This shoveler gathers UDP monitoring messages from XRootD servers and sends them to a reliable message bus.
graph LR
subgraph Site
subgraph Node 1
node1[XRootD] -- UDP --> shoveler1{Shoveler};
end
subgraph Node 2
node2[XRootD] -- UDP --> shoveler1{Shoveler};
end
end;
subgraph OSG Operations
shoveler1 -- TCP/TLS --> C[Message Bus];
C -- Raw --> D[XRootD Collector];
D -- Summary --> C;
C --> E[(Storage)];
style shoveler1 font-weight:bolder,stroke-width:4px,stroke:#E74C3C,font-size:4em,color:#E74C3C
end;
The shoveler can run on a dedicated server or on a shared server. The shoveler does not require many resources. For example, a shoveler serving 12 production XRootD servers can be expected to consume 10-50 MB of ram, and require a small fraction of a CPU.
Binaries and packages are provided in the latest Github releases.
The shoveler will read from:
An example configuration file, config.yaml is in the repo. Each variable in the configuration
file has a corresponding environment variable, listed below. The environment variables are useful for deployment in
docker or kubernetes. By default, the config is stored in /etc/xrootd-monitoring-shoveler
.
When running as a daemon, environment variables can still be used for configuration. The service will be looking for
them under /etc/sysconfig/xrootd-monitoring-shoveler
.
Environment variables:
When running using AMQP as the protocol to connect the shoveler uses a JWT to authorize with the message bus. The token will be issued by an automated process, but for now, long lived tokens are issued to sites.
On the other hand, if STOMP is the selected protocol user and password will need to be provided when configuring the shoveler.
If the verify
option or SHOVELER_VERIFY
env. var. is set to true
(the default), the shoveler will perform
simple verification that the incoming UDP packets conform to XRootD monitoring packets.
When the shoveler runs on the same node as the XRootD server, or in the same private network, the IP of the incoming XRootD
packets may report the private IP address rather than the public IP address. The public ip address is used for reverse
DNS lookup when summarizing the records. You may map incoming IP addresses to other addresses with the map
configuration value.
To map all incoming messages to a single IP:
map:
all: <ip address>
or the environment variable SHOVELER_MAP_ALL=
To map multiple ip addresses, the config file would be:
map:
<ip address>: <ip address>
<ip address>: <ip address>
The shoveler is a statically linked binary, distributed as an RPM and uploaded to docker hub and OSG's container hub. You will need to configure the config.yaml before starting.
Install the RPM from the latest release.
Start the systemd service with:
systemctl start xrootd-monitoring-shoveler.service
From Docker, you can start the container from the OSG hub with the following command.
docker run -v config.yaml:/etc/xrootd-monitoring-shoveler/config.yaml hub.opensciencegrid.org/opensciencegrid/xrootd-monitoring-shoveler
The shoveler receives UDP packets and stores them onto a queue before being sent to the message bus. 100 messages
are stored in memory. When the in memory messages reaches over 100, the messages are written to disk under the
SHOVELER_QUEUE_DIRECTORY
(env) or queue_directory
(yaml) configured directories. A good default is
/var/spool/xrootd-monitoring-shoveler/queue
. Note that /var/run
or /tmp
should not be used, as these directories
are not persistent and may be cleaned regularly by tooling such as systemd-tmpfiles
.
The on-disk queue is persistent across shoveler restarts.
The queue length can be monitored through the prometheus monitoring metric name: shoveler_queue_size
.
Distributed under the Apache 2.0 License. See LICENSE.txt for more information.
This project is supported by the National Science Foundation under Cooperative Agreements OAC-2030508 and OAC-1836650.