gitlab-ce/spec/lib/gitlab/memory/watchdog/configurator_spec.rb

313 lines
10 KiB
Ruby

# frozen_string_literal: true
require 'spec_helper'
RSpec.describe Gitlab::Memory::Watchdog::Configurator, feature_category: :application_performance do
shared_examples 'as configurator' do |handler_class, event_reporter_class, sleep_time_env, sleep_time|
it 'configures the correct handler' do
configurator.call(configuration)
expect(configuration.handler).to be_an_instance_of(handler_class)
end
it 'configures the correct event reporter' do
configurator.call(configuration)
expect(configuration.event_reporter).to be_an_instance_of(event_reporter_class)
end
it 'configures the correct logger' do
configurator.call(configuration)
expect(configuration.event_reporter.logger).to eq(logger)
end
context 'when sleep_time_seconds is not passed through the environment' do
let(:sleep_time_seconds) { sleep_time }
it 'configures the correct sleep time' do
configurator.call(configuration)
expect(configuration.sleep_time_seconds).to eq(sleep_time_seconds)
end
end
context 'when sleep_time_seconds is passed through the environment' do
let(:sleep_time_seconds) { sleep_time - 1 }
before do
stub_env(sleep_time_env, sleep_time - 1)
end
it 'configures the correct sleep time' do
configurator.call(configuration)
expect(configuration.sleep_time_seconds).to eq(sleep_time_seconds)
end
end
end
shared_examples 'as monitor configurator' do
it 'executes monitors and returns correct results' do
configurator.call(configuration)
payloads = {}
configuration.monitors.call_each do |result|
payloads[result.monitor_name] = result.payload
end
expect(payloads).to eq(expected_payloads)
end
end
let(:configuration) { Gitlab::Memory::Watchdog::Configuration.new }
# In tests, the Puma constant does not exist so we cannot use a verified double.
# rubocop: disable RSpec/VerifiedDoubles
describe '.configure_for_puma' do
let(:logger) { Gitlab::AppLogger }
let(:puma) do
Class.new do
def self.cli_config
Struct.new(:options).new
end
end
end
subject(:configurator) { described_class.configure_for_puma }
def stub_prometheus_metrics
gauge = instance_double(::Prometheus::Client::Gauge)
allow(Gitlab::Metrics).to receive(:gauge).and_return(gauge)
allow(gauge).to receive(:set)
end
before do
stub_const('Puma', puma)
stub_const('Puma::Cluster::WorkerHandle', double.as_null_object)
stub_prometheus_metrics
end
it_behaves_like 'as configurator',
Gitlab::Memory::Watchdog::Handlers::PumaHandler,
Gitlab::Memory::Watchdog::EventReporter,
'GITLAB_MEMWD_SLEEP_TIME_SEC',
described_class::DEFAULT_SLEEP_INTERVAL_S
context 'with DISABLE_PUMA_WORKER_KILLER set to true' do
let(:primary_memory_bytes) { 2_097_152_000 }
let(:worker_memory_bytes) { max_mem_growth * primary_memory_bytes + 1 }
let(:expected_payloads) do
{
heap_fragmentation: {
message: 'heap fragmentation limit exceeded',
memwd_cur_heap_frag: max_heap_fragmentation + 0.1,
memwd_max_heap_frag: max_heap_fragmentation,
memwd_max_strikes: max_strikes,
memwd_cur_strikes: 1
},
unique_memory_growth: {
message: 'memory limit exceeded',
memwd_uss_bytes: worker_memory_bytes,
memwd_ref_uss_bytes: primary_memory_bytes,
memwd_max_uss_bytes: max_mem_growth * primary_memory_bytes,
memwd_max_strikes: max_strikes,
memwd_cur_strikes: 1
}
}
end
before do
stub_env('DISABLE_PUMA_WORKER_KILLER', true)
allow(Gitlab::Metrics::Memory).to receive(:gc_heap_fragmentation).and_return(max_heap_fragmentation + 0.1)
allow(Gitlab::Metrics::System).to receive(:memory_usage_uss_pss).and_return({ uss: worker_memory_bytes })
allow(Gitlab::Metrics::System).to receive(:memory_usage_uss_pss).with(
pid: Gitlab::Cluster::PRIMARY_PID
).and_return({ uss: primary_memory_bytes })
end
context 'when settings are set via environment variables' do
let(:max_heap_fragmentation) { 0.4 }
let(:max_mem_growth) { 4.0 }
let(:max_strikes) { 4 }
before do
stub_env('GITLAB_MEMWD_MAX_HEAP_FRAG', 0.4)
stub_env('GITLAB_MEMWD_MAX_MEM_GROWTH', 4.0)
stub_env('GITLAB_MEMWD_MAX_STRIKES', 4)
end
it_behaves_like 'as monitor configurator'
end
context 'when settings are not set via environment variables' do
let(:max_heap_fragmentation) { described_class::DEFAULT_MAX_HEAP_FRAG }
let(:max_mem_growth) { described_class::DEFAULT_MAX_MEM_GROWTH }
let(:max_strikes) { described_class::DEFAULT_MAX_STRIKES }
it_behaves_like 'as monitor configurator'
end
end
context 'with DISABLE_PUMA_WORKER_KILLER set to false' do
let(:memory_limit_bytes) { memory_limit_mb.megabytes }
let(:expected_payloads) do
{
rss_memory_limit: {
message: 'rss memory limit exceeded',
memwd_rss_bytes: memory_limit_bytes + 1,
memwd_max_rss_bytes: memory_limit_bytes,
memwd_max_strikes: max_strikes,
memwd_cur_strikes: 1
}
}
end
before do
stub_env('DISABLE_PUMA_WORKER_KILLER', false)
allow(Gitlab::Metrics::System).to receive(:memory_usage_rss).and_return({ total: memory_limit_bytes + 1 })
end
context 'when settings are set via environment variables' do
let(:memory_limit_mb) { 1300 }
let(:max_strikes) { 4 }
before do
stub_env('PUMA_WORKER_MAX_MEMORY', memory_limit_mb)
stub_env('GITLAB_MEMWD_MAX_STRIKES', 4)
end
it_behaves_like 'as monitor configurator'
end
context 'when settings are not set via environment variables' do
let(:memory_limit_mb) { described_class::DEFAULT_PUMA_WORKER_RSS_LIMIT_MB }
let(:max_strikes) { described_class::DEFAULT_MAX_STRIKES }
it_behaves_like 'as monitor configurator'
end
end
end
# rubocop: enable RSpec/VerifiedDoubles
describe '.configure_for_sidekiq' do
let(:logger) { ::Sidekiq.logger }
subject(:configurator) { described_class.configure_for_sidekiq }
it_behaves_like 'as configurator',
Gitlab::Memory::Watchdog::Handlers::SidekiqHandler,
Gitlab::Memory::Watchdog::SidekiqEventReporter,
'SIDEKIQ_MEMORY_KILLER_CHECK_INTERVAL',
described_class::DEFAULT_SIDEKIQ_SLEEP_INTERVAL_S
context 'when sleep_time_seconds is less than MIN_SIDEKIQ_SLEEP_INTERVAL_S seconds' do
before do
stub_env('SIDEKIQ_MEMORY_KILLER_CHECK_INTERVAL', 0)
end
it 'configures the correct sleep time' do
configurator.call(configuration)
expect(configuration.sleep_time_seconds).to eq(described_class::MIN_SIDEKIQ_SLEEP_INTERVAL_S)
end
end
context 'with monitors' do
let(:soft_limit_bytes) { soft_limit_kb.kilobytes }
let(:hard_limit_bytes) { hard_limit_kb.kilobytes }
context 'when settings are set via environment variables' do
let(:soft_limit_kb) { 2000001 }
let(:hard_limit_kb) { 300000 }
let(:max_strikes) { 150 }
let(:grace_time) { 300 }
let(:expected_payloads) do
{
rss_memory_soft_limit: {
message: 'rss memory limit exceeded',
memwd_rss_bytes: soft_limit_bytes + 1,
memwd_max_rss_bytes: soft_limit_bytes,
memwd_max_strikes: max_strikes,
memwd_cur_strikes: 1
},
rss_memory_hard_limit: {
message: 'rss memory limit exceeded',
memwd_rss_bytes: hard_limit_bytes + 1,
memwd_max_rss_bytes: hard_limit_bytes,
memwd_max_strikes: 0,
memwd_cur_strikes: 1
}
}
end
before do
stub_env('SIDEKIQ_MEMORY_KILLER_MAX_RSS', soft_limit_kb)
stub_env('SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS', hard_limit_kb)
stub_env('SIDEKIQ_MEMORY_KILLER_GRACE_TIME', grace_time)
stub_env('SIDEKIQ_MEMORY_KILLER_CHECK_INTERVAL', 2)
allow(Gitlab::Metrics::System).to receive(:memory_usage_rss)
.and_return({ total: soft_limit_bytes + 1 }, { total: hard_limit_bytes + 1 })
end
it_behaves_like 'as monitor configurator'
end
context 'when only SIDEKIQ_MEMORY_KILLER_MAX_RSS is set via environment variable' do
let(:soft_limit_kb) { 2000000 }
let(:max_strikes) do
described_class::DEFAULT_SIDEKIQ_GRACE_TIME_S / described_class::DEFAULT_SIDEKIQ_SLEEP_INTERVAL_S
end
let(:expected_payloads) do
{
rss_memory_soft_limit: {
message: 'rss memory limit exceeded',
memwd_rss_bytes: soft_limit_bytes + 1,
memwd_max_rss_bytes: soft_limit_bytes,
memwd_max_strikes: max_strikes,
memwd_cur_strikes: 1
}
}
end
before do
allow(Gitlab::Metrics::System).to receive(:memory_usage_rss).and_return({ total: soft_limit_bytes + 1 })
stub_env('SIDEKIQ_MEMORY_KILLER_MAX_RSS', soft_limit_kb)
end
it_behaves_like 'as monitor configurator'
end
context 'when only SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS is set via environment variable' do
let(:hard_limit_kb) { 2000000 }
let(:expected_payloads) do
{
rss_memory_hard_limit: {
message: 'rss memory limit exceeded',
memwd_rss_bytes: hard_limit_bytes + 1,
memwd_max_rss_bytes: hard_limit_bytes,
memwd_max_strikes: 0,
memwd_cur_strikes: 1
}
}
end
before do
allow(Gitlab::Metrics::System).to receive(:memory_usage_rss).and_return({ total: hard_limit_bytes + 1 })
stub_env('SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS', hard_limit_kb)
end
it_behaves_like 'as monitor configurator'
end
context 'when both SIDEKIQ_MEMORY_KILLER_MAX_RSS and SIDEKIQ_MEMORY_KILLER_HARD_LIMIT_RSS are not set' do
let(:expected_payloads) { {} }
it_behaves_like 'as monitor configurator'
end
end
end
end