PHP Swoole长连接常见问题总结

广告:宝塔Linux面板高效运维的服务器管理软件 点击【 https://www.bt.cn/p/uNLv1L 】立即购买

PHP Swoole长连接常见问题总结

连接失效问题

例子

其中,Redis常见的报错就是:

配置项:timeout

报错信息:Error while reading line from the server

Redis可以配置如果客户端经过多少秒还不给Redis服务器发送数据,那么就会把连接close掉。

推荐学习: swoole教程

MySQL常见的报错:

配置项:wait_timeout & interactive_timeout

报错信息:has gone away

和Redis服务器一样,MySQL也会定时的去清理掉没用的连接。

如何解决

1、用的时候进行重连

2、定时发送心跳维持连接

用的时候进行重连

优点是简单,缺点是面临短连接的问题。

定时发送心跳维持连接

推荐。

如何维持长连接

tcp协议中实现的tcp_keepalive

操作系统底层提供了一组tcp的keepalive配置:

tcp_keepalive_time (integer; default: 7200; since Linux 2.2)The number of seconds a connection needs to be idle before TCPbegins sending out keep-alive probes. Keep-alives are sent onlywhen the SO_KEEPALIVE socket option is enabled. The defaultvalue is 7200 seconds (2 hours). An idle connection isterminated after approximately an additional 11 minutes (9probes an interval of 75 seconds apart) when keep-alive isenabled. Note that underlying connection tracking mechanisms andapplication timeouts may be much shorter. tcp_keepalive_intvl (integer; default: 75; since Linux 2.4)The number of seconds between TCP keep-alive probes. tcp_keepalive_probes (integer; default: 9; since Linux 2.2)The maximum number of TCP keep-alive probes to send beforegiving up and killing the connection if no response is obtainedfrom the other end.8
登录后复制

Swoole底层把这些配置开放出来了,例如:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);
登录后复制

其中:

'open_tcp_keepalive' => 1, // 总开关,用来开启tcp_keepalive'tcp_keepidle' => 4, // 4s没有数据传输就进行检测// 检测的策略如下:'tcp_keepinterval' => 1, // 1s探测一次,即每隔1s给客户端发一个包(然后客户端可能会回一个ack的包,如果服务端收到了这个ack包,那么说明这个连接是活着的)'tcp_keepcount' => 5, // 探测的次数,超过5次后客户端还没有回ack包,那么close此连接
登录后复制

我们来实战测试体验一下,服务端脚本如下:

<?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1, // 开启tcp_keepalive'tcp_keepidle' => 4, // 4s没有数据传输就进行检测'tcp_keepinterval' => 1, // 1s探测一次'tcp_keepcount' => 5, // 探测的次数,超过5次后还没有回包close此连接]); $server->on('connect', function ($server, $fd) {var_dump("Client: Connect $fd");}); $server->on('receive', function ($server, $fd, $reactor_id, $data) {var_dump($data);}); $server->on('close', function ($server, $fd) {var_dump("close fd $fd");}); $server->start();
登录后复制

我们启动这个服务器:

 ~/codeDir/phpCode/hyperf-skeleton # php server.php
登录后复制

然后通过tcpdump进行抓包:

~/codeDir/phpCode/hyperf-skeleton # tcpdump -i lo port 6666

tcpdump: verbose output suppressed, use -v or -vv for full protocol decode

listening on lo, link-type EN10MB (Ethernet), capture size 262144 bytes

我们此时正在监听lo上的6666端口的数据包。

然后我们用客户端去连接它:

~/codeDir/phpCode/hyperf-skeleton # nc 127.0.0.1 6666
登录后复制

此时服务端会打印出消息:

~/codeDir/phpCode/hyperf-skeleton # php server.phpstring(17) "Client: Connect 1"
登录后复制

tcpdump的输出信息如下:

01:48:40.178439 IP localhost.33933 > localhost.6666: Flags [S], seq 43162537, win 43690, options [mss 65495,sackOK,TS val 9833698 ecr 0,nop,wscale 7], length 001:48:40.178484 IP localhost.6666 > localhost.33933: Flags [S.], seq 1327460565, ack 43162538, win 43690, options [mss 65495,sackOK,TS val 9833698 ecr 9833698,nop,wscale 7], length 001:48:40.178519 IP localhost.33933 > localhost.6666: Flags [.], ack 1, win 342, options [nop,nop,TS val 9833698 ecr 9833698], length 001:48:44.229926 IP localhost.6666 > localhost.33933: Flags [.], ack 1, win 342, options [nop,nop,TS val 9834104 ecr 9833698], length 001:48:44.229951 IP localhost.33933 > localhost.6666: Flags [.], ack 1, win 342, options [nop,nop,TS val 9834104 ecr 9833698], length 001:48:44.229926 IP localhost.6666 > localhost.33933: Flags [.], ack 1, win 342, options [nop,nop,TS val 9834104 ecr 9833698], length 001:48:44.229951 IP localhost.33933 > localhost.6666: Flags [.], ack 1, win 342, options [nop,nop,TS val 9834104 ecr 9833698], length 001:48:44.229926 IP localhost.6666 > localhost.33933: Flags [.], ack 1, win 342, options [nop,nop,TS val 9834104 ecr 9833698], length 0// 省略了其他的输出
登录后复制

我们会发现最开始的时候,会打印三次握手的包:

01:48:40.178439 IP localhost.33933 > localhost.6666: Flags [S], seq 43162537, win 43690, options [mss 65495,sackOK,TS val 9833698 ecr 0,nop,wscale 7], length 001:48:40.178484 IP localhost.6666 > localhost.33933: Flags [S.], seq 1327460565, ack 43162538, win 43690, options [mss 65495,sackOK,TS val 9833698 ecr 9833698,nop,wscale 7], length 001:48:40.178519 IP localhost.33933 > localhost.6666: Flags [.], ack 1, win 342, options [nop,nop,TS val 9833698 ecr 9833698], length 0
登录后复制

然后,停留了4s没有任何包的输出。

之后,每隔1s左右就会打印出一组:

01:52:54.359341 IP localhost.6666 > localhost.43101: Flags [.], ack 1, win 342, options [nop,nop,TS val 9859144 ecr 9858736], length 0 01:52:54.359377 IP localhost.43101 > localhost.6666: Flags [.], ack 1, win 342, options [nop,nop,TS val 9859144 ecr 9855887], length 0
登录后复制登录后复制

其实这就是我们配置的策略:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);0
登录后复制

因为我们操作系统底层会自动的给客户端回ack,所以这个连接不会在5次探测后被关闭。操作系统底层会持续不断的发送这样的一组包:

01:52:54.359341 IP localhost.6666 > localhost.43101: Flags [.], ack 1, win 342, options [nop,nop,TS val 9859144 ecr 9858736], length 0 01:52:54.359377 IP localhost.43101 > localhost.6666: Flags [.], ack 1, win 342, options [nop,nop,TS val 9859144 ecr 9855887], length 0
登录后复制登录后复制

如果我们要测试5次探测后关闭这个连接,可以禁掉6666端口的包:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);2
登录后复制

这样会把所有从6666端口进来的包给禁掉,自然,服务器就接收不到从客户端那一边发来的ack包了。

然后服务器过5秒就会打印出close(服务端主动的调用了close方法,给客户端发送了FIN包):

 ~/codeDir/phpCode/hyperf-skeleton # php server.php string(17) "Client: Connect 1" string(10) "close fd 1"
登录后复制登录后复制

我们恢复一下iptables的规则:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);4
登录后复制

即把我们设置的规则给删除了。

通过tcp_keepalive的方式实现心跳的功能,优点是简单,不要写代码就可以完成这个功能,并且发送的心跳包小。缺点是依赖于系统的网络环境,必须保证服务器和客户端都实现了这样的功能,需要客户端配合发心跳包。

还有一个更为严重的缺点是如果客户端和服务器不是直连的,而是通过代理来进行连接的,例如socks5代理,它只会转发应用层的包,不会转发更为底层的tcp探测包,那这个心跳功能就失效了。

所以,Swoole就提供了其他的解决方案,一组检测死连接的配置。

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);5
登录后复制

swoole实现的heartbeat

我们来测试一下:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);6
登录后复制

然后启动服务器:

~/codeDir/phpCode/hyperf-skeleton # php server.php

然后启动tcpdump:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);7
登录后复制

然后再启动客户端:

~/codeDir/phpCode/hyperf-skeleton # nc 127.0.0.1 6666

此时服务器端打印:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);8
登录后复制

然后tcpdump打印:

?php $server = new \Swoole\Server('127.0.0.1', 6666, SWOOLE_PROCESS); $server->set(['worker_num' => 1,'open_tcp_keepalive' => 1,'tcp_keepidle' => 4, // 对应tcp_keepalive_time'tcp_keepinterval' => 1, // 对应tcp_keepalive_intvl'tcp_keepcount' => 5, // 对应tcp_keepalive_probes]);9
登录后复制

这是三次握手信息。

然后过了5s后,tcpdump会打印出:

02:48:36.985027 IP localhost.6666 > localhost.42123: Flags [F.], seq 1, ack 1, win 342, options [nop,nop,TS val 10193789 ecr 10193342], length 0

02:48:36.992172 IP localhost.42123 > localhost.6666: Flags [.], ack 2, win 342, options [nop,nop,TS val 10193790 ecr 10193789], length 0

也就是服务端发送了FIN包。因为客户端没有发送数据,所以Swoole关闭了连接。

然后服务器端会打印:

 ~/codeDir/phpCode/hyperf-skeleton # php server.php string(17) "Client: Connect 1" string(10) "close fd 1"
登录后复制登录后复制

所以,heartbeat和tcp keepalive还是有一定的区别的,tcp keepalive有保活连接的功能,但是heartbeat存粹是检测没有数据的连接,然后关闭它,并且只可以在服务端这边配置,如果需要保活,也可以让客户端配合发送心跳。

如果我们不想让服务端close掉连接,那么就得在应用层里面不断的发送数据包来进行保活,例如我在nc客户端里面不断的发送包:

~/codeDir/phpCode/hyperf-skeleton # nc 127.0.0.1 6666pingpingpingpingpingpingpingpingping
登录后复制

我发送了9个ping包给服务器,tcpdump的输出如下:

'open_tcp_keepalive' => 1, // 总开关,用来开启tcp_keepalive'tcp_keepidle' => 4, // 4s没有数据传输就进行检测// 检测的策略如下:'tcp_keepinterval' => 1, // 1s探测一次,即每隔1s给客户端发一个包(然后客户端可能会回一个ack的包,如果服务端收到了这个ack包,那么说明这个连接是活着的)'tcp_keepcount' => 5, // 探测的次数,超过5次后客户端还没有回ack包,那么close此连接2
登录后复制

有9组数据包的发送。(这里的Flags [P.]代表Push的含义)

此时服务器还没有close掉连接,实现了客户端保活连接的功能。然后我们停止发送ping,过了5秒后tcpdump就会输出一组:

02:58:14.811761 IP localhost.6666 > localhost.44195: Flags [F.], seq 1, ack 46, win 342, options [nop,nop,TS val 10251636 ecr 10251145], length 0

02:58:14.816420 IP localhost.44195 > localhost.6666: Flags [.], ack 2, win 342, options [nop,nop,TS val 10251637 ecr 10251636], length 0

服务端那边发送了FIN包,说明服务端close掉了连接。服务端的输出如下:

~/codeDir/phpCode/hyperf-skeleton # php server.phpstring(17) "Client: Connect 1"string(5) "ping"string(5) "ping"string(5) "ping"string(5) "ping"string(5) "ping"string(5) "ping"string(5) "ping"string(5) "ping"string(5) "ping"string(10) "close fd 1"
登录后复制

然后我们在客户端那边ctrl + c来关闭连接:

~/codeDir/phpCode/hyperf-skeleton # nc 127.0.0.1 6666pingpingpingpingpingpingpingpingping^Cpunt!~/codeDir/phpCode/hyperf-skeleton #
登录后复制

此时,tcpdump的输出如下:

'open_tcp_keepalive' => 1, // 总开关,用来开启tcp_keepalive'tcp_keepidle' => 4, // 4s没有数据传输就进行检测// 检测的策略如下:'tcp_keepinterval' => 1, // 1s探测一次,即每隔1s给客户端发一个包(然后客户端可能会回一个ack的包,如果服务端收到了这个ack包,那么说明这个连接是活着的)'tcp_keepcount' => 5, // 探测的次数,超过5次后客户端还没有回ack包,那么close此连接5
登录后复制

应用层心跳

1、制定ping/pong协议(mysql等自带ping协议)

2、客户端灵活的发送ping心跳包

3、服务端OnRecive检查可用性回复pong

例如:

'open_tcp_keepalive' => 1, // 总开关,用来开启tcp_keepalive'tcp_keepidle' => 4, // 4s没有数据传输就进行检测// 检测的策略如下:'tcp_keepinterval' => 1, // 1s探测一次,即每隔1s给客户端发一个包(然后客户端可能会回一个ack的包,如果服务端收到了这个ack包,那么说明这个连接是活着的)'tcp_keepcount' => 5, // 探测的次数,超过5次后客户端还没有回ack包,那么close此连接6
登录后复制

结论

1、tcp的keepalive最简单,但是有兼容性问题,不够灵活

2、swoole提供的keepalive最实用,但是需要客户端配合,复杂度适中

3、应用层的keepalive最灵活但是最麻烦

以上就是PHP Swoole长连接常见问题总结的详细内容,更多请关注9543建站博客其它相关文章!

广告:SSL证书一年128.66元起,点击购买~~~

9543建站博客
一个专注于网站开发、微信开发的技术类纯净博客。

作者头像
admin创始人

肥猫,知名SEO博客站长,14年SEO经验。

上一篇:php 判断是不是在数组
下一篇:利用ThinkPHP6实现多语言版本境

发表评论

关闭广告
关闭广告