActorSystem@127.0.0.1:2553"
|
2012-02-02 09:40:17 +01:00
|
|
|
|
}
|
|
|
|
|
|
}
|
2011-12-15 18:05:24 +01:00
|
|
|
|
}
|
2012-02-02 09:40:17 +01:00
|
|
|
|
}
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2012-02-02 09:40:17 +01:00
|
|
|
|
The configuration above instructs Akka to react when an actor with path ``/sampleActor`` is created, i.e.
|
2012-09-21 15:08:56 +02:00
|
|
|
|
using ``system.actorOf(Props(...), "sampleActor")``. This specific actor will not be directly instantiated,
|
2011-12-23 11:29:51 +01:00
|
|
|
|
but instead the remote daemon of the remote system will be asked to create the actor,
|
|
|
|
|
|
which in this sample corresponds to ``sampleActorSystem@127.0.0.1:2553``.
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2012-09-21 15:08:56 +02:00
|
|
|
|
Once you have configured the properties above you would do the following in code:
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2012-09-21 15:08:56 +02:00
|
|
|
|
.. includecode:: code/docs/remoting/RemoteDeploymentDocSpec.scala#sample-actor
|
2011-12-23 10:25:05 +01:00
|
|
|
|
|
2012-09-21 17:08:36 +02:00
|
|
|
|
The actor class ``SampleActor`` has to be available to the runtimes using it, i.e. the classloader of the
|
2011-12-23 10:25:05 +01:00
|
|
|
|
actor systems has to have a JAR containing the class.
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
2012-06-04 23:10:03 +02:00
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
In order to ensure serializability of ``Props`` when passing constructor
|
|
|
|
|
|
arguments to the actor being created, do not make the factory an inner class:
|
|
|
|
|
|
this will inherently capture a reference to its enclosing object, which in
|
|
|
|
|
|
most cases is not serializable. It is best to create a factory method in the
|
|
|
|
|
|
companion object of the actor’s class.
|
|
|
|
|
|
|
2013-05-29 16:13:10 +02:00
|
|
|
|
Serializability of all Props can be tested by setting the configuration item
|
|
|
|
|
|
``akka.actor.serialize-creators=on``. Only Props whose ``deploy`` has
|
|
|
|
|
|
``LocalScope`` are exempt from this check.
|
|
|
|
|
|
|
2012-11-28 10:56:08 +01:00
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
You can use asterisks as wildcard matches for the actor paths, so you could specify:
|
|
|
|
|
|
``/*/sampleActor`` and that would match all ``sampleActor`` on that level in the hierarchy.
|
|
|
|
|
|
You can also use wildcard in the last position to match all actors at a certain level:
|
|
|
|
|
|
``/someParent/*``. Non-wildcard matches always have higher priority to match than wildcards, so:
|
|
|
|
|
|
``/foo/bar`` is considered **more specific** than ``/foo/*`` and only the highest priority match is used.
|
|
|
|
|
|
Please note that it **cannot** be used to partially match section, like this: ``/foo*/bar``, ``/f*o/bar`` etc.
|
|
|
|
|
|
|
2012-02-02 09:40:17 +01:00
|
|
|
|
Programmatic Remote Deployment
|
|
|
|
|
|
------------------------------
|
2011-12-15 21:16:19 +01:00
|
|
|
|
|
2012-02-02 09:40:17 +01:00
|
|
|
|
To allow dynamically deployed systems, it is also possible to include
|
|
|
|
|
|
deployment configuration in the :class:`Props` which are used to create an
|
|
|
|
|
|
actor: this information is the equivalent of a deployment section from the
|
|
|
|
|
|
configuration file, and if both are given, the external configuration takes
|
|
|
|
|
|
precedence.
|
|
|
|
|
|
|
|
|
|
|
|
With these imports:
|
|
|
|
|
|
|
2012-05-24 22:23:36 +02:00
|
|
|
|
.. includecode:: code/docs/remoting/RemoteDeploymentDocSpec.scala#import
|
2012-02-02 09:40:17 +01:00
|
|
|
|
|
|
|
|
|
|
and a remote address like this:
|
|
|
|
|
|
|
2012-05-24 22:23:36 +02:00
|
|
|
|
.. includecode:: code/docs/remoting/RemoteDeploymentDocSpec.scala#make-address
|
2012-02-02 09:40:17 +01:00
|
|
|
|
|
|
|
|
|
|
you can advise the system to create a child on that remote node like so:
|
|
|
|
|
|
|
2012-05-24 22:23:36 +02:00
|
|
|
|
.. includecode:: code/docs/remoting/RemoteDeploymentDocSpec.scala#deploy
|
2011-12-15 21:16:19 +01:00
|
|
|
|
|
2013-12-12 13:05:59 +01:00
|
|
|
|
Lifecycle and Failure Recovery Model
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
|
|
|
|
|
.. image:: ../images/association_lifecycle.png
|
2014-01-20 15:27:58 +01:00
|
|
|
|
:align: center
|
2013-12-12 13:05:59 +01:00
|
|
|
|
:width: 620
|
|
|
|
|
|
|
2014-08-06 15:38:52 +07:00
|
|
|
|
Each link with a remote system can be in one of the four states as illustrated above. Before any communication
|
2014-01-20 15:27:58 +01:00
|
|
|
|
happens with a remote system at a given ``Address`` the state of the association is ``Idle``. The first time a message
|
2013-12-12 13:05:59 +01:00
|
|
|
|
is attempted to be sent to the remote system or an inbound connection is accepted the state of the link transitions to
|
|
|
|
|
|
``Active`` denoting that the two systems has messages to send or receive and no failures were encountered so far.
|
|
|
|
|
|
When a communication failure happens and the connection is lost between the two systems the link becomes ``Gated``.
|
|
|
|
|
|
|
|
|
|
|
|
In this state the system will not attempt to connect to the remote host and all outbound messages will be dropped. The time
|
|
|
|
|
|
while the link is in the ``Gated`` state is controlled by the setting ``akka.remote.retry-gate-closed-for``:
|
|
|
|
|
|
after this time elapses the link state transitions to ``Idle`` again. ``Gate`` is one-sided in the
|
|
|
|
|
|
sense that whenever a successful *inbound* connection is accepted from a remote system during ``Gate`` it automatically
|
|
|
|
|
|
transitions to ``Active`` and communication resumes immediately.
|
|
|
|
|
|
|
|
|
|
|
|
In the face of communication failures that are unrecoverable because the state of the participating systems are inconsistent,
|
|
|
|
|
|
the remote system becomes ``Quarantined``. Unlike ``Gate``, quarantining is permanent and lasts until one of the systems
|
|
|
|
|
|
is restarted. After a restart communication can be resumed again and the link can become ``Active`` again.
|
|
|
|
|
|
|
2013-04-15 09:26:51 +02:00
|
|
|
|
Watching Remote Actors
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
|
|
|
|
|
Watching a remote actor is not different than watching a local actor, as described in
|
|
|
|
|
|
:ref:`deathwatch-scala`.
|
|
|
|
|
|
|
|
|
|
|
|
Failure Detector
|
|
|
|
|
|
----------------
|
|
|
|
|
|
|
|
|
|
|
|
Under the hood remote death watch uses heartbeat messages and a failure detector to generate ``Terminated``
|
|
|
|
|
|
message from network failures and JVM crashes, in addition to graceful termination of watched
|
|
|
|
|
|
actor.
|
|
|
|
|
|
|
|
|
|
|
|
The heartbeat arrival times is interpreted by an implementation of
|
2015-11-04 16:26:45 +02:00
|
|
|
|
`The Phi Accrual Failure Detector <http://www.jaist.ac.jp/~defago/files/pdf/IS_RR_2004_010.pdf>`_.
|
2013-04-15 09:26:51 +02:00
|
|
|
|
|
|
|
|
|
|
The suspicion level of failure is given by a value called *phi*.
|
|
|
|
|
|
The basic idea of the phi failure detector is to express the value of *phi* on a scale that
|
|
|
|
|
|
is dynamically adjusted to reflect current network conditions.
|
|
|
|
|
|
|
|
|
|
|
|
The value of *phi* is calculated as::
|
|
|
|
|
|
|
|
|
|
|
|
phi = -log10(1 - F(timeSinceLastHeartbeat))
|
|
|
|
|
|
|
|
|
|
|
|
where F is the cumulative distribution function of a normal distribution with mean
|
|
|
|
|
|
and standard deviation estimated from historical heartbeat inter-arrival times.
|
|
|
|
|
|
|
|
|
|
|
|
In the :ref:`remote-configuration-scala` you can adjust the ``akka.remote.watch-failure-detector.threshold``
|
|
|
|
|
|
to define when a *phi* value is considered to be a failure.
|
|
|
|
|
|
|
|
|
|
|
|
A low ``threshold`` is prone to generate many false positives but ensures
|
|
|
|
|
|
a quick detection in the event of a real crash. Conversely, a high ``threshold``
|
|
|
|
|
|
generates fewer mistakes but needs more time to detect actual crashes. The
|
|
|
|
|
|
default ``threshold`` is 10 and is appropriate for most situations. However in
|
|
|
|
|
|
cloud environments, such as Amazon EC2, the value could be increased to 12 in
|
|
|
|
|
|
order to account for network issues that sometimes occur on such platforms.
|
|
|
|
|
|
|
|
|
|
|
|
The following chart illustrates how *phi* increase with increasing time since the
|
|
|
|
|
|
previous heartbeat.
|
|
|
|
|
|
|
2013-04-19 13:21:15 +02:00
|
|
|
|
.. image:: ../images/phi1.png
|
2013-04-15 09:26:51 +02:00
|
|
|
|
|
|
|
|
|
|
Phi is calculated from the mean and standard deviation of historical
|
|
|
|
|
|
inter arrival times. The previous chart is an example for standard deviation
|
|
|
|
|
|
of 200 ms. If the heartbeats arrive with less deviation the curve becomes steeper,
|
|
|
|
|
|
i.e. it is possible to determine failure more quickly. The curve looks like this for
|
|
|
|
|
|
a standard deviation of 100 ms.
|
|
|
|
|
|
|
2013-04-19 13:21:15 +02:00
|
|
|
|
.. image:: ../images/phi2.png
|
2013-04-15 09:26:51 +02:00
|
|
|
|
|
|
|
|
|
|
To be able to survive sudden abnormalities, such as garbage collection pauses and
|
|
|
|
|
|
transient network failures the failure detector is configured with a margin,
|
|
|
|
|
|
``akka.remote.watch-failure-detector.acceptable-heartbeat-pause``. You may want to
|
|
|
|
|
|
adjust the :ref:`remote-configuration-scala` of this depending on you environment.
|
|
|
|
|
|
This is how the curve looks like for ``acceptable-heartbeat-pause`` configured to
|
|
|
|
|
|
3 seconds.
|
|
|
|
|
|
|
2013-04-19 13:21:15 +02:00
|
|
|
|
.. image:: ../images/phi3.png
|
2013-04-15 09:26:51 +02:00
|
|
|
|
|
2011-12-15 18:05:24 +01:00
|
|
|
|
Serialization
|
|
|
|
|
|
^^^^^^^^^^^^^
|
|
|
|
|
|
|
|
|
|
|
|
When using remoting for actors you must ensure that the ``props`` and ``messages`` used for
|
|
|
|
|
|
those actors are serializable. Failing to do so will cause the system to behave in an unintended way.
|
|
|
|
|
|
|
2016-05-24 10:21:03 +01:00
|
|
|
|
For more information please see :ref:`serialization-scala`.
|
2011-12-15 21:16:19 +01:00
|
|
|
|
|
2011-12-15 18:05:24 +01:00
|
|
|
|
Routers with Remote Destinations
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
2011-12-16 12:12:03 +13:00
|
|
|
|
It is absolutely feasible to combine remoting with :ref:`routing-scala`.
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
2014-02-11 14:48:24 +01:00
|
|
|
|
A pool of remote deployed routees can be configured as:
|
|
|
|
|
|
|
|
|
|
|
|
.. includecode:: ../scala/code/docs/routing/RouterDocSpec.scala#config-remote-round-robin-pool
|
|
|
|
|
|
|
|
|
|
|
|
This configuration setting will clone the actor defined in the ``Props`` of the ``remotePool`` 10
|
|
|
|
|
|
times and deploy it evenly distributed across the two given target nodes.
|
|
|
|
|
|
|
|
|
|
|
|
A group of remote actors can be configured as:
|
|
|
|
|
|
|
|
|
|
|
|
.. includecode:: ../scala/code/docs/routing/RouterDocSpec.scala#config-remote-round-robin-group
|
2011-12-15 18:05:24 +01:00
|
|
|
|
|
2014-02-11 14:48:24 +01:00
|
|
|
|
This configuration setting will send messages to the defined remote actor paths.
|
|
|
|
|
|
It requires that you create the destination actors on the remote nodes with matching paths.
|
|
|
|
|
|
That is not done by the router.
|
2011-12-23 23:58:39 +01:00
|
|
|
|
|
2013-11-26 09:17:50 +01:00
|
|
|
|
.. _remote-sample-scala:
|
2011-12-23 23:58:39 +01:00
|
|
|
|
|
2013-11-26 09:17:50 +01:00
|
|
|
|
Remoting Sample
|
|
|
|
|
|
^^^^^^^^^^^^^^^
|
2011-12-23 23:58:39 +01:00
|
|
|
|
|
2016-02-23 12:58:39 +01:00
|
|
|
|
There is a more extensive remote example that comes with `Lightbend Activator <http://www.lightbend.com/platform/getstarted>`_.
|
|
|
|
|
|
The tutorial named `Akka Remote Samples with Scala <http://www.lightbend.com/activator/template/akka-sample-remote-scala>`_
|
2013-11-26 09:17:50 +01:00
|
|
|
|
demonstrates both remote deployment and look-up of remote actors.
|
2011-12-23 23:58:39 +01:00
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
Pluggable transport support
|
|
|
|
|
|
---------------------------
|
|
|
|
|
|
|
|
|
|
|
|
Akka can be configured to use various transports to communicate with remote systems. The core
|
2014-11-14 00:38:32 +08:00
|
|
|
|
component of this feature is the :meth:`akka.remote.transport.Transport` SPI. Transport implementations must extend this trait.
|
2013-01-23 11:38:20 +01:00
|
|
|
|
Transports can be loaded by setting the ``akka.remote.enabled-transports`` configuration key to point to one or
|
|
|
|
|
|
more configuration sections containing driver descriptions.
|
|
|
|
|
|
|
|
|
|
|
|
An example of setting up the default Netty based SSL driver as default::
|
|
|
|
|
|
|
|
|
|
|
|
akka {
|
|
|
|
|
|
remote {
|
|
|
|
|
|
enabled-transports = [akka.remote.netty.ssl]
|
|
|
|
|
|
|
2013-02-11 13:33:21 +01:00
|
|
|
|
netty.ssl.security {
|
2013-01-23 11:38:20 +01:00
|
|
|
|
key-store = "mykeystore"
|
|
|
|
|
|
trust-store = "mytruststore"
|
|
|
|
|
|
key-store-password = "changeme"
|
2013-04-11 13:14:48 +02:00
|
|
|
|
key-password = "changeme"
|
2013-01-23 11:38:20 +01:00
|
|
|
|
trust-store-password = "changeme"
|
2015-12-18 11:47:19 +01:00
|
|
|
|
protocol = "TLSv1.2"
|
2013-01-23 11:38:20 +01:00
|
|
|
|
random-number-generator = "AES128CounterSecureRNG"
|
|
|
|
|
|
enabled-algorithms = [TLS_RSA_WITH_AES_128_CBC_SHA]
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
An example of setting up a custom transport implementation::
|
|
|
|
|
|
|
|
|
|
|
|
akka {
|
|
|
|
|
|
remote {
|
|
|
|
|
|
applied-transports = ["akka.remote.mytransport"]
|
|
|
|
|
|
|
|
|
|
|
|
mytransport {
|
|
|
|
|
|
# The transport-class configuration entry is required, and
|
|
|
|
|
|
# it must contain the fully qualified name of the transport
|
|
|
|
|
|
# implementation
|
|
|
|
|
|
transport-class = "my.package.MyTransport"
|
|
|
|
|
|
|
|
|
|
|
|
# It is possible to decorate Transports with additional services.
|
|
|
|
|
|
# Adapters should be registered in the "adapters" sections to
|
|
|
|
|
|
# be able to apply them to transports
|
|
|
|
|
|
applied-adapters = []
|
|
|
|
|
|
|
|
|
|
|
|
# Driver specific configuration options has to be in the same
|
|
|
|
|
|
# section:
|
|
|
|
|
|
some-config = foo
|
|
|
|
|
|
another-config = bar
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
2012-02-20 15:14:23 +01:00
|
|
|
|
Remote Events
|
|
|
|
|
|
-------------
|
|
|
|
|
|
|
2013-05-01 17:37:33 -04:00
|
|
|
|
It is possible to listen to events that occur in Akka Remote, and to subscribe/unsubscribe to these events
|
2012-02-20 15:14:23 +01:00
|
|
|
|
you simply register as listener to the below described types in on the ``ActorSystem.eventStream``.
|
|
|
|
|
|
|
|
|
|
|
|
.. note::
|
2013-02-10 16:04:59 -05:00
|
|
|
|
|
|
|
|
|
|
To subscribe to any remote event, subscribe to
|
|
|
|
|
|
:meth:`RemotingLifecycleEvent`. To subscribe to events related only to
|
|
|
|
|
|
the lifecycle of associations, subscribe to
|
|
|
|
|
|
:meth:`akka.remote.AssociationEvent`.
|
2013-01-23 11:38:20 +01:00
|
|
|
|
|
|
|
|
|
|
.. note::
|
2013-02-10 16:04:59 -05:00
|
|
|
|
|
|
|
|
|
|
The use of term "Association" instead of "Connection" reflects that the
|
|
|
|
|
|
remoting subsystem may use connectionless transports, but an association
|
|
|
|
|
|
similar to transport layer connections is maintained between endpoints by
|
|
|
|
|
|
the Akka protocol.
|
2012-02-20 15:14:23 +01:00
|
|
|
|
|
2012-08-17 12:25:31 +02:00
|
|
|
|
By default an event listener is registered which logs all of the events
|
|
|
|
|
|
described below. This default was chosen to help setting up a system, but it is
|
|
|
|
|
|
quite common to switch this logging off once that phase of the project is
|
|
|
|
|
|
finished.
|
|
|
|
|
|
|
|
|
|
|
|
.. note::
|
2013-02-10 16:04:59 -05:00
|
|
|
|
|
2012-08-17 12:25:31 +02:00
|
|
|
|
In order to switch off the logging, set
|
|
|
|
|
|
``akka.remote.log-remote-lifecycle-events = off`` in your
|
|
|
|
|
|
``application.conf``.
|
|
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
To be notified when an association is over ("disconnected") listen to ``DisassociatedEvent`` which
|
|
|
|
|
|
holds the direction of the association (inbound or outbound) and the addresses of the involved parties.
|
2012-02-20 15:14:23 +01:00
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
To be notified when an association is successfully established ("connected") listen to ``AssociatedEvent`` which
|
|
|
|
|
|
holds the direction of the association (inbound or outbound) and the addresses of the involved parties.
|
2012-02-20 15:14:23 +01:00
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
To intercept errors directly related to associations, listen to ``AssociationErrorEvent`` which
|
|
|
|
|
|
holds the direction of the association (inbound or outbound), the addresses of the involved parties and the
|
|
|
|
|
|
``Throwable`` cause.
|
2012-02-20 15:14:23 +01:00
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
To be notified when the remoting subsystem is ready to accept associations, listen to ``RemotingListenEvent`` which
|
|
|
|
|
|
contains the addresses the remoting listens on.
|
2011-12-23 23:58:39 +01:00
|
|
|
|
|
2015-12-06 20:14:44 -05:00
|
|
|
|
To be notified when the current system is quarantined by the remote system, listen to ``ThisActorSystemQuarantinedEvent``,
|
|
|
|
|
|
which includes the addresses of local and remote ActorSystems.
|
|
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
To be notified when the remoting subsystem has been shut down, listen to ``RemotingShutdownEvent``.
|
2011-12-23 23:58:39 +01:00
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
To intercept generic remoting related errors, listen to ``RemotingErrorEvent`` which holds the ``Throwable`` cause.
|
2012-05-22 12:08:49 +02:00
|
|
|
|
|
|
|
|
|
|
Remote Security
|
|
|
|
|
|
^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
|
|
|
|
|
Akka provides a couple of ways to enhance security between remote nodes (client/server):
|
|
|
|
|
|
|
|
|
|
|
|
* Untrusted Mode
|
|
|
|
|
|
* Security Cookie Handshake
|
|
|
|
|
|
|
|
|
|
|
|
Untrusted Mode
|
|
|
|
|
|
--------------
|
|
|
|
|
|
|
2012-10-04 16:50:49 -07:00
|
|
|
|
As soon as an actor system can connect to another remotely, it may in principle
|
|
|
|
|
|
send any possible message to any actor contained within that remote system. One
|
|
|
|
|
|
example may be sending a :class:`PoisonPill` to the system guardian, shutting
|
|
|
|
|
|
that system down. This is not always desired, and it can be disabled with the
|
|
|
|
|
|
following setting::
|
2012-05-22 12:08:49 +02:00
|
|
|
|
|
2012-10-04 16:50:49 -07:00
|
|
|
|
akka.remote.untrusted-mode = on
|
2012-05-22 12:08:49 +02:00
|
|
|
|
|
2012-10-04 16:50:49 -07:00
|
|
|
|
This disallows sending of system messages (actor life-cycle commands,
|
|
|
|
|
|
DeathWatch, etc.) and any message extending :class:`PossiblyHarmful` to the
|
|
|
|
|
|
system on which this flag is set. Should a client send them nonetheless they
|
|
|
|
|
|
are dropped and logged (at DEBUG level in order to reduce the possibilities for
|
|
|
|
|
|
a denial of service attack). :class:`PossiblyHarmful` covers the predefined
|
|
|
|
|
|
messages like :class:`PoisonPill` and :class:`Kill`, but it can also be added
|
|
|
|
|
|
as a marker trait to user-defined messages.
|
2012-05-22 12:08:49 +02:00
|
|
|
|
|
2013-11-06 14:34:07 +01:00
|
|
|
|
Messages sent with actor selection are by default discarded in untrusted mode, but
|
|
|
|
|
|
permission to receive actor selection messages can be granted to specific actors
|
|
|
|
|
|
defined in configuration::
|
|
|
|
|
|
|
|
|
|
|
|
akka.remote.trusted-selection-paths = ["/user/receptionist", "/user/namingService"]
|
|
|
|
|
|
|
|
|
|
|
|
The actual message must still not be of type :class:`PossiblyHarmful`.
|
|
|
|
|
|
|
2012-10-04 16:50:49 -07:00
|
|
|
|
In summary, the following operations are ignored by a system configured in
|
|
|
|
|
|
untrusted mode when incoming via the remoting layer:
|
|
|
|
|
|
|
|
|
|
|
|
* remote deployment (which also means no remote supervision)
|
|
|
|
|
|
* remote DeathWatch
|
|
|
|
|
|
* ``system.stop()``, :class:`PoisonPill`, :class:`Kill`
|
|
|
|
|
|
* sending any message which extends from the :class:`PossiblyHarmful` marker
|
|
|
|
|
|
interface, which includes :class:`Terminated`
|
2013-11-06 14:34:07 +01:00
|
|
|
|
* messages sent with actor selection, unless destination defined in ``trusted-selection-paths``.
|
2012-10-04 16:50:49 -07:00
|
|
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
Enabling the untrusted mode does not remove the capability of the client to
|
|
|
|
|
|
freely choose the target of its message sends, which means that messages not
|
|
|
|
|
|
prohibited by the above rules can be sent to any actor in the remote system.
|
|
|
|
|
|
It is good practice for a client-facing system to only contain a well-defined
|
|
|
|
|
|
set of entry point actors, which then forward requests (possibly after
|
|
|
|
|
|
performing validation) to another actor system containing the actual worker
|
|
|
|
|
|
actors. If messaging between these two server-side systems is done using
|
|
|
|
|
|
local :class:`ActorRef` (they can be exchanged safely between actor systems
|
|
|
|
|
|
within the same JVM), you can restrict the messages on this interface by
|
|
|
|
|
|
marking them :class:`PossiblyHarmful` so that a client cannot forge them.
|
2012-05-22 12:08:49 +02:00
|
|
|
|
|
2012-08-20 17:04:20 +02:00
|
|
|
|
SSL
|
|
|
|
|
|
---
|
|
|
|
|
|
|
2013-01-23 11:38:20 +01:00
|
|
|
|
SSL can be used as the remote transport by adding ``akka.remote.netty.ssl``
|
|
|
|
|
|
to the ``enabled-transport`` configuration section. See a description of the settings
|
2013-04-15 09:26:51 +02:00
|
|
|
|
in the :ref:`remote-configuration-scala` section.
|
2013-03-26 18:17:50 +01:00
|
|
|
|
|
2015-05-23 19:16:41 -07:00
|
|
|
|
The SSL support is implemented with Java Secure Socket Extension, please consult the official
|
2012-08-21 10:04:15 +02:00
|
|
|
|
`Java Secure Socket Extension documentation <http://docs.oracle.com/javase/7/docs/technotes/guides/security/jsse/JSSERefGuide.html>`_
|
|
|
|
|
|
and related resources for troubleshooting.
|
2013-03-26 18:17:50 +01:00
|
|
|
|
|
2012-08-20 17:04:20 +02:00
|
|
|
|
.. note::
|
|
|
|
|
|
|
2013-03-26 18:17:50 +01:00
|
|
|
|
When using SHA1PRNG on Linux it's recommended specify ``-Djava.security.egd=file:/dev/./urandom`` as argument
|
2012-08-20 17:04:20 +02:00
|
|
|
|
to the JVM to prevent blocking. It is NOT as secure because it reuses the seed.
|
2013-03-26 18:17:50 +01:00
|
|
|
|
Use '/dev/./urandom', not '/dev/urandom' as that doesn't work according to
|
2012-08-21 10:04:15 +02:00
|
|
|
|
`Bug ID: 6202721 <http://bugs.sun.com/view_bug.do?bug_id=6202721>`_.
|
2013-03-26 18:17:50 +01:00
|
|
|
|
|
2013-04-15 09:26:51 +02:00
|
|
|
|
.. _remote-configuration-scala:
|
|
|
|
|
|
|
|
|
|
|
|
Remote Configuration
|
|
|
|
|
|
^^^^^^^^^^^^^^^^^^^^
|
|
|
|
|
|
|
2014-03-23 18:39:55 +01:00
|
|
|
|
There are lots of configuration properties that are related to remoting in Akka. We refer to the
|
|
|
|
|
|
:ref:`reference configuration <config-akka-remote>` for more information.
|
2013-04-15 09:26:51 +02:00
|
|
|
|
|
|
|
|
|
|
.. note::
|
|
|
|
|
|
|
|
|
|
|
|
Setting properties like the listening IP and port number programmatically is
|
|
|
|
|
|
best done by using something like the following:
|
|
|
|
|
|
|
2013-05-08 09:42:25 +02:00
|
|
|
|
.. includecode:: ../java/code/docs/remoting/RemoteDeploymentDocTest.java#programmatic
|
2013-04-15 09:26:51 +02:00
|
|
|
|
|
2015-09-09 10:14:51 +02:00
|
|
|
|
|
|
|
|
|
|
.. _remote-configuration-nat:
|
|
|
|
|
|
|
2016-01-21 12:07:59 +01:00
|
|
|
|
Akka behind NAT or in a Docker container
|
|
|
|
|
|
----------------------------------------
|
2015-09-09 10:14:51 +02:00
|
|
|
|
|
|
|
|
|
|
In setups involving Network Address Translation (NAT), Load Balancers or Docker
|
|
|
|
|
|
containers the hostname and port pair that akka binds to will be different than the "logical"
|
|
|
|
|
|
host name and port pair that is used to connect to the system from the outside. This requires
|
|
|
|
|
|
special configuration that sets both the logical and the bind pairs for remoting.
|
|
|
|
|
|
|
|
|
|
|
|
.. code-block:: ruby
|
|
|
|
|
|
|
|
|
|
|
|
akka {
|
|
|
|
|
|
remote {
|
|
|
|
|
|
netty.tcp {
|
|
|
|
|
|
hostname = my.domain.com # external (logical) hostname
|
|
|
|
|
|
port = 8000 # external (logical) port
|
|
|
|
|
|
|
|
|
|
|
|
bind-hostname = local.address # internal (bind) hostname
|
|
|
|
|
|
bind-port = 2552 # internal (bind) port
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|
|
|
|
|
|
}
|