Table of Contents Previous Next
Logo
IceGrid : 38.22 Administrative Facility Integration
Copyright © 2003-2010 ZeroC, Inc.

38.22 Administrative Facility Integration

The Ice administrative facility described in Section 32.18 provides a general purpose solution for administering individual Ice programs. IceGrid extends this functionality in several convenient ways:
• IceGrid automatically enables the facility in deployed servers.
• IceGrid uses the Process facet to terminate an active server, giving it an opportunity to perform an orderly shutdown.
• IceGrid provides a secure mechanism for invoking administrative operations on deployed servers.
• IceGrid administrative tools use the facility to display the properties of servers and services, and manipulate and monitor IceBox services.
We discuss each of these items in separate sections below.

38.22.1 Enabling the Facility

As we saw in Section 38.5.4, the configuration properties for a deployed server include definitions for the following properties:
• Ice.Admin.Endpoints
• Ice.Admin.ServerId
In conjunction with the Ice.Default.Locator property, these definitions satisfy the requirements explained in Section 32.18.2 for enabling the administra­tive facility. See Appendix D for more information on these properties.

Endpoints

If a server’s descriptor does not supply a value for Ice.Admin.Endpoints, IceGrid supplies the default value shown below:
Ice.Admin.Endpoints=tcp -h 127.0.0.1
For the security reasons explained in Section 32.18.8, IceGrid specifies the local host interface (127.0.0.1) so that administrative access is limited to clients running on the same host. This configuration permits the IceGrid node to invoke operations on the server’s admin object, but prevents remote access unless the client establishes an IceGrid administrative session (see Section 38.14).
Specifying a static port is unnecessary because the server registers its endpoints with IceGrid upon each new activation.

38.22.2 Server Deactivation

An IceGrid node uses the Ice::Process interface (see Section 32.18.4) to grace­fully deactivate a server. In programs using Ice 3.3 or later, this interface is imple­mented by the administrative facet named Process. In earlier versions of Ice, an object adapter implemented this interface in a special servant if the adapter’s RegisterProcess property was enabled.
Regardless of version, the Ice run time registers an Ice::Process proxy with the IceGrid registry when properly configured. Registration normally occurs during communicator initialization, but it can be delayed when a server needs to install its own administrative facets (see Section 32.18.7).
When the node is ready to deactivate a server, it invokes the shutdown opera­tion on the server’s Ice::Process proxy. If the server does not terminate in a timely manner, the node asks the operating system to terminate the process. Each server can be configured with its own deactivation timeout (see Section 38.17.19). If no timeout is configured, the node uses the value of the property IceGrid.Node.WaitTime, which defaults to 60 seconds.
If a server does not register an Ice::Process proxy, the IceGrid node cannot request a graceful termination and must resort instead to a more drastic, and potentially harmful, alternative by asking the operating system to terminate the server’s process. On Unix, the node sends the SIGTERM signal to the process and, if the server does not terminate within the deactivation timeout period, sends the SIGKILL signal.
On Windows, the node first sends a Ctrl+Break event to the server and, if the server does not stop within the deactivation timeout period, terminates the process immediately.
Servers that disable the Process facet can install a signal handler in order to intercept the node’s notification about pending deactivation. For example, portable C++ programs could use the IceUtil::CtrlCHandler class (see Section 31.10) for this purpose. However, we recommend that servers be allowed to use the Process facet when possible.

38.22.3 Administrative Requests

Section 38.22.1 explained the reasoning behind IceGrid’s use of the local host interface when defining the endpoints of a deployed server’s administrative object adapter. Briefly, this configuration allows local clients such as the IceGrid node to access the server’s admin object while preventing direct invocations from remote clients. A server’s admin object may still be accessed remotely, but only by clients that establish an IceGrid administrative session. To facilitate these requests, IceGrid uses an intermediary object that relays requests to the server via its node. For example, Figure 38.10 illustrates the path of a getProperty invoca­tion:
Figure 38.10. Routing for administrative requests on a server.

Obtaining a Proxy

During an administrative session, a client has two ways of obtaining the interme­diary proxy for a server’s admin object:
module IceGrid {
    interface Admin {
        idempotent string getServerAdminCategory();
        idempotent Object* getServerAdmin(string id)
            throws ServerNotExistException,
                   NodeUnreachableException,
                   DeploymentException;
        // ...
    };
};
If the client wishes to construct the proxy itself and already knows the server’s id, the client need only modify the proxy of the IceGrid::Admin object with a new identity. The identity’s category must be the return value of getServerAdminCat­egory, while its name is the id of the desired server. The example below demon­strates how to create the proxy and access the Properties facet of a server:
// C++
IceGrid::AdminSessionPrx session = ...;
IceGrid::AdminPrx admin = session>getAdmin();
Ice::Identity serverAdminId;
serverAdminId.category = admin>getServerAdminCategory();
serverAdminId.name = "MyServerId";
Ice::PropertiesAdminPrx props =
    Ice::PropertiesAdminPrx::checkedCast(
        admin>ice_identity(serverAdminId), "Properties");
Alternatively, the getServerAdmin operation returns a proxy that refers to the admin object of the given server. This operation performs additional validation and therefore may raise one of the exceptions shown in its signature above.

Callbacks without Glacier2

IceGrid also supports the relaying of callback requests from a back-end server to an administrative client over the client’s existing connection to the registry, which is especially important for a client using a network port that is forwarded by a fire­wall or protected by a secure tunnel.
For this mechanism to work properly, a client that established its administra­tive session directly with IceGrid and not via a Glacier2 router must take addi­tional steps to ensure that the proxies for its callback objects contain the proper identities and endpoints. The IceGrid::AdminSession interface provides an operation to help with the client’s preparations:
module IceGrid {
interface AdminSession ... {
    idempotent Object* getAdminCallbackTemplate();
    // ...
};
};
As its name implies, the getAdminCallbackTemplate operation returns a template proxy that supplies the identity and endpoints a client needs to configure its callback objects. The information contained in the template proxy is valid for the lifetime of the administrative session. This operation returns a null proxy if the client’s administrative session was established via a Glacier2 router, in which case the client should use the callback strategy described in the next section instead.
The endpoints contained in the template proxy are those of an object adapter in the IceGrid registry. The client must transfer these endpoints to the proxies for its callback objects so that callback requests from a server are sent first to IceGrid and then relayed over a bidirectional connection (see Section 36.7) to the client, as shown in Figure 38.11.
Figure 38.11. Routing for callback requests from a server.
The complete list of steps is shown below:
1. Invoke getAdminCallbackTemplate to obtain the template proxy.
2. Extract the category from the template proxy’s identity and use it in all call­back objects.
3. Extract the endpoints from the template proxy and use them to establish the published endpoints of the callback object adapter.
4. Create the callback object adapter and associate it with the administrative session’s connection, thereby establishing a bidirectional connection with IceGrid.
5. Add servants to the callback object adapter.
As an example, let us assume that we have deployed an IceBox server with the server id icebox1 and our objective is to register a ServiceObserver callback that monitors the state of the IceBox services (see Section 43.5.1). The first step is to obtain a proxy for the administrative facet named IceBox.ServiceMan­ager:
// C++
IceGrid::AdminSessionPrx session = ...;
IceGrid::AdminPrx admin = session>getAdmin();
Ice::ObjectPrx obj = admin>getServerAdmin("icebox1");
IceBox::ServiceManagerPrx svcmgr =
    IceBox::ServiceManagerPrx::checkedCast(
        obj, "IceBox.ServiceManager");
Next, we retrieve the template proxy and compose the published endpoints for our callback object adapter:
Ice::ObjectPrx tmpl = admin>getAdminCallbackTemplate();
Ice::EndpointSeq endpts = tmpl>ice_getEndpoints();
string publishedEndpoints;
for (Ice::EndpointSeq::const_iterator p = endpts.begin();
     p != endpts.end(); ++p) {
    if (p == endpts.begin())
        publishedEndpoints = (*p)>toString();
    else
        publishedEndpoints += ":" + (*p)>toString();
}
communicator>getProperties()>setProperty(
    "CallbackAdapter.PublishedEndpoints", publishedEndpoints);
The final steps involve creating the callback object adapter, adding a servant, establishing the bidirectional connection and registering our callback with the service manager:
Ice::ObjectAdapterPtr callbackAdapter =
    communicator>createObjectAdapter("CallbackAdapter");
Ice::Identity cbid;
cbid.category = tmpl>ice_getIdentity().category;
cbid.name = "observer";
IceBox::ServiceObserverPtr obs = new ObserverI;
Ice::ObjectPrx cbobj = callbackAdapter>add(obs, cbid);
IceBox::ServiceObserverPrx cb =
    IceBox::ServiceObserverPrx::uncheckedCast(cbobj);
callbackAdapter>activate();
session>ice_getConnection()>setAdapter(callbackAdapter);
svcmgr>addObserver(cb);
At this point the client is ready to receive callbacks from the IceBox server when­ever one of its services changes state.

Callbacks with Glacier2

A client that creates an administrative session via a Glacier2 router (see Section 38.15) already has a bidirectional connection over which callbacks from administrative facets are relayed. The flow of requests is shown in Figure 38.12, which presents a simplified view with the router and IceGrid services all running on the same host.
Figure 38.12. Routing for callback requests from a server.
To prepare for receiving callbacks, the client must perform the same steps as for any router client (see Section 42.4):
1. Obtain a proxy for the router.
2. Retrieve the category to be used in callback objects.
3. Create the callback object adapter and associate it with the router, thereby establishing a bidirectional connection.
4. Add servants to the callback object adapter.
Repeating the example from the previous section, we assume that we have deployed an IceBox server with the server id icebox1 and our objective is to register a ServiceObserver callback that monitors the state of the IceBox services (see Section 43.5.1). The first step is to obtain a proxy for the administra­tive facet named IceBox.ServiceManager:
// C++
IceGrid::AdminSessionPrx session = ...;
IceGrid::AdminPrx admin = session>getAdmin();
Ice::ObjectPrx obj = admin>getServerAdmin("icebox1");
IceBox::ServiceManagerPrx svcmgr =
    IceBox::ServiceManagerPrx::checkedCast(
        obj, "IceBox.ServiceManager");
Now we are ready to create the object adapter and register the observer:
Ice::RouterPrx router = communicator>getDefaultRouter();
Ice::ObjectAdapterPtr callbackAdapter =
    communicator>createObjectAdapterWithRouter(
        "CallbackAdapter", router);
Ice::Identity cbid;
cbid.category = router>getCategoryForClient();
cbid.name = "observer";
IceBox::ServiceObserverPtr obs = new ObserverI;
Ice::ObjectPrx cbobj = callbackAdapter>add(obs, cbid);
IceBox::ServiceObserverPrx cb =
    IceBox::ServiceObserverPrx::uncheckedCast(cbobj);
callbackAdapter>activate();
svcmgr>addObserver(cb);
At this point the client is ready to receive callbacks from the IceBox server when­ever one of its services changes state.

38.22.4 Using the Facility in IceGrid Utilities

This section discusses the ways in which the IceGrid utilities make use of the administrative facility. See Section 38.24 for more information on the administra­tive utilities.

Properties

The command line and graphical utilities allow you to explore the configuration properties of a server or service.
One property in particular, BuildId, is given special consideration by the graphical utility. Although it is not used by the Ice run time, the BuildId prop­erty gives you the ability to describe the build configuration of your application. The property’s value is shown by the graphical utility in its own field in the attributes of a server or service, as well as in the list of properties. You can also retrieve the value of this property using the command-line utility with the following statement:
> server property MyServerId BuildId
Or, for an IceBox service, with this command:
> service property MyServerId MyService BuildId
Section 32.18.5 describes the Slice interface that the utilities use to access these properties, and Section 38.22.3 explains how to obtain an appropriate proxy.

Administering IceBox Services

IceBox provides an administrative facet that implements the IceBox::ServiceM­anager interface, which supports operations for stopping an active service, and for starting a service that is currently inactive. These operations are available in both the command line and graphical utilities.
IceBox also defines a ServiceObserver interface for receiving callbacks when services are stopped or started. The graphical utility implements this inter­face so that it can present an updated view of the state of an IceBox server. Section 38.22.3 includes examples that demonstrate how to register an observer with the IceBox administrative facet.
See Chapter 43 for more information on IceBox.

Table of Contents Previous Next
Logo