Table of Contents 1. Consumer confirmation 2. Failure retry mechanism 2.1. Failure handling strategy 3. Business idempotence 3.1. Unique message ID 3.2. Business judgment 3.3. Cover-up plan 1. Consumer Confirmation RabbitMQ provides a consumer confirmation mechanism (Consumer Acknowledgement). That is: when the consumer finishes processing the message, it should send a receipt to RabbitMQ to […]
Tag: reliability
RabbitMQ producer reliability
Table of Contents Problems that may arise when using MQ Producer reliability 1. Producer reconnection 2. Producer confirmation 3. Data persistence Switch persistence Queue persistence Message persistence LazyQueue lazy loading Problems that may occur when using MQ Lost while sending message: The producer failed to connect to MQ when sending messages Exchange was not found […]
Use guidance to improve the reliability and stability of large model output
This article was first published on the blog LLM Application Development Practice In complex LLM application development, especially when process orchestration and multiple LLM calls are involved, each Prompt design depends on the large model output of the previous step. How to avoid the “nonsense” of large language models and improve the reliability and stability […]
IPSec high reliability experiment: establishing IPSec tunnel through VRRP virtual address
Environmental description This experiment uses Huawei eNSP, and mainly uses three USG6000V firewalls to complete the experimental content. The two firewalls at the headquarters are configured with HRP and VRRP, and VRRP virtual addresses are used to establish IPSec tunnels with the branches. Topology map Configuration process 1. IP address omitted 2. Security zone configuration […]
Practice RabbitMQ’s producer reliability implementation on Idea
Producer reliability implementation Article directory Producer reliability implementation Preface producer reliability Foreword When sending a message we may have thought that the message might be discarded. Starting from front to back according to the message transfer process, we start with the producer. It is possible for a producer to lose a message while sending it. […]
Network security–firewall bypass deployment methods and high reliability technology
Table of Contents 1. Firewall 2. Firewall bypass deployment method Implemented using policy routing The first step, IP address configuration Step 2: Configure routing Step 3: Create policies on the firewall Step 4: Use policy routing to divert traffic on R2 3. Firewall high reliability technology-HRP Topology The first step is to configure SW1, SW2, […]