-
Notifications
You must be signed in to change notification settings - Fork 25.6k
drop index.shard.check_on_startup: fix
#32279
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from 2 commits
843f977
4f01609
153e4f2
2964fef
c71e306
a7668d6
97fa399
c155b36
85b7eef
3231803
c2b5b8a
14e6175
fee8a5b
5cee2b9
ad62da0
6f6ca5a
6763cf9
5083e83
2a9dbeb
aa16487
d26fbfb
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -22,11 +22,13 @@ | |
| import org.apache.lucene.index.CorruptIndexException; | ||
| import org.apache.lucene.index.DirectoryReader; | ||
| import org.apache.lucene.index.IndexCommit; | ||
| import org.apache.lucene.index.IndexWriter; | ||
| import org.apache.lucene.index.Term; | ||
| import org.apache.lucene.search.IndexSearcher; | ||
| import org.apache.lucene.search.TermQuery; | ||
| import org.apache.lucene.search.TopDocs; | ||
| import org.apache.lucene.store.AlreadyClosedException; | ||
| import org.apache.lucene.store.BaseDirectoryWrapper; | ||
| import org.apache.lucene.store.Directory; | ||
| import org.apache.lucene.store.FilterDirectory; | ||
| import org.apache.lucene.store.IOContext; | ||
|
|
@@ -53,6 +55,7 @@ | |
| import org.elasticsearch.cluster.routing.ShardRoutingState; | ||
| import org.elasticsearch.cluster.routing.TestShardRouting; | ||
| import org.elasticsearch.cluster.routing.UnassignedInfo; | ||
| import org.elasticsearch.common.CheckedFunction; | ||
| import org.elasticsearch.common.Strings; | ||
| import org.elasticsearch.common.UUIDs; | ||
| import org.elasticsearch.common.breaker.CircuitBreaker; | ||
|
|
@@ -93,6 +96,7 @@ | |
| import org.elasticsearch.index.seqno.SeqNoStats; | ||
| import org.elasticsearch.index.seqno.SequenceNumbers; | ||
| import org.elasticsearch.index.snapshots.IndexShardSnapshotStatus; | ||
| import org.elasticsearch.index.store.DirectoryService; | ||
| import org.elasticsearch.index.store.Store; | ||
| import org.elasticsearch.index.store.StoreStats; | ||
| import org.elasticsearch.index.translog.TestTranslog; | ||
|
|
@@ -110,6 +114,7 @@ | |
| import org.elasticsearch.snapshots.SnapshotId; | ||
| import org.elasticsearch.snapshots.SnapshotInfo; | ||
| import org.elasticsearch.snapshots.SnapshotShardFailure; | ||
| import org.elasticsearch.test.CorruptionUtils; | ||
| import org.elasticsearch.test.DummyShardLock; | ||
| import org.elasticsearch.test.FieldMaskingReader; | ||
| import org.elasticsearch.test.VersionUtils; | ||
|
|
@@ -118,7 +123,11 @@ | |
|
|
||
| import java.io.IOException; | ||
| import java.nio.charset.Charset; | ||
| import java.nio.file.FileVisitResult; | ||
| import java.nio.file.Files; | ||
| import java.nio.file.Path; | ||
| import java.nio.file.SimpleFileVisitor; | ||
| import java.nio.file.attribute.BasicFileAttributes; | ||
| import java.util.ArrayList; | ||
| import java.util.Arrays; | ||
| import java.util.Collections; | ||
|
|
@@ -1216,7 +1225,7 @@ public String[] listAll() throws IOException { | |
| }; | ||
|
|
||
| try (Store store = createStore(shardId, new IndexSettings(metaData, Settings.EMPTY), directory)) { | ||
| IndexShard shard = newShard(shardRouting, shardPath, metaData, store, | ||
| IndexShard shard = newShard(shardRouting, shardPath, metaData, i -> store, | ||
| null, new InternalEngineFactory(), () -> { | ||
| }, EMPTY_EVENT_LISTENER); | ||
| AtomicBoolean failureCallbackTriggered = new AtomicBoolean(false); | ||
|
|
@@ -2558,6 +2567,104 @@ public void testReadSnapshotConcurrently() throws IOException, InterruptedExcept | |
| closeShards(newShard); | ||
| } | ||
|
|
||
| public void testIndexCheckChecksum() throws Exception { | ||
| final boolean primary = true; | ||
|
|
||
| IndexShard indexShard = newStartedShard(primary); | ||
|
|
||
| final long numDocs = between(10, 100); | ||
| for (long i = 0; i < numDocs; i++) { | ||
| indexDoc(indexShard, "_doc", Long.toString(i), "{}"); | ||
| } | ||
| indexShard.flush(new FlushRequest()); | ||
| closeShards(indexShard); | ||
|
|
||
| // start shard with checksum - it has to pass successfully | ||
|
|
||
| final ShardRouting shardRouting = ShardRoutingHelper.initWithSameId(indexShard.routingEntry(), | ||
| primary ? RecoverySource.StoreRecoverySource.EXISTING_STORE_INSTANCE : RecoverySource.PeerRecoverySource.INSTANCE | ||
|
||
| ); | ||
| final IndexMetaData indexMetaData = IndexMetaData.builder(indexShard.indexSettings().getIndexMetaData()) | ||
| .settings(Settings.builder() | ||
| .put(indexShard.indexSettings.getSettings()) | ||
| .put(IndexSettings.INDEX_CHECK_ON_STARTUP.getKey(), "checksum")) | ||
|
||
| .build(); | ||
|
|
||
| final ShardPath shardPath = indexShard.shardPath(); | ||
|
|
||
| final IndexShard newShard = newShard(shardRouting, shardPath, indexMetaData, | ||
| null, null, indexShard.engineFactory, | ||
| indexShard.getGlobalCheckpointSyncer(), EMPTY_EVENT_LISTENER); | ||
|
|
||
| closeShards(newStartedShard(p -> newShard, primary)); | ||
|
|
||
| // corrupt files | ||
| final Path indexPath = shardPath.getDataPath().resolve("index"); | ||
| final Path[] filesToCorrupt = | ||
| Files.walk(indexPath) | ||
| .filter(p -> Files.isRegularFile(p) && IndexWriter.WRITE_LOCK_NAME.equals(p.getFileName().toString()) == false) | ||
| .toArray(Path[]::new); | ||
| CorruptionUtils.corruptFile(random(), filesToCorrupt); | ||
|
||
|
|
||
| // check that corrupt marker is *NOT* there | ||
|
||
| final AtomicInteger corruptedMarkerCount = new AtomicInteger(); | ||
| final SimpleFileVisitor<Path> corruptedVisitor = new SimpleFileVisitor<Path>() { | ||
| @Override | ||
| public FileVisitResult visitFile(Path file, BasicFileAttributes attrs) throws IOException { | ||
| if (Files.isRegularFile(file) && file.getFileName().toString().startsWith(Store.CORRUPTED)) { | ||
| corruptedMarkerCount.incrementAndGet(); | ||
| } | ||
| return FileVisitResult.CONTINUE; | ||
| } | ||
| }; | ||
| Files.walkFileTree(indexPath, corruptedVisitor); | ||
|
|
||
| assertThat("store is clean", | ||
|
||
| corruptedMarkerCount.get(), equalTo(0)); | ||
|
|
||
| // storeProvider that does not perform check index on close - it is corrupted | ||
|
||
| final CheckedFunction<IndexSettings, Store, IOException> storeProvider = indexSettings -> { | ||
| final ShardId shardId = shardPath.getShardId(); | ||
| final DirectoryService directoryService = new DirectoryService(shardId, indexSettings) { | ||
| @Override | ||
| public Directory newDirectory() throws IOException { | ||
| final BaseDirectoryWrapper baseDirectoryWrapper = newFSDirectory(shardPath.resolveIndex()); | ||
| // index is corrupted - don't even try to check index on close - it fails | ||
| baseDirectoryWrapper.setCheckIndexOnClose(false); | ||
| return baseDirectoryWrapper; | ||
| } | ||
| }; | ||
| return new Store(shardId, indexSettings, directoryService, new DummyShardLock(shardId)); | ||
| }; | ||
|
|
||
| // try to start shard on corrupted files | ||
| final IndexShard corruptedShard = newShard(shardRouting, shardPath, indexMetaData, | ||
| storeProvider, null, indexShard.engineFactory, | ||
| indexShard.getGlobalCheckpointSyncer(), EMPTY_EVENT_LISTENER); | ||
|
|
||
| expectThrows(IndexShardRecoveryException.class, () -> newStartedShard(p -> corruptedShard, primary)); | ||
| closeShards(corruptedShard); | ||
|
|
||
| // check that corrupt marker is there | ||
|
||
| Files.walkFileTree(indexPath, corruptedVisitor); | ||
| assertThat("store has to be marked as corrupted", | ||
| corruptedMarkerCount.get(), equalTo(1)); | ||
|
|
||
| // try to start another time shard on corrupted files | ||
| final IndexShard corruptedShard2 = newShard(shardRouting, shardPath, indexMetaData, | ||
| storeProvider, null, indexShard.engineFactory, | ||
| indexShard.getGlobalCheckpointSyncer(), EMPTY_EVENT_LISTENER); | ||
|
|
||
| expectThrows(IndexShardRecoveryException.class, () -> newStartedShard(p -> corruptedShard2, primary)); | ||
| closeShards(corruptedShard2); | ||
|
|
||
| // check that corrupt marker is there | ||
| corruptedMarkerCount.set(0); | ||
| Files.walkFileTree(indexPath, corruptedVisitor); | ||
| assertThat("store still has a single corrupt marker", | ||
| corruptedMarkerCount.get(), equalTo(1)); | ||
| } | ||
|
|
||
| /** | ||
| * Simulates a scenario that happens when we are async fetching snapshot metadata from GatewayService | ||
| * and checking index concurrently. This should always be possible without any exception. | ||
|
|
@@ -2581,7 +2688,7 @@ public void testReadSnapshotAndCheckIndexConcurrently() throws Exception { | |
| final IndexMetaData indexMetaData = IndexMetaData.builder(indexShard.indexSettings().getIndexMetaData()) | ||
| .settings(Settings.builder() | ||
| .put(indexShard.indexSettings.getSettings()) | ||
| .put(IndexSettings.INDEX_CHECK_ON_STARTUP.getKey(), randomFrom("false", "true", "checksum", "fix"))) | ||
| .put(IndexSettings.INDEX_CHECK_ON_STARTUP.getKey(), randomFrom("false", "true", "checksum"))) | ||
| .build(); | ||
| final IndexShard newShard = newShard(shardRouting, indexShard.shardPath(), indexMetaData, | ||
| null, null, indexShard.engineFactory, indexShard.getGlobalCheckpointSyncer(), EMPTY_EVENT_LISTENER); | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This comment seems misleading: we don't start the shard here, and we expect it not to pass successfully when we do.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
makes sense, addressed your comments