#define WT_SEND_BUF_SIZE 1428
#endif
+/* Default configuration */
+
+/* WRITE_TSDB_DEFAULT_DNS_TTL is the time we keep the dns cached info
+ * (seconds)
+ */
+#define WRITE_TSDB_DEFAULT_DNS_TTL 600
+
+/* WRITE_TSDB_DEFAULT_DNS_RANDOM_TTL helps define the max random
+ * time we keep the dns cached info :
+ * min = 0
+ * max = WRITE_TSDB_DEFAULT_DNS_RANDOM_TTL * get_plugin_interval()
+ */
+#define WRITE_TSDB_DEFAULT_DNS_RANDOM_TTL 15
+
/*
* Private variables
*/
struct wt_callback {
+ struct addrinfo *sock_info;
+ cdtime_t sock_info_last_update;
int sock_fd;
char *node;
cdtime_t send_buf_init_time;
pthread_mutex_t send_lock;
+
+ _Bool connect_failed_log_enabled;
+ int connect_dns_failed_attempts_remaining;
+ cdtime_t next_random_ttl;
};
+static cdtime_t dnsttl = TIME_T_TO_CDTIME_T_STATIC(WRITE_TSDB_DEFAULT_DNS_TTL);
+static double dnsrandomttl = .0;
+static _Bool use_dnsrandomttl = 0;
+
/*
* Functions
*/
return status;
}
+static cdtime_t new_random_ttl() {
+ time_t ttl = 0;
+ if (use_dnsrandomttl) {
+ ttl = (time_t)(dnsrandomttl * ((double)random()) /
+ (((double)RAND_MAX) + 1.0));
+ }
+ return TIME_T_TO_CDTIME_T(ttl);
+}
+
static int wt_callback_init(struct wt_callback *cb) {
- struct addrinfo *ai_list;
int status;
+ cdtime_t now;
const char *node = cb->node ? cb->node : WT_DEFAULT_NODE;
const char *service = cb->service ? cb->service : WT_DEFAULT_SERVICE;
if (cb->sock_fd > 0)
return 0;
- struct addrinfo ai_hints = {.ai_family = AF_UNSPEC,
- .ai_flags = AI_ADDRCONFIG,
- .ai_socktype = SOCK_STREAM};
+ now = cdtime();
+ if (cb->sock_info) {
+ /* When we are here, we still have the IP in cache.
+ * If we have remaining attempts without calling the DNS, we update the
+ * last_update date so we keep the info until next time.
+ * If there is no more attempts, we need to flush the cache.
+ */
+
+ if ((cb->sock_info_last_update + dnsttl + cb->next_random_ttl) < now) {
+ cb->next_random_ttl = new_random_ttl();
+ if (cb->connect_dns_failed_attempts_remaining > 0) {
+ /* Warning : this is run under send_lock mutex.
+ * This is why we do not use another mutex here.
+ * */
+ cb->sock_info_last_update = now;
+ cb->connect_dns_failed_attempts_remaining--;
+ } else {
+ freeaddrinfo(cb->sock_info);
+ cb->sock_info = NULL;
+ }
+ }
+ }
- status = getaddrinfo(node, service, &ai_hints, &ai_list);
- if (status != 0) {
- ERROR("write_tsdb plugin: getaddrinfo (%s, %s) failed: %s", node, service,
- gai_strerror(status));
- return -1;
+ if (NULL == cb->sock_info) {
+ struct addrinfo ai_hints = {
+ .ai_family = AF_UNSPEC,
+ .ai_flags = AI_ADDRCONFIG,
+ .ai_socktype = SOCK_STREAM,
+ };
+
+ if ((cb->sock_info_last_update + dnsttl + cb->next_random_ttl) >= now) {
+ DEBUG("write_tsdb plugin: too many getaddrinfo (%s, %s) failures", node,
+ service);
+ return (-1);
+ }
+
+ cb->sock_info_last_update = now;
+ cb->next_random_ttl = new_random_ttl();
+ status = getaddrinfo(node, service, &ai_hints, &(cb->sock_info));
+ if (status != 0) {
+ if (cb->sock_info) {
+ freeaddrinfo(cb->sock_info);
+ cb->sock_info = NULL;
+ }
+ if (cb->connect_failed_log_enabled) {
+ ERROR("write_tsdb plugin: getaddrinfo (%s, %s) failed: %s", node,
+ service, gai_strerror(status));
+ cb->connect_failed_log_enabled = 0;
+ }
+ return -1;
+ }
}
- assert(ai_list != NULL);
- for (struct addrinfo *ai_ptr = ai_list; ai_ptr != NULL;
+ assert(cb->sock_info != NULL);
+ for (struct addrinfo *ai_ptr = cb->sock_info; ai_ptr != NULL;
ai_ptr = ai_ptr->ai_next) {
cb->sock_fd =
socket(ai_ptr->ai_family, ai_ptr->ai_socktype, ai_ptr->ai_protocol);
break;
}
- freeaddrinfo(ai_list);
-
if (cb->sock_fd < 0) {
char errbuf[1024];
ERROR("write_tsdb plugin: Connecting to %s:%s failed. "
return -1;
}
+ if (0 == cb->connect_failed_log_enabled) {
+ WARNING("write_tsdb plugin: Connecting to %s:%s succeeded.", node, service);
+ cb->connect_failed_log_enabled = 1;
+ }
+ cb->connect_dns_failed_attempts_remaining = 1;
+
wt_reset_buffer(cb);
return 0;
return -1;
}
cb->sock_fd = -1;
- cb->node = NULL;
- cb->service = NULL;
- cb->host_tags = NULL;
- cb->store_rates = 0;
+ cb->connect_failed_log_enabled = 1;
+ cb->next_random_ttl = new_random_ttl();
pthread_mutex_init(&cb->send_lock, NULL);
}
static int wt_config(oconfig_item_t *ci) {
+ _Bool config_random_ttl = 0;
+
for (int i = 0; i < ci->children_num; i++) {
oconfig_item_t *child = ci->children + i;
if (strcasecmp("Node", child->key) == 0)
wt_config_tsd(child);
- else {
+ else if (strcasecmp("DNS_Cache_TTL", child->key) == 0) {
+ int ttl;
+ cf_util_get_int(child, &ttl);
+ dnsttl = TIME_T_TO_CDTIME_T(ttl);
+ } else if (strcasecmp("DNS_Random_Cache_TTL", child->key) == 0) {
+ int ttl;
+ cf_util_get_int(child, &ttl);
+ config_random_ttl = 1;
+ if (ttl) {
+ dnsrandomttl = (double)ttl;
+ use_dnsrandomttl = 1;
+ } else {
+ use_dnsrandomttl = 0;
+ }
+ } else {
ERROR("write_tsdb plugin: Invalid configuration "
"option: %s.",
child->key);
}
}
+ if (!config_random_ttl) {
+ use_dnsrandomttl = 1;
+ dnsrandomttl = CDTIME_T_TO_DOUBLE(WRITE_TSDB_DEFAULT_DNS_RANDOM_TTL *
+ plugin_get_interval());
+ }
+
return 0;
}