mirror of
https://github.com/etcd-io/etcd.git
synced 2024-09-27 06:25:44 +00:00
Merge pull request #4812 from xiang90/ping
etcdctlv3: implement endpoint-health command
This commit is contained in:
commit
70e709c5f4
80
etcdctlv3/command/ep_health_command.go
Normal file
80
etcdctlv3/command/ep_health_command.go
Normal file
@ -0,0 +1,80 @@
|
||||
// Copyright 2015 CoreOS, Inc.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package command
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"sync"
|
||||
"time"
|
||||
|
||||
"github.com/coreos/etcd/Godeps/_workspace/src/github.com/spf13/cobra"
|
||||
"github.com/coreos/etcd/Godeps/_workspace/src/golang.org/x/net/context"
|
||||
"github.com/coreos/etcd/clientv3"
|
||||
)
|
||||
|
||||
// NewEpHealthCommand returns the cobra command for "endpoint-health".
|
||||
func NewEpHealthCommand() *cobra.Command {
|
||||
cmd := &cobra.Command{
|
||||
Use: "endpoint-health",
|
||||
Short: "endpoint-health checks the healthiness of endpoints specified in `--endpoints` flag",
|
||||
Run: epHealthCommandFunc,
|
||||
}
|
||||
return cmd
|
||||
}
|
||||
|
||||
// epHealthCommandFunc executes the "endpoint-health" command.
|
||||
func epHealthCommandFunc(cmd *cobra.Command, args []string) {
|
||||
endpoints, err := cmd.Flags().GetStringSlice("endpoints")
|
||||
if err != nil {
|
||||
ExitWithError(ExitError, err)
|
||||
}
|
||||
|
||||
cert, key, cacert := keyAndCertFromCmd(cmd)
|
||||
dt := dialTimeoutFromCmd(cmd)
|
||||
cfgs := []*clientv3.Config{}
|
||||
for _, ep := range endpoints {
|
||||
cfg, err := newClientCfg([]string{ep}, dt, cert, key, cacert)
|
||||
if err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
}
|
||||
cfgs = append(cfgs, cfg)
|
||||
}
|
||||
|
||||
var wg sync.WaitGroup
|
||||
|
||||
for _, cfg := range cfgs {
|
||||
wg.Add(1)
|
||||
go func(cfg *clientv3.Config) {
|
||||
defer wg.Done()
|
||||
ep := cfg.Endpoints[0]
|
||||
cli, err := clientv3.New(*cfg)
|
||||
if err != nil {
|
||||
fmt.Printf("%s is unhealthy: failed to connect: %v\n", ep, err)
|
||||
return
|
||||
}
|
||||
st := time.Now()
|
||||
// get a random key. As long as we can get the response without an error, the
|
||||
// endpoint is health.
|
||||
_, err = cli.Get(context.TODO(), "health")
|
||||
if err != nil {
|
||||
fmt.Printf("%s is unhealthy: failed to commit proposal: %v\n", ep, err)
|
||||
} else {
|
||||
fmt.Printf("%s is healthy: successfully committed proposal: took = %v\n", ep, time.Since(st))
|
||||
}
|
||||
}(cfg)
|
||||
}
|
||||
|
||||
wg.Wait()
|
||||
}
|
@ -44,38 +44,27 @@ func mustClientFromCmd(cmd *cobra.Command) *clientv3.Client {
|
||||
if err != nil {
|
||||
ExitWithError(ExitError, err)
|
||||
}
|
||||
|
||||
dialTimeout := dialTimeoutFromCmd(cmd)
|
||||
|
||||
var cert, key, cacert string
|
||||
if cert, err = cmd.Flags().GetString("cert"); err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
} else if cert == "" && cmd.Flags().Changed("cert") {
|
||||
ExitWithError(ExitBadArgs, errors.New("empty string is passed to --cert option"))
|
||||
}
|
||||
|
||||
if key, err = cmd.Flags().GetString("key"); err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
} else if key == "" && cmd.Flags().Changed("key") {
|
||||
ExitWithError(ExitBadArgs, errors.New("empty string is passed to --key option"))
|
||||
}
|
||||
|
||||
if cacert, err = cmd.Flags().GetString("cacert"); err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
} else if cacert == "" && cmd.Flags().Changed("cacert") {
|
||||
ExitWithError(ExitBadArgs, errors.New("empty string is passed to --cacert option"))
|
||||
}
|
||||
|
||||
isHex, _ := cmd.Flags().GetBool("hex")
|
||||
outputType, _ := cmd.Flags().GetString("write-out")
|
||||
if display = NewPrinter(outputType, isHex); display == nil {
|
||||
ExitWithError(ExitBadFeature, errors.New("unsupported output format"))
|
||||
}
|
||||
cert, key, cacert := keyAndCertFromCmd(cmd)
|
||||
|
||||
return mustClient(endpoints, dialTimeout, cert, key, cacert)
|
||||
}
|
||||
|
||||
func mustClient(endpoints []string, dialTimeout time.Duration, cert, key, cacert string) *clientv3.Client {
|
||||
cfg, err := newClientCfg(endpoints, dialTimeout, cert, key, cacert)
|
||||
if err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
}
|
||||
|
||||
client, err := clientv3.New(*cfg)
|
||||
if err != nil {
|
||||
ExitWithError(ExitBadConnection, err)
|
||||
}
|
||||
|
||||
return client
|
||||
}
|
||||
|
||||
func newClientCfg(endpoints []string, dialTimeout time.Duration, cert, key, cacert string) (*clientv3.Config, error) {
|
||||
// set tls if any one tls option set
|
||||
var cfgtls *transport.TLSInfo
|
||||
tls := transport.TLSInfo{}
|
||||
@ -95,24 +84,19 @@ func mustClient(endpoints []string, dialTimeout time.Duration, cert, key, cacert
|
||||
cfgtls = &tls
|
||||
}
|
||||
|
||||
cfg := clientv3.Config{
|
||||
cfg := &clientv3.Config{
|
||||
Endpoints: endpoints,
|
||||
DialTimeout: dialTimeout,
|
||||
}
|
||||
if cfgtls != nil {
|
||||
clientTLS, err := cfgtls.ClientConfig()
|
||||
if err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
return nil, err
|
||||
}
|
||||
cfg.TLS = clientTLS
|
||||
}
|
||||
|
||||
client, err := clientv3.New(cfg)
|
||||
if err != nil {
|
||||
ExitWithError(ExitBadConnection, err)
|
||||
}
|
||||
|
||||
return client
|
||||
return cfg, nil
|
||||
}
|
||||
|
||||
func argOrStdin(args []string, stdin io.Reader, i int) (string, error) {
|
||||
@ -133,3 +117,26 @@ func dialTimeoutFromCmd(cmd *cobra.Command) time.Duration {
|
||||
}
|
||||
return dialTimeout
|
||||
}
|
||||
|
||||
func keyAndCertFromCmd(cmd *cobra.Command) (cert, key, cacert string) {
|
||||
var err error
|
||||
if cert, err = cmd.Flags().GetString("cert"); err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
} else if cert == "" && cmd.Flags().Changed("cert") {
|
||||
ExitWithError(ExitBadArgs, errors.New("empty string is passed to --cert option"))
|
||||
}
|
||||
|
||||
if key, err = cmd.Flags().GetString("key"); err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
} else if key == "" && cmd.Flags().Changed("key") {
|
||||
ExitWithError(ExitBadArgs, errors.New("empty string is passed to --key option"))
|
||||
}
|
||||
|
||||
if cacert, err = cmd.Flags().GetString("cacert"); err != nil {
|
||||
ExitWithError(ExitBadArgs, err)
|
||||
} else if cacert == "" && cmd.Flags().Changed("cacert") {
|
||||
ExitWithError(ExitBadArgs, errors.New("empty string is passed to --cacert option"))
|
||||
}
|
||||
|
||||
return cert, key, cacert
|
||||
}
|
||||
|
@ -66,6 +66,7 @@ func init() {
|
||||
command.NewVersionCommand(),
|
||||
command.NewLeaseCommand(),
|
||||
command.NewMemberCommand(),
|
||||
command.NewEpHealthCommand(),
|
||||
command.NewSnapshotCommand(),
|
||||
command.NewMakeMirrorCommand(),
|
||||
command.NewLockCommand(),
|
||||
|
Loading…
x
Reference in New Issue
Block a user