WARNING: Version 5.x has passed its EOL date.
This documentation is no longer being maintained and may be removed. If you are running this version, we strongly advise you to upgrade. For the latest information, see the current release documentation.
Sniffing on startup
editSniffing on startup
editConnection pools that return true
for SupportsReseeding
will sniff on startup by default.
We can demonstrate this by creating a virtual Elasticsearch cluster using NEST’s Test cluster framework.
Here we create a 10 node cluster that uses a Sniffing connection pool, setting sniff to fail on all nodes *except* 9202
var audit = new Auditor(() => Framework.Cluster .Nodes(10) .Sniff(s => s.Fails(Always)) .Sniff(s => s.OnPort(9202).Succeeds(Always)) .SniffingConnectionPool() .AllDefaults() );
When the client call is made, from the audit trail we see that the pool first tried to sniff on startup, with a sniff failure on 9200 and 9201, followed by a sniff success on 9202. A ping and then healthy response are made on 9200
await audit.TraceCall( new ClientCall { { SniffOnStartup}, { SniffFailure, 9200}, { SniffFailure, 9201}, { SniffSuccess, 9202}, { PingSuccess , 9200}, { HealthyResponse, 9200} } );
Occurs once
editA sniff on startup only happens once. That is,
- a sniff is attempted on a node
- if that node fails, a sniff is attempted on the next node
- this continues until a sniff succeeds
- a sniff on startup does not occur again.
var audit = new Auditor(() => Framework.Cluster .Nodes(10) .Sniff(s => s.Fails(Always)) .Sniff(s => s.OnPort(9202).Succeeds(Always)) .SniffingConnectionPool() .AllDefaults() ); await audit.TraceCalls( new ClientCall { { SniffOnStartup}, { SniffFailure, 9200}, { SniffFailure, 9201}, { SniffSuccess, 9202}, { PingSuccess , 9200}, { HealthyResponse, 9200} }, new ClientCall { { PingSuccess, 9201}, { HealthyResponse, 9201} } );
Uses cluster state
editA sniff on startup will use the returned cluster state.
In this next example, the state of the cluster returned from the successful sniff is used for subsequent client requests
var audit = new Auditor(() => Framework.Cluster .Nodes(10) .Sniff(s => s.Fails(Always)) .Sniff(s => s.OnPort(9202).Succeeds(Always, Framework.Cluster.Nodes(8, startFrom: 9204))) .SniffingConnectionPool() .AllDefaults() ); await audit.TraceCall(new ClientCall { { SniffOnStartup}, { SniffFailure, 9200}, { SniffFailure, 9201}, { SniffSuccess, 9202}, { PingSuccess, 9204}, { HealthyResponse, 9204} });
Prefers master eligible nodes
editSniffing prefers to run on master eligible nodes
var audit = new Auditor(() => Framework.Cluster .Nodes(new[] { new Node(new Uri("http://localhost:9200")) { MasterEligible = false }, new Node(new Uri("http://localhost:9201")) { MasterEligible = false }, new Node(new Uri("http://localhost:9202")) { MasterEligible = true }, }) .Sniff(s => s.Succeeds(Always)) .SniffingConnectionPool() .AllDefaults() ); await audit.TraceCall(new ClientCall { { SniffOnStartup}, { SniffSuccess, 9202}, { PingSuccess, 9200}, { HealthyResponse, 9200} });
although it will fail over to non-master eligible nodes when sniffing fails on master eligible nodes
var audit = new Auditor(() => Framework.Cluster .Nodes(new[] { new Node(new Uri("http://localhost:9200")) { MasterEligible = true }, new Node(new Uri("http://localhost:9201")) { MasterEligible = true }, new Node(new Uri("http://localhost:9202")) { MasterEligible = false }, }) .Sniff(s => s.Fails(Always)) .Sniff(s => s.OnPort(9202).Succeeds(Always)) .SniffingConnectionPool() .AllDefaults() ); await audit.TraceCall(new ClientCall { { SniffOnStartup}, { SniffFailure, 9200}, { SniffFailure, 9201}, { SniffSuccess, 9202}, { PingSuccess, 9200}, { HealthyResponse, 9200} });