451 lines
19 KiB
C
451 lines
19 KiB
C
// SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
#include "rrdpush.h"
|
|
|
|
extern struct config stream_config;
|
|
|
|
static void rrdpush_receiver_thread_cleanup(void *ptr) {
|
|
static __thread int executed = 0;
|
|
if(!executed) {
|
|
executed = 1;
|
|
struct receiver_state *rpt = (struct receiver_state *) ptr;
|
|
|
|
// Make sure that we detach this thread and don't kill a freshly arriving receiver
|
|
if (rpt->host) {
|
|
netdata_mutex_lock(&rpt->host->receiver_lock);
|
|
if (rpt->host->receiver == rpt)
|
|
rpt->host->receiver = NULL;
|
|
netdata_mutex_unlock(&rpt->host->receiver_lock);
|
|
}
|
|
|
|
info("STREAM %s [receive from [%s]:%s]: receive thread ended (task id %d)", rpt->hostname, rpt->client_ip, rpt->client_port, gettid());
|
|
|
|
freez(rpt->key);
|
|
freez(rpt->hostname);
|
|
freez(rpt->registry_hostname);
|
|
freez(rpt->machine_guid);
|
|
freez(rpt->os);
|
|
freez(rpt->timezone);
|
|
freez(rpt->tags);
|
|
freez(rpt->client_ip);
|
|
freez(rpt->client_port);
|
|
freez(rpt->program_name);
|
|
freez(rpt->program_version);
|
|
#ifdef ENABLE_HTTPS
|
|
if(rpt->ssl.conn){
|
|
SSL_free(rpt->ssl.conn);
|
|
}
|
|
#endif
|
|
freez(rpt);
|
|
|
|
}
|
|
}
|
|
|
|
#include "../collectors/plugins.d/pluginsd_parser.h"
|
|
|
|
PARSER_RC streaming_timestamp(char **words, void *user, PLUGINSD_ACTION *plugins_action)
|
|
{
|
|
UNUSED(plugins_action);
|
|
char *remote_time_txt = words[1];
|
|
time_t remote_time = 0;
|
|
RRDHOST *host = ((PARSER_USER_OBJECT *)user)->host;
|
|
struct plugind *cd = ((PARSER_USER_OBJECT *)user)->cd;
|
|
if (cd->version < VERSION_GAP_FILLING ) {
|
|
error("STREAM %s from %s: Slave negotiated version %u but sent TIMESTAMP!", host->hostname, cd->cmd,
|
|
cd->version);
|
|
return PARSER_RC_OK; // Ignore error and continue stream
|
|
}
|
|
if (remote_time_txt && *remote_time_txt) {
|
|
remote_time = str2ull(remote_time_txt);
|
|
time_t now = now_realtime_sec(), prev = rrdhost_last_entry_t(host);
|
|
time_t gap = 0;
|
|
if (prev == 0)
|
|
info("STREAM %s from %s: Initial connection (no gap to check), remote=%ld local=%ld slew=%ld",
|
|
host->hostname, cd->cmd, remote_time, now, now-remote_time);
|
|
else {
|
|
gap = now - prev;
|
|
info("STREAM %s from %s: Checking for gaps... remote=%ld local=%ld..%ld slew=%ld %ld-sec gap",
|
|
host->hostname, cd->cmd, remote_time, prev, now, remote_time - now, gap);
|
|
}
|
|
char message[128];
|
|
sprintf(message,"REPLICATE %ld %ld\n", remote_time - gap, remote_time);
|
|
int ret;
|
|
#ifdef ENABLE_HTTPS
|
|
SSL *conn = host->stream_ssl.conn ;
|
|
if(conn && !host->stream_ssl.flags) {
|
|
ret = SSL_write(conn, message, strlen(message));
|
|
} else {
|
|
ret = send(host->receiver->fd, message, strlen(message), MSG_DONTWAIT);
|
|
}
|
|
#else
|
|
ret = send(host->receiver->fd, message, strlen(message), MSG_DONTWAIT);
|
|
#endif
|
|
if (ret != (int)strlen(message))
|
|
error("Failed to send initial timestamp - gaps may appear in charts");
|
|
return PARSER_RC_OK;
|
|
}
|
|
return PARSER_RC_ERROR;
|
|
}
|
|
|
|
/* The receiver socket is blocking, perform a single read into a buffer so that we can reassemble lines for parsing.
|
|
*/
|
|
static int receiver_read(struct receiver_state *r, FILE *fp) {
|
|
#ifdef ENABLE_HTTPS
|
|
if (r->ssl.conn && !r->ssl.flags) {
|
|
ERR_clear_error();
|
|
int desired = sizeof(r->read_buffer) - r->read_len - 1;
|
|
int ret = SSL_read(r->ssl.conn, r->read_buffer + r->read_len, desired);
|
|
if (ret > 0 ) {
|
|
r->read_len += ret;
|
|
return 0;
|
|
}
|
|
// Don't treat SSL_ERROR_WANT_READ or SSL_ERROR_WANT_WRITE differently on blocking socket
|
|
u_long err;
|
|
char buf[256];
|
|
while ((err = ERR_get_error()) != 0) {
|
|
ERR_error_string_n(err, buf, sizeof(buf));
|
|
error("STREAM %s [receive from %s] ssl error: %s", r->hostname, r->client_ip, buf);
|
|
}
|
|
return 1;
|
|
}
|
|
#endif
|
|
if (!fgets(r->read_buffer, sizeof(r->read_buffer), fp))
|
|
return 1;
|
|
r->read_len = strlen(r->read_buffer);
|
|
return 0;
|
|
}
|
|
|
|
/* Produce a full line if one exists, statefully return where we start next time.
|
|
* When we hit the end of the buffer with a partial line move it to the beginning for the next fill.
|
|
*/
|
|
static char *receiver_next_line(struct receiver_state *r, int *pos) {
|
|
int start = *pos, scan = *pos;
|
|
if (scan >= r->read_len) {
|
|
r->read_len = 0;
|
|
return NULL;
|
|
}
|
|
while (scan < r->read_len && r->read_buffer[scan] != '\n')
|
|
scan++;
|
|
if (scan < r->read_len && r->read_buffer[scan] == '\n') {
|
|
*pos = scan+1;
|
|
r->read_buffer[scan] = 0;
|
|
return &r->read_buffer[start];
|
|
}
|
|
memcpy(r->read_buffer, &r->read_buffer[start], r->read_len - start);
|
|
r->read_len -= start;
|
|
return NULL;
|
|
}
|
|
|
|
|
|
size_t streaming_parser(struct receiver_state *rpt, struct plugind *cd, FILE *fp) {
|
|
size_t result;
|
|
PARSER_USER_OBJECT *user = callocz(1, sizeof(*user));
|
|
user->enabled = cd->enabled;
|
|
user->host = rpt->host;
|
|
user->opaque = rpt;
|
|
user->cd = cd;
|
|
user->trust_durations = 0;
|
|
|
|
PARSER *parser = parser_init(rpt->host, user, fp, PARSER_INPUT_SPLIT);
|
|
parser_add_keyword(parser, "TIMESTAMP", streaming_timestamp);
|
|
|
|
if (unlikely(!parser)) {
|
|
error("Failed to initialize parser");
|
|
cd->serial_failures++;
|
|
freez(user);
|
|
return 0;
|
|
}
|
|
|
|
parser->plugins_action->begin_action = &pluginsd_begin_action;
|
|
parser->plugins_action->flush_action = &pluginsd_flush_action;
|
|
parser->plugins_action->end_action = &pluginsd_end_action;
|
|
parser->plugins_action->disable_action = &pluginsd_disable_action;
|
|
parser->plugins_action->variable_action = &pluginsd_variable_action;
|
|
parser->plugins_action->dimension_action = &pluginsd_dimension_action;
|
|
parser->plugins_action->label_action = &pluginsd_label_action;
|
|
parser->plugins_action->overwrite_action = &pluginsd_overwrite_action;
|
|
parser->plugins_action->chart_action = &pluginsd_chart_action;
|
|
parser->plugins_action->set_action = &pluginsd_set_action;
|
|
|
|
user->parser = parser;
|
|
|
|
do {
|
|
if (receiver_read(rpt, fp))
|
|
break;
|
|
int pos = 0;
|
|
char *line;
|
|
while ((line = receiver_next_line(rpt, &pos))) {
|
|
if (unlikely(netdata_exit || rpt->shutdown || parser_action(parser, line)))
|
|
goto done;
|
|
}
|
|
rpt->last_msg_t = now_realtime_sec();
|
|
}
|
|
while(!netdata_exit);
|
|
done:
|
|
result= user->count;
|
|
freez(user);
|
|
parser_destroy(parser);
|
|
return result;
|
|
}
|
|
|
|
|
|
static int rrdpush_receive(struct receiver_state *rpt)
|
|
{
|
|
int history = default_rrd_history_entries;
|
|
RRD_MEMORY_MODE mode = default_rrd_memory_mode;
|
|
int health_enabled = default_health_enabled;
|
|
int rrdpush_enabled = default_rrdpush_enabled;
|
|
char *rrdpush_destination = default_rrdpush_destination;
|
|
char *rrdpush_api_key = default_rrdpush_api_key;
|
|
char *rrdpush_send_charts_matching = default_rrdpush_send_charts_matching;
|
|
time_t alarms_delay = 60;
|
|
|
|
rpt->update_every = (int)appconfig_get_number(&stream_config, rpt->machine_guid, "update every", rpt->update_every);
|
|
if(rpt->update_every < 0) rpt->update_every = 1;
|
|
|
|
history = (int)appconfig_get_number(&stream_config, rpt->key, "default history", history);
|
|
history = (int)appconfig_get_number(&stream_config, rpt->machine_guid, "history", history);
|
|
if(history < 5) history = 5;
|
|
|
|
mode = rrd_memory_mode_id(appconfig_get(&stream_config, rpt->key, "default memory mode", rrd_memory_mode_name(mode)));
|
|
mode = rrd_memory_mode_id(appconfig_get(&stream_config, rpt->machine_guid, "memory mode", rrd_memory_mode_name(mode)));
|
|
|
|
health_enabled = appconfig_get_boolean_ondemand(&stream_config, rpt->key, "health enabled by default", health_enabled);
|
|
health_enabled = appconfig_get_boolean_ondemand(&stream_config, rpt->machine_guid, "health enabled", health_enabled);
|
|
|
|
alarms_delay = appconfig_get_number(&stream_config, rpt->key, "default postpone alarms on connect seconds", alarms_delay);
|
|
alarms_delay = appconfig_get_number(&stream_config, rpt->machine_guid, "postpone alarms on connect seconds", alarms_delay);
|
|
|
|
rrdpush_enabled = appconfig_get_boolean(&stream_config, rpt->key, "default proxy enabled", rrdpush_enabled);
|
|
rrdpush_enabled = appconfig_get_boolean(&stream_config, rpt->machine_guid, "proxy enabled", rrdpush_enabled);
|
|
|
|
rrdpush_destination = appconfig_get(&stream_config, rpt->key, "default proxy destination", rrdpush_destination);
|
|
rrdpush_destination = appconfig_get(&stream_config, rpt->machine_guid, "proxy destination", rrdpush_destination);
|
|
|
|
rrdpush_api_key = appconfig_get(&stream_config, rpt->key, "default proxy api key", rrdpush_api_key);
|
|
rrdpush_api_key = appconfig_get(&stream_config, rpt->machine_guid, "proxy api key", rrdpush_api_key);
|
|
|
|
rrdpush_send_charts_matching = appconfig_get(&stream_config, rpt->key, "default proxy send charts matching", rrdpush_send_charts_matching);
|
|
rrdpush_send_charts_matching = appconfig_get(&stream_config, rpt->machine_guid, "proxy send charts matching", rrdpush_send_charts_matching);
|
|
|
|
rpt->tags = (char*)appconfig_set_default(&stream_config, rpt->machine_guid, "host tags", (rpt->tags)?rpt->tags:"");
|
|
if(rpt->tags && !*rpt->tags) rpt->tags = NULL;
|
|
|
|
if (strcmp(rpt->machine_guid, localhost->machine_guid) == 0) {
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->machine_guid, rpt->hostname, "DENIED - ATTEMPT TO RECEIVE METRICS FROM MACHINE_GUID IDENTICAL TO MASTER");
|
|
error("STREAM %s [receive from %s:%s]: denied to receive metrics, machine GUID [%s] is my own. Did you copy the master/proxy machine guid to a slave?", rpt->hostname, rpt->client_ip, rpt->client_port, rpt->machine_guid);
|
|
close(rpt->fd);
|
|
return 1;
|
|
}
|
|
|
|
if (rpt->host==NULL) {
|
|
|
|
rpt->host = rrdhost_find_or_create(
|
|
rpt->hostname
|
|
, rpt->registry_hostname
|
|
, rpt->machine_guid
|
|
, rpt->os
|
|
, rpt->timezone
|
|
, rpt->tags
|
|
, program_name
|
|
, program_version
|
|
, rpt->update_every
|
|
, history
|
|
, mode
|
|
, (unsigned int)(health_enabled != CONFIG_BOOLEAN_NO)
|
|
, (unsigned int)(rrdpush_enabled && rrdpush_destination && *rrdpush_destination && rrdpush_api_key && *rrdpush_api_key)
|
|
, rrdpush_destination
|
|
, rrdpush_api_key
|
|
, rrdpush_send_charts_matching
|
|
, rpt->system_info
|
|
);
|
|
|
|
if(!rpt->host) {
|
|
close(rpt->fd);
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->machine_guid, rpt->hostname, "FAILED - CANNOT ACQUIRE HOST");
|
|
error("STREAM %s [receive from [%s]:%s]: failed to find/create host structure.", rpt->hostname, rpt->client_ip, rpt->client_port);
|
|
return 1;
|
|
}
|
|
|
|
netdata_mutex_lock(&rpt->host->receiver_lock);
|
|
if (rpt->host->receiver == NULL)
|
|
rpt->host->receiver = rpt;
|
|
else {
|
|
error("Multiple receivers connected for %s concurrently, cancelling this one...", rpt->machine_guid);
|
|
netdata_mutex_unlock(&rpt->host->receiver_lock);
|
|
close(rpt->fd);
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->machine_guid, rpt->hostname, "FAILED - BEATEN TO HOST CREATION");
|
|
return 1;
|
|
}
|
|
netdata_mutex_unlock(&rpt->host->receiver_lock);
|
|
}
|
|
else rrdhost_update(rpt->host
|
|
, rpt->hostname
|
|
, rpt->registry_hostname
|
|
, rpt->machine_guid
|
|
, rpt->os
|
|
, rpt->timezone
|
|
, rpt->tags
|
|
, program_name
|
|
, program_version
|
|
, rpt->update_every
|
|
, history
|
|
, mode
|
|
, (unsigned int)(health_enabled != CONFIG_BOOLEAN_NO)
|
|
, (unsigned int)(rrdpush_enabled && rrdpush_destination && *rrdpush_destination && rrdpush_api_key && *rrdpush_api_key)
|
|
, rrdpush_destination
|
|
, rrdpush_api_key
|
|
, rrdpush_send_charts_matching
|
|
, rpt->system_info);
|
|
|
|
|
|
int ssl = 0;
|
|
#ifdef ENABLE_HTTPS
|
|
if (rpt->ssl.conn != NULL)
|
|
ssl = 1;
|
|
#endif
|
|
|
|
#ifdef NETDATA_INTERNAL_CHECKS
|
|
info("STREAM %s [receive from [%s]:%s]: client willing to stream metrics for host '%s' with machine_guid '%s': update every = %d, history = %ld, memory mode = %s, health %s,%s tags '%s'"
|
|
, rpt->hostname
|
|
, rpt->client_ip
|
|
, rpt->client_port
|
|
, rpt->host->hostname
|
|
, rpt->host->machine_guid
|
|
, rpt->host->rrd_update_every
|
|
, rpt->host->rrd_history_entries
|
|
, rrd_memory_mode_name(rpt->host->rrd_memory_mode)
|
|
, (health_enabled == CONFIG_BOOLEAN_NO)?"disabled":((health_enabled == CONFIG_BOOLEAN_YES)?"enabled":"auto")
|
|
, ssl ? " SSL," : ""
|
|
, rpt->host->tags?rpt->host->tags:""
|
|
);
|
|
#endif // NETDATA_INTERNAL_CHECKS
|
|
|
|
|
|
struct plugind cd = {
|
|
.enabled = 1,
|
|
.update_every = default_rrd_update_every,
|
|
.pid = 0,
|
|
.serial_failures = 0,
|
|
.successful_collections = 0,
|
|
.obsolete = 0,
|
|
.started_t = now_realtime_sec(),
|
|
.next = NULL,
|
|
.version = 0,
|
|
};
|
|
|
|
// put the client IP and port into the buffers used by plugins.d
|
|
snprintfz(cd.id, CONFIG_MAX_NAME, "%s:%s", rpt->client_ip, rpt->client_port);
|
|
snprintfz(cd.filename, FILENAME_MAX, "%s:%s", rpt->client_ip, rpt->client_port);
|
|
snprintfz(cd.fullfilename, FILENAME_MAX, "%s:%s", rpt->client_ip, rpt->client_port);
|
|
snprintfz(cd.cmd, PLUGINSD_CMD_MAX, "%s:%s", rpt->client_ip, rpt->client_port);
|
|
|
|
info("STREAM %s [receive from [%s]:%s]: initializing communication...", rpt->host->hostname, rpt->client_ip, rpt->client_port);
|
|
char initial_response[HTTP_HEADER_SIZE];
|
|
if (rpt->stream_version > 1) {
|
|
info("STREAM %s [receive from [%s]:%s]: Netdata is using the stream version %u.", rpt->host->hostname, rpt->client_ip, rpt->client_port, rpt->stream_version);
|
|
sprintf(initial_response, "%s%u", START_STREAMING_PROMPT_VN, rpt->stream_version);
|
|
} else if (rpt->stream_version == 1) {
|
|
info("STREAM %s [receive from [%s]:%s]: Netdata is using the stream version %u.", rpt->host->hostname, rpt->client_ip, rpt->client_port, rpt->stream_version);
|
|
sprintf(initial_response, "%s", START_STREAMING_PROMPT_V2);
|
|
} else {
|
|
info("STREAM %s [receive from [%s]:%s]: Netdata is using first stream protocol.", rpt->host->hostname, rpt->client_ip, rpt->client_port);
|
|
sprintf(initial_response, "%s", START_STREAMING_PROMPT);
|
|
}
|
|
debug(D_STREAM, "Initial response to %s: %s", rpt->client_ip, initial_response);
|
|
#ifdef ENABLE_HTTPS
|
|
rpt->host->stream_ssl.conn = rpt->ssl.conn;
|
|
rpt->host->stream_ssl.flags = rpt->ssl.flags;
|
|
if(send_timeout(&rpt->ssl, rpt->fd, initial_response, strlen(initial_response), 0, 60) != (ssize_t)strlen(initial_response)) {
|
|
#else
|
|
if(send_timeout(rpt->fd, initial_response, strlen(initial_response), 0, 60) != strlen(initial_response)) {
|
|
#endif
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->host->machine_guid, rpt->host->hostname, "FAILED - CANNOT REPLY");
|
|
error("STREAM %s [receive from [%s]:%s]: cannot send ready command.", rpt->host->hostname, rpt->client_ip, rpt->client_port);
|
|
close(rpt->fd);
|
|
return 0;
|
|
}
|
|
|
|
// remove the non-blocking flag from the socket
|
|
if(sock_delnonblock(rpt->fd) < 0)
|
|
error("STREAM %s [receive from [%s]:%s]: cannot remove the non-blocking flag from socket %d", rpt->host->hostname, rpt->client_ip, rpt->client_port, rpt->fd);
|
|
|
|
// convert the socket to a FILE *
|
|
FILE *fp = fdopen(rpt->fd, "r");
|
|
if(!fp) {
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->host->machine_guid, rpt->host->hostname, "FAILED - SOCKET ERROR");
|
|
error("STREAM %s [receive from [%s]:%s]: failed to get a FILE for FD %d.", rpt->host->hostname, rpt->client_ip, rpt->client_port, rpt->fd);
|
|
close(rpt->fd);
|
|
return 0;
|
|
}
|
|
|
|
rrdhost_wrlock(rpt->host);
|
|
/* if(rpt->host->connected_senders > 0) {
|
|
rrdhost_unlock(rpt->host);
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->host->machine_guid, rpt->host->hostname, "REJECTED - ALREADY CONNECTED");
|
|
info("STREAM %s [receive from [%s]:%s]: multiple streaming connections for the same host detected. Rejecting new connection.", rpt->host->hostname, rpt->client_ip, rpt->client_port);
|
|
fclose(fp);
|
|
return 0;
|
|
}
|
|
*/
|
|
|
|
rrdhost_flag_clear(rpt->host, RRDHOST_FLAG_ORPHAN);
|
|
// rpt->host->connected_senders++;
|
|
rpt->host->senders_disconnected_time = 0;
|
|
rpt->host->labels_flag = (rpt->stream_version > 0)?LABEL_FLAG_UPDATE_STREAM:LABEL_FLAG_STOP_STREAM;
|
|
|
|
if(health_enabled != CONFIG_BOOLEAN_NO) {
|
|
if(alarms_delay > 0) {
|
|
rpt->host->health_delay_up_to = now_realtime_sec() + alarms_delay;
|
|
info("Postponing health checks for %ld seconds, on host '%s', because it was just connected."
|
|
, alarms_delay
|
|
, rpt->host->hostname
|
|
);
|
|
}
|
|
}
|
|
rrdhost_unlock(rpt->host);
|
|
|
|
// call the plugins.d processor to receive the metrics
|
|
info("STREAM %s [receive from [%s]:%s]: receiving metrics...", rpt->host->hostname, rpt->client_ip, rpt->client_port);
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->host->machine_guid, rpt->host->hostname, "CONNECTED");
|
|
|
|
cd.version = rpt->stream_version;
|
|
|
|
|
|
size_t count = streaming_parser(rpt, &cd, fp);
|
|
//size_t count = pluginsd_process(host, &cd, fp, 1);
|
|
|
|
log_stream_connection(rpt->client_ip, rpt->client_port, rpt->key, rpt->host->machine_guid, rpt->host->hostname, "DISCONNECTED");
|
|
error("STREAM %s [receive from [%s]:%s]: disconnected (completed %zu updates).", rpt->host->hostname, rpt->client_ip, rpt->client_port, count);
|
|
|
|
netdata_mutex_lock(&rpt->host->receiver_lock);
|
|
if (rpt->host->receiver == rpt) {
|
|
rrdhost_wrlock(rpt->host);
|
|
rpt->host->senders_disconnected_time = now_realtime_sec();
|
|
rrdhost_flag_set(rpt->host, RRDHOST_FLAG_ORPHAN);
|
|
if(health_enabled == CONFIG_BOOLEAN_AUTO)
|
|
rpt->host->health_enabled = 0;
|
|
rrdhost_unlock(rpt->host);
|
|
rrdpush_sender_thread_stop(rpt->host);
|
|
}
|
|
netdata_mutex_unlock(&rpt->host->receiver_lock);
|
|
|
|
// cleanup
|
|
fclose(fp);
|
|
|
|
return (int)count;
|
|
}
|
|
|
|
void *rrdpush_receiver_thread(void *ptr) {
|
|
netdata_thread_cleanup_push(rrdpush_receiver_thread_cleanup, ptr);
|
|
|
|
struct receiver_state *rpt = (struct receiver_state *)ptr;
|
|
info("STREAM %s [%s]:%s: receive thread created (task id %d)", rpt->hostname, rpt->client_ip, rpt->client_port, gettid());
|
|
|
|
rrdpush_receive(rpt);
|
|
|
|
netdata_thread_cleanup_pop(1);
|
|
return NULL;
|
|
}
|
|
|