accumulo-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From milleruntime <...@git.apache.org>
Subject [GitHub] accumulo pull request #242: ACCUMULO-2181/3005 REST API and new Monitor UI
Date Fri, 07 Apr 2017 20:21:32 GMT
Github user milleruntime commented on a diff in the pull request:

    https://github.com/apache/accumulo/pull/242#discussion_r110469952
  
    --- Diff: server/monitor/src/main/java/org/apache/accumulo/monitor/rest/trace/TracesResource.java
---
    @@ -0,0 +1,372 @@
    +/*
    + * Licensed to the Apache Software Foundation (ASF) under one or more
    + * contributor license agreements.  See the NOTICE file distributed with
    + * this work for additional information regarding copyright ownership.
    + * The ASF licenses this file to You under the Apache License, Version 2.0
    + * (the "License"); you may not use this file except in compliance with
    + * the License.  You may obtain a copy of the License at
    + *
    + *     http://www.apache.org/licenses/LICENSE-2.0
    + *
    + * Unless required by applicable law or agreed to in writing, software
    + * distributed under the License is distributed on an "AS IS" BASIS,
    + * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
    + * See the License for the specific language governing permissions and
    + * limitations under the License.
    + */
    +package org.apache.accumulo.monitor.rest.trace;
    +
    +import static java.lang.Math.min;
    +import static java.nio.charset.StandardCharsets.UTF_8;
    +
    +import java.io.IOException;
    +import java.security.PrivilegedAction;
    +import java.security.PrivilegedExceptionAction;
    +import java.util.Collection;
    +import java.util.Map;
    +import java.util.Map.Entry;
    +import java.util.Set;
    +import java.util.TreeMap;
    +
    +import javax.ws.rs.DefaultValue;
    +import javax.ws.rs.GET;
    +import javax.ws.rs.Path;
    +import javax.ws.rs.PathParam;
    +import javax.ws.rs.Produces;
    +import javax.ws.rs.core.MediaType;
    +
    +import org.apache.accumulo.core.client.AccumuloException;
    +import org.apache.accumulo.core.client.AccumuloSecurityException;
    +import org.apache.accumulo.core.client.Connector;
    +import org.apache.accumulo.core.client.Scanner;
    +import org.apache.accumulo.core.client.TableNotFoundException;
    +import org.apache.accumulo.core.client.security.tokens.AuthenticationToken;
    +import org.apache.accumulo.core.client.security.tokens.AuthenticationToken.Properties;
    +import org.apache.accumulo.core.client.security.tokens.KerberosToken;
    +import org.apache.accumulo.core.client.security.tokens.PasswordToken;
    +import org.apache.accumulo.core.conf.AccumuloConfiguration;
    +import org.apache.accumulo.core.conf.Property;
    +import org.apache.accumulo.core.data.Key;
    +import org.apache.accumulo.core.data.Range;
    +import org.apache.accumulo.core.data.Value;
    +import org.apache.accumulo.core.util.Pair;
    +import org.apache.accumulo.monitor.Monitor;
    +import org.apache.accumulo.server.client.HdfsZooInstance;
    +import org.apache.accumulo.server.security.SecurityUtil;
    +import org.apache.accumulo.tracer.SpanTree;
    +import org.apache.accumulo.tracer.SpanTreeVisitor;
    +import org.apache.accumulo.tracer.TraceDump;
    +import org.apache.accumulo.tracer.TraceFormatter;
    +import org.apache.accumulo.tracer.thrift.Annotation;
    +import org.apache.accumulo.tracer.thrift.RemoteSpan;
    +import org.apache.hadoop.io.Text;
    +import org.apache.hadoop.security.UserGroupInformation;
    +
    +/**
    + *
    + * Generates a list of traces with the summary, by type, and trace details
    + *
    + * @since 2.0.0
    + *
    + */
    +@Path("/trace")
    +@Produces({MediaType.APPLICATION_JSON, MediaType.APPLICATION_XML})
    +public class TracesResource {
    +
    +  /**
    +   * Generates a trace summary
    +   *
    +   * @param minutes
    +   *          Range of minutes to filter traces
    +   * @return Trace summary in specified range
    +   */
    +  @Path("summary/{minutes}")
    +  @GET
    +  public RecentTracesList getTraces(@DefaultValue("10") @PathParam("minutes") int minutes)
throws Exception {
    +
    +    RecentTracesList recentTraces = new RecentTracesList();
    +
    +    Pair<Scanner,UserGroupInformation> pair = getScanner();
    +    final Scanner scanner = pair.getFirst();
    +    if (scanner == null) {
    +      return recentTraces;
    +    }
    +
    +    Range range = getRangeForTrace(minutes);
    +    scanner.setRange(range);
    +
    +    final Map<String,RecentTracesInformation> summary = new TreeMap<>();
    +    if (null != pair.getSecond()) {
    +      pair.getSecond().doAs(new PrivilegedAction<Void>() {
    +        @Override
    +        public Void run() {
    +          parseSpans(scanner, summary);
    +          return null;
    +        }
    +      });
    +    } else {
    +      parseSpans(scanner, summary);
    +    }
    +
    +    // Adds the traces to the list
    +    for (Entry<String,RecentTracesInformation> entry : summary.entrySet()) {
    +      RecentTracesInformation stat = entry.getValue();
    +      recentTraces.addTrace(stat);
    +    }
    +    return recentTraces;
    +  }
    +
    +  /**
    +   * Generates a list of traces filtered by type and range of minutes
    +   *
    +   * @param type
    +   *          Type of the trace
    +   * @param minutes
    +   *          Range of minutes
    +   * @return List of traces filtered by type and range
    +   */
    +  @Path("listType/{type}/{minutes}")
    +  @GET
    +  public TraceType getTracesType(@PathParam("type") String type, @PathParam("minutes")
int minutes) throws Exception {
    +
    +    TraceType typeTraces = new TraceType(type);
    +
    +    Pair<Scanner,UserGroupInformation> pair = getScanner();
    +    final Scanner scanner = pair.getFirst();
    +    if (scanner == null) {
    +      return typeTraces;
    +    }
    +
    +    Range range = getRangeForTrace(minutes);
    +
    +    scanner.setRange(range);
    +
    +    if (null != pair.getSecond()) {
    +      pair.getSecond().doAs(new PrivilegedAction<Void>() {
    +        @Override
    +        public Void run() {
    +          for (Entry<Key,Value> entry : scanner) {
    +            RemoteSpan span = TraceFormatter.getRemoteSpan(entry);
    +
    +            if (span.description.equals(type)) {
    +              typeTraces.addTrace(new TracesForTypeInformation(span));
    +            }
    +          }
    +          return null;
    +        }
    +      });
    +    } else {
    +      for (Entry<Key,Value> entry : scanner) {
    +        RemoteSpan span = TraceFormatter.getRemoteSpan(entry);
    +        if (span.description.equals(type)) {
    +          typeTraces.addTrace(new TracesForTypeInformation(span));
    +        }
    +      }
    +    }
    +    return typeTraces;
    +  }
    +
    +  /**
    +   * Generates a list of traces filtered by ID
    +   *
    +   * @param id
    +   *          ID of the trace to display
    +   * @return traces by ID
    +   */
    +  @Path("show/{id}")
    +  @GET
    +  public TraceList getTracesType(@PathParam("id") String id) throws Exception {
    +    TraceList traces = new TraceList(id);
    +
    +    if (id == null) {
    +      return null;
    +    }
    +
    +    Pair<Scanner,UserGroupInformation> entry = getScanner();
    +    final Scanner scanner = entry.getFirst();
    +    if (scanner == null) {
    +      return traces;
    +    }
    +
    +    Range range = new Range(new Text(id));
    +    scanner.setRange(range);
    +    final SpanTree tree = new SpanTree();
    +    long start;
    +
    +    if (null != entry.getSecond()) {
    +      start = entry.getSecond().doAs(new PrivilegedAction<Long>() {
    +        @Override
    +        public Long run() {
    +          return addSpans(scanner, tree, Long.MAX_VALUE);
    +        }
    +      });
    +    } else {
    +      start = addSpans(scanner, tree, Long.MAX_VALUE);
    +    }
    +
    +    traces.addStartTime(start);
    +
    +    final long finalStart = start;
    +    Set<Long> visited = tree.visit(new SpanTreeVisitor() {
    +      @Override
    +      public void visit(int level, RemoteSpan parent, RemoteSpan node, Collection<RemoteSpan>
children) {
    +        traces.addTrace(addTraceInformation(level, node, finalStart));
    +      }
    +    });
    +    tree.nodes.keySet().removeAll(visited);
    +    if (!tree.nodes.isEmpty()) {
    +      for (RemoteSpan span : TraceDump.sortByStart(tree.nodes.values())) {
    +        traces.addTrace(addTraceInformation(0, span, finalStart));
    +      }
    +    }
    +    return traces;
    +  }
    +
    +  private static TraceInformation addTraceInformation(int level, RemoteSpan node, long
finalStart) {
    +
    +    boolean hasData = node.data != null && !node.data.isEmpty();
    +    boolean hasAnnotations = node.annotations != null && !node.annotations.isEmpty();
    +
    +    AddlInformation addlData = new AddlInformation();
    +
    +    if (hasData || hasAnnotations) {
    +
    +      if (hasData) {
    +        for (Entry<String,String> entry : node.data.entrySet()) {
    +          DataInformation data = new DataInformation(entry.getKey(), entry.getValue());
    +          addlData.addData(data);
    +        }
    +      }
    +      if (hasAnnotations) {
    +        for (Annotation entry : node.annotations) {
    +          AnnotationInformation annotations = new AnnotationInformation(entry.getMsg(),
entry.getTime() - finalStart);
    +          addlData.addAnnotations(annotations);
    +        }
    +      }
    +    }
    +
    +    return new TraceInformation(level, node.stop - node.start, node.start - finalStart,
node.spanId, node.svc + "@" + node.sender, node.description, addlData);
    +  }
    +
    +  protected Range getRangeForTrace(long minutesSince) {
    +    long endTime = System.currentTimeMillis();
    +    long millisSince = minutesSince * 60 * 1000;
    +    // Catch the overflow
    +    if (millisSince < minutesSince) {
    +      millisSince = endTime;
    +    }
    +    long startTime = endTime - millisSince;
    +
    +    String startHexTime = Long.toHexString(startTime), endHexTime = Long.toHexString(endTime);
    +    while (startHexTime.length() < endHexTime.length()) {
    +      startHexTime = "0" + startHexTime;
    +    }
    +
    +    return new Range(new Text("start:" + startHexTime), new Text("start:" + endHexTime));
    +  }
    +
    +  private void parseSpans(Scanner scanner, Map<String,RecentTracesInformation>
summary) {
    +    for (Entry<Key,Value> entry : scanner) {
    +      RemoteSpan span = TraceFormatter.getRemoteSpan(entry);
    +      RecentTracesInformation stats = summary.get(span.description);
    +      if (stats == null) {
    +        summary.put(span.description, stats = new RecentTracesInformation(span.description));
    +      }
    +      stats.addSpan(span);
    +    }
    +  }
    +
    +  protected Pair<Scanner,UserGroupInformation> getScanner() throws AccumuloException,
AccumuloSecurityException {
    +    AccumuloConfiguration conf = Monitor.getContext().getConfiguration();
    +    final boolean saslEnabled = conf.getBoolean(Property.INSTANCE_RPC_SASL_ENABLED);
    +    UserGroupInformation traceUgi = null;
    +    final String principal;
    +    final AuthenticationToken at;
    +    Map<String,String> loginMap = conf.getAllPropertiesWithPrefix(Property.TRACE_TOKEN_PROPERTY_PREFIX);
    +    // May be null
    +    String keytab = loginMap.get(Property.TRACE_TOKEN_PROPERTY_PREFIX.getKey() + "keytab");
    +    if (keytab == null || keytab.length() == 0) {
    +      keytab = conf.getPath(Property.GENERAL_KERBEROS_KEYTAB);
    +    }
    +
    +    if (saslEnabled && null != keytab) {
    +      principal = SecurityUtil.getServerPrincipal(conf.get(Property.TRACE_USER));
    +      try {
    +        traceUgi = UserGroupInformation.loginUserFromKeytabAndReturnUGI(principal, keytab);
    +      } catch (IOException e) {
    +        throw new RuntimeException("Failed to login as trace user", e);
    +      }
    +    } else {
    +      principal = conf.get(Property.TRACE_USER);
    +    }
    +
    +    if (!saslEnabled) {
    +      if (loginMap.isEmpty()) {
    +        Property p = Property.TRACE_PASSWORD;
    +        at = new PasswordToken(conf.get(p).getBytes(UTF_8));
    +      } else {
    +        Properties props = new Properties();
    +        int prefixLength = Property.TRACE_TOKEN_PROPERTY_PREFIX.getKey().length();
    +        for (Entry<String,String> entry : loginMap.entrySet()) {
    +          props.put(entry.getKey().substring(prefixLength), entry.getValue());
    +        }
    +
    +        AuthenticationToken token = Property.createInstanceFromPropertyName(conf, Property.TRACE_TOKEN_TYPE,
AuthenticationToken.class, new PasswordToken());
    +        token.init(props);
    +        at = token;
    +      }
    +    } else {
    +      at = null;
    +    }
    +
    +    final String table = conf.get(Property.TRACE_TABLE);
    +    Scanner scanner;
    +    if (null != traceUgi) {
    +      try {
    +        scanner = traceUgi.doAs(new PrivilegedExceptionAction<Scanner>() {
    +
    +          @Override
    +          public Scanner run() throws Exception {
    +            // Make the KerberosToken inside the doAs
    +            AuthenticationToken token = at;
    +            if (null == token) {
    +              token = new KerberosToken();
    +            }
    +            return getScanner(table, principal, token);
    +          }
    +
    +        });
    +      } catch (IOException | InterruptedException e) {
    +        throw new RuntimeException("Failed to obtain scanner", e);
    +      }
    +    } else {
    +      if (null == at) {
    +        throw new AssertionError("AuthenticationToken should not be null");
    +      }
    +      scanner = getScanner(table, principal, at);
    +    }
    +
    +    return new Pair<>(scanner, traceUgi);
    +  }
    +
    +  private Scanner getScanner(String table, String principal, AuthenticationToken at)
throws AccumuloException, AccumuloSecurityException {
    +    try {
    +      Connector conn = HdfsZooInstance.getInstance().getConnector(principal, at);
    +      if (!conn.tableOperations().exists(table)) {
    +        return null;
    +      }
    +      return conn.createScanner(table, conn.securityOperations().getUserAuthorizations(principal));
    +    } catch (AccumuloSecurityException | TableNotFoundException ex) {
    +      return null;
    --- End diff --
    
    You should let these exceptions go to calling methods, Users will want to know when these
happen.


---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at infrastructure@apache.org or file a JIRA ticket
with INFRA.
---

Mime
View raw message