2021-05-12 10:39:07 +00:00
# include "Keeper.h"
2023-07-11 10:13:30 +00:00
# include <Common/ClickHouseRevision.h>
# include <Common/getMultipleKeysFromConfig.h>
# include <Common/DNSResolver.h>
# include <Interpreters/DNSCacheUpdater.h>
2023-07-11 10:04:43 +00:00
# include <Coordination/Defines.h>
2023-07-11 10:13:30 +00:00
# include <Common/Config/ConfigReloader.h>
# include <filesystem>
2023-07-11 10:04:43 +00:00
# include <IO/UseSSL.h>
2023-07-11 10:13:30 +00:00
# include <Core/ServerUUID.h>
# include <Common/logger_useful.h>
2024-03-07 16:09:55 +00:00
# include <Common/CgroupsMemoryUsageObserver.h>
2024-07-18 08:31:24 +00:00
# include <Common/MemoryWorker.h>
2023-07-11 10:13:30 +00:00
# include <Common/ErrorHandlers.h>
# include <Common/assertProcessUserMatchesDataOwner.h>
# include <Common/makeSocketAddress.h>
2023-05-19 14:23:56 +00:00
# include <Server/waitServersToFinish.h>
2024-02-14 09:51:42 +00:00
# include <Server/CloudPlacementInfo.h>
2023-12-08 20:46:31 +00:00
# include <base/getMemoryAmount.h>
2023-07-11 10:04:43 +00:00
# include <base/scope_guard.h>
2023-07-11 10:13:30 +00:00
# include <base/safeExit.h>
2024-07-28 09:51:09 +00:00
# include <base/Numa.h>
2021-10-03 09:54:23 +00:00
# include <Poco/Net/NetException.h>
2023-07-11 10:04:43 +00:00
# include <Poco/Net/TCPServerParams.h>
2023-07-11 10:13:30 +00:00
# include <Poco/Net/TCPServer.h>
2021-05-12 10:39:07 +00:00
# include <Poco/Util/HelpFormatter.h>
2023-07-11 10:13:30 +00:00
# include <Poco/Environment.h>
# include <sys/stat.h>
# include <pwd.h>
2022-11-09 12:37:42 +00:00
2024-07-04 11:57:47 +00:00
# include <Common/Jemalloc.h>
2023-05-17 13:32:51 +00:00
# include <Interpreters/Context.h>
2021-10-27 12:26:42 +00:00
# include <Coordination/FourLetterCommand.h>
2022-11-09 12:37:42 +00:00
# include <Coordination/KeeperAsynchronousMetrics.h>
2021-05-12 10:39:07 +00:00
2022-11-09 08:02:04 +00:00
# include <Server/HTTP/HTTPServer.h>
2023-07-11 10:13:30 +00:00
# include <Server/HTTPHandlerFactory.h>
2023-12-08 04:28:01 +00:00
# include <Server/KeeperReadinessHandler.h>
2024-05-14 15:08:14 +00:00
# include <Server/PrometheusRequestHandlerFactory.h>
2024-02-13 15:01:50 +00:00
# include <Server/TCPServer.h>
2022-11-09 08:02:04 +00:00
# include "Core/Defines.h"
2022-09-28 13:29:29 +00:00
# include "config.h"
2023-11-13 09:09:23 +00:00
# include <Common/config_version.h>
2023-07-11 10:13:30 +00:00
# include "config_tools.h"
2023-06-14 00:23:39 +00:00
2021-05-12 10:39:07 +00:00
# if USE_SSL
# include <Poco / Net / Context.h>
# include <Poco / Net / SecureServerSocket.h>
2023-07-11 12:23:10 +00:00
# include <Server / CertificateReloader.h>
2021-05-12 10:39:07 +00:00
# endif
2024-07-15 12:08:18 +00:00
# if USE_GWP_ASAN
# include <Common / GWPAsan.h>
# endif
2023-07-11 10:04:43 +00:00
# include <Server/ProtocolServerAdapter.h>
2023-07-11 10:13:30 +00:00
# include <Server/KeeperTCPHandlerFactory.h>
2021-05-12 10:39:07 +00:00
2023-05-17 13:32:51 +00:00
# include <Disks/registerDisks.h>
2023-10-27 17:21:54 +00:00
# include <incbin.h>
/// A minimal file used when the keeper is run without installation
INCBIN ( keeper_resource_embedded_xml , SOURCE_DIR " /programs/keeper/keeper_embedded.xml " ) ;
2021-05-17 09:38:44 +00:00
2024-08-18 07:05:45 +00:00
extern const char * GIT_HASH ;
2021-05-12 10:39:07 +00:00
int mainEntryClickHouseKeeper ( int argc , char * * argv )
{
DB : : Keeper app ;
try
{
return app . run ( argc , argv ) ;
}
catch ( . . . )
{
std : : cerr < < DB : : getCurrentExceptionMessage ( true ) < < " \n " ;
auto code = DB : : getCurrentExceptionCode ( ) ;
2024-11-07 20:28:06 +00:00
return static_cast < UInt8 > ( code ) ? code : 1 ;
2021-05-12 10:39:07 +00:00
}
}
namespace DB
{
namespace ErrorCodes
{
extern const int NO_ELEMENTS_IN_CONFIG ;
extern const int SUPPORT_IS_DISABLED ;
extern const int NETWORK_ERROR ;
2022-04-15 08:52:34 +00:00
extern const int LOGICAL_ERROR ;
2021-05-12 10:39:07 +00:00
}
2023-07-11 10:13:30 +00:00
Poco : : Net : : SocketAddress Keeper : : socketBindListen ( Poco : : Net : : ServerSocket & socket , const std : : string & host , UInt16 port , [[maybe_unused]] bool secure ) const
2021-05-12 10:39:07 +00:00
{
auto address = makeSocketAddress ( host , port , & logger ( ) ) ;
socket . bind ( address , /* reuseAddress = */ true , /* reusePort = */ config ( ) . getBool ( " listen_reuse_port " , false ) ) ;
socket . listen ( /* backlog = */ config ( ) . getUInt ( " listen_backlog " , 64 ) ) ;
return address ;
}
void Keeper : : createServer ( const std : : string & listen_host , const char * port_name , bool listen_try , CreateServerFunc & & func ) const
{
/// For testing purposes, user may omit tcp_port or http_port or https_port in configuration file.
if ( ! config ( ) . has ( port_name ) )
return ;
auto port = config ( ) . getInt ( port_name ) ;
try
{
func ( port ) ;
}
catch ( const Poco : : Exception & )
{
if ( listen_try )
{
2023-08-14 16:57:40 +00:00
LOG_WARNING ( & logger ( ) , " Listen [{}]:{} failed: {}. If it is an IPv6 or IPv4 address and your host has disabled IPv6 or IPv4, "
" then consider to "
2021-05-12 10:39:07 +00:00
" specify not disabled IPv4 or IPv6 address to listen in <listen_host> element of configuration "
" file. Example for disabled IPv6: <listen_host>0.0.0.0</listen_host> . "
" Example for disabled IPv4: <listen_host>::</listen_host> " ,
2023-08-14 16:57:40 +00:00
listen_host , port , getCurrentExceptionMessage ( false ) ) ;
2021-05-12 10:39:07 +00:00
}
else
{
2023-08-14 16:57:40 +00:00
throw Exception ( ErrorCodes : : NETWORK_ERROR , " Listen [{}]:{} failed: {} " , listen_host , port , getCurrentExceptionMessage ( false ) ) ;
2021-05-12 10:39:07 +00:00
}
}
}
void Keeper : : uninitialize ( )
{
logger ( ) . information ( " shutting down " ) ;
BaseDaemon : : uninitialize ( ) ;
}
int Keeper : : run ( )
{
if ( config ( ) . hasOption ( " help " ) )
{
Poco : : Util : : HelpFormatter help_formatter ( Keeper : : options ( ) ) ;
2023-07-11 10:13:30 +00:00
auto header_str = fmt : : format ( " {0} [OPTION] [-- [ARG]...] \n "
2023-06-14 00:23:39 +00:00
# if ENABLE_CLICKHOUSE_KEEPER_CLIENT
2023-07-11 10:13:30 +00:00
" {0} client [OPTION] \n "
2023-06-14 00:23:39 +00:00
# endif
2023-07-11 10:13:30 +00:00
" positional arguments can be used to rewrite config.xml properties, for example, --http_port=8010 " ,
commandName ( ) ) ;
2021-05-12 10:39:07 +00:00
help_formatter . setHeader ( header_str ) ;
help_formatter . format ( std : : cout ) ;
return 0 ;
}
if ( config ( ) . hasOption ( " version " ) )
{
2023-08-09 03:02:50 +00:00
std : : cout < < VERSION_NAME < < " keeper version " < < VERSION_STRING < < VERSION_OFFICIAL < < " . " < < std : : endl ;
2021-05-12 10:39:07 +00:00
return 0 ;
}
return Application : : run ( ) ; // NOLINT
}
void Keeper : : initialize ( Poco : : Util : : Application & self )
{
2023-10-27 17:21:54 +00:00
ConfigProcessor : : registerEmbeddedConfig ( " keeper_config.xml " , std : : string_view ( reinterpret_cast < const char * > ( gkeeper_resource_embedded_xmlData ) , gkeeper_resource_embedded_xmlSize ) ) ;
2021-05-12 10:39:07 +00:00
BaseDaemon : : initialize ( self ) ;
logger ( ) . information ( " starting up " ) ;
2023-07-11 10:13:30 +00:00
LOG_INFO ( & logger ( ) , " OS Name = {}, OS Version = {}, OS Architecture = {} " ,
2021-05-12 10:39:07 +00:00
Poco : : Environment : : osName ( ) ,
Poco : : Environment : : osVersion ( ) ,
Poco : : Environment : : osArchitecture ( ) ) ;
}
2021-05-12 13:04:34 +00:00
std : : string Keeper : : getDefaultConfigFileName ( ) const
2021-05-12 10:39:07 +00:00
{
2021-05-12 13:04:34 +00:00
return " keeper_config.xml " ;
2021-05-12 10:39:07 +00:00
}
2024-05-22 11:18:51 +00:00
bool Keeper : : allowTextLog ( ) const
{
return false ;
}
2022-04-15 08:52:34 +00:00
void Keeper : : handleCustomArguments ( const std : : string & arg , [[maybe_unused]] const std : : string & value ) // NOLINT
2022-04-08 07:18:18 +00:00
{
if ( arg = = " force-recovery " )
{
assert ( value . empty ( ) ) ;
2022-04-14 12:07:33 +00:00
config ( ) . setBool ( " keeper_server.force_recovery " , true ) ;
2022-04-08 07:18:18 +00:00
return ;
}
throw Exception ( ErrorCodes : : LOGICAL_ERROR , " Invalid argument {} provided " , arg ) ;
}
2021-05-12 10:39:07 +00:00
void Keeper : : defineOptions ( Poco : : Util : : OptionSet & options )
{
options . addOption (
2023-07-11 10:13:30 +00:00
Poco : : Util : : Option ( " help " , " h " , " show help and exit " )
2021-05-12 10:39:07 +00:00
. required ( false )
. repeatable ( false )
2023-07-11 10:13:30 +00:00
. binding ( " help " ) ) ;
options . addOption (
Poco : : Util : : Option ( " version " , " V " , " show version and exit " )
. required ( false )
. repeatable ( false )
. binding ( " version " ) ) ;
options . addOption (
Poco : : Util : : Option ( " force-recovery " , " force-recovery " , " Force recovery mode allowing Keeper to overwrite cluster configuration without quorum " )
. required ( false )
. repeatable ( false )
. noArgument ( )
. callback ( Poco : : Util : : OptionCallback < Keeper > ( this , & Keeper : : handleCustomArguments ) ) ) ;
2021-05-12 10:39:07 +00:00
BaseDaemon : : defineOptions ( options ) ;
}
2023-05-22 12:24:16 +00:00
namespace
2022-11-09 08:02:04 +00:00
{
2023-05-22 12:24:16 +00:00
2023-07-11 10:13:30 +00:00
struct KeeperHTTPContext : public IHTTPContext
{
explicit KeeperHTTPContext ( ContextPtr context_ )
: context ( std : : move ( context_ ) )
{ }
2022-11-09 08:02:04 +00:00
2023-07-11 10:13:30 +00:00
uint64_t getMaxHstsAge ( ) const override
{
return context - > getConfigRef ( ) . getUInt64 ( " keeper_server.hsts_max_age " , 0 ) ;
}
2022-11-09 08:02:04 +00:00
2023-07-11 10:13:30 +00:00
uint64_t getMaxUriSize ( ) const override
{
return context - > getConfigRef ( ) . getUInt64 ( " keeper_server.http_max_uri_size " , 1048576 ) ;
}
2022-11-09 08:02:04 +00:00
2023-07-11 10:13:30 +00:00
uint64_t getMaxFields ( ) const override
{
return context - > getConfigRef ( ) . getUInt64 ( " keeper_server.http_max_fields " , 1000000 ) ;
}
2022-11-09 08:02:04 +00:00
2023-07-11 10:13:30 +00:00
uint64_t getMaxFieldNameSize ( ) const override
{
return context - > getConfigRef ( ) . getUInt64 ( " keeper_server.http_max_field_name_size " , 128 * 1024 ) ;
}
2022-11-09 08:02:04 +00:00
2023-07-11 10:13:30 +00:00
uint64_t getMaxFieldValueSize ( ) const override
{
return context - > getConfigRef ( ) . getUInt64 ( " keeper_server.http_max_field_value_size " , 128 * 1024 ) ;
}
2022-11-09 14:51:41 +00:00
2023-07-11 10:13:30 +00:00
Poco : : Timespan getReceiveTimeout ( ) const override
{
return { context - > getConfigRef ( ) . getInt64 ( " keeper_server.http_receive_timeout " , DBMS_DEFAULT_RECEIVE_TIMEOUT_SEC ) , 0 } ;
}
2023-07-11 10:04:43 +00:00
2023-07-11 10:13:30 +00:00
Poco : : Timespan getSendTimeout ( ) const override
2023-07-11 10:04:43 +00:00
{
2023-07-11 10:13:30 +00:00
return { context - > getConfigRef ( ) . getInt64 ( " keeper_server.http_send_timeout " , DBMS_DEFAULT_SEND_TIMEOUT_SEC ) , 0 } ;
2023-07-11 10:04:43 +00:00
}
2023-05-22 12:24:16 +00:00
2023-07-11 10:13:30 +00:00
ContextPtr context ;
} ;
HTTPContextPtr httpContext ( )
{
return std : : make_shared < KeeperHTTPContext > ( Context : : getGlobalContextInstance ( ) ) ;
}
Fix keeper with non-system-wide directories
Otherwise it still tries to access default system-wide directory on
config reloading:
2024.06.22 20:36:19.860615 [ 31600 ] {} <Error> Application: std::exception. Code: 1001, type: std::__1::__fs::filesystem::filesystem_error, e.what() = filesystem error: in create_directories: Permission denied ["/var/lib/clickhouse-keeper"], Stack trace (when copying this message, always include the lines below):
0. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/exception:141: std::runtime_error::runtime_error(String const&) @ 0x0000000016f16a17
1. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: std::system_error::system_error(std::error_code, String const&) @ 0x0000000016f1d09f
2. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__filesystem/filesystem_error.h:42: std::__fs::filesystem::filesystem_error::filesystem_error[abi:v15000](String const&, std::__fs::filesystem::path const&, std::error_code) @ 0x000000000b639ed2
3. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__filesystem/filesystem_error.h:90: void std::__fs::filesystem::__throw_filesystem_error[abi:v15000]<String&, std::__fs::filesystem::path const&, std::error_code const&>(String&, std::__fs::filesystem::path const&, std::error_code const&) @ 0x0000000016ebaf96
4. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/filesystem_common.h:173: std::__fs::filesystem::detail::(anonymous namespace)::ErrorHandler<bool>::report(std::error_code const&) const @ 0x0000000016ebe416
5. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/operations.cpp:1030: std::__fs::filesystem::__create_directories(std::__fs::filesystem::path const&, std::error_code*) @ 0x0000000016ebec3d
6. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/filesystem_common.h:161: std::__fs::filesystem::__create_directories(std::__fs::filesystem::path const&, std::error_code*) @ 0x0000000016ebed0e
7. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: DB::ConfigProcessor::savePreprocessedConfig(DB::ConfigProcessor::LoadedConfig&, String) @ 0x00000000128362b3
8. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: DB::ConfigReloader::reloadIfNewer(bool, bool, bool, bool) @ 0x000000001283c085
9. /src/ch/clickhouse/src/Common/Config/ConfigReloader.cpp:33: DB::ConfigReloader::ConfigReloader(std::basic_string_view<char, std::char_traits<char>>, std::vector<String, std::allocator<String>> const&, String const&, zkutil::ZooKeeperNodeCache&&, std::shared_ptr<Poco::Event> const&, std::function<void (Poco::AutoPtr<Poco::Util::AbstractConfiguration>, bool)>&&, bool) @ 0x000000001283b457
10. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__functional/function.h:818: ? @ 0x000000000b686ecd
11. /src/ch/clickhouse/base/poco/Util/src/Application.cpp:0: Poco::Util::Application::run() @ 0x0000000014afb156
12. /src/ch/clickhouse/programs/keeper/Keeper.cpp:165: DB::Keeper::run() @ 0x000000000b68317e
13. /src/ch/clickhouse/base/poco/Util/src/ServerApplication.cpp:132: Poco::Util::ServerApplication::run(int, char**) @ 0x0000000014b0faf2
14. /src/ch/clickhouse/programs/keeper/Keeper.cpp:0: mainEntryClickHouseKeeper(int, char**) @ 0x000000000b68227e
15. /src/ch/clickhouse/programs/main.cpp:0: main @ 0x00000000061d6204
16. ? @ 0x00007ffff7dc2c88
17. ? @ 0x00007ffff7dc2d4c
18. _start @ 0x00000000061d502e
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2024-06-22 16:17:02 +00:00
String getKeeperPath ( Poco : : Util : : LayeredConfiguration & config )
{
String path ;
if ( config . has ( " keeper_server.storage_path " ) )
{
path = config . getString ( " keeper_server.storage_path " ) ;
}
else if ( config . has ( " keeper_server.log_storage_path " ) )
{
path = std : : filesystem : : path ( config . getString ( " keeper_server.log_storage_path " ) ) . parent_path ( ) ;
}
else if ( config . has ( " keeper_server.snapshot_storage_path " ) )
{
path = std : : filesystem : : path ( config . getString ( " keeper_server.snapshot_storage_path " ) ) . parent_path ( ) ;
}
else if ( std : : filesystem : : is_directory ( std : : filesystem : : path { config . getString ( " path " , DBMS_DEFAULT_PATH ) } / " coordination " ) )
{
throw Exception ( ErrorCodes : : NO_ELEMENTS_IN_CONFIG ,
" By default 'keeper_server.storage_path' could be assigned to {}, but the directory {} already exists. Please specify 'keeper_server.storage_path' in the keeper configuration explicitly " ,
KEEPER_DEFAULT_PATH , String { std : : filesystem : : path { config . getString ( " path " , DBMS_DEFAULT_PATH ) } / " coordination " } ) ;
}
else
{
path = KEEPER_DEFAULT_PATH ;
}
return path ;
}
2022-11-09 08:02:04 +00:00
}
2021-05-12 10:39:07 +00:00
int Keeper : : main ( const std : : vector < std : : string > & /*args*/ )
2022-11-18 12:22:55 +00:00
try
2021-05-12 10:39:07 +00:00
{
2024-07-04 11:57:47 +00:00
# if USE_JEMALLOC
setJemallocBackgroundThreads ( true ) ;
# endif
2021-05-12 10:39:07 +00:00
Poco : : Logger * log = & logger ( ) ;
UseSSL use_ssl ;
MainThreadStatus : : getInstance ( ) ;
2024-07-28 09:51:09 +00:00
if ( auto total_numa_memory = getNumaNodesTotalMemory ( ) ; total_numa_memory . has_value ( ) )
{
LOG_INFO (
2024-07-29 09:47:57 +00:00
log , " Keeper is bound to a subset of NUMA nodes. Total memory of all available nodes: {} " , ReadableSize ( * total_numa_memory ) ) ;
2024-07-28 09:51:09 +00:00
}
2021-05-12 10:39:07 +00:00
# if !defined(NDEBUG) || !defined(__OPTIMIZE__)
2021-05-12 13:04:34 +00:00
LOG_WARNING ( log , " Keeper was built in debug mode. It will work slowly. " ) ;
2021-05-12 10:39:07 +00:00
# endif
# if defined(SANITIZER)
2021-05-12 13:04:34 +00:00
LOG_WARNING ( log , " Keeper was built with sanitizer. It will work slowly. " ) ;
2021-05-12 10:39:07 +00:00
# endif
2021-05-12 13:04:34 +00:00
if ( ! config ( ) . has ( " keeper_server " ) )
throw Exception ( ErrorCodes : : NO_ELEMENTS_IN_CONFIG , " Keeper configuration (<keeper_server> section) not found in config " ) ;
2023-12-08 20:46:31 +00:00
auto updateMemorySoftLimitInConfig = [ & ] ( Poco : : Util : : AbstractConfiguration & config )
{
UInt64 memory_soft_limit = 0 ;
if ( config . has ( " keeper_server.max_memory_usage_soft_limit " ) )
{
memory_soft_limit = config . getUInt64 ( " keeper_server.max_memory_usage_soft_limit " ) ;
}
/// if memory soft limit is not set, we will use default value
if ( memory_soft_limit = = 0 )
{
Float64 ratio = 0.9 ;
if ( config . has ( " keeper_server.max_memory_usage_soft_limit_ratio " ) )
ratio = config . getDouble ( " keeper_server.max_memory_usage_soft_limit_ratio " ) ;
size_t physical_server_memory = getMemoryAmount ( ) ;
if ( ratio > 0 & & physical_server_memory > 0 )
{
memory_soft_limit = static_cast < UInt64 > ( physical_server_memory * ratio ) ;
config . setUInt64 ( " keeper_server.max_memory_usage_soft_limit " , memory_soft_limit ) ;
}
}
LOG_INFO ( log , " keeper_server.max_memory_usage_soft_limit is set to {} " , formatReadableSizeWithBinarySuffix ( memory_soft_limit ) ) ;
} ;
updateMemorySoftLimitInConfig ( config ( ) ) ;
Fix keeper with non-system-wide directories
Otherwise it still tries to access default system-wide directory on
config reloading:
2024.06.22 20:36:19.860615 [ 31600 ] {} <Error> Application: std::exception. Code: 1001, type: std::__1::__fs::filesystem::filesystem_error, e.what() = filesystem error: in create_directories: Permission denied ["/var/lib/clickhouse-keeper"], Stack trace (when copying this message, always include the lines below):
0. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/exception:141: std::runtime_error::runtime_error(String const&) @ 0x0000000016f16a17
1. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: std::system_error::system_error(std::error_code, String const&) @ 0x0000000016f1d09f
2. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__filesystem/filesystem_error.h:42: std::__fs::filesystem::filesystem_error::filesystem_error[abi:v15000](String const&, std::__fs::filesystem::path const&, std::error_code) @ 0x000000000b639ed2
3. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__filesystem/filesystem_error.h:90: void std::__fs::filesystem::__throw_filesystem_error[abi:v15000]<String&, std::__fs::filesystem::path const&, std::error_code const&>(String&, std::__fs::filesystem::path const&, std::error_code const&) @ 0x0000000016ebaf96
4. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/filesystem_common.h:173: std::__fs::filesystem::detail::(anonymous namespace)::ErrorHandler<bool>::report(std::error_code const&) const @ 0x0000000016ebe416
5. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/operations.cpp:1030: std::__fs::filesystem::__create_directories(std::__fs::filesystem::path const&, std::error_code*) @ 0x0000000016ebec3d
6. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/filesystem_common.h:161: std::__fs::filesystem::__create_directories(std::__fs::filesystem::path const&, std::error_code*) @ 0x0000000016ebed0e
7. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: DB::ConfigProcessor::savePreprocessedConfig(DB::ConfigProcessor::LoadedConfig&, String) @ 0x00000000128362b3
8. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: DB::ConfigReloader::reloadIfNewer(bool, bool, bool, bool) @ 0x000000001283c085
9. /src/ch/clickhouse/src/Common/Config/ConfigReloader.cpp:33: DB::ConfigReloader::ConfigReloader(std::basic_string_view<char, std::char_traits<char>>, std::vector<String, std::allocator<String>> const&, String const&, zkutil::ZooKeeperNodeCache&&, std::shared_ptr<Poco::Event> const&, std::function<void (Poco::AutoPtr<Poco::Util::AbstractConfiguration>, bool)>&&, bool) @ 0x000000001283b457
10. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__functional/function.h:818: ? @ 0x000000000b686ecd
11. /src/ch/clickhouse/base/poco/Util/src/Application.cpp:0: Poco::Util::Application::run() @ 0x0000000014afb156
12. /src/ch/clickhouse/programs/keeper/Keeper.cpp:165: DB::Keeper::run() @ 0x000000000b68317e
13. /src/ch/clickhouse/base/poco/Util/src/ServerApplication.cpp:132: Poco::Util::ServerApplication::run(int, char**) @ 0x0000000014b0faf2
14. /src/ch/clickhouse/programs/keeper/Keeper.cpp:0: mainEntryClickHouseKeeper(int, char**) @ 0x000000000b68227e
15. /src/ch/clickhouse/programs/main.cpp:0: main @ 0x00000000061d6204
16. ? @ 0x00007ffff7dc2c88
17. ? @ 0x00007ffff7dc2d4c
18. _start @ 0x00000000061d502e
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2024-06-22 16:17:02 +00:00
std : : string path = getKeeperPath ( config ( ) ) ;
2023-01-30 14:26:57 +00:00
std : : filesystem : : create_directories ( path ) ;
2021-05-12 14:05:44 +00:00
/// Check that the process user id matches the owner of the data.
2023-07-11 10:13:30 +00:00
assertProcessUserMatchesDataOwner ( path , [ & ] ( const std : : string & message ) { LOG_WARNING ( log , fmt : : runtime ( message ) ) ; } ) ;
2021-05-12 14:05:44 +00:00
2021-08-17 13:24:14 +00:00
DB : : ServerUUID : : load ( path + " /uuid " , log ) ;
2021-08-16 18:30:53 +00:00
2021-10-19 14:29:49 +00:00
std : : string include_from_path = config ( ) . getString ( " include_from " , " /etc/metrika.xml " ) ;
2024-06-26 00:03:22 +00:00
PlacementInfo : : PlacementInfo : : instance ( ) . initialize ( config ( ) ) ;
2024-02-14 09:51:42 +00:00
2021-11-12 13:24:47 +00:00
GlobalThreadPool : : initialize (
2024-05-27 11:04:52 +00:00
/// We need to have sufficient amount of threads for connections + nuraft workers + keeper workers, 1000 is an estimation
std : : min ( 1000U , config ( ) . getUInt ( " max_thread_pool_size " , 1000 ) ) ,
config ( ) . getUInt ( " max_thread_pool_free_size " , 100 ) ,
config ( ) . getUInt ( " thread_pool_queue_size " , 1000 )
2023-07-11 10:13:30 +00:00
) ;
2023-07-28 07:47:09 +00:00
/// Wait for all threads to avoid possible use-after-free (for example logging objects can be already destroyed).
SCOPE_EXIT ( {
Stopwatch watch ;
LOG_INFO ( log , " Waiting for background threads " ) ;
GlobalThreadPool : : instance ( ) . shutdown ( ) ;
LOG_INFO ( log , " Background threads finished in {} ms " , watch . elapsedMilliseconds ( ) ) ;
} ) ;
2021-05-12 10:39:07 +00:00
2024-07-22 19:47:46 +00:00
MemoryWorker memory_worker ( config ( ) . getUInt64 ( " memory_worker_period_ms " , 0 ) ) ;
memory_worker . start ( ) ;
2024-07-18 08:31:24 +00:00
2021-05-12 10:39:07 +00:00
static ServerErrorHandler error_handler ;
Poco : : ErrorHandler : : set ( & error_handler ) ;
/// Initialize DateLUT early, to not interfere with running time of first query.
LOG_DEBUG ( log , " Initializing DateLUT. " ) ;
2023-04-12 10:47:05 +00:00
DateLUT : : serverTimezoneInstance ( ) ;
LOG_TRACE ( log , " Initialized DateLUT with time zone '{}'. " , DateLUT : : serverTimezoneInstance ( ) . getTimeZone ( ) ) ;
2021-05-12 10:39:07 +00:00
2021-05-12 13:04:34 +00:00
/// Don't want to use DNS cache
DNSResolver : : instance ( ) . setDisableCacheFlag ( ) ;
2021-05-12 10:39:07 +00:00
2021-05-12 13:04:34 +00:00
Poco : : ThreadPool server_pool ( 3 , config ( ) . getUInt ( " max_connections " , 1024 ) ) ;
2022-11-09 12:37:42 +00:00
std : : mutex servers_lock ;
auto servers = std : : make_shared < std : : vector < ProtocolServerAdapter > > ( ) ;
2023-05-17 13:32:51 +00:00
auto shared_context = Context : : createShared ( ) ;
auto global_context = Context : : createGlobal ( shared_context . get ( ) ) ;
global_context - > makeGlobalContext ( ) ;
2023-08-01 11:37:49 +00:00
global_context - > setApplicationType ( Context : : ApplicationType : : KEEPER ) ;
2023-05-17 13:32:51 +00:00
global_context - > setPath ( path ) ;
global_context - > setRemoteHostFilter ( config ( ) ) ;
2023-05-22 12:24:16 +00:00
if ( config ( ) . has ( " macros " ) )
global_context - > setMacros ( std : : make_unique < Macros > ( config ( ) , " macros " , log ) ) ;
2023-05-17 13:32:51 +00:00
registerDisks ( /*global_skip_access_check=*/ false ) ;
2022-11-09 12:37:42 +00:00
/// This object will periodically calculate some metrics.
KeeperAsynchronousMetrics async_metrics (
2023-05-22 12:24:16 +00:00
global_context ,
2022-11-09 12:37:42 +00:00
config ( ) . getUInt ( " asynchronous_metrics_update_period_s " , 1 ) ,
[ & ] ( ) - > std : : vector < ProtocolServerMetrics >
{
std : : vector < ProtocolServerMetrics > metrics ;
std : : lock_guard lock ( servers_lock ) ;
metrics . reserve ( servers - > size ( ) ) ;
for ( const auto & server : * servers )
2024-07-11 23:01:52 +00:00
metrics . emplace_back ( ProtocolServerMetrics { server . getPortName ( ) , server . currentThreads ( ) , server . refusedConnections ( ) } ) ;
2022-11-09 12:37:42 +00:00
return metrics ;
2024-07-22 19:47:46 +00:00
} ,
/*update_jemalloc_epoch_=*/ memory_worker . getSource ( ) ! = MemoryWorker : : MemoryUsageSource : : Jemalloc ,
/*update_rss_=*/ memory_worker . getSource ( ) = = MemoryWorker : : MemoryUsageSource : : None ) ;
2022-11-09 12:37:42 +00:00
2021-05-12 10:39:07 +00:00
std : : vector < std : : string > listen_hosts = DB : : getMultipleValuesFromConfig ( config ( ) , " " , " listen_host " ) ;
bool listen_try = config ( ) . getBool ( " listen_try " , false ) ;
if ( listen_hosts . empty ( ) )
{
listen_hosts . emplace_back ( " ::1 " ) ;
listen_hosts . emplace_back ( " 127.0.0.1 " ) ;
listen_try = true ;
}
2021-10-18 09:13:24 +00:00
/// Initialize keeper RAFT. Do nothing if no keeper_server in config.
2023-08-01 11:37:49 +00:00
global_context - > initializeKeeperDispatcher ( /* start_async = */ false ) ;
2023-05-22 12:24:16 +00:00
FourLetterCommandFactory : : registerCommands ( * global_context - > getKeeperDispatcher ( ) ) ;
2022-03-03 20:27:46 +00:00
2023-07-11 10:13:30 +00:00
auto config_getter = [ & ] ( ) - > const Poco : : Util : : AbstractConfiguration &
{
return global_context - > getConfigRef ( ) ;
} ;
2021-10-27 12:26:42 +00:00
2023-03-28 12:15:28 +00:00
auto tcp_receive_timeout = config ( ) . getInt64 ( " keeper_server.socket_receive_timeout_sec " , DBMS_DEFAULT_RECEIVE_TIMEOUT_SEC ) ;
auto tcp_send_timeout = config ( ) . getInt64 ( " keeper_server.socket_send_timeout_sec " , DBMS_DEFAULT_SEND_TIMEOUT_SEC ) ;
2021-05-12 13:04:34 +00:00
for ( const auto & listen_host : listen_hosts )
{
/// TCP Keeper
const char * port_name = " keeper_server.tcp_port " ;
2023-07-11 10:13:30 +00:00
createServer ( listen_host , port_name , listen_try , [ & ] ( UInt16 port )
{
Poco : : Net : : ServerSocket socket ;
auto address = socketBindListen ( socket , listen_host , port ) ;
socket . setReceiveTimeout ( Poco : : Timespan { tcp_receive_timeout , 0 } ) ;
socket . setSendTimeout ( Poco : : Timespan { tcp_send_timeout , 0 } ) ;
servers - > emplace_back (
listen_host ,
port_name ,
" Keeper (tcp): " + address . toString ( ) ,
std : : make_unique < TCPServer > (
new KeeperTCPHandlerFactory (
config_getter , global_context - > getKeeperDispatcher ( ) ,
tcp_receive_timeout , tcp_send_timeout , false ) , server_pool , socket ) ) ;
} ) ;
2021-05-12 13:04:34 +00:00
const char * secure_port_name = " keeper_server.tcp_port_secure " ;
2023-07-11 10:13:30 +00:00
createServer ( listen_host , secure_port_name , listen_try , [ & ] ( UInt16 port )
{
2021-05-12 10:39:07 +00:00
# if USE_SSL
2023-07-11 10:13:30 +00:00
Poco : : Net : : SecureServerSocket socket ;
auto address = socketBindListen ( socket , listen_host , port , /* secure = */ true ) ;
socket . setReceiveTimeout ( Poco : : Timespan { tcp_receive_timeout , 0 } ) ;
socket . setSendTimeout ( Poco : : Timespan { tcp_send_timeout , 0 } ) ;
servers - > emplace_back (
listen_host ,
secure_port_name ,
" Keeper with secure protocol (tcp_secure): " + address . toString ( ) ,
std : : make_unique < TCPServer > (
new KeeperTCPHandlerFactory (
config_getter , global_context - > getKeeperDispatcher ( ) ,
tcp_receive_timeout , tcp_send_timeout , true ) , server_pool , socket ) ) ;
2021-05-12 10:39:07 +00:00
# else
2023-07-11 10:13:30 +00:00
UNUSED ( port ) ;
throw Exception ( ErrorCodes : : SUPPORT_IS_DISABLED , " SSL support for TCP protocol is disabled because Poco library was built without NetSSL support. " ) ;
2021-05-12 10:39:07 +00:00
# endif
2023-07-11 10:13:30 +00:00
} ) ;
2022-11-09 08:02:04 +00:00
const auto & config = config_getter ( ) ;
2023-03-28 12:15:28 +00:00
auto http_context = httpContext ( ) ;
2022-11-09 08:02:04 +00:00
Poco : : Timespan keep_alive_timeout ( config . getUInt ( " keep_alive_timeout " , 10 ) , 0 ) ;
Poco : : Net : : HTTPServerParams : : Ptr http_params = new Poco : : Net : : HTTPServerParams ;
2023-03-28 12:15:28 +00:00
http_params - > setTimeout ( http_context - > getReceiveTimeout ( ) ) ;
2022-11-09 08:02:04 +00:00
http_params - > setKeepAliveTimeout ( keep_alive_timeout ) ;
/// Prometheus (if defined and not setup yet with http_port)
port_name = " prometheus.port " ;
2024-02-13 15:01:50 +00:00
createServer (
listen_host ,
port_name ,
listen_try ,
[ & , my_http_context = std : : move ( http_context ) ] ( UInt16 port ) mutable
{
Poco : : Net : : ServerSocket socket ;
auto address = socketBindListen ( socket , listen_host , port ) ;
socket . setReceiveTimeout ( my_http_context - > getReceiveTimeout ( ) ) ;
socket . setSendTimeout ( my_http_context - > getSendTimeout ( ) ) ;
servers - > emplace_back (
listen_host ,
port_name ,
" Prometheus: http:// " + address . toString ( ) ,
std : : make_unique < HTTPServer > (
std : : move ( my_http_context ) ,
2024-05-14 15:08:14 +00:00
createKeeperPrometheusHandlerFactory ( * this , config_getter ( ) , async_metrics , " PrometheusHandler-factory " ) ,
2024-02-13 15:01:50 +00:00
server_pool ,
socket ,
http_params ) ) ;
} ) ;
2023-12-07 06:28:41 +00:00
/// HTTP control endpoints
port_name = " keeper_server.http_control.port " ;
createServer ( listen_host , port_name , listen_try , [ & ] ( UInt16 port ) mutable
{
auto my_http_context = httpContext ( ) ;
Poco : : Timespan my_keep_alive_timeout ( config . getUInt ( " keep_alive_timeout " , 10 ) , 0 ) ;
Poco : : Net : : HTTPServerParams : : Ptr my_http_params = new Poco : : Net : : HTTPServerParams ;
my_http_params - > setTimeout ( my_http_context - > getReceiveTimeout ( ) ) ;
my_http_params - > setKeepAliveTimeout ( my_keep_alive_timeout ) ;
Poco : : Net : : ServerSocket socket ;
auto address = socketBindListen ( socket , listen_host , port ) ;
socket . setReceiveTimeout ( my_http_context - > getReceiveTimeout ( ) ) ;
socket . setSendTimeout ( my_http_context - > getSendTimeout ( ) ) ;
servers - > emplace_back (
listen_host ,
port_name ,
" HTTP Control: http:// " + address . toString ( ) ,
std : : make_unique < HTTPServer > (
2023-12-08 04:28:01 +00:00
std : : move ( my_http_context ) , createKeeperHTTPControlMainHandlerFactory ( config_getter ( ) , global_context - > getKeeperDispatcher ( ) , " KeeperHTTPControlHandler-factory " ) , server_pool , socket , http_params )
2023-12-07 06:28:41 +00:00
) ;
} ) ;
2021-05-12 13:04:34 +00:00
}
2021-05-12 10:39:07 +00:00
for ( auto & server : * servers )
2021-10-22 07:15:34 +00:00
{
2021-05-12 10:39:07 +00:00
server . start ( ) ;
2021-10-22 07:15:34 +00:00
LOG_INFO ( log , " Listening for {} " , server . getDescription ( ) ) ;
}
2021-05-12 10:39:07 +00:00
2022-11-09 12:37:42 +00:00
async_metrics . start ( ) ;
2021-10-19 14:29:49 +00:00
zkutil : : EventPtr unused_event = std : : make_shared < Poco : : Event > ( ) ;
zkutil : : ZooKeeperNodeCache unused_cache ( [ ] { return nullptr ; } ) ;
2023-07-11 10:13:30 +00:00
const std : : string cert_path = config ( ) . getString ( " openSSL.server.certificateFile " , " " ) ;
const std : : string key_path = config ( ) . getString ( " openSSL.server.privateKeyFile " , " " ) ;
std : : vector < std : : string > extra_paths = { include_from_path } ;
2023-07-23 02:56:47 +00:00
if ( ! cert_path . empty ( ) )
extra_paths . emplace_back ( cert_path ) ;
if ( ! key_path . empty ( ) )
extra_paths . emplace_back ( key_path ) ;
2023-07-11 10:13:30 +00:00
2021-10-19 14:29:49 +00:00
/// ConfigReloader have to strict parameters which are redundant in our case
auto main_config_reloader = std : : make_unique < ConfigReloader > (
config_path ,
2023-07-11 10:13:30 +00:00
extra_paths ,
Fix keeper with non-system-wide directories
Otherwise it still tries to access default system-wide directory on
config reloading:
2024.06.22 20:36:19.860615 [ 31600 ] {} <Error> Application: std::exception. Code: 1001, type: std::__1::__fs::filesystem::filesystem_error, e.what() = filesystem error: in create_directories: Permission denied ["/var/lib/clickhouse-keeper"], Stack trace (when copying this message, always include the lines below):
0. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/exception:141: std::runtime_error::runtime_error(String const&) @ 0x0000000016f16a17
1. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: std::system_error::system_error(std::error_code, String const&) @ 0x0000000016f1d09f
2. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__filesystem/filesystem_error.h:42: std::__fs::filesystem::filesystem_error::filesystem_error[abi:v15000](String const&, std::__fs::filesystem::path const&, std::error_code) @ 0x000000000b639ed2
3. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__filesystem/filesystem_error.h:90: void std::__fs::filesystem::__throw_filesystem_error[abi:v15000]<String&, std::__fs::filesystem::path const&, std::error_code const&>(String&, std::__fs::filesystem::path const&, std::error_code const&) @ 0x0000000016ebaf96
4. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/filesystem_common.h:173: std::__fs::filesystem::detail::(anonymous namespace)::ErrorHandler<bool>::report(std::error_code const&) const @ 0x0000000016ebe416
5. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/operations.cpp:1030: std::__fs::filesystem::__create_directories(std::__fs::filesystem::path const&, std::error_code*) @ 0x0000000016ebec3d
6. /src/ch/clickhouse/contrib/llvm-project/libcxx/src/filesystem/filesystem_common.h:161: std::__fs::filesystem::__create_directories(std::__fs::filesystem::path const&, std::error_code*) @ 0x0000000016ebed0e
7. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: DB::ConfigProcessor::savePreprocessedConfig(DB::ConfigProcessor::LoadedConfig&, String) @ 0x00000000128362b3
8. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/string:1499: DB::ConfigReloader::reloadIfNewer(bool, bool, bool, bool) @ 0x000000001283c085
9. /src/ch/clickhouse/src/Common/Config/ConfigReloader.cpp:33: DB::ConfigReloader::ConfigReloader(std::basic_string_view<char, std::char_traits<char>>, std::vector<String, std::allocator<String>> const&, String const&, zkutil::ZooKeeperNodeCache&&, std::shared_ptr<Poco::Event> const&, std::function<void (Poco::AutoPtr<Poco::Util::AbstractConfiguration>, bool)>&&, bool) @ 0x000000001283b457
10. /src/ch/clickhouse/contrib/llvm-project/libcxx/include/__functional/function.h:818: ? @ 0x000000000b686ecd
11. /src/ch/clickhouse/base/poco/Util/src/Application.cpp:0: Poco::Util::Application::run() @ 0x0000000014afb156
12. /src/ch/clickhouse/programs/keeper/Keeper.cpp:165: DB::Keeper::run() @ 0x000000000b68317e
13. /src/ch/clickhouse/base/poco/Util/src/ServerApplication.cpp:132: Poco::Util::ServerApplication::run(int, char**) @ 0x0000000014b0faf2
14. /src/ch/clickhouse/programs/keeper/Keeper.cpp:0: mainEntryClickHouseKeeper(int, char**) @ 0x000000000b68227e
15. /src/ch/clickhouse/programs/main.cpp:0: main @ 0x00000000061d6204
16. ? @ 0x00007ffff7dc2c88
17. ? @ 0x00007ffff7dc2d4c
18. _start @ 0x00000000061d502e
Signed-off-by: Azat Khuzhin <a.khuzhin@semrush.com>
2024-06-22 16:17:02 +00:00
getKeeperPath ( config ( ) ) ,
2021-10-19 14:29:49 +00:00
std : : move ( unused_cache ) ,
unused_event ,
[ & ] ( ConfigurationPtr config , bool /* initial_loading */ )
{
2023-05-31 01:09:15 +00:00
updateLevels ( * config , logger ( ) ) ;
2023-12-08 20:46:31 +00:00
updateMemorySoftLimitInConfig ( * config ) ;
2021-10-19 14:29:49 +00:00
if ( config - > has ( " keeper_server " ) )
2023-05-22 12:24:16 +00:00
global_context - > updateKeeperConfiguration ( * config ) ;
2023-07-11 10:13:30 +00:00
2023-07-11 10:40:55 +00:00
# if USE_SSL
2023-07-11 10:13:30 +00:00
CertificateReloader : : instance ( ) . tryLoad ( * config ) ;
2024-10-23 22:06:04 +00:00
CertificateReloader : : instance ( ) . tryLoadClient ( * config ) ;
2023-07-11 10:40:55 +00:00
# endif
2024-06-21 16:24:20 +00:00
} ) ;
2021-10-19 14:29:49 +00:00
2021-05-12 10:39:07 +00:00
SCOPE_EXIT ( {
LOG_INFO ( log , " Shutting down. " ) ;
2021-10-19 14:29:49 +00:00
main_config_reloader . reset ( ) ;
2021-05-12 10:39:07 +00:00
2022-11-09 12:37:42 +00:00
async_metrics . stop ( ) ;
2021-05-18 14:08:56 +00:00
LOG_DEBUG ( log , " Waiting for current connections to Keeper to finish. " ) ;
2022-10-07 10:46:45 +00:00
size_t current_connections = 0 ;
2021-05-12 10:39:07 +00:00
for ( auto & server : * servers )
{
server . stop ( ) ;
current_connections + = server . currentConnections ( ) ;
}
if ( current_connections )
LOG_INFO ( log , " Closed all listening sockets. Waiting for {} outstanding connections. " , current_connections ) ;
else
LOG_INFO ( log , " Closed all listening sockets. " ) ;
if ( current_connections > 0 )
2023-06-27 18:50:40 +00:00
current_connections = waitServersToFinish ( * servers , servers_lock , config ( ) . getInt ( " shutdown_wait_unfinished " , 5 ) ) ;
2021-05-12 10:39:07 +00:00
if ( current_connections )
2023-07-11 10:13:30 +00:00
LOG_INFO ( log , " Closed connections to Keeper. But {} remain. Probably some users cannot finish their connections after context shutdown. " , current_connections ) ;
2021-05-12 10:39:07 +00:00
else
2021-05-18 14:08:56 +00:00
LOG_INFO ( log , " Closed connections to Keeper. " ) ;
2021-05-12 10:39:07 +00:00
2023-05-22 12:24:16 +00:00
global_context - > shutdownKeeperDispatcher ( ) ;
2021-05-12 10:39:07 +00:00
/// Wait server pool to avoid use-after-free of destroyed context in the handlers
server_pool . joinAll ( ) ;
LOG_DEBUG ( log , " Destroyed global context. " ) ;
if ( current_connections )
{
LOG_INFO ( log , " Will shutdown forcefully. " ) ;
2022-03-02 09:59:10 +00:00
safeExit ( 0 ) ;
2021-05-12 10:39:07 +00:00
}
} ) ;
buildLoggers ( config ( ) , logger ( ) ) ;
2021-10-19 14:29:49 +00:00
main_config_reloader - > start ( ) ;
2021-05-12 10:39:07 +00:00
2024-03-18 10:44:56 +00:00
std : : optional < CgroupsMemoryUsageObserver > cgroups_memory_usage_observer ;
2024-07-18 08:31:24 +00:00
try
2024-03-07 16:09:55 +00:00
{
2024-07-18 08:31:24 +00:00
auto wait_time = config ( ) . getUInt64 ( " keeper_server.cgroups_memory_observer_wait_time " , 15 ) ;
if ( wait_time ! = 0 )
2024-03-09 01:28:39 +00:00
{
2024-07-18 08:31:24 +00:00
cgroups_memory_usage_observer . emplace ( std : : chrono : : seconds ( wait_time ) ) ;
2024-03-18 10:44:56 +00:00
/// Not calling cgroups_memory_usage_observer->setLimits() here (as for the normal ClickHouse server) because Keeper controls
/// its memory usage by other means (via setting 'max_memory_usage_soft_limit').
cgroups_memory_usage_observer - > setOnMemoryAmountAvailableChangedFn ( [ & ] ( ) { main_config_reloader - > reload ( ) ; } ) ;
cgroups_memory_usage_observer - > startThread ( ) ;
2024-03-12 22:31:33 +00:00
}
2024-03-07 16:09:55 +00:00
}
2024-07-18 08:31:24 +00:00
catch ( Exception & )
{
tryLogCurrentException ( log , " Disabling cgroup memory observer because of an error during initialization " ) ;
}
2024-03-07 16:09:55 +00:00
2024-07-15 12:08:18 +00:00
# if USE_GWP_ASAN
GWPAsan : : initFinished ( ) ;
# endif
2021-05-12 10:39:07 +00:00
LOG_INFO ( log , " Ready for connections. " ) ;
waitForTerminationRequest ( ) ;
return Application : : EXIT_OK ;
}
2022-11-18 12:22:55 +00:00
catch ( . . . )
{
/// Poco does not provide stacktrace.
tryLogCurrentException ( " Application " ) ;
2023-11-23 17:13:12 +00:00
auto code = getCurrentExceptionCode ( ) ;
2024-11-07 20:28:06 +00:00
return static_cast < UInt8 > ( code ) ? code : - 1 ;
2022-11-18 12:22:55 +00:00
}
2021-05-12 10:39:07 +00:00
2021-05-12 13:04:34 +00:00
void Keeper : : logRevision ( ) const
{
2024-01-23 17:04:50 +00:00
LOG_INFO ( getLogger ( " Application " ) ,
2023-09-06 01:31:46 +00:00
" Starting ClickHouse Keeper {} (revision: {}, git hash: {}, build id: {}), PID {} " ,
VERSION_STRING ,
ClickHouseRevision : : getVersionRevision ( ) ,
2024-08-18 07:05:45 +00:00
GIT_HASH ,
2023-09-06 01:31:46 +00:00
build_id . empty ( ) ? " <unknown> " : build_id ,
getpid ( ) ) ;
2021-05-12 13:04:34 +00:00
}
2021-05-12 10:39:07 +00:00
}