2020-04-27 21:18:02 +00:00
|
|
|
package remotewrite
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"io/ioutil"
|
|
|
|
"net/http"
|
2021-09-16 11:00:16 +00:00
|
|
|
"path"
|
2020-04-27 21:18:02 +00:00
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2021-09-14 11:32:06 +00:00
|
|
|
"github.com/golang/snappy"
|
|
|
|
|
2020-04-27 21:18:02 +00:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/logger"
|
2021-09-14 11:32:06 +00:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/promauth"
|
2020-04-27 21:18:02 +00:00
|
|
|
"github.com/VictoriaMetrics/VictoriaMetrics/lib/prompbmarshal"
|
2020-07-05 15:46:52 +00:00
|
|
|
"github.com/VictoriaMetrics/metrics"
|
2020-04-27 21:18:02 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// Client is an asynchronous HTTP client for writing
|
|
|
|
// timeseries via remote write protocol.
|
|
|
|
type Client struct {
|
2021-08-16 11:20:57 +00:00
|
|
|
addr string
|
|
|
|
c *http.Client
|
2021-09-14 11:32:06 +00:00
|
|
|
authCfg *promauth.Config
|
2021-08-16 11:20:57 +00:00
|
|
|
input chan prompbmarshal.TimeSeries
|
|
|
|
flushInterval time.Duration
|
|
|
|
maxBatchSize int
|
|
|
|
maxQueueSize int
|
|
|
|
disablePathAppend bool
|
2020-04-27 21:18:02 +00:00
|
|
|
|
|
|
|
wg sync.WaitGroup
|
|
|
|
doneCh chan struct{}
|
|
|
|
}
|
|
|
|
|
2020-04-28 08:19:37 +00:00
|
|
|
// Config is config for remote write.
|
2020-04-27 21:18:02 +00:00
|
|
|
type Config struct {
|
|
|
|
// Addr of remote storage
|
2021-09-14 11:32:06 +00:00
|
|
|
Addr string
|
|
|
|
AuthCfg *promauth.Config
|
2020-04-27 21:18:02 +00:00
|
|
|
|
2020-06-01 10:46:37 +00:00
|
|
|
// Concurrency defines number of readers that
|
|
|
|
// concurrently read from the queue and flush data
|
|
|
|
Concurrency int
|
2020-04-27 21:18:02 +00:00
|
|
|
// MaxBatchSize defines max number of timeseries
|
|
|
|
// to be flushed at once
|
|
|
|
MaxBatchSize int
|
|
|
|
// MaxQueueSize defines max length of input queue
|
2020-06-01 10:46:37 +00:00
|
|
|
// populated by Push method.
|
|
|
|
// Push will be rejected once queue is full.
|
2020-04-27 21:18:02 +00:00
|
|
|
MaxQueueSize int
|
|
|
|
// FlushInterval defines time interval for flushing batches
|
|
|
|
FlushInterval time.Duration
|
|
|
|
// WriteTimeout defines timeout for HTTP write request
|
|
|
|
// to remote storage
|
|
|
|
WriteTimeout time.Duration
|
2020-06-23 19:45:45 +00:00
|
|
|
// Transport will be used by the underlying http.Client
|
|
|
|
Transport *http.Transport
|
2021-08-16 11:20:57 +00:00
|
|
|
// DisablePathAppend can be used to not automatically append '/api/v1/write' to the remote write url
|
|
|
|
DisablePathAppend bool
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
2020-06-01 10:46:37 +00:00
|
|
|
defaultConcurrency = 4
|
2020-04-27 21:18:02 +00:00
|
|
|
defaultMaxBatchSize = 1e3
|
2020-06-01 10:46:37 +00:00
|
|
|
defaultMaxQueueSize = 1e5
|
2020-07-05 15:46:52 +00:00
|
|
|
defaultFlushInterval = 5 * time.Second
|
2020-04-27 21:18:02 +00:00
|
|
|
defaultWriteTimeout = 30 * time.Second
|
|
|
|
)
|
|
|
|
|
|
|
|
const writePath = "/api/v1/write"
|
|
|
|
|
|
|
|
// NewClient returns asynchronous client for
|
|
|
|
// writing timeseries via remotewrite protocol.
|
|
|
|
func NewClient(ctx context.Context, cfg Config) (*Client, error) {
|
|
|
|
if cfg.Addr == "" {
|
|
|
|
return nil, fmt.Errorf("config.Addr can't be empty")
|
|
|
|
}
|
|
|
|
if cfg.MaxBatchSize == 0 {
|
|
|
|
cfg.MaxBatchSize = defaultMaxBatchSize
|
|
|
|
}
|
|
|
|
if cfg.MaxQueueSize == 0 {
|
|
|
|
cfg.MaxQueueSize = defaultMaxQueueSize
|
|
|
|
}
|
|
|
|
if cfg.FlushInterval == 0 {
|
|
|
|
cfg.FlushInterval = defaultFlushInterval
|
|
|
|
}
|
|
|
|
if cfg.WriteTimeout == 0 {
|
|
|
|
cfg.WriteTimeout = defaultWriteTimeout
|
|
|
|
}
|
2020-07-05 15:46:52 +00:00
|
|
|
if cfg.Transport == nil {
|
|
|
|
cfg.Transport = http.DefaultTransport.(*http.Transport).Clone()
|
|
|
|
}
|
2021-09-16 11:00:16 +00:00
|
|
|
cc := defaultConcurrency
|
|
|
|
if cfg.Concurrency > 0 {
|
|
|
|
cc = cfg.Concurrency
|
|
|
|
}
|
2020-04-27 21:18:02 +00:00
|
|
|
c := &Client{
|
|
|
|
c: &http.Client{
|
2020-06-23 19:45:45 +00:00
|
|
|
Timeout: cfg.WriteTimeout,
|
|
|
|
Transport: cfg.Transport,
|
2020-04-27 21:18:02 +00:00
|
|
|
},
|
2021-08-16 11:20:57 +00:00
|
|
|
addr: strings.TrimSuffix(cfg.Addr, "/"),
|
2021-09-14 11:32:06 +00:00
|
|
|
authCfg: cfg.AuthCfg,
|
2021-08-16 11:20:57 +00:00
|
|
|
flushInterval: cfg.FlushInterval,
|
|
|
|
maxBatchSize: cfg.MaxBatchSize,
|
|
|
|
maxQueueSize: cfg.MaxQueueSize,
|
|
|
|
doneCh: make(chan struct{}),
|
|
|
|
input: make(chan prompbmarshal.TimeSeries, cfg.MaxQueueSize),
|
|
|
|
disablePathAppend: cfg.DisablePathAppend,
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|
2021-09-16 11:00:16 +00:00
|
|
|
|
2020-06-01 10:46:37 +00:00
|
|
|
for i := 0; i < cc; i++ {
|
|
|
|
c.run(ctx)
|
|
|
|
}
|
2020-04-27 21:18:02 +00:00
|
|
|
return c, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Push adds timeseries into queue for writing into remote storage.
|
|
|
|
// Push returns and error if client is stopped or if queue is full.
|
|
|
|
func (c *Client) Push(s prompbmarshal.TimeSeries) error {
|
|
|
|
select {
|
|
|
|
case <-c.doneCh:
|
|
|
|
return fmt.Errorf("client is closed")
|
|
|
|
case c.input <- s:
|
|
|
|
return nil
|
|
|
|
default:
|
2020-05-13 18:32:21 +00:00
|
|
|
return fmt.Errorf("failed to push timeseries - queue is full (%d entries). "+
|
|
|
|
"Queue size is controlled by -remoteWrite.maxQueueSize flag",
|
2020-04-27 21:18:02 +00:00
|
|
|
c.maxQueueSize)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close stops the client and waits for all goroutines
|
|
|
|
// to exit.
|
|
|
|
func (c *Client) Close() error {
|
|
|
|
if c.doneCh == nil {
|
|
|
|
return fmt.Errorf("client is already closed")
|
|
|
|
}
|
|
|
|
close(c.input)
|
|
|
|
close(c.doneCh)
|
|
|
|
c.wg.Wait()
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) run(ctx context.Context) {
|
|
|
|
ticker := time.NewTicker(c.flushInterval)
|
2020-07-05 15:46:52 +00:00
|
|
|
wr := &prompbmarshal.WriteRequest{}
|
2020-04-27 21:18:02 +00:00
|
|
|
shutdown := func() {
|
|
|
|
for ts := range c.input {
|
|
|
|
wr.Timeseries = append(wr.Timeseries, ts)
|
|
|
|
}
|
2020-06-01 10:46:37 +00:00
|
|
|
lastCtx, cancel := context.WithTimeout(context.Background(), defaultWriteTimeout)
|
2020-04-27 21:18:02 +00:00
|
|
|
c.flush(lastCtx, wr)
|
|
|
|
cancel()
|
|
|
|
}
|
|
|
|
c.wg.Add(1)
|
|
|
|
go func() {
|
|
|
|
defer c.wg.Done()
|
|
|
|
defer ticker.Stop()
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-c.doneCh:
|
|
|
|
shutdown()
|
|
|
|
return
|
|
|
|
case <-ctx.Done():
|
|
|
|
shutdown()
|
|
|
|
return
|
|
|
|
case <-ticker.C:
|
|
|
|
c.flush(ctx, wr)
|
2020-07-05 15:46:52 +00:00
|
|
|
case ts, ok := <-c.input:
|
|
|
|
if !ok {
|
|
|
|
continue
|
|
|
|
}
|
2020-04-27 21:18:02 +00:00
|
|
|
wr.Timeseries = append(wr.Timeseries, ts)
|
|
|
|
if len(wr.Timeseries) >= c.maxBatchSize {
|
|
|
|
c.flush(ctx, wr)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
2020-07-05 15:46:52 +00:00
|
|
|
var (
|
2021-09-16 11:00:16 +00:00
|
|
|
sentRows = metrics.NewCounter(`vmalert_remotewrite_sent_rows_total`)
|
|
|
|
sentBytes = metrics.NewCounter(`vmalert_remotewrite_sent_bytes_total`)
|
|
|
|
droppedRows = metrics.NewCounter(`vmalert_remotewrite_dropped_rows_total`)
|
|
|
|
droppedBytes = metrics.NewCounter(`vmalert_remotewrite_dropped_bytes_total`)
|
|
|
|
bufferFlushDuration = metrics.NewHistogram(`vmalert_remotewrite_flush_duration_seconds`)
|
2020-07-05 15:46:52 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// flush is a blocking function that marshals WriteRequest and sends
|
|
|
|
// it to remote write endpoint. Flush performs limited amount of retries
|
|
|
|
// if request fails.
|
|
|
|
func (c *Client) flush(ctx context.Context, wr *prompbmarshal.WriteRequest) {
|
2020-04-27 21:18:02 +00:00
|
|
|
if len(wr.Timeseries) < 1 {
|
|
|
|
return
|
|
|
|
}
|
2020-07-05 15:46:52 +00:00
|
|
|
defer prompbmarshal.ResetWriteRequest(wr)
|
2021-09-16 11:00:16 +00:00
|
|
|
defer bufferFlushDuration.UpdateDuration(time.Now())
|
2020-07-05 15:46:52 +00:00
|
|
|
|
2020-04-27 21:18:02 +00:00
|
|
|
data, err := wr.Marshal()
|
|
|
|
if err != nil {
|
|
|
|
logger.Errorf("failed to marshal WriteRequest: %s", err)
|
|
|
|
return
|
|
|
|
}
|
2020-07-05 15:46:52 +00:00
|
|
|
|
|
|
|
const attempts = 5
|
|
|
|
b := snappy.Encode(nil, data)
|
|
|
|
for i := 0; i < attempts; i++ {
|
|
|
|
err := c.send(ctx, b)
|
|
|
|
if err == nil {
|
|
|
|
sentRows.Add(len(wr.Timeseries))
|
|
|
|
sentBytes.Add(len(b))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
logger.Errorf("attempt %d to send request failed: %s", i+1, err)
|
|
|
|
// sleeping to avoid remote db hammering
|
|
|
|
time.Sleep(time.Second)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
droppedRows.Add(len(wr.Timeseries))
|
|
|
|
droppedBytes.Add(len(b))
|
|
|
|
logger.Errorf("all %d attempts to send request failed - dropping %d timeseries",
|
|
|
|
attempts, len(wr.Timeseries))
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Client) send(ctx context.Context, data []byte) error {
|
|
|
|
r := bytes.NewReader(data)
|
|
|
|
req, err := http.NewRequest("POST", c.addr, r)
|
2020-04-27 21:18:02 +00:00
|
|
|
if err != nil {
|
2020-07-15 10:54:45 +00:00
|
|
|
return fmt.Errorf("failed to create new HTTP request: %w", err)
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|
2021-09-14 11:32:06 +00:00
|
|
|
if c.authCfg != nil {
|
|
|
|
if auth := c.authCfg.GetAuthHeader(); auth != "" {
|
|
|
|
req.Header.Set("Authorization", auth)
|
|
|
|
}
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|
2021-08-16 11:20:57 +00:00
|
|
|
if !c.disablePathAppend {
|
2021-09-16 11:00:16 +00:00
|
|
|
req.URL.Path = path.Join(req.URL.Path, writePath)
|
2021-08-16 11:20:57 +00:00
|
|
|
}
|
2020-04-27 21:18:02 +00:00
|
|
|
resp, err := c.c.Do(req.WithContext(ctx))
|
|
|
|
if err != nil {
|
2020-07-15 10:54:45 +00:00
|
|
|
return fmt.Errorf("error while sending request to %s: %w; Data len %d(%d)",
|
2021-10-18 07:20:26 +00:00
|
|
|
req.URL.Redacted(), err, len(data), r.Size())
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|
|
|
|
defer func() { _ = resp.Body.Close() }()
|
2021-08-20 08:58:32 +00:00
|
|
|
if resp.StatusCode != http.StatusNoContent && resp.StatusCode != http.StatusOK {
|
2020-04-27 21:18:02 +00:00
|
|
|
body, _ := ioutil.ReadAll(resp.Body)
|
2020-07-05 15:46:52 +00:00
|
|
|
return fmt.Errorf("unexpected response code %d for %s. Response body %q",
|
2021-10-18 07:20:26 +00:00
|
|
|
resp.StatusCode, req.URL.Redacted(), body)
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|
2020-07-05 15:46:52 +00:00
|
|
|
return nil
|
2020-04-27 21:18:02 +00:00
|
|
|
}
|