peer_server.go 24 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841
  1. package server
  2. import (
  3. "bytes"
  4. "encoding/binary"
  5. "encoding/json"
  6. "fmt"
  7. "io/ioutil"
  8. "math/rand"
  9. "net/http"
  10. "net/url"
  11. "sort"
  12. "strconv"
  13. "strings"
  14. "sync"
  15. "time"
  16. "github.com/coreos/etcd/third_party/github.com/goraft/raft"
  17. "github.com/coreos/etcd/third_party/github.com/gorilla/mux"
  18. "github.com/coreos/etcd/discovery"
  19. etcdErr "github.com/coreos/etcd/error"
  20. "github.com/coreos/etcd/log"
  21. "github.com/coreos/etcd/metrics"
  22. "github.com/coreos/etcd/pkg/btrfs"
  23. "github.com/coreos/etcd/store"
  24. )
  25. const (
  26. // ThresholdMonitorTimeout is the time between log notifications that the
  27. // Raft heartbeat is too close to the election timeout.
  28. ThresholdMonitorTimeout = 5 * time.Second
  29. // ActiveMonitorTimeout is the time between checks on the active size of
  30. // the cluster. If the active size is bigger than the actual size then
  31. // etcd attempts to demote to bring it to the correct number.
  32. ActiveMonitorTimeout = 1 * time.Second
  33. // PeerActivityMonitorTimeout is the time between checks for dead nodes in
  34. // the cluster.
  35. PeerActivityMonitorTimeout = 1 * time.Second
  36. )
  37. type PeerServerConfig struct {
  38. Name string
  39. Scheme string
  40. URL string
  41. SnapshotCount int
  42. RetryTimes int
  43. RetryInterval float64
  44. }
  45. type PeerServer struct {
  46. Config PeerServerConfig
  47. clusterConfig *ClusterConfig
  48. raftServer raft.Server
  49. server *Server
  50. joinIndex uint64
  51. followersStats *raftFollowersStats
  52. serverStats *raftServerStats
  53. registry *Registry
  54. store store.Store
  55. snapConf *snapshotConf
  56. stopNotify chan bool
  57. removeNotify chan bool
  58. started bool
  59. closeChan chan bool
  60. routineGroup sync.WaitGroup
  61. timeoutThresholdChan chan interface{}
  62. metrics *metrics.Bucket
  63. sync.Mutex
  64. }
  65. // TODO: find a good policy to do snapshot
  66. type snapshotConf struct {
  67. // Etcd will check if snapshot is need every checkingInterval
  68. checkingInterval time.Duration
  69. // The index when the last snapshot happened
  70. lastIndex uint64
  71. // If the incremental number of index since the last snapshot
  72. // exceeds the snapshot Threshold, etcd will do a snapshot
  73. snapshotThr uint64
  74. }
  75. func NewPeerServer(psConfig PeerServerConfig, registry *Registry, store store.Store, mb *metrics.Bucket, followersStats *raftFollowersStats, serverStats *raftServerStats) *PeerServer {
  76. s := &PeerServer{
  77. Config: psConfig,
  78. clusterConfig: NewClusterConfig(),
  79. registry: registry,
  80. store: store,
  81. followersStats: followersStats,
  82. serverStats: serverStats,
  83. timeoutThresholdChan: make(chan interface{}, 1),
  84. metrics: mb,
  85. }
  86. return s
  87. }
  88. func (s *PeerServer) SetRaftServer(raftServer raft.Server) {
  89. s.snapConf = &snapshotConf{
  90. checkingInterval: time.Second * 3,
  91. // this is not accurate, we will update raft to provide an api
  92. lastIndex: raftServer.CommitIndex(),
  93. snapshotThr: uint64(s.Config.SnapshotCount),
  94. }
  95. raftServer.AddEventListener(raft.StateChangeEventType, s.raftEventLogger)
  96. raftServer.AddEventListener(raft.LeaderChangeEventType, s.raftEventLogger)
  97. raftServer.AddEventListener(raft.TermChangeEventType, s.raftEventLogger)
  98. raftServer.AddEventListener(raft.AddPeerEventType, s.raftEventLogger)
  99. raftServer.AddEventListener(raft.RemovePeerEventType, s.raftEventLogger)
  100. raftServer.AddEventListener(raft.HeartbeatIntervalEventType, s.raftEventLogger)
  101. raftServer.AddEventListener(raft.ElectionTimeoutThresholdEventType, s.raftEventLogger)
  102. raftServer.AddEventListener(raft.HeartbeatEventType, s.recordMetricEvent)
  103. s.raftServer = raftServer
  104. }
  105. // ClusterConfig retrieves the current cluster configuration.
  106. func (s *PeerServer) ClusterConfig() *ClusterConfig {
  107. return s.clusterConfig
  108. }
  109. // SetClusterConfig updates the current cluster configuration.
  110. // Adjusting the active size will cause the PeerServer to demote peers or
  111. // promote standbys to match the new size.
  112. func (s *PeerServer) SetClusterConfig(c *ClusterConfig) {
  113. // Set minimums.
  114. if c.ActiveSize < MinActiveSize {
  115. c.ActiveSize = MinActiveSize
  116. }
  117. if c.PromoteDelay < MinPromoteDelay {
  118. c.PromoteDelay = MinPromoteDelay
  119. }
  120. s.clusterConfig = c
  121. }
  122. // Try all possible ways to find clusters to join
  123. // Include log data in -data-dir, -discovery and -peers
  124. //
  125. // Peer discovery follows this order:
  126. // 1. previous peers in -data-dir
  127. // 2. -discovery
  128. // 3. -peers
  129. //
  130. // TODO(yichengq): RaftServer should be started as late as possible.
  131. // Current implementation to start it is not that good,
  132. // and should be refactored later.
  133. func (s *PeerServer) findCluster(discoverURL string, peers []string) {
  134. name := s.Config.Name
  135. isNewNode := s.raftServer.IsLogEmpty()
  136. // Try its best to find possible peers, and connect with them.
  137. if !isNewNode {
  138. // It is not allowed to join the cluster with existing peer address
  139. // This prevents old node joining with different name by mistake.
  140. if !s.checkPeerAddressNonconflict() {
  141. log.Fatalf("%v is not allowed to join the cluster with existing URL %v", s.Config.Name, s.Config.URL)
  142. }
  143. // Take old nodes into account.
  144. allPeers := s.getKnownPeers()
  145. // Discover registered peers.
  146. // TODO(yichengq): It may mess up discoverURL if this is
  147. // set wrong by mistake. This may need to refactor discovery
  148. // module. Fix it later.
  149. if discoverURL != "" {
  150. discoverPeers, _ := s.handleDiscovery(discoverURL)
  151. allPeers = append(allPeers, discoverPeers...)
  152. }
  153. allPeers = append(allPeers, peers...)
  154. allPeers = s.removeSelfFromList(allPeers)
  155. // If there is possible peer list, use it to find cluster.
  156. if len(allPeers) > 0 {
  157. // TODO(yichengq): joinCluster may fail if there's no leader for
  158. // current cluster. It should wait if the cluster is under
  159. // leader election, or the node with changed IP cannot join
  160. // the cluster then.
  161. if err := s.startAsFollower(allPeers, 1); err == nil {
  162. log.Debugf("%s joins to the previous cluster %v", name, allPeers)
  163. return
  164. }
  165. log.Warnf("%s cannot connect to previous cluster %v", name, allPeers)
  166. }
  167. // TODO(yichengq): Think about the action that should be done
  168. // if it cannot connect any of the previous known node.
  169. s.raftServer.Start()
  170. log.Debugf("%s is restarting the cluster %v", name, allPeers)
  171. return
  172. }
  173. // Attempt cluster discovery
  174. if discoverURL != "" {
  175. discoverPeers, discoverErr := s.handleDiscovery(discoverURL)
  176. // It is registered in discover url
  177. if discoverErr == nil {
  178. // start as a leader in a new cluster
  179. if len(discoverPeers) == 0 {
  180. log.Debugf("%s is starting a new cluster via discover service", name)
  181. s.startAsLeader()
  182. } else {
  183. log.Debugf("%s is joining a cluster %v via discover service", name, discoverPeers)
  184. if err := s.startAsFollower(discoverPeers, s.Config.RetryTimes); err != nil {
  185. log.Fatal(err)
  186. }
  187. }
  188. return
  189. }
  190. log.Warnf("%s failed to connect discovery service[%v]: %v", name, discoverURL, discoverErr)
  191. if len(peers) == 0 {
  192. log.Fatalf("%s, the new leader, must register itself to discovery service as required", name)
  193. }
  194. }
  195. if len(peers) > 0 {
  196. if err := s.startAsFollower(peers, s.Config.RetryTimes); err != nil {
  197. log.Fatalf("%s cannot connect to existing cluster %v", name, peers)
  198. }
  199. return
  200. }
  201. log.Infof("%s is starting a new cluster.", s.Config.Name)
  202. s.startAsLeader()
  203. return
  204. }
  205. // Start starts the raft server.
  206. // The function assumes that join has been accepted successfully.
  207. func (s *PeerServer) Start(snapshot bool, discoverURL string, peers []string) error {
  208. s.Lock()
  209. defer s.Unlock()
  210. if s.started {
  211. return nil
  212. }
  213. s.started = true
  214. // LoadSnapshot
  215. if snapshot {
  216. err := s.raftServer.LoadSnapshot()
  217. if err == nil {
  218. log.Debugf("%s finished load snapshot", s.Config.Name)
  219. } else {
  220. log.Debug(err)
  221. }
  222. }
  223. s.raftServer.Init()
  224. // Set NOCOW for data directory in btrfs
  225. if btrfs.IsBtrfs(s.raftServer.LogPath()) {
  226. if err := btrfs.SetNOCOWFile(s.raftServer.LogPath()); err != nil {
  227. log.Warnf("Failed setting NOCOW: %v", err)
  228. }
  229. }
  230. s.findCluster(discoverURL, peers)
  231. s.stopNotify = make(chan bool)
  232. s.removeNotify = make(chan bool)
  233. s.closeChan = make(chan bool)
  234. s.startRoutine(s.monitorSync)
  235. s.startRoutine(s.monitorTimeoutThreshold)
  236. s.startRoutine(s.monitorActiveSize)
  237. s.startRoutine(s.monitorPeerActivity)
  238. // open the snapshot
  239. if snapshot {
  240. s.startRoutine(s.monitorSnapshot)
  241. }
  242. return nil
  243. }
  244. // Stop stops the server gracefully.
  245. func (s *PeerServer) Stop() {
  246. s.Lock()
  247. defer s.Unlock()
  248. if !s.started {
  249. return
  250. }
  251. s.started = false
  252. close(s.closeChan)
  253. // TODO(yichengq): it should also call async stop for raft server,
  254. // but this functionality has not been implemented.
  255. s.raftServer.Stop()
  256. s.routineGroup.Wait()
  257. close(s.stopNotify)
  258. }
  259. // asyncRemove stops the server in peer mode.
  260. // It is called to stop the server internally when it has been removed
  261. // from the cluster.
  262. // The function triggers the stop action first to notice server that it
  263. // should not continue, and wait for its stop in separate goroutine because
  264. // the caller should also exit.
  265. func (s *PeerServer) asyncRemove() {
  266. s.Lock()
  267. if !s.started {
  268. s.Unlock()
  269. return
  270. }
  271. s.started = false
  272. close(s.closeChan)
  273. // TODO(yichengq): it should also call async stop for raft server,
  274. // but this functionality has not been implemented.
  275. go func() {
  276. defer s.Unlock()
  277. s.raftServer.Stop()
  278. s.routineGroup.Wait()
  279. close(s.removeNotify)
  280. }()
  281. }
  282. // StopNotify notifies the server is stopped.
  283. func (s *PeerServer) StopNotify() <-chan bool {
  284. return s.stopNotify
  285. }
  286. // RemoveNotify notifies the server is removed from peer mode due to
  287. // removal from the cluster.
  288. func (s *PeerServer) RemoveNotify() <-chan bool {
  289. return s.removeNotify
  290. }
  291. func (s *PeerServer) HTTPHandler() http.Handler {
  292. router := mux.NewRouter()
  293. // internal commands
  294. router.HandleFunc("/name", s.NameHttpHandler)
  295. router.HandleFunc("/version", s.VersionHttpHandler)
  296. router.HandleFunc("/version/{version:[0-9]+}/check", s.VersionCheckHttpHandler)
  297. router.HandleFunc("/upgrade", s.UpgradeHttpHandler)
  298. router.HandleFunc("/join", s.JoinHttpHandler)
  299. router.HandleFunc("/remove/{name:.+}", s.RemoveHttpHandler)
  300. router.HandleFunc("/vote", s.VoteHttpHandler)
  301. router.HandleFunc("/log", s.GetLogHttpHandler)
  302. router.HandleFunc("/log/append", s.AppendEntriesHttpHandler)
  303. router.HandleFunc("/snapshot", s.SnapshotHttpHandler)
  304. router.HandleFunc("/snapshotRecovery", s.SnapshotRecoveryHttpHandler)
  305. router.HandleFunc("/etcdURL", s.EtcdURLHttpHandler)
  306. router.HandleFunc("/v2/admin/config", s.getClusterConfigHttpHandler).Methods("GET")
  307. router.HandleFunc("/v2/admin/config", s.setClusterConfigHttpHandler).Methods("PUT")
  308. router.HandleFunc("/v2/admin/machines", s.getMachinesHttpHandler).Methods("GET")
  309. router.HandleFunc("/v2/admin/machines/{name}", s.getMachineHttpHandler).Methods("GET")
  310. return router
  311. }
  312. // Retrieves the underlying Raft server.
  313. func (s *PeerServer) RaftServer() raft.Server {
  314. return s.raftServer
  315. }
  316. // Associates the client server with the peer server.
  317. func (s *PeerServer) SetServer(server *Server) {
  318. s.server = server
  319. }
  320. func (s *PeerServer) startAsLeader() {
  321. s.raftServer.Start()
  322. // leader need to join self as a peer
  323. for {
  324. c := &JoinCommand{
  325. MinVersion: store.MinVersion(),
  326. MaxVersion: store.MaxVersion(),
  327. Name: s.raftServer.Name(),
  328. RaftURL: s.Config.URL,
  329. EtcdURL: s.server.URL(),
  330. }
  331. if _, err := s.raftServer.Do(c); err == nil {
  332. break
  333. }
  334. }
  335. log.Debugf("%s start as a leader", s.Config.Name)
  336. }
  337. func (s *PeerServer) startAsFollower(cluster []string, retryTimes int) error {
  338. // start as a follower in a existing cluster
  339. for i := 0; ; i++ {
  340. ok := s.joinCluster(cluster)
  341. if ok {
  342. break
  343. }
  344. if i == retryTimes-1 {
  345. return fmt.Errorf("Cannot join the cluster via given peers after %x retries", s.Config.RetryTimes)
  346. }
  347. log.Warnf("%v is unable to join the cluster using any of the peers %v at %dth time. Retrying in %.1f seconds", s.Config.Name, cluster, i, s.Config.RetryInterval)
  348. time.Sleep(time.Second * time.Duration(s.Config.RetryInterval))
  349. }
  350. s.raftServer.Start()
  351. return nil
  352. }
  353. // getVersion fetches the peer version of a cluster.
  354. func getVersion(t *transporter, versionURL url.URL) (int, error) {
  355. resp, _, err := t.Get(versionURL.String())
  356. if err != nil {
  357. return 0, err
  358. }
  359. defer resp.Body.Close()
  360. body, err := ioutil.ReadAll(resp.Body)
  361. if err != nil {
  362. return 0, err
  363. }
  364. // Parse version number.
  365. version, _ := strconv.Atoi(string(body))
  366. return version, nil
  367. }
  368. // Upgradable checks whether all peers in a cluster support an upgrade to the next store version.
  369. func (s *PeerServer) Upgradable() error {
  370. nextVersion := s.store.Version() + 1
  371. for _, peerURL := range s.registry.PeerURLs(s.raftServer.Leader(), s.Config.Name) {
  372. u, err := url.Parse(peerURL)
  373. if err != nil {
  374. return fmt.Errorf("PeerServer: Cannot parse URL: '%s' (%s)", peerURL, err)
  375. }
  376. t, _ := s.raftServer.Transporter().(*transporter)
  377. checkURL := (&url.URL{Host: u.Host, Scheme: s.Config.Scheme, Path: fmt.Sprintf("/version/%d/check", nextVersion)}).String()
  378. resp, _, err := t.Get(checkURL)
  379. if err != nil {
  380. return fmt.Errorf("PeerServer: Cannot check version compatibility: %s", u.Host)
  381. }
  382. if resp.StatusCode != 200 {
  383. return fmt.Errorf("PeerServer: Version %d is not compatible with peer: %s", nextVersion, u.Host)
  384. }
  385. }
  386. return nil
  387. }
  388. // checkPeerAddressNonconflict checks whether the peer address has existed with different name.
  389. func (s *PeerServer) checkPeerAddressNonconflict() bool {
  390. // there exists the (name, peer address) pair
  391. if peerURL, ok := s.registry.PeerURL(s.Config.Name); ok {
  392. if peerURL == s.Config.URL {
  393. return true
  394. }
  395. }
  396. // check all existing peer addresses
  397. peerURLs := s.registry.PeerURLs(s.raftServer.Leader(), s.Config.Name)
  398. for _, peerURL := range peerURLs {
  399. if peerURL == s.Config.URL {
  400. return false
  401. }
  402. }
  403. return true
  404. }
  405. // Helper function to do discovery and return results in expected format
  406. func (s *PeerServer) handleDiscovery(discoverURL string) (peers []string, err error) {
  407. peers, err = discovery.Do(discoverURL, s.Config.Name, s.Config.URL, s.closeChan, s.startRoutine)
  408. // Warn about errors coming from discovery, this isn't fatal
  409. // since the user might have provided a peer list elsewhere,
  410. // or there is some log in data dir.
  411. if err != nil {
  412. log.Warnf("Discovery encountered an error: %v", err)
  413. return
  414. }
  415. for i := range peers {
  416. // Strip the scheme off of the peer if it has one
  417. // TODO(bp): clean this up!
  418. purl, err := url.Parse(peers[i])
  419. if err == nil {
  420. peers[i] = purl.Host
  421. }
  422. }
  423. log.Infof("Discovery fetched back peer list: %v", peers)
  424. return
  425. }
  426. // getKnownPeers gets the previous peers from log
  427. func (s *PeerServer) getKnownPeers() []string {
  428. peers := s.registry.PeerURLs(s.raftServer.Leader(), s.Config.Name)
  429. log.Infof("Peer URLs in log: %s / %s (%s)", s.raftServer.Leader(), s.Config.Name, strings.Join(peers, ","))
  430. for i := range peers {
  431. u, err := url.Parse(peers[i])
  432. if err != nil {
  433. log.Debug("getPrevPeers cannot parse url %v", peers[i])
  434. }
  435. peers[i] = u.Host
  436. }
  437. return peers
  438. }
  439. // removeSelfFromList removes url of the peerServer from the peer list
  440. func (s *PeerServer) removeSelfFromList(peers []string) []string {
  441. // Remove its own peer address from the peer list to join
  442. u, err := url.Parse(s.Config.URL)
  443. if err != nil {
  444. log.Fatalf("removeSelfFromList cannot parse peer address %v", s.Config.URL)
  445. }
  446. newPeers := make([]string, 0)
  447. for _, v := range peers {
  448. if v != u.Host {
  449. newPeers = append(newPeers, v)
  450. }
  451. }
  452. return newPeers
  453. }
  454. func (s *PeerServer) joinCluster(cluster []string) bool {
  455. for _, peer := range cluster {
  456. if len(peer) == 0 {
  457. continue
  458. }
  459. err := s.joinByPeer(s.raftServer, peer, s.Config.Scheme)
  460. if err == nil {
  461. log.Debugf("%s joined the cluster via peer %s", s.Config.Name, peer)
  462. return true
  463. }
  464. if _, ok := err.(etcdErr.Error); ok {
  465. log.Fatal(err)
  466. }
  467. log.Warnf("Attempt to join via %s failed: %s", peer, err)
  468. }
  469. return false
  470. }
  471. // Send join requests to peer.
  472. func (s *PeerServer) joinByPeer(server raft.Server, peer string, scheme string) error {
  473. // t must be ok
  474. t, _ := server.Transporter().(*transporter)
  475. // Our version must match the leaders version
  476. versionURL := url.URL{Host: peer, Scheme: scheme, Path: "/version"}
  477. version, err := getVersion(t, versionURL)
  478. if err != nil {
  479. return fmt.Errorf("Error during join version check: %v", err)
  480. }
  481. if version < store.MinVersion() || version > store.MaxVersion() {
  482. return fmt.Errorf("Unable to join: cluster version is %d; version compatibility is %d - %d", version, store.MinVersion(), store.MaxVersion())
  483. }
  484. var b bytes.Buffer
  485. c := &JoinCommand{
  486. MinVersion: store.MinVersion(),
  487. MaxVersion: store.MaxVersion(),
  488. Name: server.Name(),
  489. RaftURL: s.Config.URL,
  490. EtcdURL: s.server.URL(),
  491. }
  492. json.NewEncoder(&b).Encode(c)
  493. joinURL := url.URL{Host: peer, Scheme: scheme, Path: "/join"}
  494. log.Infof("Send Join Request to %s", joinURL.String())
  495. req, _ := http.NewRequest("PUT", joinURL.String(), &b)
  496. resp, err := t.client.Do(req)
  497. for {
  498. if err != nil {
  499. return fmt.Errorf("Unable to join: %v", err)
  500. }
  501. if resp != nil {
  502. defer resp.Body.Close()
  503. log.Infof("»»»» %d", resp.StatusCode)
  504. if resp.StatusCode == http.StatusOK {
  505. b, _ := ioutil.ReadAll(resp.Body)
  506. s.joinIndex, _ = binary.Uvarint(b)
  507. return nil
  508. }
  509. if resp.StatusCode == http.StatusTemporaryRedirect {
  510. address := resp.Header.Get("Location")
  511. log.Debugf("Send Join Request to %s", address)
  512. c := &JoinCommand{
  513. MinVersion: store.MinVersion(),
  514. MaxVersion: store.MaxVersion(),
  515. Name: server.Name(),
  516. RaftURL: s.Config.URL,
  517. EtcdURL: s.server.URL(),
  518. }
  519. json.NewEncoder(&b).Encode(c)
  520. resp, _, err = t.Put(address, &b)
  521. } else if resp.StatusCode == http.StatusBadRequest {
  522. log.Debug("Reach max number peers in the cluster")
  523. decoder := json.NewDecoder(resp.Body)
  524. err := &etcdErr.Error{}
  525. decoder.Decode(err)
  526. return *err
  527. } else {
  528. return fmt.Errorf("Unable to join")
  529. }
  530. }
  531. }
  532. }
  533. func (s *PeerServer) Stats() []byte {
  534. s.serverStats.LeaderInfo.Uptime = time.Now().Sub(s.serverStats.LeaderInfo.startTime).String()
  535. // TODO: register state listener to raft to change this field
  536. // rather than compare the state each time Stats() is called.
  537. if s.RaftServer().State() == raft.Leader {
  538. s.serverStats.LeaderInfo.Name = s.RaftServer().Name()
  539. }
  540. queue := s.serverStats.sendRateQueue
  541. s.serverStats.SendingPkgRate, s.serverStats.SendingBandwidthRate = queue.Rate()
  542. queue = s.serverStats.recvRateQueue
  543. s.serverStats.RecvingPkgRate, s.serverStats.RecvingBandwidthRate = queue.Rate()
  544. b, _ := json.Marshal(s.serverStats)
  545. return b
  546. }
  547. func (s *PeerServer) PeerStats() []byte {
  548. if s.raftServer.State() == raft.Leader {
  549. b, _ := json.Marshal(s.followersStats)
  550. return b
  551. }
  552. return nil
  553. }
  554. // raftEventLogger converts events from the Raft server into log messages.
  555. func (s *PeerServer) raftEventLogger(event raft.Event) {
  556. value := event.Value()
  557. prevValue := event.PrevValue()
  558. if value == nil {
  559. value = "<nil>"
  560. }
  561. if prevValue == nil {
  562. prevValue = "<nil>"
  563. }
  564. switch event.Type() {
  565. case raft.StateChangeEventType:
  566. log.Infof("%s: state changed from '%v' to '%v'.", s.Config.Name, prevValue, value)
  567. case raft.TermChangeEventType:
  568. log.Infof("%s: term #%v started.", s.Config.Name, value)
  569. case raft.LeaderChangeEventType:
  570. log.Infof("%s: leader changed from '%v' to '%v'.", s.Config.Name, prevValue, value)
  571. case raft.AddPeerEventType:
  572. log.Infof("%s: peer added: '%v'", s.Config.Name, value)
  573. case raft.RemovePeerEventType:
  574. log.Infof("%s: peer removed: '%v'", s.Config.Name, value)
  575. case raft.HeartbeatIntervalEventType:
  576. var name = "<unknown>"
  577. if peer, ok := value.(*raft.Peer); ok {
  578. name = peer.Name
  579. }
  580. log.Infof("%s: warning: heartbeat timed out: '%v'", s.Config.Name, name)
  581. case raft.ElectionTimeoutThresholdEventType:
  582. select {
  583. case s.timeoutThresholdChan <- value:
  584. default:
  585. }
  586. }
  587. }
  588. func (s *PeerServer) recordMetricEvent(event raft.Event) {
  589. name := fmt.Sprintf("raft.event.%s", event.Type())
  590. value := event.Value().(time.Duration)
  591. (*s.metrics).Timer(name).Update(value)
  592. }
  593. // logSnapshot logs about the snapshot that was taken.
  594. func (s *PeerServer) logSnapshot(err error, currentIndex, count uint64) {
  595. info := fmt.Sprintf("%s: snapshot of %d events at index %d", s.Config.Name, count, currentIndex)
  596. if err != nil {
  597. log.Infof("%s attempted and failed: %v", info, err)
  598. } else {
  599. log.Infof("%s completed", info)
  600. }
  601. }
  602. func (s *PeerServer) startRoutine(f func()) {
  603. s.routineGroup.Add(1)
  604. go func() {
  605. defer s.routineGroup.Done()
  606. f()
  607. }()
  608. }
  609. func (s *PeerServer) monitorSnapshot() {
  610. for {
  611. timer := time.NewTimer(s.snapConf.checkingInterval)
  612. defer timer.Stop()
  613. select {
  614. case <-s.closeChan:
  615. return
  616. case <-timer.C:
  617. }
  618. currentIndex := s.RaftServer().CommitIndex()
  619. count := currentIndex - s.snapConf.lastIndex
  620. if uint64(count) > s.snapConf.snapshotThr {
  621. err := s.raftServer.TakeSnapshot()
  622. s.logSnapshot(err, currentIndex, count)
  623. s.snapConf.lastIndex = currentIndex
  624. }
  625. }
  626. }
  627. func (s *PeerServer) monitorSync() {
  628. ticker := time.NewTicker(time.Millisecond * 500)
  629. defer ticker.Stop()
  630. for {
  631. select {
  632. case <-s.closeChan:
  633. return
  634. case now := <-ticker.C:
  635. if s.raftServer.State() == raft.Leader {
  636. s.raftServer.Do(s.store.CommandFactory().CreateSyncCommand(now))
  637. }
  638. }
  639. }
  640. }
  641. // monitorTimeoutThreshold groups timeout threshold events together and prints
  642. // them as a single log line.
  643. func (s *PeerServer) monitorTimeoutThreshold() {
  644. for {
  645. select {
  646. case <-s.closeChan:
  647. return
  648. case value := <-s.timeoutThresholdChan:
  649. log.Infof("%s: warning: heartbeat near election timeout: %v", s.Config.Name, value)
  650. }
  651. timer := time.NewTimer(ThresholdMonitorTimeout)
  652. defer timer.Stop()
  653. select {
  654. case <-s.closeChan:
  655. return
  656. case <-timer.C:
  657. }
  658. }
  659. }
  660. // monitorActiveSize has the leader periodically check the status of cluster
  661. // nodes and swaps them out for standbys as needed.
  662. func (s *PeerServer) monitorActiveSize() {
  663. for {
  664. timer := time.NewTimer(ActiveMonitorTimeout)
  665. defer timer.Stop()
  666. select {
  667. case <-s.closeChan:
  668. return
  669. case <-timer.C:
  670. }
  671. // Ignore while this peer is not a leader.
  672. if s.raftServer.State() != raft.Leader {
  673. continue
  674. }
  675. // Retrieve target active size and actual active size.
  676. activeSize := s.ClusterConfig().ActiveSize
  677. peerCount := s.registry.Count()
  678. peers := s.registry.Names()
  679. if index := sort.SearchStrings(peers, s.Config.Name); index < len(peers) && peers[index] == s.Config.Name {
  680. peers = append(peers[:index], peers[index+1:]...)
  681. }
  682. // If we have more active nodes than we should then remove.
  683. if peerCount > activeSize {
  684. peer := peers[rand.Intn(len(peers))]
  685. log.Infof("%s: removing: %v", s.Config.Name, peer)
  686. if _, err := s.raftServer.Do(&RemoveCommand{Name: peer}); err != nil {
  687. log.Infof("%s: warning: remove error: %v", s.Config.Name, err)
  688. }
  689. continue
  690. }
  691. }
  692. }
  693. // monitorPeerActivity has the leader periodically for dead nodes and demotes them.
  694. func (s *PeerServer) monitorPeerActivity() {
  695. for {
  696. timer := time.NewTimer(PeerActivityMonitorTimeout)
  697. defer timer.Stop()
  698. select {
  699. case <-s.closeChan:
  700. return
  701. case <-timer.C:
  702. }
  703. // Ignore while this peer is not a leader.
  704. if s.raftServer.State() != raft.Leader {
  705. continue
  706. }
  707. // Check last activity for all peers.
  708. now := time.Now()
  709. promoteDelay := time.Duration(s.ClusterConfig().PromoteDelay) * time.Second
  710. peers := s.raftServer.Peers()
  711. for _, peer := range peers {
  712. // If the last response from the peer is longer than the promote delay
  713. // then automatically demote the peer.
  714. if !peer.LastActivity().IsZero() && now.Sub(peer.LastActivity()) > promoteDelay {
  715. log.Infof("%s: removing node: %v; last activity %v ago", s.Config.Name, peer.Name, now.Sub(peer.LastActivity()))
  716. if _, err := s.raftServer.Do(&RemoveCommand{Name: peer.Name}); err != nil {
  717. log.Infof("%s: warning: autodemotion error: %v", s.Config.Name, err)
  718. }
  719. continue
  720. }
  721. }
  722. }
  723. }