Add documentation for remote cluster proxy mode (#52779)

This is related to #49067.
This commit is contained in:
Tim Brooks 2020-03-09 10:49:41 -06:00
parent f0beab4041
commit 531cd5aaa4
No known key found for this signature in database
GPG Key ID: C2AA3BB91A889E77
4 changed files with 169 additions and 65 deletions

View File

@ -17,25 +17,20 @@ Returns configured remote cluster information.
==== {api-description-title}
The cluster remote info API allows you to retrieve all of the configured
remote cluster information. It returns connection and endpoint information keyed
remote cluster information. It returns connection and endpoint information keyed
by the configured remote cluster alias.
[[cluster-remote-info-api-response-body]]
==== {api-response-body-title}
`seeds`::
The configured initial seed transport addresses of the remote cluster.
`mode`::
Connection mode for the remote cluster. Returned values are `sniff` and
`proxy`.
`connected`::
True if there is at least one connection to the remote cluster.
`num_nodes_connected`::
The number of connected nodes in the remote cluster.
`max_connections_per_cluster`::
The maximum number of connections maintained for the remote cluster.
`initial_connect_timeout`::
The initial connect timeout for remote cluster connections.
@ -43,3 +38,26 @@ by the configured remote cluster alias.
`skip_unavailable`::
Whether the remote cluster is skipped in case it is searched through
a {ccs} request but none of its nodes are available.
`seeds`::
Initial seed transport addresses of the remote cluster when sniff mode is
configured.
`num_nodes_connected`::
Number of connected nodes in the remote cluster when sniff mode is
configured.
`max_connections_per_cluster`::
Maximum number of connections maintained for the remote cluster when sniff
mode is configured.
`address`::
Address for remote connections when proxy mode is configured.
`num_sockets_connected`::
Number of open socket connections to the remote cluster when proxy mode
is configured.
`max_socket_connections`::
The maximum number of socket connections to the remote cluster when proxy
mode is configured.

View File

@ -257,30 +257,33 @@ PUT _cluster/settings
If `cluster_two` is disconnected or unavailable during a {ccs}, {es} won't
include matching documents from that cluster in the final results.
[discrete]
[[ccs-works]]
== How {ccs} works
include::./remote-clusters.asciidoc[tag=how-remote-clusters-work]
[discrete]
[[ccs-gateway-seed-nodes]]
=== Selecting gateway and seed nodes
== Selecting gateway and seed nodes in sniff mode
Gateway and seed nodes need to be accessible from the local cluster via your
network.
For remote clusters using the <<sniff-mode,sniff connection>> mode, gateway and
seed nodes need to be accessible from the local cluster via your network.
By default, any master-ineligible node can act as a gateway node. If wanted,
you can define the gateway nodes for a cluster by setting
`cluster.remote.node.attr.gateway` to `true`.
By default, any non-<<master-node,master-eligible>> node can act as a
gateway node. If wanted, you can define the gateway nodes for a cluster by
setting `cluster.remote.node.attr.gateway` to `true`.
For {ccs}, we recommend you use gateway nodes that are capable of serving as
<<coordinating-node,coordinating nodes>> for search requests. If
wanted, the seed nodes for a cluster can be a subset of these gateway nodes.
[discrete]
[[ccs-proxy-mode]]
== {ccs} in proxy mode
<<proxy-mode,Proxy mode>> remote cluster connections support {ccs}. All remote
connections connect to the configured `proxy_address`. Any desired connection
routing to gateway or <<coordinating-node,coordinating nodes>> must
be implemented by the intermediate proxy at this configured address.
[discrete]
[[ccs-network-delays]]
=== How {ccs} handles network delays
== How {ccs} handles network delays
Because {ccs} involves sending requests to remote clusters, any network delays
can impact search speed. To avoid slow searches, {ccs} offers two options for
@ -304,9 +307,9 @@ low latency.
+
See <<ccs-unmin-roundtrips>> to learn how this option works.
[float]
[discrete]
[[ccs-min-roundtrips]]
==== Minimize network roundtrips
=== Minimize network roundtrips
Here's how {ccs} works when you minimize network roundtrips.
@ -330,9 +333,9 @@ final results in the {ccs} response.
+
image:images/ccs/ccs-min-roundtrip-client-response.svg[]
[float]
[discrete]
[[ccs-unmin-roundtrips]]
==== Don't minimize network roundtrips
=== Don't minimize network roundtrips
Here's how {ccs} works when you don't minimize network roundtrips.

View File

@ -13,23 +13,31 @@ connections to a remote cluster. This functionality is used in
<<modules-cross-cluster-search,{ccs}>>.
endif::[]
// tag::how-remote-clusters-work[]
Remote cluster connections work by configuring a remote cluster and connecting
only to a limited number of nodes in that remote cluster. Each remote cluster
is referenced by a name and a list of seed nodes. When a remote cluster is
registered, its cluster state is retrieved from one of the seed nodes and up
to three _gateway nodes_ are selected to be connected to as part of remote
cluster requests.
// end::how-remote-clusters-work[]
to a limited number of nodes in that remote cluster. There are two modes for
remote cluster connections: <<sniff-mode,sniff mode>> and
<<proxy-mode,proxy mode>>.
All the communication required between different clusters
goes through the <<modules-transport,transport layer>>. Remote cluster
connections consist of uni-directional connections from the coordinating
node to the selected remote _gateway nodes_ only.
node to the remote remote connections.
[float]
[[sniff-mode]]
=== Sniff mode
In sniff mode, a cluster is created using a name and a list of seed nodes. When
a remote cluster is registered, its cluster state is retrieved from one of the
seed nodes and up to three _gateway nodes_ are selected as part of remote
cluster requests. This mode requires that the gateway node's publish addresses
are accessible by the local cluster.
Sniff mode is the default connection mode.
[float]
[[gateway-nodes-selection]]
=== Gateway nodes selection
==== Gateway nodes selection
The _gateway nodes_ selection depends on the following criteria:
@ -62,9 +70,24 @@ communicate with 6.7. The matrix below summarizes compatibility as described abo
(see <<remote-cluster-settings>>), though such tagged nodes still have
to satisfy the two above requirements.
[float]
[[proxy-mode]]
=== Proxy mode
In proxy mode, a cluster is created using a name and a single proxy address. When
a remote cluster is registered, a configurable number of socket connections are
opened to the proxy address. The proxy is required to route those connections to
the remote cluster. Proxy mode does not require remote cluster nodes to have
accessible publish addresses.
The proxy mode is not the default connection mode and must be configured. Similar
to the sniff <<gateway-nodes-selection,gateway nodes>>, the remote
connections are subject to the same version compatibility rules as
<<rolling-upgrades>>.
[float]
[[configuring-remote-clusters]]
=== Configuring remote clusters
==== Configuring remote clusters
You can configure remote clusters globally by using
<<cluster-update-settings,cluster settings>>, which you can update dynamically.
@ -83,23 +106,32 @@ cluster:
cluster_one: <1>
seeds: 127.0.0.1:9300 <2>
transport.ping_schedule: 30s <3>
cluster_two:
seeds: 127.0.0.1:9301
transport.compress: true <4>
skip_unavailable: true <5>
cluster_two: <1>
mode: sniff <4>
seeds: 127.0.0.1:9301 <2>
transport.compress: true <5>
skip_unavailable: true <6>
cluster_three: <1>
mode: proxy <4>
proxy_address: 127.0.0.1:9302 <7>
--------------------------------
<1> `cluster_one` and `cluster_two` are arbitrary _cluster aliases_ representing
the connection to each cluster. These names are subsequently used to distinguish
between local and remote indices.
<1> `cluster_one`, `cluster_two`, and `cluster_three` are arbitrary _cluster aliases_
representing the connection to each cluster. These names are subsequently used to
distinguish between local and remote indices.
<2> The hostname and <<modules-transport,transport>> port (default: 9300) of a
seed node in the remote cluster.
<3> A keep-alive ping is configured for `cluster_one`.
<4> Compression is explicitly enabled for requests to `cluster_two`.
<5> Disconnected remote clusters are optional for `cluster_two`.
<4> The configured connection mode. By default, this is <<sniff-mode,`sniff`>>, so
the mode is implicit for `cluster_one`. However, it can be explicitly configured
as demonstrated by `cluster_two` and must be explicitly configured for
<<proxy-mode,proxy mode>> as demonstrated by `cluster_three`.
<5> Compression is explicitly enabled for requests to `cluster_two`.
<6> Disconnected remote clusters are optional for `cluster_two`.
<7> The address for the proxy endpoint used to connect to `cluster_three`.
For more information about the optional transport settings, see
<<modules-transport>>.
<<modules-transport>>.
If you use <<cluster-update-settings,cluster settings>>, the remote clusters
@ -119,6 +151,7 @@ PUT _cluster/settings
"transport.ping_schedule": "30s"
},
"cluster_two": {
"mode": "sniff",
"seeds": [
"127.0.0.1:9301"
],
@ -126,9 +159,8 @@ PUT _cluster/settings
"skip_unavailable": true
},
"cluster_three": {
"seeds": [
"127.0.0.1:9302"
]
"mode": "proxy",
"proxy_address": "127.0.0.1:9302"
}
}
}
@ -139,7 +171,8 @@ PUT _cluster/settings
// TEST[s/127.0.0.1:9300/\${transport_host}/]
You can dynamically update the compression and ping schedule settings. However,
you must re-include seeds in the settings update request. For example:
you must re-include seeds or `proxy_address` in the settings update request.
For example:
[source,console]
--------------------------------
@ -155,10 +188,16 @@ PUT _cluster/settings
"transport.ping_schedule": "60s"
},
"cluster_two": {
"mode": "sniff",
"seeds": [
"127.0.0.1:9301"
],
"transport.compress": false
},
"cluster_three": {
"mode": "proxy",
"proxy_address": "127.0.0.1:9302",
"transport.compress": true
}
}
}
@ -171,7 +210,7 @@ NOTE: When the compression or ping schedule settings change, all the existing
node connections must close and re-open, which can cause in-flight requests to
fail.
A remote cluster can be deleted from the cluster settings by setting its seeds and optional settings to `null` :
A remote cluster can be deleted from the cluster settings by setting its settings to `null` :
[source,console]
--------------------------------
@ -181,6 +220,7 @@ PUT _cluster/settings
"cluster": {
"remote": {
"cluster_two": { <1>
"mode": null,
"seeds": null,
"skip_unavailable": null,
"transport": {
@ -199,25 +239,21 @@ PUT _cluster/settings
[float]
[[remote-cluster-settings]]
=== Remote cluster settings
=== Remote cluster settings for all modes
`cluster.remote.connections_per_cluster`::
These settings apply to both <<sniff-mode,sniff mode>> and
<<proxy-mode,proxy mode>>. <<remote-cluster-sniff-settings,Sniff mode settings>>
and <<remote-cluster-proxy-settings,proxy mode settings>> are described below.
The number of gateway nodes to connect to per remote cluster. The default is
`3`.
`cluster.remote.<cluster_alias>.mode`::
The mode used for a remote cluster connection. The only supported modes are
`sniff` and `proxy`.
`cluster.remote.initial_connect_timeout`::
The time to wait for remote connections to be established when the node
starts. The default is `30s`.
`cluster.remote.node.attr`::
A node attribute to filter out nodes that are eligible as a gateway node in
the remote cluster. For instance a node can have a node attribute
`node.attr.gateway: true` such that only nodes with this attribute will be
connected to if `cluster.remote.node.attr` is set to `gateway`.
`cluster.remote.connect`::
By default, any node in the cluster can act as a cross-cluster client and
@ -226,7 +262,7 @@ PUT _cluster/settings
remote clusters. Remote cluster requests must be sent to a node that is
allowed to act as a cross-cluster client.
`cluster.remote.${cluster_alias}.skip_unavailable`::
`cluster.remote.<cluster_alias>.skip_unavailable`::
Per cluster boolean setting that allows to skip specific clusters when no
nodes belonging to them are available and they are the targetof a remote
@ -234,7 +270,7 @@ PUT _cluster/settings
by default, but they can selectively be made optional by setting this setting
to `true`.
`cluster.remote.${cluster_alias}.transport.ping_schedule`::
`cluster.remote.<cluster_alias>.transport.ping_schedule`::
Sets the time interval between regular application-level ping messages that
are sent to ensure that transport connections to nodes belonging to remote
@ -243,7 +279,7 @@ PUT _cluster/settings
are sent according to the global `transport.ping_schedule` setting, which
defaults to `-1` meaning that pings are not sent.
`cluster.remote.${cluster_alias}.transport.compress`::
`cluster.remote.<cluster_alias>.transport.compress`::
Per cluster boolean setting that enables you to configure compression for
requests to a specific remote cluster. This setting impacts only requests
@ -251,6 +287,48 @@ PUT _cluster/settings
Elasticsearch compresses the response. If unset, the global
`transport.compress` is used as the fallback setting.
[float]
[[remote-cluster-sniff-settings]]
=== Remote cluster settings for sniff mode
`cluster.remote.<cluster_alias>.seeds`::
The list of seed nodes used to sniff the remote cluster state.
`cluster.remote.<cluster_alias>.node_connections`::
The number of gateway nodes to connect to for this remote cluster. The default
is `3`.
`cluster.remote.node.attr`::
A node attribute to filter out nodes that are eligible as a gateway node in
the remote cluster. For instance a node can have a node attribute
`node.attr.gateway: true` such that only nodes with this attribute will be
connected to if `cluster.remote.node.attr` is set to `gateway`.
[float]
[[remote-cluster-proxy-settings]]
=== Remote cluster settings for proxy mode
`cluster.remote.<cluster_alias>.proxy_address`::
The address used for all remote connections.
`cluster.remote.<cluster_alias>.proxy_socket_connections`::
The number of socket connections to open per remote cluster. The default is
`18`.
[role="xpack"]
`cluster.remote.<cluster_alias>.server_name`::
An optional hostname string which is sent in the `server_name` field of
the TLS Server Name Indication extension if
<<configuring-tls,TLS is enabled>>. The TLS transport will fail to open
remote connections if this field is not a valid hostname as defined by the
TLS SNI specification.
[float]
[[retrieve-remote-clusters-info]]
=== Retrieving remote clusters info

View File

@ -597,3 +597,8 @@ See <<slm-api-start>>.
=== Stop {slm} API
See <<slm-api-stop>>.
[role="exclude",id="ccs-works"]
=== How {ccs} works
See <<ccs-gateway-seed-nodes>> and <<ccs-min-roundtrips>>.