Files
ubicloud/spec/model/load_balancers_vms_spec.rb
Furkan Sahin cdd8c8a094 Prepare load_balancers_vms models for health probes
We are moving the health checks into load_balancers_vms. The main reason
these are not handled as part of VM monitoring is because the VM might
be up and running but the load balancer makes a decision based on the
application state. It is safer to keep this separate. This code will
also interract with load balancer and keeping a code path as part of a
VM that is not part of a load balancer doesn't seem clever. We are
making a couple of logic changes here.
1. The state of the load balancer node is only updated when the monitor
is sure their state is changed. This way, we don't have to look into
counters at the time of update.
2. IPv4 and IPv6 availability is handled properly. Before, these were
kind of mixed up and causing some logical errors. Now, they are
distinctly checked and properly declared.

This commit itself doesn't simply stop the health probe strands. We will
need to handle their migration manually by destroying the strands.
2025-01-29 16:34:15 +01:00

216 lines
14 KiB
Ruby

# frozen_string_literal: true
require_relative "spec_helper"
RSpec.describe LoadBalancersVms do
subject(:lb_vm) {
dz = DnsZone.create_with_id(name: "test-dns-zone", project_id: prj.id)
cert = Prog::Vnet::CertNexus.assemble("test-host-name", dz.id).subject
lb = Prog::Vnet::LoadBalancerNexus.assemble(private_subnet.id, name: "test-lb", src_port: 80, dst_port: 80).subject
lb.add_cert(cert)
lb.add_vm(vm)
lb.load_balancers_vms.first
}
let(:private_subnet) {
Prog::Vnet::SubnetNexus.assemble(prj.id, name: "test-ps", ipv4_range: "192.168.1.0/24").subject
}
let(:vm) {
nic = Prog::Vnet::NicNexus.assemble(private_subnet.id, name: "test-vm-nic", ipv4_addr: "192.168.1.1").subject
Prog::Vm::Nexus.assemble("pub-key", prj.id, name: "test-vm", private_subnet_id: private_subnet.id, nic_id: nic.id).subject
}
let(:prj) {
Project.create_with_id(name: "test-prj")
}
describe "#health_probe" do
let(:vmh) {
session = instance_double(Sshable, start_fresh_session: "session")
instance_double(VmHost, sshable: session)
}
before do
allow(lb_vm.vm).to receive_messages(vm_host: vmh, ephemeral_net6: NetAddr::IPv6Net.parse("2a01:4f8:10a:128b:814c::/79"))
lb_vm.update(state: "up")
end
describe "#init_health_monitor_session" do
it "returns a hash with an ssh_session" do
expect(lb_vm.init_health_monitor_session).to eq({ssh_session: "session"})
end
end
describe "health_check_cmd" do
it "returns the correct command" do
lb = lb_vm.load_balancer
lb.update(health_check_protocol: "http")
expect(lb_vm.health_check_cmd(:ipv4)).to eq("sudo ip netns exec #{vm.inhost_name} curl --insecure --resolve #{lb.hostname}:80:192.168.1.1 --max-time 15 --silent --output /dev/null --write-out '%{http_code}' http://#{lb.hostname}:80/up")
expect(lb_vm.health_check_cmd(:ipv6)).to eq("sudo ip netns exec #{vm.inhost_name} curl --insecure --resolve #{lb.hostname}:80:[2a01:4f8:10a:128b:814c::2] --max-time 15 --silent --output /dev/null --write-out '%{http_code}' http://#{lb.hostname}:80/up")
lb.update(health_check_protocol: "tcp")
expect(lb_vm.health_check_cmd(:ipv4)).to eq("sudo ip netns exec #{vm.inhost_name} nc -z -w 15 192.168.1.1 80 && echo 200 || echo 400")
expect(lb_vm.health_check_cmd(:ipv6)).to eq("sudo ip netns exec #{vm.inhost_name} nc -z -w 15 2a01:4f8:10a:128b:814c::2 80 && echo 200 || echo 400")
lb.update(health_check_protocol: "https")
expect(lb_vm.health_check_cmd(:ipv4)).to eq("sudo ip netns exec #{vm.inhost_name} curl --insecure --resolve #{lb.hostname}:80:192.168.1.1 --max-time 15 --silent --output /dev/null --write-out '%{http_code}' https://#{lb.hostname}:80/up")
expect(lb_vm.health_check_cmd(:ipv6)).to eq("sudo ip netns exec #{vm.inhost_name} curl --insecure --resolve #{lb.hostname}:80:[2a01:4f8:10a:128b:814c::2] --max-time 15 --silent --output /dev/null --write-out '%{http_code}' https://#{lb.hostname}:80/up")
end
end
describe "#health_check" do
let(:session) {
{ssh_session: instance_double(Net::SSH::Connection::Session)}
}
it "returns up for ipv4 checks when ipv4 is not enabled and performs the ipv6 check" do
lb = lb_vm.load_balancer
lb.update(stack: "ipv6")
expect(vm).not_to receive(:vm_host)
expect(lb_vm).to receive(:health_check_cmd).with(:ipv6).and_return("healthcheck command ipv6").at_least(:once)
expect(session[:ssh_session]).to receive(:exec!).with("healthcheck command ipv6").and_return("400")
expect(lb_vm.health_check(session:)).to eq(["up", "down"])
end
it "returns up for ipv6 checks when ipv6 is not enabled and performs the ipv4 check" do
lb = lb_vm.load_balancer
lb.update(stack: "ipv4")
expect(vm).not_to receive(:vm_host)
expect(lb_vm).to receive(:health_check_cmd).with(:ipv4).and_return("healthcheck command ipv4").at_least(:once)
expect(session[:ssh_session]).to receive(:exec!).with("healthcheck command ipv4").and_return("400")
expect(lb_vm.health_check(session:)).to eq(["down", "up"])
end
it "runs the health check command and returns the result for both when dual stack" do
expect(lb_vm).to receive(:health_check_cmd).with(:ipv4).and_return("healthcheck command ipv4").at_least(:once)
expect(lb_vm).to receive(:health_check_cmd).with(:ipv6).and_return("healthcheck command ipv6").at_least(:once)
expect(session[:ssh_session]).to receive(:exec!).with("healthcheck command ipv4").and_return("200").at_least(:once)
expect(session[:ssh_session]).to receive(:exec!).with("healthcheck command ipv6").and_return("200")
expect(lb_vm.health_check(session:)).to eq(["up", "up"])
expect(session[:ssh_session]).to receive(:exec!).with("healthcheck command ipv6").and_return("400")
expect(lb_vm.health_check(session:)).to eq(["up", "down"])
end
it "returns down if the health check command raises an exception" do
expect(lb_vm).to receive(:health_check_cmd).and_return("healthcheck command").at_least(:once)
expect(session[:ssh_session]).to receive(:exec!).with("healthcheck command").and_raise("error").at_least(:once)
expect(lb_vm.health_check(session:)).to eq(["down", "down"])
end
end
describe "#check_probe" do
it "raises an exception if health check type is not valid" do
expect { lb_vm.check_probe(nil, :invalid) }.to raise_error("Invalid type: invalid")
end
end
describe "#check_pulse" do
let(:session) {
{ssh_session: instance_double(Sshable)}
}
it "doesn't perform update if the state is up and the pulse is also up" do
lb_vm.update(state: "up")
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "up"])
expect(lb_vm).not_to receive(:update)
expect(lb_vm.load_balancer).not_to receive(:incr_update_load_balancer)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "up", reading_rpt: 1, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "up", reading: "up", reading_rpt: 2, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "doesn't perform update if the state is up, the pulse is down, but the reading repeat is below the threshold" do
lb_vm.update(state: "up")
expect(lb_vm).to receive(:health_check).with(session:).and_return(["down", "up"])
expect(lb_vm).not_to receive(:update)
expect(lb_vm.load_balancer).not_to receive(:incr_update_load_balancer)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:20.049434 +0100")).at_least(:once)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "up", reading_rpt: 1, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "down", ipv6: "up", reading: "down", reading_rpt: 1, reading_chg: Time.parse("2025-01-28 13:15:20.049434 +0100")})
end
it "doesn't perform update if the state is up, the pulse is down, but the reading count is above the threshold but the reading change is too recent" do
lb_vm.update(state: "up")
lb_vm.load_balancer.update(health_check_down_threshold: 3)
lb_vm.load_balancer.update(health_check_interval: 30)
expect(lb_vm).to receive(:health_check).with(session:).and_return(["down", "up"])
expect(lb_vm).not_to receive(:update)
expect(lb_vm.load_balancer).not_to receive(:incr_update_load_balancer)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:20.049434 +0100")).at_least(:once)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "down", reading_rpt: 4, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "down", ipv6: "up", reading: "down", reading_rpt: 5, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "doesn't perform update if the state is up, the pulse is up, but the reading count is above the threshold but the reading didn't change recently but the load balancer is set to update" do
lb_vm.update(state: "up")
lb_vm.load_balancer.update(health_check_down_threshold: 3)
lb_vm.load_balancer.update(health_check_interval: 30)
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "down"])
expect(lb_vm).not_to receive(:update)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:50.049434 +0100")).at_least(:once)
lb_vm.load_balancer.incr_update_load_balancer
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "down", reading_rpt: 4, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "down", reading: "down", reading_rpt: 5, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "performs update if the state is down, the pulse is up, the reading count is above the threshold and the reading didn't change recently and the load balancer is not set to update" do
lb_vm.update(state: "up")
lb_vm.load_balancer.update(health_check_down_threshold: 3)
lb_vm.load_balancer.update(health_check_interval: 30)
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "down"])
expect(lb_vm).to receive(:update).with(state: "down")
expect(lb_vm.load_balancer).to receive(:incr_update_load_balancer)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:50.049434 +0100")).at_least(:once)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "down", reading_rpt: 4, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "down", reading: "down", reading_rpt: 5, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "doesn't perform update if the state is down and the pulse is also down" do
lb_vm.update(state: "down")
expect(lb_vm).to receive(:health_check).with(session:).and_return(["down", "down"])
expect(lb_vm).not_to receive(:update)
expect(lb_vm.load_balancer).not_to receive(:incr_update_load_balancer)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "down", reading_rpt: 1, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "down", ipv6: "down", reading: "down", reading_rpt: 2, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "doesn't perform update if the state is down, the pulse is up, but the reading repeat is below the threshold" do
lb_vm.update(state: "down")
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "up"])
expect(lb_vm).not_to receive(:update)
expect(lb_vm.load_balancer).not_to receive(:incr_update_load_balancer)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:20.049434 +0100")).at_least(:once)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "down", reading_rpt: 1, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "up", reading: "up", reading_rpt: 1, reading_chg: Time.parse("2025-01-28 13:15:20.049434 +0100")})
end
it "doesn't perform update if the state is down, the pulse is up, but the reading count is above the threshold and the reading change is too recent" do
lb_vm.update(state: "down")
lb_vm.load_balancer.update(health_check_down_threshold: 3)
lb_vm.load_balancer.update(health_check_interval: 30)
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "up"])
expect(lb_vm).not_to receive(:update)
expect(lb_vm.load_balancer).not_to receive(:incr_update_load_balancer)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:20.049434 +0100")).at_least(:once)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "up", reading_rpt: 4, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "up", reading: "up", reading_rpt: 5, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "doesn't perform update if the state is down, the pulse is up, the reading count is above the threshold and the reading change is too recent and the load balancer is set to update" do
lb_vm.update(state: "down")
lb_vm.load_balancer.update(health_check_down_threshold: 3)
lb_vm.load_balancer.update(health_check_interval: 30)
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "up"])
expect(lb_vm).not_to receive(:update)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:50.049434 +0100")).at_least(:once)
lb_vm.load_balancer.incr_update_load_balancer
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "up", reading_rpt: 4, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "up", reading: "up", reading_rpt: 5, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
it "performs update if the state is down, the pulse is up, the reading count is above the threshold and the reading change is too recent and the load balancer is not set to update" do
lb_vm.update(state: "down")
lb_vm.load_balancer.update(health_check_down_threshold: 3)
lb_vm.load_balancer.update(health_check_interval: 30)
expect(lb_vm).to receive(:health_check).with(session:).and_return(["up", "up"])
expect(lb_vm).to receive(:update).with(state: "up")
expect(lb_vm.load_balancer).to receive(:incr_update_load_balancer)
expect(Time).to receive(:now).and_return(Time.parse("2025-01-28 13:15:50.049434 +0100")).at_least(:once)
expect(lb_vm.check_pulse(session:, previous_pulse: {reading: "up", reading_rpt: 4, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})).to eq({ipv4: "up", ipv6: "up", reading: "up", reading_rpt: 5, reading_chg: Time.parse("2025-01-28 13:15:10.049434 +0100")})
end
end
end
end