mirror of
https://github.com/VictoriaMetrics/VictoriaMetrics.git
synced 2024-11-21 14:44:00 +00:00
all: do not skip SIGHUP signal during service initialization
This can lead to stale or incomplete configs like in the https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1240
This commit is contained in:
parent
45849886a3
commit
d77db9d813
6 changed files with 33 additions and 9 deletions
|
@ -104,6 +104,12 @@ func Init() {
|
||||||
*queues = 1
|
*queues = 1
|
||||||
}
|
}
|
||||||
initLabelsGlobal()
|
initLabelsGlobal()
|
||||||
|
|
||||||
|
// Register SIGHUP handler for config reload before loadRelabelConfigs.
|
||||||
|
// This guarantees that the config will be re-read if the signal arrives just after loadRelabelConfig.
|
||||||
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1240
|
||||||
|
sighupCh := procutil.NewSighupChan()
|
||||||
|
|
||||||
rcs, err := loadRelabelConfigs()
|
rcs, err := loadRelabelConfigs()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Fatalf("cannot load relabel configs: %s", err)
|
logger.Fatalf("cannot load relabel configs: %s", err)
|
||||||
|
@ -130,7 +136,6 @@ func Init() {
|
||||||
}
|
}
|
||||||
|
|
||||||
// Start config reloader.
|
// Start config reloader.
|
||||||
sighupCh := procutil.NewSighupChan()
|
|
||||||
configReloaderWG.Add(1)
|
configReloaderWG.Add(1)
|
||||||
go func() {
|
go func() {
|
||||||
defer configReloaderWG.Done()
|
defer configReloaderWG.Done()
|
||||||
|
|
|
@ -77,6 +77,12 @@ func main() {
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Fatalf("failed to init: %s", err)
|
logger.Fatalf("failed to init: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Register SIGHUP handler for config re-read just before manager.start call.
|
||||||
|
// This guarantees that the config will be re-read if the signal arrives during manager.start call.
|
||||||
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1240
|
||||||
|
sighupCh := procutil.NewSighupChan()
|
||||||
|
|
||||||
if err := manager.start(ctx, *rulePath, *validateTemplates, *validateExpressions); err != nil {
|
if err := manager.start(ctx, *rulePath, *validateTemplates, *validateExpressions); err != nil {
|
||||||
logger.Fatalf("failed to start: %s", err)
|
logger.Fatalf("failed to start: %s", err)
|
||||||
}
|
}
|
||||||
|
@ -85,9 +91,8 @@ func main() {
|
||||||
// init reload metrics with positive values to improve alerting conditions
|
// init reload metrics with positive values to improve alerting conditions
|
||||||
configSuccess.Set(1)
|
configSuccess.Set(1)
|
||||||
configTimestamp.Set(fasttime.UnixTimestamp())
|
configTimestamp.Set(fasttime.UnixTimestamp())
|
||||||
sigHup := procutil.NewSighupChan()
|
|
||||||
for {
|
for {
|
||||||
<-sigHup
|
<-sighupCh
|
||||||
configReloads.Inc()
|
configReloads.Inc()
|
||||||
logger.Infof("SIGHUP received. Going to reload rules %q ...", *rulePath)
|
logger.Infof("SIGHUP received. Going to reload rules %q ...", *rulePath)
|
||||||
if err := manager.update(ctx, *rulePath, *validateTemplates, *validateExpressions, false); err != nil {
|
if err := manager.update(ctx, *rulePath, *validateTemplates, *validateExpressions, false); err != nil {
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
"os"
|
||||||
"regexp"
|
"regexp"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
|
@ -109,6 +110,12 @@ func initAuthConfig() {
|
||||||
if len(*authConfigPath) == 0 {
|
if len(*authConfigPath) == 0 {
|
||||||
logger.Fatalf("missing required `-auth.config` command-line flag")
|
logger.Fatalf("missing required `-auth.config` command-line flag")
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Register SIGHUP handler for config re-read just before readAuthConfig call.
|
||||||
|
// This guarantees that the config will be re-read if the signal arrives during readAuthConfig call.
|
||||||
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1240
|
||||||
|
sighupCh := procutil.NewSighupChan()
|
||||||
|
|
||||||
m, err := readAuthConfig(*authConfigPath)
|
m, err := readAuthConfig(*authConfigPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Fatalf("cannot load auth config from `-auth.config=%s`: %s", *authConfigPath, err)
|
logger.Fatalf("cannot load auth config from `-auth.config=%s`: %s", *authConfigPath, err)
|
||||||
|
@ -118,7 +125,7 @@ func initAuthConfig() {
|
||||||
authConfigWG.Add(1)
|
authConfigWG.Add(1)
|
||||||
go func() {
|
go func() {
|
||||||
defer authConfigWG.Done()
|
defer authConfigWG.Done()
|
||||||
authConfigReloader()
|
authConfigReloader(sighupCh)
|
||||||
}()
|
}()
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -127,8 +134,7 @@ func stopAuthConfig() {
|
||||||
authConfigWG.Wait()
|
authConfigWG.Wait()
|
||||||
}
|
}
|
||||||
|
|
||||||
func authConfigReloader() {
|
func authConfigReloader(sighupCh <-chan os.Signal) {
|
||||||
sighupCh := procutil.NewSighupChan()
|
|
||||||
for {
|
for {
|
||||||
select {
|
select {
|
||||||
case <-stopCh:
|
case <-stopCh:
|
||||||
|
|
|
@ -19,6 +19,11 @@ var relabelConfig = flag.String("relabelConfig", "", "Optional path to a file wi
|
||||||
|
|
||||||
// Init must be called after flag.Parse and before using the relabel package.
|
// Init must be called after flag.Parse and before using the relabel package.
|
||||||
func Init() {
|
func Init() {
|
||||||
|
// Register SIGHUP handler for config re-read just before loadRelabelConfig call.
|
||||||
|
// This guarantees that the config will be re-read if the signal arrives during loadRelabelConfig call.
|
||||||
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1240
|
||||||
|
sighupCh := procutil.NewSighupChan()
|
||||||
|
|
||||||
pcs, err := loadRelabelConfig()
|
pcs, err := loadRelabelConfig()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
logger.Fatalf("cannot load relabelConfig: %s", err)
|
logger.Fatalf("cannot load relabelConfig: %s", err)
|
||||||
|
@ -27,7 +32,6 @@ func Init() {
|
||||||
if len(*relabelConfig) == 0 {
|
if len(*relabelConfig) == 0 {
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
sighupCh := procutil.NewSighupChan()
|
|
||||||
go func() {
|
go func() {
|
||||||
for range sighupCh {
|
for range sighupCh {
|
||||||
logger.Infof("received SIGHUP; reloading -relabelConfig=%q...", *relabelConfig)
|
logger.Infof("received SIGHUP; reloading -relabelConfig=%q...", *relabelConfig)
|
||||||
|
|
|
@ -31,6 +31,7 @@ sort: 15
|
||||||
* BUGFIX: vmauth, vmalert: properly re-use HTTP keep-alive connections to backends and datasources. Previously only 2 keep-alive connections per backend could be re-used. Other connections were closed after the first request. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1300) for details.
|
* BUGFIX: vmauth, vmalert: properly re-use HTTP keep-alive connections to backends and datasources. Previously only 2 keep-alive connections per backend could be re-used. Other connections were closed after the first request. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1300) for details.
|
||||||
* BUGFIX: vmalert: fix false positive error `result contains metrics with the same labelset after applying rule labels`, which could be triggered when recording rules generate unique metrics. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1293).
|
* BUGFIX: vmalert: fix false positive error `result contains metrics with the same labelset after applying rule labels`, which could be triggered when recording rules generate unique metrics. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1293).
|
||||||
* BUGFIX: vmctl: properly import InfluxDB rows if they have a field and a tag with identical names. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1299).
|
* BUGFIX: vmctl: properly import InfluxDB rows if they have a field and a tag with identical names. See [this issue](https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1299).
|
||||||
|
* BUGFIX: properly reload configs if `SIGHUP` signal arrives during service initialization. Previously such `SIGHUP` signal could be ingonred and configs weren't reloaded.
|
||||||
|
|
||||||
|
|
||||||
## [v1.59.0](https://github.com/VictoriaMetrics/VictoriaMetrics/releases/tag/v1.59.0)
|
## [v1.59.0](https://github.com/VictoriaMetrics/VictoriaMetrics/releases/tag/v1.59.0)
|
||||||
|
|
|
@ -88,6 +88,11 @@ func runScraper(configFile string, pushData func(wr *prompbmarshal.WriteRequest)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Register SIGHUP handler for config reload before loadConfig.
|
||||||
|
// This guarantees that the config will be re-read if the signal arrives just after loadConfig.
|
||||||
|
// See https://github.com/VictoriaMetrics/VictoriaMetrics/issues/1240
|
||||||
|
sighupCh := procutil.NewSighupChan()
|
||||||
|
|
||||||
logger.Infof("reading Prometheus configs from %q", configFile)
|
logger.Infof("reading Prometheus configs from %q", configFile)
|
||||||
cfg, data, err := loadConfig(configFile)
|
cfg, data, err := loadConfig(configFile)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -107,8 +112,6 @@ func runScraper(configFile string, pushData func(wr *prompbmarshal.WriteRequest)
|
||||||
scs.add("gce_sd_configs", *gceSDCheckInterval, func(cfg *Config, swsPrev []*ScrapeWork) []*ScrapeWork { return cfg.getGCESDScrapeWork(swsPrev) })
|
scs.add("gce_sd_configs", *gceSDCheckInterval, func(cfg *Config, swsPrev []*ScrapeWork) []*ScrapeWork { return cfg.getGCESDScrapeWork(swsPrev) })
|
||||||
scs.add("dockerswarm_sd_configs", *dockerswarmSDCheckInterval, func(cfg *Config, swsPrev []*ScrapeWork) []*ScrapeWork { return cfg.getDockerSwarmSDScrapeWork(swsPrev) })
|
scs.add("dockerswarm_sd_configs", *dockerswarmSDCheckInterval, func(cfg *Config, swsPrev []*ScrapeWork) []*ScrapeWork { return cfg.getDockerSwarmSDScrapeWork(swsPrev) })
|
||||||
|
|
||||||
sighupCh := procutil.NewSighupChan()
|
|
||||||
|
|
||||||
var tickerCh <-chan time.Time
|
var tickerCh <-chan time.Time
|
||||||
if *configCheckInterval > 0 {
|
if *configCheckInterval > 0 {
|
||||||
ticker := time.NewTicker(*configCheckInterval)
|
ticker := time.NewTicker(*configCheckInterval)
|
||||||
|
|
Loading…
Reference in a new issue