risdenk commented on a change in pull request #239: KNOX-2153 - CM discovery - Monitor Cloudera Manager URL: https://github.com/apache/knox/pull/239#discussion_r369838665
########## File path: gateway-discovery-cm/src/main/java/org/apache/knox/gateway/topology/discovery/cm/monitor/ClouderaManagerClusterConfigurationMonitor.java ########## @@ -0,0 +1,876 @@ +/* + * Licensed to the Apache Software Foundation (ASF) under one or more + * contributor license agreements. See the NOTICE file distributed with this + * work for additional information regarding copyright ownership. The ASF + * licenses this file to you under the Apache License, Version 2.0 (the + * "License"); you may not use this file except in compliance with the License. + * You may obtain a copy of the License at + * + * http://www.apache.org/licenses/LICENSE-2.0 + * + * Unless required by applicable law or agreed to in writing, software + * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT + * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the + * License for the specific language governing permissions and limitations under + * the License. + */ +package org.apache.knox.gateway.topology.discovery.cm.monitor; + +import com.cloudera.api.swagger.EventsResourceApi; +import com.cloudera.api.swagger.RolesResourceApi; +import com.cloudera.api.swagger.ServicesResourceApi; +import com.cloudera.api.swagger.client.ApiClient; +import com.cloudera.api.swagger.client.ApiException; +import com.cloudera.api.swagger.model.ApiConfigList; +import com.cloudera.api.swagger.model.ApiEvent; +import com.cloudera.api.swagger.model.ApiEventAttribute; +import com.cloudera.api.swagger.model.ApiEventCategory; +import com.cloudera.api.swagger.model.ApiEventQueryResult; +import com.cloudera.api.swagger.model.ApiRole; +import com.cloudera.api.swagger.model.ApiRoleList; +import com.cloudera.api.swagger.model.ApiServiceConfig; +import com.google.common.util.concurrent.ThreadFactoryBuilder; +import org.apache.commons.io.FileUtils; +import org.apache.knox.gateway.config.GatewayConfig; +import org.apache.knox.gateway.i18n.messages.MessagesFactory; +import org.apache.knox.gateway.services.security.AliasService; +import org.apache.knox.gateway.topology.discovery.ClusterConfigurationMonitor; +import org.apache.knox.gateway.topology.discovery.ServiceDiscoveryConfig; +import org.apache.knox.gateway.topology.discovery.cm.ClouderaManagerCluster; +import org.apache.knox.gateway.topology.discovery.cm.ClouderaManagerServiceDiscoveryMessages; +import org.apache.knox.gateway.topology.discovery.cm.DiscoveryApiClient; +import org.apache.knox.gateway.topology.discovery.cm.ServiceModel; + +import java.io.File; +import java.io.IOException; +import java.io.InputStream; +import java.io.OutputStream; +import java.nio.file.Files; +import java.text.DateFormat; +import java.text.SimpleDateFormat; +import java.util.ArrayList; +import java.util.Collection; +import java.util.Date; +import java.util.HashMap; +import java.util.List; +import java.util.Locale; +import java.util.Map; +import java.util.Properties; +import java.util.Set; +import java.util.TimeZone; +import java.util.concurrent.ConcurrentHashMap; +import java.util.concurrent.ExecutorService; +import java.util.concurrent.Executors; +import java.util.concurrent.ThreadFactory; +import java.util.concurrent.locks.ReadWriteLock; +import java.util.concurrent.locks.ReentrantReadWriteLock; + +/** + * ClusterConfigurationMonitor implementation for clusters managed by ClouderaManager. + */ +public class ClouderaManagerClusterConfigurationMonitor implements ClusterConfigurationMonitor { + + private static final String TYPE = "CM"; + + private static final String CLUSTERS_DATA_DIR_NAME = TYPE.toLowerCase(Locale.getDefault()) + "-clusters"; + + private static final String PERSISTED_FILE_COMMENT = "Generated File. Do Not Edit!"; + + private static final String PROP_CLUSTER_PREFIX = "cluster."; + private static final String PROP_CLUSTER_SOURCE = PROP_CLUSTER_PREFIX + "source"; + private static final String PROP_CLUSTER_NAME = PROP_CLUSTER_PREFIX + "name"; + private static final String PROP_CLUSTER_USER = PROP_CLUSTER_PREFIX + "user"; + private static final String PROP_CLUSTER_ALIAS = PROP_CLUSTER_PREFIX + "pwd.alias"; + + private static final ClouderaManagerServiceDiscoveryMessages log = + MessagesFactory.get(ClouderaManagerServiceDiscoveryMessages.class); + + + // The format of the filter employed when restart events are queried from ClouderaManager + private static final String RESTART_EVENTS_QUERY_FORMAT = "category==" + ApiEventCategory.AUDIT_EVENT.getValue() + + ";attributes.command==Restart" + + ";attributes.command_status==SUCCEEDED" + + ";attributes.cluster==\"%s\"%s"; + + // The format of the timestamp element of the restart events query filter + private static final String EVENTS_QUERY_TIMESTAMP_FORMAT = ";timeOccurred=gt=%s"; + + // The default amount of time before "now" the monitor will check for restart events the first time + private static final long DEFAULT_EVENT_QUERY_DEFAULT_TIMESTAMP_OFFSET = (60 * 60 * 1000); // one hour + + // ISO 8601 datetime format for restart event query filtering + private static final ThreadLocal<DateFormat> eventQueryTimestampFormat = + ThreadLocal.withInitial(() -> new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'", Locale.getDefault())); + + private GatewayConfig gatewayConfig; + private AliasService aliasService; + private PollingConfigAnalyzer internalMonitor; + private List<ConfigurationChangeListener> changeListeners = new ArrayList<>(); + + // Cache of ClouderaManager API clients, keyed by discovery address + private final Map<String, DiscoveryApiClient> clients = new ConcurrentHashMap<>(); + + // ClouderaManager address + // clusterName -> ServiceDiscoveryConfig + // + private final Map<String, Map<String, ServiceDiscoveryConfig>> clusterMonitorConfigurations = new ConcurrentHashMap<>(); + + // ClouderaManager address + // clusterName + // serviceType -> Properties + // + private final Map<String, Map<String, Map<String, ServiceConfigurationModel>>> clusterServiceConfigurations = + new ConcurrentHashMap<>(); + + private final ReadWriteLock serviceConfigurationsLock = new ReentrantReadWriteLock(); + + private final ReadWriteLock clusterMonitorConfigurationsLock = new ReentrantReadWriteLock(); + + // Timestamp records of the most recent restart event query per discovery address + private Map<String, String> eventQueryTimestamps = new ConcurrentHashMap<>(); + + // The amount of time before "now" the monitor will check for restart events the first time + private long eventQueryDefaultTimestampOffset = DEFAULT_EVENT_QUERY_DEFAULT_TIMESTAMP_OFFSET; + + private ExecutorService executorService; + + public static String getType() { + return TYPE; + } + + ClouderaManagerClusterConfigurationMonitor(final GatewayConfig config, final AliasService aliasService) { + this.gatewayConfig = config; + this.aliasService = aliasService; + + eventQueryTimestampFormat.get().setTimeZone(TimeZone.getTimeZone("UTC")); + + ThreadFactory tf = (new ThreadFactoryBuilder()).setNameFormat("ClouderaManagerConfigurationMonitor-%d").build(); + this.executorService = Executors.newSingleThreadExecutor(tf); + + internalMonitor = new PollingConfigAnalyzer(this); + + // Override the default polling interval if it has been configured + // (org.apache.knox.gateway.topology.discovery.cm.monitor.interval) + int interval = config.getClusterMonitorPollingInterval(getType()); + if (interval > 0) { + setPollingInterval(interval); + } + + init(); + } + + @Override + public void start() { + log.startingClouderaManagerConfigMonitor(); + executorService.execute(internalMonitor); + } + + @Override + public void stop() { + log.stoppingClouderaManagerConfigMonitor(); + internalMonitor.stop(); + } + + @Override + public void setPollingInterval(int interval) { + internalMonitor.setInterval(interval); + } + + @Override + public void addListener(final ConfigurationChangeListener listener) { + changeListeners.add(listener); + } + + @Override + public void clearCache(String source, String clusterName) { + removeServiceConfiguration(source, clusterName); + } + + /** + * Add the specified cluster service configurations to the monitor. + * + * @param cluster The cluster to be added. + * @param discoveryConfig The discovery configuration associated with the cluster. + */ + public void addServiceConfiguration(final ClouderaManagerCluster cluster, + final ServiceDiscoveryConfig discoveryConfig) { + + String address = discoveryConfig.getAddress(); + String clusterName = cluster.getName(); + + // Disregard restart events, which occurred before now in future polling + setEventQueryTimestamp(address, clusterName, new Date()); + + persistDiscoveryConfiguration(clusterName, discoveryConfig); + addDiscoveryConfig(clusterName, discoveryConfig); + + Map<String, List<ServiceModel>> serviceModels = cluster.getServiceModels(); + + // Process the service models + Map<String, ServiceConfigurationModel> scpMap = new HashMap<>(); + for (String service : serviceModels.keySet()) { + for (ServiceModel model : serviceModels.get(service)) { + ServiceConfigurationModel scp = + scpMap.computeIfAbsent(model.getServiceType(), p -> new ServiceConfigurationModel()); + + Map<String, String> serviceProps = model.getServiceProperties(); + for (Map.Entry<String, String> entry : serviceProps.entrySet()) { + scp.addServiceProperty(entry.getKey(), entry.getValue()); + } + + Map<String, Map<String, String>> roleProps = model.getRoleProperties(); + for (String roleName : roleProps.keySet()) { + Map<String, String> rp = roleProps.get(roleName); + for (Map.Entry<String, String> entry : rp.entrySet()) { + scp.addRoleProperty(roleName, entry.getKey(), entry.getValue()); + } + } + } + } + + // Persist the service configurations + persistServiceConfiguration(address, clusterName, scpMap); + + // Add the service configurations + addServiceConfiguration(address, clusterName, scpMap); + } + + private void addServiceConfiguration(final String address, + final String cluster, + final Map<String, ServiceConfigurationModel> configs) { + serviceConfigurationsLock.writeLock().lock(); + try { + clusterServiceConfigurations.computeIfAbsent(address, k -> new HashMap<>()).put(cluster, configs); + } finally { + serviceConfigurationsLock.writeLock().unlock(); + } + } + + private void init() { + // Load any persisted discovery configuration data + loadDiscoveryConfiguration(); + + // Load any persisted cluster service configuration data + loadServiceConfiguration(); + } + + /** + * Get a DiscoveryApiClient for the ClouderaManager instance described by the specified discovery configuration. + * + * @param discoveryConfig The discovery configuration for interacting with a ClouderaManager instance. + */ + private DiscoveryApiClient getApiClient(final ServiceDiscoveryConfig discoveryConfig) { + return clients.computeIfAbsent(discoveryConfig.getAddress(), + c -> new DiscoveryApiClient(discoveryConfig, aliasService)); + } + + /** + * Load any previously-persisted service discovery configurations. + */ + private void loadDiscoveryConfiguration() { + File persistenceDir = getPersistenceDir(); + if (persistenceDir != null) { + Collection<File> persistedConfigs = FileUtils.listFiles(persistenceDir, new String[]{"conf"}, false); + for (File persisted : persistedConfigs) { + Properties props = new Properties(); + try (InputStream in = Files.newInputStream(persisted.toPath())) { + props.load(in); + + addDiscoveryConfig(props.getProperty(PROP_CLUSTER_NAME), new ServiceDiscoveryConfig() { + @Override + public String getAddress() { + return props.getProperty(PROP_CLUSTER_SOURCE); + } + + @Override + public String getUser() { + return props.getProperty(PROP_CLUSTER_USER); + } + + @Override + public String getPasswordAlias() { + return props.getProperty(PROP_CLUSTER_ALIAS); + } + }); + } catch (IOException e) { + log.failedToLoadClusterMonitorServiceDiscoveryConfig(getType(), e); + } + } + } + } + + /** + * Load any previously-persisted cluster service configuration data records, so the monitor can check + * previously-deployed topologies against the current cluster configuration, even across gateway restarts. + */ + private void loadServiceConfiguration() { + File persistenceDir = getPersistenceDir(); + if (persistenceDir != null) { + Collection<File> persistedConfigs = FileUtils.listFiles(persistenceDir, new String[]{"ver"}, false); + for (File persisted : persistedConfigs) { + try (InputStream in = Files.newInputStream(persisted.toPath())) { + ServiceConfigurationRecord record = + (new ServiceConfigurationRecordObjectMapper()).readValue(in, ServiceConfigurationRecord.class); + addServiceConfiguration(record.getDiscoveryAddress(), record.getClusterName(), record.getConfigs()); + } catch (Exception e) { + log.failedToLoadClusterMonitorServiceConfigurations(getType(), e); + } + } + } + } + + /** + * Add discovery configuration details for the specified cluster, so the monitor knows how to connect to check for + * changes. + * + * @param clusterName The name of the cluster. + * @param config The associated service discovery configuration. + */ + private void addDiscoveryConfig(final String clusterName, final ServiceDiscoveryConfig config) { + clusterMonitorConfigurationsLock.writeLock().lock(); + try { + clusterMonitorConfigurations.computeIfAbsent(config.getAddress(), k -> new HashMap<>()).put(clusterName, config); + } finally { + clusterMonitorConfigurationsLock.writeLock().unlock(); + } + } + + /** + * Get the service discovery configuration associated with the specified ClouderaManager instance and cluster. + * + * @param address An ClouderaManager instance address. + * @param clusterName The name of a cluster associated with the ClouderaManager instance. + * @return The associated ServiceDiscoveryConfig object. + */ + private ServiceDiscoveryConfig getDiscoveryConfig(final String address, final String clusterName) { + ServiceDiscoveryConfig config = null; + clusterMonitorConfigurationsLock.readLock().lock(); + try { + if (clusterMonitorConfigurations.containsKey(address)) { + config = clusterMonitorConfigurations.get(address).get(clusterName); + } + } finally { + clusterMonitorConfigurationsLock.readLock().unlock(); + } + return config; + } + + /** + * Get the service configuration details for the specified cluster and ClouderaManager instance. + * + * @param address A ClouderaManager instance address. + * @param clusterName The name of a cluster associated with the ClouderaManager instance. + * @return A Map of service types to their corresponding configuration properties. + */ + private Map<String, ServiceConfigurationModel> getClusterServiceConfigurations(String address, + String clusterName) { + Map<String, ServiceConfigurationModel> result = new HashMap<>(); + + serviceConfigurationsLock.readLock().lock(); + try { + if (clusterServiceConfigurations.containsKey(address)) { + result.putAll(clusterServiceConfigurations.get(address).get(clusterName)); + } + } finally { + serviceConfigurationsLock.readLock().unlock(); + } + + return result; + } + + /** + * Remove the specified cluster from monitoring. + * + * @param address The address of the ClouderaManager instance. + * @param clusterName The name of the cluster. + */ + private void removeServiceConfiguration(final String address, final String clusterName) { + serviceConfigurationsLock.writeLock().lock(); + try { + clusterServiceConfigurations.get(address).remove(clusterName); + } finally { + serviceConfigurationsLock.writeLock().unlock(); + } + + // Delete the associated persisted record + File persisted = getServiceConfigsPersistenceFile(address, clusterName); + if (persisted.exists()) { + persisted.delete(); + } + } + + /** + * Get the current configuration for the specified service. + * + * @param address The address of the ClouderaManager instance. + * @param clusterName The name of the cluster. + * @param service The name of the service. + * @return A ServiceConfigurationModel object with the configuration properties associated with the specified + * service. + */ + private ServiceConfigurationModel getCurrentServiceConfiguration(final String address, + final String clusterName, + final String service) { + ServiceConfigurationModel currentConfig = null; + + log.gettingCurrentClusterConfiguration(service, clusterName, address); + + ApiClient apiClient = getApiClient(getDiscoveryConfig(address, clusterName)); + ServicesResourceApi api = new ServicesResourceApi(apiClient); + try { + ApiServiceConfig svcConfig = api.readServiceConfig(clusterName, service, "full"); + + Map<ApiRole, ApiConfigList> roleConfigs = new HashMap<>(); + RolesResourceApi rolesApi = (new RolesResourceApi(apiClient)); + ApiRoleList roles = rolesApi.readRoles(clusterName, service, "", "full"); + for (ApiRole role : roles.getItems()) { + ApiConfigList config = rolesApi.readRoleConfig(clusterName, role.getName(), service, "full"); + roleConfigs.put(role, config); + } + currentConfig = new ServiceConfigurationModel(svcConfig, roleConfigs); + } catch (ApiException e) { + log.clouderaManagerConfigurationAPIError(e); + } + return currentConfig; + } + + /** + * Get restart events for the specified ClouderaManager cluster. + * + * @param address The address of the ClouderaManager instance. + * @param clusterName The name of the cluster. + * @return A List of RestartEvent objects for service restart events since the last time they were queried. + */ + private List<RestartEvent> getRestartEvents(final String address, final String clusterName) { + List<RestartEvent> restartEvents = new ArrayList<>(); + + // Get the last event query timestamp + String lastTimestamp = getEventQueryTimestamp(address, clusterName); + + if (lastTimestamp == null) { + Date ts = new Date(); + ts.setTime(System.currentTimeMillis() - eventQueryDefaultTimestampOffset); + lastTimestamp = eventQueryTimestampFormat.get().format(ts); + } + + log.queryingRestartEventsFromCluster(clusterName, address, lastTimestamp); + + // Record the new event query timestamp for this address/cluster + setEventQueryTimestamp(address, clusterName, new Date()); + + // Query the event log from CM for service/cluster restart events + List<ApiEvent> events = queryRestartEvents(getApiClient(getDiscoveryConfig(address, clusterName)), + clusterName, + lastTimestamp); + for (ApiEvent event : events) { + restartEvents.add(new RestartEvent(event)); + } + + return restartEvents; + } + + private void persist(final Properties props, final File dest) { + try (OutputStream out = Files.newOutputStream(dest.toPath())) { + props.store(out, PERSISTED_FILE_COMMENT); + out.flush(); + } catch (Exception e) { + log.failedToPersistClusterMonitorData(getType(), dest.getAbsolutePath(), e); + } + } + + private File getPersistenceDir() { + File persistenceDir = null; + + File dataDir = new File(gatewayConfig.getGatewayDataDir()); + if (dataDir.exists()) { + File clustersDir = new File(dataDir, CLUSTERS_DATA_DIR_NAME); + if (!clustersDir.exists()) { + if (!clustersDir.mkdirs()) { + log.failedToCreatePersistenceDirectory(clustersDir.getAbsolutePath()); + } + } + persistenceDir = clustersDir; + } + + return persistenceDir; + } Review comment: Nit: It might be cleaner to use `Path` and Java NIO here. This would cascade to the rest of the `File` usages. ---------------------------------------------------------------- This is an automated message from the Apache Git Service. To respond to the message, please log on to GitHub and use the URL above to go to the specific comment. For queries about this service, please contact Infrastructure at: [email protected] With regards, Apache Git Services
