PageRenderTime 62ms CodeModel.GetById 27ms RepoModel.GetById 0ms app.codeStats 0ms

/articles/service-fabric/service-fabric-diagnostic-how-to-use-elasticsearch.md

https://gitlab.com/yeah568/azure-content
Markdown | 258 lines | 180 code | 78 blank | 0 comment | 0 complexity | 35b3d602a9c9151d23bd594e86eddb22 MD5 | raw file
  1. <properties
  2. pageTitle="Using Elasticsearch as a Service Fabric application trace store | Microsoft Azure"
  3. description="Describes how Service Fabric applications can use Elasticsearch and Kibana to store, index, and search through application traces (logs)"
  4. services="service-fabric"
  5. documentationCenter=".net"
  6. authors="karolz-ms"
  7. manager="adegeo"
  8. editor=""/>
  9. <tags
  10. ms.service="service-fabric"
  11. ms.devlang="dotNet"
  12. ms.topic="article"
  13. ms.tgt_pltfrm="NA"
  14. ms.workload="NA"
  15. ms.date="05/16/2016"
  16. ms.author="karolz@microsoft.com"/>
  17. # Use Elasticsearch as a Service Fabric application trace store
  18. ## Introduction
  19. This article describes how [Azure Service Fabric](https://azure.microsoft.com/documentation/services/service-fabric/) applications can use **Elasticsearch** and **Kibana** for application trace storage, indexing, and search. [Elasticsearch](https://www.elastic.co/guide/index.html) is an open-source, distributed, and scalable real-time search and analytics engine that is well-suited for this task. It can be installed on Windows and Linux virtual machines running in Microsoft Azure. Elasticsearch can very efficiently process *structured* traces produced using technologies such as **Event Tracing for Windows (ETW)**.
  20. ETW is used by Service Fabric runtime to source diagnostic information (traces). It is the recommended method for Service Fabric applications to source their diagnostic information, too. This allows for correlation between runtime-supplied and application-supplied traces, and it makes troubleshooting easier. Service Fabric project templates in Visual Studio include a logging API (based on the .NET **EventSource** class) that emits ETW traces by default. For a general overview of Service Fabric application tracing using ETW, see [Monitoring and diagnosing services in a local machine development setup](service-fabric-diagnostics-how-to-monitor-and-diagnose-services-locally.md).
  21. For the traces to show up in Elasticsearch, they need to be captured at the Service Fabric cluster nodes in real time (while the application is running) and sent to an Elasticsearch endpoint. There are two major options for trace capturing:
  22. + **In-process trace capturing**
  23. The application, or more precisely, service process, is responsible for sending out the diagnostic data to the trace store (Elasticsearch).
  24. + **Out-of-process trace capturing**
  25. A separate agent is capturing traces from the service process or processes and sending them to the trace store.
  26. Below, we describe how to set up Elasticsearch on Azure, discuss the pros and cons for both capture options, and explain how to configure a Service Fabric service to send data to Elasticsearch.
  27. ## Set up Elasticsearch on Azure
  28. The most straightforward way to set up the Elasticsearch service on Azure is through [**Azure Resource Manager templates**](../resource-group-overview.md). A comprehensive [Quickstart Azure Resource Manager template for Elasticsearch](https://github.com/Azure/azure-quickstart-templates/tree/master/elasticsearch) is available from Azure Quickstart templates repository. This template uses separate storage accounts for scale units (groups of nodes). It can also provision separate client and server nodes with different configurations and various numbers of data disks attached.
  29. Here, we will use another template, called **ES-MultiNode** from the [Azure diagnostic tools repository](https://github.com/Azure/azure-diagnostics-tools). This template is somewhat easier to use, and it creates an Elasticsearch cluster protected by HTTP basic authentication. Before you proceed, please download the repository from GitHub to your machine (by either cloning the repository or downloading a zip file). The ES-MultiNode template is located in the folder with the same name.
  30. ### Prepare a machine to run Elasticsearch installation scripts
  31. The easiest way to use the ES-MultiNode template is through a provided Azure PowerShell script called `CreateElasticSearchCluster`. To use this script, you need to install PowerShell modules and a tool called **openssl**. The latter is needed for creating an SSH key that can be used to administer your Elasticsearch cluster remotely.
  32. Note that the `CreateElasticSearchCluster` script is designed for ease of use with the ES-MultiNode template from a Windows machine. It is possible to use the template on a non-Windows machine, but that scenario is beyond the scope of this article.
  33. 1. If you haven't installed them already, install [**Azure PowerShell modules**](http://aka.ms/webpi-azps). When prompted, click **Run**, then **Install**. Azure PowerShell 1.3 or newer is required.
  34. 2. The **openssl** tool is included in the distribution of [**Git for Windows**](http://www.git-scm.com/downloads). If you have not done so already, please install [Git for Windows](http://www.git-scm.com/downloads) now. (The default installation options are OK.)
  35. 3. Assuming that Git has been installed but not included in the system path, open a Microsoft Azure PowerShell window and run the following commands:
  36. ```powershell
  37. $ENV:PATH += ";<Git installation folder>\usr\bin"
  38. $ENV:OPENSSL_CONF = "<Git installation folder>\usr\ssl\openssl.cnf"
  39. ```
  40. Replace the `<Git installation folder>` with the Git location on your machine; the default is **"C:\Program Files\Git"**. Note the semicolon character at the beginning of the first path.
  41. 4. Ensure that you are logged on to Azure (via [`Add-AzureRmAccount`](https://msdn.microsoft.com/library/mt619267.aspx) cmdlet) and that you have selected the subscription that should be used to create your Elastic Search cluster. You can verify that correct subscription is selected using `Get-AzureRmContext` and `Get-AzureRmSubscription` cmdlets.
  42. 5. If you haven't done so already, change the current directory to the ES-MultiNode folder.
  43. ### Run the CreateElasticSearchCluster script
  44. Before you run the script, open the `azuredeploy-parameters.json` file and verify or provide values for the script parameters. The following parameters are provided:
  45. |Parameter Name |Description|
  46. |----------------------- |--------------------------|
  47. |dnsNameForLoadBalancerIP |This is the name that will be used to create the publicly visible DNS name for the Elastic Search cluster (by appending the Azure region domain to the provided name). For example, if this parameter value is "myBigCluster" and the chosen Azure region is West US, the resulting DNS name for the cluster will be myBigCluster.westus.cloudapp.azure.com. <br /><br />This name will also serve as a root for names for many artifacts associated with the Elastic Search cluster, such as data node names.|
  48. |adminUsername |The name of the administrator account for managing the Elastic Search cluster (corresponding SSH keys will be generated automatically)|
  49. |dataNodeCount |The number of nodes in the Elastic Search cluster. The current version of the script does not distinguish between data and query nodes; all nodes will play both roles. Defaults to 3 nodes.|
  50. |dataDiskSize |The size of data disks (in GB) that will be allocated for each data node. Each node will receive 4 data disks, exclusively dedicated to Elastic Search service.|
  51. |region |The name of Azure region where the Elastic Search cluster should be located.|
  52. |esUserName |The user name of the user that will be configured to have access to ES cluster (subject to HTTP basic authentication). The password is not part of parameters file and must be provided when `CreateElasticSearchCluster` script is invoked.|
  53. |vmSizeDataNodes |The Azure virtual machine size for Elastic Search cluster nodes. Defaults to Standard_D2.|
  54. Now you are ready to run the script. Issue the following command:
  55. ```powershell
  56. CreateElasticSearchCluster -ResourceGroupName <es-group-name> -Region <azure-region> -EsPassword <es-password>
  57. ```
  58. where
  59. |Script Parameter Name |Description|
  60. |----------------------- |--------------------------|
  61. |`<es-group-name>` |the name of the Azure resource group that will contain all Elastic Search cluster resources|
  62. |`<azure-region>` |the name of the Azure region where the Elastic Search cluster should be created|
  63. |`<es-password>` |the password for the Elastic Search user|
  64. >[AZURE.NOTE] If you get a NullReferenceException from the Test-AzureResourceGroup cmdlet, you have forgotten to log on to Azure (`Add-AzureRmAccount`).
  65. If you get an error from running the script and you determine that the error was caused by a wrong template parameter value, correct the parameter file and run the script again with a different resource group name. You can also reuse the same resource group name and have the script clean up the old one by adding the `-RemoveExistingResourceGroup` parameter to the script invocation.
  66. ### Result of running the CreateElasticSearchCluster script
  67. After you run the `CreateElasticSearchCluster` script, the following main artifacts will be created. For the sake of clarity, we will assume that you have used "myBigCluster" for the value of the `dnsNameForLoadBalancerIP` parameter and that the region where you created the cluster is West US.
  68. |Artifact|Name, location, and remarks|
  69. |----------------------------------|----------------------------------|
  70. |SSH key for remote administration |myBigCluster.key file (in the directory from which the CreateElasticSearchCluster was run). <br /><br />This is the key that can be used to connect to the admin node and (through the admin node) to data nodes in the cluster.|
  71. |Admin node |myBigCluster-admin.westus.cloudapp.azure.com <br /><br />This is a dedicated VM for remote Elasticsearch cluster administration--the only one that allows external SSH connections. It runs on the same virtual network as all the Elasticsearch cluster nodes, but it does not run Elasticsearch services.|
  72. |Data nodes |myBigCluster1 myBigCluster*N* <br /><br />Data nodes that are running Elasticsearch and Kibana services. You can connect via SSH to each node, but only via the admin node.|
  73. |Elasticsearch cluster |http://myBigCluster.westus.cloudapp.azure.com/es/ <br /><br />The above is the primary endpoint for the Elasticsearch cluster (note the /es suffix). It is protected by basic HTTP authentication (the credentials were the specified esUserName/esPassword parameters of the ES-MultiNode template). The cluster has also the head plug-in installed (http://myBigCluster.westus.cloudapp.azure.com/es/_plugin/head) for basic cluster administration.|
  74. |Kibana service |http://myBigCluster.westus.cloudapp.azure.com <br /><br />The Kibana service is set up to show data from the created Elasticsearch cluster. It is protected by the same authentication credentials as the cluster itself.|
  75. ## In-process versus out-of-process trace capturing
  76. In the introduction, we mentioned two fundamental ways of collecting diagnostic data: in-process and out-of-process. Each has strengths and weaknesses.
  77. Advantages of the **in-process trace capturing** include:
  78. 1. *Easy configuration and deployment*
  79. * The configuration of diagnostic data collection is just part of the application configuration. It is easy to always keep it "in sync" with the rest of the application.
  80. * Per-application or per-service configuration is easily achievable.
  81. * Out-of-process trace capturing usually requires a separate deployment and configuration of the diagnostic agent, which is an extra administrative task and a potential source of errors. The particular agent technology often allows only one instance of the agent per virtual machine (node). This means that configuration for the collection of the diagnostic configuration is shared among all applications and services running on that node.
  82. 2. *Flexibility*
  83. * The application can send the data wherever it needs to go, as long as there is a client library that supports the targeted data storage system. New sinks can be added as desired.
  84. * Complex capture, filtering, and data-aggregation rules can be implemented.
  85. * An out-of-process trace capturing is often limited by the data sinks that the agent supports. Some agents are extensible.
  86. 3. *Access to internal application data and context*
  87. * The diagnostic subsystem running inside the application/service process can easily augment the traces with contextual information.
  88. * In the out-of-process approach, the data must be sent to an agent via some inter-process communication mechanism, such as Event Tracing for Windows. This could impose additional limitations.
  89. Advantages of the **out-of-process trace capturing** include:
  90. 1. *The ability to monitor the application and collect crash dumps*
  91. * In-process trace capturing may be unsuccessful if the application fails to start or crashes. An independent agent has a much better chance of capturing crucial troubleshooting information.<br /><br />
  92. 2. *Maturity, robustness, and proven performance*
  93. * An agent developed by a platform vendor (such as a Microsoft Azure Diagnostics agent) has been subject to rigorous testing and battle-hardening.
  94. * With in-process trace capturing, care must be taken to ensure that the activity of sending diagnostic data from an application process does not interfere with the application's main tasks or introduce timing or performance problems. An independently running agent is less prone to these issues and is usually specifically designed to limit its impact on the system.
  95. Of course, it is possible to combine and benefit from both approaches. Indeed, it might be the best solution for many applications.
  96. Here, we will use the **Microsoft.Diagnostic.Listeners library** and the in-process trace capturing to send data from a Service Fabric application to an Elasticsearch cluster.
  97. ## Use the Listeners library to send diagnostic data to Elasticsearch
  98. The Microsoft.Diagnostic.Listeners library is part of PartyCluster sample Service Fabric application. To use it:
  99. 1. Download [the PartyCluster sample](https://github.com/Azure-Samples/service-fabric-dotnet-management-party-cluster) from GitHub.
  100. 2. Copy the Microsoft.Diagnostics.Listeners and Microsoft.Diagnostics.Listeners.Fabric projects (whole folders) from the PartyCluster sample directory to the solution folder of the application that is supposed to send the data to Elasticsearch.
  101. 3. Open the target solution, right-click the solution node in the Solution Explorer and choose **Add Existing Project**. Add the Microsoft.Diagnostics.Listeners project to the solution. Repeat the same for the Microsoft.Diagnostics.Listeners.Fabric project.
  102. 4. Add a project reference from your service project(s) to the two added projects. (Each service that is supposed to send data to Elasticsearch should reference Microsoft.Diagnostics.EventListeners and Microsoft.Diagnostics.EventListeners.Fabric).
  103. ![Project references to Microsoft.Diagnostics.EventListeners and Microsoft.Diagnostics.EventListeners.Fabric libraries][1]
  104. ### Service Fabric General Availability release and Microsoft.Diagnostics.Tracing NuGet package
  105. Applications built with Service Fabric General Availability release (2.0.135, released March 31st, 2016) target **.NET Framework 4.5.2**. This is the highest version of the .NET Framework supported by Azure at the time of the GA release. Unfortunately, this version of the framework lacks certain EventListener APIs that the Microsoft.Diagnostics.Listeners library needs. Because EventSource (the component that forms the basis of logging APIs in Fabric applications) and EventListener are tightly coupled, every project that uses the Microsoft.Diagnostics.Listeners library must use an alternative implementation of EventSource. This is provided by the **Microsoft.Diagnostics.Tracing NuGet package** authored by Microsoft. The package is fully backward-compatible with EventSource included in the framework, so no code changes should be necessary other than referenced namespace changes.
  106. To start using the Microsoft.Diagnostics.Tracing implementation of the EventSource class, follow these steps for each service project that needs to send data to Elasticsearch:
  107. 1. Right-click on the service project and choose **Manage NuGet Packages**.
  108. 2. Switch to the nuget.org package source (if it is not already selected) and search for "**Microsoft.Diagnostics.Tracing**".
  109. 3. Install the `Microsoft.Diagnostics.Tracing.EventSource` package (and its dependencies).
  110. 4. Open the **ServiceEventSource.cs** or **ActorEventSource.cs** file in your service project and replace the `using System.Diagnostics.Tracing` directive on top of the file with the `using Microsoft.Diagnostics.Tracing` directive.
  111. These steps will not be necessary once the **.NET Framework 4.6** is supported by Microsoft Azure.
  112. ### Elasticsearch listener instantiation and configuration
  113. The final step for sending diagnostic data to Elasticsearch is to create an instance of `ElasticSearchListener` and configure it with Elasticsearch connection data. The listener will automatically capture all events raised via EventSource classes defined in the service project. It needs to be alive during the lifetime of the service, so the best place to create it is in the service initialization code. Here is how the initialization code for a stateless service could look after the necessary changes (additions pointed out in comments starting with `****`):
  114. ```csharp
  115. using System;
  116. using System.Diagnostics;
  117. using System.Fabric;
  118. using System.Threading;
  119. using System.Threading.Tasks;
  120. using Microsoft.ServiceFabric.Services.Runtime;
  121. // **** Add the following directives
  122. using Microsoft.Diagnostics.EventListeners;
  123. using Microsoft.Diagnostics.EventListeners.Fabric;
  124. namespace Stateless1
  125. {
  126. internal static class Program
  127. {
  128. /// <summary>
  129. /// This is the entry point of the service host process.
  130. /// </summary>
  131. private static void Main()
  132. {
  133. try
  134. {
  135. // **** Instantiate ElasticSearchListener
  136. var configProvider = new FabricConfigurationProvider("ElasticSearchEventListener");
  137. ElasticSearchListener esListener = null;
  138. if (configProvider.HasConfiguration)
  139. {
  140. esListener = new ElasticSearchListener(configProvider);
  141. }
  142. // The ServiceManifest.XML file defines one or more service type names.
  143. // Registering a service maps a service type name to a .NET type.
  144. // When Service Fabric creates an instance of this service type,
  145. // an instance of the class is created in this host process.
  146. ServiceRuntime.RegisterServiceAsync("Stateless1Type",
  147. context => new Stateless1(context)).GetAwaiter().GetResult();
  148. ServiceEventSource.Current.ServiceTypeRegistered(Process.GetCurrentProcess().Id, typeof(Stateless1).Name);
  149. // Prevents this host process from terminating so services keep running.
  150. Thread.Sleep(Timeout.Infinite);
  151. // **** Ensure that the ElasticSearchListner instance is not garbage-collected prematurely
  152. GC.KeepAlive(esListener);
  153. }
  154. catch (Exception e)
  155. {
  156. ServiceEventSource.Current.ServiceHostInitializationFailed(e);
  157. throw;
  158. }
  159. }
  160. }
  161. }
  162. ```
  163. Elasticsearch connection data should be put in a separate section in the service configuration file (**PackageRoot\Config\Settings.xml**). The name of the section must correspond to the value passed to the `FabricConfigurationProvider` constructor, for example:
  164. ```xml
  165. <Section Name="ElasticSearchEventListener">
  166. <Parameter Name="serviceUri" Value="http://myBigCluster.westus.cloudapp.azure.com/es/" />
  167. <Parameter Name="userName" Value="(ES user name)" />
  168. <Parameter Name="password" Value="(ES user password)" />
  169. <Parameter Name="indexNamePrefix" Value="myapp" />
  170. </Section>
  171. ```
  172. The values of `serviceUri`, `userName` and `password` correspond to the Elasticsearch cluster endpoint address, Elasticsearch user name, and password, respectively. `indexNamePrefix` is the prefix for Elasticsearch indexes; the Microsoft.Diagnostics.Listeners library creates a new index for its data on a daily basis.
  173. ### Verification
  174. That's it! Now, whenever the service is run, it will start sending traces to the Elasticsearch service specified in the configuration. You can verify this by opening the Kibana UI associated with the target Elasticsearch instance (in our example, the page address would be http://myBigCluster.westus.cloudapp.azure.com/) and checking that indexes with the name prefix chosen for the `ElasticSearchListener` instance have indeed been created and populated with data.
  175. ![Kibana showing PartyCluster application events][2]
  176. ## Next steps
  177. - [Learn more about diagnosing and monitoring a Service Fabric service](service-fabric-diagnostics-how-to-monitor-and-diagnose-services-locally.md)
  178. <!--Image references-->
  179. [1]: ./media/service-fabric-diagnostics-how-to-use-elasticsearch/listener-lib-references.png
  180. [2]: ./media/service-fabric-diagnostics-how-to-use-elasticsearch/kibana.png