1 // -*- mode:C++; tab-width:8; c-basic-offset:2; indent-tabs-mode:t -*-
2 // vim: ts=8 sw=2 smarttab
4 * Ceph - scalable distributed file system
6 * Copyright (C) 2004-2006 Sage Weil <sage@newdream.net>
8 * This is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License version 2.1, as published by the Free Software
11 * Foundation. See file COPYING.
16 * This is the top level monitor. It runs on each machine in the Monitor
17 * Cluster. The election of a leader for the paxos algorithm only happens
18 * once per machine via the elector. There is a separate paxos instance (state)
19 * kept for each of the system components: Object Store Device (OSD) Monitor,
20 * Placement Group (PG) Monitor, Metadata Server (MDS) Monitor, and Client Monitor.
23 #ifndef CEPH_MONITOR_H
24 #define CEPH_MONITOR_H
29 #include "include/types.h"
30 #include "include/health.h"
31 #include "msg/Messenger.h"
33 #include "common/Timer.h"
35 #include "health_check.h"
40 #include "PGStatService.h"
41 #include "MonCommand.h"
43 #include "common/LogClient.h"
44 #include "auth/cephx/CephxKeyServer.h"
45 #include "auth/AuthMethodList.h"
46 #include "auth/KeyRing.h"
47 #include "messages/MMonCommand.h"
48 #include "mon/MonitorDBStore.h"
49 #include "include/memory.h"
50 #include "mgr/MgrClient.h"
52 #include "mon/MonOpRequest.h"
53 #include "common/WorkQueue.h"
56 #define CEPH_MON_PROTOCOL 13 /* cluster internal */
60 l_cluster_first
= 555000,
62 l_cluster_num_mon_quorum
,
68 l_cluster_osd_bytes_used
,
69 l_cluster_osd_bytes_avail
,
72 l_cluster_num_pg_active_clean
,
73 l_cluster_num_pg_active
,
74 l_cluster_num_pg_peering
,
76 l_cluster_num_object_degraded
,
77 l_cluster_num_object_misplaced
,
78 l_cluster_num_object_unfound
,
82 l_cluster_num_mds_failed
,
104 class AdminSocketHook
;
107 class MMonGetVersion
;
112 struct MMonSubscribe
;
118 #define COMPAT_SET_LOC "feature_set"
120 class C_MonContext final
: public FunctionContext
{
123 explicit C_MonContext(Monitor
*m
, boost::function
<void(int)>&& callback
)
124 : FunctionContext(std::move(callback
)), mon(m
) {}
125 void finish(int r
) override
;
128 class Monitor
: public Dispatcher
,
129 public md_config_obs_t
{
134 Messenger
*messenger
;
135 ConnectionRef con_self
;
139 ThreadPool cpu_tp
; ///< threadpool for CPU intensive work
141 /// true if we have ever joined a quorum. if false, we are either a
142 /// new cluster, a newly joining monitor, or a just-upgraded
144 bool has_ever_joined
;
146 PerfCounters
*logger
, *cluster_logger
;
147 bool cluster_logger_registered
;
149 void register_cluster_logger();
150 void unregister_cluster_logger();
155 set
<entity_addr_t
> extra_probe_peers
;
157 LogClient log_client
;
159 LogChannelRef audit_clog
;
161 KeyServer key_server
;
163 AuthMethodList auth_cluster_required
;
164 AuthMethodList auth_service_required
;
168 const MonCommand
*leader_supported_mon_commands
;
169 int leader_supported_mon_commands_size
;
171 Messenger
*mgr_messenger
;
172 MgrClient mgr_client
;
173 uint64_t mgr_proxy_bytes
= 0; // in-flight proxied mgr command message bytes
175 const MonPGStatService
*pgservice
;
180 // -- local storage --
182 MonitorDBStore
*store
;
183 static const string MONITOR_NAME
;
184 static const string MONITOR_STORE_PREFIX
;
186 // -- monitor state --
199 static const char *get_state_name(int s
) {
201 case STATE_PROBING
: return "probing";
202 case STATE_SYNCHRONIZING
: return "synchronizing";
203 case STATE_ELECTING
: return "electing";
204 case STATE_LEADER
: return "leader";
205 case STATE_PEON
: return "peon";
206 case STATE_SHUTDOWN
: return "shutdown";
207 default: return "???";
210 const char *get_state_name() const {
211 return get_state_name(state
);
214 bool is_shutdown() const { return state
== STATE_SHUTDOWN
; }
215 bool is_probing() const { return state
== STATE_PROBING
; }
216 bool is_synchronizing() const { return state
== STATE_SYNCHRONIZING
; }
217 bool is_electing() const { return state
== STATE_ELECTING
; }
218 bool is_leader() const { return state
== STATE_LEADER
; }
219 bool is_peon() const { return state
== STATE_PEON
; }
221 const utime_t
&get_leader_since() const;
223 void prepare_new_fingerprint(MonitorDBStore::TransactionRef t
);
229 friend class Elector
;
231 /// features we require of peers (based on on-disk compatset)
232 uint64_t required_features
;
234 int leader
; // current leader (to best of knowledge)
235 set
<int> quorum
; // current active set of monitors (if !starting)
236 utime_t leader_since
; // when this monitor became the leader, if it is the leader
237 utime_t exited_quorum
; // time detected as not in quorum; 0 if in
239 // map of counts of connected clients, by type and features, for
241 map
<int,FeatureMap
> quorum_feature_map
;
244 * Intersection of quorum member's connection feature bits.
246 uint64_t quorum_con_features
;
248 * Intersection of quorum members mon-specific feature bits
250 mon_feature_t quorum_mon_features
;
251 bufferlist supported_commands_bl
; // encoded MonCommands we support
253 set
<string
> outside_quorum
;
256 * @defgroup Monitor_h_scrub
259 version_t scrub_version
; ///< paxos version we are scrubbing
260 map
<int,ScrubResult
> scrub_result
; ///< results so far
263 * trigger a cross-mon scrub
265 * Verify all mons are storing identical content
269 void handle_scrub(MonOpRequestRef op
);
270 bool _scrub(ScrubResult
*r
,
271 pair
<string
,string
> *start
,
273 void scrub_check_results();
274 void scrub_timeout();
277 void scrub_update_interval(int secs
);
279 Context
*scrub_event
; ///< periodic event to trigger scrub (leader)
280 Context
*scrub_timeout_event
; ///< scrub round timeout (leader)
281 void scrub_event_start();
282 void scrub_event_cancel();
283 void scrub_reset_timeout();
284 void scrub_cancel_timeout();
287 pair
<string
,string
> last_key
; ///< last scrubbed key
290 ScrubState() : finished(false) { }
291 virtual ~ScrubState() { }
293 ceph::shared_ptr
<ScrubState
> scrub_state
; ///< keeps track of current scrub
296 * @defgroup Monitor_h_sync Synchronization
300 * @} // provider state
302 struct SyncProvider
{
303 entity_inst_t entity
; ///< who
304 uint64_t cookie
; ///< unique cookie for this sync attempt
305 utime_t timeout
; ///< when we give up and expire this attempt
306 version_t last_committed
; ///< last paxos version on peer
307 pair
<string
,string
> last_key
; ///< last key sent to (or on) peer
308 bool full
; ///< full scan?
309 MonitorDBStore::Synchronizer synchronizer
; ///< iterator
311 SyncProvider() : cookie(0), last_committed(0), full(false) {}
313 void reset_timeout(CephContext
*cct
, int grace
) {
314 timeout
= ceph_clock_now();
319 map
<uint64_t, SyncProvider
> sync_providers
; ///< cookie -> SyncProvider for those syncing from us
320 uint64_t sync_provider_count
; ///< counter for issued cookies to keep them unique
323 * @} // requester state
325 entity_inst_t sync_provider
; ///< who we are syncing from
326 uint64_t sync_cookie
; ///< 0 if we are starting, non-zero otherwise
327 bool sync_full
; ///< true if we are a full sync, false for recent catch-up
328 version_t sync_start_version
; ///< last_committed at sync start
329 Context
*sync_timeout_event
; ///< timeout event
332 * floor for sync source
334 * When we sync we forget about our old last_committed value which
335 * can be dangerous. For example, if we have a cluster of:
341 * If something forces us to sync (say, corruption, or manual
342 * intervention, or bug), we forget last_committed, and might abort.
343 * If mon.a happens to be down when we come back, we will see:
348 * and sync from mon.b, at which point a+b will both have lc 80 and
349 * come online with a majority holding out of date commits.
351 * Avoid this by preserving our old last_committed value prior to
352 * sync and never going backwards.
354 version_t sync_last_committed_floor
;
357 * Obtain the synchronization target prefixes in set form.
359 * We consider a target prefix all those that are relevant when
360 * synchronizing two stores. That is, all those that hold paxos service's
361 * versions, as well as paxos versions, or any control keys such as the
362 * first or last committed version.
364 * Given the current design, this function should return the name of all and
365 * any available paxos service, plus the paxos name.
367 * @returns a set of strings referring to the prefixes being synchronized
369 set
<string
> get_sync_targets_names();
372 * Reset the monitor's sync-related data structures for syncing *from* a peer
374 void sync_reset_requester();
377 * Reset sync state related to allowing others to sync from us
379 void sync_reset_provider();
382 * Caled when a sync attempt times out (requester-side)
387 * Get the latest monmap for backup purposes during sync
389 void sync_obtain_latest_monmap(bufferlist
&bl
);
394 * Start pulling committed state from another monitor.
396 * @param entity where to pull committed state from
397 * @param full whether to do a full sync or just catch up on recent paxos
399 void sync_start(entity_inst_t
&entity
, bool full
);
403 * force a sync on next mon restart
405 void sync_force(Formatter
*f
, ostream
& ss
);
409 * store critical state for safekeeping during sync
411 * We store a few things on the side that we don't want to get clobbered by sync. This
412 * includes the latest monmap and a lower bound on last_committed.
414 void sync_stash_critical_state(MonitorDBStore::TransactionRef tx
);
417 * reset the sync timeout
419 * This is used on the client to restart if things aren't progressing
421 void sync_reset_timeout();
424 * trim stale sync provider state
426 * If someone is syncing from us and hasn't talked to us recently, expire their state.
428 void sync_trim_providers();
433 * Finish up a sync after we've gotten all of the chunks.
435 * @param last_committed final last_committed value from provider
437 void sync_finish(version_t last_committed
);
440 * request the next chunk from the provider
442 void sync_get_next_chunk();
445 * handle sync message
447 * @param m Sync message with operation type MMonSync::OP_START_CHUNKS
449 void handle_sync(MonOpRequestRef op
);
451 void _sync_reply_no_cookie(MonOpRequestRef op
);
453 void handle_sync_get_cookie(MonOpRequestRef op
);
454 void handle_sync_get_chunk(MonOpRequestRef op
);
455 void handle_sync_finish(MonOpRequestRef op
);
457 void handle_sync_cookie(MonOpRequestRef op
);
458 void handle_sync_forward(MonOpRequestRef op
);
459 void handle_sync_chunk(MonOpRequestRef op
);
460 void handle_sync_no_cookie(MonOpRequestRef op
);
463 * @} // Synchronization
466 list
<Context
*> waitfor_quorum
;
467 list
<Context
*> maybe_wait_for_quorum
;
470 * @defgroup Monitor_h_TimeCheck Monitor Clock Drift Early Warning System
473 * We use time checks to keep track of any clock drifting going on in the
474 * cluster. This is accomplished by periodically ping each monitor in the
475 * quorum and register its response time on a map, assessing how much its
476 * clock has drifted. We also take this opportunity to assess the latency
479 * This mechanism works as follows:
481 * - Leader sends out a 'PING' message to each other monitor in the quorum.
482 * The message is timestamped with the leader's current time. The leader's
483 * current time is recorded in a map, associated with each peon's
485 * - The peon replies to the leader with a timestamped 'PONG' message.
486 * - The leader calculates a delta between the peon's timestamp and its
487 * current time and stashes it.
488 * - The leader also calculates the time it took to receive the 'PONG'
489 * since the 'PING' was sent, and stashes an approximate latency estimate.
490 * - Once all the quorum members have pong'ed, the leader will share the
491 * clock skew and latency maps with all the monitors in the quorum.
493 map
<entity_inst_t
, utime_t
> timecheck_waiting
;
494 map
<entity_inst_t
, double> timecheck_skews
;
495 map
<entity_inst_t
, double> timecheck_latencies
;
496 // odd value means we are mid-round; even value means the round has
498 version_t timecheck_round
;
499 unsigned int timecheck_acks
;
500 utime_t timecheck_round_start
;
501 friend class HealthMonitor
;
502 /* When we hit a skew we will start a new round based off of
503 * 'mon_timecheck_skew_interval'. Each new round will be backed off
504 * until we hit 'mon_timecheck_interval' -- which is the typical
505 * interval when not in the presence of a skew.
507 * This variable tracks the number of rounds with skews since last clean
508 * so that we can report to the user and properly adjust the backoff.
510 uint64_t timecheck_rounds_since_clean
;
514 Context
*timecheck_event
;
516 void timecheck_start();
517 void timecheck_finish();
518 void timecheck_start_round();
519 void timecheck_finish_round(bool success
= true);
520 void timecheck_cancel_round();
521 void timecheck_cleanup();
522 void timecheck_reset_event();
523 void timecheck_check_skews();
524 void timecheck_report();
526 health_status_t
timecheck_status(ostringstream
&ss
,
527 const double skew_bound
,
528 const double latency
);
529 void handle_timecheck_leader(MonOpRequestRef op
);
530 void handle_timecheck_peon(MonOpRequestRef op
);
531 void handle_timecheck(MonOpRequestRef op
);
534 * Returns 'true' if this is considered to be a skew; 'false' otherwise.
536 bool timecheck_has_skew(const double skew_bound
, double *abs
) const {
537 double abs_skew
= std::fabs(skew_bound
);
540 return (abs_skew
> g_conf
->mon_clock_drift_allowed
);
547 * Handle ping messages from others.
549 void handle_ping(MonOpRequestRef op
);
551 Context
*probe_timeout_event
= nullptr; // for probing
553 void reset_probe_timeout();
554 void cancel_probe_timeout();
555 void probe_timeout(int r
);
557 void _apply_compatset_features(CompatSet
&new_features
);
561 int get_leader() const { return leader
; }
562 string
get_leader_name() {
563 return quorum
.empty() ? string() : monmap
->get_name(*quorum
.begin());
565 const set
<int>& get_quorum() const { return quorum
; }
566 list
<string
> get_quorum_names() {
568 for (set
<int>::iterator p
= quorum
.begin(); p
!= quorum
.end(); ++p
)
569 q
.push_back(monmap
->get_name(*p
));
572 uint64_t get_quorum_con_features() const {
573 return quorum_con_features
;
575 mon_feature_t
get_quorum_mon_features() const {
576 return quorum_mon_features
;
578 uint64_t get_required_features() const {
579 return required_features
;
581 mon_feature_t
get_required_mon_features() const {
582 return monmap
->get_required_features();
584 void apply_quorum_to_compatset_features();
585 void apply_monmap_to_compatset_features();
586 void calc_quorum_requirements();
588 void get_combined_feature_map(FeatureMap
*fm
);
591 void _reset(); ///< called from bootstrap, start_, or join_election
592 void wait_for_paxos_write();
593 void _finish_svc_election(); ///< called by {win,lose}_election
596 void join_election();
597 void start_election();
598 void win_standalone_election();
599 // end election (called by Elector)
600 void win_election(epoch_t epoch
, set
<int>& q
,
602 const mon_feature_t
& mon_features
,
603 const map
<int,Metadata
>& metadata
,
604 const MonCommand
*cmdset
, int cmdsize
);
605 void lose_election(epoch_t epoch
, set
<int>& q
, int l
,
607 const mon_feature_t
& mon_features
);
608 // end election (called by Elector)
609 void finish_election();
611 const bufferlist
& get_supported_commands_bl() {
612 return supported_commands_bl
;
615 void update_logger();
618 * Vector holding the Services serviced by this Monitor.
620 vector
<PaxosService
*> paxos_service
;
622 class PGMonitor
*pgmon() {
623 return (class PGMonitor
*)paxos_service
[PAXOS_PGMAP
];
626 class MDSMonitor
*mdsmon() {
627 return (class MDSMonitor
*)paxos_service
[PAXOS_MDSMAP
];
630 class MonmapMonitor
*monmon() {
631 return (class MonmapMonitor
*)paxos_service
[PAXOS_MONMAP
];
634 class OSDMonitor
*osdmon() {
635 return (class OSDMonitor
*)paxos_service
[PAXOS_OSDMAP
];
638 class AuthMonitor
*authmon() {
639 return (class AuthMonitor
*)paxos_service
[PAXOS_AUTH
];
642 class LogMonitor
*logmon() {
643 return (class LogMonitor
*) paxos_service
[PAXOS_LOG
];
646 class MgrMonitor
*mgrmon() {
647 return (class MgrMonitor
*) paxos_service
[PAXOS_MGR
];
650 class MgrStatMonitor
*mgrstatmon() {
651 return (class MgrStatMonitor
*) paxos_service
[PAXOS_MGRSTAT
];
654 class MgrStatMonitor
*healthmon() {
655 return (class MgrStatMonitor
*) paxos_service
[PAXOS_MGRSTAT
];
659 friend class OSDMonitor
;
660 friend class MDSMonitor
;
661 friend class MonmapMonitor
;
662 friend class PGMonitor
;
663 friend class LogMonitor
;
664 friend class ConfigKeyService
;
666 QuorumService
*health_monitor
;
667 QuorumService
*config_key_service
;
670 MonSessionMap session_map
;
671 Mutex session_map_lock
{"Monitor::session_map_lock"};
672 AdminSocketHook
*admin_hook
;
674 template<typename Func
, typename
...Args
>
675 void with_session_map(Func
&& func
) {
676 Mutex::Locker
l(session_map_lock
);
677 std::forward
<Func
>(func
)(session_map
);
679 void send_latest_monmap(Connection
*con
);
682 void handle_get_version(MonOpRequestRef op
);
683 void handle_subscribe(MonOpRequestRef op
);
684 void handle_mon_get_map(MonOpRequestRef op
);
686 static void _generate_command_map(map
<string
,cmd_vartype
>& cmdmap
,
687 map
<string
,string
> ¶m_str_map
);
688 static const MonCommand
*_get_moncommand(
689 const string
&cmd_prefix
,
690 const MonCommand
*cmds
,
692 bool _allowed_command(MonSession
*s
, string
&module
, string
&prefix
,
693 const map
<string
,cmd_vartype
>& cmdmap
,
694 const map
<string
,string
>& param_str_map
,
695 const MonCommand
*this_cmd
);
696 void get_mon_status(Formatter
*f
, ostream
& ss
);
697 void _quorum_status(Formatter
*f
, ostream
& ss
);
698 bool _add_bootstrap_peer_hint(string cmd
, cmdmap_t
& cmdmap
, ostream
& ss
);
699 void handle_command(MonOpRequestRef op
);
700 void handle_route(MonOpRequestRef op
);
702 void handle_mon_metadata(MonOpRequestRef op
);
703 int get_mon_metadata(int mon
, Formatter
*f
, ostream
& err
);
704 int print_nodes(Formatter
*f
, ostream
& err
);
706 // Accumulate metadata across calls to update_mon_metadata
707 map
<int, Metadata
> mon_metadata
;
708 map
<int, Metadata
> pending_metadata
;
713 struct health_cache_t
{
714 health_status_t overall
;
718 // health_status_t doesn't really have a NONE value and we're not
719 // okay with setting something else (say, HEALTH_ERR). so just
723 } health_status_cache
;
725 Context
*health_tick_event
= nullptr;
726 Context
*health_interval_event
= nullptr;
728 void health_tick_start();
729 void health_tick_stop();
730 utime_t
health_interval_calc_next_update();
731 void health_interval_start();
732 void health_interval_stop();
733 void health_events_cleanup();
735 void health_to_clog_update_conf(const std::set
<std::string
> &changed
);
737 void do_health_to_clog_interval();
738 void do_health_to_clog(bool force
= false);
741 * Generate health report
743 * @param status one-line status summary
744 * @param detailbl optional bufferlist* to fill with a detailed report
745 * @returns health status
747 health_status_t
get_health(list
<string
>& status
, bufferlist
*detailbl
,
750 health_status_t
get_health_status(
754 const char *sep1
= " ",
755 const char *sep2
= "; ");
757 const health_check_map_t
& updated
,
758 const health_check_map_t
& previous
,
759 MonitorDBStore::TransactionRef t
);
761 void get_cluster_status(stringstream
&ss
, Formatter
*f
);
763 void reply_command(MonOpRequestRef op
, int rc
, const string
&rs
, version_t version
);
764 void reply_command(MonOpRequestRef op
, int rc
, const string
&rs
, bufferlist
& rdata
, version_t version
);
767 void handle_probe(MonOpRequestRef op
);
769 * Handle a Probe Operation, replying with our name, quorum and known versions.
771 * We use the MMonProbe message class for anything and everything related with
772 * Monitor probing. One of the operations relates directly with the probing
773 * itself, in which we receive a probe request and to which we reply with
774 * our name, our quorum and the known versions for each Paxos service. Thus the
775 * redundant function name. This reply will obviously be sent to the one
776 * probing/requesting these infos.
778 * @todo Add @pre and @post
780 * @param m A Probe message, with an operation of type Probe.
782 void handle_probe_probe(MonOpRequestRef op
);
783 void handle_probe_reply(MonOpRequestRef op
);
786 struct RoutedRequest
{
788 bufferlist request_bl
;
791 uint64_t con_features
;
792 entity_inst_t client_inst
;
795 RoutedRequest() : tid(0), session(NULL
), con_features(0) {}
801 uint64_t routed_request_tid
;
802 map
<uint64_t, RoutedRequest
*> routed_requests
;
804 void forward_request_leader(MonOpRequestRef op
);
805 void handle_forward(MonOpRequestRef op
);
806 void try_send_message(Message
*m
, const entity_inst_t
& to
);
807 void send_reply(MonOpRequestRef op
, Message
*reply
);
808 void no_reply(MonOpRequestRef op
);
809 void resend_routed_requests();
810 void remove_session(MonSession
*s
);
811 void remove_all_sessions();
812 void waitlist_or_zap_client(MonOpRequestRef op
);
814 void send_command(const entity_inst_t
& inst
,
815 const vector
<string
>& com
);
818 struct C_Command
: public C_MonOp
{
824 C_Command(Monitor
*_mm
, MonOpRequestRef _op
, int r
, string s
, version_t v
) :
825 C_MonOp(_op
), mon(_mm
), rc(r
), rs(s
), version(v
){}
826 C_Command(Monitor
*_mm
, MonOpRequestRef _op
, int r
, string s
, bufferlist rd
, version_t v
) :
827 C_MonOp(_op
), mon(_mm
), rc(r
), rs(s
), rdata(rd
), version(v
){}
829 void _finish(int r
) override
{
830 MMonCommand
*m
= static_cast<MMonCommand
*>(op
->get_req());
833 if (!op
->get_req()->get_connection()) {
834 ss
<< "connection dropped for command ";
836 MonSession
*s
= op
->get_session();
838 // if client drops we may not have a session to draw information from.
840 ss
<< "from='" << s
->inst
<< "' "
841 << "entity='" << s
->entity_name
<< "' ";
843 ss
<< "session dropped for command ";
846 ss
<< "cmd='" << m
->cmd
<< "': finished";
848 mon
->audit_clog
->info() << ss
.str();
849 mon
->reply_command(op
, rc
, rs
, rdata
, version
);
851 else if (r
== -ECANCELED
)
853 else if (r
== -EAGAIN
)
854 mon
->dispatch_op(op
);
856 assert(0 == "bad C_Command return value");
861 class C_RetryMessage
: public C_MonOp
{
864 C_RetryMessage(Monitor
*m
, MonOpRequestRef op
) :
865 C_MonOp(op
), mon(m
) { }
867 void _finish(int r
) override
{
868 if (r
== -EAGAIN
|| r
>= 0)
869 mon
->dispatch_op(op
);
870 else if (r
== -ECANCELED
)
873 assert(0 == "bad C_RetryMessage return value");
877 //ms_dispatch handles a lot of logic and we want to reuse it
878 //on forwarded messages, so we create a non-locking version for this class
879 void _ms_dispatch(Message
*m
);
880 bool ms_dispatch(Message
*m
) override
{
886 void dispatch_op(MonOpRequestRef op
);
887 //mon_caps is used for un-connected messages from monitors
889 bool ms_get_authorizer(int dest_type
, AuthAuthorizer
**authorizer
, bool force_new
) override
;
890 bool ms_verify_authorizer(Connection
*con
, int peer_type
,
891 int protocol
, bufferlist
& authorizer_data
, bufferlist
& authorizer_reply
,
892 bool& isvalid
, CryptoKey
& session_key
) override
;
893 bool ms_handle_reset(Connection
*con
) override
;
894 void ms_handle_remote_reset(Connection
*con
) override
{}
895 bool ms_handle_refused(Connection
*con
) override
;
897 int write_default_keyring(bufferlist
& bl
);
898 void extract_save_mon_key(KeyRing
& keyring
);
900 void collect_metadata(Metadata
*m
);
901 void update_mon_metadata(int from
, Metadata
&& m
);
903 void count_metadata(const string
& field
, Formatter
*f
);
904 void count_metadata(const string
& field
, map
<string
,int> *out
);
907 static CompatSet
get_initial_supported_features();
908 static CompatSet
get_supported_features();
909 static CompatSet
get_legacy_features();
910 /// read the ondisk features into the CompatSet pointed to by read_features
911 static void read_features_off_disk(MonitorDBStore
*store
, CompatSet
*read_features
);
912 void read_features();
913 void write_features(MonitorDBStore::TransactionRef t
);
915 OpTracker op_tracker
;
918 Monitor(CephContext
*cct_
, string nm
, MonitorDBStore
*s
,
919 Messenger
*m
, Messenger
*mgr_m
, MonMap
*map
);
922 static int check_features(MonitorDBStore
*store
);
925 const char** get_tracked_conf_keys() const override
;
926 void handle_conf_change(const struct md_config_t
*conf
,
927 const std::set
<std::string
> &changed
) override
;
929 void update_log_clients();
930 int sanitize_options();
934 void refresh_from_paxos(bool *need_bootstrap
);
938 void handle_signal(int sig
);
940 int mkfs(bufferlist
& osdmapbl
);
943 * check cluster_fsid file
945 * @return EEXIST if file exists and doesn't match, 0 on match, or negative error code
950 * write cluster_fsid file
952 * @return 0 on success, or negative error code
955 int write_fsid(MonitorDBStore::TransactionRef t
);
957 void do_admin_command(std::string command
, cmdmap_t
& cmdmap
,
958 std::string format
, ostream
& ss
);
961 // don't allow copying
962 Monitor(const Monitor
& rhs
);
963 Monitor
& operator=(const Monitor
&rhs
);
966 static void format_command_descriptions(const std::vector
<MonCommand
> &commands
,
969 bool hide_mgr_flag
=false);
970 void get_locally_supported_monitor_commands(const MonCommand
**cmds
, int *count
);
971 /// the Monitor owns this pointer once you pass it in
972 void set_leader_supported_commands(const MonCommand
*cmds
, int size
);
973 static bool is_keyring_required();
976 #define CEPH_MON_FEATURE_INCOMPAT_BASE CompatSet::Feature (1, "initial feature set (~v.18)")
977 #define CEPH_MON_FEATURE_INCOMPAT_GV CompatSet::Feature (2, "global version sequencing (v0.52)")
978 #define CEPH_MON_FEATURE_INCOMPAT_SINGLE_PAXOS CompatSet::Feature (3, "single paxos with k/v store (v0.\?)")
979 #define CEPH_MON_FEATURE_INCOMPAT_OSD_ERASURE_CODES CompatSet::Feature(4, "support erasure code pools")
980 #define CEPH_MON_FEATURE_INCOMPAT_OSDMAP_ENC CompatSet::Feature(5, "new-style osdmap encoding")
981 #define CEPH_MON_FEATURE_INCOMPAT_ERASURE_CODE_PLUGINS_V2 CompatSet::Feature(6, "support isa/lrc erasure code")
982 #define CEPH_MON_FEATURE_INCOMPAT_ERASURE_CODE_PLUGINS_V3 CompatSet::Feature(7, "support shec erasure code")
983 #define CEPH_MON_FEATURE_INCOMPAT_KRAKEN CompatSet::Feature(8, "support monmap features")
984 // make sure you add your feature to Monitor::get_supported_features