peer_server.go 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526
  1. package server
  2. import (
  3. "bytes"
  4. "crypto/tls"
  5. "encoding/binary"
  6. "encoding/json"
  7. "fmt"
  8. "io/ioutil"
  9. "net"
  10. "net/http"
  11. "net/url"
  12. "strconv"
  13. "time"
  14. etcdErr "github.com/coreos/etcd/error"
  15. "github.com/coreos/etcd/log"
  16. "github.com/coreos/etcd/store"
  17. "github.com/coreos/raft"
  18. "github.com/gorilla/mux"
  19. )
  20. const retryInterval = 10
  21. const ThresholdMonitorTimeout = 5 * time.Second
  22. type PeerServer struct {
  23. raftServer raft.Server
  24. server *Server
  25. httpServer *http.Server
  26. listener net.Listener
  27. joinIndex uint64
  28. name string
  29. url string
  30. bindAddr string
  31. tlsConf *TLSConfig
  32. tlsInfo *TLSInfo
  33. followersStats *raftFollowersStats
  34. serverStats *raftServerStats
  35. registry *Registry
  36. store store.Store
  37. snapConf *snapshotConf
  38. MaxClusterSize int
  39. RetryTimes int
  40. HeartbeatTimeout time.Duration
  41. ElectionTimeout time.Duration
  42. closeChan chan bool
  43. timeoutThresholdChan chan interface{}
  44. }
  45. // TODO: find a good policy to do snapshot
  46. type snapshotConf struct {
  47. // Etcd will check if snapshot is need every checkingInterval
  48. checkingInterval time.Duration
  49. // The number of writes when the last snapshot happened
  50. lastWrites uint64
  51. // If the incremental number of writes since the last snapshot
  52. // exceeds the write Threshold, etcd will do a snapshot
  53. writesThr uint64
  54. }
  55. func NewPeerServer(name string, path string, url string, bindAddr string, tlsConf *TLSConfig, tlsInfo *TLSInfo, registry *Registry, store store.Store, snapshotCount int) *PeerServer {
  56. s := &PeerServer{
  57. name: name,
  58. url: url,
  59. bindAddr: bindAddr,
  60. tlsConf: tlsConf,
  61. tlsInfo: tlsInfo,
  62. registry: registry,
  63. store: store,
  64. snapConf: &snapshotConf{time.Second * 3, 0, uint64(snapshotCount)},
  65. followersStats: &raftFollowersStats{
  66. Leader: name,
  67. Followers: make(map[string]*raftFollowerStats),
  68. },
  69. serverStats: &raftServerStats{
  70. Name: name,
  71. StartTime: time.Now(),
  72. sendRateQueue: &statsQueue{
  73. back: -1,
  74. },
  75. recvRateQueue: &statsQueue{
  76. back: -1,
  77. },
  78. },
  79. HeartbeatTimeout: defaultHeartbeatTimeout,
  80. ElectionTimeout: defaultElectionTimeout,
  81. timeoutThresholdChan: make(chan interface{}, 1),
  82. }
  83. // Create transporter for raft
  84. raftTransporter := newTransporter(tlsConf.Scheme, tlsConf.Client, s)
  85. // Create raft server
  86. raftServer, err := raft.NewServer(name, path, raftTransporter, s.store, s, "")
  87. if err != nil {
  88. log.Fatal(err)
  89. }
  90. s.raftServer = raftServer
  91. s.raftServer.AddEventListener(raft.StateChangeEventType, s.raftEventLogger)
  92. s.raftServer.AddEventListener(raft.LeaderChangeEventType, s.raftEventLogger)
  93. s.raftServer.AddEventListener(raft.TermChangeEventType, s.raftEventLogger)
  94. s.raftServer.AddEventListener(raft.AddPeerEventType, s.raftEventLogger)
  95. s.raftServer.AddEventListener(raft.RemovePeerEventType, s.raftEventLogger)
  96. s.raftServer.AddEventListener(raft.HeartbeatTimeoutEventType, s.raftEventLogger)
  97. s.raftServer.AddEventListener(raft.ElectionTimeoutThresholdEventType, s.raftEventLogger)
  98. return s
  99. }
  100. // Start the raft server
  101. func (s *PeerServer) ListenAndServe(snapshot bool, cluster []string) error {
  102. // LoadSnapshot
  103. if snapshot {
  104. err := s.raftServer.LoadSnapshot()
  105. if err == nil {
  106. log.Debugf("%s finished load snapshot", s.name)
  107. } else {
  108. log.Debug(err)
  109. }
  110. }
  111. s.raftServer.SetElectionTimeout(s.ElectionTimeout)
  112. s.raftServer.SetHeartbeatTimeout(s.HeartbeatTimeout)
  113. s.raftServer.Start()
  114. if s.raftServer.IsLogEmpty() {
  115. // start as a leader in a new cluster
  116. if len(cluster) == 0 {
  117. s.startAsLeader()
  118. } else {
  119. s.startAsFollower(cluster)
  120. }
  121. } else {
  122. // Rejoin the previous cluster
  123. cluster = s.registry.PeerURLs(s.raftServer.Leader(), s.name)
  124. for i := 0; i < len(cluster); i++ {
  125. u, err := url.Parse(cluster[i])
  126. if err != nil {
  127. log.Debug("rejoin cannot parse url: ", err)
  128. }
  129. cluster[i] = u.Host
  130. }
  131. ok := s.joinCluster(cluster)
  132. if !ok {
  133. log.Warn("the entire cluster is down! this peer will restart the cluster.")
  134. }
  135. log.Debugf("%s restart as a follower", s.name)
  136. }
  137. s.closeChan = make(chan bool)
  138. go s.monitorSync()
  139. go s.monitorTimeoutThreshold(s.closeChan)
  140. // open the snapshot
  141. if snapshot {
  142. go s.monitorSnapshot()
  143. }
  144. // start to response to raft requests
  145. return s.startTransport(s.tlsConf.Scheme, s.tlsConf.Server)
  146. }
  147. // Overridden version of net/http added so we can manage the listener.
  148. func (s *PeerServer) listenAndServe() error {
  149. addr := s.httpServer.Addr
  150. if addr == "" {
  151. addr = ":http"
  152. }
  153. l, e := net.Listen("tcp", addr)
  154. if e != nil {
  155. return e
  156. }
  157. s.listener = l
  158. return s.httpServer.Serve(l)
  159. }
  160. // Overridden version of net/http added so we can manage the listener.
  161. func (s *PeerServer) listenAndServeTLS(certFile, keyFile string) error {
  162. addr := s.httpServer.Addr
  163. if addr == "" {
  164. addr = ":https"
  165. }
  166. config := &tls.Config{}
  167. if s.httpServer.TLSConfig != nil {
  168. *config = *s.httpServer.TLSConfig
  169. }
  170. if config.NextProtos == nil {
  171. config.NextProtos = []string{"http/1.1"}
  172. }
  173. var err error
  174. config.Certificates = make([]tls.Certificate, 1)
  175. config.Certificates[0], err = tls.LoadX509KeyPair(certFile, keyFile)
  176. if err != nil {
  177. return err
  178. }
  179. conn, err := net.Listen("tcp", addr)
  180. if err != nil {
  181. return err
  182. }
  183. tlsListener := tls.NewListener(conn, config)
  184. s.listener = tlsListener
  185. return s.httpServer.Serve(tlsListener)
  186. }
  187. // Stops the server.
  188. func (s *PeerServer) Close() {
  189. if s.closeChan != nil {
  190. close(s.closeChan)
  191. s.closeChan = nil
  192. }
  193. if s.listener != nil {
  194. s.listener.Close()
  195. s.listener = nil
  196. }
  197. }
  198. // Retrieves the underlying Raft server.
  199. func (s *PeerServer) RaftServer() raft.Server {
  200. return s.raftServer
  201. }
  202. // Associates the client server with the peer server.
  203. func (s *PeerServer) SetServer(server *Server) {
  204. s.server = server
  205. }
  206. func (s *PeerServer) startAsLeader() {
  207. // leader need to join self as a peer
  208. for {
  209. _, err := s.raftServer.Do(NewJoinCommand(store.MinVersion(), store.MaxVersion(), s.raftServer.Name(), s.url, s.server.URL()))
  210. if err == nil {
  211. break
  212. }
  213. }
  214. log.Debugf("%s start as a leader", s.name)
  215. }
  216. func (s *PeerServer) startAsFollower(cluster []string) {
  217. // start as a follower in a existing cluster
  218. for i := 0; i < s.RetryTimes; i++ {
  219. ok := s.joinCluster(cluster)
  220. if ok {
  221. return
  222. }
  223. log.Warnf("cannot join to cluster via given peers, retry in %d seconds", retryInterval)
  224. time.Sleep(time.Second * retryInterval)
  225. }
  226. log.Fatalf("Cannot join the cluster via given peers after %x retries", s.RetryTimes)
  227. }
  228. // Start to listen and response raft command
  229. func (s *PeerServer) startTransport(scheme string, tlsConf tls.Config) error {
  230. log.Infof("raft server [name %s, listen on %s, advertised url %s]", s.name, s.bindAddr, s.url)
  231. router := mux.NewRouter()
  232. s.httpServer = &http.Server{
  233. Handler: router,
  234. TLSConfig: &tlsConf,
  235. Addr: s.bindAddr,
  236. }
  237. // internal commands
  238. router.HandleFunc("/name", s.NameHttpHandler)
  239. router.HandleFunc("/version", s.VersionHttpHandler)
  240. router.HandleFunc("/version/{version:[0-9]+}/check", s.VersionCheckHttpHandler)
  241. router.HandleFunc("/upgrade", s.UpgradeHttpHandler)
  242. router.HandleFunc("/join", s.JoinHttpHandler)
  243. router.HandleFunc("/remove/{name:.+}", s.RemoveHttpHandler)
  244. router.HandleFunc("/vote", s.VoteHttpHandler)
  245. router.HandleFunc("/log", s.GetLogHttpHandler)
  246. router.HandleFunc("/log/append", s.AppendEntriesHttpHandler)
  247. router.HandleFunc("/snapshot", s.SnapshotHttpHandler)
  248. router.HandleFunc("/snapshotRecovery", s.SnapshotRecoveryHttpHandler)
  249. router.HandleFunc("/etcdURL", s.EtcdURLHttpHandler)
  250. if scheme == "http" {
  251. return s.listenAndServe()
  252. } else {
  253. return s.listenAndServeTLS(s.tlsInfo.CertFile, s.tlsInfo.KeyFile)
  254. }
  255. }
  256. // getVersion fetches the peer version of a cluster.
  257. func getVersion(t *transporter, versionURL url.URL) (int, error) {
  258. resp, req, err := t.Get(versionURL.String())
  259. if err != nil {
  260. return 0, err
  261. }
  262. defer resp.Body.Close()
  263. t.CancelWhenTimeout(req)
  264. body, err := ioutil.ReadAll(resp.Body)
  265. if err != nil {
  266. return 0, err
  267. }
  268. // Parse version number.
  269. version, _ := strconv.Atoi(string(body))
  270. return version, nil
  271. }
  272. // Upgradable checks whether all peers in a cluster support an upgrade to the next store version.
  273. func (s *PeerServer) Upgradable() error {
  274. nextVersion := s.store.Version() + 1
  275. for _, peerURL := range s.registry.PeerURLs(s.raftServer.Leader(), s.name) {
  276. u, err := url.Parse(peerURL)
  277. if err != nil {
  278. return fmt.Errorf("PeerServer: Cannot parse URL: '%s' (%s)", peerURL, err)
  279. }
  280. t, _ := s.raftServer.Transporter().(*transporter)
  281. checkURL := (&url.URL{Host: u.Host, Scheme: s.tlsConf.Scheme, Path: fmt.Sprintf("/version/%d/check", nextVersion)}).String()
  282. resp, _, err := t.Get(checkURL)
  283. if err != nil {
  284. return fmt.Errorf("PeerServer: Cannot check version compatibility: %s", u.Host)
  285. }
  286. if resp.StatusCode != 200 {
  287. return fmt.Errorf("PeerServer: Version %d is not compatible with peer: %s", nextVersion, u.Host)
  288. }
  289. }
  290. return nil
  291. }
  292. func (s *PeerServer) joinCluster(cluster []string) bool {
  293. for _, peer := range cluster {
  294. if len(peer) == 0 {
  295. continue
  296. }
  297. err := s.joinByPeer(s.raftServer, peer, s.tlsConf.Scheme)
  298. if err == nil {
  299. log.Debugf("%s success join to the cluster via peer %s", s.name, peer)
  300. return true
  301. } else {
  302. if _, ok := err.(etcdErr.Error); ok {
  303. log.Fatal(err)
  304. }
  305. log.Debugf("cannot join to cluster via peer %s %s", peer, err)
  306. }
  307. }
  308. return false
  309. }
  310. // Send join requests to peer.
  311. func (s *PeerServer) joinByPeer(server raft.Server, peer string, scheme string) error {
  312. var b bytes.Buffer
  313. // t must be ok
  314. t, _ := server.Transporter().(*transporter)
  315. // Our version must match the leaders version
  316. versionURL := url.URL{Host: peer, Scheme: scheme, Path: "/version"}
  317. version, err := getVersion(t, versionURL)
  318. if err != nil {
  319. return fmt.Errorf("Error during join version check: %v", err)
  320. }
  321. if version < store.MinVersion() || version > store.MaxVersion() {
  322. return fmt.Errorf("Unable to join: cluster version is %d; version compatibility is %d - %d", version, store.MinVersion(), store.MaxVersion())
  323. }
  324. json.NewEncoder(&b).Encode(NewJoinCommand(store.MinVersion(), store.MaxVersion(), server.Name(), s.url, s.server.URL()))
  325. joinURL := url.URL{Host: peer, Scheme: scheme, Path: "/join"}
  326. log.Debugf("Send Join Request to %s", joinURL.String())
  327. resp, req, err := t.Post(joinURL.String(), &b)
  328. for {
  329. if err != nil {
  330. return fmt.Errorf("Unable to join: %v", err)
  331. }
  332. if resp != nil {
  333. defer resp.Body.Close()
  334. t.CancelWhenTimeout(req)
  335. if resp.StatusCode == http.StatusOK {
  336. b, _ := ioutil.ReadAll(resp.Body)
  337. s.joinIndex, _ = binary.Uvarint(b)
  338. return nil
  339. }
  340. if resp.StatusCode == http.StatusTemporaryRedirect {
  341. address := resp.Header.Get("Location")
  342. log.Debugf("Send Join Request to %s", address)
  343. json.NewEncoder(&b).Encode(NewJoinCommand(store.MinVersion(), store.MaxVersion(), server.Name(), s.url, s.server.URL()))
  344. resp, req, err = t.Post(address, &b)
  345. } else if resp.StatusCode == http.StatusBadRequest {
  346. log.Debug("Reach max number peers in the cluster")
  347. decoder := json.NewDecoder(resp.Body)
  348. err := &etcdErr.Error{}
  349. decoder.Decode(err)
  350. return *err
  351. } else {
  352. return fmt.Errorf("Unable to join")
  353. }
  354. }
  355. }
  356. }
  357. func (s *PeerServer) Stats() []byte {
  358. s.serverStats.LeaderInfo.Uptime = time.Now().Sub(s.serverStats.LeaderInfo.startTime).String()
  359. // TODO: register state listener to raft to change this field
  360. // rather than compare the state each time Stats() is called.
  361. if s.RaftServer().State() == raft.Leader {
  362. s.serverStats.LeaderInfo.Name = s.RaftServer().Name()
  363. }
  364. queue := s.serverStats.sendRateQueue
  365. s.serverStats.SendingPkgRate, s.serverStats.SendingBandwidthRate = queue.Rate()
  366. queue = s.serverStats.recvRateQueue
  367. s.serverStats.RecvingPkgRate, s.serverStats.RecvingBandwidthRate = queue.Rate()
  368. b, _ := json.Marshal(s.serverStats)
  369. return b
  370. }
  371. func (s *PeerServer) PeerStats() []byte {
  372. if s.raftServer.State() == raft.Leader {
  373. b, _ := json.Marshal(s.followersStats)
  374. return b
  375. }
  376. return nil
  377. }
  378. // raftEventLogger converts events from the Raft server into log messages.
  379. func (s *PeerServer) raftEventLogger(event raft.Event) {
  380. value := event.Value()
  381. prevValue := event.PrevValue()
  382. if value == nil {
  383. value = "<nil>"
  384. }
  385. if prevValue == nil {
  386. prevValue = "<nil>"
  387. }
  388. switch event.Type() {
  389. case raft.StateChangeEventType:
  390. log.Infof("%s: state changed from '%v' to '%v'.", s.name, prevValue, value)
  391. case raft.TermChangeEventType:
  392. log.Infof("%s: term #%v started.", s.name, value)
  393. case raft.LeaderChangeEventType:
  394. log.Infof("%s: leader changed from '%v' to '%v'.", s.name, prevValue, value)
  395. case raft.AddPeerEventType:
  396. log.Infof("%s: peer added: '%v'", s.name, value)
  397. case raft.RemovePeerEventType:
  398. log.Infof("%s: peer removed: '%v'", s.name, value)
  399. case raft.HeartbeatTimeoutEventType:
  400. var name = "<unknown>"
  401. if peer, ok := value.(*raft.Peer); ok {
  402. name = peer.Name
  403. }
  404. log.Infof("%s: warning: heartbeat timed out: '%v'", s.name, name)
  405. case raft.ElectionTimeoutThresholdEventType:
  406. select {
  407. case s.timeoutThresholdChan <- value:
  408. default:
  409. }
  410. }
  411. }
  412. func (s *PeerServer) monitorSnapshot() {
  413. for {
  414. time.Sleep(s.snapConf.checkingInterval)
  415. currentWrites := s.store.TotalTransactions() - s.snapConf.lastWrites
  416. if uint64(currentWrites) > s.snapConf.writesThr {
  417. s.raftServer.TakeSnapshot()
  418. s.snapConf.lastWrites = s.store.TotalTransactions()
  419. }
  420. }
  421. }
  422. func (s *PeerServer) monitorSync() {
  423. ticker := time.Tick(time.Millisecond * 500)
  424. for {
  425. select {
  426. case now := <-ticker:
  427. if s.raftServer.State() == raft.Leader {
  428. s.raftServer.Do(s.store.CommandFactory().CreateSyncCommand(now))
  429. }
  430. }
  431. }
  432. }
  433. // monitorTimeoutThreshold groups timeout threshold events together and prints
  434. // them as a single log line.
  435. func (s *PeerServer) monitorTimeoutThreshold(closeChan chan bool) {
  436. for {
  437. select {
  438. case value := <-s.timeoutThresholdChan:
  439. log.Infof("%s: warning: heartbeat near election timeout: %v", s.name, value)
  440. case <-closeChan:
  441. return
  442. }
  443. time.Sleep(ThresholdMonitorTimeout)
  444. }
  445. }