feat: use shared redis client to maximize pooling usage (#39)
Cadoles/bouncer/pipeline/head This commit looks good
Details
Cadoles/bouncer/pipeline/head This commit looks good
Details
This commit is contained in:
parent
4801974ca3
commit
f37425018b
7
Makefile
7
Makefile
|
@ -17,7 +17,8 @@ GOTEST_ARGS ?= -short
|
||||||
OPENWRT_DEVICE ?= 192.168.1.1
|
OPENWRT_DEVICE ?= 192.168.1.1
|
||||||
|
|
||||||
SIEGE_URLS_FILE ?= misc/siege/urls.txt
|
SIEGE_URLS_FILE ?= misc/siege/urls.txt
|
||||||
SIEGE_CONCURRENCY ?= 100
|
SIEGE_CONCURRENCY ?= 50
|
||||||
|
SIEGE_DURATION ?= 1M
|
||||||
|
|
||||||
data/bootstrap.d/dummy.yml:
|
data/bootstrap.d/dummy.yml:
|
||||||
mkdir -p data/bootstrap.d
|
mkdir -p data/bootstrap.d
|
||||||
|
@ -114,7 +115,7 @@ grafterm: tools/grafterm/bin/grafterm
|
||||||
siege:
|
siege:
|
||||||
$(eval TMP := $(shell mktemp))
|
$(eval TMP := $(shell mktemp))
|
||||||
cat $(SIEGE_URLS_FILE) | envsubst > $(TMP)
|
cat $(SIEGE_URLS_FILE) | envsubst > $(TMP)
|
||||||
siege -i -b -c $(SIEGE_CONCURRENCY) -f $(TMP)
|
siege -R ./misc/siege/siege.conf -i -b -c $(SIEGE_CONCURRENCY) -t $(SIEGE_DURATION) -f $(TMP)
|
||||||
rm -rf $(TMP)
|
rm -rf $(TMP)
|
||||||
|
|
||||||
tools/gitea-release/bin/gitea-release.sh:
|
tools/gitea-release/bin/gitea-release.sh:
|
||||||
|
@ -150,7 +151,7 @@ run-redis:
|
||||||
-v $(PWD)/data/redis:/data \
|
-v $(PWD)/data/redis:/data \
|
||||||
-p 6379:6379 \
|
-p 6379:6379 \
|
||||||
redis:alpine3.17 \
|
redis:alpine3.17 \
|
||||||
redis-server --save 60 1 --loglevel warning
|
redis-server --save 60 1 --loglevel debug
|
||||||
|
|
||||||
redis-shell:
|
redis-shell:
|
||||||
docker exec -it \
|
docker exec -it \
|
||||||
|
|
|
@ -27,7 +27,7 @@ func (s *Server) initRepositories(ctx context.Context) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s *Server) initRedisClient(ctx context.Context) error {
|
func (s *Server) initRedisClient(ctx context.Context) error {
|
||||||
client := setup.NewRedisClient(ctx, s.redisConfig)
|
client := setup.NewSharedClient(s.redisConfig)
|
||||||
|
|
||||||
s.redisClient = client
|
s.redisClient = client
|
||||||
|
|
||||||
|
|
|
@ -15,6 +15,8 @@ type RedisConfig struct {
|
||||||
WriteTimeout InterpolatedDuration `yaml:"writeTimeout"`
|
WriteTimeout InterpolatedDuration `yaml:"writeTimeout"`
|
||||||
DialTimeout InterpolatedDuration `yaml:"dialTimeout"`
|
DialTimeout InterpolatedDuration `yaml:"dialTimeout"`
|
||||||
LockMaxRetries InterpolatedInt `yaml:"lockMaxRetries"`
|
LockMaxRetries InterpolatedInt `yaml:"lockMaxRetries"`
|
||||||
|
MaxRetries InterpolatedInt `yaml:"maxRetries"`
|
||||||
|
PingInterval InterpolatedDuration `yaml:"pingInterval"`
|
||||||
}
|
}
|
||||||
|
|
||||||
func NewDefaultRedisConfig() RedisConfig {
|
func NewDefaultRedisConfig() RedisConfig {
|
||||||
|
@ -25,5 +27,7 @@ func NewDefaultRedisConfig() RedisConfig {
|
||||||
WriteTimeout: InterpolatedDuration(30 * time.Second),
|
WriteTimeout: InterpolatedDuration(30 * time.Second),
|
||||||
DialTimeout: InterpolatedDuration(30 * time.Second),
|
DialTimeout: InterpolatedDuration(30 * time.Second),
|
||||||
LockMaxRetries: 10,
|
LockMaxRetries: 10,
|
||||||
|
MaxRetries: 3,
|
||||||
|
PingInterval: InterpolatedDuration(30 * time.Second),
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -9,7 +9,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func (s *Server) initRepositories(ctx context.Context) error {
|
func (s *Server) initRepositories(ctx context.Context) error {
|
||||||
client := setup.NewRedisClient(ctx, s.redisConfig)
|
client := setup.NewSharedClient(s.redisConfig)
|
||||||
|
|
||||||
if err := s.initProxyRepository(ctx, client); err != nil {
|
if err := s.initProxyRepository(ctx, client); err != nil {
|
||||||
return errors.WithStack(err)
|
return errors.WithStack(err)
|
||||||
|
|
|
@ -23,7 +23,7 @@ func init() {
|
||||||
}
|
}
|
||||||
|
|
||||||
func setupAuthnOIDCLayer(conf *config.Config) (director.Layer, error) {
|
func setupAuthnOIDCLayer(conf *config.Config) (director.Layer, error) {
|
||||||
rdb := newRedisClient(conf.Redis)
|
rdb := NewSharedClient(conf.Redis)
|
||||||
adapter := redis.NewStoreAdapter(rdb)
|
adapter := redis.NewStoreAdapter(rdb)
|
||||||
store := session.NewStore(adapter)
|
store := session.NewStore(adapter)
|
||||||
|
|
||||||
|
|
|
@ -27,7 +27,7 @@ func SetupIntegrations(ctx context.Context, conf *config.Config) ([]integration.
|
||||||
}
|
}
|
||||||
|
|
||||||
func setupKubernetesIntegration(ctx context.Context, conf *config.Config) (*kubernetes.Integration, error) {
|
func setupKubernetesIntegration(ctx context.Context, conf *config.Config) (*kubernetes.Integration, error) {
|
||||||
client := newRedisClient(conf.Redis)
|
client := NewSharedClient(conf.Redis)
|
||||||
locker := redis.NewLocker(client, 10)
|
locker := redis.NewLocker(client, 10)
|
||||||
|
|
||||||
integration := kubernetes.NewIntegration(
|
integration := kubernetes.NewIntegration(
|
||||||
|
|
|
@ -9,7 +9,7 @@ import (
|
||||||
)
|
)
|
||||||
|
|
||||||
func SetupLocker(ctx context.Context, conf *config.Config) (lock.Locker, error) {
|
func SetupLocker(ctx context.Context, conf *config.Config) (lock.Locker, error) {
|
||||||
client := newRedisClient(conf.Redis)
|
client := NewSharedClient(conf.Redis)
|
||||||
locker := redis.NewLocker(client, int(conf.Redis.LockMaxRetries))
|
locker := redis.NewLocker(client, int(conf.Redis.LockMaxRetries))
|
||||||
return locker, nil
|
return locker, nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,19 +3,11 @@ package setup
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
"forge.cadoles.com/cadoles/bouncer/internal/store"
|
||||||
redisStore "forge.cadoles.com/cadoles/bouncer/internal/store/redis"
|
redisStore "forge.cadoles.com/cadoles/bouncer/internal/store/redis"
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
)
|
)
|
||||||
|
|
||||||
func NewRedisClient(ctx context.Context, conf config.RedisConfig) redis.UniversalClient {
|
|
||||||
return redis.NewUniversalClient(&redis.UniversalOptions{
|
|
||||||
Addrs: conf.Adresses,
|
|
||||||
MasterName: string(conf.Master),
|
|
||||||
})
|
|
||||||
}
|
|
||||||
|
|
||||||
func NewProxyRepository(ctx context.Context, client redis.UniversalClient) (store.ProxyRepository, error) {
|
func NewProxyRepository(ctx context.Context, client redis.UniversalClient) (store.ProxyRepository, error) {
|
||||||
return redisStore.NewProxyRepository(client, redisStore.DefaultTxMaxAttempts, redisStore.DefaultTxBaseDelay), nil
|
return redisStore.NewProxyRepository(client, redisStore.DefaultTxMaxAttempts, redisStore.DefaultTxBaseDelay), nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -35,6 +35,6 @@ func setupQueueLayer(conf *config.Config) (director.Layer, error) {
|
||||||
}
|
}
|
||||||
|
|
||||||
func newQueueAdapter(redisConf config.RedisConfig) (queue.Adapter, error) {
|
func newQueueAdapter(redisConf config.RedisConfig) (queue.Adapter, error) {
|
||||||
rdb := newRedisClient(redisConf)
|
rdb := NewSharedClient(redisConf)
|
||||||
return queueRedis.NewAdapter(rdb, 2), nil
|
return queueRedis.NewAdapter(rdb, 2), nil
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,14 +1,38 @@
|
||||||
package setup
|
package setup
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"context"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
"forge.cadoles.com/cadoles/bouncer/internal/config"
|
||||||
|
"github.com/pkg/errors"
|
||||||
"github.com/redis/go-redis/v9"
|
"github.com/redis/go-redis/v9"
|
||||||
|
"gitlab.com/wpetit/goweb/logger"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var clients sync.Map
|
||||||
|
|
||||||
|
func NewSharedClient(conf config.RedisConfig) redis.UniversalClient {
|
||||||
|
key := strings.Join(conf.Adresses, "|") + "|" + string(conf.Master)
|
||||||
|
|
||||||
|
value, exists := clients.Load(key)
|
||||||
|
if exists {
|
||||||
|
if client, ok := (value).(redis.UniversalClient); ok {
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
client := newRedisClient(conf)
|
||||||
|
|
||||||
|
clients.Store(key, client)
|
||||||
|
|
||||||
|
return client
|
||||||
|
}
|
||||||
|
|
||||||
func newRedisClient(conf config.RedisConfig) redis.UniversalClient {
|
func newRedisClient(conf config.RedisConfig) redis.UniversalClient {
|
||||||
return redis.NewUniversalClient(&redis.UniversalOptions{
|
client := redis.NewUniversalClient(&redis.UniversalOptions{
|
||||||
Addrs: conf.Adresses,
|
Addrs: conf.Adresses,
|
||||||
MasterName: string(conf.Master),
|
MasterName: string(conf.Master),
|
||||||
ReadTimeout: time.Duration(conf.ReadTimeout),
|
ReadTimeout: time.Duration(conf.ReadTimeout),
|
||||||
|
@ -16,5 +40,33 @@ func newRedisClient(conf config.RedisConfig) redis.UniversalClient {
|
||||||
DialTimeout: time.Duration(conf.DialTimeout),
|
DialTimeout: time.Duration(conf.DialTimeout),
|
||||||
RouteByLatency: true,
|
RouteByLatency: true,
|
||||||
ContextTimeoutEnabled: true,
|
ContextTimeoutEnabled: true,
|
||||||
|
MaxRetries: int(conf.MaxRetries),
|
||||||
})
|
})
|
||||||
|
|
||||||
|
go func() {
|
||||||
|
ctx := logger.With(context.Background(),
|
||||||
|
logger.F("adresses", conf.Adresses),
|
||||||
|
logger.F("master", conf.Master),
|
||||||
|
)
|
||||||
|
|
||||||
|
timer := time.NewTicker(time.Duration(conf.PingInterval))
|
||||||
|
defer timer.Stop()
|
||||||
|
|
||||||
|
connected := true
|
||||||
|
|
||||||
|
for range timer.C {
|
||||||
|
if _, err := client.Ping(ctx).Result(); err != nil {
|
||||||
|
logger.Error(ctx, "redis disconnected", logger.E(errors.WithStack(err)))
|
||||||
|
connected = false
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
if !connected {
|
||||||
|
logger.Info(ctx, "redis reconnected")
|
||||||
|
connected = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return client
|
||||||
}
|
}
|
||||||
|
|
|
@ -91,12 +91,14 @@ func WithRetry(ctx context.Context, client redis.UniversalClient, key string, fn
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
|
||||||
return err
|
return errors.WithStack(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
logger.Error(ctx, "redis error", logger.E(errors.WithStack(err)))
|
||||||
|
|
||||||
return errors.WithStack(redis.TxFailedErr)
|
return errors.WithStack(redis.TxFailedErr)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
@ -190,6 +190,8 @@ redis:
|
||||||
writeTimeout: 30s
|
writeTimeout: 30s
|
||||||
readTimeout: 30s
|
readTimeout: 30s
|
||||||
dialTimeout: 30s
|
dialTimeout: 30s
|
||||||
|
maxRetries: 3
|
||||||
|
pingInterval: 30s
|
||||||
|
|
||||||
# Configuration des logs
|
# Configuration des logs
|
||||||
logger:
|
logger:
|
||||||
|
|
|
@ -0,0 +1,79 @@
|
||||||
|
# Updated by Siege %_VERSION%, %_DATE%
|
||||||
|
# Copyright 2000-2016 by %_AUTHOR%
|
||||||
|
#
|
||||||
|
# Siege configuration file -- edit as necessary
|
||||||
|
# For more information about configuring and running this program,
|
||||||
|
# visit: http://www.joedog.org/
|
||||||
|
|
||||||
|
#
|
||||||
|
#
|
||||||
|
# Verbose mode: With this feature enabled, siege will print the
|
||||||
|
# result of each transaction to stdout. (Enabled by default)
|
||||||
|
#
|
||||||
|
# ex: verbose = true|false
|
||||||
|
#
|
||||||
|
verbose = true
|
||||||
|
|
||||||
|
#
|
||||||
|
# Color mode: This option works in conjunction with verbose mode.
|
||||||
|
# It tells siege whether or not it should display its output in
|
||||||
|
# color-coded output. (Enabled by default)
|
||||||
|
#
|
||||||
|
# ex: color = on | off
|
||||||
|
#
|
||||||
|
color = on
|
||||||
|
|
||||||
|
#
|
||||||
|
# Cache revalidation. Siege supports cache revalidation for both ETag
|
||||||
|
# and Last-modified headers. If a copy is still fresh, the server
|
||||||
|
# responds with 304. While this feature is required for HTTP/1.1, it
|
||||||
|
# may not be welcomed for load testing. We allow you to breach the
|
||||||
|
# protocol and turn off caching
|
||||||
|
#
|
||||||
|
# HTTP/1.1 200 0.00 secs: 2326 bytes ==> /apache_pb.gif
|
||||||
|
# HTTP/1.1 304 0.00 secs: 0 bytes ==> /apache_pb.gif
|
||||||
|
# HTTP/1.1 304 0.00 secs: 0 bytes ==> /apache_pb.gif
|
||||||
|
#
|
||||||
|
# Siege also supports Cache-control headers. Consider this server
|
||||||
|
# response: Cache-Control: max-age=3
|
||||||
|
# That tells siege to cache the file for three seconds. While it
|
||||||
|
# doesn't actually store the file, it will logically grab it from
|
||||||
|
# its cache. In verbose output, it designates a cached resource
|
||||||
|
# with (c):
|
||||||
|
#
|
||||||
|
# HTTP/1.1 200 0.25 secs: 159 bytes ==> GET /expires/
|
||||||
|
# HTTP/1.1 200 1.48 secs: 498419 bytes ==> GET /expires/Otter_in_Southwold.jpg
|
||||||
|
# HTTP/1.1 200 0.24 secs: 159 bytes ==> GET /expires/
|
||||||
|
# HTTP/1.1 200(C) 0.00 secs: 0 bytes ==> GET /expires/Otter_in_Southwold.jpg
|
||||||
|
#
|
||||||
|
# NOTE: with color enabled, cached URLs appear in green
|
||||||
|
#
|
||||||
|
# ex: cache = true
|
||||||
|
#
|
||||||
|
cache = true
|
||||||
|
|
||||||
|
#
|
||||||
|
# Cookie support: by default siege accepts cookies. This directive is
|
||||||
|
# available to disable that support. Set cookies to 'false' to refuse
|
||||||
|
# cookies. Set it to 'true' to accept them. The default value is true.
|
||||||
|
# If you want to maintain state with the server, then this MUST be set
|
||||||
|
# to true.
|
||||||
|
#
|
||||||
|
# ex: cookies = false
|
||||||
|
#
|
||||||
|
cookies = true
|
||||||
|
|
||||||
|
#
|
||||||
|
# Failures: This is the number of total connection failures allowed
|
||||||
|
# before siege aborts. Connection failures (timeouts, socket failures,
|
||||||
|
# etc.) are combined with 400 and 500 level errors in the final stats,
|
||||||
|
# but those errors do not count against the abort total. If you set
|
||||||
|
# this total to 10, then siege will abort after ten socket timeouts,
|
||||||
|
# but it will NOT abort after ten 404s. This is designed to prevent a
|
||||||
|
# run-away mess on an unattended siege.
|
||||||
|
#
|
||||||
|
# The default value is 1024
|
||||||
|
#
|
||||||
|
# ex: failures = 50
|
||||||
|
#
|
||||||
|
failures = -1
|
Loading…
Reference in New Issue