Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error checking snapshot status #10617

Closed
imorti opened this issue Apr 5, 2019 · 3 comments
Closed

Error checking snapshot status #10617

imorti opened this issue Apr 5, 2019 · 3 comments

Comments

@imorti
Copy link

imorti commented Apr 5, 2019

sudo ETCDCTL_API=3 etcdctl snapshot status snapshot.db --cacert /etc/kubernetes/pki/etcd/server.crt --cert /etc/kubernetes/pk
i/etcd/ca.crt --key /etc/kubernetes/pki/etcd/ca.key
panic: runtime error: index out of range
goroutine 1 [running]:
github.com/coreos/etcd/cmd/vendor/github.com/boltdb/bolt.Open(0x7fff1c04f80a, 0xb, 0x100, 0x1218860, 0x0, 0x0, 0xb411bd)
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/boltdb/bolt/db.go:237 +0x497
github.com/coreos/etcd/cmd/vendor/github.com/coreos/etcd/etcdctl/ctlv3/command.dbStatus(0x7fff1c04f80a, 0xb, 0x0, 0x0, 0x0, 0x0)
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/coreos/etcd/etcdctl/ctlv3/command/snapsh
ot_command.go:410 +0xe1
github.com/coreos/etcd/cmd/vendor/github.com/coreos/etcd/etcdctl/ctlv3/command.snapshotStatusCommandFunc(0xc4201dba00, 0xc4201d73b0, 0x1, 0x7)
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/coreos/etcd/etcdctl/ctlv3/command/snapsh
ot_command.go:154 +0x62
github.com/coreos/etcd/cmd/vendor/github.com/spf13/cobra.(*Command).execute(0xc4201dba00, 0xc4201d72d0, 0x7, 0x7, 0xc4201dba00, 0xc4201d72d0)
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/spf13/cobra/command.go:572 +0x203
github.com/coreos/etcd/cmd/vendor/github.com/spf13/cobra.(*Command).ExecuteC(0x11f01e0, 0xd735a4, 0xb, 0xc4201c7ed8)
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/spf13/cobra/command.go:662 +0x394
github.com/coreos/etcd/cmd/vendor/github.com/spf13/cobra.(*Command).Execute(0x11f01e0, 0x0, 0x0)
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/spf13/cobra/command.go:618 +0x2b
github.com/coreos/etcd/cmd/vendor/github.com/coreos/etcd/etcdctl/ctlv3.Start()
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/vendor/github.com/coreos/etcd/etcdctl/ctlv3/ctl_nocov.go:2
5 +0x8e
main.main()
/home/gyuho/go/src/github.com/coreos/etcd/release/etcd/gopath/src/github.com/coreos/etcd/cmd/etcdctl/main.go:40 +0x1d0

@hexfusion
Copy link
Contributor

hexfusion commented Apr 6, 2019

.sudo ETCDCTL_API=3 etcdctl snapshot status snapshot.db --cacert /etc/kubernetes/pki/etcd/server.crt --cert /etc/kubernetes/pk
i/etcd/ca.crt --key /etc/kubernetes/pki/etcd/ca.key

This is a feature that was added in 3.3.10 [1] and it appears your snapshot has corruption.

[1] #10109

NOTE: TLS flags are not nessisary as the file is local.

@jingyih
Copy link
Contributor

jingyih commented Apr 6, 2019

@imorti Which etcd version are you running? This is a panic in bolt. As far as I am aware, it could be related to:

Ref:
[1] etcd-io/bbolt#153.

@stale
Copy link

stale bot commented Apr 7, 2020

This issue has been automatically marked as stale because it has not had recent activity. It will be closed after 21 days if no further activity occurs. Thank you for your contributions.

@stale stale bot added the stale label Apr 7, 2020
@stale stale bot closed this as completed Apr 28, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

3 participants