Toxiproxy
Toxiproxy is a framework for simulating network conditions. It's made
specifically to work in testing, CI and development environments, supporting
deterministic tampering with connections, but with support for randomized chaos
and customization. Toxiproxy is the tool you need to prove with tests that
your application doesn't have single points of failure. We've been
successfully using it in all development and test environments at Shopify since
October, 2014. See our blog post on resiliency for more information.
Toxiproxy usage consists of two parts. A TCP proxy written in Go (what this
repository contains) and a client communicating with the proxy over HTTP. You
configure your application to make all test connections go through Toxiproxy
and can then manipulate their health via HTTP. See Usage
below on how to set up your project.
For example, to add 1000ms of latency to the response of MySQL from the Ruby
client:
Toxiproxy[:mysql_master].downstream(:latency, latency: 1000).apply do
Shop.first # this takes at least 1s
end
To take down all Redis instances:
Toxiproxy[/redis/].down do
Shop.first # this will throw an exception
end
While the examples in this README are currently in Ruby, there's nothing
stopping you from creating a client in any other language (see
Clients).
Table of Contents
- Why yet another chaotic TCP proxy?
- Clients
- Example
- Usage
- Installing
- Populating
- Using
- Toxics
- Latency
- Down
- Bandwidth
- Slow close
- Timeout
- Slicer
- HTTP API
- Proxy fields
- Curl example
- FAQ
- Development
Why yet another chaotic TCP proxy?
The existing ones we found didn't provide the kind of dynamic API we needed for
integration and unit testing. Linux tools like nc
and so on are not
cross-platform and require root, which makes them problematic in test,
development and CI environments.
Clients
Example
Let's walk through an example with a Rails application. Note that Toxiproxy is
in no way tied to Ruby, it's just been our first use case and it's currently the
only language that has a client. You can see the full example at
Sirupsen/toxiproxy-rails-example.
To get started right away, jump down to Usage.
For our popular blog, for some reason we're storing the tags for our posts in
Redis and the posts themselves in MySQL. We might have a Post
class that
includes some methods to manipulate tags in a Redis set:
class Post < ActiveRecord::Base
# Return an Array of all the tags.
def tags
TagRedis.smembers(tag_key)
end
# Add a tag to the post.
def add_tag(tag)
TagRedis.sadd(tag_key, tag)
end
# Remove a tag from the post.
def remove_tag(tag)
TagRedis.srem(tag_key, tag)
end
# Return the key in Redis for the set of tags for the post.
def tag_key
"post:tags:#{self.id}"
end
end
We've decided that erroring while writing to the tag data store
(adding/removing) is OK. However, if the tag data store is down, we should be
able to see the post with no tags. We could simply rescue the
Redis::CannotConnectError
around the SMEMBERS
Redis call in the tags
method. Let's use Toxiproxy to test that.
Since we've already installed Toxiproxy and it's running on our machine, we can
skip to step 2. This is where we need to make sure Toxiproxy has a mapping for
Redis tags. To config/boot.rb
(before any connection is made) we add:
require 'toxiproxy'
Toxiproxy.populate([
{
"name": "toxiproxy_test_redis_tags",
"listen": "127.0.0.1:22222",
"upstream": "127.0.0.1:6379"
}
])
Then in config/environments/test.rb
we set the TagRedis
to be a Redis client
that connects to Redis through Toxiproxy by adding this line:
TagRedis = Redis.new(port: 22222)
All calls in the test environment now go through Toxiproxy. That means we can
add a unit test where we simulate a failure:
test "should return empty array when tag redis is down when listing tags" do
@post.add_tag "mammals"
# Take down all Redises in Toxiproxy
Toxiproxy[/redis/].down do
assert_equal [], @post.tags
end
end
The test fails with Redis::CannotConnectError
. Perfect! Toxiproxy took down
the Redis successfully for the duration of the closure. Let's fix the tags
method to be resilient:
def tags
TagRedis.smembers(tag_key)
rescue Redis::CannotConnectError
[]
end
The tests pass! We now have a unit test that proves fetching the tags when Redis
is down returns an empty array, instead of throwing an exception. For full
coverage you should also write an integration test that wraps fetching the
entire blog post page when Redis is down.
Full example application is at
Sirupsen/toxiproxy-rails-example.
Usage
Configuring a project to use Toxiproxy consists of four steps:
- Installing Toxiproxy
- Populating Toxiproxy
- Using Toxiproxy
1. Installing Toxiproxy
Linux
See Releases
for the latest
binaries and system packages for your architecture.
Ubuntu
$ wget -O toxiproxy-1.2.1.deb https://github.com/Shopify/toxiproxy/releases/download/v1.2.1/toxiproxy_1.2.1_amd64.deb
$ sudo dpkg -i toxiproxy-1.2.1.deb
$ sudo service toxiproxy start
OS X
$ brew tap shopify/shopify
$ brew install toxiproxy
Docker
Toxiproxy is available on Docker Hub.
$ docker pull shopify/toxiproxy
$ docker run -it shopify/toxiproxy
2. Populating Toxiproxy
When your application boots, it needs to make sure that Toxiproxy knows which
endpoints to proxy where. The main parameters are: name, address for Toxiproxy
to listen on and the address of the upstream.
Some client libraries have helpers for this task, which is essentially just
making sure each proxy in a list is created. Example from the Ruby client:
# Make sure `shopify_test_redis_master` and `shopify_test_mysql_master` are
# present in Toxiproxy
Toxiproxy.populate([
{
"name": "shopify_test_redis_master",
"listen": "127.0.0.1:22220",
"upstream": "127.0.0.1:6379"
},
{
"name": "shopify_test_mysql_master",
"listen": "127.0.0.1:24220",
"upstream": "127.0.0.1:3306"
}
])
This code needs to run as early in boot as possible, before any code establishes
a connection through Toxiproxy. Please check your client library for
documentation on the population helpers.
Alternatively use the HTTP API directly to create proxies, e.g.:
curl -i -d '{"name": "shopify_test_redis_master", "upstream": "localhost:6379", "listen": "localhost:26379"}' localhost:8474/proxies
We recommend a naming such as the above: <app>_<env>_<data store>_<shard>
.
This makes sure there are no clashes between applications using the same
Toxiproxy.
For large application we recommend storing the Toxiproxy configurations in a
separate configuration file. We use config/toxiproxy.json
.
Use ports outside the ephemeral port range to avoid random port conflicts.
It's 32,768
to 61,000
on Linux by default, see
/proc/sys/net/ipv4/ip_local_port_range
.
3. Using Toxiproxy
To use Toxiproxy, you now need to configure your application to connect through
Toxiproxy. Continuing with our example from step two, we can configure our Redis
client to connect through Toxiproxy:
# old straight to redis
redis = Redis.new(port: 6380)
# new through toxiproxy
redis = Redis.new(port: 22220)
Now you can tamper with it through the Toxiproxy API. In Ruby:
redis = Redis.new(port: 22220)
Toxiproxy[:shopify_test_redis_master].downstream(:latency, latency: 1000).apply do
redis.get("test") # will take 1s
end
Please consult your respective client library on usage.
Toxics
Toxics manipulate the pipe between the client and upstream. If the enabled
field is not provided when creating the toxic, it will default to being
disabled.
latency
Add a delay to all data going through the proxy. The delay is equal to latency
+/- jitter
.
Fields:
enabled
: true/false
latency
: time in milliseconds
jitter
: time in milliseconds
down
Bringing a service down is not technically a toxic in the implementation of
Toxiproxy. This is done by POST
ing to /proxies/{proxy}
and setting the
enabled
field to false
.
bandwidth
Limit a connection to a maximum number of kilobytes per second.
Fields:
enabled
: true/false
rate
: rate in KB/s
slow_close
Delay the TCP socket from closing until delay
has elapsed.
Fields:
enabled
: true/false
delay
: time in milliseconds
timeout
Stops all data from getting through, and close the connection after timeout
. If
timeout
is 0, the connection won't close, and data will be delayed until the
toxic is disabled.
Fields:
enabled
: true/false
timeout
: time in milliseconds
slicer
Slices TCP data up into small bits, optionally adding a delay between each
sliced "packet".
Fields:
enabled
: true/false
average_size
: size in bytes of an average packet
size_variation
: variation in bytes of an average packet (should be smaller than average_size)
delay
: time in microseconds to delay each packet by
HTTP API
All communication with the Toxiproxy daemon from the client happens through the
HTTP interface, which is described here.
Toxiproxy listens for HTTP on port 8474.
Proxy Fields:
name
: proxy name (string)
listen
: listen address (string)
upstream
: proxy upstream address (string)
enabled
: true/false (defaults to true on creation)
To change a proxy's name, it must be deleted and recreated.
Changing the listen
or upstream
fields will restart the proxy and drop any active connections.
If listen
is specified with a port of 0, toxiproxy will pick an ephemeral port. The listen
field
in the response will be updated with the actual port.
If you change enabled
to false
, it'll take down the proxy. You can switch it
back to true
to reenable it.
All endpoints are JSON.
- GET /proxies - List existing proxies and their toxics
- POST /proxies - Create a new proxy
- GET /proxies/{proxy} - Show the proxy with both its upstream and downstream toxics
- POST /proxies/{proxy} - Update a proxy's fields
- DELETE /proxies/{proxy} - Delete an existing proxy
- GET /proxies/{proxy}/upstream/toxics - List upstream toxics
- GET /proxies/{proxy}/downstream/toxics - List downstream toxics
- POST /proxies/{proxy}/upstream/toxics/{toxic} - Update upstream toxic
- POST /proxies/{proxy}/downstream/toxics/{toxic} - Update downstream toxic
- GET /reset - Enable all proxies and disable all toxics
Curl Example
$ curl -i -d '{"name": "redis", "upstream": "localhost:6379", "listen": "localhost:26379"}' localhost:8474/proxies
HTTP/1.1 201 Created
Content-Type: application/json
Date: Sun, 12 Apr 2015 19:52:08 GMT
Content-Length: 392
{"name":"redis","listen":"127.0.0.1:26379","upstream":"localhost:6379","enabled":true,"upstream_toxics":{"latency":{"enabled":false,"latency":0,"jitter":0},"slow_close":{"enabled":false,"delay":0},"timeout":{"enabled":false,"timeout":0}},"downstream_toxics":{"latency":{"enabled":false,"latency":0,"jitter":0},"slow_close":{"enabled":false,"delay":0},"timeout":{"enabled":false,"timeout":0}}}
$ redis-cli -p 26379
127.0.0.1:26379> SET omg pandas
OK
127.0.0.1:26379> GET omg
"pandas"
$ curl -i localhost:8474/proxies
HTTP/1.1 200 OK
Content-Type: application/json
Date: Sun, 12 Apr 2015 19:52:49 GMT
Content-Length: 96
{"redis":{"name":"redis","listen":"127.0.0.1:26379","upstream":"localhost:6379","enabled":true}}
$ curl -i -d '{"enabled":true, "latency":1000}' localhost:8474/proxies/redis/downstream/toxics/latency
HTTP/1.1 200 OK
Content-Type: application/json
Date: Mon, 10 Nov 2014 16:37:25 GMT
Content-Length: 42
{"enabled":true,"latency":1000,"jitter":0}
$ redis-cli -p 26379
127.0.0.1:26379> GET "omg"
"pandas"
(1.00s)
127.0.0.1:26379> DEL "omg"
(integer) 1
(1.00s)
$ curl -i -d '{"enabled":false}' localhost:8474/proxies/redis/downstream/toxics/latency
HTTP/1.1 200 OK
Content-Type: application/json
Date: Mon, 10 Nov 2014 16:39:49 GMT
Content-Length: 43
{"enabled":false,"latency":1000,"jitter":0}
$ redis-cli -p 26379
127.0.0.1:26379> GET "omg"
(nil)
$ curl -i -X DELETE localhost:8474/proxies/redis
HTTP/1.1 204 No Content
Date: Mon, 10 Nov 2014 16:07:36 GMT
$ redis-cli -p 26379
Could not connect to Redis at 127.0.0.1:26379: Connection refused
Frequently Asked Questions
How fast is Toxiproxy? The speed of Toxiproxy depends largely on your hardware,
but you can expect a latency of < 100µs when no toxics are enabled. When running
with GOMAXPROCS=4
on a Macbook Pro we acheived ~1000MB/s throuput, and as high
as 2400MB/s on a higher end desktop. Basically, you can expect Toxiproxy to move
data around at least as fast the app you're testing.
I am not seeing my Toxiproxy actions reflected for MySQL. MySQL will prefer
the local Unix domain socket for some clients, no matter which port you pass it
if the host is set to localhost
. Configure your MySQL server to not create a
socket, and use 127.0.0.1
as the host. Remember to remove the old socket
after you restart the server.
Toxiproxy causes intermittent connection failures. Use ports outside the
ephemeral port range to avoid random port conflicts. It's 32,768
to 61,000
on
Linux by default, see /proc/sys/net/ipv4/ip_local_port_range
.
Should I run a Toxiproxy for each application? No, we recommend using the
same Toxiproxy for all applications. To distinguish between services we
recommend naming your proxies with the scheme: <app>_<env>_<data store>_<shard>
.
For example, shopify_test_redis_master
or shopify_development_mysql_1
.
Development
make all
. Build Toxiproxy binaries and packages for all platforms. Requires
to have Go compiled with cross compilation enabled on Linux and Darwin (amd64)
as well as fpm
in your $PATH
to
build the Debian package.
make test
. Run the Toxiproxy tests.
make darwin
. Build binary for Darwin.
make linux
. Build binary for Linux.
Release
- Update
CHANGELOG.md
- Bump
VERSION
and toxiproxy.go
- Change versions in
README.md
- Commit
- Tag
make
to create binaries, packages and push new Docker image
- Create Github draft release against new tag and upload binaries and Debian package
- Bump version for Homebrew