-
-
Notifications
You must be signed in to change notification settings - Fork 1.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
General Updates and Stability Improvements #2131
Conversation
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
Signed-off-by: Derek Collison <derek@nats.io>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
generally seems fine - as in I ran these things in my tests but really, one for Ivan to review :) Currently running the latest in my cluster and so far seem stable
@@ -2564,7 +2564,7 @@ func (n *raft) processAppendEntry(ae *appendEntry, sub *subscription) { | |||
select { | |||
case n.applyc <- &CommittedEntry{n.commit, ae.entries[:1]}: | |||
default: | |||
n.debug("Failed to place snapshot entry onto our apply channel") | |||
n.warn("Failed to place snapshot entry onto our apply channel") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
If i saw this, I would have no way to figure out what I could do about that. Is it just a wait and see kind of situation or what would be the remedy? Warn level logs need to be actionable some how - or indicate that they will hopefully clear
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I promoted it so it could be more easily reported to us via support channels etc.
checkMirror(20) | ||
} | ||
|
||
func TestNoRaceJetStreamClusterSuperClusterRIPStress(t *testing.T) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤣
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Question about $JS.M -> $JSDC.M and same for $JS.S
server/stream.go
Outdated
@@ -1352,7 +1386,7 @@ func (mset *stream) setupMirrorConsumer() error { | |||
if ext != nil { | |||
deliverSubject = strings.ReplaceAll(ext.DeliverPrefix+syncSubject(".M"), "..", ".") | |||
} else { | |||
deliverSubject = syncSubject("$JS.M") | |||
deliverSubject = syncSubject("$JSDC.M") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is that permanent or what is part of some debug/test?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tracking GW sub leaks I thought it was better to not be under the $JS.> envelope since ephemerals go away when they detect interest goes away.
I could put it back.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just trying to reduce or at least be aware of all subjects that potentially need to be allowed/denied when it comes to permissions or import/export rules.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Running a sub leak test now that R.I. showed me, so trying to reproduce that now.
server/stream.go
Outdated
@@ -1556,14 +1593,20 @@ func (mset *stream) setSourceConsumer(sname string, seq uint64) { | |||
if ext != nil { | |||
deliverSubject = strings.ReplaceAll(ext.DeliverPrefix+syncSubject(".S"), "..", ".") | |||
} else { | |||
deliverSubject = syncSubject("$JS.S") | |||
deliverSubject = syncSubject("$JSDC.S") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same
… flow control subjects for consumers. Signed-off-by: Derek Collison <derek@nats.io>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Signed-off-by: Derek Collison <derek@nats.io>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Signed-off-by: Derek Collison derek@nats.io
/cc @nats-io/core