HDFS-9895. Remove unnecessary conf cache from DataNode. Contributed by Xiaobing Zhou.
This commit is contained in:
parent
fcbac00212
commit
ec3ea18875
@ -165,6 +165,10 @@ private static long getConfiguredScanPeriodMs(Configuration conf) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public BlockScanner(DataNode datanode) {
|
||||||
|
this(datanode, datanode.getConf());
|
||||||
|
}
|
||||||
|
|
||||||
public BlockScanner(DataNode datanode, Configuration conf) {
|
public BlockScanner(DataNode datanode, Configuration conf) {
|
||||||
this.datanode = datanode;
|
this.datanode = datanode;
|
||||||
this.conf = new Conf(conf);
|
this.conf = new Conf(conf);
|
||||||
|
@ -56,6 +56,7 @@
|
|||||||
import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_DATANODE_BP_READY_TIMEOUT_KEY;
|
import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_DATANODE_BP_READY_TIMEOUT_KEY;
|
||||||
import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_DATANODE_BP_READY_TIMEOUT_DEFAULT;
|
import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_DATANODE_BP_READY_TIMEOUT_DEFAULT;
|
||||||
|
|
||||||
|
import org.apache.hadoop.conf.Configurable;
|
||||||
import org.apache.hadoop.conf.Configuration;
|
import org.apache.hadoop.conf.Configuration;
|
||||||
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
import org.apache.hadoop.hdfs.DFSConfigKeys;
|
||||||
import org.apache.hadoop.hdfs.client.HdfsClientConfigKeys;
|
import org.apache.hadoop.hdfs.client.HdfsClientConfigKeys;
|
||||||
@ -72,7 +73,6 @@
|
|||||||
*/
|
*/
|
||||||
@InterfaceAudience.Private
|
@InterfaceAudience.Private
|
||||||
public class DNConf {
|
public class DNConf {
|
||||||
final Configuration conf;
|
|
||||||
final int socketTimeout;
|
final int socketTimeout;
|
||||||
final int socketWriteTimeout;
|
final int socketWriteTimeout;
|
||||||
final int socketKeepaliveTimeout;
|
final int socketKeepaliveTimeout;
|
||||||
@ -120,73 +120,77 @@ public class DNConf {
|
|||||||
private final int volFailuresTolerated;
|
private final int volFailuresTolerated;
|
||||||
private final int volsConfigured;
|
private final int volsConfigured;
|
||||||
private final int maxDataLength;
|
private final int maxDataLength;
|
||||||
|
private Configurable dn;
|
||||||
|
|
||||||
public DNConf(Configuration conf) {
|
public DNConf(final Configurable dn) {
|
||||||
this.conf = conf;
|
this.dn = dn;
|
||||||
socketTimeout = conf.getInt(DFS_CLIENT_SOCKET_TIMEOUT_KEY,
|
socketTimeout = getConf().getInt(DFS_CLIENT_SOCKET_TIMEOUT_KEY,
|
||||||
HdfsConstants.READ_TIMEOUT);
|
HdfsConstants.READ_TIMEOUT);
|
||||||
socketWriteTimeout = conf.getInt(DFS_DATANODE_SOCKET_WRITE_TIMEOUT_KEY,
|
socketWriteTimeout = getConf().getInt(DFS_DATANODE_SOCKET_WRITE_TIMEOUT_KEY,
|
||||||
HdfsConstants.WRITE_TIMEOUT);
|
HdfsConstants.WRITE_TIMEOUT);
|
||||||
socketKeepaliveTimeout = conf.getInt(
|
socketKeepaliveTimeout = getConf().getInt(
|
||||||
DFSConfigKeys.DFS_DATANODE_SOCKET_REUSE_KEEPALIVE_KEY,
|
DFSConfigKeys.DFS_DATANODE_SOCKET_REUSE_KEEPALIVE_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_SOCKET_REUSE_KEEPALIVE_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_SOCKET_REUSE_KEEPALIVE_DEFAULT);
|
||||||
this.transferSocketSendBufferSize = conf.getInt(
|
this.transferSocketSendBufferSize = getConf().getInt(
|
||||||
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_SEND_BUFFER_SIZE_KEY,
|
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_SEND_BUFFER_SIZE_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_SEND_BUFFER_SIZE_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_SEND_BUFFER_SIZE_DEFAULT);
|
||||||
this.transferSocketRecvBufferSize = conf.getInt(
|
this.transferSocketRecvBufferSize = getConf().getInt(
|
||||||
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_RECV_BUFFER_SIZE_KEY,
|
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_RECV_BUFFER_SIZE_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_RECV_BUFFER_SIZE_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_TRANSFER_SOCKET_RECV_BUFFER_SIZE_DEFAULT);
|
||||||
this.tcpNoDelay = conf.getBoolean(
|
this.tcpNoDelay = getConf().getBoolean(
|
||||||
DFSConfigKeys.DFS_DATA_TRANSFER_SERVER_TCPNODELAY,
|
DFSConfigKeys.DFS_DATA_TRANSFER_SERVER_TCPNODELAY,
|
||||||
DFSConfigKeys.DFS_DATA_TRANSFER_SERVER_TCPNODELAY_DEFAULT);
|
DFSConfigKeys.DFS_DATA_TRANSFER_SERVER_TCPNODELAY_DEFAULT);
|
||||||
|
|
||||||
/* Based on results on different platforms, we might need set the default
|
/* Based on results on different platforms, we might need set the default
|
||||||
* to false on some of them. */
|
* to false on some of them. */
|
||||||
transferToAllowed = conf.getBoolean(
|
transferToAllowed = getConf().getBoolean(
|
||||||
DFS_DATANODE_TRANSFERTO_ALLOWED_KEY,
|
DFS_DATANODE_TRANSFERTO_ALLOWED_KEY,
|
||||||
DFS_DATANODE_TRANSFERTO_ALLOWED_DEFAULT);
|
DFS_DATANODE_TRANSFERTO_ALLOWED_DEFAULT);
|
||||||
|
|
||||||
writePacketSize = conf.getInt(DFS_CLIENT_WRITE_PACKET_SIZE_KEY,
|
writePacketSize = getConf().getInt(DFS_CLIENT_WRITE_PACKET_SIZE_KEY,
|
||||||
DFS_CLIENT_WRITE_PACKET_SIZE_DEFAULT);
|
DFS_CLIENT_WRITE_PACKET_SIZE_DEFAULT);
|
||||||
|
|
||||||
readaheadLength = conf.getLong(
|
readaheadLength = getConf().getLong(
|
||||||
HdfsClientConfigKeys.DFS_DATANODE_READAHEAD_BYTES_KEY,
|
HdfsClientConfigKeys.DFS_DATANODE_READAHEAD_BYTES_KEY,
|
||||||
HdfsClientConfigKeys.DFS_DATANODE_READAHEAD_BYTES_DEFAULT);
|
HdfsClientConfigKeys.DFS_DATANODE_READAHEAD_BYTES_DEFAULT);
|
||||||
maxDataLength = conf.getInt(DFSConfigKeys.IPC_MAXIMUM_DATA_LENGTH,
|
maxDataLength = getConf().getInt(DFSConfigKeys.IPC_MAXIMUM_DATA_LENGTH,
|
||||||
DFSConfigKeys.IPC_MAXIMUM_DATA_LENGTH_DEFAULT);
|
DFSConfigKeys.IPC_MAXIMUM_DATA_LENGTH_DEFAULT);
|
||||||
dropCacheBehindWrites = conf.getBoolean(
|
dropCacheBehindWrites = getConf().getBoolean(
|
||||||
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_WRITES_KEY,
|
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_WRITES_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_WRITES_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_WRITES_DEFAULT);
|
||||||
syncBehindWrites = conf.getBoolean(
|
syncBehindWrites = getConf().getBoolean(
|
||||||
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_KEY,
|
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_DEFAULT);
|
||||||
syncBehindWritesInBackground = conf.getBoolean(
|
syncBehindWritesInBackground = getConf().getBoolean(
|
||||||
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_IN_BACKGROUND_KEY,
|
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_IN_BACKGROUND_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_IN_BACKGROUND_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_SYNC_BEHIND_WRITES_IN_BACKGROUND_DEFAULT);
|
||||||
dropCacheBehindReads = conf.getBoolean(
|
dropCacheBehindReads = getConf().getBoolean(
|
||||||
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_READS_KEY,
|
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_READS_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_READS_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_DROP_CACHE_BEHIND_READS_DEFAULT);
|
||||||
connectToDnViaHostname = conf.getBoolean(
|
connectToDnViaHostname = getConf().getBoolean(
|
||||||
DFSConfigKeys.DFS_DATANODE_USE_DN_HOSTNAME,
|
DFSConfigKeys.DFS_DATANODE_USE_DN_HOSTNAME,
|
||||||
DFSConfigKeys.DFS_DATANODE_USE_DN_HOSTNAME_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_USE_DN_HOSTNAME_DEFAULT);
|
||||||
this.blockReportInterval = conf.getLong(DFS_BLOCKREPORT_INTERVAL_MSEC_KEY,
|
this.blockReportInterval = getConf().getLong(
|
||||||
|
DFS_BLOCKREPORT_INTERVAL_MSEC_KEY,
|
||||||
DFS_BLOCKREPORT_INTERVAL_MSEC_DEFAULT);
|
DFS_BLOCKREPORT_INTERVAL_MSEC_DEFAULT);
|
||||||
this.ibrInterval = conf.getLong(
|
this.ibrInterval = getConf().getLong(
|
||||||
DFSConfigKeys.DFS_BLOCKREPORT_INCREMENTAL_INTERVAL_MSEC_KEY,
|
DFSConfigKeys.DFS_BLOCKREPORT_INCREMENTAL_INTERVAL_MSEC_KEY,
|
||||||
DFSConfigKeys.DFS_BLOCKREPORT_INCREMENTAL_INTERVAL_MSEC_DEFAULT);
|
DFSConfigKeys.DFS_BLOCKREPORT_INCREMENTAL_INTERVAL_MSEC_DEFAULT);
|
||||||
this.blockReportSplitThreshold = conf.getLong(DFS_BLOCKREPORT_SPLIT_THRESHOLD_KEY,
|
this.blockReportSplitThreshold = getConf().getLong(
|
||||||
DFS_BLOCKREPORT_SPLIT_THRESHOLD_DEFAULT);
|
DFS_BLOCKREPORT_SPLIT_THRESHOLD_KEY,
|
||||||
this.cacheReportInterval = conf.getLong(DFS_CACHEREPORT_INTERVAL_MSEC_KEY,
|
DFS_BLOCKREPORT_SPLIT_THRESHOLD_DEFAULT);
|
||||||
|
this.cacheReportInterval = getConf().getLong(
|
||||||
|
DFS_CACHEREPORT_INTERVAL_MSEC_KEY,
|
||||||
DFS_CACHEREPORT_INTERVAL_MSEC_DEFAULT);
|
DFS_CACHEREPORT_INTERVAL_MSEC_DEFAULT);
|
||||||
|
|
||||||
this.dfsclientSlowIoWarningThresholdMs = conf.getLong(
|
this.dfsclientSlowIoWarningThresholdMs = getConf().getLong(
|
||||||
HdfsClientConfigKeys.DFS_CLIENT_SLOW_IO_WARNING_THRESHOLD_KEY,
|
HdfsClientConfigKeys.DFS_CLIENT_SLOW_IO_WARNING_THRESHOLD_KEY,
|
||||||
HdfsClientConfigKeys.DFS_CLIENT_SLOW_IO_WARNING_THRESHOLD_DEFAULT);
|
HdfsClientConfigKeys.DFS_CLIENT_SLOW_IO_WARNING_THRESHOLD_DEFAULT);
|
||||||
this.datanodeSlowIoWarningThresholdMs = conf.getLong(
|
this.datanodeSlowIoWarningThresholdMs = getConf().getLong(
|
||||||
DFSConfigKeys.DFS_DATANODE_SLOW_IO_WARNING_THRESHOLD_KEY,
|
DFSConfigKeys.DFS_DATANODE_SLOW_IO_WARNING_THRESHOLD_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_SLOW_IO_WARNING_THRESHOLD_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_SLOW_IO_WARNING_THRESHOLD_DEFAULT);
|
||||||
|
|
||||||
long initBRDelay = conf.getTimeDuration(
|
long initBRDelay = getConf().getTimeDuration(
|
||||||
DFS_BLOCKREPORT_INITIAL_DELAY_KEY,
|
DFS_BLOCKREPORT_INITIAL_DELAY_KEY,
|
||||||
DFS_BLOCKREPORT_INITIAL_DELAY_DEFAULT, TimeUnit.SECONDS) * 1000L;
|
DFS_BLOCKREPORT_INITIAL_DELAY_DEFAULT, TimeUnit.SECONDS) * 1000L;
|
||||||
if (initBRDelay >= blockReportInterval) {
|
if (initBRDelay >= blockReportInterval) {
|
||||||
@ -197,11 +201,11 @@ public DNConf(Configuration conf) {
|
|||||||
}
|
}
|
||||||
initialBlockReportDelayMs = initBRDelay;
|
initialBlockReportDelayMs = initBRDelay;
|
||||||
|
|
||||||
heartBeatInterval = conf.getTimeDuration(DFS_HEARTBEAT_INTERVAL_KEY,
|
heartBeatInterval = getConf().getTimeDuration(DFS_HEARTBEAT_INTERVAL_KEY,
|
||||||
DFS_HEARTBEAT_INTERVAL_DEFAULT, TimeUnit.SECONDS) * 1000L;
|
DFS_HEARTBEAT_INTERVAL_DEFAULT, TimeUnit.SECONDS) * 1000L;
|
||||||
long confLifelineIntervalMs =
|
long confLifelineIntervalMs =
|
||||||
conf.getLong(DFS_DATANODE_LIFELINE_INTERVAL_SECONDS_KEY,
|
getConf().getLong(DFS_DATANODE_LIFELINE_INTERVAL_SECONDS_KEY,
|
||||||
3 * conf.getTimeDuration(DFS_HEARTBEAT_INTERVAL_KEY,
|
3 * getConf().getTimeDuration(DFS_HEARTBEAT_INTERVAL_KEY,
|
||||||
DFS_HEARTBEAT_INTERVAL_DEFAULT, TimeUnit.SECONDS)) * 1000L;
|
DFS_HEARTBEAT_INTERVAL_DEFAULT, TimeUnit.SECONDS)) * 1000L;
|
||||||
if (confLifelineIntervalMs <= heartBeatInterval) {
|
if (confLifelineIntervalMs <= heartBeatInterval) {
|
||||||
confLifelineIntervalMs = 3 * heartBeatInterval;
|
confLifelineIntervalMs = 3 * heartBeatInterval;
|
||||||
@ -215,47 +219,50 @@ public DNConf(Configuration conf) {
|
|||||||
lifelineIntervalMs = confLifelineIntervalMs;
|
lifelineIntervalMs = confLifelineIntervalMs;
|
||||||
|
|
||||||
// do we need to sync block file contents to disk when blockfile is closed?
|
// do we need to sync block file contents to disk when blockfile is closed?
|
||||||
this.syncOnClose = conf.getBoolean(DFS_DATANODE_SYNCONCLOSE_KEY,
|
this.syncOnClose = getConf().getBoolean(DFS_DATANODE_SYNCONCLOSE_KEY,
|
||||||
DFS_DATANODE_SYNCONCLOSE_DEFAULT);
|
DFS_DATANODE_SYNCONCLOSE_DEFAULT);
|
||||||
|
|
||||||
this.minimumNameNodeVersion = conf.get(DFS_DATANODE_MIN_SUPPORTED_NAMENODE_VERSION_KEY,
|
this.minimumNameNodeVersion = getConf().get(
|
||||||
|
DFS_DATANODE_MIN_SUPPORTED_NAMENODE_VERSION_KEY,
|
||||||
DFS_DATANODE_MIN_SUPPORTED_NAMENODE_VERSION_DEFAULT);
|
DFS_DATANODE_MIN_SUPPORTED_NAMENODE_VERSION_DEFAULT);
|
||||||
|
|
||||||
this.encryptDataTransfer = conf.getBoolean(DFS_ENCRYPT_DATA_TRANSFER_KEY,
|
this.encryptDataTransfer = getConf().getBoolean(
|
||||||
|
DFS_ENCRYPT_DATA_TRANSFER_KEY,
|
||||||
DFS_ENCRYPT_DATA_TRANSFER_DEFAULT);
|
DFS_ENCRYPT_DATA_TRANSFER_DEFAULT);
|
||||||
this.encryptionAlgorithm = conf.get(DFS_DATA_ENCRYPTION_ALGORITHM_KEY);
|
this.encryptionAlgorithm = getConf().get(DFS_DATA_ENCRYPTION_ALGORITHM_KEY);
|
||||||
this.trustedChannelResolver = TrustedChannelResolver.getInstance(conf);
|
this.trustedChannelResolver = TrustedChannelResolver.getInstance(getConf());
|
||||||
this.saslPropsResolver = DataTransferSaslUtil.getSaslPropertiesResolver(
|
this.saslPropsResolver = DataTransferSaslUtil.getSaslPropertiesResolver(
|
||||||
conf);
|
getConf());
|
||||||
this.ignoreSecurePortsForTesting = conf.getBoolean(
|
this.ignoreSecurePortsForTesting = getConf().getBoolean(
|
||||||
IGNORE_SECURE_PORTS_FOR_TESTING_KEY,
|
IGNORE_SECURE_PORTS_FOR_TESTING_KEY,
|
||||||
IGNORE_SECURE_PORTS_FOR_TESTING_DEFAULT);
|
IGNORE_SECURE_PORTS_FOR_TESTING_DEFAULT);
|
||||||
|
|
||||||
this.xceiverStopTimeout = conf.getLong(
|
this.xceiverStopTimeout = getConf().getLong(
|
||||||
DFS_DATANODE_XCEIVER_STOP_TIMEOUT_MILLIS_KEY,
|
DFS_DATANODE_XCEIVER_STOP_TIMEOUT_MILLIS_KEY,
|
||||||
DFS_DATANODE_XCEIVER_STOP_TIMEOUT_MILLIS_DEFAULT);
|
DFS_DATANODE_XCEIVER_STOP_TIMEOUT_MILLIS_DEFAULT);
|
||||||
|
|
||||||
this.maxLockedMemory = conf.getLong(
|
this.maxLockedMemory = getConf().getLong(
|
||||||
DFS_DATANODE_MAX_LOCKED_MEMORY_KEY,
|
DFS_DATANODE_MAX_LOCKED_MEMORY_KEY,
|
||||||
DFS_DATANODE_MAX_LOCKED_MEMORY_DEFAULT);
|
DFS_DATANODE_MAX_LOCKED_MEMORY_DEFAULT);
|
||||||
|
|
||||||
this.restartReplicaExpiry = conf.getLong(
|
this.restartReplicaExpiry = getConf().getLong(
|
||||||
DFS_DATANODE_RESTART_REPLICA_EXPIRY_KEY,
|
DFS_DATANODE_RESTART_REPLICA_EXPIRY_KEY,
|
||||||
DFS_DATANODE_RESTART_REPLICA_EXPIRY_DEFAULT) * 1000L;
|
DFS_DATANODE_RESTART_REPLICA_EXPIRY_DEFAULT) * 1000L;
|
||||||
|
|
||||||
this.allowNonLocalLazyPersist = conf.getBoolean(
|
this.allowNonLocalLazyPersist = getConf().getBoolean(
|
||||||
DFS_DATANODE_NON_LOCAL_LAZY_PERSIST,
|
DFS_DATANODE_NON_LOCAL_LAZY_PERSIST,
|
||||||
DFS_DATANODE_NON_LOCAL_LAZY_PERSIST_DEFAULT);
|
DFS_DATANODE_NON_LOCAL_LAZY_PERSIST_DEFAULT);
|
||||||
|
|
||||||
this.bpReadyTimeout = conf.getTimeDuration(
|
this.bpReadyTimeout = getConf().getTimeDuration(
|
||||||
DFS_DATANODE_BP_READY_TIMEOUT_KEY,
|
DFS_DATANODE_BP_READY_TIMEOUT_KEY,
|
||||||
DFS_DATANODE_BP_READY_TIMEOUT_DEFAULT, TimeUnit.SECONDS);
|
DFS_DATANODE_BP_READY_TIMEOUT_DEFAULT, TimeUnit.SECONDS);
|
||||||
|
|
||||||
this.volFailuresTolerated =
|
this.volFailuresTolerated =
|
||||||
conf.getInt(DFSConfigKeys.DFS_DATANODE_FAILED_VOLUMES_TOLERATED_KEY,
|
getConf().getInt(
|
||||||
|
DFSConfigKeys.DFS_DATANODE_FAILED_VOLUMES_TOLERATED_KEY,
|
||||||
DFSConfigKeys.DFS_DATANODE_FAILED_VOLUMES_TOLERATED_DEFAULT);
|
DFSConfigKeys.DFS_DATANODE_FAILED_VOLUMES_TOLERATED_DEFAULT);
|
||||||
String[] dataDirs =
|
String[] dataDirs =
|
||||||
conf.getTrimmedStrings(DFSConfigKeys.DFS_DATANODE_DATA_DIR_KEY);
|
getConf().getTrimmedStrings(DFSConfigKeys.DFS_DATANODE_DATA_DIR_KEY);
|
||||||
this.volsConfigured = (dataDirs == null) ? 0 : dataDirs.length;
|
this.volsConfigured = (dataDirs == null) ? 0 : dataDirs.length;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -270,7 +277,7 @@ String getMinimumNameNodeVersion() {
|
|||||||
* @return Configuration the configuration
|
* @return Configuration the configuration
|
||||||
*/
|
*/
|
||||||
public Configuration getConf() {
|
public Configuration getConf() {
|
||||||
return conf;
|
return this.dn.getConf();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -363,7 +363,6 @@ public static InetSocketAddress createSocketAddr(String target) {
|
|||||||
private SecureResources secureResources = null;
|
private SecureResources secureResources = null;
|
||||||
// dataDirs must be accessed while holding the DataNode lock.
|
// dataDirs must be accessed while holding the DataNode lock.
|
||||||
private List<StorageLocation> dataDirs;
|
private List<StorageLocation> dataDirs;
|
||||||
private Configuration conf;
|
|
||||||
private final String confVersion;
|
private final String confVersion;
|
||||||
private final long maxNumberOfBlocksToLog;
|
private final long maxNumberOfBlocksToLog;
|
||||||
private final boolean pipelineSupportECN;
|
private final boolean pipelineSupportECN;
|
||||||
@ -419,7 +418,7 @@ private static Tracer createTracer(Configuration conf) {
|
|||||||
this.confVersion = null;
|
this.confVersion = null;
|
||||||
this.usersWithLocalPathAccess = null;
|
this.usersWithLocalPathAccess = null;
|
||||||
this.connectToDnViaHostname = false;
|
this.connectToDnViaHostname = false;
|
||||||
this.blockScanner = new BlockScanner(this, conf);
|
this.blockScanner = new BlockScanner(this, this.getConf());
|
||||||
this.pipelineSupportECN = false;
|
this.pipelineSupportECN = false;
|
||||||
this.checkDiskErrorInterval =
|
this.checkDiskErrorInterval =
|
||||||
ThreadLocalRandom.current().nextInt(5000, (int) (5000 * 1.25));
|
ThreadLocalRandom.current().nextInt(5000, (int) (5000 * 1.25));
|
||||||
@ -438,7 +437,7 @@ private static Tracer createTracer(Configuration conf) {
|
|||||||
this.tracer = createTracer(conf);
|
this.tracer = createTracer(conf);
|
||||||
this.tracerConfigurationManager =
|
this.tracerConfigurationManager =
|
||||||
new TracerConfigurationManager(DATANODE_HTRACE_PREFIX, conf);
|
new TracerConfigurationManager(DATANODE_HTRACE_PREFIX, conf);
|
||||||
this.blockScanner = new BlockScanner(this, conf);
|
this.blockScanner = new BlockScanner(this);
|
||||||
this.lastDiskErrorCheck = 0;
|
this.lastDiskErrorCheck = 0;
|
||||||
this.maxNumberOfBlocksToLog = conf.getLong(DFS_MAX_NUM_BLOCKS_TO_LOG_KEY,
|
this.maxNumberOfBlocksToLog = conf.getLong(DFS_MAX_NUM_BLOCKS_TO_LOG_KEY,
|
||||||
DFS_MAX_NUM_BLOCKS_TO_LOG_DEFAULT);
|
DFS_MAX_NUM_BLOCKS_TO_LOG_DEFAULT);
|
||||||
@ -487,7 +486,7 @@ private static Tracer createTracer(Configuration conf) {
|
|||||||
try {
|
try {
|
||||||
hostName = getHostName(conf);
|
hostName = getHostName(conf);
|
||||||
LOG.info("Configured hostname is " + hostName);
|
LOG.info("Configured hostname is " + hostName);
|
||||||
startDataNode(conf, dataDirs, resources);
|
startDataNode(dataDirs, resources);
|
||||||
} catch (IOException ie) {
|
} catch (IOException ie) {
|
||||||
shutdown();
|
shutdown();
|
||||||
throw ie;
|
throw ie;
|
||||||
@ -527,7 +526,7 @@ public String reconfigurePropertyImpl(String property, String newVal)
|
|||||||
try {
|
try {
|
||||||
LOG.info("Reconfiguring " + property + " to " + newVal);
|
LOG.info("Reconfiguring " + property + " to " + newVal);
|
||||||
this.refreshVolumes(newVal);
|
this.refreshVolumes(newVal);
|
||||||
return conf.get(DFS_DATANODE_DATA_DIR_KEY);
|
return getConf().get(DFS_DATANODE_DATA_DIR_KEY);
|
||||||
} catch (IOException e) {
|
} catch (IOException e) {
|
||||||
rootException = e;
|
rootException = e;
|
||||||
} finally {
|
} finally {
|
||||||
@ -650,7 +649,7 @@ ChangedVolumes parseChangedVolumes(String newVolumes) throws IOException {
|
|||||||
|
|
||||||
// Use the existing StorageLocation to detect storage type changes.
|
// Use the existing StorageLocation to detect storage type changes.
|
||||||
Map<String, StorageLocation> existingLocations = new HashMap<>();
|
Map<String, StorageLocation> existingLocations = new HashMap<>();
|
||||||
for (StorageLocation loc : getStorageLocations(this.conf)) {
|
for (StorageLocation loc : getStorageLocations(getConf())) {
|
||||||
existingLocations.put(loc.getFile().getCanonicalPath(), loc);
|
existingLocations.put(loc.getFile().getCanonicalPath(), loc);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -846,7 +845,7 @@ private synchronized void removeVolumes(
|
|||||||
it.remove();
|
it.remove();
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
conf.set(DFS_DATANODE_DATA_DIR_KEY, Joiner.on(",").join(dataDirs));
|
getConf().set(DFS_DATANODE_DATA_DIR_KEY, Joiner.on(",").join(dataDirs));
|
||||||
|
|
||||||
if (ioe != null) {
|
if (ioe != null) {
|
||||||
throw ioe;
|
throw ioe;
|
||||||
@ -904,14 +903,14 @@ private static String getHostName(Configuration config)
|
|||||||
* for information related to the different configuration options and
|
* for information related to the different configuration options and
|
||||||
* Http Policy is decided.
|
* Http Policy is decided.
|
||||||
*/
|
*/
|
||||||
private void startInfoServer(Configuration conf)
|
private void startInfoServer()
|
||||||
throws IOException {
|
throws IOException {
|
||||||
// SecureDataNodeStarter will bind the privileged port to the channel if
|
// SecureDataNodeStarter will bind the privileged port to the channel if
|
||||||
// the DN is started by JSVC, pass it along.
|
// the DN is started by JSVC, pass it along.
|
||||||
ServerSocketChannel httpServerChannel = secureResources != null ?
|
ServerSocketChannel httpServerChannel = secureResources != null ?
|
||||||
secureResources.getHttpServerChannel() : null;
|
secureResources.getHttpServerChannel() : null;
|
||||||
|
|
||||||
this.httpServer = new DatanodeHttpServer(conf, this, httpServerChannel);
|
httpServer = new DatanodeHttpServer(getConf(), this, httpServerChannel);
|
||||||
httpServer.start();
|
httpServer.start();
|
||||||
if (httpServer.getHttpAddress() != null) {
|
if (httpServer.getHttpAddress() != null) {
|
||||||
infoPort = httpServer.getHttpAddress().getPort();
|
infoPort = httpServer.getHttpAddress().getPort();
|
||||||
@ -933,24 +932,24 @@ private void startPlugins(Configuration conf) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void initIpcServer(Configuration conf) throws IOException {
|
private void initIpcServer() throws IOException {
|
||||||
InetSocketAddress ipcAddr = NetUtils.createSocketAddr(
|
InetSocketAddress ipcAddr = NetUtils.createSocketAddr(
|
||||||
conf.getTrimmed(DFS_DATANODE_IPC_ADDRESS_KEY));
|
getConf().getTrimmed(DFS_DATANODE_IPC_ADDRESS_KEY));
|
||||||
|
|
||||||
// Add all the RPC protocols that the Datanode implements
|
// Add all the RPC protocols that the Datanode implements
|
||||||
RPC.setProtocolEngine(conf, ClientDatanodeProtocolPB.class,
|
RPC.setProtocolEngine(getConf(), ClientDatanodeProtocolPB.class,
|
||||||
ProtobufRpcEngine.class);
|
ProtobufRpcEngine.class);
|
||||||
ClientDatanodeProtocolServerSideTranslatorPB clientDatanodeProtocolXlator =
|
ClientDatanodeProtocolServerSideTranslatorPB clientDatanodeProtocolXlator =
|
||||||
new ClientDatanodeProtocolServerSideTranslatorPB(this);
|
new ClientDatanodeProtocolServerSideTranslatorPB(this);
|
||||||
BlockingService service = ClientDatanodeProtocolService
|
BlockingService service = ClientDatanodeProtocolService
|
||||||
.newReflectiveBlockingService(clientDatanodeProtocolXlator);
|
.newReflectiveBlockingService(clientDatanodeProtocolXlator);
|
||||||
ipcServer = new RPC.Builder(conf)
|
ipcServer = new RPC.Builder(getConf())
|
||||||
.setProtocol(ClientDatanodeProtocolPB.class)
|
.setProtocol(ClientDatanodeProtocolPB.class)
|
||||||
.setInstance(service)
|
.setInstance(service)
|
||||||
.setBindAddress(ipcAddr.getHostName())
|
.setBindAddress(ipcAddr.getHostName())
|
||||||
.setPort(ipcAddr.getPort())
|
.setPort(ipcAddr.getPort())
|
||||||
.setNumHandlers(
|
.setNumHandlers(
|
||||||
conf.getInt(DFS_DATANODE_HANDLER_COUNT_KEY,
|
getConf().getInt(DFS_DATANODE_HANDLER_COUNT_KEY,
|
||||||
DFS_DATANODE_HANDLER_COUNT_DEFAULT)).setVerbose(false)
|
DFS_DATANODE_HANDLER_COUNT_DEFAULT)).setVerbose(false)
|
||||||
.setSecretManager(blockPoolTokenSecretManager).build();
|
.setSecretManager(blockPoolTokenSecretManager).build();
|
||||||
|
|
||||||
@ -958,29 +957,32 @@ private void initIpcServer(Configuration conf) throws IOException {
|
|||||||
= new ReconfigurationProtocolServerSideTranslatorPB(this);
|
= new ReconfigurationProtocolServerSideTranslatorPB(this);
|
||||||
service = ReconfigurationProtocolService
|
service = ReconfigurationProtocolService
|
||||||
.newReflectiveBlockingService(reconfigurationProtocolXlator);
|
.newReflectiveBlockingService(reconfigurationProtocolXlator);
|
||||||
DFSUtil.addPBProtocol(conf, ReconfigurationProtocolPB.class, service,
|
DFSUtil.addPBProtocol(getConf(), ReconfigurationProtocolPB.class, service,
|
||||||
ipcServer);
|
ipcServer);
|
||||||
|
|
||||||
InterDatanodeProtocolServerSideTranslatorPB interDatanodeProtocolXlator =
|
InterDatanodeProtocolServerSideTranslatorPB interDatanodeProtocolXlator =
|
||||||
new InterDatanodeProtocolServerSideTranslatorPB(this);
|
new InterDatanodeProtocolServerSideTranslatorPB(this);
|
||||||
service = InterDatanodeProtocolService
|
service = InterDatanodeProtocolService
|
||||||
.newReflectiveBlockingService(interDatanodeProtocolXlator);
|
.newReflectiveBlockingService(interDatanodeProtocolXlator);
|
||||||
DFSUtil.addPBProtocol(conf, InterDatanodeProtocolPB.class, service,
|
DFSUtil.addPBProtocol(getConf(), InterDatanodeProtocolPB.class, service,
|
||||||
ipcServer);
|
ipcServer);
|
||||||
|
|
||||||
TraceAdminProtocolServerSideTranslatorPB traceAdminXlator =
|
TraceAdminProtocolServerSideTranslatorPB traceAdminXlator =
|
||||||
new TraceAdminProtocolServerSideTranslatorPB(this);
|
new TraceAdminProtocolServerSideTranslatorPB(this);
|
||||||
BlockingService traceAdminService = TraceAdminService
|
BlockingService traceAdminService = TraceAdminService
|
||||||
.newReflectiveBlockingService(traceAdminXlator);
|
.newReflectiveBlockingService(traceAdminXlator);
|
||||||
DFSUtil.addPBProtocol(conf, TraceAdminProtocolPB.class, traceAdminService,
|
DFSUtil.addPBProtocol(
|
||||||
|
getConf(),
|
||||||
|
TraceAdminProtocolPB.class,
|
||||||
|
traceAdminService,
|
||||||
ipcServer);
|
ipcServer);
|
||||||
|
|
||||||
LOG.info("Opened IPC server at " + ipcServer.getListenerAddress());
|
LOG.info("Opened IPC server at " + ipcServer.getListenerAddress());
|
||||||
|
|
||||||
// set service-level authorization security policy
|
// set service-level authorization security policy
|
||||||
if (conf.getBoolean(
|
if (getConf().getBoolean(
|
||||||
CommonConfigurationKeys.HADOOP_SECURITY_AUTHORIZATION, false)) {
|
CommonConfigurationKeys.HADOOP_SECURITY_AUTHORIZATION, false)) {
|
||||||
ipcServer.refreshServiceAcl(conf, new HDFSPolicyProvider());
|
ipcServer.refreshServiceAcl(getConf(), new HDFSPolicyProvider());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -1071,17 +1073,17 @@ private void shutdownDiskBalancer() {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
private void initDataXceiver(Configuration conf) throws IOException {
|
private void initDataXceiver() throws IOException {
|
||||||
// find free port or use privileged port provided
|
// find free port or use privileged port provided
|
||||||
TcpPeerServer tcpPeerServer;
|
TcpPeerServer tcpPeerServer;
|
||||||
if (secureResources != null) {
|
if (secureResources != null) {
|
||||||
tcpPeerServer = new TcpPeerServer(secureResources);
|
tcpPeerServer = new TcpPeerServer(secureResources);
|
||||||
} else {
|
} else {
|
||||||
int backlogLength = conf.getInt(
|
int backlogLength = getConf().getInt(
|
||||||
CommonConfigurationKeysPublic.IPC_SERVER_LISTEN_QUEUE_SIZE_KEY,
|
CommonConfigurationKeysPublic.IPC_SERVER_LISTEN_QUEUE_SIZE_KEY,
|
||||||
CommonConfigurationKeysPublic.IPC_SERVER_LISTEN_QUEUE_SIZE_DEFAULT);
|
CommonConfigurationKeysPublic.IPC_SERVER_LISTEN_QUEUE_SIZE_DEFAULT);
|
||||||
tcpPeerServer = new TcpPeerServer(dnConf.socketWriteTimeout,
|
tcpPeerServer = new TcpPeerServer(dnConf.socketWriteTimeout,
|
||||||
DataNode.getStreamingAddr(conf), backlogLength);
|
DataNode.getStreamingAddr(getConf()), backlogLength);
|
||||||
}
|
}
|
||||||
if (dnConf.getTransferSocketRecvBufferSize() > 0) {
|
if (dnConf.getTransferSocketRecvBufferSize() > 0) {
|
||||||
tcpPeerServer.setReceiveBufferSize(
|
tcpPeerServer.setReceiveBufferSize(
|
||||||
@ -1090,24 +1092,27 @@ private void initDataXceiver(Configuration conf) throws IOException {
|
|||||||
streamingAddr = tcpPeerServer.getStreamingAddr();
|
streamingAddr = tcpPeerServer.getStreamingAddr();
|
||||||
LOG.info("Opened streaming server at " + streamingAddr);
|
LOG.info("Opened streaming server at " + streamingAddr);
|
||||||
this.threadGroup = new ThreadGroup("dataXceiverServer");
|
this.threadGroup = new ThreadGroup("dataXceiverServer");
|
||||||
xserver = new DataXceiverServer(tcpPeerServer, conf, this);
|
xserver = new DataXceiverServer(tcpPeerServer, getConf(), this);
|
||||||
this.dataXceiverServer = new Daemon(threadGroup, xserver);
|
this.dataXceiverServer = new Daemon(threadGroup, xserver);
|
||||||
this.threadGroup.setDaemon(true); // auto destroy when empty
|
this.threadGroup.setDaemon(true); // auto destroy when empty
|
||||||
|
|
||||||
if (conf.getBoolean(HdfsClientConfigKeys.Read.ShortCircuit.KEY,
|
if (getConf().getBoolean(
|
||||||
HdfsClientConfigKeys.Read.ShortCircuit.DEFAULT) ||
|
HdfsClientConfigKeys.Read.ShortCircuit.KEY,
|
||||||
conf.getBoolean(HdfsClientConfigKeys.DFS_CLIENT_DOMAIN_SOCKET_DATA_TRAFFIC,
|
HdfsClientConfigKeys.Read.ShortCircuit.DEFAULT) ||
|
||||||
HdfsClientConfigKeys.DFS_CLIENT_DOMAIN_SOCKET_DATA_TRAFFIC_DEFAULT)) {
|
getConf().getBoolean(
|
||||||
|
HdfsClientConfigKeys.DFS_CLIENT_DOMAIN_SOCKET_DATA_TRAFFIC,
|
||||||
|
HdfsClientConfigKeys
|
||||||
|
.DFS_CLIENT_DOMAIN_SOCKET_DATA_TRAFFIC_DEFAULT)) {
|
||||||
DomainPeerServer domainPeerServer =
|
DomainPeerServer domainPeerServer =
|
||||||
getDomainPeerServer(conf, streamingAddr.getPort());
|
getDomainPeerServer(getConf(), streamingAddr.getPort());
|
||||||
if (domainPeerServer != null) {
|
if (domainPeerServer != null) {
|
||||||
this.localDataXceiverServer = new Daemon(threadGroup,
|
this.localDataXceiverServer = new Daemon(threadGroup,
|
||||||
new DataXceiverServer(domainPeerServer, conf, this));
|
new DataXceiverServer(domainPeerServer, getConf(), this));
|
||||||
LOG.info("Listening on UNIX domain socket: " +
|
LOG.info("Listening on UNIX domain socket: " +
|
||||||
domainPeerServer.getBindPath());
|
domainPeerServer.getBindPath());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
this.shortCircuitRegistry = new ShortCircuitRegistry(conf);
|
this.shortCircuitRegistry = new ShortCircuitRegistry(getConf());
|
||||||
}
|
}
|
||||||
|
|
||||||
private static DomainPeerServer getDomainPeerServer(Configuration conf,
|
private static DomainPeerServer getDomainPeerServer(Configuration conf,
|
||||||
@ -1288,26 +1293,23 @@ boolean areCacheReportsDisabledForTests() {
|
|||||||
/**
|
/**
|
||||||
* This method starts the data node with the specified conf.
|
* This method starts the data node with the specified conf.
|
||||||
*
|
*
|
||||||
* @param conf - the configuration
|
* If conf's CONFIG_PROPERTY_SIMULATED property is set
|
||||||
* if conf's CONFIG_PROPERTY_SIMULATED property is set
|
* then a simulated storage based data node is created.
|
||||||
* then a simulated storage based data node is created.
|
|
||||||
*
|
*
|
||||||
* @param dataDirs - only for a non-simulated storage data node
|
* @param dataDirs - only for a non-simulated storage data node
|
||||||
* @throws IOException
|
* @throws IOException
|
||||||
*/
|
*/
|
||||||
void startDataNode(Configuration conf,
|
void startDataNode(List<StorageLocation> dataDirectories,
|
||||||
List<StorageLocation> dataDirs,
|
|
||||||
SecureResources resources
|
SecureResources resources
|
||||||
) throws IOException {
|
) throws IOException {
|
||||||
|
|
||||||
// settings global for all BPs in the Data Node
|
// settings global for all BPs in the Data Node
|
||||||
this.secureResources = resources;
|
this.secureResources = resources;
|
||||||
synchronized (this) {
|
synchronized (this) {
|
||||||
this.dataDirs = dataDirs;
|
this.dataDirs = dataDirectories;
|
||||||
}
|
}
|
||||||
this.conf = conf;
|
this.dnConf = new DNConf(this);
|
||||||
this.dnConf = new DNConf(conf);
|
checkSecureConfig(dnConf, getConf(), resources);
|
||||||
checkSecureConfig(dnConf, conf, resources);
|
|
||||||
|
|
||||||
if (dnConf.maxLockedMemory > 0) {
|
if (dnConf.maxLockedMemory > 0) {
|
||||||
if (!NativeIO.POSIX.getCacheManipulator().verifyCanMlock()) {
|
if (!NativeIO.POSIX.getCacheManipulator().verifyCanMlock()) {
|
||||||
@ -1347,10 +1349,10 @@ void startDataNode(Configuration conf,
|
|||||||
|
|
||||||
// global DN settings
|
// global DN settings
|
||||||
registerMXBean();
|
registerMXBean();
|
||||||
initDataXceiver(conf);
|
initDataXceiver();
|
||||||
startInfoServer(conf);
|
startInfoServer();
|
||||||
pauseMonitor = new JvmPauseMonitor();
|
pauseMonitor = new JvmPauseMonitor();
|
||||||
pauseMonitor.init(conf);
|
pauseMonitor.init(getConf());
|
||||||
pauseMonitor.start();
|
pauseMonitor.start();
|
||||||
|
|
||||||
// BlockPoolTokenSecretManager is required to create ipc server.
|
// BlockPoolTokenSecretManager is required to create ipc server.
|
||||||
@ -1360,24 +1362,24 @@ void startDataNode(Configuration conf,
|
|||||||
dnUserName = UserGroupInformation.getCurrentUser().getShortUserName();
|
dnUserName = UserGroupInformation.getCurrentUser().getShortUserName();
|
||||||
LOG.info("dnUserName = " + dnUserName);
|
LOG.info("dnUserName = " + dnUserName);
|
||||||
LOG.info("supergroup = " + supergroup);
|
LOG.info("supergroup = " + supergroup);
|
||||||
initIpcServer(conf);
|
initIpcServer();
|
||||||
|
|
||||||
metrics = DataNodeMetrics.create(conf, getDisplayName());
|
metrics = DataNodeMetrics.create(getConf(), getDisplayName());
|
||||||
metrics.getJvmMetrics().setPauseMonitor(pauseMonitor);
|
metrics.getJvmMetrics().setPauseMonitor(pauseMonitor);
|
||||||
|
|
||||||
ecWorker = new ErasureCodingWorker(conf, this);
|
ecWorker = new ErasureCodingWorker(getConf(), this);
|
||||||
blockRecoveryWorker = new BlockRecoveryWorker(this);
|
blockRecoveryWorker = new BlockRecoveryWorker(this);
|
||||||
|
|
||||||
blockPoolManager = new BlockPoolManager(this);
|
blockPoolManager = new BlockPoolManager(this);
|
||||||
blockPoolManager.refreshNamenodes(conf);
|
blockPoolManager.refreshNamenodes(getConf());
|
||||||
|
|
||||||
// Create the ReadaheadPool from the DataNode context so we can
|
// Create the ReadaheadPool from the DataNode context so we can
|
||||||
// exit without having to explicitly shutdown its thread pool.
|
// exit without having to explicitly shutdown its thread pool.
|
||||||
readaheadPool = ReadaheadPool.getInstance();
|
readaheadPool = ReadaheadPool.getInstance();
|
||||||
saslClient = new SaslDataTransferClient(dnConf.conf,
|
saslClient = new SaslDataTransferClient(dnConf.getConf(),
|
||||||
dnConf.saslPropsResolver, dnConf.trustedChannelResolver);
|
dnConf.saslPropsResolver, dnConf.trustedChannelResolver);
|
||||||
saslServer = new SaslDataTransferServer(dnConf, blockPoolTokenSecretManager);
|
saslServer = new SaslDataTransferServer(dnConf, blockPoolTokenSecretManager);
|
||||||
startMetricsLogger(conf);
|
startMetricsLogger();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -1592,10 +1594,10 @@ void initBlockPool(BPOfferService bpos) throws IOException {
|
|||||||
// failures.
|
// failures.
|
||||||
checkDiskError();
|
checkDiskError();
|
||||||
|
|
||||||
data.addBlockPool(nsInfo.getBlockPoolID(), conf);
|
data.addBlockPool(nsInfo.getBlockPoolID(), getConf());
|
||||||
blockScanner.enableBlockPoolId(bpos.getBlockPoolId());
|
blockScanner.enableBlockPoolId(bpos.getBlockPoolId());
|
||||||
initDirectoryScanner(conf);
|
initDirectoryScanner(getConf());
|
||||||
initDiskBalancer(data, conf);
|
initDiskBalancer(data, getConf());
|
||||||
}
|
}
|
||||||
|
|
||||||
List<BPOfferService> getAllBpOs() {
|
List<BPOfferService> getAllBpOs() {
|
||||||
@ -1616,10 +1618,10 @@ int getBpOsCount() {
|
|||||||
*/
|
*/
|
||||||
private void initStorage(final NamespaceInfo nsInfo) throws IOException {
|
private void initStorage(final NamespaceInfo nsInfo) throws IOException {
|
||||||
final FsDatasetSpi.Factory<? extends FsDatasetSpi<?>> factory
|
final FsDatasetSpi.Factory<? extends FsDatasetSpi<?>> factory
|
||||||
= FsDatasetSpi.Factory.getFactory(conf);
|
= FsDatasetSpi.Factory.getFactory(getConf());
|
||||||
|
|
||||||
if (!factory.isSimulated()) {
|
if (!factory.isSimulated()) {
|
||||||
final StartupOption startOpt = getStartupOption(conf);
|
final StartupOption startOpt = getStartupOption(getConf());
|
||||||
if (startOpt == null) {
|
if (startOpt == null) {
|
||||||
throw new IOException("Startup option not set.");
|
throw new IOException("Startup option not set.");
|
||||||
}
|
}
|
||||||
@ -1639,7 +1641,7 @@ private void initStorage(final NamespaceInfo nsInfo) throws IOException {
|
|||||||
|
|
||||||
synchronized(this) {
|
synchronized(this) {
|
||||||
if (data == null) {
|
if (data == null) {
|
||||||
data = factory.newInstance(this, storage, conf);
|
data = factory.newInstance(this, storage, getConf());
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1720,7 +1722,7 @@ public Socket newSocket() throws IOException {
|
|||||||
*/
|
*/
|
||||||
DatanodeProtocolClientSideTranslatorPB connectToNN(
|
DatanodeProtocolClientSideTranslatorPB connectToNN(
|
||||||
InetSocketAddress nnAddr) throws IOException {
|
InetSocketAddress nnAddr) throws IOException {
|
||||||
return new DatanodeProtocolClientSideTranslatorPB(nnAddr, conf);
|
return new DatanodeProtocolClientSideTranslatorPB(nnAddr, getConf());
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -1733,7 +1735,7 @@ DatanodeProtocolClientSideTranslatorPB connectToNN(
|
|||||||
DatanodeLifelineProtocolClientSideTranslatorPB connectToLifelineNN(
|
DatanodeLifelineProtocolClientSideTranslatorPB connectToLifelineNN(
|
||||||
InetSocketAddress lifelineNnAddr) throws IOException {
|
InetSocketAddress lifelineNnAddr) throws IOException {
|
||||||
return new DatanodeLifelineProtocolClientSideTranslatorPB(lifelineNnAddr,
|
return new DatanodeLifelineProtocolClientSideTranslatorPB(lifelineNnAddr,
|
||||||
conf);
|
getConf());
|
||||||
}
|
}
|
||||||
|
|
||||||
public static InterDatanodeProtocol createInterDataNodeProtocolProxy(
|
public static InterDatanodeProtocol createInterDataNodeProtocolProxy(
|
||||||
@ -2388,7 +2390,7 @@ public void run() {
|
|||||||
unbufIn = saslStreams.in;
|
unbufIn = saslStreams.in;
|
||||||
|
|
||||||
out = new DataOutputStream(new BufferedOutputStream(unbufOut,
|
out = new DataOutputStream(new BufferedOutputStream(unbufOut,
|
||||||
DFSUtilClient.getSmallBufferSize(conf)));
|
DFSUtilClient.getSmallBufferSize(getConf())));
|
||||||
in = new DataInputStream(unbufIn);
|
in = new DataInputStream(unbufIn);
|
||||||
blockSender = new BlockSender(b, 0, b.getNumBytes(),
|
blockSender = new BlockSender(b, 0, b.getNumBytes(),
|
||||||
false, false, true, DataNode.this, null, cachingStrategy);
|
false, false, true, DataNode.this, null, cachingStrategy);
|
||||||
@ -2508,7 +2510,7 @@ public void runDatanodeDaemon() throws IOException {
|
|||||||
}
|
}
|
||||||
ipcServer.setTracer(tracer);
|
ipcServer.setTracer(tracer);
|
||||||
ipcServer.start();
|
ipcServer.start();
|
||||||
startPlugins(conf);
|
startPlugins(getConf());
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@ -3051,8 +3053,8 @@ public void refreshNamenodes(Configuration conf) throws IOException {
|
|||||||
@Override // ClientDatanodeProtocol
|
@Override // ClientDatanodeProtocol
|
||||||
public void refreshNamenodes() throws IOException {
|
public void refreshNamenodes() throws IOException {
|
||||||
checkSuperuserPrivilege();
|
checkSuperuserPrivilege();
|
||||||
conf = new Configuration();
|
setConf(new Configuration());
|
||||||
refreshNamenodes(conf);
|
refreshNamenodes(getConf());
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override // ClientDatanodeProtocol
|
@Override // ClientDatanodeProtocol
|
||||||
@ -3327,8 +3329,8 @@ IOStreamPair connectToDN(DatanodeInfo datanodeID, int timeout,
|
|||||||
Token<BlockTokenIdentifier> blockToken)
|
Token<BlockTokenIdentifier> blockToken)
|
||||||
throws IOException {
|
throws IOException {
|
||||||
|
|
||||||
return DFSUtilClient.connectToDN(datanodeID, timeout, conf, saslClient,
|
return DFSUtilClient.connectToDN(datanodeID, timeout, getConf(),
|
||||||
NetUtils.getDefaultSocketFactory(getConf()), false,
|
saslClient, NetUtils.getDefaultSocketFactory(getConf()), false,
|
||||||
getDataEncryptionKeyFactoryForBlock(block), blockToken);
|
getDataEncryptionKeyFactoryForBlock(block), blockToken);
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -3341,7 +3343,7 @@ private void initOOBTimeout() {
|
|||||||
final int numOobTypes = oobEnd - oobStart + 1;
|
final int numOobTypes = oobEnd - oobStart + 1;
|
||||||
oobTimeouts = new long[numOobTypes];
|
oobTimeouts = new long[numOobTypes];
|
||||||
|
|
||||||
final String[] ele = conf.get(DFS_DATANODE_OOB_TIMEOUT_KEY,
|
final String[] ele = getConf().get(DFS_DATANODE_OOB_TIMEOUT_KEY,
|
||||||
DFS_DATANODE_OOB_TIMEOUT_DEFAULT).split(",");
|
DFS_DATANODE_OOB_TIMEOUT_DEFAULT).split(",");
|
||||||
for (int i = 0; i < numOobTypes; i++) {
|
for (int i = 0; i < numOobTypes; i++) {
|
||||||
oobTimeouts[i] = (i < ele.length) ? Long.parseLong(ele[i]) : 0;
|
oobTimeouts[i] = (i < ele.length) ? Long.parseLong(ele[i]) : 0;
|
||||||
@ -3367,10 +3369,9 @@ public long getOOBTimeout(Status status)
|
|||||||
* Start a timer to periodically write DataNode metrics to the log file. This
|
* Start a timer to periodically write DataNode metrics to the log file. This
|
||||||
* behavior can be disabled by configuration.
|
* behavior can be disabled by configuration.
|
||||||
*
|
*
|
||||||
* @param metricConf
|
|
||||||
*/
|
*/
|
||||||
protected void startMetricsLogger(Configuration metricConf) {
|
protected void startMetricsLogger() {
|
||||||
long metricsLoggerPeriodSec = metricConf.getInt(
|
long metricsLoggerPeriodSec = getConf().getInt(
|
||||||
DFS_DATANODE_METRICS_LOGGER_PERIOD_SECONDS_KEY,
|
DFS_DATANODE_METRICS_LOGGER_PERIOD_SECONDS_KEY,
|
||||||
DFS_DATANODE_METRICS_LOGGER_PERIOD_SECONDS_DEFAULT);
|
DFS_DATANODE_METRICS_LOGGER_PERIOD_SECONDS_DEFAULT);
|
||||||
|
|
||||||
|
@ -116,7 +116,7 @@ public void setupMocks() throws Exception {
|
|||||||
File dnDataDir = new File(new File(TEST_BUILD_DATA, "dfs"), "data");
|
File dnDataDir = new File(new File(TEST_BUILD_DATA, "dfs"), "data");
|
||||||
conf.set(DFS_DATANODE_DATA_DIR_KEY, dnDataDir.toURI().toString());
|
conf.set(DFS_DATANODE_DATA_DIR_KEY, dnDataDir.toURI().toString());
|
||||||
Mockito.doReturn(conf).when(mockDn).getConf();
|
Mockito.doReturn(conf).when(mockDn).getConf();
|
||||||
Mockito.doReturn(new DNConf(conf)).when(mockDn).getDnConf();
|
Mockito.doReturn(new DNConf(mockDn)).when(mockDn).getDnConf();
|
||||||
Mockito.doReturn(DataNodeMetrics.create(conf, "fake dn"))
|
Mockito.doReturn(DataNodeMetrics.create(conf, "fake dn"))
|
||||||
.when(mockDn).getMetrics();
|
.when(mockDn).getMetrics();
|
||||||
|
|
||||||
@ -338,7 +338,7 @@ public void testBPInitErrorHandling() throws Exception {
|
|||||||
new File(TEST_BUILD_DATA, "testBPInitErrorHandling"), "data");
|
new File(TEST_BUILD_DATA, "testBPInitErrorHandling"), "data");
|
||||||
conf.set(DFS_DATANODE_DATA_DIR_KEY, dnDataDir.toURI().toString());
|
conf.set(DFS_DATANODE_DATA_DIR_KEY, dnDataDir.toURI().toString());
|
||||||
Mockito.doReturn(conf).when(mockDn).getConf();
|
Mockito.doReturn(conf).when(mockDn).getConf();
|
||||||
Mockito.doReturn(new DNConf(conf)).when(mockDn).getDnConf();
|
Mockito.doReturn(new DNConf(mockDn)).when(mockDn).getDnConf();
|
||||||
Mockito.doReturn(DataNodeMetrics.create(conf, "fake dn")).
|
Mockito.doReturn(DataNodeMetrics.create(conf, "fake dn")).
|
||||||
when(mockDn).getMetrics();
|
when(mockDn).getMetrics();
|
||||||
final AtomicInteger count = new AtomicInteger();
|
final AtomicInteger count = new AtomicInteger();
|
||||||
|
@ -171,12 +171,13 @@ private static DataNode getMockDn(NonLocalLazyPersist nonLocalLazyPersist)
|
|||||||
conf.setBoolean(
|
conf.setBoolean(
|
||||||
DFS_DATANODE_NON_LOCAL_LAZY_PERSIST,
|
DFS_DATANODE_NON_LOCAL_LAZY_PERSIST,
|
||||||
nonLocalLazyPersist == NonLocalLazyPersist.ALLOWED);
|
nonLocalLazyPersist == NonLocalLazyPersist.ALLOWED);
|
||||||
DNConf dnConf = new DNConf(conf);
|
|
||||||
DatanodeRegistration mockDnReg = mock(DatanodeRegistration.class);
|
DatanodeRegistration mockDnReg = mock(DatanodeRegistration.class);
|
||||||
DataNodeMetrics mockMetrics = mock(DataNodeMetrics.class);
|
DataNodeMetrics mockMetrics = mock(DataNodeMetrics.class);
|
||||||
DataNode mockDn = mock(DataNode.class);
|
DataNode mockDn = mock(DataNode.class);
|
||||||
when(mockDn.getDnConf()).thenReturn(dnConf);
|
|
||||||
when(mockDn.getConf()).thenReturn(conf);
|
when(mockDn.getConf()).thenReturn(conf);
|
||||||
|
DNConf dnConf = new DNConf(mockDn);
|
||||||
|
when(mockDn.getDnConf()).thenReturn(dnConf);
|
||||||
when(mockDn.getMetrics()).thenReturn(mockMetrics);
|
when(mockDn.getMetrics()).thenReturn(mockMetrics);
|
||||||
when(mockDn.getDNRegistrationForBP("Dummy-pool")).thenReturn(mockDnReg);
|
when(mockDn.getDNRegistrationForBP("Dummy-pool")).thenReturn(mockDnReg);
|
||||||
return mockDn;
|
return mockDn;
|
||||||
|
@ -163,11 +163,11 @@ public void setUp() throws IOException {
|
|||||||
storage = mock(DataStorage.class);
|
storage = mock(DataStorage.class);
|
||||||
this.conf = new Configuration();
|
this.conf = new Configuration();
|
||||||
this.conf.setLong(DFS_DATANODE_SCAN_PERIOD_HOURS_KEY, 0);
|
this.conf.setLong(DFS_DATANODE_SCAN_PERIOD_HOURS_KEY, 0);
|
||||||
final DNConf dnConf = new DNConf(conf);
|
|
||||||
|
|
||||||
when(datanode.getConf()).thenReturn(conf);
|
when(datanode.getConf()).thenReturn(conf);
|
||||||
|
final DNConf dnConf = new DNConf(datanode);
|
||||||
when(datanode.getDnConf()).thenReturn(dnConf);
|
when(datanode.getDnConf()).thenReturn(dnConf);
|
||||||
final BlockScanner disabledBlockScanner = new BlockScanner(datanode, conf);
|
final BlockScanner disabledBlockScanner = new BlockScanner(datanode);
|
||||||
when(datanode.getBlockScanner()).thenReturn(disabledBlockScanner);
|
when(datanode.getBlockScanner()).thenReturn(disabledBlockScanner);
|
||||||
final ShortCircuitRegistry shortCircuitRegistry =
|
final ShortCircuitRegistry shortCircuitRegistry =
|
||||||
new ShortCircuitRegistry(conf);
|
new ShortCircuitRegistry(conf);
|
||||||
@ -326,7 +326,7 @@ public void testChangeVolumeWithRunningCheckDirs() throws IOException {
|
|||||||
RoundRobinVolumeChoosingPolicy<FsVolumeImpl> blockChooser =
|
RoundRobinVolumeChoosingPolicy<FsVolumeImpl> blockChooser =
|
||||||
new RoundRobinVolumeChoosingPolicy<>();
|
new RoundRobinVolumeChoosingPolicy<>();
|
||||||
conf.setLong(DFSConfigKeys.DFS_DATANODE_SCAN_PERIOD_HOURS_KEY, -1);
|
conf.setLong(DFSConfigKeys.DFS_DATANODE_SCAN_PERIOD_HOURS_KEY, -1);
|
||||||
final BlockScanner blockScanner = new BlockScanner(datanode, conf);
|
final BlockScanner blockScanner = new BlockScanner(datanode);
|
||||||
final FsVolumeList volumeList = new FsVolumeList(
|
final FsVolumeList volumeList = new FsVolumeList(
|
||||||
Collections.<VolumeFailureInfo>emptyList(), blockScanner, blockChooser);
|
Collections.<VolumeFailureInfo>emptyList(), blockScanner, blockChooser);
|
||||||
final List<FsVolumeImpl> oldVolumes = new ArrayList<>();
|
final List<FsVolumeImpl> oldVolumes = new ArrayList<>();
|
||||||
|
Loading…
Reference in New Issue
Block a user