ClickHouse/src/Interpreters/ClusterDiscovery.cpp

570 lines
18 KiB
C++
Raw Normal View History

#include <algorithm>
#include <atomic>
#include <chrono>
#include <condition_variable>
#include <mutex>
#include <unordered_map>
#include <unordered_set>
2021-11-15 14:52:52 +00:00
#include <base/getFQDNOrHostName.h>
#include <Common/Config/ConfigHelper.h>
#include <Common/Exception.h>
#include <Common/FailPoint.h>
#include <Common/logger_useful.h>
#include <Common/setThreadName.h>
2021-11-11 09:03:53 +00:00
#include <Common/StringUtils/StringUtils.h>
#include <Common/thread_local_rng.h>
2021-11-11 09:03:53 +00:00
#include <Common/ZooKeeper/Types.h>
2021-11-15 14:52:52 +00:00
2021-11-11 09:03:53 +00:00
#include <Core/ServerUUID.h>
#include <Interpreters/Cluster.h>
#include <Interpreters/ClusterDiscovery.h>
#include <Interpreters/Context.h>
#include <Poco/Exception.h>
#include <Poco/JSON/JSON.h>
#include <Poco/JSON/Object.h>
#include <Poco/JSON/Parser.h>
2021-11-11 09:03:53 +00:00
namespace DB
{
namespace ErrorCodes
2021-11-15 14:52:52 +00:00
{
extern const int KEEPER_EXCEPTION;
extern const int LOGICAL_ERROR;
}
2021-11-15 14:52:52 +00:00
namespace FailPoints
{
extern const char cluster_discovery_faults[];
}
namespace
{
2021-11-15 14:52:52 +00:00
2021-11-16 13:39:54 +00:00
fs::path getShardsListPath(const String & zk_root)
2021-11-15 14:52:52 +00:00
{
2021-11-16 13:39:54 +00:00
return fs::path(zk_root + "/shards");
2021-11-15 14:52:52 +00:00
}
}
/*
* Holds boolean flags for fixed set of keys.
* Flags can be concurrently set from different threads, and consumer can wait for it.
*/
template <typename T>
class ClusterDiscovery::ConcurrentFlags
{
public:
template <typename It>
ConcurrentFlags(It begin, It end)
{
for (auto it = begin; it != end; ++it)
flags.emplace(*it, false);
}
2021-11-18 08:57:26 +00:00
void set(const T & key)
{
auto it = flags.find(key);
if (it == flags.end())
throw DB::Exception(ErrorCodes::LOGICAL_ERROR, "Unknown value '{}'", key);
it->second = true;
any_need_update = true;
cv.notify_one();
}
/// waits unit at least one flag is set
/// caller should handle all set flags (or set it again manually)
/// note: keys of returen map should not be changed!
/// @param finished - output parameter indicates that stop() was called
std::unordered_map<T, std::atomic_bool> & wait(std::chrono::milliseconds timeout, bool & finished)
{
std::unique_lock<std::mutex> lk(mu);
cv.wait_for(lk, timeout, [this]() -> bool { return any_need_update || stop_flag; });
finished = stop_flag;
/// all set flags expected to be handled by caller
any_need_update = false;
return flags;
}
void stop()
{
std::unique_lock<std::mutex> lk(mu);
stop_flag = true;
cv.notify_one();
}
2021-11-18 08:57:26 +00:00
private:
std::condition_variable cv;
std::mutex mu;
/// flag indicates that update is required
std::unordered_map<T, std::atomic_bool> flags;
std::atomic_bool any_need_update = true;
bool stop_flag = false;
};
2021-11-11 09:03:53 +00:00
ClusterDiscovery::ClusterDiscovery(
const Poco::Util::AbstractConfiguration & config,
2021-11-18 08:57:26 +00:00
ContextPtr context_,
2021-11-11 09:03:53 +00:00
const String & config_prefix)
2021-11-18 08:57:26 +00:00
: context(Context::createCopy(context_))
2021-11-25 13:45:38 +00:00
, current_node_name(toString(ServerUUID::get()))
2021-11-11 09:03:53 +00:00
, log(&Poco::Logger::get("ClusterDiscovery"))
{
2021-11-25 13:45:38 +00:00
LOG_DEBUG(log, "Cluster discovery is enabled");
2021-11-11 09:03:53 +00:00
Poco::Util::AbstractConfiguration::Keys config_keys;
config.keys(config_prefix, config_keys);
for (const auto & key : config_keys)
{
String prefix = config_prefix + "." + key + ".discovery";
if (!config.has(prefix))
continue;
clusters_info.emplace(
key,
ClusterInfo(
/* name_= */ key,
/* zk_root_= */ config.getString(prefix + ".path"),
/* host_name= */ config.getString(prefix + ".my_hostname", getFQDNOrHostName()),
/* port= */ context->getTCPPort(),
/* secure= */ config.getBool(prefix + ".secure", false),
/* shard_id= */ config.getUInt(prefix + ".shard", 0),
/* observer_mode= */ ConfigHelper::getBool(config, prefix + ".observer"),
/* invisible= */ ConfigHelper::getBool(config, prefix + ".invisible")
)
);
2021-11-11 09:03:53 +00:00
}
2022-08-12 11:05:13 +00:00
std::vector<String> clusters_info_names;
clusters_info_names.reserve(clusters_info.size());
for (const auto & e : clusters_info)
clusters_info_names.emplace_back(e.first);
LOG_TRACE(log, "Clusters in discovery mode: {}", fmt::join(clusters_info_names, ", "));
clusters_to_update = std::make_shared<UpdateFlags>(clusters_info_names.begin(), clusters_info_names.end());
2021-11-11 09:03:53 +00:00
}
/// List node in zookeper for cluster
Strings ClusterDiscovery::getNodeNames(zkutil::ZooKeeperPtr & zk,
const String & zk_root,
const String & cluster_name,
int * version,
bool set_callback)
{
2023-05-13 00:57:31 +00:00
auto watch_callback = [cluster_name, my_clusters_to_update = clusters_to_update](auto) { my_clusters_to_update->set(cluster_name); };
Coordination::Stat stat;
2021-11-16 13:39:54 +00:00
Strings nodes = zk->getChildrenWatch(getShardsListPath(zk_root), &stat, set_callback ? watch_callback : Coordination::WatchCallback{});
if (version)
*version = stat.cversion;
return nodes;
}
/// Reads node information from specified zookeeper nodes
/// On error returns empty result
2021-11-16 13:39:54 +00:00
ClusterDiscovery::NodesInfo ClusterDiscovery::getNodes(zkutil::ZooKeeperPtr & zk, const String & zk_root, const Strings & node_uuids)
2021-11-11 09:03:53 +00:00
{
NodesInfo result;
2021-11-16 13:39:54 +00:00
for (const auto & node_uuid : node_uuids)
2021-11-11 09:03:53 +00:00
{
2021-11-16 13:39:54 +00:00
String payload;
2021-11-25 13:45:38 +00:00
bool ok = zk->tryGet(getShardsListPath(zk_root) / node_uuid, payload) &&
NodeInfo::parse(payload, result[node_uuid]);
if (!ok)
{
2021-11-25 13:45:38 +00:00
LOG_WARNING(log, "Can't get data from node '{}' in '{}'", node_uuid, zk_root);
2021-11-16 13:39:54 +00:00
return {};
}
2021-11-11 09:03:53 +00:00
}
return result;
}
2021-11-16 13:39:54 +00:00
/// Checks if cluster nodes set is changed.
/// Returns true if update required.
/// It performs only shallow check (set of nodes' uuids).
/// So, if node's hostname are changed, then cluster won't be updated.
bool ClusterDiscovery::needUpdate(const Strings & node_uuids, const NodesInfo & nodes)
2021-11-15 14:52:52 +00:00
{
bool has_difference = node_uuids.size() != nodes.size() ||
std::any_of(node_uuids.begin(), node_uuids.end(), [&nodes] (auto u) { return !nodes.contains(u); });
2021-11-17 13:47:40 +00:00
{
2021-11-25 13:45:38 +00:00
/// Just to log updated nodes, suboptimal, but should be ok for expected update sizes
2021-11-17 13:47:40 +00:00
std::set<String> new_names(node_uuids.begin(), node_uuids.end());
std::set<String> old_names;
for (const auto & [name, _] : nodes)
old_names.emplace(name);
auto format_cluster_update = [](const std::set<String> & s1, const std::set<String> & s2)
{
std::vector<String> diff;
std::set_difference(s1.begin(), s1.end(), s2.begin(), s2.end(), std::back_inserter(diff));
constexpr size_t max_to_show = 3;
size_t sz = diff.size();
2021-11-25 13:45:38 +00:00
bool need_crop = sz > max_to_show;
if (need_crop)
2021-11-17 13:47:40 +00:00
diff.resize(max_to_show);
2021-11-25 13:45:38 +00:00
if (sz == 0)
return fmt::format("{} nodes", sz);
return fmt::format("{} node{} [{}{}]", sz, sz != 1 ? "s" : "", fmt::join(diff, ", "), need_crop ? ",..." : "");
2021-11-17 13:47:40 +00:00
};
2021-12-07 09:45:32 +00:00
LOG_DEBUG(log, "Cluster update: added {}, removed {}",
2021-11-17 13:47:40 +00:00
format_cluster_update(new_names, old_names),
format_cluster_update(old_names, new_names));
}
return has_difference;
}
ClusterPtr ClusterDiscovery::makeCluster(const ClusterInfo & cluster_info)
{
std::vector<Strings> shards;
{
std::map<size_t, Strings> replica_addresses;
for (const auto & [_, node] : cluster_info.nodes_info)
{
if (cluster_info.current_node.secure != node.secure)
{
LOG_WARNING(log, "Node '{}' in cluster '{}' has different 'secure' value, skipping it", node.address, cluster_info.name);
continue;
}
replica_addresses[node.shard_id].emplace_back(node.address);
}
shards.reserve(replica_addresses.size());
for (auto & [_, replicas] : replica_addresses)
shards.emplace_back(std::move(replicas));
}
bool secure = cluster_info.current_node.secure;
2023-04-07 16:26:23 +00:00
ClusterConnectionParameters params{
/* username= */ context->getUserName(),
/* password= */ "",
/* clickhouse_port= */ secure ? context->getTCPPortSecure().value_or(DBMS_DEFAULT_SECURE_PORT) : context->getTCPPort(),
/* treat_local_as_remote= */ false,
/* treat_local_port_as_remote= */ false, /// should be set only for clickhouse-local, but cluster discovery is not used there
2023-04-07 16:26:23 +00:00
/* secure= */ secure,
2023-06-07 16:25:52 +00:00
/* priority= */ Priority{1},
2023-04-07 16:26:23 +00:00
/* cluster_name= */ "",
/* password= */ ""};
auto cluster = std::make_shared<Cluster>(
context->getSettingsRef(),
shards,
params);
return cluster;
}
2021-11-11 09:03:53 +00:00
static bool contains(const Strings & list, const String & value)
{
return std::find(list.begin(), list.end(), value) != list.end();
}
/// Reads data from zookeeper and tries to update cluster.
/// Returns true on success (or no update required).
bool ClusterDiscovery::updateCluster(ClusterInfo & cluster_info)
{
2021-12-07 09:45:32 +00:00
LOG_DEBUG(log, "Updating cluster '{}'", cluster_info.name);
auto zk = context->getZooKeeper();
int start_version;
Strings node_uuids = getNodeNames(zk, cluster_info.zk_root, cluster_info.name, &start_version, false);
auto & nodes_info = cluster_info.nodes_info;
auto on_exit = [this, start_version, &zk, &cluster_info, &nodes_info]()
{
/// in case of successful update we still need to check if configuration of cluster still valid and also set watch callback
int current_version;
getNodeNames(zk, cluster_info.zk_root, cluster_info.name, &current_version, true);
if (current_version != start_version)
{
LOG_DEBUG(log, "Cluster '{}' configuration changed during update", cluster_info.name);
nodes_info.clear();
return false;
}
return true;
};
if (!cluster_info.current_node_is_observer && !contains(node_uuids, current_node_name))
{
2021-11-25 13:45:38 +00:00
LOG_ERROR(log, "Can't find current node in cluster '{}', will register again", cluster_info.name);
registerInZk(zk, cluster_info);
nodes_info.clear();
return false;
}
if (cluster_info.current_cluster_is_invisible)
{
LOG_DEBUG(log, "cluster '{}' is invisible!", cluster_info.name);
return true;
}
if (!needUpdate(node_uuids, nodes_info))
{
2021-12-07 09:45:32 +00:00
LOG_DEBUG(log, "No update required for cluster '{}'", cluster_info.name);
return on_exit();
}
nodes_info = getNodes(zk, cluster_info.zk_root, node_uuids);
if (nodes_info.empty())
2021-11-25 13:45:38 +00:00
{
LOG_WARNING(log, "Can't get nodes info for '{}'", cluster_info.name);
return false;
2021-11-25 13:45:38 +00:00
}
if (bool ok = on_exit(); !ok)
return false;
2021-12-07 09:45:32 +00:00
LOG_DEBUG(log, "Updating system.clusters record for '{}' with {} nodes", cluster_info.name, cluster_info.nodes_info.size());
2021-11-25 13:45:38 +00:00
auto cluster = makeCluster(cluster_info);
std::lock_guard lock(mutex);
cluster_impls[cluster_info.name] = cluster;
return true;
2021-11-11 09:03:53 +00:00
}
void ClusterDiscovery::registerInZk(zkutil::ZooKeeperPtr & zk, ClusterInfo & info)
{
2022-08-12 11:05:13 +00:00
/// Create root node in observer mode not to get 'No node' error
String node_path = getShardsListPath(info.zk_root) / current_node_name;
zk->createAncestors(node_path);
if (info.current_node_is_observer)
{
LOG_DEBUG(log, "Current node {} is observer of cluster {}", current_node_name, info.name);
return;
}
2021-11-25 13:45:38 +00:00
LOG_DEBUG(log, "Registering current node {} in cluster {}", current_node_name, info.name);
zk->createOrUpdate(node_path, info.current_node.serialize(), zkutil::CreateMode::Ephemeral);
2021-11-25 13:45:38 +00:00
LOG_DEBUG(log, "Current node {} registered in cluster {}", current_node_name, info.name);
2021-11-15 14:52:52 +00:00
}
void ClusterDiscovery::initialUpdate()
2021-11-11 09:03:53 +00:00
{
2023-08-31 11:33:01 +00:00
LOG_DEBUG(log, "Initializing");
fiu_do_on(FailPoints::cluster_discovery_faults,
{
constexpr UInt8 success_chance = 4;
auto is_failed = std::uniform_int_distribution<>(0, success_chance)(thread_local_rng) != 0;
if (is_failed)
throw Exception(ErrorCodes::KEEPER_EXCEPTION, "Failpoint cluster_discovery_faults is triggered");
});
auto zk = context->getZooKeeper();
for (auto & [_, info] : clusters_info)
2021-11-18 08:57:26 +00:00
{
registerInZk(zk, info);
if (!updateCluster(info))
2021-11-18 08:57:26 +00:00
{
LOG_WARNING(log, "Error on initial cluster '{}' update, will retry in background", info.name);
clusters_to_update->set(info.name);
2021-11-18 08:57:26 +00:00
}
}
2023-08-31 11:33:01 +00:00
LOG_DEBUG(log, "Initialized");
is_initialized = true;
}
void ClusterDiscovery::start()
{
if (clusters_info.empty())
{
LOG_DEBUG(log, "No defined clusters for discovery");
return;
}
try
{
initialUpdate();
}
catch (...)
{
tryLogCurrentException(log, "Caught exception in cluster discovery initialization");
}
2021-11-18 08:57:26 +00:00
using namespace std::chrono_literals;
constexpr static std::chrono::milliseconds DEFAULT_BACKOFF_TIMEOUT = 10ms;
LOG_DEBUG(log, "Starting working thread");
main_thread = ThreadFromGlobalPool([this]
{
std::chrono::milliseconds backoff_timeout = DEFAULT_BACKOFF_TIMEOUT;
bool finish = false;
while (!finish)
{
try
{
finish = runMainThread([&backoff_timeout] { backoff_timeout = DEFAULT_BACKOFF_TIMEOUT; });
}
catch (...)
{
/*
* it can be zk error (will take new session) or other retriable error,
* should not stop discovery forever
*/
tryLogCurrentException(log, "Caught exception in cluster discovery runMainThread");
}
std::this_thread::sleep_for(backoff_timeout);
backoff_timeout = std::min(backoff_timeout * 2, std::chrono::milliseconds(3min));
}
});
}
/// Returns `true` on graceful shutdown (no restart required)
bool ClusterDiscovery::runMainThread(std::function<void()> up_to_date_callback)
{
setThreadName("ClusterDiscover");
LOG_DEBUG(log, "Worker thread started");
using namespace std::chrono_literals;
2021-11-15 14:52:52 +00:00
constexpr auto force_update_interval = 2min;
2023-08-31 11:33:01 +00:00
if (!is_initialized)
initialUpdate();
bool finished = false;
while (!finished)
2021-11-15 14:52:52 +00:00
{
bool all_up_to_date = true;
auto & clusters = clusters_to_update->wait(5s, finished);
for (auto & [cluster_name, need_update] : clusters)
2021-11-15 14:52:52 +00:00
{
auto cluster_info_it = clusters_info.find(cluster_name);
if (cluster_info_it == clusters_info.end())
{
LOG_ERROR(log, "Unknown cluster '{}'", cluster_name);
continue;
}
auto & cluster_info = cluster_info_it->second;
if (!need_update.exchange(false))
{
/// force updating periodically
bool force_update = cluster_info.watch.elapsedSeconds() > std::chrono::seconds(force_update_interval).count();
if (!force_update)
continue;
}
2021-11-25 13:45:38 +00:00
if (updateCluster(cluster_info))
2021-11-25 13:45:38 +00:00
{
cluster_info.watch.restart();
2021-11-25 13:45:38 +00:00
LOG_DEBUG(log, "Cluster '{}' updated successfully", cluster_name);
}
else
{
all_up_to_date = false;
/// no need to trigger convar, will retry after timeout in `wait`
need_update = true;
LOG_WARNING(log, "Cluster '{}' wasn't updated, will retry", cluster_name);
2021-11-25 13:45:38 +00:00
}
2021-11-15 14:52:52 +00:00
}
if (all_up_to_date)
{
up_to_date_callback();
}
2021-11-15 14:52:52 +00:00
}
2021-11-18 08:57:26 +00:00
LOG_DEBUG(log, "Worker thread stopped");
return finished;
2021-11-15 14:52:52 +00:00
}
ClusterPtr ClusterDiscovery::getCluster(const String & cluster_name) const
{
std::lock_guard lock(mutex);
auto it = cluster_impls.find(cluster_name);
if (it == cluster_impls.end())
return nullptr;
return it->second;
}
std::unordered_map<String, ClusterPtr> ClusterDiscovery::getClusters() const
{
std::lock_guard lock(mutex);
return cluster_impls;
}
2021-11-15 14:52:52 +00:00
void ClusterDiscovery::shutdown()
{
2021-12-07 09:45:32 +00:00
LOG_DEBUG(log, "Shutting down");
clusters_to_update->stop();
2021-11-15 14:52:52 +00:00
if (main_thread.joinable())
main_thread.join();
}
ClusterDiscovery::~ClusterDiscovery()
{
try
{
ClusterDiscovery::shutdown();
}
catch (...)
{
tryLogCurrentException(log, "Error on ClusterDiscovery shutdown");
}
2021-11-15 14:52:52 +00:00
}
bool ClusterDiscovery::NodeInfo::parse(const String & data, NodeInfo & result)
{
try
{
Poco::JSON::Parser parser;
auto json = parser.parse(data).extract<Poco::JSON::Object::Ptr>();
size_t ver = json->optValue<size_t>("version", data_ver);
if (ver == data_ver)
{
result.address = json->getValue<std::string>("address");
result.secure = json->optValue<bool>("secure", false);
result.shard_id = json->optValue<size_t>("shard_id", 0);
}
else
{
LOG_ERROR(
&Poco::Logger::get("ClusterDiscovery"),
"Unsupported version '{}' of data in zk node '{}'",
ver, data.size() < 1024 ? data : "[data too long]");
}
}
catch (Poco::Exception & e)
{
LOG_WARNING(
&Poco::Logger::get("ClusterDiscovery"),
"Can't parse '{}' from node: {}",
data.size() < 1024 ? data : "[data too long]", e.displayText());
return false;
}
return true;
}
String ClusterDiscovery::NodeInfo::serialize() const
{
Poco::JSON::Object json;
json.set("version", data_ver);
json.set("address", address);
json.set("shard_id", shard_id);
std::ostringstream oss; // STYLE_CHECK_ALLOW_STD_STRING_STREAM
oss.exceptions(std::ios::failbit);
Poco::JSON::Stringifier::stringify(json, oss);
return oss.str();
}
2021-11-11 09:03:53 +00:00
}