cluster.go 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658
  1. // Copyright 2018 The etcd Authors
  2. //
  3. // Licensed under the Apache License, Version 2.0 (the "License");
  4. // you may not use this file except in compliance with the License.
  5. // You may obtain a copy of the License at
  6. //
  7. // http://www.apache.org/licenses/LICENSE-2.0
  8. //
  9. // Unless required by applicable law or agreed to in writing, software
  10. // distributed under the License is distributed on an "AS IS" BASIS,
  11. // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  12. // See the License for the specific language governing permissions and
  13. // limitations under the License.
  14. package tester
  15. import (
  16. "context"
  17. "errors"
  18. "fmt"
  19. "io/ioutil"
  20. "math/rand"
  21. "net/http"
  22. "net/url"
  23. "path/filepath"
  24. "strings"
  25. "sync"
  26. "time"
  27. "github.com/coreos/etcd/functional/rpcpb"
  28. "github.com/coreos/etcd/pkg/debugutil"
  29. "github.com/coreos/etcd/pkg/fileutil"
  30. "github.com/prometheus/client_golang/prometheus/promhttp"
  31. "go.uber.org/zap"
  32. "golang.org/x/time/rate"
  33. "google.golang.org/grpc"
  34. )
  35. // Cluster defines tester cluster.
  36. type Cluster struct {
  37. lg *zap.Logger
  38. agentConns []*grpc.ClientConn
  39. agentClients []rpcpb.TransportClient
  40. agentStreams []rpcpb.Transport_TransportClient
  41. agentRequests []*rpcpb.Request
  42. testerHTTPServer *http.Server
  43. Members []*rpcpb.Member `yaml:"agent-configs"`
  44. Tester *rpcpb.Tester `yaml:"tester-config"`
  45. failures []Failure
  46. rateLimiter *rate.Limiter
  47. stresser Stresser
  48. checker Checker
  49. currentRevision int64
  50. rd int
  51. cs int
  52. }
  53. var dialOpts = []grpc.DialOption{
  54. grpc.WithInsecure(),
  55. grpc.WithTimeout(5 * time.Second),
  56. grpc.WithBlock(),
  57. }
  58. // NewCluster creates a client from a tester configuration.
  59. func NewCluster(lg *zap.Logger, fpath string) (*Cluster, error) {
  60. clus, err := read(lg, fpath)
  61. if err != nil {
  62. return nil, err
  63. }
  64. clus.agentConns = make([]*grpc.ClientConn, len(clus.Members))
  65. clus.agentClients = make([]rpcpb.TransportClient, len(clus.Members))
  66. clus.agentStreams = make([]rpcpb.Transport_TransportClient, len(clus.Members))
  67. clus.agentRequests = make([]*rpcpb.Request, len(clus.Members))
  68. clus.failures = make([]Failure, 0)
  69. for i, ap := range clus.Members {
  70. var err error
  71. clus.agentConns[i], err = grpc.Dial(ap.AgentAddr, dialOpts...)
  72. if err != nil {
  73. return nil, err
  74. }
  75. clus.agentClients[i] = rpcpb.NewTransportClient(clus.agentConns[i])
  76. clus.lg.Info("connected", zap.String("agent-address", ap.AgentAddr))
  77. clus.agentStreams[i], err = clus.agentClients[i].Transport(context.Background())
  78. if err != nil {
  79. return nil, err
  80. }
  81. clus.lg.Info("created stream", zap.String("agent-address", ap.AgentAddr))
  82. }
  83. mux := http.NewServeMux()
  84. mux.Handle("/metrics", promhttp.Handler())
  85. if clus.Tester.EnablePprof {
  86. for p, h := range debugutil.PProfHandlers() {
  87. mux.Handle(p, h)
  88. }
  89. }
  90. clus.testerHTTPServer = &http.Server{
  91. Addr: clus.Tester.Addr,
  92. Handler: mux,
  93. }
  94. go clus.serveTesterServer()
  95. clus.updateFailures()
  96. clus.rateLimiter = rate.NewLimiter(
  97. rate.Limit(int(clus.Tester.StressQPS)),
  98. int(clus.Tester.StressQPS),
  99. )
  100. clus.updateStresserChecker()
  101. return clus, nil
  102. }
  103. func (clus *Cluster) serveTesterServer() {
  104. clus.lg.Info(
  105. "started tester HTTP server",
  106. zap.String("tester-address", clus.Tester.Addr),
  107. )
  108. err := clus.testerHTTPServer.ListenAndServe()
  109. clus.lg.Info(
  110. "tester HTTP server returned",
  111. zap.String("tester-address", clus.Tester.Addr),
  112. zap.Error(err),
  113. )
  114. if err != nil && err != http.ErrServerClosed {
  115. clus.lg.Fatal("tester HTTP errored", zap.Error(err))
  116. }
  117. }
  118. func (clus *Cluster) updateFailures() {
  119. for _, cs := range clus.Tester.FailureCases {
  120. switch cs {
  121. case "KILL_ONE_FOLLOWER":
  122. clus.failures = append(clus.failures, newFailureKillOneFollower())
  123. case "KILL_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  124. clus.failures = append(clus.failures, newFailureKillOneFollowerUntilTriggerSnapshot())
  125. case "KILL_LEADER":
  126. clus.failures = append(clus.failures, newFailureKillLeader())
  127. case "KILL_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  128. clus.failures = append(clus.failures, newFailureKillLeaderUntilTriggerSnapshot())
  129. case "KILL_QUORUM":
  130. clus.failures = append(clus.failures, newFailureKillQuorum())
  131. case "KILL_ALL":
  132. clus.failures = append(clus.failures, newFailureKillAll())
  133. case "BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER":
  134. clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxOneFollower(clus))
  135. case "BLACKHOLE_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  136. clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxOneFollowerUntilTriggerSnapshot())
  137. case "BLACKHOLE_PEER_PORT_TX_RX_LEADER":
  138. clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxLeader(clus))
  139. case "BLACKHOLE_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  140. clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxLeaderUntilTriggerSnapshot())
  141. case "BLACKHOLE_PEER_PORT_TX_RX_QUORUM":
  142. clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxQuorum(clus))
  143. case "BLACKHOLE_PEER_PORT_TX_RX_ALL":
  144. clus.failures = append(clus.failures, newFailureBlackholePeerPortTxRxAll(clus))
  145. case "DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER":
  146. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollower(clus, false))
  147. case "RANDOM_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER":
  148. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollower(clus, true))
  149. case "DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  150. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollowerUntilTriggerSnapshot(clus, false))
  151. case "RANDOM_DELAY_PEER_PORT_TX_RX_ONE_FOLLOWER_UNTIL_TRIGGER_SNAPSHOT":
  152. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxOneFollowerUntilTriggerSnapshot(clus, true))
  153. case "DELAY_PEER_PORT_TX_RX_LEADER":
  154. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeader(clus, false))
  155. case "RANDOM_DELAY_PEER_PORT_TX_RX_LEADER":
  156. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeader(clus, true))
  157. case "DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  158. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeaderUntilTriggerSnapshot(clus, false))
  159. case "RANDOM_DELAY_PEER_PORT_TX_RX_LEADER_UNTIL_TRIGGER_SNAPSHOT":
  160. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxLeaderUntilTriggerSnapshot(clus, true))
  161. case "DELAY_PEER_PORT_TX_RX_QUORUM":
  162. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxQuorum(clus, false))
  163. case "RANDOM_DELAY_PEER_PORT_TX_RX_QUORUM":
  164. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxQuorum(clus, true))
  165. case "DELAY_PEER_PORT_TX_RX_ALL":
  166. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxAll(clus, false))
  167. case "RANDOM_DELAY_PEER_PORT_TX_RX_ALL":
  168. clus.failures = append(clus.failures, newFailureDelayPeerPortTxRxAll(clus, true))
  169. case "NO_FAIL_WITH_STRESS":
  170. clus.failures = append(clus.failures, newFailureNoFailWithStress(clus))
  171. case "NO_FAIL_WITH_NO_STRESS_FOR_LIVENESS":
  172. clus.failures = append(clus.failures, newFailureNoFailWithNoStressForLiveness(clus))
  173. case "EXTERNAL":
  174. clus.failures = append(clus.failures, newFailureExternal(clus.Tester.ExternalExecPath))
  175. case "FAILPOINTS":
  176. fpFailures, fperr := failpointFailures(clus)
  177. if len(fpFailures) == 0 {
  178. clus.lg.Info("no failpoints found!", zap.Error(fperr))
  179. }
  180. clus.failures = append(clus.failures, fpFailures...)
  181. }
  182. }
  183. }
  184. func (clus *Cluster) failureStrings() (fs []string) {
  185. fs = make([]string, len(clus.failures))
  186. for i := range clus.failures {
  187. fs[i] = clus.failures[i].Desc()
  188. }
  189. return fs
  190. }
  191. // UpdateDelayLatencyMs updates delay latency with random value
  192. // within election timeout.
  193. func (clus *Cluster) UpdateDelayLatencyMs() {
  194. rand.Seed(time.Now().UnixNano())
  195. clus.Tester.UpdatedDelayLatencyMs = uint32(rand.Int63n(clus.Members[0].Etcd.ElectionTimeoutMs))
  196. minLatRv := clus.Tester.DelayLatencyMsRv + clus.Tester.DelayLatencyMsRv/5
  197. if clus.Tester.UpdatedDelayLatencyMs <= minLatRv {
  198. clus.Tester.UpdatedDelayLatencyMs += minLatRv
  199. }
  200. }
  201. func (clus *Cluster) updateStresserChecker() {
  202. cs := &compositeStresser{}
  203. for _, m := range clus.Members {
  204. cs.stressers = append(cs.stressers, newStresser(clus, m))
  205. }
  206. clus.stresser = cs
  207. if clus.Tester.ConsistencyCheck {
  208. clus.checker = newHashChecker(clus.lg, hashAndRevGetter(clus))
  209. if schk := cs.Checker(); schk != nil {
  210. clus.checker = newCompositeChecker([]Checker{clus.checker, schk})
  211. }
  212. } else {
  213. clus.checker = newNoChecker()
  214. }
  215. clus.lg.Info("updated stressers")
  216. }
  217. func (clus *Cluster) checkConsistency() (err error) {
  218. defer func() {
  219. if err != nil {
  220. return
  221. }
  222. if err = clus.updateRevision(); err != nil {
  223. clus.lg.Warn(
  224. "updateRevision failed",
  225. zap.Error(err),
  226. )
  227. return
  228. }
  229. }()
  230. if err = clus.checker.Check(); err != nil {
  231. clus.lg.Warn(
  232. "consistency check FAIL",
  233. zap.Int("round", clus.rd),
  234. zap.Int("case", clus.cs),
  235. zap.Error(err),
  236. )
  237. return err
  238. }
  239. clus.lg.Info(
  240. "consistency check ALL PASS",
  241. zap.Int("round", clus.rd),
  242. zap.Int("case", clus.cs),
  243. zap.String("desc", clus.failures[clus.cs].Desc()),
  244. )
  245. return err
  246. }
  247. // Bootstrap bootstraps etcd cluster the very first time.
  248. // After this, just continue to call kill/restart.
  249. func (clus *Cluster) Bootstrap() error {
  250. // this is the only time that creates request from scratch
  251. return clus.broadcastOperation(rpcpb.Operation_InitialStartEtcd)
  252. }
  253. // FailArchive sends "FailArchive" operation.
  254. func (clus *Cluster) FailArchive() error {
  255. return clus.broadcastOperation(rpcpb.Operation_FailArchive)
  256. }
  257. // Restart sends "Restart" operation.
  258. func (clus *Cluster) Restart() error {
  259. return clus.broadcastOperation(rpcpb.Operation_RestartEtcd)
  260. }
  261. func (clus *Cluster) broadcastOperation(op rpcpb.Operation) error {
  262. var wg sync.WaitGroup
  263. wg.Add(len(clus.agentStreams))
  264. errc := make(chan error, len(clus.agentStreams))
  265. for i := range clus.agentStreams {
  266. go func(idx int, o rpcpb.Operation) {
  267. defer wg.Done()
  268. errc <- clus.sendOperation(idx, o)
  269. }(i, op)
  270. }
  271. wg.Wait()
  272. close(errc)
  273. errs := []string{}
  274. for err := range errc {
  275. if err == nil {
  276. continue
  277. }
  278. if err != nil &&
  279. op == rpcpb.Operation_DestroyEtcdAgent &&
  280. strings.Contains(err.Error(), "rpc error: code = Unavailable desc = transport is closing") {
  281. // agent server has already closed;
  282. // so this error is expected
  283. clus.lg.Info("successfully destroyed all")
  284. continue
  285. }
  286. errs = append(errs, err.Error())
  287. }
  288. if len(errs) == 0 {
  289. return nil
  290. }
  291. return errors.New(strings.Join(errs, ", "))
  292. }
  293. func (clus *Cluster) sendOperation(idx int, op rpcpb.Operation) error {
  294. if op == rpcpb.Operation_InitialStartEtcd {
  295. clus.agentRequests[idx] = &rpcpb.Request{
  296. Operation: op,
  297. Member: clus.Members[idx],
  298. Tester: clus.Tester,
  299. }
  300. } else {
  301. clus.agentRequests[idx].Operation = op
  302. }
  303. err := clus.agentStreams[idx].Send(clus.agentRequests[idx])
  304. clus.lg.Info(
  305. "sent request",
  306. zap.String("operation", op.String()),
  307. zap.String("to", clus.Members[idx].EtcdClientEndpoint),
  308. zap.Error(err),
  309. )
  310. if err != nil {
  311. return err
  312. }
  313. resp, err := clus.agentStreams[idx].Recv()
  314. if resp != nil {
  315. clus.lg.Info(
  316. "received response",
  317. zap.String("operation", op.String()),
  318. zap.String("from", clus.Members[idx].EtcdClientEndpoint),
  319. zap.Bool("success", resp.Success),
  320. zap.String("status", resp.Status),
  321. zap.Error(err),
  322. )
  323. } else {
  324. clus.lg.Info(
  325. "received empty response",
  326. zap.String("operation", op.String()),
  327. zap.String("from", clus.Members[idx].EtcdClientEndpoint),
  328. zap.Error(err),
  329. )
  330. }
  331. if err != nil {
  332. return err
  333. }
  334. if !resp.Success {
  335. return errors.New(resp.Status)
  336. }
  337. m, secure := clus.Members[idx], false
  338. for _, cu := range m.Etcd.AdvertiseClientURLs {
  339. u, err := url.Parse(cu)
  340. if err != nil {
  341. return err
  342. }
  343. if u.Scheme == "https" { // TODO: handle unix
  344. secure = true
  345. }
  346. }
  347. // store TLS assets from agents/servers onto disk
  348. if secure && (op == rpcpb.Operation_InitialStartEtcd || op == rpcpb.Operation_RestartEtcd) {
  349. dirClient := filepath.Join(
  350. clus.Tester.DataDir,
  351. clus.Members[idx].Etcd.Name,
  352. "fixtures",
  353. "client",
  354. )
  355. if err = fileutil.TouchDirAll(dirClient); err != nil {
  356. return err
  357. }
  358. clientCertData := []byte(resp.Member.ClientCertData)
  359. if len(clientCertData) == 0 {
  360. return fmt.Errorf("got empty client cert from %q", m.EtcdClientEndpoint)
  361. }
  362. clientCertPath := filepath.Join(dirClient, "cert.pem")
  363. if err = ioutil.WriteFile(clientCertPath, clientCertData, 0644); err != nil { // overwrite if exists
  364. return err
  365. }
  366. resp.Member.ClientCertPath = clientCertPath
  367. clus.lg.Info(
  368. "saved client cert file",
  369. zap.String("path", clientCertPath),
  370. )
  371. clientKeyData := []byte(resp.Member.ClientKeyData)
  372. if len(clientKeyData) == 0 {
  373. return fmt.Errorf("got empty client key from %q", m.EtcdClientEndpoint)
  374. }
  375. clientKeyPath := filepath.Join(dirClient, "key.pem")
  376. if err = ioutil.WriteFile(clientKeyPath, clientKeyData, 0644); err != nil { // overwrite if exists
  377. return err
  378. }
  379. resp.Member.ClientKeyPath = clientKeyPath
  380. clus.lg.Info(
  381. "saved client key file",
  382. zap.String("path", clientKeyPath),
  383. )
  384. clientTrustedCAData := []byte(resp.Member.ClientTrustedCAData)
  385. if len(clientTrustedCAData) != 0 {
  386. // TODO: disable this when auto TLS is deprecated
  387. clientTrustedCAPath := filepath.Join(dirClient, "ca.pem")
  388. if err = ioutil.WriteFile(clientTrustedCAPath, clientTrustedCAData, 0644); err != nil { // overwrite if exists
  389. return err
  390. }
  391. resp.Member.ClientTrustedCAPath = clientTrustedCAPath
  392. clus.lg.Info(
  393. "saved client trusted CA file",
  394. zap.String("path", clientTrustedCAPath),
  395. )
  396. }
  397. // no need to store peer certs for tester clients
  398. clus.Members[idx] = resp.Member
  399. }
  400. return nil
  401. }
  402. // DestroyEtcdAgents terminates all tester connections to agents and etcd servers.
  403. func (clus *Cluster) DestroyEtcdAgents() {
  404. err := clus.broadcastOperation(rpcpb.Operation_DestroyEtcdAgent)
  405. if err != nil {
  406. clus.lg.Warn("destroying etcd/agents FAIL", zap.Error(err))
  407. } else {
  408. clus.lg.Info("destroying etcd/agents PASS")
  409. }
  410. for i, conn := range clus.agentConns {
  411. err := conn.Close()
  412. clus.lg.Info("closed connection to agent", zap.String("agent-address", clus.Members[i].AgentAddr), zap.Error(err))
  413. }
  414. if clus.testerHTTPServer != nil {
  415. ctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)
  416. err := clus.testerHTTPServer.Shutdown(ctx)
  417. cancel()
  418. clus.lg.Info("closed tester HTTP server", zap.String("tester-address", clus.Tester.Addr), zap.Error(err))
  419. }
  420. }
  421. // WaitHealth ensures all members are healthy
  422. // by writing a test key to etcd cluster.
  423. func (clus *Cluster) WaitHealth() error {
  424. var err error
  425. // wait 60s to check cluster health.
  426. // TODO: set it to a reasonable value. It is set that high because
  427. // follower may use long time to catch up the leader when reboot under
  428. // reasonable workload (https://github.com/coreos/etcd/issues/2698)
  429. for i := 0; i < 60; i++ {
  430. for _, m := range clus.Members {
  431. if err = m.WriteHealthKey(); err != nil {
  432. clus.lg.Warn(
  433. "health check FAIL",
  434. zap.Int("retries", i),
  435. zap.String("endpoint", m.EtcdClientEndpoint),
  436. zap.Error(err),
  437. )
  438. break
  439. }
  440. clus.lg.Info(
  441. "health check PASS",
  442. zap.Int("retries", i),
  443. zap.String("endpoint", m.EtcdClientEndpoint),
  444. )
  445. }
  446. if err == nil {
  447. clus.lg.Info(
  448. "health check ALL PASS",
  449. zap.Int("round", clus.rd),
  450. zap.Int("case", clus.cs),
  451. )
  452. return nil
  453. }
  454. time.Sleep(time.Second)
  455. }
  456. return err
  457. }
  458. // GetLeader returns the index of leader and error if any.
  459. func (clus *Cluster) GetLeader() (int, error) {
  460. for i, m := range clus.Members {
  461. isLeader, err := m.IsLeader()
  462. if isLeader || err != nil {
  463. return i, err
  464. }
  465. }
  466. return 0, fmt.Errorf("no leader found")
  467. }
  468. // maxRev returns the maximum revision found on the cluster.
  469. func (clus *Cluster) maxRev() (rev int64, err error) {
  470. ctx, cancel := context.WithTimeout(context.TODO(), time.Second)
  471. defer cancel()
  472. revc, errc := make(chan int64, len(clus.Members)), make(chan error, len(clus.Members))
  473. for i := range clus.Members {
  474. go func(m *rpcpb.Member) {
  475. mrev, merr := m.Rev(ctx)
  476. revc <- mrev
  477. errc <- merr
  478. }(clus.Members[i])
  479. }
  480. for i := 0; i < len(clus.Members); i++ {
  481. if merr := <-errc; merr != nil {
  482. err = merr
  483. }
  484. if mrev := <-revc; mrev > rev {
  485. rev = mrev
  486. }
  487. }
  488. return rev, err
  489. }
  490. func (clus *Cluster) getRevisionHash() (map[string]int64, map[string]int64, error) {
  491. revs := make(map[string]int64)
  492. hashes := make(map[string]int64)
  493. for _, m := range clus.Members {
  494. rev, hash, err := m.RevHash()
  495. if err != nil {
  496. return nil, nil, err
  497. }
  498. revs[m.EtcdClientEndpoint] = rev
  499. hashes[m.EtcdClientEndpoint] = hash
  500. }
  501. return revs, hashes, nil
  502. }
  503. func (clus *Cluster) compactKV(rev int64, timeout time.Duration) (err error) {
  504. if rev <= 0 {
  505. return nil
  506. }
  507. for i, m := range clus.Members {
  508. clus.lg.Info(
  509. "compact START",
  510. zap.String("endpoint", m.EtcdClientEndpoint),
  511. zap.Int64("compact-revision", rev),
  512. zap.Duration("timeout", timeout),
  513. )
  514. now := time.Now()
  515. cerr := m.Compact(rev, timeout)
  516. succeed := true
  517. if cerr != nil {
  518. if strings.Contains(cerr.Error(), "required revision has been compacted") && i > 0 {
  519. clus.lg.Info(
  520. "compact error is ignored",
  521. zap.String("endpoint", m.EtcdClientEndpoint),
  522. zap.Int64("compact-revision", rev),
  523. zap.Error(cerr),
  524. )
  525. } else {
  526. clus.lg.Warn(
  527. "compact FAIL",
  528. zap.String("endpoint", m.EtcdClientEndpoint),
  529. zap.Int64("compact-revision", rev),
  530. zap.Error(cerr),
  531. )
  532. err = cerr
  533. succeed = false
  534. }
  535. }
  536. if succeed {
  537. clus.lg.Info(
  538. "compact PASS",
  539. zap.String("endpoint", m.EtcdClientEndpoint),
  540. zap.Int64("compact-revision", rev),
  541. zap.Duration("timeout", timeout),
  542. zap.Duration("took", time.Since(now)),
  543. )
  544. }
  545. }
  546. return err
  547. }
  548. func (clus *Cluster) checkCompact(rev int64) error {
  549. if rev == 0 {
  550. return nil
  551. }
  552. for _, m := range clus.Members {
  553. if err := m.CheckCompact(rev); err != nil {
  554. return err
  555. }
  556. }
  557. return nil
  558. }
  559. func (clus *Cluster) defrag() error {
  560. for _, m := range clus.Members {
  561. if err := m.Defrag(); err != nil {
  562. clus.lg.Warn(
  563. "defrag FAIL",
  564. zap.String("endpoint", m.EtcdClientEndpoint),
  565. zap.Error(err),
  566. )
  567. return err
  568. }
  569. clus.lg.Info(
  570. "defrag PASS",
  571. zap.String("endpoint", m.EtcdClientEndpoint),
  572. )
  573. }
  574. clus.lg.Info(
  575. "defrag ALL PASS",
  576. zap.Int("round", clus.rd),
  577. zap.Int("case", clus.cs),
  578. zap.Int("case-total", len(clus.failures)),
  579. )
  580. return nil
  581. }
  582. // GetFailureDelayDuration computes failure delay duration.
  583. func (clus *Cluster) GetFailureDelayDuration() time.Duration {
  584. return time.Duration(clus.Tester.FailureDelayMs) * time.Millisecond
  585. }
  586. // Report reports the number of modified keys.
  587. func (clus *Cluster) Report() int64 {
  588. return clus.stresser.ModifiedKeys()
  589. }