mirror of https://github.com/apache/nifi.git
NIFI-4598: When we retrieve the 'controller' from a remote NiFi instance in order to determine which ports are available, cache those results for up to some configurable amount of time (default 30 secs) so that we don't constantly issue HTTP Requests to the remote nifi
This closes #2270. Signed-off-by: Bryan Bende <bbende@apache.org>
This commit is contained in:
parent
c7a5a09b8a
commit
af3a578711
|
@ -73,6 +73,7 @@ public abstract class NiFiProperties {
|
||||||
public static final String SITE_TO_SITE_SECURE = "nifi.remote.input.secure";
|
public static final String SITE_TO_SITE_SECURE = "nifi.remote.input.secure";
|
||||||
public static final String SITE_TO_SITE_HTTP_ENABLED = "nifi.remote.input.http.enabled";
|
public static final String SITE_TO_SITE_HTTP_ENABLED = "nifi.remote.input.http.enabled";
|
||||||
public static final String SITE_TO_SITE_HTTP_TRANSACTION_TTL = "nifi.remote.input.http.transaction.ttl";
|
public static final String SITE_TO_SITE_HTTP_TRANSACTION_TTL = "nifi.remote.input.http.transaction.ttl";
|
||||||
|
public static final String REMOTE_CONTENTS_CACHE_EXPIRATION = "nifi.remote.contents.cache.expiration";
|
||||||
public static final String TEMPLATE_DIRECTORY = "nifi.templates.directory";
|
public static final String TEMPLATE_DIRECTORY = "nifi.templates.directory";
|
||||||
public static final String ADMINISTRATIVE_YIELD_DURATION = "nifi.administrative.yield.duration";
|
public static final String ADMINISTRATIVE_YIELD_DURATION = "nifi.administrative.yield.duration";
|
||||||
public static final String PERSISTENT_STATE_DIRECTORY = "nifi.persistent.state.directory";
|
public static final String PERSISTENT_STATE_DIRECTORY = "nifi.persistent.state.directory";
|
||||||
|
|
|
@ -32,6 +32,7 @@ public abstract class AbstractSiteToSiteClient implements SiteToSiteClient {
|
||||||
siteInfoProvider.setSslContext(config.getSslContext());
|
siteInfoProvider.setSslContext(config.getSslContext());
|
||||||
siteInfoProvider.setConnectTimeoutMillis(commsTimeout);
|
siteInfoProvider.setConnectTimeoutMillis(commsTimeout);
|
||||||
siteInfoProvider.setReadTimeoutMillis(commsTimeout);
|
siteInfoProvider.setReadTimeoutMillis(commsTimeout);
|
||||||
|
siteInfoProvider.setCachedContentsExpirationMillis(config.getCacheExpiration(TimeUnit.MILLISECONDS));
|
||||||
siteInfoProvider.setProxy(config.getHttpProxy());
|
siteInfoProvider.setProxy(config.getHttpProxy());
|
||||||
siteInfoProvider.setLocalAddress(config.getLocalAddress());
|
siteInfoProvider.setLocalAddress(config.getLocalAddress());
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,10 +22,10 @@ import org.apache.nifi.remote.PeerDescription;
|
||||||
import org.apache.nifi.remote.PeerStatus;
|
import org.apache.nifi.remote.PeerStatus;
|
||||||
import org.apache.nifi.remote.TransferDirection;
|
import org.apache.nifi.remote.TransferDirection;
|
||||||
import org.apache.nifi.remote.util.PeerStatusCache;
|
import org.apache.nifi.remote.util.PeerStatusCache;
|
||||||
import org.apache.nifi.stream.io.BufferedOutputStream;
|
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
|
import java.io.BufferedOutputStream;
|
||||||
import java.io.BufferedReader;
|
import java.io.BufferedReader;
|
||||||
import java.io.File;
|
import java.io.File;
|
||||||
import java.io.FileInputStream;
|
import java.io.FileInputStream;
|
||||||
|
|
|
@ -59,6 +59,7 @@ public class SiteInfoProvider {
|
||||||
private SSLContext sslContext;
|
private SSLContext sslContext;
|
||||||
private int connectTimeoutMillis;
|
private int connectTimeoutMillis;
|
||||||
private int readTimeoutMillis;
|
private int readTimeoutMillis;
|
||||||
|
private long cachedContentExpirationMillis = TimeUnit.SECONDS.toMillis(30L);
|
||||||
|
|
||||||
private ControllerDTO refreshRemoteInfo() throws IOException {
|
private ControllerDTO refreshRemoteInfo() throws IOException {
|
||||||
|
|
||||||
|
@ -104,6 +105,7 @@ public class SiteInfoProvider {
|
||||||
apiClient.setConnectTimeoutMillis(connectTimeoutMillis);
|
apiClient.setConnectTimeoutMillis(connectTimeoutMillis);
|
||||||
apiClient.setReadTimeoutMillis(readTimeoutMillis);
|
apiClient.setReadTimeoutMillis(readTimeoutMillis);
|
||||||
apiClient.setLocalAddress(localAddress);
|
apiClient.setLocalAddress(localAddress);
|
||||||
|
apiClient.setCacheExpirationMillis(cachedContentExpirationMillis);
|
||||||
return apiClient;
|
return apiClient;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -272,6 +274,10 @@ public class SiteInfoProvider {
|
||||||
this.readTimeoutMillis = readTimeoutMillis;
|
this.readTimeoutMillis = readTimeoutMillis;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void setCachedContentsExpirationMillis(long expirationMillis) {
|
||||||
|
this.cachedContentExpirationMillis = expirationMillis;
|
||||||
|
}
|
||||||
|
|
||||||
public void setProxy(HttpProxy proxy) {
|
public void setProxy(HttpProxy proxy) {
|
||||||
this.proxy = proxy;
|
this.proxy = proxy;
|
||||||
}
|
}
|
||||||
|
|
|
@ -154,6 +154,7 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
private long timeoutNanos = TimeUnit.SECONDS.toNanos(30);
|
private long timeoutNanos = TimeUnit.SECONDS.toNanos(30);
|
||||||
private long penalizationNanos = TimeUnit.SECONDS.toNanos(3);
|
private long penalizationNanos = TimeUnit.SECONDS.toNanos(3);
|
||||||
private long idleExpirationNanos = TimeUnit.SECONDS.toNanos(30L);
|
private long idleExpirationNanos = TimeUnit.SECONDS.toNanos(30L);
|
||||||
|
private long contentsCacheExpirationMillis = TimeUnit.SECONDS.toMillis(30L);
|
||||||
private SSLContext sslContext;
|
private SSLContext sslContext;
|
||||||
private String keystoreFilename;
|
private String keystoreFilename;
|
||||||
private String keystorePass;
|
private String keystorePass;
|
||||||
|
@ -184,6 +185,7 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
this.timeoutNanos = config.getTimeout(TimeUnit.NANOSECONDS);
|
this.timeoutNanos = config.getTimeout(TimeUnit.NANOSECONDS);
|
||||||
this.penalizationNanos = config.getPenalizationPeriod(TimeUnit.NANOSECONDS);
|
this.penalizationNanos = config.getPenalizationPeriod(TimeUnit.NANOSECONDS);
|
||||||
this.idleExpirationNanos = config.getIdleConnectionExpiration(TimeUnit.NANOSECONDS);
|
this.idleExpirationNanos = config.getIdleConnectionExpiration(TimeUnit.NANOSECONDS);
|
||||||
|
this.contentsCacheExpirationMillis = config.getCacheExpiration(TimeUnit.MILLISECONDS);
|
||||||
this.sslContext = config.getSslContext();
|
this.sslContext = config.getSslContext();
|
||||||
this.keystoreFilename = config.getKeystoreFilename();
|
this.keystoreFilename = config.getKeystoreFilename();
|
||||||
this.keystorePass = config.getKeystorePassword();
|
this.keystorePass = config.getKeystorePassword();
|
||||||
|
@ -273,6 +275,19 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Specifies how long the contents of a remote NiFi instance should be cached before making
|
||||||
|
* another web request to the remote instance.
|
||||||
|
*
|
||||||
|
* @param expirationPeriod the amount of time that an entry in the cache should expire
|
||||||
|
* @param unit unit of time over which to interpret the given expirationPeriod
|
||||||
|
* @return the builder
|
||||||
|
*/
|
||||||
|
public Builder cacheExpiration(final long expirationPeriod, final TimeUnit unit) {
|
||||||
|
this.contentsCacheExpirationMillis = unit.toMillis(expirationPeriod);
|
||||||
|
return this;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Specifies the amount of time that a connection can remain idle in the
|
* Specifies the amount of time that a connection can remain idle in the
|
||||||
* connection pool before it is "expired" and shutdown. The default
|
* connection pool before it is "expired" and shutdown. The default
|
||||||
|
@ -722,6 +737,7 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
private final long timeoutNanos;
|
private final long timeoutNanos;
|
||||||
private final long penalizationNanos;
|
private final long penalizationNanos;
|
||||||
private final long idleExpirationNanos;
|
private final long idleExpirationNanos;
|
||||||
|
private final long contentsCacheExpirationMillis;
|
||||||
private final SSLContext sslContext;
|
private final SSLContext sslContext;
|
||||||
private final String keystoreFilename;
|
private final String keystoreFilename;
|
||||||
private final String keystorePass;
|
private final String keystorePass;
|
||||||
|
@ -746,6 +762,7 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
this.timeoutNanos = 0;
|
this.timeoutNanos = 0;
|
||||||
this.penalizationNanos = 0;
|
this.penalizationNanos = 0;
|
||||||
this.idleExpirationNanos = 0;
|
this.idleExpirationNanos = 0;
|
||||||
|
this.contentsCacheExpirationMillis = 30000L;
|
||||||
this.sslContext = null;
|
this.sslContext = null;
|
||||||
this.keystoreFilename = null;
|
this.keystoreFilename = null;
|
||||||
this.keystorePass = null;
|
this.keystorePass = null;
|
||||||
|
@ -773,6 +790,7 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
this.timeoutNanos = builder.timeoutNanos;
|
this.timeoutNanos = builder.timeoutNanos;
|
||||||
this.penalizationNanos = builder.penalizationNanos;
|
this.penalizationNanos = builder.penalizationNanos;
|
||||||
this.idleExpirationNanos = builder.idleExpirationNanos;
|
this.idleExpirationNanos = builder.idleExpirationNanos;
|
||||||
|
this.contentsCacheExpirationMillis = builder.contentsCacheExpirationMillis;
|
||||||
this.sslContext = builder.sslContext;
|
this.sslContext = builder.sslContext;
|
||||||
this.keystoreFilename = builder.keystoreFilename;
|
this.keystoreFilename = builder.keystoreFilename;
|
||||||
this.keystorePass = builder.keystorePass;
|
this.keystorePass = builder.keystorePass;
|
||||||
|
@ -816,6 +834,11 @@ public interface SiteToSiteClient extends Closeable {
|
||||||
return timeUnit.convert(timeoutNanos, TimeUnit.NANOSECONDS);
|
return timeUnit.convert(timeoutNanos, TimeUnit.NANOSECONDS);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public long getCacheExpiration(final TimeUnit timeUnit) {
|
||||||
|
return timeUnit.convert(contentsCacheExpirationMillis, TimeUnit.MILLISECONDS);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public long getIdleConnectionExpiration(final TimeUnit timeUnit) {
|
public long getIdleConnectionExpiration(final TimeUnit timeUnit) {
|
||||||
return timeUnit.convert(idleExpirationNanos, TimeUnit.NANOSECONDS);
|
return timeUnit.convert(idleExpirationNanos, TimeUnit.NANOSECONDS);
|
||||||
|
|
|
@ -162,6 +162,17 @@ public interface SiteToSiteClientConfig extends Serializable {
|
||||||
*/
|
*/
|
||||||
int getPreferredBatchCount();
|
int getPreferredBatchCount();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* When the contents of a remote NiFi instance are fetched, that information is cached
|
||||||
|
* so that many calls that are made in a short period of time do not overwhelm the remote
|
||||||
|
* NiFi instance. This method will indicate the number of milliseconds that this information
|
||||||
|
* can be cached.
|
||||||
|
*
|
||||||
|
* @param unit the desired time unit
|
||||||
|
* @return the number of milliseconds that the contents of a remote NiFi instance will be cached
|
||||||
|
*/
|
||||||
|
long getCacheExpiration(TimeUnit unit);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* @return the EventReporter that is to be used by clients to report events
|
* @return the EventReporter that is to be used by clients to report events
|
||||||
*/
|
*/
|
||||||
|
|
|
@ -106,6 +106,7 @@ public class HttpClient extends AbstractSiteToSiteClient implements PeerStatusPr
|
||||||
final int timeoutMillis = (int) config.getTimeout(TimeUnit.MILLISECONDS);
|
final int timeoutMillis = (int) config.getTimeout(TimeUnit.MILLISECONDS);
|
||||||
apiClient.setConnectTimeoutMillis(timeoutMillis);
|
apiClient.setConnectTimeoutMillis(timeoutMillis);
|
||||||
apiClient.setReadTimeoutMillis(timeoutMillis);
|
apiClient.setReadTimeoutMillis(timeoutMillis);
|
||||||
|
apiClient.setCacheExpirationMillis(config.getCacheExpiration(TimeUnit.MILLISECONDS));
|
||||||
apiClient.setLocalAddress(config.getLocalAddress());
|
apiClient.setLocalAddress(config.getLocalAddress());
|
||||||
|
|
||||||
final Collection<PeerDTO> peers = apiClient.getPeers();
|
final Collection<PeerDTO> peers = apiClient.getPeers();
|
||||||
|
@ -154,6 +155,7 @@ public class HttpClient extends AbstractSiteToSiteClient implements PeerStatusPr
|
||||||
apiClient.setBaseUrl(peer.getUrl());
|
apiClient.setBaseUrl(peer.getUrl());
|
||||||
apiClient.setConnectTimeoutMillis(timeoutMillis);
|
apiClient.setConnectTimeoutMillis(timeoutMillis);
|
||||||
apiClient.setReadTimeoutMillis(timeoutMillis);
|
apiClient.setReadTimeoutMillis(timeoutMillis);
|
||||||
|
apiClient.setCacheExpirationMillis(config.getCacheExpiration(TimeUnit.MILLISECONDS));
|
||||||
apiClient.setLocalAddress(config.getLocalAddress());
|
apiClient.setLocalAddress(config.getLocalAddress());
|
||||||
|
|
||||||
apiClient.setCompress(config.isUseCompression());
|
apiClient.setCompress(config.isUseCompression());
|
||||||
|
|
|
@ -76,8 +76,6 @@ import org.apache.nifi.remote.protocol.http.HttpHeaders;
|
||||||
import org.apache.nifi.remote.protocol.http.HttpProxy;
|
import org.apache.nifi.remote.protocol.http.HttpProxy;
|
||||||
import org.apache.nifi.reporting.Severity;
|
import org.apache.nifi.reporting.Severity;
|
||||||
import org.apache.nifi.security.util.CertificateUtils;
|
import org.apache.nifi.security.util.CertificateUtils;
|
||||||
import org.apache.nifi.stream.io.ByteArrayInputStream;
|
|
||||||
import org.apache.nifi.stream.io.ByteArrayOutputStream;
|
|
||||||
import org.apache.nifi.stream.io.StreamUtils;
|
import org.apache.nifi.stream.io.StreamUtils;
|
||||||
import org.apache.nifi.web.api.dto.ControllerDTO;
|
import org.apache.nifi.web.api.dto.ControllerDTO;
|
||||||
import org.apache.nifi.web.api.dto.remote.PeerDTO;
|
import org.apache.nifi.web.api.dto.remote.PeerDTO;
|
||||||
|
@ -90,6 +88,9 @@ import org.slf4j.LoggerFactory;
|
||||||
import javax.net.ssl.SSLContext;
|
import javax.net.ssl.SSLContext;
|
||||||
import javax.net.ssl.SSLPeerUnverifiedException;
|
import javax.net.ssl.SSLPeerUnverifiedException;
|
||||||
import javax.net.ssl.SSLSession;
|
import javax.net.ssl.SSLSession;
|
||||||
|
|
||||||
|
import java.io.ByteArrayInputStream;
|
||||||
|
import java.io.ByteArrayOutputStream;
|
||||||
import java.io.Closeable;
|
import java.io.Closeable;
|
||||||
import java.io.IOException;
|
import java.io.IOException;
|
||||||
import java.io.InputStream;
|
import java.io.InputStream;
|
||||||
|
@ -110,8 +111,11 @@ import java.util.Arrays;
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import java.util.LinkedHashSet;
|
import java.util.LinkedHashSet;
|
||||||
|
import java.util.Map;
|
||||||
import java.util.Objects;
|
import java.util.Objects;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
import java.util.concurrent.ConcurrentHashMap;
|
||||||
|
import java.util.concurrent.ConcurrentMap;
|
||||||
import java.util.concurrent.CountDownLatch;
|
import java.util.concurrent.CountDownLatch;
|
||||||
import java.util.concurrent.ExecutionException;
|
import java.util.concurrent.ExecutionException;
|
||||||
import java.util.concurrent.Executors;
|
import java.util.concurrent.Executors;
|
||||||
|
@ -176,11 +180,14 @@ public class SiteToSiteRestApiClient implements Closeable {
|
||||||
|
|
||||||
private int connectTimeoutMillis;
|
private int connectTimeoutMillis;
|
||||||
private int readTimeoutMillis;
|
private int readTimeoutMillis;
|
||||||
|
private long cacheExpirationMillis = 30000L;
|
||||||
private static final Pattern HTTP_ABS_URL = Pattern.compile("^https?://.+$");
|
private static final Pattern HTTP_ABS_URL = Pattern.compile("^https?://.+$");
|
||||||
|
|
||||||
private Future<HttpResponse> postResult;
|
private Future<HttpResponse> postResult;
|
||||||
private CountDownLatch transferDataLatch = new CountDownLatch(1);
|
private CountDownLatch transferDataLatch = new CountDownLatch(1);
|
||||||
|
|
||||||
|
private static final ConcurrentMap<String, RemoteGroupContents> contentsMap = new ConcurrentHashMap<>();
|
||||||
|
private volatile long lastPruneTimestamp = System.currentTimeMillis();
|
||||||
|
|
||||||
public SiteToSiteRestApiClient(final SSLContext sslContext, final HttpProxy proxy, final EventReporter eventReporter) {
|
public SiteToSiteRestApiClient(final SSLContext sslContext, final HttpProxy proxy, final EventReporter eventReporter) {
|
||||||
this.sslContext = sslContext;
|
this.sslContext = sslContext;
|
||||||
|
@ -268,7 +275,7 @@ public class SiteToSiteRestApiClient implements Closeable {
|
||||||
final HttpClientBuilder clientBuilder = HttpClients.custom();
|
final HttpClientBuilder clientBuilder = HttpClients.custom();
|
||||||
|
|
||||||
if (sslContext != null) {
|
if (sslContext != null) {
|
||||||
clientBuilder.setSslcontext(sslContext);
|
clientBuilder.setSSLContext(sslContext);
|
||||||
clientBuilder.addInterceptorFirst(new HttpsResponseInterceptor());
|
clientBuilder.addInterceptorFirst(new HttpsResponseInterceptor());
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -368,10 +375,48 @@ public class SiteToSiteRestApiClient implements Closeable {
|
||||||
}
|
}
|
||||||
|
|
||||||
private ControllerDTO getController() throws IOException {
|
private ControllerDTO getController() throws IOException {
|
||||||
|
// first check cache and prune any old values.
|
||||||
|
// Periodically prune the map so that we are not keeping entries around forever, in case an RPG is removed
|
||||||
|
// from he canvas, etc. We want to ensure that we avoid memory leaks, even if they are likely to not cause a problem.
|
||||||
|
if (System.currentTimeMillis() > lastPruneTimestamp + TimeUnit.MINUTES.toMillis(5)) {
|
||||||
|
pruneCache();
|
||||||
|
}
|
||||||
|
|
||||||
|
final String internedUrl = baseUrl.intern();
|
||||||
|
synchronized (internedUrl) {
|
||||||
|
final RemoteGroupContents groupContents = contentsMap.get(internedUrl);
|
||||||
|
|
||||||
|
if (groupContents == null || groupContents.getContents() == null || groupContents.isOlderThan(cacheExpirationMillis)) {
|
||||||
|
logger.debug("No Contents for remote group at URL {} or contents have expired; will refresh contents", internedUrl);
|
||||||
|
|
||||||
|
final ControllerDTO refreshedContents;
|
||||||
|
try {
|
||||||
|
refreshedContents = fetchController();
|
||||||
|
} catch (final Exception e) {
|
||||||
|
// we failed to refresh contents, but we don't want to constantly poll the remote instance, failing.
|
||||||
|
// So we put the ControllerDTO back but use a new RemoteGroupContents so that we get a new timestamp.
|
||||||
|
final ControllerDTO existingController = groupContents == null ? null : groupContents.getContents();
|
||||||
|
final RemoteGroupContents updatedContents = new RemoteGroupContents(existingController);
|
||||||
|
contentsMap.put(internedUrl, updatedContents);
|
||||||
|
throw e;
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.debug("Successfully retrieved contents for remote group at URL {}", internedUrl);
|
||||||
|
|
||||||
|
final RemoteGroupContents updatedContents = new RemoteGroupContents(refreshedContents);
|
||||||
|
contentsMap.put(internedUrl, updatedContents);
|
||||||
|
return refreshedContents;
|
||||||
|
}
|
||||||
|
|
||||||
|
logger.debug("Contents for remote group at URL {} have already been fetched and have not yet expired. Will return the cached value.", internedUrl);
|
||||||
|
return groupContents.getContents();
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
private ControllerDTO fetchController() throws IOException {
|
||||||
try {
|
try {
|
||||||
final HttpGet get = createGetControllerRequest();
|
final HttpGet get = createGetControllerRequest();
|
||||||
return execute(get, ControllerEntity.class).getController();
|
return execute(get, ControllerEntity.class).getController();
|
||||||
|
|
||||||
} catch (final HttpGetFailedException e) {
|
} catch (final HttpGetFailedException e) {
|
||||||
if (RESPONSE_CODE_NOT_FOUND == e.getResponseCode()) {
|
if (RESPONSE_CODE_NOT_FOUND == e.getResponseCode()) {
|
||||||
logger.debug("getController received NOT_FOUND, trying to access the old NiFi version resource url...");
|
logger.debug("getController received NOT_FOUND, trying to access the old NiFi version resource url...");
|
||||||
|
@ -382,6 +427,20 @@ public class SiteToSiteRestApiClient implements Closeable {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void pruneCache() {
|
||||||
|
for (final Map.Entry<String, RemoteGroupContents> entry : contentsMap.entrySet()) {
|
||||||
|
final String url = entry.getKey();
|
||||||
|
final RemoteGroupContents contents = entry.getValue();
|
||||||
|
|
||||||
|
// If any entry in the map is more than 4 times as old as the refresh period,
|
||||||
|
// then we can go ahead and remove it from the map. We use 4 * refreshMillis
|
||||||
|
// just to ensure that we don't have any race condition with the above #getRemoteContents.
|
||||||
|
if (contents.isOlderThan(TimeUnit.MINUTES.toMillis(5))) {
|
||||||
|
contentsMap.remove(url, contents);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
private HttpGet createGetControllerRequest() {
|
private HttpGet createGetControllerRequest() {
|
||||||
final HttpGet get = createGet("/site-to-site");
|
final HttpGet get = createGet("/site-to-site");
|
||||||
get.setHeader(HttpHeaders.PROTOCOL_VERSION, String.valueOf(transportProtocolVersionNegotiator.getVersion()));
|
get.setHeader(HttpHeaders.PROTOCOL_VERSION, String.valueOf(transportProtocolVersionNegotiator.getVersion()));
|
||||||
|
@ -1211,6 +1270,10 @@ public class SiteToSiteRestApiClient implements Closeable {
|
||||||
this.readTimeoutMillis = readTimeoutMillis;
|
this.readTimeoutMillis = readTimeoutMillis;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public void setCacheExpirationMillis(final long expirationMillis) {
|
||||||
|
this.cacheExpirationMillis = expirationMillis;
|
||||||
|
}
|
||||||
|
|
||||||
public static String getFirstUrl(final String clusterUrlStr) {
|
public static String getFirstUrl(final String clusterUrlStr) {
|
||||||
if (clusterUrlStr == null) {
|
if (clusterUrlStr == null) {
|
||||||
return null;
|
return null;
|
||||||
|
@ -1452,4 +1515,22 @@ public class SiteToSiteRestApiClient implements Closeable {
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private static class RemoteGroupContents {
|
||||||
|
private final ControllerDTO contents;
|
||||||
|
private final long timestamp;
|
||||||
|
|
||||||
|
public RemoteGroupContents(final ControllerDTO contents) {
|
||||||
|
this.contents = contents;
|
||||||
|
this.timestamp = System.currentTimeMillis();
|
||||||
|
}
|
||||||
|
|
||||||
|
public ControllerDTO getContents() {
|
||||||
|
return contents;
|
||||||
|
}
|
||||||
|
|
||||||
|
public boolean isOlderThan(final long millis) {
|
||||||
|
final long millisSinceRefresh = System.currentTimeMillis() - timestamp;
|
||||||
|
return millisSinceRefresh > millis;
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -2964,6 +2964,9 @@ Remote Process Groups can choose transport protocol from RAW and HTTP. Propertie
|
||||||
Whether a Site-to-Site client uses HTTP or HTTPS is determined by `nifi.remote.input.secure`. If it is set to `true`, then requests are sent as HTTPS to `nifi.web.https.port`. If set to `false`, HTTP requests are sent to `nifi.web.http.port`.
|
Whether a Site-to-Site client uses HTTP or HTTPS is determined by `nifi.remote.input.secure`. If it is set to `true`, then requests are sent as HTTPS to `nifi.web.https.port`. If set to `false`, HTTP requests are sent to `nifi.web.http.port`.
|
||||||
|nifi.remote.input.http.transaction.ttl|Specifies how long a transaction can stay alive on the server. By default, it is set to `30 secs`. +
|
|nifi.remote.input.http.transaction.ttl|Specifies how long a transaction can stay alive on the server. By default, it is set to `30 secs`. +
|
||||||
If a Site-to-Site client hasn’t proceeded to the next action after this period of time, the transaction is discarded from the remote NiFi instance. For example, when a client creates a transaction but doesn’t send or receive flow files, or when a client sends or receives flow files but doesn’t confirm that transaction.
|
If a Site-to-Site client hasn’t proceeded to the next action after this period of time, the transaction is discarded from the remote NiFi instance. For example, when a client creates a transaction but doesn’t send or receive flow files, or when a client sends or receives flow files but doesn’t confirm that transaction.
|
||||||
|
|nifi.remote.contents.cache.expiration|Specifies how long NiFi should cache information about a remote NiFi instance when communicating via Site-to-Site. By default, NiFi will cache the +
|
||||||
|
responses from the remote system for `30 secs`. This allows NiFi to avoid constantly making HTTP requests to the remote system, which is particularly important when this instance of NiFi +
|
||||||
|
has many instances of Remote Process Groups.
|
||||||
|====
|
|====
|
||||||
|
|
||||||
=== Web Properties
|
=== Web Properties
|
||||||
|
|
|
@ -102,6 +102,7 @@ public class StandardRemoteProcessGroup implements RemoteProcessGroup {
|
||||||
private final ProcessScheduler scheduler;
|
private final ProcessScheduler scheduler;
|
||||||
private final EventReporter eventReporter;
|
private final EventReporter eventReporter;
|
||||||
private final NiFiProperties nifiProperties;
|
private final NiFiProperties nifiProperties;
|
||||||
|
private final long remoteContentsCacheExpiration;
|
||||||
|
|
||||||
private final AtomicReference<String> name = new AtomicReference<>();
|
private final AtomicReference<String> name = new AtomicReference<>();
|
||||||
private final AtomicReference<Position> position = new AtomicReference<>(new Position(0D, 0D));
|
private final AtomicReference<Position> position = new AtomicReference<>(new Position(0D, 0D));
|
||||||
|
@ -156,6 +157,9 @@ public class StandardRemoteProcessGroup implements RemoteProcessGroup {
|
||||||
this.scheduler = flowController.getProcessScheduler();
|
this.scheduler = flowController.getProcessScheduler();
|
||||||
this.authorizationIssue = "Establishing connection to " + targetUris;
|
this.authorizationIssue = "Establishing connection to " + targetUris;
|
||||||
|
|
||||||
|
final String expirationPeriod = nifiProperties.getProperty(NiFiProperties.REMOTE_CONTENTS_CACHE_EXPIRATION, "30 secs");
|
||||||
|
remoteContentsCacheExpiration = FormatUtils.getTimeDuration(expirationPeriod, TimeUnit.MILLISECONDS);
|
||||||
|
|
||||||
final BulletinRepository bulletinRepository = flowController.getBulletinRepository();
|
final BulletinRepository bulletinRepository = flowController.getBulletinRepository();
|
||||||
eventReporter = new EventReporter() {
|
eventReporter = new EventReporter() {
|
||||||
private static final long serialVersionUID = 1L;
|
private static final long serialVersionUID = 1L;
|
||||||
|
@ -963,7 +967,7 @@ public class StandardRemoteProcessGroup implements RemoteProcessGroup {
|
||||||
apiClient.setConnectTimeoutMillis(getCommunicationsTimeout(TimeUnit.MILLISECONDS));
|
apiClient.setConnectTimeoutMillis(getCommunicationsTimeout(TimeUnit.MILLISECONDS));
|
||||||
apiClient.setReadTimeoutMillis(getCommunicationsTimeout(TimeUnit.MILLISECONDS));
|
apiClient.setReadTimeoutMillis(getCommunicationsTimeout(TimeUnit.MILLISECONDS));
|
||||||
apiClient.setLocalAddress(getLocalAddress());
|
apiClient.setLocalAddress(getLocalAddress());
|
||||||
|
apiClient.setCacheExpirationMillis(remoteContentsCacheExpiration);
|
||||||
return apiClient;
|
return apiClient;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -124,6 +124,7 @@ nifi.remote.input.secure=false
|
||||||
nifi.remote.input.socket.port=
|
nifi.remote.input.socket.port=
|
||||||
nifi.remote.input.http.enabled=true
|
nifi.remote.input.http.enabled=true
|
||||||
nifi.remote.input.http.transaction.ttl=30 sec
|
nifi.remote.input.http.transaction.ttl=30 sec
|
||||||
|
nifi.remote.contents.cache.expiration=30 secs
|
||||||
|
|
||||||
# web properties #
|
# web properties #
|
||||||
nifi.web.war.directory=${nifi.web.war.directory}
|
nifi.web.war.directory=${nifi.web.war.directory}
|
||||||
|
|
Loading…
Reference in New Issue