| /** |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| package org.apache.hadoop.hdfs.server.namenode.ha; |
| |
| import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_HA_LOGROLL_PERIOD_KEY; |
| import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_HA_NAMENODES_KEY_PREFIX; |
| import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_HA_TAILEDITS_INPROGRESS_KEY; |
| import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_HA_TAILEDITS_PERIOD_KEY; |
| import static org.apache.hadoop.hdfs.DFSConfigKeys.DFS_NAMENODE_RPC_ADDRESS_KEY; |
| import static org.apache.hadoop.hdfs.DFSUtil.createUri; |
| |
| import java.io.IOException; |
| import java.lang.reflect.Field; |
| import java.lang.reflect.Proxy; |
| import java.net.InetSocketAddress; |
| import java.net.URI; |
| import java.net.URISyntaxException; |
| import java.util.ArrayList; |
| import java.util.Arrays; |
| import java.util.List; |
| import java.util.concurrent.TimeUnit; |
| import java.util.concurrent.TimeoutException; |
| import java.util.concurrent.atomic.AtomicLong; |
| |
| import com.google.common.base.Function; |
| import com.google.common.base.Joiner; |
| import com.google.common.collect.Iterables; |
| import org.apache.commons.logging.Log; |
| import org.apache.commons.logging.LogFactory; |
| import org.apache.hadoop.conf.Configuration; |
| import org.apache.hadoop.fs.FileSystem; |
| import org.apache.hadoop.hdfs.ClientGSIContext; |
| import org.apache.hadoop.hdfs.DFSConfigKeys; |
| import org.apache.hadoop.hdfs.DFSUtil; |
| import org.apache.hadoop.hdfs.DistributedFileSystem; |
| import org.apache.hadoop.hdfs.MiniDFSCluster; |
| import org.apache.hadoop.hdfs.client.HdfsClientConfigKeys; |
| import org.apache.hadoop.hdfs.protocol.HdfsConstants; |
| import org.apache.hadoop.hdfs.qjournal.MiniQJMHACluster; |
| import org.apache.hadoop.hdfs.server.datanode.DataNode; |
| import org.apache.hadoop.hdfs.server.namenode.FSImageTestUtil; |
| import org.apache.hadoop.hdfs.server.namenode.NameNode; |
| import org.apache.hadoop.io.retry.FailoverProxyProvider; |
| import org.apache.hadoop.io.retry.RetryInvocationHandler; |
| import org.apache.hadoop.test.GenericTestUtils; |
| import org.apache.hadoop.util.Time; |
| |
| import com.google.common.base.Supplier; |
| |
| /** |
| * Static utility functions useful for testing HA. |
| */ |
| public abstract class HATestUtil { |
| private static final Log LOG = LogFactory.getLog(HATestUtil.class); |
| |
| private static final String LOGICAL_HOSTNAME = "ha-nn-uri-%d"; |
| |
| /** |
| * Trigger an edits log roll on the active and then wait for the standby to |
| * catch up to all the edits done by the active. This method will check |
| * repeatedly for up to NN_LAG_TIMEOUT milliseconds, and then fail throwing |
| * {@link CouldNotCatchUpException} |
| * |
| * @param active active NN |
| * @param standby standby NN which should catch up to active |
| * @throws IOException if an error occurs rolling the edit log |
| * @throws CouldNotCatchUpException if the standby doesn't catch up to the |
| * active in NN_LAG_TIMEOUT milliseconds |
| */ |
| public static void waitForStandbyToCatchUp(NameNode active, |
| NameNode standby) throws InterruptedException, IOException, CouldNotCatchUpException { |
| long activeTxId = active.getNamesystem().getFSImage().getEditLog() |
| .getLastWrittenTxId(); |
| |
| active.getRpcServer().rollEditLog(); |
| |
| long start = Time.now(); |
| while (Time.now() - start < TestEditLogTailer.NN_LAG_TIMEOUT) { |
| long nn2HighestTxId = standby.getNamesystem().getFSImage() |
| .getLastAppliedTxId(); |
| if (nn2HighestTxId >= activeTxId) { |
| return; |
| } |
| Thread.sleep(TestEditLogTailer.SLEEP_TIME); |
| } |
| throw new CouldNotCatchUpException("Standby did not catch up to txid " + |
| activeTxId + " (currently at " + |
| standby.getNamesystem().getFSImage().getLastAppliedTxId() + ")"); |
| } |
| |
| /** |
| * Wait for the datanodes in the cluster to process any block |
| * deletions that have already been asynchronously queued. |
| */ |
| public static void waitForDNDeletions(final MiniDFSCluster cluster) |
| throws TimeoutException, InterruptedException { |
| GenericTestUtils.waitFor(new Supplier<Boolean>() { |
| @Override |
| public Boolean get() { |
| for (DataNode dn : cluster.getDataNodes()) { |
| if (cluster.getFsDatasetTestUtils(dn).getPendingAsyncDeletions() > 0) { |
| return false; |
| } |
| } |
| return true; |
| } |
| }, 1000, 10000); |
| |
| } |
| |
| /** |
| * Wait for the NameNode to issue any deletions that are already |
| * pending (i.e. for the pendingDeletionBlocksCount to go to 0) |
| */ |
| public static void waitForNNToIssueDeletions(final NameNode nn) |
| throws Exception { |
| GenericTestUtils.waitFor(new Supplier<Boolean>() { |
| @Override |
| public Boolean get() { |
| LOG.info("Waiting for NN to issue block deletions to DNs"); |
| return nn.getNamesystem().getBlockManager().getPendingDeletionBlocksCount() == 0; |
| } |
| }, 250, 10000); |
| } |
| |
| public static class CouldNotCatchUpException extends IOException { |
| private static final long serialVersionUID = 1L; |
| |
| public CouldNotCatchUpException(String message) { |
| super(message); |
| } |
| } |
| |
| /** Gets the filesystem instance by setting the failover configurations */ |
| public static DistributedFileSystem configureFailoverFs( |
| MiniDFSCluster cluster, Configuration conf) |
| throws IOException, URISyntaxException { |
| return configureFailoverFs(cluster, conf, 0); |
| } |
| |
| /** |
| * Gets the filesystem instance by setting the failover configurations |
| * @param cluster the single process DFS cluster |
| * @param conf cluster configuration |
| * @param nsIndex namespace index starting with zero |
| * @throws IOException if an error occurs rolling the edit log |
| */ |
| public static DistributedFileSystem configureFailoverFs( |
| MiniDFSCluster cluster, Configuration conf, |
| int nsIndex) throws IOException, URISyntaxException { |
| conf = new Configuration(conf); |
| String logicalName = getLogicalHostname(cluster); |
| setFailoverConfigurations(cluster, conf, logicalName, nsIndex); |
| FileSystem fs = FileSystem.get(new URI("hdfs://" + logicalName), conf); |
| return (DistributedFileSystem)fs; |
| } |
| |
| public static <P extends ObserverReadProxyProvider<?>> |
| DistributedFileSystem configureObserverReadFs( |
| MiniDFSCluster cluster, Configuration conf, |
| Class<P> classFPP, boolean isObserverReadEnabled) |
| throws IOException, URISyntaxException { |
| String logicalName = conf.get(DFSConfigKeys.DFS_NAMESERVICES); |
| URI nnUri = new URI(HdfsConstants.HDFS_URI_SCHEME + "://" + logicalName); |
| conf.set(HdfsClientConfigKeys.Failover.PROXY_PROVIDER_KEY_PREFIX |
| + "." + logicalName, classFPP.getName()); |
| conf.set("fs.defaultFS", nnUri.toString()); |
| |
| DistributedFileSystem dfs = (DistributedFileSystem) |
| FileSystem.get(nnUri, conf); |
| @SuppressWarnings("unchecked") |
| P provider = (P) ((RetryInvocationHandler<?>) Proxy.getInvocationHandler( |
| dfs.getClient().getNamenode())).getProxyProvider(); |
| provider.setObserverReadEnabled(isObserverReadEnabled); |
| return dfs; |
| } |
| |
| public static boolean isSentToAnyOfNameNodes( |
| DistributedFileSystem dfs, |
| MiniDFSCluster cluster, int... nnIndices) throws IOException { |
| ObserverReadProxyProvider<?> provider = (ObserverReadProxyProvider<?>) |
| ((RetryInvocationHandler<?>) Proxy.getInvocationHandler( |
| dfs.getClient().getNamenode())).getProxyProvider(); |
| FailoverProxyProvider.ProxyInfo<?> pi = provider.getLastProxy(); |
| for (int nnIdx : nnIndices) { |
| if (pi.proxyInfo.equals( |
| cluster.getNameNode(nnIdx).getNameNodeAddress().toString())) { |
| return true; |
| } |
| } |
| return false; |
| } |
| |
| public static MiniQJMHACluster setUpObserverCluster( |
| Configuration conf, int numObservers, int numDataNodes, |
| boolean fastTailing) throws IOException { |
| return setUpObserverCluster(conf, numObservers, numDataNodes, |
| fastTailing, null, null); |
| } |
| |
| public static MiniQJMHACluster setUpObserverCluster( |
| Configuration conf, int numObservers, int numDataNodes, |
| boolean fastTailing, long[] simulatedCapacities, |
| String[] racks) throws IOException { |
| // disable block scanner |
| conf.setInt(DFSConfigKeys.DFS_DATANODE_SCAN_PERIOD_HOURS_KEY, -1); |
| |
| conf.setBoolean(DFS_HA_TAILEDITS_INPROGRESS_KEY, fastTailing); |
| if(fastTailing) { |
| // TODO: In trunk, the below setting is 100ms. But |
| // without backporting HDFS-9847, specifying time unit is not supported |
| conf.setInt(DFS_HA_TAILEDITS_PERIOD_KEY, 0); |
| } else { |
| // disable fast tailing so that coordination takes time. |
| // TODO: In trunk, the below setting is 300s and 200s. But |
| // without backporting HDFS-9847, specifying time unit is not supported |
| conf.setInt(DFS_HA_LOGROLL_PERIOD_KEY, 300); |
| conf.setInt(DFS_HA_TAILEDITS_PERIOD_KEY, 200); |
| } |
| |
| MiniQJMHACluster.Builder qjmBuilder = new MiniQJMHACluster.Builder(conf) |
| .setNumNameNodes(2 + numObservers); |
| qjmBuilder.getDfsBuilder().numDataNodes(numDataNodes) |
| .simulatedCapacities(simulatedCapacities) |
| .racks(racks); |
| MiniQJMHACluster qjmhaCluster = qjmBuilder.build(); |
| MiniDFSCluster dfsCluster = qjmhaCluster.getDfsCluster(); |
| |
| dfsCluster.transitionToActive(0); |
| dfsCluster.waitActive(0); |
| |
| for (int i = 0; i < numObservers; i++) { |
| dfsCluster.transitionToObserver(2 + i); |
| } |
| return qjmhaCluster; |
| } |
| |
| public static <P extends FailoverProxyProvider<?>> |
| void setupHAConfiguration(MiniDFSCluster cluster, |
| Configuration conf, int nsIndex, Class<P> classFPP) { |
| MiniDFSCluster.NameNodeInfo[] nns = cluster.getNameNodeInfos(nsIndex); |
| List<String> nnAddresses = new ArrayList<String>(); |
| for (MiniDFSCluster.NameNodeInfo nn : nns) { |
| InetSocketAddress addr = nn.nameNode.getNameNodeAddress(); |
| nnAddresses.add( |
| createUri(HdfsConstants.HDFS_URI_SCHEME, addr).toString()); |
| } |
| setFailoverConfigurations( |
| conf, getLogicalHostname(cluster), nnAddresses, classFPP); |
| } |
| |
| public static void setFailoverConfigurations(MiniDFSCluster cluster, |
| Configuration conf) { |
| setFailoverConfigurations(cluster, conf, getLogicalHostname(cluster)); |
| } |
| |
| /** Sets the required configurations for performing failover of default namespace. */ |
| public static void setFailoverConfigurations(MiniDFSCluster cluster, |
| Configuration conf, String logicalName) { |
| setFailoverConfigurations(cluster, conf, logicalName, 0); |
| } |
| |
| /** Sets the required configurations for performing failover. */ |
| public static void setFailoverConfigurations(MiniDFSCluster cluster, |
| Configuration conf, String logicalName, int nsIndex) { |
| setFailoverConfigurations(cluster, conf, logicalName, nsIndex, |
| ConfiguredFailoverProxyProvider.class); |
| } |
| |
| /** Sets the required configurations for performing failover. */ |
| public static <P extends FailoverProxyProvider<?>> void |
| setFailoverConfigurations(MiniDFSCluster cluster, Configuration conf, |
| String logicalName, int nsIndex, Class<P> classFPP) { |
| MiniDFSCluster.NameNodeInfo[] nns = cluster.getNameNodeInfos(nsIndex); |
| List<InetSocketAddress> nnAddresses = new ArrayList<InetSocketAddress>(3); |
| for (MiniDFSCluster.NameNodeInfo nn : nns) { |
| nnAddresses.add(nn.nameNode.getNameNodeAddress()); |
| } |
| setFailoverConfigurations(conf, logicalName, nnAddresses, classFPP); |
| } |
| |
| public static void setFailoverConfigurations(Configuration conf, String logicalName, |
| InetSocketAddress ... nnAddresses){ |
| setFailoverConfigurations(conf, logicalName, Arrays.asList(nnAddresses), |
| ConfiguredFailoverProxyProvider.class); |
| } |
| |
| /** |
| * Sets the required configurations for performing failover |
| */ |
| public static <P extends FailoverProxyProvider<?>> void |
| setFailoverConfigurations(Configuration conf, String logicalName, |
| List<InetSocketAddress> nnAddresses, Class<P> classFPP) { |
| setFailoverConfigurations(conf, logicalName, |
| Iterables.transform(nnAddresses, new Function<InetSocketAddress, String>() { |
| |
| // transform the inet address to a simple string |
| @Override |
| public String apply(InetSocketAddress addr) { |
| return "hdfs://" + addr.getHostName() + ":" + addr.getPort(); |
| } |
| }), classFPP); |
| } |
| |
| public static <P extends FailoverProxyProvider<?>> |
| void setFailoverConfigurations( |
| Configuration conf, String logicalName, |
| Iterable<String> nnAddresses, Class<P> classFPP) { |
| List<String> nnids = new ArrayList<String>(); |
| int i = 0; |
| for (String address : nnAddresses) { |
| String nnId = "nn" + (i + 1); |
| nnids.add(nnId); |
| conf.set(DFSUtil.addKeySuffixes(DFS_NAMENODE_RPC_ADDRESS_KEY, logicalName, nnId), address); |
| i++; |
| } |
| conf.set(DFSConfigKeys.DFS_NAMESERVICES, logicalName); |
| conf.set(DFSUtil.addKeySuffixes(DFS_HA_NAMENODES_KEY_PREFIX, logicalName), |
| Joiner.on(',').join(nnids)); |
| conf.set(HdfsClientConfigKeys.Failover.PROXY_PROVIDER_KEY_PREFIX |
| + "." + logicalName, classFPP.getName()); |
| conf.set("fs.defaultFS", "hdfs://" + logicalName); |
| } |
| |
| public static String getLogicalHostname(MiniDFSCluster cluster) { |
| return String.format(LOGICAL_HOSTNAME, cluster.getInstanceId()); |
| } |
| |
| public static URI getLogicalUri(MiniDFSCluster cluster) |
| throws URISyntaxException { |
| return new URI(HdfsConstants.HDFS_URI_SCHEME + "://" + |
| getLogicalHostname(cluster)); |
| } |
| |
| public static void waitForCheckpoint(MiniDFSCluster cluster, int nnIdx, |
| List<Integer> txids) throws InterruptedException { |
| long start = Time.now(); |
| while (true) { |
| try { |
| FSImageTestUtil.assertNNHasCheckpoints(cluster, nnIdx, txids); |
| return; |
| } catch (AssertionError err) { |
| if (Time.now() - start > 10000) { |
| throw err; |
| } else { |
| Thread.sleep(300); |
| } |
| } |
| } |
| } |
| |
| /** |
| * Customize stateId of the client AlignmentContext for testing. |
| */ |
| public static long setACStateId(DistributedFileSystem dfs, |
| long stateId) throws Exception { |
| ObserverReadProxyProvider<?> provider = (ObserverReadProxyProvider<?>) |
| ((RetryInvocationHandler<?>) Proxy.getInvocationHandler( |
| dfs.getClient().getNamenode())).getProxyProvider(); |
| ClientGSIContext ac = (ClientGSIContext)(provider.getAlignmentContext()); |
| Field f = ac.getClass().getDeclaredField("lastSeenStateId"); |
| f.setAccessible(true); |
| AtomicLong lastSeenStateId = (AtomicLong)f.get(ac); |
| long currentStateId = lastSeenStateId.get(); |
| lastSeenStateId.set(stateId); |
| return currentStateId; |
| } |
| } |