
* move compression header to compression.h * prototype with zstd compression * updated capabilities * no need for resetting compression * left-over reset function * use ZSTD_compressStream() instead of ZSTD_compressStream2() for backwards compatibility * remove call to LZ4_decoderRingBufferSize() * debug signature failures * fix the buffers of lz4 * fix decoding of zstd * detect compression based on initialization; prefer ZSTD over LZ4 * allow both lz4 and zstd * initialize zstd streams * define missing ZSTD_CLEVEL_DEFAULT * log zero compressed size * debug log * flush compression buffer * add sender compression statistics * removed debugging messages * do not fail if zstd is not available * cleanup and buildinfo * fix max message size, use zstd level 1, add compressio ratio reporting * use compression level 1 * fix ratio title * better compression error logs * for backwards compatibility use buffers of COMPRESSION_MAX_CHUNK * switch to default compression level * additional streaming error conditions detection * do not expose compression stats when compression is not enabled * test for the right lz4 functions * moved lz4 and zstd to their own files * add gzip streaming compression * gzip error handling * added unittest for streaming compression * eliminate a copy of the uncompressed data during zstd compression * eliminate not needed zstd allocations * cleanup * decode gzip with Z_SYNC_FLUSH * set the decoding gzip algorithm * user configuration for compression levels and compression algorithms order * fix exclusion of not preferred compressions * remove now obsolete compression define, since gzip is always available * rename compression algorithms order in stream.conf * move common checks in compression.c * cleanup * backwards compatible error checking
1609 lines
65 KiB
C
1609 lines
65 KiB
C
// SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
#include "rrdpush.h"
|
|
|
|
#define WORKER_SENDER_JOB_CONNECT 0
|
|
#define WORKER_SENDER_JOB_PIPE_READ 1
|
|
#define WORKER_SENDER_JOB_SOCKET_RECEIVE 2
|
|
#define WORKER_SENDER_JOB_EXECUTE 3
|
|
#define WORKER_SENDER_JOB_SOCKET_SEND 4
|
|
#define WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE 5
|
|
#define WORKER_SENDER_JOB_DISCONNECT_OVERFLOW 6
|
|
#define WORKER_SENDER_JOB_DISCONNECT_TIMEOUT 7
|
|
#define WORKER_SENDER_JOB_DISCONNECT_POLL_ERROR 8
|
|
#define WORKER_SENDER_JOB_DISCONNECT_SOCKET_ERROR 9
|
|
#define WORKER_SENDER_JOB_DISCONNECT_SSL_ERROR 10
|
|
#define WORKER_SENDER_JOB_DISCONNECT_PARENT_CLOSED 11
|
|
#define WORKER_SENDER_JOB_DISCONNECT_RECEIVE_ERROR 12
|
|
#define WORKER_SENDER_JOB_DISCONNECT_SEND_ERROR 13
|
|
#define WORKER_SENDER_JOB_DISCONNECT_NO_COMPRESSION 14
|
|
#define WORKER_SENDER_JOB_BUFFER_RATIO 15
|
|
#define WORKER_SENDER_JOB_BYTES_RECEIVED 16
|
|
#define WORKER_SENDER_JOB_BYTES_SENT 17
|
|
#define WORKER_SENDER_JOB_BYTES_COMPRESSED 18
|
|
#define WORKER_SENDER_JOB_BYTES_UNCOMPRESSED 19
|
|
#define WORKER_SENDER_JOB_BYTES_COMPRESSION_RATIO 20
|
|
#define WORKER_SENDER_JOB_REPLAY_REQUEST 21
|
|
#define WORKER_SENDER_JOB_FUNCTION_REQUEST 22
|
|
#define WORKER_SENDER_JOB_REPLAY_DICT_SIZE 23
|
|
|
|
#if WORKER_UTILIZATION_MAX_JOB_TYPES < 21
|
|
#error WORKER_UTILIZATION_MAX_JOB_TYPES has to be at least 21
|
|
#endif
|
|
|
|
extern struct config stream_config;
|
|
extern char *netdata_ssl_ca_path;
|
|
extern char *netdata_ssl_ca_file;
|
|
|
|
static __thread BUFFER *sender_thread_buffer = NULL;
|
|
static __thread bool sender_thread_buffer_used = false;
|
|
static __thread time_t sender_thread_buffer_last_reset_s = 0;
|
|
|
|
void sender_thread_buffer_free(void) {
|
|
buffer_free(sender_thread_buffer);
|
|
sender_thread_buffer = NULL;
|
|
sender_thread_buffer_used = false;
|
|
}
|
|
|
|
// Collector thread starting a transmission
|
|
BUFFER *sender_start(struct sender_state *s) {
|
|
if(unlikely(sender_thread_buffer_used))
|
|
fatal("STREAMING: thread buffer is used multiple times concurrently.");
|
|
|
|
if(unlikely(rrdpush_sender_last_buffer_recreate_get(s) > sender_thread_buffer_last_reset_s)) {
|
|
if(unlikely(sender_thread_buffer && sender_thread_buffer->size > THREAD_BUFFER_INITIAL_SIZE)) {
|
|
buffer_free(sender_thread_buffer);
|
|
sender_thread_buffer = NULL;
|
|
}
|
|
}
|
|
|
|
if(unlikely(!sender_thread_buffer)) {
|
|
sender_thread_buffer = buffer_create(THREAD_BUFFER_INITIAL_SIZE, &netdata_buffers_statistics.buffers_streaming);
|
|
sender_thread_buffer_last_reset_s = rrdpush_sender_last_buffer_recreate_get(s);
|
|
}
|
|
|
|
sender_thread_buffer_used = true;
|
|
buffer_flush(sender_thread_buffer);
|
|
return sender_thread_buffer;
|
|
}
|
|
|
|
static inline void rrdpush_sender_thread_close_socket(RRDHOST *host);
|
|
|
|
/*
|
|
* In case of stream compression buffer overflow
|
|
* Inform the user through the error log file and
|
|
* deactivate compression by downgrading the stream protocol.
|
|
*/
|
|
static inline void deactivate_compression(struct sender_state *s) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_NO_COMPRESSION);
|
|
|
|
switch(s->compressor.algorithm) {
|
|
case COMPRESSION_ALGORITHM_MAX:
|
|
case COMPRESSION_ALGORITHM_NONE:
|
|
netdata_log_error("STREAM_COMPRESSION: compression error on 'host:%s' without any compression enabled. Ignoring error.",
|
|
rrdhost_hostname(s->host));
|
|
break;
|
|
|
|
case COMPRESSION_ALGORITHM_GZIP:
|
|
netdata_log_error("STREAM_COMPRESSION: GZIP compression error on 'host:%s'. Disabling GZIP for this node.",
|
|
rrdhost_hostname(s->host));
|
|
s->disabled_capabilities |= STREAM_CAP_GZIP;
|
|
break;
|
|
|
|
case COMPRESSION_ALGORITHM_LZ4:
|
|
netdata_log_error("STREAM_COMPRESSION: LZ4 compression error on 'host:%s'. Disabling ZSTD for this node.",
|
|
rrdhost_hostname(s->host));
|
|
s->disabled_capabilities |= STREAM_CAP_LZ4;
|
|
break;
|
|
|
|
case COMPRESSION_ALGORITHM_ZSTD:
|
|
netdata_log_error("STREAM_COMPRESSION: ZSTD compression error on 'host:%s'. Disabling ZSTD for this node.",
|
|
rrdhost_hostname(s->host));
|
|
s->disabled_capabilities |= STREAM_CAP_ZSTD;
|
|
break;
|
|
}
|
|
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
}
|
|
|
|
#define SENDER_BUFFER_ADAPT_TO_TIMES_MAX_SIZE 3
|
|
|
|
// Collector thread finishing a transmission
|
|
void sender_commit(struct sender_state *s, BUFFER *wb, STREAM_TRAFFIC_TYPE type) {
|
|
|
|
if(unlikely(wb != sender_thread_buffer))
|
|
fatal("STREAMING: sender is trying to commit a buffer that is not this thread's buffer.");
|
|
|
|
if(unlikely(!sender_thread_buffer_used))
|
|
fatal("STREAMING: sender is committing a buffer twice.");
|
|
|
|
sender_thread_buffer_used = false;
|
|
|
|
char *src = (char *)buffer_tostring(wb);
|
|
size_t src_len = buffer_strlen(wb);
|
|
|
|
if(unlikely(!src || !src_len))
|
|
return;
|
|
|
|
sender_lock(s);
|
|
|
|
// FILE *fp = fopen("/tmp/stream.txt", "a");
|
|
// fprintf(fp,
|
|
// "\n--- SEND BEGIN: %s ----\n"
|
|
// "%s"
|
|
// "--- SEND END ----------------------------------------\n"
|
|
// , rrdhost_hostname(s->host), src);
|
|
// fclose(fp);
|
|
|
|
if(unlikely(s->buffer->max_size < (src_len + 1) * SENDER_BUFFER_ADAPT_TO_TIMES_MAX_SIZE)) {
|
|
netdata_log_info("STREAM %s [send to %s]: max buffer size of %zu is too small for a data message of size %zu. Increasing the max buffer size to %d times the max data message size.",
|
|
rrdhost_hostname(s->host), s->connected_to, s->buffer->max_size, buffer_strlen(wb) + 1, SENDER_BUFFER_ADAPT_TO_TIMES_MAX_SIZE);
|
|
|
|
s->buffer->max_size = (src_len + 1) * SENDER_BUFFER_ADAPT_TO_TIMES_MAX_SIZE;
|
|
}
|
|
|
|
if (s->compressor.initialized) {
|
|
while(src_len) {
|
|
size_t size_to_compress = src_len;
|
|
|
|
if(unlikely(size_to_compress > COMPRESSION_MAX_MSG_SIZE)) {
|
|
if (stream_has_capability(s, STREAM_CAP_BINARY))
|
|
size_to_compress = COMPRESSION_MAX_MSG_SIZE;
|
|
else {
|
|
if (size_to_compress > COMPRESSION_MAX_MSG_SIZE) {
|
|
// we need to find the last newline
|
|
// so that the decompressor will have a whole line to work with
|
|
|
|
const char *t = &src[COMPRESSION_MAX_MSG_SIZE];
|
|
while (--t >= src)
|
|
if (unlikely(*t == '\n'))
|
|
break;
|
|
|
|
if (t <= src) {
|
|
size_to_compress = COMPRESSION_MAX_MSG_SIZE;
|
|
} else
|
|
size_to_compress = t - src + 1;
|
|
}
|
|
}
|
|
}
|
|
|
|
const char *dst;
|
|
size_t dst_len = rrdpush_compress(&s->compressor, src, size_to_compress, &dst);
|
|
if (!dst_len) {
|
|
netdata_log_error("STREAM %s [send to %s]: COMPRESSION failed. Resetting compressor and re-trying",
|
|
rrdhost_hostname(s->host), s->connected_to);
|
|
|
|
rrdpush_compression_initialize(s);
|
|
dst_len = rrdpush_compress(&s->compressor, src, size_to_compress, &dst);
|
|
if(!dst_len) {
|
|
netdata_log_error("STREAM %s [send to %s]: COMPRESSION failed again. Deactivating compression",
|
|
rrdhost_hostname(s->host), s->connected_to);
|
|
|
|
deactivate_compression(s);
|
|
sender_unlock(s);
|
|
return;
|
|
}
|
|
}
|
|
|
|
rrdpush_signature_t signature = rrdpush_compress_encode_signature(dst_len);
|
|
|
|
#ifdef NETDATA_INTERNAL_CHECKS
|
|
// check if reversing the signature provides the same length
|
|
size_t decoded_dst_len = rrdpush_decompress_decode_signature((const char *)&signature, sizeof(signature));
|
|
if(decoded_dst_len != dst_len)
|
|
fatal("RRDPUSH COMPRESSION: invalid signature, original payload %zu bytes, "
|
|
"compressed payload length %zu bytes, but signature says payload is %zu bytes",
|
|
size_to_compress, dst_len, decoded_dst_len);
|
|
#endif
|
|
|
|
if(cbuffer_add_unsafe(s->buffer, (const char *)&signature, sizeof(signature)))
|
|
s->flags |= SENDER_FLAG_OVERFLOW;
|
|
else {
|
|
if(cbuffer_add_unsafe(s->buffer, dst, dst_len))
|
|
s->flags |= SENDER_FLAG_OVERFLOW;
|
|
else
|
|
s->sent_bytes_on_this_connection_per_type[type] += dst_len + sizeof(signature);
|
|
}
|
|
|
|
src = src + size_to_compress;
|
|
src_len -= size_to_compress;
|
|
}
|
|
}
|
|
else if(cbuffer_add_unsafe(s->buffer, src, src_len))
|
|
s->flags |= SENDER_FLAG_OVERFLOW;
|
|
else
|
|
s->sent_bytes_on_this_connection_per_type[type] += src_len;
|
|
|
|
replication_recalculate_buffer_used_ratio_unsafe(s);
|
|
|
|
bool signal_sender = false;
|
|
if(!rrdpush_sender_pipe_has_pending_data(s)) {
|
|
rrdpush_sender_pipe_set_pending_data(s);
|
|
signal_sender = true;
|
|
}
|
|
|
|
sender_unlock(s);
|
|
|
|
if(signal_sender)
|
|
rrdpush_signal_sender_to_wake_up(s);
|
|
}
|
|
|
|
static inline void rrdpush_sender_add_host_variable_to_buffer(BUFFER *wb, const RRDVAR_ACQUIRED *rva) {
|
|
buffer_sprintf(
|
|
wb
|
|
, "VARIABLE HOST %s = " NETDATA_DOUBLE_FORMAT "\n"
|
|
, rrdvar_name(rva)
|
|
, rrdvar2number(rva)
|
|
);
|
|
|
|
netdata_log_debug(D_STREAM, "RRDVAR pushed HOST VARIABLE %s = " NETDATA_DOUBLE_FORMAT, rrdvar_name(rva), rrdvar2number(rva));
|
|
}
|
|
|
|
void rrdpush_sender_send_this_host_variable_now(RRDHOST *host, const RRDVAR_ACQUIRED *rva) {
|
|
if(rrdhost_can_send_definitions_to_parent(host)) {
|
|
BUFFER *wb = sender_start(host->sender);
|
|
rrdpush_sender_add_host_variable_to_buffer(wb, rva);
|
|
sender_commit(host->sender, wb, STREAM_TRAFFIC_TYPE_METADATA);
|
|
sender_thread_buffer_free();
|
|
}
|
|
}
|
|
|
|
struct custom_host_variables_callback {
|
|
BUFFER *wb;
|
|
};
|
|
|
|
static int rrdpush_sender_thread_custom_host_variables_callback(const DICTIONARY_ITEM *item __maybe_unused, void *rrdvar_ptr __maybe_unused, void *struct_ptr) {
|
|
const RRDVAR_ACQUIRED *rv = (const RRDVAR_ACQUIRED *)item;
|
|
struct custom_host_variables_callback *tmp = struct_ptr;
|
|
BUFFER *wb = tmp->wb;
|
|
|
|
if(unlikely(rrdvar_flags(rv) & RRDVAR_FLAG_CUSTOM_HOST_VAR && rrdvar_type(rv) == RRDVAR_TYPE_CALCULATED)) {
|
|
rrdpush_sender_add_host_variable_to_buffer(wb, rv);
|
|
return 1;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void rrdpush_sender_thread_send_custom_host_variables(RRDHOST *host) {
|
|
if(rrdhost_can_send_definitions_to_parent(host)) {
|
|
BUFFER *wb = sender_start(host->sender);
|
|
struct custom_host_variables_callback tmp = {
|
|
.wb = wb
|
|
};
|
|
int ret = rrdvar_walkthrough_read(host->rrdvars, rrdpush_sender_thread_custom_host_variables_callback, &tmp);
|
|
(void)ret;
|
|
sender_commit(host->sender, wb, STREAM_TRAFFIC_TYPE_METADATA);
|
|
sender_thread_buffer_free();
|
|
|
|
netdata_log_debug(D_STREAM, "RRDVAR sent %d VARIABLES", ret);
|
|
}
|
|
}
|
|
|
|
// resets all the chart, so that their definitions
|
|
// will be resent to the central netdata
|
|
static void rrdpush_sender_thread_reset_all_charts(RRDHOST *host) {
|
|
RRDSET *st;
|
|
rrdset_foreach_read(st, host) {
|
|
rrdset_flag_clear(st, RRDSET_FLAG_UPSTREAM_EXPOSED | RRDSET_FLAG_SENDER_REPLICATION_IN_PROGRESS);
|
|
rrdset_flag_set(st, RRDSET_FLAG_SENDER_REPLICATION_FINISHED);
|
|
|
|
st->upstream_resync_time_s = 0;
|
|
|
|
RRDDIM *rd;
|
|
rrddim_foreach_read(rd, st)
|
|
rrddim_clear_exposed(rd);
|
|
rrddim_foreach_done(rd);
|
|
}
|
|
rrdset_foreach_done(st);
|
|
|
|
rrdhost_sender_replicating_charts_zero(host);
|
|
}
|
|
|
|
static void rrdpush_sender_cbuffer_recreate_timed(struct sender_state *s, time_t now_s, bool have_mutex, bool force) {
|
|
static __thread time_t last_reset_time_s = 0;
|
|
|
|
if(!force && now_s - last_reset_time_s < 300)
|
|
return;
|
|
|
|
if(!have_mutex)
|
|
sender_lock(s);
|
|
|
|
rrdpush_sender_last_buffer_recreate_set(s, now_s);
|
|
last_reset_time_s = now_s;
|
|
|
|
if(s->buffer && s->buffer->size > CBUFFER_INITIAL_SIZE) {
|
|
size_t max = s->buffer->max_size;
|
|
cbuffer_free(s->buffer);
|
|
s->buffer = cbuffer_new(CBUFFER_INITIAL_SIZE, max, &netdata_buffers_statistics.cbuffers_streaming);
|
|
}
|
|
|
|
sender_thread_buffer_free();
|
|
|
|
if(!have_mutex)
|
|
sender_unlock(s);
|
|
}
|
|
|
|
static void rrdpush_sender_cbuffer_flush(RRDHOST *host) {
|
|
rrdpush_sender_set_flush_time(host->sender);
|
|
|
|
sender_lock(host->sender);
|
|
|
|
// flush the output buffer from any data it may have
|
|
cbuffer_flush(host->sender->buffer);
|
|
rrdpush_sender_cbuffer_recreate_timed(host->sender, now_monotonic_sec(), true, true);
|
|
replication_recalculate_buffer_used_ratio_unsafe(host->sender);
|
|
|
|
sender_unlock(host->sender);
|
|
}
|
|
|
|
static void rrdpush_sender_charts_and_replication_reset(RRDHOST *host) {
|
|
rrdpush_sender_set_flush_time(host->sender);
|
|
|
|
// stop all replication commands inflight
|
|
replication_sender_delete_pending_requests(host->sender);
|
|
|
|
// reset the state of all charts
|
|
rrdpush_sender_thread_reset_all_charts(host);
|
|
|
|
rrdpush_sender_replicating_charts_zero(host->sender);
|
|
}
|
|
|
|
static void rrdpush_sender_on_connect(RRDHOST *host) {
|
|
rrdpush_sender_cbuffer_flush(host);
|
|
rrdpush_sender_charts_and_replication_reset(host);
|
|
}
|
|
|
|
static void rrdpush_sender_after_connect(RRDHOST *host) {
|
|
rrdpush_sender_thread_send_custom_host_variables(host);
|
|
}
|
|
|
|
static inline void rrdpush_sender_thread_close_socket(RRDHOST *host) {
|
|
#ifdef ENABLE_HTTPS
|
|
netdata_ssl_close(&host->sender->ssl);
|
|
#endif
|
|
|
|
if(host->sender->rrdpush_sender_socket != -1) {
|
|
close(host->sender->rrdpush_sender_socket);
|
|
host->sender->rrdpush_sender_socket = -1;
|
|
}
|
|
|
|
rrdhost_flag_clear(host, RRDHOST_FLAG_RRDPUSH_SENDER_READY_4_METRICS);
|
|
rrdhost_flag_clear(host, RRDHOST_FLAG_RRDPUSH_SENDER_CONNECTED);
|
|
|
|
// do not flush the circular buffer here
|
|
// this function is called sometimes with the mutex lock, sometimes without the lock
|
|
rrdpush_sender_charts_and_replication_reset(host);
|
|
}
|
|
|
|
void rrdpush_encode_variable(stream_encoded_t *se, RRDHOST *host)
|
|
{
|
|
se->os_name = (host->system_info->host_os_name)?url_encode(host->system_info->host_os_name):strdupz("");
|
|
se->os_id = (host->system_info->host_os_id)?url_encode(host->system_info->host_os_id):strdupz("");
|
|
se->os_version = (host->system_info->host_os_version)?url_encode(host->system_info->host_os_version):strdupz("");
|
|
se->kernel_name = (host->system_info->kernel_name)?url_encode(host->system_info->kernel_name):strdupz("");
|
|
se->kernel_version = (host->system_info->kernel_version)?url_encode(host->system_info->kernel_version):strdupz("");
|
|
}
|
|
|
|
void rrdpush_clean_encoded(stream_encoded_t *se)
|
|
{
|
|
if (se->os_name)
|
|
freez(se->os_name);
|
|
|
|
if (se->os_id)
|
|
freez(se->os_id);
|
|
|
|
if (se->os_version)
|
|
freez(se->os_version);
|
|
|
|
if (se->kernel_name)
|
|
freez(se->kernel_name);
|
|
|
|
if (se->kernel_version)
|
|
freez(se->kernel_version);
|
|
}
|
|
|
|
struct {
|
|
const char *response;
|
|
size_t length;
|
|
int32_t version;
|
|
bool dynamic;
|
|
const char *error;
|
|
int worker_job_id;
|
|
int postpone_reconnect_seconds;
|
|
bool prevent_log;
|
|
} stream_responses[] = {
|
|
{
|
|
.response = START_STREAMING_PROMPT_VN,
|
|
.length = sizeof(START_STREAMING_PROMPT_VN) - 1,
|
|
.version = STREAM_HANDSHAKE_OK_V3, // and above
|
|
.dynamic = true, // dynamic = we will parse the version / capabilities
|
|
.error = NULL,
|
|
.worker_job_id = 0,
|
|
.postpone_reconnect_seconds = 0,
|
|
},
|
|
{
|
|
.response = START_STREAMING_PROMPT_V2,
|
|
.length = sizeof(START_STREAMING_PROMPT_V2) - 1,
|
|
.version = STREAM_HANDSHAKE_OK_V2,
|
|
.dynamic = false,
|
|
.error = NULL,
|
|
.worker_job_id = 0,
|
|
.postpone_reconnect_seconds = 0,
|
|
},
|
|
{
|
|
.response = START_STREAMING_PROMPT_V1,
|
|
.length = sizeof(START_STREAMING_PROMPT_V1) - 1,
|
|
.version = STREAM_HANDSHAKE_OK_V1,
|
|
.dynamic = false,
|
|
.error = NULL,
|
|
.worker_job_id = 0,
|
|
.postpone_reconnect_seconds = 0,
|
|
},
|
|
{
|
|
.response = START_STREAMING_ERROR_SAME_LOCALHOST,
|
|
.length = sizeof(START_STREAMING_ERROR_SAME_LOCALHOST) - 1,
|
|
.version = STREAM_HANDSHAKE_ERROR_LOCALHOST,
|
|
.dynamic = false,
|
|
.error = "remote server rejected this stream, the host we are trying to stream is its localhost",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 60 * 60, // the IP may change, try it every hour
|
|
.prevent_log = true,
|
|
},
|
|
{
|
|
.response = START_STREAMING_ERROR_ALREADY_STREAMING,
|
|
.length = sizeof(START_STREAMING_ERROR_ALREADY_STREAMING) - 1,
|
|
.version = STREAM_HANDSHAKE_ERROR_ALREADY_CONNECTED,
|
|
.dynamic = false,
|
|
.error = "remote server rejected this stream, the host we are trying to stream is already streamed to it",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 2 * 60, // 2 minutes
|
|
.prevent_log = true,
|
|
},
|
|
{
|
|
.response = START_STREAMING_ERROR_NOT_PERMITTED,
|
|
.length = sizeof(START_STREAMING_ERROR_NOT_PERMITTED) - 1,
|
|
.version = STREAM_HANDSHAKE_ERROR_DENIED,
|
|
.dynamic = false,
|
|
.error = "remote server denied access, probably we don't have the right API key?",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 1 * 60, // 1 minute
|
|
},
|
|
{
|
|
.response = START_STREAMING_ERROR_BUSY_TRY_LATER,
|
|
.length = sizeof(START_STREAMING_ERROR_BUSY_TRY_LATER) - 1,
|
|
.version = STREAM_HANDSHAKE_BUSY_TRY_LATER,
|
|
.dynamic = false,
|
|
.error = "remote server is currently busy, we should try later",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 2 * 60, // 2 minutes
|
|
},
|
|
{
|
|
.response = START_STREAMING_ERROR_INTERNAL_ERROR,
|
|
.length = sizeof(START_STREAMING_ERROR_INTERNAL_ERROR) - 1,
|
|
.version = STREAM_HANDSHAKE_INTERNAL_ERROR,
|
|
.dynamic = false,
|
|
.error = "remote server is encountered an internal error, we should try later",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 5 * 60, // 5 minutes
|
|
},
|
|
{
|
|
.response = START_STREAMING_ERROR_INITIALIZATION,
|
|
.length = sizeof(START_STREAMING_ERROR_INITIALIZATION) - 1,
|
|
.version = STREAM_HANDSHAKE_INITIALIZATION,
|
|
.dynamic = false,
|
|
.error = "remote server is initializing, we should try later",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 2 * 60, // 2 minute
|
|
},
|
|
|
|
// terminator
|
|
{
|
|
.response = NULL,
|
|
.length = 0,
|
|
.version = STREAM_HANDSHAKE_ERROR_BAD_HANDSHAKE,
|
|
.dynamic = false,
|
|
.error = "remote node response is not understood, is it Netdata?",
|
|
.worker_job_id = WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE,
|
|
.postpone_reconnect_seconds = 1 * 60, // 1 minute
|
|
.prevent_log = false,
|
|
}
|
|
};
|
|
|
|
static inline bool rrdpush_sender_validate_response(RRDHOST *host, struct sender_state *s, char *http, size_t http_length) {
|
|
int32_t version = STREAM_HANDSHAKE_ERROR_BAD_HANDSHAKE;
|
|
|
|
int i;
|
|
for(i = 0; stream_responses[i].response ; i++) {
|
|
if(stream_responses[i].dynamic &&
|
|
http_length > stream_responses[i].length && http_length < (stream_responses[i].length + 30) &&
|
|
strncmp(http, stream_responses[i].response, stream_responses[i].length) == 0) {
|
|
|
|
version = str2i(&http[stream_responses[i].length]);
|
|
break;
|
|
}
|
|
else if(http_length == stream_responses[i].length && strcmp(http, stream_responses[i].response) == 0) {
|
|
version = stream_responses[i].version;
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
if(version >= STREAM_HANDSHAKE_OK_V1) {
|
|
host->destination->reason = version;
|
|
host->destination->postpone_reconnection_until = now_realtime_sec() + s->reconnect_delay;
|
|
s->capabilities = convert_stream_version_to_capabilities(version, host, true);
|
|
return true;
|
|
}
|
|
|
|
bool prevent_log = stream_responses[i].prevent_log;
|
|
const char *error = stream_responses[i].error;
|
|
int worker_job_id = stream_responses[i].worker_job_id;
|
|
int delay = stream_responses[i].postpone_reconnect_seconds;
|
|
|
|
worker_is_busy(worker_job_id);
|
|
rrdpush_sender_thread_close_socket(host);
|
|
host->destination->reason = version;
|
|
host->destination->postpone_reconnection_until = now_realtime_sec() + delay;
|
|
|
|
char buf[LOG_DATE_LENGTH];
|
|
log_date(buf, LOG_DATE_LENGTH, host->destination->postpone_reconnection_until);
|
|
|
|
if(prevent_log)
|
|
internal_error(true, "STREAM %s [send to %s]: %s - will retry in %ld secs, at %s",
|
|
rrdhost_hostname(host), s->connected_to, error, delay, buf);
|
|
else
|
|
netdata_log_error("STREAM %s [send to %s]: %s - will retry in %d secs, at %s",
|
|
rrdhost_hostname(host), s->connected_to, error, delay, buf);
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool rrdpush_sender_connect_ssl(struct sender_state *s __maybe_unused) {
|
|
#ifdef ENABLE_HTTPS
|
|
RRDHOST *host = s->host;
|
|
bool ssl_required = host->destination && host->destination->ssl;
|
|
|
|
netdata_ssl_close(&host->sender->ssl);
|
|
|
|
if(!ssl_required)
|
|
return true;
|
|
|
|
if (netdata_ssl_open(&host->sender->ssl, netdata_ssl_streaming_sender_ctx, s->rrdpush_sender_socket)) {
|
|
if(!netdata_ssl_connect(&host->sender->ssl)) {
|
|
// couldn't connect
|
|
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_SSL_ERROR);
|
|
rrdpush_sender_thread_close_socket(host);
|
|
host->destination->reason = STREAM_HANDSHAKE_ERROR_SSL_ERROR;
|
|
host->destination->postpone_reconnection_until = now_realtime_sec() + 5 * 60;
|
|
return false;
|
|
}
|
|
|
|
if (netdata_ssl_validate_certificate_sender &&
|
|
security_test_certificate(host->sender->ssl.conn)) {
|
|
// certificate is not valid
|
|
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_SSL_ERROR);
|
|
netdata_log_error("SSL: closing the stream connection, because the server SSL certificate is not valid.");
|
|
rrdpush_sender_thread_close_socket(host);
|
|
host->destination->reason = STREAM_HANDSHAKE_ERROR_INVALID_CERTIFICATE;
|
|
host->destination->postpone_reconnection_until = now_realtime_sec() + 5 * 60;
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
netdata_log_error("SSL: failed to establish connection.");
|
|
return false;
|
|
|
|
#else
|
|
// SSL is not enabled
|
|
return true;
|
|
#endif
|
|
}
|
|
|
|
static bool rrdpush_sender_thread_connect_to_parent(RRDHOST *host, int default_port, int timeout, struct sender_state *s) {
|
|
|
|
struct timeval tv = {
|
|
.tv_sec = timeout,
|
|
.tv_usec = 0
|
|
};
|
|
|
|
// make sure the socket is closed
|
|
rrdpush_sender_thread_close_socket(host);
|
|
|
|
s->rrdpush_sender_socket = connect_to_one_of_destinations(
|
|
host
|
|
, default_port
|
|
, &tv
|
|
, &s->reconnects_counter
|
|
, s->connected_to
|
|
, sizeof(s->connected_to)-1
|
|
, &host->destination
|
|
);
|
|
|
|
if(unlikely(s->rrdpush_sender_socket == -1)) {
|
|
// netdata_log_error("STREAM %s [send to %s]: could not connect to parent node at this time.", rrdhost_hostname(host), host->rrdpush_send_destination);
|
|
return false;
|
|
}
|
|
|
|
// netdata_log_info("STREAM %s [send to %s]: initializing communication...", rrdhost_hostname(host), s->connected_to);
|
|
|
|
// reset our capabilities to default
|
|
s->capabilities = stream_our_capabilities(host, true);
|
|
|
|
/* TODO: During the implementation of #7265 switch the set of variables to HOST_* and CONTAINER_* if the
|
|
version negotiation resulted in a high enough version.
|
|
*/
|
|
stream_encoded_t se;
|
|
rrdpush_encode_variable(&se, host);
|
|
|
|
host->sender->hops = host->system_info->hops + 1;
|
|
|
|
char http[HTTP_HEADER_SIZE + 1];
|
|
int eol = snprintfz(http, HTTP_HEADER_SIZE,
|
|
"STREAM "
|
|
"key=%s"
|
|
"&hostname=%s"
|
|
"®istry_hostname=%s"
|
|
"&machine_guid=%s"
|
|
"&update_every=%d"
|
|
"&os=%s"
|
|
"&timezone=%s"
|
|
"&abbrev_timezone=%s"
|
|
"&utc_offset=%d"
|
|
"&hops=%d"
|
|
"&ml_capable=%d"
|
|
"&ml_enabled=%d"
|
|
"&mc_version=%d"
|
|
"&tags=%s"
|
|
"&ver=%u"
|
|
"&NETDATA_INSTANCE_CLOUD_TYPE=%s"
|
|
"&NETDATA_INSTANCE_CLOUD_INSTANCE_TYPE=%s"
|
|
"&NETDATA_INSTANCE_CLOUD_INSTANCE_REGION=%s"
|
|
"&NETDATA_SYSTEM_OS_NAME=%s"
|
|
"&NETDATA_SYSTEM_OS_ID=%s"
|
|
"&NETDATA_SYSTEM_OS_ID_LIKE=%s"
|
|
"&NETDATA_SYSTEM_OS_VERSION=%s"
|
|
"&NETDATA_SYSTEM_OS_VERSION_ID=%s"
|
|
"&NETDATA_SYSTEM_OS_DETECTION=%s"
|
|
"&NETDATA_HOST_IS_K8S_NODE=%s"
|
|
"&NETDATA_SYSTEM_KERNEL_NAME=%s"
|
|
"&NETDATA_SYSTEM_KERNEL_VERSION=%s"
|
|
"&NETDATA_SYSTEM_ARCHITECTURE=%s"
|
|
"&NETDATA_SYSTEM_VIRTUALIZATION=%s"
|
|
"&NETDATA_SYSTEM_VIRT_DETECTION=%s"
|
|
"&NETDATA_SYSTEM_CONTAINER=%s"
|
|
"&NETDATA_SYSTEM_CONTAINER_DETECTION=%s"
|
|
"&NETDATA_CONTAINER_OS_NAME=%s"
|
|
"&NETDATA_CONTAINER_OS_ID=%s"
|
|
"&NETDATA_CONTAINER_OS_ID_LIKE=%s"
|
|
"&NETDATA_CONTAINER_OS_VERSION=%s"
|
|
"&NETDATA_CONTAINER_OS_VERSION_ID=%s"
|
|
"&NETDATA_CONTAINER_OS_DETECTION=%s"
|
|
"&NETDATA_SYSTEM_CPU_LOGICAL_CPU_COUNT=%s"
|
|
"&NETDATA_SYSTEM_CPU_FREQ=%s"
|
|
"&NETDATA_SYSTEM_TOTAL_RAM=%s"
|
|
"&NETDATA_SYSTEM_TOTAL_DISK_SIZE=%s"
|
|
"&NETDATA_PROTOCOL_VERSION=%s"
|
|
" HTTP/1.1\r\n"
|
|
"User-Agent: %s/%s\r\n"
|
|
"Accept: */*\r\n\r\n"
|
|
, host->rrdpush_send_api_key
|
|
, rrdhost_hostname(host)
|
|
, rrdhost_registry_hostname(host)
|
|
, host->machine_guid
|
|
, default_rrd_update_every
|
|
, rrdhost_os(host)
|
|
, rrdhost_timezone(host)
|
|
, rrdhost_abbrev_timezone(host)
|
|
, host->utc_offset
|
|
, host->sender->hops
|
|
, host->system_info->ml_capable
|
|
, host->system_info->ml_enabled
|
|
, host->system_info->mc_version
|
|
, rrdhost_tags(host)
|
|
, s->capabilities
|
|
, (host->system_info->cloud_provider_type) ? host->system_info->cloud_provider_type : ""
|
|
, (host->system_info->cloud_instance_type) ? host->system_info->cloud_instance_type : ""
|
|
, (host->system_info->cloud_instance_region) ? host->system_info->cloud_instance_region : ""
|
|
, se.os_name
|
|
, se.os_id
|
|
, (host->system_info->host_os_id_like) ? host->system_info->host_os_id_like : ""
|
|
, se.os_version
|
|
, (host->system_info->host_os_version_id) ? host->system_info->host_os_version_id : ""
|
|
, (host->system_info->host_os_detection) ? host->system_info->host_os_detection : ""
|
|
, (host->system_info->is_k8s_node) ? host->system_info->is_k8s_node : ""
|
|
, se.kernel_name
|
|
, se.kernel_version
|
|
, (host->system_info->architecture) ? host->system_info->architecture : ""
|
|
, (host->system_info->virtualization) ? host->system_info->virtualization : ""
|
|
, (host->system_info->virt_detection) ? host->system_info->virt_detection : ""
|
|
, (host->system_info->container) ? host->system_info->container : ""
|
|
, (host->system_info->container_detection) ? host->system_info->container_detection : ""
|
|
, (host->system_info->container_os_name) ? host->system_info->container_os_name : ""
|
|
, (host->system_info->container_os_id) ? host->system_info->container_os_id : ""
|
|
, (host->system_info->container_os_id_like) ? host->system_info->container_os_id_like : ""
|
|
, (host->system_info->container_os_version) ? host->system_info->container_os_version : ""
|
|
, (host->system_info->container_os_version_id) ? host->system_info->container_os_version_id : ""
|
|
, (host->system_info->container_os_detection) ? host->system_info->container_os_detection : ""
|
|
, (host->system_info->host_cores) ? host->system_info->host_cores : ""
|
|
, (host->system_info->host_cpu_freq) ? host->system_info->host_cpu_freq : ""
|
|
, (host->system_info->host_ram_total) ? host->system_info->host_ram_total : ""
|
|
, (host->system_info->host_disk_space) ? host->system_info->host_disk_space : ""
|
|
, STREAMING_PROTOCOL_VERSION
|
|
, rrdhost_program_name(host)
|
|
, rrdhost_program_version(host)
|
|
);
|
|
http[eol] = 0x00;
|
|
rrdpush_clean_encoded(&se);
|
|
|
|
if(!rrdpush_sender_connect_ssl(s))
|
|
return false;
|
|
|
|
ssize_t bytes, len = (ssize_t)strlen(http);
|
|
|
|
bytes = send_timeout(
|
|
#ifdef ENABLE_HTTPS
|
|
&host->sender->ssl,
|
|
#endif
|
|
s->rrdpush_sender_socket,
|
|
http,
|
|
len,
|
|
0,
|
|
timeout);
|
|
|
|
if(bytes <= 0) { // timeout is 0
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_TIMEOUT);
|
|
rrdpush_sender_thread_close_socket(host);
|
|
netdata_log_error("STREAM %s [send to %s]: failed to send HTTP header to remote netdata.", rrdhost_hostname(host), s->connected_to);
|
|
host->destination->reason = STREAM_HANDSHAKE_ERROR_SEND_TIMEOUT;
|
|
host->destination->postpone_reconnection_until = now_realtime_sec() + 1 * 60;
|
|
return false;
|
|
}
|
|
|
|
bytes = recv_timeout(
|
|
#ifdef ENABLE_HTTPS
|
|
&host->sender->ssl,
|
|
#endif
|
|
s->rrdpush_sender_socket,
|
|
http,
|
|
HTTP_HEADER_SIZE,
|
|
0,
|
|
timeout);
|
|
|
|
if(bytes <= 0) { // timeout is 0
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_TIMEOUT);
|
|
rrdpush_sender_thread_close_socket(host);
|
|
netdata_log_error("STREAM %s [send to %s]: remote netdata does not respond.", rrdhost_hostname(host), s->connected_to);
|
|
host->destination->reason = STREAM_HANDSHAKE_ERROR_RECEIVE_TIMEOUT;
|
|
host->destination->postpone_reconnection_until = now_realtime_sec() + 30;
|
|
return false;
|
|
}
|
|
|
|
if(sock_setnonblock(s->rrdpush_sender_socket) < 0)
|
|
netdata_log_error("STREAM %s [send to %s]: cannot set non-blocking mode for socket.", rrdhost_hostname(host), s->connected_to);
|
|
|
|
if(sock_enlarge_out(s->rrdpush_sender_socket) < 0)
|
|
netdata_log_error("STREAM %s [send to %s]: cannot enlarge the socket buffer.", rrdhost_hostname(host), s->connected_to);
|
|
|
|
http[bytes] = '\0';
|
|
netdata_log_debug(D_STREAM, "Response to sender from far end: %s", http);
|
|
if(!rrdpush_sender_validate_response(host, s, http, bytes))
|
|
return false;
|
|
|
|
rrdpush_compression_initialize(s);
|
|
|
|
log_sender_capabilities(s);
|
|
|
|
netdata_log_debug(D_STREAM, "STREAM: Connected on fd %d...", s->rrdpush_sender_socket);
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool attempt_to_connect(struct sender_state *state)
|
|
{
|
|
state->send_attempts = 0;
|
|
|
|
// reset the bytes we have sent for this session
|
|
state->sent_bytes_on_this_connection = 0;
|
|
memset(state->sent_bytes_on_this_connection_per_type, 0, sizeof(state->sent_bytes_on_this_connection_per_type));
|
|
|
|
if(rrdpush_sender_thread_connect_to_parent(state->host, state->default_port, state->timeout, state)) {
|
|
// reset the buffer, to properly send charts and metrics
|
|
rrdpush_sender_on_connect(state->host);
|
|
|
|
// send from the beginning
|
|
state->begin = 0;
|
|
|
|
// make sure the next reconnection will be immediate
|
|
state->not_connected_loops = 0;
|
|
|
|
// let the data collection threads know we are ready
|
|
rrdhost_flag_set(state->host, RRDHOST_FLAG_RRDPUSH_SENDER_CONNECTED);
|
|
|
|
rrdpush_sender_after_connect(state->host);
|
|
|
|
return true;
|
|
}
|
|
|
|
// we couldn't connect
|
|
|
|
// increase the failed connections counter
|
|
state->not_connected_loops++;
|
|
|
|
// slow re-connection on repeating errors
|
|
usec_t now_ut = now_monotonic_usec();
|
|
usec_t end_ut = now_ut + USEC_PER_SEC * state->reconnect_delay;
|
|
while(now_ut < end_ut) {
|
|
netdata_thread_testcancel();
|
|
sleep_usec(500 * USEC_PER_MS); // seconds
|
|
now_ut = now_monotonic_usec();
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// TCP window is open, and we have data to transmit.
|
|
static ssize_t attempt_to_send(struct sender_state *s) {
|
|
ssize_t ret;
|
|
|
|
#ifdef NETDATA_INTERNAL_CHECKS
|
|
struct circular_buffer *cb = s->buffer;
|
|
#endif
|
|
|
|
sender_lock(s);
|
|
char *chunk;
|
|
size_t outstanding = cbuffer_next_unsafe(s->buffer, &chunk);
|
|
netdata_log_debug(D_STREAM, "STREAM: Sending data. Buffer r=%zu w=%zu s=%zu, next chunk=%zu", cb->read, cb->write, cb->size, outstanding);
|
|
|
|
#ifdef ENABLE_HTTPS
|
|
if(SSL_connection(&s->ssl))
|
|
ret = netdata_ssl_write(&s->ssl, chunk, outstanding);
|
|
else
|
|
ret = send(s->rrdpush_sender_socket, chunk, outstanding, MSG_DONTWAIT);
|
|
#else
|
|
ret = send(s->rrdpush_sender_socket, chunk, outstanding, MSG_DONTWAIT);
|
|
#endif
|
|
|
|
if (likely(ret > 0)) {
|
|
cbuffer_remove_unsafe(s->buffer, ret);
|
|
s->sent_bytes_on_this_connection += ret;
|
|
s->sent_bytes += ret;
|
|
netdata_log_debug(D_STREAM, "STREAM %s [send to %s]: Sent %zd bytes", rrdhost_hostname(s->host), s->connected_to, ret);
|
|
}
|
|
else if (ret == -1 && (errno == EAGAIN || errno == EINTR || errno == EWOULDBLOCK))
|
|
netdata_log_debug(D_STREAM, "STREAM %s [send to %s]: unavailable after polling POLLOUT", rrdhost_hostname(s->host), s->connected_to);
|
|
else if (ret == -1) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_SEND_ERROR);
|
|
netdata_log_debug(D_STREAM, "STREAM: Send failed - closing socket...");
|
|
netdata_log_error("STREAM %s [send to %s]: failed to send metrics - closing connection - we have sent %zu bytes on this connection.", rrdhost_hostname(s->host), s->connected_to, s->sent_bytes_on_this_connection);
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
}
|
|
else
|
|
netdata_log_debug(D_STREAM, "STREAM: send() returned 0 -> no error but no transmission");
|
|
|
|
replication_recalculate_buffer_used_ratio_unsafe(s);
|
|
sender_unlock(s);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static ssize_t attempt_read(struct sender_state *s) {
|
|
ssize_t ret;
|
|
|
|
#ifdef ENABLE_HTTPS
|
|
if (SSL_connection(&s->ssl))
|
|
ret = netdata_ssl_read(&s->ssl, s->read_buffer + s->read_len, sizeof(s->read_buffer) - s->read_len - 1);
|
|
else
|
|
ret = recv(s->rrdpush_sender_socket, s->read_buffer + s->read_len, sizeof(s->read_buffer) - s->read_len - 1,MSG_DONTWAIT);
|
|
#else
|
|
ret = recv(s->rrdpush_sender_socket, s->read_buffer + s->read_len, sizeof(s->read_buffer) - s->read_len - 1,MSG_DONTWAIT);
|
|
#endif
|
|
|
|
if (ret > 0) {
|
|
s->read_len += ret;
|
|
return ret;
|
|
}
|
|
|
|
if (ret < 0 && (errno == EAGAIN || errno == EWOULDBLOCK || errno == EINTR))
|
|
return ret;
|
|
|
|
#ifdef ENABLE_HTTPS
|
|
if (SSL_connection(&s->ssl))
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_SSL_ERROR);
|
|
else
|
|
#endif
|
|
|
|
if (ret == 0 || errno == ECONNRESET) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_PARENT_CLOSED);
|
|
netdata_log_error("STREAM %s [send to %s]: connection closed by far end.", rrdhost_hostname(s->host), s->connected_to);
|
|
}
|
|
else {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_RECEIVE_ERROR);
|
|
netdata_log_error("STREAM %s [send to %s]: error during receive (%zd) - closing connection.", rrdhost_hostname(s->host), s->connected_to, ret);
|
|
}
|
|
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
|
|
return ret;
|
|
}
|
|
|
|
struct inflight_stream_function {
|
|
struct sender_state *sender;
|
|
STRING *transaction;
|
|
usec_t received_ut;
|
|
};
|
|
|
|
void stream_execute_function_callback(BUFFER *func_wb, int code, void *data) {
|
|
struct inflight_stream_function *tmp = data;
|
|
|
|
struct sender_state *s = tmp->sender;
|
|
|
|
if(rrdhost_can_send_definitions_to_parent(s->host)) {
|
|
BUFFER *wb = sender_start(s);
|
|
|
|
pluginsd_function_result_begin_to_buffer(wb
|
|
, string2str(tmp->transaction)
|
|
, code
|
|
, functions_content_type_to_format(func_wb->content_type)
|
|
, func_wb->expires);
|
|
|
|
buffer_fast_strcat(wb, buffer_tostring(func_wb), buffer_strlen(func_wb));
|
|
pluginsd_function_result_end_to_buffer(wb);
|
|
|
|
sender_commit(s, wb, STREAM_TRAFFIC_TYPE_FUNCTIONS);
|
|
sender_thread_buffer_free();
|
|
|
|
internal_error(true, "STREAM %s [send to %s] FUNCTION transaction %s sending back response (%zu bytes, %"PRIu64" usec).",
|
|
rrdhost_hostname(s->host), s->connected_to,
|
|
string2str(tmp->transaction),
|
|
buffer_strlen(func_wb),
|
|
now_realtime_usec() - tmp->received_ut);
|
|
}
|
|
|
|
string_freez(tmp->transaction);
|
|
buffer_free(func_wb);
|
|
freez(tmp);
|
|
}
|
|
|
|
// This is just a placeholder until the gap filling state machine is inserted
|
|
void execute_commands(struct sender_state *s) {
|
|
worker_is_busy(WORKER_SENDER_JOB_EXECUTE);
|
|
|
|
char *start = s->read_buffer, *end = &s->read_buffer[s->read_len], *newline;
|
|
*end = 0;
|
|
while( start < end && (newline = strchr(start, '\n')) ) {
|
|
*newline = '\0';
|
|
|
|
if (s->receiving_function_payload && unlikely(strcmp(start, PLUGINSD_KEYWORD_FUNCTION_PAYLOAD_END) != 0)) {
|
|
if (buffer_strlen(s->function_payload.payload) != 0)
|
|
buffer_strcat(s->function_payload.payload, "\n");
|
|
buffer_strcat(s->function_payload.payload, start);
|
|
start = newline + 1;
|
|
continue;
|
|
}
|
|
|
|
netdata_log_access("STREAM: %d from '%s' for host '%s': %s",
|
|
gettid(), s->connected_to, rrdhost_hostname(s->host), start);
|
|
|
|
// internal_error(true, "STREAM %s [send to %s] received command over connection: %s", rrdhost_hostname(s->host), s->connected_to, start);
|
|
|
|
char *words[PLUGINSD_MAX_WORDS] = { NULL };
|
|
size_t num_words = quoted_strings_splitter_pluginsd(start, words, PLUGINSD_MAX_WORDS);
|
|
|
|
const char *keyword = get_word(words, num_words, 0);
|
|
|
|
if(keyword && (strcmp(keyword, PLUGINSD_KEYWORD_FUNCTION) == 0 || strcmp(keyword, PLUGINSD_KEYWORD_FUNCTION_PAYLOAD_END) == 0)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_FUNCTION_REQUEST);
|
|
|
|
char *transaction = s->receiving_function_payload ? s->function_payload.txid : get_word(words, num_words, 1);
|
|
char *timeout_s = s->receiving_function_payload ? s->function_payload.timeout : get_word(words, num_words, 2);
|
|
char *function = s->receiving_function_payload ? s->function_payload.fn_name : get_word(words, num_words, 3);
|
|
|
|
if(!transaction || !*transaction || !timeout_s || !*timeout_s || !function || !*function) {
|
|
netdata_log_error("STREAM %s [send to %s] %s execution command is incomplete (transaction = '%s', timeout = '%s', function = '%s'). Ignoring it.",
|
|
rrdhost_hostname(s->host), s->connected_to,
|
|
keyword,
|
|
transaction?transaction:"(unset)",
|
|
timeout_s?timeout_s:"(unset)",
|
|
function?function:"(unset)");
|
|
}
|
|
else {
|
|
int timeout = str2i(timeout_s);
|
|
if(timeout <= 0) timeout = PLUGINS_FUNCTIONS_TIMEOUT_DEFAULT;
|
|
|
|
struct inflight_stream_function *tmp = callocz(1, sizeof(struct inflight_stream_function));
|
|
tmp->received_ut = now_realtime_usec();
|
|
tmp->sender = s;
|
|
tmp->transaction = string_strdupz(transaction);
|
|
BUFFER *wb = buffer_create(PLUGINSD_LINE_MAX + 1, &netdata_buffers_statistics.buffers_functions);
|
|
|
|
char *payload = s->receiving_function_payload ? (char *)buffer_tostring(s->function_payload.payload) : NULL;
|
|
int code = rrd_function_run(s->host, wb, timeout, function, false, transaction,
|
|
stream_execute_function_callback, tmp, NULL, NULL, payload);
|
|
|
|
if(code != HTTP_RESP_OK) {
|
|
if (!buffer_strlen(wb))
|
|
rrd_call_function_error(wb, "Failed to route request to collector", code);
|
|
|
|
stream_execute_function_callback(wb, code, tmp);
|
|
}
|
|
}
|
|
|
|
if (s->receiving_function_payload) {
|
|
s->receiving_function_payload = false;
|
|
|
|
buffer_free(s->function_payload.payload);
|
|
freez(s->function_payload.txid);
|
|
freez(s->function_payload.timeout);
|
|
freez(s->function_payload.fn_name);
|
|
|
|
memset(&s->function_payload, 0, sizeof(struct function_payload_state));
|
|
}
|
|
}
|
|
else if (keyword && strcmp(keyword, PLUGINSD_KEYWORD_FUNCTION_PAYLOAD) == 0) {
|
|
if (s->receiving_function_payload) {
|
|
netdata_log_error("STREAM %s [send to %s] received %s command while already receiving function payload", rrdhost_hostname(s->host), s->connected_to, keyword);
|
|
s->receiving_function_payload = false;
|
|
buffer_free(s->function_payload.payload);
|
|
s->function_payload.payload = NULL;
|
|
|
|
// TODO send error response
|
|
}
|
|
|
|
char *transaction = get_word(words, num_words, 1);
|
|
char *timeout_s = get_word(words, num_words, 2);
|
|
char *function = get_word(words, num_words, 3);
|
|
|
|
if(!transaction || !*transaction || !timeout_s || !*timeout_s || !function || !*function) {
|
|
netdata_log_error("STREAM %s [send to %s] %s execution command is incomplete (transaction = '%s', timeout = '%s', function = '%s'). Ignoring it.",
|
|
rrdhost_hostname(s->host), s->connected_to,
|
|
keyword,
|
|
transaction?transaction:"(unset)",
|
|
timeout_s?timeout_s:"(unset)",
|
|
function?function:"(unset)");
|
|
}
|
|
|
|
s->receiving_function_payload = true;
|
|
s->function_payload.payload = buffer_create(4096, &netdata_buffers_statistics.buffers_functions);
|
|
|
|
s->function_payload.txid = strdupz(get_word(words, num_words, 1));
|
|
s->function_payload.timeout = strdupz(get_word(words, num_words, 2));
|
|
s->function_payload.fn_name = strdupz(get_word(words, num_words, 3));
|
|
}
|
|
else if(keyword && strcmp(keyword, PLUGINSD_KEYWORD_FUNCTION_CANCEL) == 0) {
|
|
worker_is_busy(WORKER_SENDER_JOB_FUNCTION_REQUEST);
|
|
|
|
char *transaction = get_word(words, num_words, 1);
|
|
if(transaction && *transaction)
|
|
rrd_function_cancel(transaction);
|
|
}
|
|
else if (keyword && strcmp(keyword, PLUGINSD_KEYWORD_REPLAY_CHART) == 0) {
|
|
worker_is_busy(WORKER_SENDER_JOB_REPLAY_REQUEST);
|
|
|
|
const char *chart_id = get_word(words, num_words, 1);
|
|
const char *start_streaming = get_word(words, num_words, 2);
|
|
const char *after = get_word(words, num_words, 3);
|
|
const char *before = get_word(words, num_words, 4);
|
|
|
|
if (!chart_id || !start_streaming || !after || !before) {
|
|
netdata_log_error("STREAM %s [send to %s] %s command is incomplete"
|
|
" (chart=%s, start_streaming=%s, after=%s, before=%s)",
|
|
rrdhost_hostname(s->host), s->connected_to,
|
|
keyword,
|
|
chart_id ? chart_id : "(unset)",
|
|
start_streaming ? start_streaming : "(unset)",
|
|
after ? after : "(unset)",
|
|
before ? before : "(unset)");
|
|
}
|
|
else {
|
|
replication_add_request(s, chart_id,
|
|
strtoll(after, NULL, 0),
|
|
strtoll(before, NULL, 0),
|
|
!strcmp(start_streaming, "true")
|
|
);
|
|
}
|
|
}
|
|
else {
|
|
netdata_log_error("STREAM %s [send to %s] received unknown command over connection: %s", rrdhost_hostname(s->host), s->connected_to, words[0]?words[0]:"(unset)");
|
|
}
|
|
|
|
worker_is_busy(WORKER_SENDER_JOB_EXECUTE);
|
|
start = newline + 1;
|
|
}
|
|
if (start < end) {
|
|
memmove(s->read_buffer, start, end-start);
|
|
s->read_len = end - start;
|
|
}
|
|
else {
|
|
s->read_buffer[0] = '\0';
|
|
s->read_len = 0;
|
|
}
|
|
}
|
|
|
|
struct rrdpush_sender_thread_data {
|
|
RRDHOST *host;
|
|
char *pipe_buffer;
|
|
};
|
|
|
|
static bool rrdpush_sender_pipe_close(RRDHOST *host, int *pipe_fds, bool reopen) {
|
|
static netdata_mutex_t mutex = NETDATA_MUTEX_INITIALIZER;
|
|
|
|
bool ret = true;
|
|
|
|
netdata_mutex_lock(&mutex);
|
|
|
|
int new_pipe_fds[2];
|
|
if(reopen) {
|
|
if(pipe(new_pipe_fds) != 0) {
|
|
netdata_log_error("STREAM %s [send]: cannot create required pipe.", rrdhost_hostname(host));
|
|
new_pipe_fds[PIPE_READ] = -1;
|
|
new_pipe_fds[PIPE_WRITE] = -1;
|
|
ret = false;
|
|
}
|
|
}
|
|
|
|
int old_pipe_fds[2];
|
|
old_pipe_fds[PIPE_READ] = pipe_fds[PIPE_READ];
|
|
old_pipe_fds[PIPE_WRITE] = pipe_fds[PIPE_WRITE];
|
|
|
|
if(reopen) {
|
|
pipe_fds[PIPE_READ] = new_pipe_fds[PIPE_READ];
|
|
pipe_fds[PIPE_WRITE] = new_pipe_fds[PIPE_WRITE];
|
|
}
|
|
else {
|
|
pipe_fds[PIPE_READ] = -1;
|
|
pipe_fds[PIPE_WRITE] = -1;
|
|
}
|
|
|
|
if(old_pipe_fds[PIPE_READ] > 2)
|
|
close(old_pipe_fds[PIPE_READ]);
|
|
|
|
if(old_pipe_fds[PIPE_WRITE] > 2)
|
|
close(old_pipe_fds[PIPE_WRITE]);
|
|
|
|
netdata_mutex_unlock(&mutex);
|
|
return ret;
|
|
}
|
|
|
|
void rrdpush_signal_sender_to_wake_up(struct sender_state *s) {
|
|
if(unlikely(s->tid == gettid()))
|
|
return;
|
|
|
|
RRDHOST *host = s->host;
|
|
|
|
int pipe_fd = s->rrdpush_sender_pipe[PIPE_WRITE];
|
|
|
|
// signal the sender there are more data
|
|
if (pipe_fd != -1 && write(pipe_fd, " ", 1) == -1) {
|
|
netdata_log_error("STREAM %s [send]: cannot write to internal pipe.", rrdhost_hostname(host));
|
|
rrdpush_sender_pipe_close(host, s->rrdpush_sender_pipe, true);
|
|
}
|
|
}
|
|
|
|
static bool rrdhost_set_sender(RRDHOST *host) {
|
|
if(unlikely(!host->sender)) return false;
|
|
|
|
bool ret = false;
|
|
sender_lock(host->sender);
|
|
if(!host->sender->tid) {
|
|
rrdhost_flag_clear(host, RRDHOST_FLAG_RRDPUSH_SENDER_CONNECTED | RRDHOST_FLAG_RRDPUSH_SENDER_READY_4_METRICS);
|
|
rrdhost_flag_set(host, RRDHOST_FLAG_RRDPUSH_SENDER_SPAWN);
|
|
host->rrdpush_sender_connection_counter++;
|
|
host->sender->tid = gettid();
|
|
host->sender->last_state_since_t = now_realtime_sec();
|
|
host->sender->exit.reason = STREAM_HANDSHAKE_NEVER;
|
|
ret = true;
|
|
}
|
|
sender_unlock(host->sender);
|
|
|
|
rrdpush_reset_destinations_postpone_time(host);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void rrdhost_clear_sender___while_having_sender_mutex(RRDHOST *host) {
|
|
if(unlikely(!host->sender)) return;
|
|
|
|
if(host->sender->tid == gettid()) {
|
|
host->sender->tid = 0;
|
|
host->sender->exit.shutdown = false;
|
|
rrdhost_flag_clear(host, RRDHOST_FLAG_RRDPUSH_SENDER_SPAWN | RRDHOST_FLAG_RRDPUSH_SENDER_CONNECTED | RRDHOST_FLAG_RRDPUSH_SENDER_READY_4_METRICS);
|
|
host->sender->last_state_since_t = now_realtime_sec();
|
|
if(host->destination) {
|
|
host->destination->since = host->sender->last_state_since_t;
|
|
host->destination->reason = host->sender->exit.reason;
|
|
}
|
|
}
|
|
|
|
rrdpush_reset_destinations_postpone_time(host);
|
|
}
|
|
|
|
static bool rrdhost_sender_should_exit(struct sender_state *s) {
|
|
// check for outstanding cancellation requests
|
|
netdata_thread_testcancel();
|
|
|
|
if(unlikely(!service_running(SERVICE_STREAMING))) {
|
|
if(!s->exit.reason)
|
|
s->exit.reason = STREAM_HANDSHAKE_DISCONNECT_NETDATA_EXIT;
|
|
return true;
|
|
}
|
|
|
|
if(unlikely(!rrdhost_has_rrdpush_sender_enabled(s->host))) {
|
|
if(!s->exit.reason)
|
|
s->exit.reason = STREAM_HANDSHAKE_NON_STREAMABLE_HOST;
|
|
return true;
|
|
}
|
|
|
|
if(unlikely(s->exit.shutdown)) {
|
|
if(!s->exit.reason)
|
|
s->exit.reason = STREAM_HANDSHAKE_DISCONNECT_SHUTDOWN;
|
|
return true;
|
|
}
|
|
|
|
if(unlikely(rrdhost_flag_check(s->host, RRDHOST_FLAG_ORPHAN))) {
|
|
if(!s->exit.reason)
|
|
s->exit.reason = STREAM_HANDSHAKE_DISCONNECT_ORPHAN_HOST;
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static void rrdpush_sender_thread_cleanup_callback(void *ptr) {
|
|
struct rrdpush_sender_thread_data *s = ptr;
|
|
worker_unregister();
|
|
|
|
RRDHOST *host = s->host;
|
|
|
|
sender_lock(host->sender);
|
|
netdata_log_info("STREAM %s [send]: sending thread exits %s",
|
|
rrdhost_hostname(host),
|
|
host->sender->exit.reason != STREAM_HANDSHAKE_NEVER ? stream_handshake_error_to_string(host->sender->exit.reason) : "");
|
|
|
|
rrdpush_sender_thread_close_socket(host);
|
|
rrdpush_sender_pipe_close(host, host->sender->rrdpush_sender_pipe, false);
|
|
|
|
rrdhost_clear_sender___while_having_sender_mutex(host);
|
|
sender_unlock(host->sender);
|
|
|
|
freez(s->pipe_buffer);
|
|
freez(s);
|
|
}
|
|
|
|
void rrdpush_initialize_ssl_ctx(RRDHOST *host __maybe_unused) {
|
|
#ifdef ENABLE_HTTPS
|
|
static SPINLOCK sp = NETDATA_SPINLOCK_INITIALIZER;
|
|
spinlock_lock(&sp);
|
|
|
|
if(netdata_ssl_streaming_sender_ctx || !host) {
|
|
spinlock_unlock(&sp);
|
|
return;
|
|
}
|
|
|
|
for(struct rrdpush_destinations *d = host->destinations; d ; d = d->next) {
|
|
if (d->ssl) {
|
|
// we need to initialize SSL
|
|
|
|
netdata_ssl_initialize_ctx(NETDATA_SSL_STREAMING_SENDER_CTX);
|
|
ssl_security_location_for_context(netdata_ssl_streaming_sender_ctx, netdata_ssl_ca_file, netdata_ssl_ca_path);
|
|
|
|
// stop the loop
|
|
break;
|
|
}
|
|
}
|
|
|
|
spinlock_unlock(&sp);
|
|
#endif
|
|
}
|
|
|
|
void *rrdpush_sender_thread(void *ptr) {
|
|
worker_register("STREAMSND");
|
|
worker_register_job_name(WORKER_SENDER_JOB_CONNECT, "connect");
|
|
worker_register_job_name(WORKER_SENDER_JOB_PIPE_READ, "pipe read");
|
|
worker_register_job_name(WORKER_SENDER_JOB_SOCKET_RECEIVE, "receive");
|
|
worker_register_job_name(WORKER_SENDER_JOB_EXECUTE, "execute");
|
|
worker_register_job_name(WORKER_SENDER_JOB_SOCKET_SEND, "send");
|
|
|
|
// disconnection reasons
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_TIMEOUT, "disconnect timeout");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_POLL_ERROR, "disconnect poll error");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_SOCKET_ERROR, "disconnect socket error");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_OVERFLOW, "disconnect overflow");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_SSL_ERROR, "disconnect ssl error");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_PARENT_CLOSED, "disconnect parent closed");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_RECEIVE_ERROR, "disconnect receive error");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_SEND_ERROR, "disconnect send error");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_NO_COMPRESSION, "disconnect no compression");
|
|
worker_register_job_name(WORKER_SENDER_JOB_DISCONNECT_BAD_HANDSHAKE, "disconnect bad handshake");
|
|
|
|
worker_register_job_name(WORKER_SENDER_JOB_REPLAY_REQUEST, "replay request");
|
|
worker_register_job_name(WORKER_SENDER_JOB_FUNCTION_REQUEST, "function");
|
|
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_BUFFER_RATIO, "used buffer ratio", "%", WORKER_METRIC_ABSOLUTE);
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_BYTES_RECEIVED, "bytes received", "bytes/s", WORKER_METRIC_INCREMENT);
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_BYTES_SENT, "bytes sent", "bytes/s", WORKER_METRIC_INCREMENT);
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_BYTES_COMPRESSED, "bytes compressed", "bytes/s", WORKER_METRIC_INCREMENTAL_TOTAL);
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_BYTES_UNCOMPRESSED, "bytes uncompressed", "bytes/s", WORKER_METRIC_INCREMENTAL_TOTAL);
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_BYTES_COMPRESSION_RATIO, "cumulative compression savings ratio", "%", WORKER_METRIC_ABSOLUTE);
|
|
worker_register_job_custom_metric(WORKER_SENDER_JOB_REPLAY_DICT_SIZE, "replication dict entries", "entries", WORKER_METRIC_ABSOLUTE);
|
|
|
|
struct sender_state *s = ptr;
|
|
|
|
if(!rrdhost_has_rrdpush_sender_enabled(s->host) || !s->host->rrdpush_send_destination ||
|
|
!*s->host->rrdpush_send_destination || !s->host->rrdpush_send_api_key ||
|
|
!*s->host->rrdpush_send_api_key) {
|
|
netdata_log_error("STREAM %s [send]: thread created (task id %d), but host has streaming disabled.",
|
|
rrdhost_hostname(s->host), gettid());
|
|
return NULL;
|
|
}
|
|
|
|
if(!rrdhost_set_sender(s->host)) {
|
|
netdata_log_error("STREAM %s [send]: thread created (task id %d), but there is another sender running for this host.",
|
|
rrdhost_hostname(s->host), gettid());
|
|
return NULL;
|
|
}
|
|
|
|
rrdpush_initialize_ssl_ctx(s->host);
|
|
|
|
netdata_log_info("STREAM %s [send]: thread created (task id %d)", rrdhost_hostname(s->host), gettid());
|
|
|
|
s->timeout = (int)appconfig_get_number(
|
|
&stream_config, CONFIG_SECTION_STREAM, "timeout seconds", 600);
|
|
|
|
s->default_port = (int)appconfig_get_number(
|
|
&stream_config, CONFIG_SECTION_STREAM, "default port", 19999);
|
|
|
|
s->buffer->max_size = (size_t)appconfig_get_number(
|
|
&stream_config, CONFIG_SECTION_STREAM, "buffer size bytes", 1024 * 1024 * 10);
|
|
|
|
s->reconnect_delay = (unsigned int)appconfig_get_number(
|
|
&stream_config, CONFIG_SECTION_STREAM, "reconnect delay seconds", 5);
|
|
|
|
remote_clock_resync_iterations = (unsigned int)appconfig_get_number(
|
|
&stream_config, CONFIG_SECTION_STREAM,
|
|
"initial clock resync iterations",
|
|
remote_clock_resync_iterations); // TODO: REMOVE FOR SLEW / GAPFILLING
|
|
|
|
// initialize rrdpush globals
|
|
rrdhost_flag_clear(s->host, RRDHOST_FLAG_RRDPUSH_SENDER_READY_4_METRICS);
|
|
rrdhost_flag_clear(s->host, RRDHOST_FLAG_RRDPUSH_SENDER_CONNECTED);
|
|
|
|
int pipe_buffer_size = 10 * 1024;
|
|
#ifdef F_GETPIPE_SZ
|
|
pipe_buffer_size = fcntl(s->rrdpush_sender_pipe[PIPE_READ], F_GETPIPE_SZ);
|
|
#endif
|
|
if(pipe_buffer_size < 10 * 1024)
|
|
pipe_buffer_size = 10 * 1024;
|
|
|
|
if(!rrdpush_sender_pipe_close(s->host, s->rrdpush_sender_pipe, true)) {
|
|
netdata_log_error("STREAM %s [send]: cannot create inter-thread communication pipe. Disabling streaming.",
|
|
rrdhost_hostname(s->host));
|
|
return NULL;
|
|
}
|
|
|
|
struct rrdpush_sender_thread_data *thread_data = callocz(1, sizeof(struct rrdpush_sender_thread_data));
|
|
thread_data->pipe_buffer = mallocz(pipe_buffer_size);
|
|
thread_data->host = s->host;
|
|
|
|
netdata_thread_cleanup_push(rrdpush_sender_thread_cleanup_callback, thread_data);
|
|
|
|
size_t iterations = 0;
|
|
time_t now_s = now_monotonic_sec();
|
|
while(!rrdhost_sender_should_exit(s)) {
|
|
iterations++;
|
|
|
|
// The connection attempt blocks (after which we use the socket in nonblocking)
|
|
if(unlikely(s->rrdpush_sender_socket == -1)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_CONNECT);
|
|
|
|
now_s = now_monotonic_sec();
|
|
rrdpush_sender_cbuffer_recreate_timed(s, now_s, false, true);
|
|
|
|
rrdhost_flag_clear(s->host, RRDHOST_FLAG_RRDPUSH_SENDER_READY_4_METRICS);
|
|
s->flags &= ~SENDER_FLAG_OVERFLOW;
|
|
s->read_len = 0;
|
|
s->buffer->read = 0;
|
|
s->buffer->write = 0;
|
|
|
|
if(!attempt_to_connect(s))
|
|
continue;
|
|
|
|
if(rrdhost_sender_should_exit(s))
|
|
break;
|
|
|
|
now_s = s->last_traffic_seen_t = now_monotonic_sec();
|
|
rrdpush_send_claimed_id(s->host);
|
|
rrdpush_send_host_labels(s->host);
|
|
rrdpush_send_global_functions(s->host);
|
|
rrdpush_send_dyncfg(s->host);
|
|
s->replication.oldest_request_after_t = 0;
|
|
|
|
rrdhost_flag_set(s->host, RRDHOST_FLAG_RRDPUSH_SENDER_READY_4_METRICS);
|
|
netdata_log_info("STREAM %s [send to %s]: enabling metrics streaming...", rrdhost_hostname(s->host), s->connected_to);
|
|
|
|
continue;
|
|
}
|
|
|
|
if(iterations % 1000 == 0)
|
|
now_s = now_monotonic_sec();
|
|
|
|
// If the TCP window never opened then something is wrong, restart connection
|
|
if(unlikely(now_s - s->last_traffic_seen_t > s->timeout &&
|
|
!rrdpush_sender_pending_replication_requests(s) &&
|
|
!rrdpush_sender_replicating_charts(s)
|
|
)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_TIMEOUT);
|
|
netdata_log_error("STREAM %s [send to %s]: could not send metrics for %d seconds - closing connection - we have sent %zu bytes on this connection via %zu send attempts.", rrdhost_hostname(s->host), s->connected_to, s->timeout, s->sent_bytes_on_this_connection, s->send_attempts);
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
continue;
|
|
}
|
|
|
|
sender_lock(s);
|
|
size_t outstanding = cbuffer_next_unsafe(s->buffer, NULL);
|
|
size_t available = cbuffer_available_size_unsafe(s->buffer);
|
|
if (unlikely(!outstanding)) {
|
|
rrdpush_sender_pipe_clear_pending_data(s);
|
|
rrdpush_sender_cbuffer_recreate_timed(s, now_s, true, false);
|
|
}
|
|
|
|
if(s->compressor.initialized) {
|
|
size_t bytes_uncompressed = s->compressor.sender_locked.total_uncompressed;
|
|
size_t bytes_compressed = s->compressor.sender_locked.total_compressed + s->compressor.sender_locked.total_compressions * sizeof(rrdpush_signature_t);
|
|
NETDATA_DOUBLE ratio = 100.0 - ((NETDATA_DOUBLE)bytes_compressed * 100.0 / (NETDATA_DOUBLE)bytes_uncompressed);
|
|
worker_set_metric(WORKER_SENDER_JOB_BYTES_UNCOMPRESSED, (NETDATA_DOUBLE)bytes_uncompressed);
|
|
worker_set_metric(WORKER_SENDER_JOB_BYTES_COMPRESSED, (NETDATA_DOUBLE)bytes_compressed);
|
|
worker_set_metric(WORKER_SENDER_JOB_BYTES_COMPRESSION_RATIO, ratio);
|
|
}
|
|
sender_unlock(s);
|
|
|
|
worker_set_metric(WORKER_SENDER_JOB_BUFFER_RATIO, (NETDATA_DOUBLE)(s->buffer->max_size - available) * 100.0 / (NETDATA_DOUBLE)s->buffer->max_size);
|
|
|
|
if(outstanding)
|
|
s->send_attempts++;
|
|
|
|
if(unlikely(s->rrdpush_sender_pipe[PIPE_READ] == -1)) {
|
|
if(!rrdpush_sender_pipe_close(s->host, s->rrdpush_sender_pipe, true)) {
|
|
netdata_log_error("STREAM %s [send]: cannot create inter-thread communication pipe. Disabling streaming.",
|
|
rrdhost_hostname(s->host));
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
break;
|
|
}
|
|
}
|
|
|
|
worker_is_idle();
|
|
|
|
// Wait until buffer opens in the socket or a rrdset_done_push wakes us
|
|
enum {
|
|
Collector = 0,
|
|
Socket = 1,
|
|
};
|
|
struct pollfd fds[2] = {
|
|
[Collector] = {
|
|
.fd = s->rrdpush_sender_pipe[PIPE_READ],
|
|
.events = POLLIN,
|
|
.revents = 0,
|
|
},
|
|
[Socket] = {
|
|
.fd = s->rrdpush_sender_socket,
|
|
.events = POLLIN | (outstanding ? POLLOUT : 0 ),
|
|
.revents = 0,
|
|
}
|
|
};
|
|
|
|
int poll_rc = poll(fds, 2, 1000);
|
|
|
|
netdata_log_debug(D_STREAM, "STREAM: poll() finished collector=%d socket=%d (current chunk %zu bytes)...",
|
|
fds[Collector].revents, fds[Socket].revents, outstanding);
|
|
|
|
if(unlikely(rrdhost_sender_should_exit(s)))
|
|
break;
|
|
|
|
internal_error(fds[Collector].fd != s->rrdpush_sender_pipe[PIPE_READ],
|
|
"STREAM %s [send to %s]: pipe changed after poll().", rrdhost_hostname(s->host), s->connected_to);
|
|
|
|
internal_error(fds[Socket].fd != s->rrdpush_sender_socket,
|
|
"STREAM %s [send to %s]: socket changed after poll().", rrdhost_hostname(s->host), s->connected_to);
|
|
|
|
// Spurious wake-ups without error - loop again
|
|
if (poll_rc == 0 || ((poll_rc == -1) && (errno == EAGAIN || errno == EINTR))) {
|
|
netdata_thread_testcancel();
|
|
netdata_log_debug(D_STREAM, "Spurious wakeup");
|
|
now_s = now_monotonic_sec();
|
|
continue;
|
|
}
|
|
|
|
// Only errors from poll() are internal, but try restarting the connection
|
|
if(unlikely(poll_rc == -1)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_POLL_ERROR);
|
|
netdata_log_error("STREAM %s [send to %s]: failed to poll(). Closing socket.", rrdhost_hostname(s->host), s->connected_to);
|
|
rrdpush_sender_pipe_close(s->host, s->rrdpush_sender_pipe, true);
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
continue;
|
|
}
|
|
|
|
// If we have data and have seen the TCP window open then try to close it by a transmission.
|
|
if(likely(outstanding && (fds[Socket].revents & POLLOUT))) {
|
|
worker_is_busy(WORKER_SENDER_JOB_SOCKET_SEND);
|
|
ssize_t bytes = attempt_to_send(s);
|
|
if(bytes > 0) {
|
|
s->last_traffic_seen_t = now_monotonic_sec();
|
|
worker_set_metric(WORKER_SENDER_JOB_BYTES_SENT, (NETDATA_DOUBLE)bytes);
|
|
}
|
|
}
|
|
|
|
// If the collector woke us up then empty the pipe to remove the signal
|
|
if (fds[Collector].revents & (POLLIN|POLLPRI)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_PIPE_READ);
|
|
netdata_log_debug(D_STREAM, "STREAM: Data added to send buffer (current buffer chunk %zu bytes)...", outstanding);
|
|
|
|
if (read(fds[Collector].fd, thread_data->pipe_buffer, pipe_buffer_size) == -1)
|
|
netdata_log_error("STREAM %s [send to %s]: cannot read from internal pipe.", rrdhost_hostname(s->host), s->connected_to);
|
|
}
|
|
|
|
// Read as much as possible to fill the buffer, split into full lines for execution.
|
|
if (fds[Socket].revents & POLLIN) {
|
|
worker_is_busy(WORKER_SENDER_JOB_SOCKET_RECEIVE);
|
|
ssize_t bytes = attempt_read(s);
|
|
if(bytes > 0) {
|
|
s->last_traffic_seen_t = now_monotonic_sec();
|
|
worker_set_metric(WORKER_SENDER_JOB_BYTES_RECEIVED, (NETDATA_DOUBLE)bytes);
|
|
}
|
|
}
|
|
|
|
if(unlikely(s->read_len))
|
|
execute_commands(s);
|
|
|
|
if(unlikely(fds[Collector].revents & (POLLERR|POLLHUP|POLLNVAL))) {
|
|
char *error = NULL;
|
|
|
|
if (unlikely(fds[Collector].revents & POLLERR))
|
|
error = "pipe reports errors (POLLERR)";
|
|
else if (unlikely(fds[Collector].revents & POLLHUP))
|
|
error = "pipe closed (POLLHUP)";
|
|
else if (unlikely(fds[Collector].revents & POLLNVAL))
|
|
error = "pipe is invalid (POLLNVAL)";
|
|
|
|
if(error) {
|
|
rrdpush_sender_pipe_close(s->host, s->rrdpush_sender_pipe, true);
|
|
netdata_log_error("STREAM %s [send to %s]: restarting internal pipe: %s.",
|
|
rrdhost_hostname(s->host), s->connected_to, error);
|
|
}
|
|
}
|
|
|
|
if(unlikely(fds[Socket].revents & (POLLERR|POLLHUP|POLLNVAL))) {
|
|
char *error = NULL;
|
|
|
|
if (unlikely(fds[Socket].revents & POLLERR))
|
|
error = "socket reports errors (POLLERR)";
|
|
else if (unlikely(fds[Socket].revents & POLLHUP))
|
|
error = "connection closed by remote end (POLLHUP)";
|
|
else if (unlikely(fds[Socket].revents & POLLNVAL))
|
|
error = "connection is invalid (POLLNVAL)";
|
|
|
|
if(unlikely(error)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_SOCKET_ERROR);
|
|
netdata_log_error("STREAM %s [send to %s]: restarting connection: %s - %zu bytes transmitted.",
|
|
rrdhost_hostname(s->host), s->connected_to, error, s->sent_bytes_on_this_connection);
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
}
|
|
}
|
|
|
|
// protection from overflow
|
|
if(unlikely(s->flags & SENDER_FLAG_OVERFLOW)) {
|
|
worker_is_busy(WORKER_SENDER_JOB_DISCONNECT_OVERFLOW);
|
|
errno = 0;
|
|
netdata_log_error("STREAM %s [send to %s]: buffer full (allocated %zu bytes) after sending %zu bytes. Restarting connection",
|
|
rrdhost_hostname(s->host), s->connected_to, s->buffer->size, s->sent_bytes_on_this_connection);
|
|
rrdpush_sender_thread_close_socket(s->host);
|
|
}
|
|
|
|
worker_set_metric(WORKER_SENDER_JOB_REPLAY_DICT_SIZE, (NETDATA_DOUBLE) dictionary_entries(s->replication.requests));
|
|
}
|
|
|
|
netdata_thread_cleanup_pop(1);
|
|
return NULL;
|
|
}
|