1use crate::{
2 chain::ChainSpecInfo,
3 hooks::{Hook, Hooks},
4 recorder::install_prometheus_recorder,
5 version::VersionInfo,
6};
7use bytes::Bytes;
8use eyre::WrapErr;
9use http::{header::CONTENT_TYPE, HeaderValue, Request, Response, StatusCode};
10use http_body_util::Full;
11use metrics::describe_gauge;
12use metrics_process::Collector;
13use reqwest::Client;
14use reth_metrics::metrics::Unit;
15use reth_tasks::TaskExecutor;
16use std::{convert::Infallible, net::SocketAddr, path::PathBuf, sync::Arc, time::Duration};
17
18#[derive(Debug)]
20pub struct MetricServerConfig {
21 listen_addr: SocketAddr,
22 version_info: VersionInfo,
23 chain_spec_info: ChainSpecInfo,
24 task_executor: TaskExecutor,
25 hooks: Hooks,
26 push_gateway_url: Option<String>,
27 push_gateway_interval: Duration,
28 pprof_dump_dir: PathBuf,
29}
30
31impl MetricServerConfig {
32 pub const fn new(
34 listen_addr: SocketAddr,
35 version_info: VersionInfo,
36 chain_spec_info: ChainSpecInfo,
37 task_executor: TaskExecutor,
38 hooks: Hooks,
39 pprof_dump_dir: PathBuf,
40 ) -> Self {
41 Self {
42 listen_addr,
43 hooks,
44 task_executor,
45 version_info,
46 chain_spec_info,
47 push_gateway_url: None,
48 push_gateway_interval: Duration::from_secs(5),
49 pprof_dump_dir,
50 }
51 }
52
53 pub fn with_push_gateway(mut self, url: Option<String>, interval: Duration) -> Self {
55 self.push_gateway_url = url;
56 self.push_gateway_interval = interval;
57 self
58 }
59}
60
61#[derive(Debug)]
63pub struct MetricServer {
64 config: MetricServerConfig,
65}
66
67impl MetricServer {
68 pub const fn new(config: MetricServerConfig) -> Self {
70 Self { config }
71 }
72
73 pub async fn serve(&self) -> eyre::Result<()> {
75 let MetricServerConfig {
76 listen_addr,
77 hooks,
78 task_executor,
79 version_info,
80 chain_spec_info,
81 push_gateway_url,
82 push_gateway_interval,
83 pprof_dump_dir,
84 } = &self.config;
85
86 let hooks_for_endpoint = hooks.clone();
87 self.start_endpoint(
88 *listen_addr,
89 Arc::new(move || hooks_for_endpoint.iter().for_each(|hook| hook())),
90 task_executor.clone(),
91 pprof_dump_dir.clone(),
92 )
93 .await
94 .wrap_err_with(|| format!("Could not start Prometheus endpoint at {listen_addr}"))?;
95
96 if let Some(url) = push_gateway_url {
98 self.start_push_gateway_task(
99 url.clone(),
100 *push_gateway_interval,
101 hooks.clone(),
102 task_executor.clone(),
103 )?;
104 }
105
106 describe_db_metrics();
108 describe_static_file_metrics();
109 describe_rocksdb_metrics();
110 Collector::default().describe();
111 describe_memory_stats();
112 describe_io_stats();
113
114 version_info.register_version_metrics();
115 chain_spec_info.register_chain_spec_metrics();
116
117 Ok(())
118 }
119
120 async fn start_endpoint<F: Hook + 'static>(
121 &self,
122 listen_addr: SocketAddr,
123 hook: Arc<F>,
124 task_executor: TaskExecutor,
125 pprof_dump_dir: PathBuf,
126 ) -> eyre::Result<()> {
127 let listener = tokio::net::TcpListener::bind(listen_addr)
128 .await
129 .wrap_err("Could not bind to address")?;
130
131 tracing::info!(target: "reth::cli", "Starting metrics endpoint at {}", listener.local_addr().unwrap());
132
133 task_executor.spawn_with_graceful_shutdown_signal(|mut signal| {
134 Box::pin(async move {
135 loop {
136 let io = tokio::select! {
137 _ = &mut signal => break,
138 io = listener.accept() => {
139 match io {
140 Ok((stream, _remote_addr)) => stream,
141 Err(err) => {
142 tracing::error!(%err, "failed to accept connection");
143 continue;
144 }
145 }
146 }
147 };
148
149 let handle = install_prometheus_recorder();
150 let hook = hook.clone();
151 let pprof_dump_dir = pprof_dump_dir.clone();
152 let service = tower::service_fn(move |req: Request<_>| {
153 let response =
154 handle_request(req.uri().path(), &*hook, handle, &pprof_dump_dir);
155 async move { Ok::<_, Infallible>(response) }
156 });
157
158 let mut shutdown = signal.clone().ignore_guard();
159 tokio::task::spawn(async move {
160 let _ = jsonrpsee_server::serve_with_graceful_shutdown(
161 io,
162 service,
163 &mut shutdown,
164 )
165 .await
166 .inspect_err(|error| tracing::debug!(%error, "failed to serve request"));
167 });
168 }
169 })
170 });
171
172 Ok(())
173 }
174
175 fn start_push_gateway_task(
177 &self,
178 url: String,
179 interval: Duration,
180 hooks: Hooks,
181 task_executor: TaskExecutor,
182 ) -> eyre::Result<()> {
183 let client = Client::builder()
184 .build()
185 .wrap_err("Could not create HTTP client to push metrics to gateway")?;
186 task_executor.spawn_with_graceful_shutdown_signal(move |mut signal| {
187 Box::pin(async move {
188 tracing::info!(url = %url, interval = ?interval, "Starting task to push metrics to gateway");
189 let handle = install_prometheus_recorder();
190 loop {
191 tokio::select! {
192 _ = &mut signal => {
193 tracing::info!("Shutting down task to push metrics to gateway");
194 break;
195 }
196 _ = tokio::time::sleep(interval) => {
197 hooks.iter().for_each(|hook| hook());
198 let metrics = handle.handle().render();
199 match client.put(&url).header("Content-Type", "text/plain").body(metrics).send().await {
200 Ok(response) => {
201 if !response.status().is_success() {
202 tracing::warn!(
203 status = %response.status(),
204 "Failed to push metrics to gateway"
205 );
206 }
207 }
208 Err(err) => {
209 tracing::warn!(%err, "Failed to push metrics to gateway");
210 }
211 }
212 }
213 }
214 }
215 })
216 });
217 Ok(())
218 }
219}
220
221fn describe_db_metrics() {
222 describe_gauge!("db.table_size", Unit::Bytes, "The size of a database table (in bytes)");
223 describe_gauge!("db.table_pages", "The number of database pages for a table");
224 describe_gauge!("db.table_entries", "The number of entries for a table");
225 describe_gauge!("db.freelist", "The number of pages on the freelist");
226 describe_gauge!("db.page_size", Unit::Bytes, "The size of a database page (in bytes)");
227 describe_gauge!(
228 "db.timed_out_not_aborted_transactions",
229 "Number of timed out transactions that were not aborted by the user yet"
230 );
231}
232
233fn describe_static_file_metrics() {
234 describe_gauge!("static_files.segment_size", Unit::Bytes, "The size of a static file segment");
235 describe_gauge!("static_files.segment_files", "The number of files for a static file segment");
236 describe_gauge!(
237 "static_files.segment_entries",
238 "The number of entries for a static file segment"
239 );
240}
241
242fn describe_rocksdb_metrics() {
243 describe_gauge!(
244 "rocksdb.table_size",
245 Unit::Bytes,
246 "The estimated size of a RocksDB table (SST + memtable)"
247 );
248 describe_gauge!("rocksdb.table_entries", "The estimated number of keys in a RocksDB table");
249 describe_gauge!(
250 "rocksdb.pending_compaction_bytes",
251 Unit::Bytes,
252 "Bytes pending compaction for a RocksDB table"
253 );
254 describe_gauge!("rocksdb.sst_size", Unit::Bytes, "The size of SST files for a RocksDB table");
255 describe_gauge!(
256 "rocksdb.memtable_size",
257 Unit::Bytes,
258 "The size of memtables for a RocksDB table"
259 );
260}
261
262#[cfg(all(feature = "jemalloc", unix))]
263fn describe_memory_stats() {
264 describe_gauge!(
265 "jemalloc.active",
266 Unit::Bytes,
267 "Total number of bytes in active pages allocated by the application"
268 );
269 describe_gauge!(
270 "jemalloc.allocated",
271 Unit::Bytes,
272 "Total number of bytes allocated by the application"
273 );
274 describe_gauge!(
275 "jemalloc.mapped",
276 Unit::Bytes,
277 "Total number of bytes in active extents mapped by the allocator"
278 );
279 describe_gauge!(
280 "jemalloc.metadata",
281 Unit::Bytes,
282 "Total number of bytes dedicated to jemalloc metadata"
283 );
284 describe_gauge!(
285 "jemalloc.resident",
286 Unit::Bytes,
287 "Total number of bytes in physically resident data pages mapped by the allocator"
288 );
289 describe_gauge!(
290 "jemalloc.retained",
291 Unit::Bytes,
292 "Total number of bytes in virtual memory mappings that were retained rather than \
293 being returned to the operating system via e.g. munmap(2)"
294 );
295}
296
297#[cfg(not(all(feature = "jemalloc", unix)))]
298const fn describe_memory_stats() {}
299
300#[cfg(target_os = "linux")]
301fn describe_io_stats() {
302 use metrics::describe_counter;
303
304 describe_counter!("io.rchar", "Characters read");
305 describe_counter!("io.wchar", "Characters written");
306 describe_counter!("io.syscr", "Read syscalls");
307 describe_counter!("io.syscw", "Write syscalls");
308 describe_counter!("io.read_bytes", Unit::Bytes, "Bytes read");
309 describe_counter!("io.write_bytes", Unit::Bytes, "Bytes written");
310 describe_counter!("io.cancelled_write_bytes", Unit::Bytes, "Cancelled write bytes");
311}
312
313#[cfg(not(target_os = "linux"))]
314const fn describe_io_stats() {}
315
316fn handle_request(
317 path: &str,
318 hook: impl Fn(),
319 handle: &crate::recorder::PrometheusRecorder,
320 pprof_dump_dir: &PathBuf,
321) -> Response<Full<Bytes>> {
322 match path {
323 "/debug/pprof/heap" => handle_pprof_heap(pprof_dump_dir),
324 _ => {
325 hook();
326 let metrics = handle.handle().render();
327 let mut response = Response::new(Full::new(Bytes::from(metrics)));
328 response.headers_mut().insert(CONTENT_TYPE, HeaderValue::from_static("text/plain"));
329 response
330 }
331 }
332}
333
334#[cfg(all(feature = "jemalloc-prof", unix))]
335fn handle_pprof_heap(pprof_dump_dir: &PathBuf) -> Response<Full<Bytes>> {
336 use http::header::CONTENT_ENCODING;
337
338 match jemalloc_pprof::PROF_CTL.as_ref() {
339 Some(prof_ctl) => match prof_ctl.try_lock() {
340 Ok(_) => match jemalloc_pprof_dump(pprof_dump_dir) {
341 Ok(pprof) => {
342 let mut response = Response::new(Full::new(Bytes::from(pprof)));
343 response
344 .headers_mut()
345 .insert(CONTENT_TYPE, HeaderValue::from_static("application/octet-stream"));
346 response
347 .headers_mut()
348 .insert(CONTENT_ENCODING, HeaderValue::from_static("gzip"));
349 response
350 }
351 Err(err) => {
352 let mut response = Response::new(Full::new(Bytes::from(format!(
353 "Failed to dump pprof: {err}"
354 ))));
355 *response.status_mut() = StatusCode::INTERNAL_SERVER_ERROR;
356 response
357 }
358 },
359 Err(_) => {
360 let mut response = Response::new(Full::new(Bytes::from_static(
361 b"Profile dump already in progress. Try again later.",
362 )));
363 *response.status_mut() = StatusCode::SERVICE_UNAVAILABLE;
364 response
365 }
366 },
367 None => {
368 let mut response = Response::new(Full::new(Bytes::from_static(
369 b"jemalloc profiling not enabled. \
370 Set MALLOC_CONF=prof:true or rebuild with jemalloc-prof feature.",
371 )));
372 *response.status_mut() = StatusCode::INTERNAL_SERVER_ERROR;
373 response
374 }
375 }
376}
377
378#[cfg(all(feature = "jemalloc-prof", unix))]
381fn jemalloc_pprof_dump(pprof_dump_dir: &PathBuf) -> eyre::Result<Vec<u8>> {
382 use std::{ffi::CString, io::BufReader};
383
384 use mappings::MAPPINGS;
385 use pprof_util::parse_jeheap;
386 use tempfile::NamedTempFile;
387
388 reth_fs_util::create_dir_all(pprof_dump_dir)?;
389 let f = NamedTempFile::new_in(pprof_dump_dir)?;
390 let path = CString::new(f.path().as_os_str().as_encoded_bytes()).unwrap();
391
392 unsafe { tikv_jemalloc_ctl::raw::write(b"prof.dump\0", path.as_ptr()) }?;
395
396 let dump_reader = BufReader::new(f);
397 let profile =
398 parse_jeheap(dump_reader, MAPPINGS.as_deref()).map_err(|err| eyre::eyre!(Box::new(err)))?;
399 let pprof = profile.to_pprof(("inuse_space", "bytes"), ("space", "bytes"), None);
400
401 Ok(pprof)
402}
403
404#[cfg(not(all(feature = "jemalloc-prof", unix)))]
405fn handle_pprof_heap(_pprof_dump_dir: &PathBuf) -> Response<Full<Bytes>> {
406 let mut response = Response::new(Full::new(Bytes::from_static(
407 b"jemalloc pprof support not compiled. Rebuild with the jemalloc-prof feature.",
408 )));
409 *response.status_mut() = StatusCode::NOT_IMPLEMENTED;
410 response
411}
412
413#[cfg(test)]
414mod tests {
415 use super::*;
416 use reqwest::Client;
417 use reth_tasks::TaskManager;
418 use socket2::{Domain, Socket, Type};
419 use std::net::{SocketAddr, TcpListener};
420
421 fn get_random_available_addr() -> SocketAddr {
422 let addr = &"127.0.0.1:0".parse::<SocketAddr>().unwrap().into();
423 let socket = Socket::new(Domain::IPV4, Type::STREAM, None).unwrap();
424 socket.set_reuse_address(true).unwrap();
425 socket.bind(addr).unwrap();
426 socket.listen(1).unwrap();
427 let listener = TcpListener::from(socket);
428 listener.local_addr().unwrap()
429 }
430
431 #[tokio::test]
432 async fn test_metrics_endpoint() {
433 let chain_spec_info = ChainSpecInfo { name: "test".to_string() };
434 let version_info = VersionInfo {
435 version: "test",
436 build_timestamp: "test",
437 cargo_features: "test",
438 git_sha: "test",
439 target_triple: "test",
440 build_profile: "test",
441 };
442
443 let tasks = TaskManager::current();
444 let executor = tasks.executor();
445
446 let hooks = Hooks::builder().build();
447
448 let listen_addr = get_random_available_addr();
449 let config = MetricServerConfig::new(
450 listen_addr,
451 version_info,
452 chain_spec_info,
453 executor,
454 hooks,
455 std::env::temp_dir(),
456 );
457
458 MetricServer::new(config).serve().await.unwrap();
459
460 let url = format!("http://{listen_addr}");
462 let response = Client::new().get(&url).send().await.unwrap();
463 assert!(response.status().is_success());
464
465 let body = response.text().await.unwrap();
467 assert!(body.contains("reth_process_cpu_seconds_total"));
468 assert!(body.contains("reth_process_start_time_seconds"));
469 }
470}