cluster.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699
  1. // Copyright 2018 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package tester
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "io"
  20. "io/ioutil"
  21. "math/rand"
  22. "net/http"
  23. "net/url"
  24. "path/filepath"
  25. "strings"
  26. "sync"
  27. "time"
  28. "github.com/coreos/etcd/functional/rpcpb"
  29. "github.com/coreos/etcd/pkg/debugutil"
  30. "github.com/coreos/etcd/pkg/fileutil"
  31. "github.com/prometheus/client_golang/prometheus/promhttp"
  32. "go.uber.org/zap"
  33. "golang.org/x/time/rate"
  34. "google.golang.org/grpc"
  35. )
  36. // Cluster defines tester cluster.
  37. type Cluster struct {
  38. lg *zap.Logger
  39. agentConns []*grpc.ClientConn
  40. agentClients []rpcpb.TransportClient
  41. agentStreams []rpcpb.Transport_TransportClient
  42. agentRequests []*rpcpb.Request
  43. testerHTTPServer *http.Server
  44. Members []*rpcpb.Member `yaml:"agent-configs"`
  45. Tester *rpcpb.Tester `yaml:"tester-config"`
  46. failures []Failure
  47. rateLimiter *rate.Limiter
  48. stresser Stresser
  49. checker Checker
  50. currentRevision int64
  51. rd int
  52. cs int
  53. }
  54. var dialOpts = []grpc.DialOption{
  55. grpc.WithInsecure(),
  56. grpc.WithTimeout(5 * time.Second),
  57. grpc.WithBlock(),
  58. }
  59. // NewCluster creates a client from a tester configuration.
  60. func NewCluster(lg *zap.Logger, fpath string) (*Cluster, error) {
  61. clus, err := read(lg, fpath)
  62. if err != nil {
  63. return nil, err
  64. }
  65. clus.agentConns = make([]*grpc.ClientConn, len(clus.Members))
  66. clus.agentClients = make([]rpcpb.TransportClient, len(clus.Members))
  67. clus.agentStreams = make([]rpcpb.Transport_TransportClient, len(clus.Members))
  68. clus.agentRequests = make([]*rpcpb.Request, len(clus.Members))
  69. clus.failures = make([]Failure, 0)
  70. for i, ap := range clus.Members {
  71. var err error
  72. clus.agentConns[i], err = grpc.Dial(ap.AgentAddr, dialOpts...)
  73. if err != nil {
  74. return nil, err
  75. }
  76. clus.agentClients[i] = rpcpb.NewTransportClient(clus.agentConns[i])
  77. clus.lg.Info("connected", zap.String("agent-address", ap.AgentAddr))
  78. clus.agentStreams[i], err = clus.agentClients[i].Transport(context.Background())
  79. if err != nil {
  80. return nil, err
  81. }
  82. clus.lg.Info("created stream", zap.String("agent-address", ap.AgentAddr))
  83. }
  84. mux := http.NewServeMux()
  85. mux.Handle("/metrics", promhttp.Handler())
  86. if clus.Tester.EnablePprof {
  87. for p, h := range debugutil.PProfHandlers() {
  88. mux.Handle(p, h)
  89. }
  90. }
  91. clus.testerHTTPServer = &http.Server{
  92. Addr: clus.Tester.Addr,
  93. Handler: mux,
  94. }
  95. go clus.serveTesterServer()
  96. clus.updateFailures()
  97. clus.rateLimiter = rate.NewLimiter(
  98. rate.Limit(int(clus.Tester.StressQPS)),
  99. int(clus.Tester.StressQPS),
  100. )
  101. clus.updateStresserChecker()
  102. return clus, nil
  103. }
  104. func (clus *Cluster) serveTesterServer() {
  105. clus.lg.Info(
  106. "started tester HTTP server",
  107. zap.String("tester-address", clus.Tester.Addr),
  108. )
  109. err := clus.testerHTTPServer.ListenAndServe()
  110. clus.lg.Info(
  111. "tester HTTP server returned",
  112. zap.String("tester-address", clus.Tester.Addr),
  113. zap.Error(err),
  114. )
  115. if err != nil && err != http.ErrServerClosed {
  116. clus.lg.Fatal("tester HTTP errored", zap.Error(err))
  117. }
  118. }
  119. func (clus *Cluster) updateFailures() {
  120. for _, cs := range clus.Tester.FailureCases {
  121. switch cs {
  122. case "SIGTERM_ONE_FOLLOWER":
  123. clus.failures = append(clus.failures,
  124. new_FailureCase_SIGTERM_ONE_FOLLOWER(clus))
  125. case "SIGTERM_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  126. clus.failures = append(clus.failures,
  127. new_FailureCase_SIGTERM_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT(clus))
  128. case "SIGTERM_LEADER":
  129. clus.failures = append(clus.failures,
  130. new_FailureCase_SIGTERM_LEADER(clus))
  131. case "SIGTERM_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  132. clus.failures = append(clus.failures,
  133. new_FailureCase_SIGTERM_LEADER_UNTIL_TRIGGER_SNAPSHOT(clus))
  134. case "SIGTERM_QUORUM":
  135. clus.failures = append(clus.failures,
  136. new_FailureCase_SIGTERM_QUORUM(clus))
  137. case "SIGTERM_ALL":
  138. clus.failures = append(clus.failures,
  139. new_FailureCase_SIGTERM_ALL(clus))
  140. case "BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER":
  141. clus.failures = append(clus.failures,
  142. new_FailureCase_BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER(clus))
  143. case "BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  144. clus.failures = append(clus.failures,
  145. new_FailureCase_BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT())
  146. case "BLACKHOLE_PEER_PORT_TX_RX_LEADER":
  147. clus.failures = append(clus.failures,
  148. new_FailureCase_BLACKHOLE_PEER_PORT_TX_RX_LEADER(clus))
  149. case "BLACKHOLE_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  150. clus.failures = append(clus.failures,
  151. new_FailureCase_BLACKHOLE_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT())
  152. case "BLACKHOLE_PEER_PORT_TX_RX_QUORUM":
  153. clus.failures = append(clus.failures,
  154. new_FailureCase_BLACKHOLE_PEER_PORT_TX_RX_QUORUM(clus))
  155. case "BLACKHOLE_PEER_PORT_TX_RX_ALL":
  156. clus.failures = append(clus.failures,
  157. new_FailureCase_BLACKHOLE_PEER_PORT_TX_RX_ALL(clus))
  158. case "DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER":
  159. clus.failures = append(clus.failures,
  160. new_FailureCase_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER(clus, false))
  161. case "RANDOM_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER":
  162. clus.failures = append(clus.failures,
  163. new_FailureCase_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER(clus, true))
  164. case "DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  165. clus.failures = append(clus.failures,
  166. new_FailureCase_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT(clus, false))
  167. case "RANDOM_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  168. clus.failures = append(clus.failures,
  169. new_FailureCase_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT(clus, true))
  170. case "DELAY_PEER_PORT_TX_RX_LEADER":
  171. clus.failures = append(clus.failures,
  172. new_FailureCase_DELAY_PEER_PORT_TX_RX_LEADER(clus, false))
  173. case "RANDOM_DELAY_PEER_PORT_TX_RX_LEADER":
  174. clus.failures = append(clus.failures,
  175. new_FailureCase_DELAY_PEER_PORT_TX_RX_LEADER(clus, true))
  176. case "DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  177. clus.failures = append(clus.failures,
  178. new_FailureCase_DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT(clus, false))
  179. case "RANDOM_DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  180. clus.failures = append(clus.failures,
  181. new_FailureCase_DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT(clus, true))
  182. case "DELAY_PEER_PORT_TX_RX_QUORUM":
  183. clus.failures = append(clus.failures,
  184. new_FailureCase_DELAY_PEER_PORT_TX_RX_QUORUM(clus, false))
  185. case "RANDOM_DELAY_PEER_PORT_TX_RX_QUORUM":
  186. clus.failures = append(clus.failures,
  187. new_FailureCase_DELAY_PEER_PORT_TX_RX_QUORUM(clus, true))
  188. case "DELAY_PEER_PORT_TX_RX_ALL":
  189. clus.failures = append(clus.failures,
  190. new_FailureCase_DELAY_PEER_PORT_TX_RX_ALL(clus, false))
  191. case "RANDOM_DELAY_PEER_PORT_TX_RX_ALL":
  192. clus.failures = append(clus.failures,
  193. new_FailureCase_DELAY_PEER_PORT_TX_RX_ALL(clus, true))
  194. case "NO_FAIL_WITH_STRESS":
  195. clus.failures = append(clus.failures,
  196. new_FailureCase_NO_FAIL_WITH_STRESS(clus))
  197. case "NO_FAIL_WITH_NO_STRESS_FOR_LIVENESS":
  198. clus.failures = append(clus.failures,
  199. new_FailureCase_NO_FAIL_WITH_NO_STRESS_FOR_LIVENESS(clus))
  200. case "EXTERNAL":
  201. clus.failures = append(clus.failures,
  202. new_FailureCase_EXTERNAL(clus.Tester.ExternalExecPath))
  203. case "FAILPOINTS":
  204. fpFailures, fperr := failpointFailures(clus)
  205. if len(fpFailures) == 0 {
  206. clus.lg.Info("no failpoints found!", zap.Error(fperr))
  207. }
  208. clus.failures = append(clus.failures,
  209. fpFailures...)
  210. }
  211. }
  212. }
  213. func (clus *Cluster) failureStrings() (fs []string) {
  214. fs = make([]string, len(clus.failures))
  215. for i := range clus.failures {
  216. fs[i] = clus.failures[i].Desc()
  217. }
  218. return fs
  219. }
  220. // UpdateDelayLatencyMs updates delay latency with random value
  221. // within election timeout.
  222. func (clus *Cluster) UpdateDelayLatencyMs() {
  223. rand.Seed(time.Now().UnixNano())
  224. clus.Tester.UpdatedDelayLatencyMs = uint32(rand.Int63n(clus.Members[0].Etcd.ElectionTimeoutMs))
  225. minLatRv := clus.Tester.DelayLatencyMsRv + clus.Tester.DelayLatencyMsRv/5
  226. if clus.Tester.UpdatedDelayLatencyMs <= minLatRv {
  227. clus.Tester.UpdatedDelayLatencyMs += minLatRv
  228. }
  229. }
  230. func (clus *Cluster) updateStresserChecker() {
  231. cs := &compositeStresser{}
  232. for _, m := range clus.Members {
  233. cs.stressers = append(cs.stressers, newStresser(clus, m))
  234. }
  235. clus.stresser = cs
  236. if clus.Tester.ConsistencyCheck {
  237. clus.checker = newHashChecker(clus.lg, hashAndRevGetter(clus))
  238. if schk := cs.Checker(); schk != nil {
  239. clus.checker = newCompositeChecker([]Checker{clus.checker, schk})
  240. }
  241. } else {
  242. clus.checker = newNoChecker()
  243. }
  244. clus.lg.Info("updated stressers")
  245. }
  246. func (clus *Cluster) checkConsistency() (err error) {
  247. defer func() {
  248. if err != nil {
  249. return
  250. }
  251. if err = clus.updateRevision(); err != nil {
  252. clus.lg.Warn(
  253. "updateRevision failed",
  254. zap.Error(err),
  255. )
  256. return
  257. }
  258. }()
  259. if err = clus.checker.Check(); err != nil {
  260. clus.lg.Warn(
  261. "consistency check FAIL",
  262. zap.Int("round", clus.rd),
  263. zap.Int("case", clus.cs),
  264. zap.Error(err),
  265. )
  266. return err
  267. }
  268. clus.lg.Info(
  269. "consistency check ALL PASS",
  270. zap.Int("round", clus.rd),
  271. zap.Int("case", clus.cs),
  272. zap.String("desc", clus.failures[clus.cs].Desc()),
  273. )
  274. return err
  275. }
  276. // Send_INITIAL_START_ETCD bootstraps etcd cluster the very first time.
  277. // After this, just continue to call kill/restart.
  278. func (clus *Cluster) Send_INITIAL_START_ETCD() error {
  279. // this is the only time that creates request from scratch
  280. return clus.broadcast(rpcpb.Operation_INITIAL_START_ETCD)
  281. }
  282. // send_SIGQUIT_ETCD_AND_ARCHIVE_DATA sends "send_SIGQUIT_ETCD_AND_ARCHIVE_DATA" operation.
  283. func (clus *Cluster) send_SIGQUIT_ETCD_AND_ARCHIVE_DATA() error {
  284. return clus.broadcast(rpcpb.Operation_SIGQUIT_ETCD_AND_ARCHIVE_DATA)
  285. }
  286. // send_RESTART_ETCD sends restart operation.
  287. func (clus *Cluster) send_RESTART_ETCD() error {
  288. return clus.broadcast(rpcpb.Operation_RESTART_ETCD)
  289. }
  290. func (clus *Cluster) broadcast(op rpcpb.Operation) error {
  291. var wg sync.WaitGroup
  292. wg.Add(len(clus.agentStreams))
  293. errc := make(chan error, len(clus.agentStreams))
  294. for i := range clus.agentStreams {
  295. go func(idx int, o rpcpb.Operation) {
  296. defer wg.Done()
  297. errc <- clus.sendOp(idx, o)
  298. }(i, op)
  299. }
  300. wg.Wait()
  301. close(errc)
  302. errs := []string{}
  303. for err := range errc {
  304. if err == nil {
  305. continue
  306. }
  307. if err != nil {
  308. destroyed := false
  309. if op == rpcpb.Operation_SIGQUIT_ETCD_AND_REMOVE_DATA_AND_STOP_AGENT {
  310. if err == io.EOF {
  311. destroyed = true
  312. }
  313. if strings.Contains(err.Error(),
  314. "rpc error: code = Unavailable desc = transport is closing") {
  315. // agent server has already closed;
  316. // so this error is expected
  317. destroyed = true
  318. }
  319. if strings.Contains(err.Error(),
  320. "desc = os: process already finished") {
  321. destroyed = true
  322. }
  323. }
  324. if !destroyed {
  325. errs = append(errs, err.Error())
  326. }
  327. }
  328. }
  329. if len(errs) == 0 {
  330. return nil
  331. }
  332. return errors.New(strings.Join(errs, ", "))
  333. }
  334. func (clus *Cluster) sendOp(idx int, op rpcpb.Operation) error {
  335. if op == rpcpb.Operation_INITIAL_START_ETCD {
  336. clus.agentRequests[idx] = &rpcpb.Request{
  337. Operation: op,
  338. Member: clus.Members[idx],
  339. Tester: clus.Tester,
  340. }
  341. } else {
  342. clus.agentRequests[idx].Operation = op
  343. }
  344. err := clus.agentStreams[idx].Send(clus.agentRequests[idx])
  345. clus.lg.Info(
  346. "sent request",
  347. zap.String("operation", op.String()),
  348. zap.String("to", clus.Members[idx].EtcdClientEndpoint),
  349. zap.Error(err),
  350. )
  351. if err != nil {
  352. return err
  353. }
  354. resp, err := clus.agentStreams[idx].Recv()
  355. if resp != nil {
  356. clus.lg.Info(
  357. "received response",
  358. zap.String("operation", op.String()),
  359. zap.String("from", clus.Members[idx].EtcdClientEndpoint),
  360. zap.Bool("success", resp.Success),
  361. zap.String("status", resp.Status),
  362. zap.Error(err),
  363. )
  364. } else {
  365. clus.lg.Info(
  366. "received empty response",
  367. zap.String("operation", op.String()),
  368. zap.String("from", clus.Members[idx].EtcdClientEndpoint),
  369. zap.Error(err),
  370. )
  371. }
  372. if err != nil {
  373. return err
  374. }
  375. if !resp.Success {
  376. return errors.New(resp.Status)
  377. }
  378. m, secure := clus.Members[idx], false
  379. for _, cu := range m.Etcd.AdvertiseClientURLs {
  380. u, err := url.Parse(cu)
  381. if err != nil {
  382. return err
  383. }
  384. if u.Scheme == "https" { // TODO: handle unix
  385. secure = true
  386. }
  387. }
  388. // store TLS assets from agents/servers onto disk
  389. if secure && (op == rpcpb.Operation_INITIAL_START_ETCD || op == rpcpb.Operation_RESTART_ETCD) {
  390. dirClient := filepath.Join(
  391. clus.Tester.DataDir,
  392. clus.Members[idx].Etcd.Name,
  393. "fixtures",
  394. "client",
  395. )
  396. if err = fileutil.TouchDirAll(dirClient); err != nil {
  397. return err
  398. }
  399. clientCertData := []byte(resp.Member.ClientCertData)
  400. if len(clientCertData) == 0 {
  401. return fmt.Errorf("got empty client cert from %q", m.EtcdClientEndpoint)
  402. }
  403. clientCertPath := filepath.Join(dirClient, "cert.pem")
  404. if err = ioutil.WriteFile(clientCertPath, clientCertData, 0644); err != nil { // overwrite if exists
  405. return err
  406. }
  407. resp.Member.ClientCertPath = clientCertPath
  408. clus.lg.Info(
  409. "saved client cert file",
  410. zap.String("path", clientCertPath),
  411. )
  412. clientKeyData := []byte(resp.Member.ClientKeyData)
  413. if len(clientKeyData) == 0 {
  414. return fmt.Errorf("got empty client key from %q", m.EtcdClientEndpoint)
  415. }
  416. clientKeyPath := filepath.Join(dirClient, "key.pem")
  417. if err = ioutil.WriteFile(clientKeyPath, clientKeyData, 0644); err != nil { // overwrite if exists
  418. return err
  419. }
  420. resp.Member.ClientKeyPath = clientKeyPath
  421. clus.lg.Info(
  422. "saved client key file",
  423. zap.String("path", clientKeyPath),
  424. )
  425. clientTrustedCAData := []byte(resp.Member.ClientTrustedCAData)
  426. if len(clientTrustedCAData) != 0 {
  427. // TODO: disable this when auto TLS is deprecated
  428. clientTrustedCAPath := filepath.Join(dirClient, "ca.pem")
  429. if err = ioutil.WriteFile(clientTrustedCAPath, clientTrustedCAData, 0644); err != nil { // overwrite if exists
  430. return err
  431. }
  432. resp.Member.ClientTrustedCAPath = clientTrustedCAPath
  433. clus.lg.Info(
  434. "saved client trusted CA file",
  435. zap.String("path", clientTrustedCAPath),
  436. )
  437. }
  438. // no need to store peer certs for tester clients
  439. clus.Members[idx] = resp.Member
  440. }
  441. return nil
  442. }
  443. // Send_SIGQUIT_ETCD_AND_REMOVE_DATA_AND_STOP_AGENT terminates all tester connections to agents and etcd servers.
  444. func (clus *Cluster) Send_SIGQUIT_ETCD_AND_REMOVE_DATA_AND_STOP_AGENT() {
  445. err := clus.broadcast(rpcpb.Operation_SIGQUIT_ETCD_AND_REMOVE_DATA_AND_STOP_AGENT)
  446. if err != nil {
  447. clus.lg.Warn("destroying etcd/agents FAIL", zap.Error(err))
  448. } else {
  449. clus.lg.Info("destroying etcd/agents PASS")
  450. }
  451. for i, conn := range clus.agentConns {
  452. err := conn.Close()
  453. clus.lg.Info("closed connection to agent", zap.String("agent-address", clus.Members[i].AgentAddr), zap.Error(err))
  454. }
  455. if clus.testerHTTPServer != nil {
  456. ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
  457. err := clus.testerHTTPServer.Shutdown(ctx)
  458. cancel()
  459. clus.lg.Info("closed tester HTTP server", zap.String("tester-address", clus.Tester.Addr), zap.Error(err))
  460. }
  461. }
  462. // WaitHealth ensures all members are healthy
  463. // by writing a test key to etcd cluster.
  464. func (clus *Cluster) WaitHealth() error {
  465. var err error
  466. // wait 60s to check cluster health.
  467. // TODO: set it to a reasonable value. It is set that high because
  468. // follower may use long time to catch up the leader when reboot under
  469. // reasonable workload (https://github.com/coreos/etcd/issues/2698)
  470. for i := 0; i < 60; i++ {
  471. for _, m := range clus.Members {
  472. if err = m.WriteHealthKey(); err != nil {
  473. clus.lg.Warn(
  474. "health check FAIL",
  475. zap.Int("retries", i),
  476. zap.String("endpoint", m.EtcdClientEndpoint),
  477. zap.Error(err),
  478. )
  479. break
  480. }
  481. clus.lg.Info(
  482. "health check PASS",
  483. zap.Int("retries", i),
  484. zap.String("endpoint", m.EtcdClientEndpoint),
  485. )
  486. }
  487. if err == nil {
  488. clus.lg.Info(
  489. "health check ALL PASS",
  490. zap.Int("round", clus.rd),
  491. zap.Int("case", clus.cs),
  492. )
  493. return nil
  494. }
  495. time.Sleep(time.Second)
  496. }
  497. return err
  498. }
  499. // GetLeader returns the index of leader and error if any.
  500. func (clus *Cluster) GetLeader() (int, error) {
  501. for i, m := range clus.Members {
  502. isLeader, err := m.IsLeader()
  503. if isLeader || err != nil {
  504. return i, err
  505. }
  506. }
  507. return 0, fmt.Errorf("no leader found")
  508. }
  509. // maxRev returns the maximum revision found on the cluster.
  510. func (clus *Cluster) maxRev() (rev int64, err error) {
  511. ctx, cancel := context.WithTimeout(context.TODO(), time.Second)
  512. defer cancel()
  513. revc, errc := make(chan int64, len(clus.Members)), make(chan error, len(clus.Members))
  514. for i := range clus.Members {
  515. go func(m *rpcpb.Member) {
  516. mrev, merr := m.Rev(ctx)
  517. revc <- mrev
  518. errc <- merr
  519. }(clus.Members[i])
  520. }
  521. for i := 0; i < len(clus.Members); i++ {
  522. if merr := <-errc; merr != nil {
  523. err = merr
  524. }
  525. if mrev := <-revc; mrev > rev {
  526. rev = mrev
  527. }
  528. }
  529. return rev, err
  530. }
  531. func (clus *Cluster) getRevisionHash() (map[string]int64, map[string]int64, error) {
  532. revs := make(map[string]int64)
  533. hashes := make(map[string]int64)
  534. for _, m := range clus.Members {
  535. rev, hash, err := m.RevHash()
  536. if err != nil {
  537. return nil, nil, err
  538. }
  539. revs[m.EtcdClientEndpoint] = rev
  540. hashes[m.EtcdClientEndpoint] = hash
  541. }
  542. return revs, hashes, nil
  543. }
  544. func (clus *Cluster) compactKV(rev int64, timeout time.Duration) (err error) {
  545. if rev <= 0 {
  546. return nil
  547. }
  548. for i, m := range clus.Members {
  549. clus.lg.Info(
  550. "compact START",
  551. zap.String("endpoint", m.EtcdClientEndpoint),
  552. zap.Int64("compact-revision", rev),
  553. zap.Duration("timeout", timeout),
  554. )
  555. now := time.Now()
  556. cerr := m.Compact(rev, timeout)
  557. succeed := true
  558. if cerr != nil {
  559. if strings.Contains(cerr.Error(), "required revision has been compacted") && i > 0 {
  560. clus.lg.Info(
  561. "compact error is ignored",
  562. zap.String("endpoint", m.EtcdClientEndpoint),
  563. zap.Int64("compact-revision", rev),
  564. zap.Error(cerr),
  565. )
  566. } else {
  567. clus.lg.Warn(
  568. "compact FAIL",
  569. zap.String("endpoint", m.EtcdClientEndpoint),
  570. zap.Int64("compact-revision", rev),
  571. zap.Error(cerr),
  572. )
  573. err = cerr
  574. succeed = false
  575. }
  576. }
  577. if succeed {
  578. clus.lg.Info(
  579. "compact PASS",
  580. zap.String("endpoint", m.EtcdClientEndpoint),
  581. zap.Int64("compact-revision", rev),
  582. zap.Duration("timeout", timeout),
  583. zap.Duration("took", time.Since(now)),
  584. )
  585. }
  586. }
  587. return err
  588. }
  589. func (clus *Cluster) checkCompact(rev int64) error {
  590. if rev == 0 {
  591. return nil
  592. }
  593. for _, m := range clus.Members {
  594. if err := m.CheckCompact(rev); err != nil {
  595. return err
  596. }
  597. }
  598. return nil
  599. }
  600. func (clus *Cluster) defrag() error {
  601. for _, m := range clus.Members {
  602. if err := m.Defrag(); err != nil {
  603. clus.lg.Warn(
  604. "defrag FAIL",
  605. zap.String("endpoint", m.EtcdClientEndpoint),
  606. zap.Error(err),
  607. )
  608. return err
  609. }
  610. clus.lg.Info(
  611. "defrag PASS",
  612. zap.String("endpoint", m.EtcdClientEndpoint),
  613. )
  614. }
  615. clus.lg.Info(
  616. "defrag ALL PASS",
  617. zap.Int("round", clus.rd),
  618. zap.Int("case", clus.cs),
  619. zap.Int("case-total", len(clus.failures)),
  620. )
  621. return nil
  622. }
  623. // GetFailureDelayDuration computes failure delay duration.
  624. func (clus *Cluster) GetFailureDelayDuration() time.Duration {
  625. return time.Duration(clus.Tester.FailureDelayMs) * time.Millisecond
  626. }
  627. // Report reports the number of modified keys.
  628. func (clus *Cluster) Report() int64 {
  629. return clus.stresser.ModifiedKeys()
  630. }