Skip to content

A decentralized, k-ordered id generation service in golang

License

Notifications You must be signed in to change notification settings

casualjim/flakeid

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Flake: A decentralized, k-ordered id generation service in Golang

Flake produces 128-bit, k-ordered ids (read time-ordered lexically). Run one on each node in your infrastructure and they will generate conflict-free ids on-demand without coordination.

Read the original post on the Boundary blog.

To get started

go get -u github.com/casualjim/flakeid/cmd/...

Deployment

Local usage

id := flakeid.MustNewID()

Server/Client usage

Run a server

flakeid-server &

Example usage from your application.

idGenerator, err := flakeid.NewClient("tcp", "[::1]:3525", true)
if err != nil {
    log.Fatalln(err)
}
defer idGenerator.Close()

ids, err := idGenerator.NextN(1)
if err != nil {
    log.Fatalln(err)
}

fmt.Println(string(ids))

Anatomy

Flake ids are 128-bits wide described here from most significant to least significant bits.

  • 64-bit timestamp - milliseconds since the epoch (Jan 1 1970)
  • 48-bit worker id - MAC address from a configurable device
  • 16-bit sequence # - usually 0, incremented when more than one id is requested in the same millisecond and reset to 0 when the clock ticks forward

Roadmap

  • HTTP interface

Frequently Asked Questions

How does this differ from snowflake developed at Twitter?

The differences stem primarily from the fact that Twitter snowflake ids are 64-bits wide. This means that additional coordination is required to pick a worker id (twitter does this via a ZooKeeper ensemble). Their scheme works great when your ids must fit into 64-bits. However this comes at the cost of additional coordination among nodes and a system that is generally a little more difficult to reason about. It is a fine system though and we were able to learn from it in our efforts.

How is flake different from rearranging the bits of a UUID-1 id?

First, successive UUID versions aim to make ids increasingly opaque in nature through various means. We have actually found a great deal of utility in structurally transparent unique ids and that has motivated much of this work. The most transparent variant is UUID-1 (for which it has received a fair bit of criticism) and thus the nearest relative to a flake id. There are some important differences though.

UUID-1 is an odd beast. First, the timestamp is based on the number of 100 nanosecond intervals since October 15, 1582. This is not how most of us familiar with Unix timestamps reason about time. If that isn't bad enough, the timestamp is an odd 60-bits in length with the most significant bits shifted to the least significant bits of the UUID. This property makes lexical ordering essentially meaningless. The remaining bits contain a clock id (initially set to a random number) and a node id (usually the MAC address).

The first problem is the timestamp. We could rearrange the bits to get some k-ordering love, but reasoning on timestamps of this nature makes reasoning about the resulting ids more complex than it needs to be. This is why flake uses a standard 64-bit Unix timestamp, unaltered, as the most significant bits.

The next problem is clock skew and protection against replaying ids for a time in the past. The UUID-1 spec dictates that the clock id be incremented in such an event, but this behavior is implementation-specific and we aren't aware of any Erlang implementations that met our safety goals. Flake durably writes a timestamp to a dets table periodically while running. Following a restart, flake will refuse to startup if the timestamp written there is from the future. Furthermore, flake will refuse to generate ids if it detects that the system clock is running backwards.

When are flake ids not appropriate?

Flake ids are predictable by design. Don't use use flake to generate ids that you'd rather be unpredictable. Don't use flake to generate passwords, security tokens, or anything else you wouldn't want someone to be able to guess.

Flake ids expose the identity of the machine which generated the id (by way of its MAC address) and the time at which it did so. This could be a problem for some security-sensitive applications.

Don't do modulo 2 arithmetic on flake ids with the expectation of random distribution. The least significant 16-bits are usually going to be 0 on a machine that is generating an average of one or fewer ids per millisecond.

About

A decentralized, k-ordered id generation service in golang

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages