ServerArchitecture

Revision 10 as of 2015-03-02 22:52:34

Clear message

Crash Database Flow

Terminology

  • A stacktrace address signature is a signature generated from the addresses of a stack trace (bzr:apport/apport/report.py:1215). Because this isn't as complete as a full crash signature, generated by retracing the core dump with all the needed debug symbols installed, we will have multiple crash signatures for the same stack trace. We can then request a full core dump if and only if we haven't already received a core dump for the submitted stacktrace address signature. This saves the vast majority of users from having to upload a massive file.
  • A regular crash signature is simply the concatenation of the executable path, the signal number, and the top few lines of the stack trace (bzr:apport/apport/report.py:1128).

Column Families

AwaitingRetrace CF

  • '/bin/bash:11:x86_64:[vdso]+70c:...'

    '7aefa002-4a7046a3-a02d-644b9d847e0d'

    ...

    ...

Bucket CF

  • '/bin/bash:11:read:main'

    '7aefa002-4a7046a3-a02d-644b9d847e0d'

    ...

    ...

BucketMetadata CF

'4.3-11ubuntu2'

'4.3-11ubuntu2'

'bash'

'4.3-11ubuntu2'

'4.3-11ubuntu2'

BucketRetraceFailureReason CF

  • ...

BucketVersionSystems2 CF

  • ...

BucketVersions CF

  • ...

BucketVersionsCount CF

  • ...

BucketVersionsDay CF

  • ...

BucketVersionsFull CF

  • ...

BugToCrashSignatures CF

  • ...

CouldNotBucket CF

  • ...

Counters CF

  • ...

DayBuckets CF

  • ...

DayBucketCounts CF

  • 20120213

    'Buckets'

    'DistroVersion:Ubuntu 12.04'

    'Architecutre:i386'

    ...

    30

    15

    3

    ...

DayOOPS CF

  • ...

DayUsers CF

  • ...

ErrorsByRelease CF

  • ...

FirstError CF

  • ...

Hashes CF

  • ...

Indexes CF

  • 'crash_signature_for_stacktrace_address_signature'

    '/bin/bash:11:x86_64:[vdso]+70c:...'

    ...

    '/bin/bash:11:read:main...'

    ...

    'retracing'

    '/bin/bash:11:x86_64:[vdso]+70c:...'

    ...

    ...

OOPS CF

  • uuid.uuid1()

    Date

    Architecture

    DistroRelease

    ...

    'Wed Feb 29 22:56:12 2012'

    'amd64'

    'Ubuntu 12.04'

    ...

RetraceStats CF

  • ...

SourceVersionBuckets CF

  • (source_package, version)

    bucket

    bucket

    ...

    ...

Stacktrace CF

  • '/bin/bash:11:x86_64:[vdso]+70c:...'

    Date

    Stacktrace

    ...

    'Wed Feb 29 22:56:12 2012'

    #0 0x0f in foo () at /foo.c:1 ...

    ...

SystemImages CF

  • ...

SystemOOPSHashes CF

  • ...

SystemsForErrorsByRelease CF

  • ...

UniqueSystemsForErrorsByRelease CF

  • ...

UniqueUsers90Days CF

  • ...

UserBinaryPackages CF

  • ...

UserOOOPS CF

  • ...

The UserOOPS CF is for an eventual feature whereby you can remove your data from the crash database, given a pairing of your system UUID and a UUID generated and stored in /etc/default/whoopsie.

The DayOOPS CF comes from lp:oops-repository, but is yet to be used here.

A typical run through of the diagram may occur as follows:

  1. A crash comes in and is determined to be either a binary or Python code (server acceptance).
  2. If it is a binary, a lookup is done with the stacktrace address signature as a column name to the crash_signature_for_stacktrace_address_signature row in the Indexes ColumnFamily. If this signature has already been retraced with a previous crash, the Stacktrace CF will contain the fully retraced report. We then add the OOPS ID to the bucket queue.

  3. If the above lookup returns NULL, it is assumed that we don't have a retraced report for this signature, and a full core dump is requested. If the Indexes CF 'retracing' column key has the signature, then we know that we have this core dump already and are just waiting for it to be retraced. We add the OOPS ID to the AwaitingRetrace CF in both cases, as we may not get a core dump from this user.

  4. When the reporting daemon (whoopsie) sends the full core dump on behalf of the user, it's pushed onto the respective architecture queue, then eventually processed. It does this by first pulling the rest of the crash data back down from the OOPS ColumnFamily, then running the now fully formed report through apport-retrace. The fully retraced report is then pushed into the Stacktrace ColumnFamily, row keyed on the stacktrace address signature.

    The newly generated crash signature is also written to the Indexes CF, as the column value for the stacktrace address signature column name.

    The stacktrace address signature is removed from the Indexes CF's retrace row, indicating that we're no longer waiting for this signature to be retraced. Subsequent reports with this signature can be written straight to the bucket queue.

    Finally, the OOPS ID (uuid1) for this crash is pushed onto the bucket queue. All the OOPS IDs with the same stacktrace address signature are also pulled from the AwaitingRetrace CF and pushed onto the bucket queue.

  5. If retracing fails, then the crash address signature is removed from the retrace row key in the Indexes CF, indicating that we need another core file to process. This is one example of where we can use ConsistencyLevel.ONE. We don't care if the code accepting crashes is made aware of needing to accept another core file straight away.

  6. Any crashes that come through while we have the same signature in the Indexes CF's retrace row will be written to the AwaitingRetrace CF, with the stacktrace address signature as the row key, and the OOPS ID as the column name (with a NULL value).

  7. The bucket queue is processed by what is currently a small Python program to take the report, generate a full crash signature, and add the OOPS ID of that report to the respective bucket.


    Obviously, a single issue may have multiple stacktraces, and likewise, many issues may share a single stacktrace. Therefore, this bucketing algorithm will grow more comprehensive with time, including other fields which will be concatenated onto the row key as needed (or set to empty if they no longer serve as a differentiating factor).

    If we didn't use a separate bucketing step, even for the relatively simple Python crashes, I fear we'd spend too much time in the crash acceptance code, reassembling the report from the BSON data to generate a crash signature.

  8. As each bucket is modified, the counter column values in the DayBucketCounts CF are incremented. This CF is then consumed by the report web interface.