Advanced Actor Ensembles

So far, in the basic ensemble tutorial we have explored the basics of actor ensembles in Gerbil. This is the foundation and basic interaction, giving you the tools to control and debug unstructured ensembles.

In this tutorial we introduce advanced ensemble concepts and structured ensembles, whereby a supervisor controls the ensemble for some domain in a host. We explore distributed ensembles by creating a network of such local ensembles, connected through TLS. Control of such distributed ensembles can be operational through a console server for scripting and operator access.

Note

Future Work (soon enough! Planned for v0.19) will be to introduce orchestrators, which can run in a host to setup, heathcheck and maintain an ensemble through a dedicated tool. We will also introduce additional supervisory services, besides the registry: a vault server for sharing secrets without hitting the disk, a resolver for distributed name resolution of servers, and broadcast facilities for connecting nodes in an implicit ensemble wide network.

Ensemble Domains

As we all know, naming is one of the hardest problems in Computer Sciences. Names need to be intentional, and convey information about the role while on the same time avoiding clashes within the global namespaces.

Gerbil implements ensemble domains as a hierarchical namespace. Servers have identifiers which are pairs of a symbol (the name or id of the server) and another symbol which is the domain. Names cannot contain slashes while domains are hierarchically partitioned with slashes.

The hierarchical structure of the domain namespace serves two purposes:

  • it designates control structure, where we can easily refer to the subensemble that operations under a particular subdomain.
  • it eliminates names clashes with easy conventions; for example a convention for the namespace would be /project/host-id/application/... and so on.

In addition, each server in a domain has a primary role, which defines its purpose and its configuration. Servers can also have secondary roles and provide a selector for refering to groups of servers spanning multiple domains.

Structured Ensembles

In a structured ensemble, a supervisor controls a subdomain and provide necessary services for maintaining the ensemble. It manages creation of servers, local server-level supervision, and automatically spanws and supervises a registry for the entire subdomain in the localhost.

Supervisors can be recursive, whereby a supervisor supervises a nested supervisor in a local ensemble or meta-supervises remotely as part of an orchestrator. In general we recommend as best practice to use a single supervisor for a local subdomain and configure meta-supervision through orchestrators.

Case Study: The Gerbil httpd

A common requirement is to spawn an httpd that can utilize all cores, and preferably with process isolation so that a bug can't bring down the whole server.

Gerbil comes with a builtin httpd, runnable as gerbil httpd. The server is quite capable, supports static file serving with a small file cache, dynamically loadable handlers, and servlets which are interpreted handlers in the server content.

Using a Standalone httpd

Here we walk through an example www project and how to serve it with gerbil httpd server.

First, let's compile our site's code -- see src/tutorial/advanced-ensemble for the code.

1$ pushd site/project
1$ gerbil build
1$ popd

Now let's configure the httpd. Specifically:

  • we set www as the root directory for the site
  • we enable servlets
  • we set a handler for the code we just build
1$ pushd site
1$ gerbil httpd -G project/.gerbil config --root www --enable-servlets --handlers '(("/handler" . :demo/handler))'

1$ gerbil httpd -G project/.gerbil config --print
config:
httpd-v0
root:
"www"
listen:
("0.0.0.0:8080")
handlers:
(("/handler" . :demo/handler))
enable-servlets:
#t

And now let's start it and interact with it.

1$ gerbil httpd -G project/.gerbil server
...

2$ curl http://localhost:8080/
2$ curl http://localhost:8080/servlets/hello.ss
2$ curl http://localhost:8080/handler

Using an httpd ensemble

A single server is just that: one process, with one OS thread of control serving requests. If we want to take advantage of multicore machines with process isolation, we can spawn more and multiplex on the socket using SO_REUSEPORT (the server does it by default).

We can do this very easily by constructing an ensemble, and by doing that we take advantage of supervision and the all the available tooling from gerbil ensemble.

Here is how we can configure an httpd ensemble:

  • we configure the ensemble root directory
  • we configure the ensemble domain and worker domain
  • we configure the number of workers
  • and just pass the through the httpd config.
1$ pushd site
1$ gerbil httpd -G project/.gerbil config --ensemble --ensemble-root root --ensemble-domain /test --worker-domain /test/www -n 2 --root www --enable-servlets --handlers '(("/handler" . :demo/handler))'

1$ gerbil httpd -G project/.gerbil config --ensemble --print
config:
ensemble-v0
roles:
((httpd server-config:
        (config:
         ensemble-server-v0
         application:
         ((httpd config:
                 httpd-v0
                 root:
                 "www"
                 listen:
                 ("0.0.0.0:8080")
                 handlers:
                 (("/handler" . :demo/handler))
                 enable-servlets:
                 #t))
         env:
         #f)
        exe:
        "gerbil"
        prefix:
        ("httpd" "server")
        policy:
        restart))
preload:
(workers: ((/test/www prefix: httpd role: httpd servers: 2)))
domain:
/test
root:
"root"

This configuration will preload and supervise, restarting as needed, 2 workers. The all we have to do is:

1$ gerbil httpd -G project/.gerbil ensemble
...

So let's interact with our ensemble, and notice the multiplexing by the server identifier in the response:

2$ ps auxw | grep gerbil
2$ curl http://localhost:8080/
2$ curl http://localhost:8080/servlets/hello.ss
2$ curl http://localhost:8080/handler

Local Ensembles

What about services composed of things other than httpds? Can't we run a general supervised ensemble that is open ended and can dynamically add or remove servers?

The answer is a resounding yes; in fact gerbil httpd ensemble runs a generic supervisor and which just happens to be configured for httpd. In the folling we see how we can run an httpd ensemble with a standalone supervisor.

First, let's configure the ensemble:

  • first we configure the httpd as usual -- notice the use of -G env/local so that the httpd configuration is placed in the standard service configuration path.
1$ gerbil httpd -G env/local config  --root www --enable-servlets --handlers '(("/handler" . :demo/handler))'

And then we configure the ensemble to know about the httpd role:

1$ gerbil ensemble -G env/local config ensemble -D '/test' --root root
1$ gerbil ensemble -G env/local config role --role httpd --exe gerbil --prefix '("httpd" "server")' --policy restart --env www --application httpd

1$ gerbil ensemble -G env/local config ensemble --view --pretty
config:
ensemble-v0
domain:
/test
root:
"root"
roles:
((httpd exe:
        "gerbil"
        prefix:
        ("httpd" "server")
        policy:
        restart
        server-config:
        (config:
         ensemble-server-v0
         env:
         "www"
         application:
         ((httpd config:
                 httpd-v0
                 root:
                 "www"
                 listen:
                 ("0.0.0.0:8080")
                 handlers:
                 (("/handler" . :demo/handler))
                 enable-servlets:
                 #t)))))

And that's it, now we can start a supervisor and spawn httpd server process with it.

1$ gerbil ensemble -G env/local supervisor
...

In order to easily interact with the ensemble supervisor, let's also configure the environment to know about our supervisor:

2$ gerbil ensemble -G env/local env supervisor '(supervisor . /test)'
2$ gerbil ensemble -G env/local env known-servers --add  '(supervisor . /test)'

And now we can interact with the supervisor directly:

2$ gerbil ensemble -G env/local control list-servers --pretty
(((registry . /test) 2348146 running))

2$ gerbil ensemble -G env/local control get-ensemble-config --pretty
(config:
 ensemble-v0
 domain:
 /test
 root:
 "root"
 services:
 (supervisor:
  (config:
   ensemble-server-v0
   domain:
   /test
   identifier:
   (supervisor . /test)
   registry:
   (registry . /test)
   cookie:
   "/home/vyzo/src/vyzo/advanced-ensemble-demo/env/local/ensemble/cookie"
   admin:
   "/home/vyzo/src/vyzo/advanced-ensemble-demo/env/local/ensemble/admin.pub"
   role:
   supervisor
   exe:
   "gerbil"
   args:
   ("ensemble" "supervisor")
   root:
   "/home/vyzo/src/vyzo/advanced-ensemble-demo/"
   log-level:
   INFO
   log-dir:
   "/home/vyzo/src/vyzo/advanced-ensemble-demo/root/log/test/supervisor"
   log-file:
   "/home/vyzo/src/vyzo/advanced-ensemble-demo/root/log/test/supervisor/server.log"
   addresses:
   ((unix: "dellicious" "/tmp/ensemble/test/supervisor.sock"))
   known-servers:
   (((registry . /test) (unix: "dellicious" "/tmp/ensemble/test/registry.sock"))))
  registry:
  (config:
   ensemble-server-v0
   identifier:
   (registry . /test)
   role:
   registry
   exe:
   "gerbil"
   args:
   ("ensemble" "registry" "(registry . /test)")))
 roles:
 ((httpd exe:
         "gerbil"
         prefix:
         ("httpd" "server")
         policy:
         restart
         server-config:
         (config:
          ensemble-server-v0
          env:
          "www"
          application:
          ((httpd config:
                  httpd-v0
                  root:
                  "www"
                  listen:
                  ("0.0.0.0:8080")
                  handlers:
                  (("/handler" . :demo/handler))
                  enable-servlets:
                  #t))))))

As we can see, the only server within the ensemble under the supervisor is the automatically spawned registry, which facilitates local interactions between servers in the ensemble.

Before we can spawn our httpds, we also need to upload the necessary code and content:

2$ cd site/project/.gerbil/
2$ tar czvf ../../env-www.tar.gz lib

2$ cd site
2$ tar czvf fs-www.tar.gz www

2$ gerbil ensemble -G env/local control upload --fs site/fs-www.tar.gz ""
2$ gerbil ensemble -G env/local control upload --env site/env-www.tar.gz www

And that's it, now we are ready to spawn our httpd servers as workers:

2$ gerbil ensemble -G env/local control start-workers -d /test/www httpd httpd 2
2$ gerbil ensemble -G env/local control list-servers --pretty
(((httpd-0 . /test/www) 2348366 running)
 ((httpd-1 . /test/www) 2348367 running)
 ((registry . /test) 2348146 running))

And we can interact with them:

2$ ps auxw | grep gerbil
2$ curl http://localhost:8080/
2$ curl http://localhost:8080/servlets/hello.ss
2$ curl http://localhost:8080/handler

Finally, we can shutdown the entire ensemble, including the supervisor:

2$ gerbil ensemble -G env/local control shutdown

Distributed Ensembles

Naturally, we are not limited to controlling a local ensemble behind a supervisor. We can just as easy spawn a distributed ensemble that runs in multiple hosts, all running their own supervisor.

The individual supervisors themselves can be spawned and supervised as a systemd service.

In this tutorial, we build an ensemble with 3 hosts: 2 hosts serving http requests with a (local) httpd ensemble each, and another host acting as a load balancer using the example rlb program.

See src/tutorial/advanced-ensemble/rlb for the rlb code.

Note

The IP addresses shown here were 3 linode servers, configured just for demonstration purposes and no longer exist. Please set up your own servers when following the tutorial!

First, a bit of configuration: if we are going to manage a distributed ensemble we need to use TLS. So let's generate a CA and create certificates for our supervisors:

1$ gerbil ensemble -G env/private ca setup --domain demo.ensemble.internal
1$ gerbil ensemble -G env/private ca cert '(supervisor . /demo/linode1)'
1$ gerbil ensemble -G env/private ca cert '(supervisor . /demo/linode2)'
1$ gerbil ensemble -G env/private ca cert '(supervisor . /demo/linode3)'

Next, let's configure the supervisors for each host: notice that we enable public access by passing the address where we listen with TLS:

1$ gerbil ensemble -G env/linode1 config ensemble -D /demo/linode1 --root root --public 0.0.0.0:4999
1$ gerbil ensemble -G env/linode2 config ensemble -D /demo/linode2 --root root --public 0.0.0.0:4999
1$ gerbil ensemble -G env/linode3 config ensemble -D /demo/linode3 --root root --public 0.0.0.0:4999

Next, let's package and upload the necessary environment for our supervisors:

1$ gerbil ensemble -G env/private package -o env/linode1.tar.gz -C env/linode1/ensemble/config '(supervisor . /demo/linode1)'
1$ gerbil ensemble -G env/private package -o env/linode2.tar.gz -C env/linode2/ensemble/config '(supervisor . /demo/linode2)'
1$ gerbil ensemble -G env/private package -o env/linode3.tar.gz -C env/linode3/ensemble/config '(supervisor . /demo/linode3)'

1$ scp env/linode1.tar.gz root@172.233.56.134:
1$ scp env/linode2.tar.gz root@172.233.56.175:
1$ scp env/linode3.tar.gz root@172.233.56.211:

Next, let's unpack the environment and run our supervisors:

# linode1
2$ ssh root@172.233.56.134
2$ mkdir env
2$ pushd env
2$ tar xzvf ../linode1.tar.gz
2$ popd
2$ export PATH=/opt/gerbil/bin:$PATH
2$ nohup gerbil ensemble -G env supervisor
...

# linode2
3$ ssh root@172.233.56.175
3$ ...

# linode3
4$ ssh root@172.233.56.211
4$ ...

Again, in order to facilitate the interaction, we setup our private environment:

1$ gerbil ensemble -G env/private env known-servers --set '(supervisor . /demo/linode1)' '(tls: "172.233.56.134:4999")'
1$ gerbil ensemble -G env/private env known-servers --set '(supervisor . /demo/linode2)' '(tls: "172.233.56.175:4999")'
1$ gerbil ensemble -G env/private env known-servers --set '(supervisor . /demo/linode3)' '(tls: "172.233.56.211:4999")'

Next, we configure and start our httpd servers:

1$ gerbil httpd -G env/tmp config  --root www --enable-servlets --handlers '(("/handler" . :demo/handler))'
1$ gerbil ensemble -G env/tmp/linode1 config role --role httpd --exe gerbil --prefix '("httpd" "server")' --policy restart --env www --application httpd -C env/tmp/config/httpd

$ gerbil ensemble -G env/private control update-ensemble-config -S '(supervisor . /demo/linode1)' env/tmp/linode1/ensemble/config
$ gerbil ensemble -G env/private control get-ensemble-config -S '(supervisor . /demo/linode1)' --pretty
(config:
 ensemble-v0
 domain:
 /demo/linode1
 root:
 "root"
 public-address:
 "0.0.0.0:4999"
 services:
 (supervisor:
  (config:
   ensemble-server-v0
   domain:
   /demo/linode1
   identifier:
   (supervisor . /demo/linode1)
   registry:
   (registry . /demo/linode1)
   cookie:
   "/root/env/ensemble/cookie"
   admin:
   "/root/env/ensemble/admin.pub"
   role:
   supervisor
   exe:
   "gerbil"
   args:
   ("ensemble" "supervisor")
   root:
   "/root/"
   log-level:
   INFO
   log-dir:
   "/root/root/log/demo/linode1/supervisor"
   log-file:
   "/root/root/log/demo/linode1/supervisor/server.log"
   addresses:
   ((unix: "localhost" "/tmp/ensemble/demo/linode1/supervisor.sock")
    (tls: "0.0.0.0:4999"))
   known-servers:
   (((registry . /demo/linode1)
     (unix: "localhost" "/tmp/ensemble/demo/linode1/registry.sock"))))
  registry:
  (config:
   ensemble-server-v0
   identifier:
   (registry . /demo/linode1)
   role:
   registry
   exe:
   "gerbil"
   args:
   ("ensemble" "registry" "(registry . /demo/linode1)")))
 roles:
 ((httpd exe:
         "gerbil"
         prefix:
         ("httpd" "server")
         policy:
         restart
         server-config:
         (config:
          ensemble-server-v0
          env:
          "www"
          application:
          ((httpd config:
                  httpd-v0
                  root:
                  "www"
                  listen:
                  ("0.0.0.0:8080")
                  handlers:
                  (("/handler" . :demo/handler))
                  enable-servlets:
                  #t))))))


1$ gerbil ensemble -G env/private control upload -S '(supervisor . /demo/linode1)' --fs site/fs-www.tar.gz ""
1$ gerbil ensemble -G env/private control upload -S '(supervisor . /demo/linode1)' --env site/env-www.tar.gz www

1$ gerbil ensemble -G env/private control start-workers -S '(supervisor . /demo/linode1)' -d www httpd httpd 2
(((httpd-1 . /demo/linode1/www) . 10099) ((httpd-0 . /demo/linode1/www) . 10098))

1$ gerbil ensemble -G env/private control list-servers  -S '(supervisor . /demo/linode1)' --pretty
(((httpd-0 . /demo/linode1/www) 10098 running)
 ((httpd-1 . /demo/linode1/www) 10099 running)
 ((registry . /demo/linode1) 9987 running))

1$ curl http://172.233.56.134:8080/
1$ curl http://172.233.56.134:8080/handler
1$ curl http://172.233.56.134:8080/servlets/hello.ss

1$ gerbil ensemble -G env/tmp/linode2 config role --role httpd --exe gerbil --prefix '("httpd" "server")' --policy restart --env www --application httpd -C env/tmp/config/httpd

$ gerbil ensemble -G env/private control update-ensemble-config -S '(supervisor . /demo/linode2)' env/tmp/linode2/ensemble/config
$ gerbil ensemble -G env/private control get-ensemble-config -S '(supervisor . /demo/linode2)' --pretty

1$ gerbil ensemble -G env/private control upload -S '(supervisor . /demo/linode2)' --fs site/fs-www.tar.gz ""
1$ gerbil ensemble -G env/private control upload -S '(supervisor . /demo/linode2)' --env site/env-www.tar.gz www
1$ gerbil ensemble -G env/private control start-workers -S '(supervisor . /demo/linode2)' -d www httpd httpd 2
1$ gerbil ensemble -G env/private control list-servers  -S '(supervisor . /demo/linode2)' --pretty

1$ curl http://172.233.56.175:8080/
1$ curl http://172.233.56.175:8080/handler
1$ curl http://172.233.56.175:8080/servlets/hello.ss

And finally, let's configure and start the load balancer:

1$ cd rlb
1$ gerbil build

1$ cat > env/tmp/config/rlb
config: rlb-v0
listen: "0.0.0.0:8080"
proxies: ("172.233.56.134:8080" "172.233.56.175:8080")
^D

1$ gerbil ensemble -G env/tmp/linode3 config role --role rlb --exe rlb --policy restart --env rlb --application rlb -C env/tmp/config/rlb

1$ gerbil ensemble -G env/private control upload -S '(supervisor . /demo/linode3)' --exe rlb/.gerbil/bin/rlb rlb
1$ gerbil ensemble -G env/private control update-ensemble-config -S '(supervisor . /demo/linode3)' env/tmp/linode3/ensemble/config
1$ gerbil ensemble -G env/private control start-workers -S '(supervisor . /demo/linode3)' -d www rlb rlb 2

Try it out:

1$ curl http://172.233.56.211:8080/
1$ curl http://172.233.56.211:8080/servlets/hello.ss

And something for fun, let's ping an rlb server behind a supervisor and then start a repl on it, even though it doesn't itself has a public TLS address:

1$ gerbil ensemble -G env/private ping -s -S '(supervisor . /demo/linode3)' '(rlb-0 . /demo/linode3/www)'

1$ gerbil ensemble -G env/private repl -s -S '(supervisor . /demo/linode3)' '(rlb-0 . /demo/linode3/www)'

Ensemble Orchestration

TODO orchiestrator and meta-supervision

This functionality is planned for v0.19

More Ensemble Services

TODO vault, broadcast, resolver

This functionality is planned for v0.19

More on Ensemble Configuration

As we have seen, configuring the ensemble is a key step along the way; we have seen examples of configuration and relevant commands to create the appropriate configurations. Here we dive into some more detail regarding configuration.

Ensemble Configuration Structure

First, let's look at what really goes into an ensemble configuration. The configuration is actually a plist, flat printed in a file (that is without the enclosing list), with the following structure:

config: ensemble-v0

;;; supervisory domain for the ensemble
domain: <domain>
;;; [optional] root path for ensemble executions
root: <path>
;;; [optional] supervisor public address (over TLS)
public-address: <inet-address>
;;; ;;; supervisory services
services: (
 ;;; supervisor config
 supervisor: <ensemble-server-config>
 ;;; registry config for the local ensemble
 registry: <ensemble-server-config>
 ;;; [optional] resolver config for distributed ensemble name resolution
 resolver: <ensemble-server-config>
 ;;; [optional] broadcast config
 broadcast: <ensemble-server-config>
)

;;; roles -> execution mapping
roles:
 ((<role>  ; symbol
   ;;; for each role define an execution rule:
   ;;; the program is started as <exec> <prefix> ... <server-identifier>
   ;;; the server configuration will be in the <ensemble-server-path>/config
   ;;; <program>: the symbol 'self for single binary deployments
   ;;; or an executable path (string)
   exe: <program>
   ;;; optional executable argument prefix
   prefix: (<string> ...)
   ;;; optional executable argument suffix
   suffix: (<string> ...)
   ;;; supervision policy
   policy: <supervisory-policy>
   ;;; optional role server configuration template
   server-config: <ensemble-server-config>
   )
 ...)

;;; [optional] preloaded server configuration; the supervisor on its own is capable
;;; of receiving remote updates, executables, and server execution instructions.
preload: (
 ;;; static preloaded server configuration
 servers:
 ((domain
   ;;; server identifier
   server: <server-identifier>
   ;;; primary role
   role: <role>
   ;;; [optional] server configuration, the role template is overlayed
   server-config: <ensemble-server-config>
  )
  ... )

 ;;; preloaded worker server configuration
 workers:
 ((domain
   ;;; server id prefix; the actual server id will be <prefix>-<seqno>
   prefix: <id>
   ;;; number of servers
   servers: <fixnum>
   ;;; primary role
   role: <role>
   ;;; [optional] server configuration, the role template is overlayed
   server-config: <ensemble-server-config>
  )
 ...)
)

Individual server configuration has the following structure:

config: ensemble-server-v0

;;; ensemble
domain: <symbol>
identifier: <server-identifier>
supervisor: <server-identifier>
registry:   <server-identifier>
cookie:     <path>
admin:      <path>

;;; execution
role:    <symbol>
secondary-roles: (<symbol> ...)
exe:     <string>
args:    (<string> ...)
policy:  <symbol>
env:     <string>
envvars: (<string> ...)

;;; logging
log-level: <symbol>
log-file:  <path>
log-dir:   <path>

;;; bindings
addresses: (<address> ...)
auth: ((<server-identifier> <capability>) ...)
known-servers: ((<server-identifier> <address> ...) ...)

;;; application specific configuration
application: ((<symbol> config ...) ...)

Note that a lot of the details, especially for server configuration are filled in by the supervisor. The user can however provide a partial configuration, which is composed with the supervisor generated configuration. What you as the programmer or administrator really care to configure is roles and applications.

Every server must have a (primary) role, and can also have any number of secondary roles. The primary role is used for instantiating the specific configuration of the server. So as an administrator you will want to configure appropriate roles for the various servers in your ensemble.

Similarly, applications are the actors that live inside the server and provide the application level functionality. Application specific configuration is user controlled, any primitive object can be used for said configuration but it is still recommended that you use the same configuration format -- see :std/config.

Configuration Tooling

The gerbil ensemble tool provides a number of configuration commands that can help you create the appropriate configurations; note that there is nothing wrong with creating the programmatically or even by hand, but it does help to have a tool that can do it for you and avoid potential errors.

$ gerbil ensemble config help
Usage: gxensemble config  <command> command-arg ...

Commands:
 ensemble                         configure the ensemble as a whole
 role                             configure an ensemble role
 preload-server                   configure a preloaded server for supervised execution as part of an ensemble
 preload-workers                  configure preloaded workers for supervised execution as part of an ensemble
 server                           partially configure a server for supervised execution as part of an ensemble
 help                             display help; help <command> for command help

Configure the ensemble as a whole

You can do this with the gerbil ensemble config ensemble command:

$ gerbil ensemble config help ensemble
Usage: gxensemble config ensemble [command-option ...]
       configure the ensemble as a whole

Command Options:
 --view                           inspect existing, don't generate
 --pretty                         pretty print
 -D --ensemble-domain <ensemble-domain>  specifies the ensemble domain [default: #f]
 --root  <ensemble-root>          specifies the ensemble root directory [default: #f]
 --public  <ensemble-public-address>  specifies the ensemble supervisor public address for TLS [default: #f]

The tool allows you to retrieve an existing configuration, or create and update it. The basic parameters you can specify are the ensemble domain, the root directory, and the public address for TLS.

Configure an ensemble role

You can do this with the gerbil ensemble config role command:

$ gerbil ensemble config help role
Usage: gxensemble config role [command-option ...]
       configure an ensemble role

Command Options:
 --role  <role>                   server role; a symbol [default: #f]
 --exe  <exe>                     executable path [default: #f]
 --prefix  <prefix>               executable arguments prefix; a list [default: #f]
 --suffix  <suffix>               executable arguments suffix; a list [default: #f]
 --policy  <policy>               supervisory policy [default: #f]
 --secondary-roles  <log-level>   the server secondary roles; a list of symbols [default: #f]
 --env  <env>                     server environment [default: #f]
 --envvars  <envvars>             server environment variables [default: #f]
 --log-level  <log-level>         the server log level [default: #f]
 -a --addresses <addresses>       server public addresses [default: #f]
 --known-servers  <known-servers>  server known servers for external communication [default: #f]
 --auth  <auth-servers>           server pre-authorized servers [default: #f]
 --application  <application>     role server application name [default: #f]
 -C --config <config>             server application configuration file [default: #f]

Perhaps the most important part is configuring the applications in a role; you can configure multiple applications with multiple invocations of the command, one application at a time.

Configure preloaded servers and workers

Preloaded servers are servers that are spawned by the supervisor when the ensemble starts up; preloading workers allows you to run multiple servers with the same role.

You can configure preloading with the following commands:

$ gerbil ensemble config help preload-server
Usage: gxensemble config preload-server [command-option ...] <server-id>
       configure a preloaded server for supervised execution as part of an ensemble

Command Options:
 -d --domain <domain>             specifies the server domain [default: #f]
 --role  <role>                   server role; a symbol [default: #f]
 -C --config <config>             server configuration file [default: #f]

Arguments:
 server-id                        the server id

$ gerbil ensemble config help preload-workers
Usage: gxensemble config preload-workers [command-option ...] <server-id>
       configure preloaded workers for supervised execution as part of an ensemble

Command Options:
 -d --domain <domain>             specifies the server domain [default: #f]
 --role  <role>                   server role; a symbol [default: #f]
 -n --workers <count>             number of workers [default: #f]
 -C --config <config>             server configuration file [default: #f]

Arguments:
 server-id                        the server id

Note that when configuring workers, the server id is the prefix of the worker server ids, which are incrementally assigned.

Configure a server

The gerbil ensemble config server command allows you to create a (partial) configuration for a server, that can be used by the other configuration commands.

Here is the usage:

$ gerbil ensemble config help server
Usage: gxensemble config server [command-option ...] <server-id>
       partially configure a server for supervised execution as part of an ensemble

Command Options:
 --role  <role>                   server role; a symbol [default: #f]
 --secondary-roles  <log-level>   the server secondary roles; a list of symbols [default: #f]
 --env  <env>                     server environment [default: #f]
 --envvars  <envvars>             server environment variables [default: #f]
 --log-level  <log-level>         the server log level [default: #f]
 -a --addresses <addresses>       server public addresses [default: #f]
 --known-servers  <known-servers>  server known servers for external communication [default: #f]
 --auth  <auth-servers>           server pre-authorized servers [default: #f]
 --application  <application>     role server application name [default: #f]
 -C --config <config>             server application configuration file [default: #f]

Arguments:
 server-id                        the server id

More on Ensemble Control Tooling

We have already seen the gerbil ensemble control command in action; it is the swiss army knife command that allows us to interact with the ensemble supervisor.

Here is the summary:

$ gerbil ensemble control help
Usage: gxensemble control  <command> command-arg ...

Commands:
 list-servers                     list supervised servers in the ensemble
 start-server                     start a supervised ensemble server
 start-workers                    start supervised ensemble workers
 stop-server                      stop some supervised ensemble servers
 restart-server                   restart some supervised ensemble servers
 get-server-log                   retrieve a supervised server log
 get-server-config                retrieve a server configuration
 update-server-config             update a supervisor server configuration
 get-ensemble-config              retrieve the supervised ensemble configuration
 update-ensemble-config           update the supervised ensemble configuration
 list-processes                   list processes running in the context of an ensemble supervisor
 exec-process                     execute a process in the context of an ensemble supervisor
 kill-process                     send a signal to a process
 restart-process                  restart a process by pid
 get-process-output               get a process's output
 upload                           upload an executable, environment overlay image, or file system overlay image as a tarball
 shell                            execute a shell command in the context of an ensemble supervisor
 shutdown                         shutdown a supervised ensemble, including the supervisor
 restart                          mass restart servers in a supervised ensemble
 help                             display help; help <command> for command help