milvus/internal/masterservice/timeticksync.go
neza2017 e326eaad1e
master client,reconnect if grpc failed (#5360)
master client,reconnect if grpc failed

Signed-off-by: yefu.chen <yefu.chen@zilliz.com>
2021-05-24 01:44:49 +00:00

233 lines
6.6 KiB
Go

// Copyright (C) 2019-2020 Zilliz. All rights reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance
// with the License. You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software distributed under the License
// is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
// or implied. See the License for the specific language governing permissions and limitations under the License.
package masterservice
import (
"context"
"encoding/json"
"fmt"
"path"
"sync"
"github.com/coreos/etcd/mvcc/mvccpb"
"github.com/milvus-io/milvus/internal/log"
"github.com/milvus-io/milvus/internal/msgstream"
"github.com/milvus-io/milvus/internal/proto/commonpb"
"github.com/milvus-io/milvus/internal/proto/internalpb"
"github.com/milvus-io/milvus/internal/util/sessionutil"
"github.com/milvus-io/milvus/internal/util/typeutil"
"go.etcd.io/etcd/clientv3"
"go.uber.org/zap"
)
type timetickSync struct {
lock sync.Mutex
ctx context.Context
etcdCli *clientv3.Client
msFactory msgstream.Factory
proxyTimeTick map[typeutil.UniqueID]*internalpb.ChannelTimeTickMsg
chanStream map[string]msgstream.MsgStream
sendChan chan map[typeutil.UniqueID]*internalpb.ChannelTimeTickMsg
}
func newTimeTickSync(ctx context.Context, factory msgstream.Factory, cli *clientv3.Client) (*timetickSync, error) {
tss := timetickSync{
lock: sync.Mutex{},
ctx: ctx,
etcdCli: cli,
msFactory: factory,
proxyTimeTick: make(map[typeutil.UniqueID]*internalpb.ChannelTimeTickMsg),
chanStream: make(map[string]msgstream.MsgStream),
sendChan: make(chan map[typeutil.UniqueID]*internalpb.ChannelTimeTickMsg, 16),
}
ctx2, cancel := context.WithTimeout(ctx, RequestTimeout)
defer cancel()
resp, err := cli.Get(ctx2, ProxyMetaPrefix, clientv3.WithPrefix())
if err != nil {
return nil, err
}
for _, v := range resp.Kvs {
var sess sessionutil.Session
err := json.Unmarshal(v.Value, &sess)
if err != nil {
log.Debug("unmarshal SvrSession failed", zap.Error(err))
continue
}
if _, ok := tss.proxyTimeTick[sess.ServerID]; !ok {
tss.proxyTimeTick[sess.ServerID] = nil
}
}
return &tss, nil
}
// sendToChannel send all channels' timetick to sendChan
// lock is needed by the invoker
func (t *timetickSync) sendToChannel() {
for _, v := range t.proxyTimeTick {
if v == nil {
return
}
}
if len(t.proxyTimeTick) == 0 {
return
}
// clear proxyTimeTick and send a clone
ptt := make(map[typeutil.UniqueID]*internalpb.ChannelTimeTickMsg)
for k, v := range t.proxyTimeTick {
ptt[k] = v
t.proxyTimeTick[k] = nil
}
t.sendChan <- ptt
}
// UpdateTimeTick check msg validation and send it to local channel
func (t *timetickSync) UpdateTimeTick(in *internalpb.ChannelTimeTickMsg) error {
t.lock.Lock()
defer t.lock.Unlock()
_, ok := t.proxyTimeTick[in.Base.SourceID]
if !ok {
return fmt.Errorf("Skip ChannelTimeTickMsg from un-recognized proxy node %d", in.Base.SourceID)
}
t.proxyTimeTick[in.Base.SourceID] = in
t.sendToChannel()
return nil
}
// StartWatch watch proxy node change and process all channels' timetick msg
func (t *timetickSync) StartWatch() {
proxyNodePrefix := path.Join(sessionutil.DefaultServiceRoot, typeutil.ProxyNodeRole)
rch := t.etcdCli.Watch(t.ctx, proxyNodePrefix, clientv3.WithPrefix(), clientv3.WithCreatedNotify())
for {
select {
case <-t.ctx.Done():
log.Debug("timetickSync context done", zap.Error(t.ctx.Err()))
return
case wresp, ok := <-rch:
if !ok {
log.Debug("time tick sync watch etcd failed")
}
for _, ev := range wresp.Events {
switch ev.Type {
case mvccpb.PUT:
var sess sessionutil.Session
err := json.Unmarshal(ev.Kv.Value, &sess)
if err != nil {
log.Debug("watch proxy node, unmarshal failed", zap.Error(err))
continue
}
func() {
t.lock.Lock()
defer t.lock.Unlock()
t.proxyTimeTick[sess.ServerID] = nil
}()
case mvccpb.DELETE:
var sess sessionutil.Session
err := json.Unmarshal(ev.PrevKv.Value, &sess)
if err != nil {
log.Debug("watch proxy node, unmarshal failed", zap.Error(err))
continue
}
func() {
t.lock.Lock()
defer t.lock.Unlock()
if _, ok := t.proxyTimeTick[sess.ServerID]; ok {
delete(t.proxyTimeTick, sess.ServerID)
t.sendToChannel()
}
}()
}
}
case ptt, ok := <-t.sendChan:
if !ok {
log.Debug("timetickSync sendChan closed", zap.Error(t.ctx.Err()))
return
}
// reduce each channel to get min timestamp
chanName2TimeTickMap := make(map[string]typeutil.Timestamp)
for _, cttMsg := range ptt {
chanNum := len(cttMsg.ChannelNames)
for i := 0; i < chanNum; i++ {
name := cttMsg.ChannelNames[i]
ts := cttMsg.Timestamps[i]
cts, ok := chanName2TimeTickMap[name]
if !ok || ts < cts {
chanName2TimeTickMap[name] = ts
}
}
}
// send timetick msg to msg stream
for chanName, chanTs := range chanName2TimeTickMap {
if err := t.SendChannelTimeTick(chanName, chanTs); err != nil {
log.Debug("SendChannelTimeTick fail", zap.Error(t.ctx.Err()))
}
}
}
}
}
// SendChannelTimeTick send each channel's min timetick to msg stream
func (t *timetickSync) SendChannelTimeTick(chanName string, ts typeutil.Timestamp) error {
msgPack := msgstream.MsgPack{}
baseMsg := msgstream.BaseMsg{
BeginTimestamp: ts,
EndTimestamp: ts,
HashValues: []uint32{0},
}
timeTickResult := internalpb.TimeTickMsg{
Base: &commonpb.MsgBase{
MsgType: commonpb.MsgType_TimeTick,
MsgID: 0,
Timestamp: ts,
SourceID: int64(Params.NodeID),
},
}
timeTickMsg := &msgstream.TimeTickMsg{
BaseMsg: baseMsg,
TimeTickMsg: timeTickResult,
}
msgPack.Msgs = append(msgPack.Msgs, timeTickMsg)
t.lock.Lock()
defer t.lock.Unlock()
// send timetick msg to msg stream
var err error
var stream msgstream.MsgStream
stream, ok := t.chanStream[chanName]
if !ok {
stream, err = t.msFactory.NewMsgStream(t.ctx)
if err != nil {
return err
}
stream.AsProducer([]string{chanName})
t.chanStream[chanName] = stream
}
return stream.Broadcast(&msgPack)
}
// GetProxyNodeNum return the num of detected proxy node
func (t *timetickSync) GetProxyNodeNum() int {
t.lock.Lock()
defer t.lock.Unlock()
return len(t.proxyTimeTick)
}
// GetChanNum return the num of channel
func (t *timetickSync) GetChanNum() int {
t.lock.Lock()
defer t.lock.Unlock()
return len(t.chanStream)
}