Need advice about which tool to choose?Ask the StackShare community!

etcd

286
399
+ 1
24
Zookeeper

798
981
+ 1
43
Add tool

etcd vs Zookeeper: What are the differences?

Developers describe etcd as "A distributed consistent key-value store for shared configuration and service discovery". etcd is a distributed key value store that provides a reliable way to store data across a cluster of machines. It’s open-source and available on GitHub. etcd gracefully handles master elections during network partitions and will tolerate machine failure, including the master. On the other hand, Zookeeper is detailed as "Because coordinating distributed systems is a Zoo". A centralized service for maintaining configuration information, naming, providing distributed synchronization, and providing group services. All of these kinds of services are used in some form or another by distributed applications.

etcd and Zookeeper can be primarily classified as "Open Source Service Discovery" tools.

"Service discovery" is the primary reason why developers consider etcd over the competitors, whereas "High performance ,easy to generate node specific config" was stated as the key factor in picking Zookeeper.

etcd is an open source tool with 25.5K GitHub stars and 5.18K GitHub forks. Here's a link to etcd's open source repository on GitHub.

Shopify, SendGrid, and hike are some of the popular companies that use Zookeeper, whereas etcd is used by CNCFlora, Beam, and Giant Swarm. Zookeeper has a broader approval, being mentioned in 116 company stacks & 48 developers stacks; compared to etcd, which is listed in 27 company stacks and 11 developer stacks.

Get Advice from developers at your company using StackShare Enterprise. Sign up for StackShare Enterprise.
Learn More
Pros of etcd
Pros of Zookeeper
  • 11
    Service discovery
  • 6
    Fault tolerant key value store
  • 2
    Secure
  • 2
    Bundled with coreos
  • 1
    Consol integration
  • 1
    Privilege Access Management
  • 1
    Open Source
  • 11
    High performance ,easy to generate node specific config
  • 8
    Java
  • 8
    Kafka support
  • 5
    Spring Boot Support
  • 3
    Supports extensive distributed IPC
  • 2
    Curator
  • 2
    Used in ClickHouse
  • 2
    Supports DC/OS
  • 1
    Used in Hadoop
  • 1
    Embeddable In Java Service

Sign up to add or upvote prosMake informed product decisions

What companies use etcd?
What companies use Zookeeper?
See which teams inside your own company are using etcd or Zookeeper.
Sign up for StackShare EnterpriseLearn More

Sign up to get full access to all the companiesMake informed product decisions

What tools integrate with etcd?
What tools integrate with Zookeeper?

Sign up to get full access to all the tool integrationsMake informed product decisions

What are some alternatives to etcd and Zookeeper?
Consul
Consul is a tool for service discovery and configuration. Consul is distributed, highly available, and extremely scalable.
Redis
Redis is an open source (BSD licensed), in-memory data structure store, used as a database, cache, and message broker. Redis provides data structures such as strings, hashes, lists, sets, sorted sets with range queries, bitmaps, hyperloglogs, geospatial indexes, and streams.
MongoDB
MongoDB stores data in JSON-like documents that can vary in structure, offering a dynamic, flexible schema. MongoDB was also designed for high availability and scalability, with built-in replication and auto-sharding.
Cassandra
Partitioning means that Cassandra can distribute your data across multiple machines in an application-transparent matter. Cassandra will automatically repartition as machines are added and removed from the cluster. Row store means that like relational databases, Cassandra organizes data by rows and columns. The Cassandra Query Language (CQL) is a close relative of SQL.
Vault
Vault is a tool for securely accessing secrets. A secret is anything that you want to tightly control access to, such as API keys, passwords, certificates, and more. Vault provides a unified interface to any secret, while providing tight access control and recording a detailed audit log.
See all alternatives