From 6dbfe29923eb271471bbd74723137f9b0987e644 Mon Sep 17 00:00:00 2001 From: DMRobertson Date: Tue, 1 Aug 2023 11:02:34 +0000 Subject: deploy: 190c990a76ac0faaaec31340a721cee4d172016a --- latest/workers.html | 36 +++++++++++++++++++++++++++++++----- 1 file changed, 31 insertions(+), 5 deletions(-) (limited to 'latest/workers.html') diff --git a/latest/workers.html b/latest/workers.html index 69b16be88e..9691db0e55 100644 --- a/latest/workers.html +++ b/latest/workers.html @@ -218,9 +218,15 @@ for the main process
  • Secondly, you need to enable redis-based replication
  • You will need to add an instance_map -with the main process defined, as well as the relevant connection information from -it's HTTP replication listener (defined in step 1 above). Note that the host defined -is the address the worker needs to look for the main process at, not necessarily the same address that is bound to.
  • +with the main process defined, as well as the relevant connection information from +it's HTTP replication listener (defined in step 1 above). + +
  • Optionally, a shared secret can be used to authenticate HTTP traffic between workers. For example:
  • @@ -293,10 +299,10 @@ recommend the use of systemd where available: for information on se

    Start Synapse with Poetry

    The following applies to Synapse installations that have been installed from source using poetry.

    You can start the main Synapse process with Poetry by running the following command:

    -
    poetry run synapse_homeserver -c [your homeserver.yaml]
    +
    poetry run synapse_homeserver --config-file [your homeserver.yaml]
     

    For worker setups, you can run the following command

    -
    poetry run synapse_worker -c [your worker.yaml]
    +
    poetry run synapse_worker --config-file [your homeserver.yaml] --config-file [your worker.yaml]
     

    Available worker applications

    synapse.app.generic_worker

    @@ -621,6 +627,26 @@ the stream writer for the receipts stream:

    the stream writer for the presence stream:

    ^/_matrix/client/(api/v1|r0|v3|unstable)/presence/
     
    +

    Restrict outbound federation traffic to a specific set of workers

    +

    The +outbound_federation_restricted_to +configuration is useful to make sure outbound federation traffic only goes through a +specified subset of workers. This allows you to set more strict access controls (like a +firewall) for all workers and only allow the federation_sender's to contact the +outside world.

    +
    instance_map:
    +    main:
    +        host: localhost
    +        port: 8030
    +    federation_sender1:
    +        host: localhost
    +        port: 8034
    +
    +outbound_federation_restricted_to:
    +  - federation_sender1
    +
    +worker_replication_secret: "secret_secret"
    +

    Background tasks

    There is also support for moving background tasks to a separate worker. Background tasks are run periodically or started via replication. Exactly -- cgit 1.5.1