meta_srv/
bootstrap.rs

1// Copyright 2023 Greptime Team
2//
3// Licensed under the Apache License, Version 2.0 (the "License");
4// you may not use this file except in compliance with the License.
5// You may obtain a copy of the License at
6//
7//     http://www.apache.org/licenses/LICENSE-2.0
8//
9// Unless required by applicable law or agreed to in writing, software
10// distributed under the License is distributed on an "AS IS" BASIS,
11// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12// See the License for the specific language governing permissions and
13// limitations under the License.
14
15use std::net::SocketAddr;
16use std::sync::Arc;
17
18use api::v1::meta::cluster_server::ClusterServer;
19use api::v1::meta::heartbeat_server::HeartbeatServer;
20use api::v1::meta::procedure_service_server::ProcedureServiceServer;
21use api::v1::meta::store_server::StoreServer;
22use common_base::Plugins;
23use common_config::Configurable;
24#[cfg(any(feature = "pg_kvbackend", feature = "mysql_kvbackend"))]
25use common_meta::distributed_time_constants::META_LEASE_SECS;
26use common_meta::kv_backend::chroot::ChrootKvBackend;
27use common_meta::kv_backend::etcd::EtcdStore;
28use common_meta::kv_backend::memory::MemoryKvBackend;
29use common_meta::kv_backend::{KvBackendRef, ResettableKvBackendRef};
30use common_telemetry::info;
31use either::Either;
32use servers::configurator::GrpcRouterConfiguratorRef;
33use servers::http::{HttpServer, HttpServerBuilder};
34use servers::metrics_handler::MetricsHandler;
35use servers::server::Server;
36use snafu::ResultExt;
37use tokio::net::TcpListener;
38use tokio::sync::mpsc::{self, Receiver, Sender};
39use tokio::sync::{Mutex, oneshot};
40use tonic::codec::CompressionEncoding;
41use tonic::transport::server::{Router, TcpIncoming};
42
43use crate::cluster::{MetaPeerClientBuilder, MetaPeerClientRef};
44#[cfg(any(feature = "pg_kvbackend", feature = "mysql_kvbackend"))]
45use crate::election::CANDIDATE_LEASE_SECS;
46use crate::election::etcd::EtcdElection;
47use crate::error::OtherSnafu;
48use crate::metasrv::builder::MetasrvBuilder;
49use crate::metasrv::{
50    BackendImpl, ElectionRef, Metasrv, MetasrvOptions, SelectTarget, SelectorRef,
51};
52use crate::selector::SelectorType;
53use crate::selector::lease_based::LeaseBasedSelector;
54use crate::selector::load_based::LoadBasedSelector;
55use crate::selector::round_robin::RoundRobinSelector;
56use crate::selector::weight_compute::RegionNumsBasedWeightCompute;
57use crate::service::admin;
58use crate::service::admin::admin_axum_router;
59use crate::utils::etcd::create_etcd_client_with_tls;
60use crate::{Result, error};
61
62pub struct MetasrvInstance {
63    metasrv: Arc<Metasrv>,
64
65    http_server: Either<Option<HttpServerBuilder>, HttpServer>,
66
67    opts: MetasrvOptions,
68
69    signal_sender: Option<Sender<()>>,
70
71    plugins: Plugins,
72
73    /// gRPC serving state receiver. Only present if the gRPC server is started.
74    serve_state: Arc<Mutex<Option<oneshot::Receiver<Result<()>>>>>,
75
76    /// gRPC bind addr
77    bind_addr: Option<SocketAddr>,
78}
79
80impl MetasrvInstance {
81    pub async fn new(metasrv: Metasrv) -> Result<MetasrvInstance> {
82        let opts = metasrv.options().clone();
83        let plugins = metasrv.plugins().clone();
84        let metasrv = Arc::new(metasrv);
85
86        // Wire up the admin_axum_router as an extra router
87        let extra_routers = admin_axum_router(metasrv.clone());
88
89        let mut builder = HttpServerBuilder::new(opts.http.clone())
90            .with_metrics_handler(MetricsHandler)
91            .with_greptime_config_options(opts.to_toml().context(error::TomlFormatSnafu)?);
92        builder = builder.with_extra_router(extra_routers);
93
94        // put metasrv into plugins for later use
95        plugins.insert::<Arc<Metasrv>>(metasrv.clone());
96        Ok(MetasrvInstance {
97            metasrv,
98            http_server: Either::Left(Some(builder)),
99            opts,
100            signal_sender: None,
101            plugins,
102            serve_state: Default::default(),
103            bind_addr: None,
104        })
105    }
106
107    pub async fn start(&mut self) -> Result<()> {
108        if let Some(builder) = self.http_server.as_mut().left()
109            && let Some(builder) = builder.take()
110        {
111            let mut server = builder.build();
112
113            let addr = self.opts.http.addr.parse().context(error::ParseAddrSnafu {
114                addr: &self.opts.http.addr,
115            })?;
116            info!("starting http server at {}", addr);
117            server.start(addr).await.context(error::StartHttpSnafu)?;
118
119            self.http_server = Either::Right(server);
120        } else {
121            // If the http server builder is not present, the Metasrv has to be called "start"
122            // already, regardless of the startup was successful or not. Return an `Ok` here for
123            // simplicity.
124            return Ok(());
125        };
126
127        self.metasrv.try_start().await?;
128
129        let (tx, rx) = mpsc::channel::<()>(1);
130
131        self.signal_sender = Some(tx);
132
133        // Start gRPC server with admin services for backward compatibility
134        let mut router = router(self.metasrv.clone());
135        if let Some(configurator) = self
136            .metasrv
137            .plugins()
138            .get::<GrpcRouterConfiguratorRef<()>>()
139        {
140            router = configurator
141                .configure_grpc_router(router, ())
142                .await
143                .context(OtherSnafu)?;
144        }
145
146        let (serve_state_tx, serve_state_rx) = oneshot::channel();
147
148        let socket_addr =
149            bootstrap_metasrv_with_router(&self.opts.grpc.bind_addr, router, serve_state_tx, rx)
150                .await?;
151        self.bind_addr = Some(socket_addr);
152
153        *self.serve_state.lock().await = Some(serve_state_rx);
154        Ok(())
155    }
156
157    pub async fn shutdown(&self) -> Result<()> {
158        if let Some(mut rx) = self.serve_state.lock().await.take()
159            && let Ok(Err(err)) = rx.try_recv()
160        {
161            common_telemetry::error!(err; "Metasrv start failed")
162        }
163        if let Some(signal) = &self.signal_sender {
164            signal
165                .send(())
166                .await
167                .context(error::SendShutdownSignalSnafu)?;
168        }
169        self.metasrv.shutdown().await?;
170
171        if let Some(http_server) = self.http_server.as_ref().right() {
172            http_server
173                .shutdown()
174                .await
175                .context(error::ShutdownServerSnafu {
176                    server: http_server.name(),
177                })?;
178        }
179        Ok(())
180    }
181
182    pub fn plugins(&self) -> Plugins {
183        self.plugins.clone()
184    }
185
186    pub fn get_inner(&self) -> &Metasrv {
187        &self.metasrv
188    }
189    pub fn bind_addr(&self) -> &Option<SocketAddr> {
190        &self.bind_addr
191    }
192
193    pub fn mut_http_server(&mut self) -> &mut Either<Option<HttpServerBuilder>, HttpServer> {
194        &mut self.http_server
195    }
196
197    pub fn http_server(&self) -> Option<&HttpServer> {
198        self.http_server.as_ref().right()
199    }
200}
201
202pub async fn bootstrap_metasrv_with_router(
203    bind_addr: &str,
204    router: Router,
205    serve_state_tx: oneshot::Sender<Result<()>>,
206    mut shutdown_rx: Receiver<()>,
207) -> Result<SocketAddr> {
208    let listener = TcpListener::bind(bind_addr)
209        .await
210        .context(error::TcpBindSnafu { addr: bind_addr })?;
211
212    let real_bind_addr = listener
213        .local_addr()
214        .context(error::TcpBindSnafu { addr: bind_addr })?;
215
216    info!("gRPC server is bound to: {}", real_bind_addr);
217
218    let incoming = TcpIncoming::from(listener).with_nodelay(Some(true));
219
220    let _handle = common_runtime::spawn_global(async move {
221        let result = router
222            .serve_with_incoming_shutdown(incoming, async {
223                let _ = shutdown_rx.recv().await;
224            })
225            .await
226            .inspect_err(|err| common_telemetry::error!(err;"Failed to start metasrv"))
227            .context(error::StartGrpcSnafu);
228        let _ = serve_state_tx.send(result);
229    });
230
231    Ok(real_bind_addr)
232}
233
234#[macro_export]
235macro_rules! add_compressed_service {
236    ($builder:expr, $server:expr) => {
237        $builder.add_service(
238            $server
239                .accept_compressed(CompressionEncoding::Gzip)
240                .accept_compressed(CompressionEncoding::Zstd)
241                .send_compressed(CompressionEncoding::Gzip)
242                .send_compressed(CompressionEncoding::Zstd),
243        )
244    };
245}
246
247pub fn router(metasrv: Arc<Metasrv>) -> Router {
248    let mut router = tonic::transport::Server::builder().accept_http1(true); // for admin services
249    let router = add_compressed_service!(router, HeartbeatServer::from_arc(metasrv.clone()));
250    let router = add_compressed_service!(router, StoreServer::from_arc(metasrv.clone()));
251    let router = add_compressed_service!(router, ClusterServer::from_arc(metasrv.clone()));
252    let router = add_compressed_service!(router, ProcedureServiceServer::from_arc(metasrv.clone()));
253    router.add_service(admin::make_admin_service(metasrv))
254}
255
256pub async fn metasrv_builder(
257    opts: &MetasrvOptions,
258    plugins: Plugins,
259    kv_backend: Option<KvBackendRef>,
260) -> Result<MetasrvBuilder> {
261    let (mut kv_backend, election) = match (kv_backend, &opts.backend) {
262        (Some(kv_backend), _) => (kv_backend, None),
263        (None, BackendImpl::MemoryStore) => (Arc::new(MemoryKvBackend::new()) as _, None),
264        (None, BackendImpl::EtcdStore) => {
265            let etcd_client =
266                create_etcd_client_with_tls(&opts.store_addrs, opts.backend_tls.as_ref()).await?;
267            let kv_backend = EtcdStore::with_etcd_client(etcd_client.clone(), opts.max_txn_ops);
268            let election = EtcdElection::with_etcd_client(
269                &opts.grpc.server_addr,
270                etcd_client,
271                opts.store_key_prefix.clone(),
272            )
273            .await?;
274
275            (kv_backend, Some(election))
276        }
277        #[cfg(feature = "pg_kvbackend")]
278        (None, BackendImpl::PostgresStore) => {
279            use std::time::Duration;
280
281            use common_meta::distributed_time_constants::POSTGRES_KEEP_ALIVE_SECS;
282            use common_meta::kv_backend::rds::PgStore;
283            use deadpool_postgres::Config;
284
285            use crate::election::rds::postgres::{ElectionPgClient, PgElection};
286            use crate::utils::postgres::create_postgres_pool;
287
288            let candidate_lease_ttl = Duration::from_secs(CANDIDATE_LEASE_SECS);
289            let execution_timeout = Duration::from_secs(META_LEASE_SECS);
290            let statement_timeout = Duration::from_secs(META_LEASE_SECS);
291            let idle_session_timeout = Duration::from_secs(META_LEASE_SECS);
292            let meta_lease_ttl = Duration::from_secs(META_LEASE_SECS);
293
294            let mut cfg = Config::new();
295            cfg.keepalives = Some(true);
296            cfg.keepalives_idle = Some(Duration::from_secs(POSTGRES_KEEP_ALIVE_SECS));
297            // We use a separate pool for election since we need a different session keep-alive idle time.
298            let pool = create_postgres_pool(&opts.store_addrs, Some(cfg), opts.backend_tls.clone())
299                .await?;
300
301            let election_client = ElectionPgClient::new(
302                pool,
303                execution_timeout,
304                idle_session_timeout,
305                statement_timeout,
306            )?;
307            let election = PgElection::with_pg_client(
308                opts.grpc.server_addr.clone(),
309                election_client,
310                opts.store_key_prefix.clone(),
311                candidate_lease_ttl,
312                meta_lease_ttl,
313                opts.meta_schema_name.as_deref(),
314                &opts.meta_table_name,
315                opts.meta_election_lock_id,
316            )
317            .await?;
318
319            let pool =
320                create_postgres_pool(&opts.store_addrs, None, opts.backend_tls.clone()).await?;
321            let kv_backend = PgStore::with_pg_pool(
322                pool,
323                opts.meta_schema_name.as_deref(),
324                &opts.meta_table_name,
325                opts.max_txn_ops,
326            )
327            .await
328            .context(error::KvBackendSnafu)?;
329
330            (kv_backend, Some(election))
331        }
332        #[cfg(feature = "mysql_kvbackend")]
333        (None, BackendImpl::MysqlStore) => {
334            use std::time::Duration;
335
336            use common_meta::kv_backend::rds::MySqlStore;
337
338            use crate::election::rds::mysql::{ElectionMysqlClient, MySqlElection};
339            use crate::utils::mysql::create_mysql_pool;
340
341            let pool = create_mysql_pool(&opts.store_addrs, opts.backend_tls.as_ref()).await?;
342            let kv_backend =
343                MySqlStore::with_mysql_pool(pool, &opts.meta_table_name, opts.max_txn_ops)
344                    .await
345                    .context(error::KvBackendSnafu)?;
346            // Since election will acquire a lock of the table, we need a separate table for election.
347            let election_table_name = opts.meta_table_name.clone() + "_election";
348            // We use a separate pool for election since we need a different session keep-alive idle time.
349            let pool = create_mysql_pool(&opts.store_addrs, opts.backend_tls.as_ref()).await?;
350            let execution_timeout = Duration::from_secs(META_LEASE_SECS);
351            let statement_timeout = Duration::from_secs(META_LEASE_SECS);
352            let idle_session_timeout = Duration::from_secs(META_LEASE_SECS);
353            let innode_lock_wait_timeout = Duration::from_secs(META_LEASE_SECS / 2);
354            let meta_lease_ttl = Duration::from_secs(META_LEASE_SECS);
355            let candidate_lease_ttl = Duration::from_secs(CANDIDATE_LEASE_SECS);
356
357            let election_client = ElectionMysqlClient::new(
358                pool,
359                execution_timeout,
360                statement_timeout,
361                innode_lock_wait_timeout,
362                idle_session_timeout,
363                &election_table_name,
364            );
365            let election = MySqlElection::with_mysql_client(
366                opts.grpc.server_addr.clone(),
367                election_client,
368                opts.store_key_prefix.clone(),
369                candidate_lease_ttl,
370                meta_lease_ttl,
371                &election_table_name,
372            )
373            .await?;
374            (kv_backend, Some(election))
375        }
376    };
377
378    if !opts.store_key_prefix.is_empty() {
379        info!(
380            "using chroot kv backend with prefix: {prefix}",
381            prefix = opts.store_key_prefix
382        );
383        kv_backend = Arc::new(ChrootKvBackend::new(
384            opts.store_key_prefix.clone().into_bytes(),
385            kv_backend,
386        ))
387    }
388
389    let in_memory = Arc::new(MemoryKvBackend::new()) as ResettableKvBackendRef;
390    let meta_peer_client = build_default_meta_peer_client(&election, &in_memory);
391
392    let selector = if let Some(selector) = plugins.get::<SelectorRef>() {
393        info!("Using selector from plugins");
394        selector
395    } else {
396        let selector = match opts.selector {
397            SelectorType::LoadBased => Arc::new(LoadBasedSelector::new(
398                RegionNumsBasedWeightCompute,
399                meta_peer_client.clone(),
400            )) as SelectorRef,
401            SelectorType::LeaseBased => Arc::new(LeaseBasedSelector) as SelectorRef,
402            SelectorType::RoundRobin => {
403                Arc::new(RoundRobinSelector::new(SelectTarget::Datanode)) as SelectorRef
404            }
405        };
406        info!(
407            "Using selector from options, selector type: {}",
408            opts.selector.as_ref()
409        );
410        selector
411    };
412
413    Ok(MetasrvBuilder::new()
414        .options(opts.clone())
415        .kv_backend(kv_backend)
416        .in_memory(in_memory)
417        .selector(selector)
418        .election(election)
419        .meta_peer_client(meta_peer_client)
420        .plugins(plugins))
421}
422
423pub(crate) fn build_default_meta_peer_client(
424    election: &Option<ElectionRef>,
425    in_memory: &ResettableKvBackendRef,
426) -> MetaPeerClientRef {
427    MetaPeerClientBuilder::default()
428        .election(election.clone())
429        .in_memory(in_memory.clone())
430        .build()
431        .map(Arc::new)
432        // Safety: all required fields set at initialization
433        .unwrap()
434}