Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

etcd: extend rate limiting to consider the number of inflight requests #25817

Merged
merged 4 commits into from
Jun 9, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
1 change: 1 addition & 0 deletions CODEOWNERS
Validating CODEOWNERS rules …
Original file line number Diff line number Diff line change
Expand Up @@ -469,6 +469,7 @@ jenkinsfiles @cilium/ci-structure
/pkg/promise @cilium/sig-foundations
/pkg/proxy/ @cilium/proxy
/pkg/proxy/accesslog @cilium/api
/pkg/rate/metrics @cilium/metrics
/pkg/recorder @cilium/sig-datapath
/pkg/redirectpolicy @cilium/sig-lb
/pkg/safeio @cilium/sig-agent
Expand Down
5 changes: 5 additions & 0 deletions clustermesh-apiserver/metrics/metrics.go
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,11 @@ func (mm *metricsManager) Start(hive.HookContext) error {
metrics.KVStoreQuorumErrors,
metrics.KVStoreSyncQueueSize,
metrics.KVStoreInitialSyncCompleted,
metrics.APILimiterProcessingDuration,
metrics.APILimiterWaitDuration,
metrics.APILimiterRequestsInFlight,
metrics.APILimiterRateLimit,
metrics.APILimiterAdjustmentFactor,
)

mux := http.NewServeMux()
Expand Down
23 changes: 0 additions & 23 deletions daemon/cmd/api_limits.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,6 @@ package cmd
import (
"time"

"github.com/cilium/cilium/pkg/metrics"
"github.com/cilium/cilium/pkg/rate"
)

Expand Down Expand Up @@ -94,25 +93,3 @@ var apiRateLimitDefaults = map[string]rate.APILimiterParameters{
MinParallelRequests: 2,
},
}

type apiRateLimitingMetrics struct{}

func (a *apiRateLimitingMetrics) ProcessedRequest(name string, v rate.MetricsValues) {
metrics.APILimiterProcessingDuration.WithLabelValues(name, "mean").Set(v.MeanProcessingDuration)
metrics.APILimiterProcessingDuration.WithLabelValues(name, "estimated").Set(v.EstimatedProcessingDuration)
metrics.APILimiterWaitDuration.WithLabelValues(name, "mean").Set(v.MeanWaitDuration)
metrics.APILimiterWaitDuration.WithLabelValues(name, "max").Set(v.MaxWaitDuration.Seconds())
metrics.APILimiterWaitDuration.WithLabelValues(name, "min").Set(v.MinWaitDuration.Seconds())
metrics.APILimiterRequestsInFlight.WithLabelValues(name, "in-flight").Set(float64(v.CurrentRequestsInFlight))
metrics.APILimiterRequestsInFlight.WithLabelValues(name, "limit").Set(float64(v.ParallelRequests))
metrics.APILimiterRateLimit.WithLabelValues(name, "limit").Set(float64(v.Limit))
metrics.APILimiterRateLimit.WithLabelValues(name, "burst").Set(float64(v.Burst))
metrics.APILimiterAdjustmentFactor.WithLabelValues(name).Set(v.AdjustmentFactor)

if v.Outcome == "" {
metrics.APILimiterWaitHistoryDuration.WithLabelValues(name).Observe(v.WaitDuration.Seconds())
v.Outcome = metrics.Error2Outcome(v.Error)
}

metrics.APILimiterProcessedRequests.WithLabelValues(name, v.Outcome).Inc()
}
3 changes: 2 additions & 1 deletion daemon/cmd/daemon.go
Original file line number Diff line number Diff line change
Expand Up @@ -85,6 +85,7 @@ import (
policyAPI "github.com/cilium/cilium/pkg/policy/api"
"github.com/cilium/cilium/pkg/proxy"
"github.com/cilium/cilium/pkg/rate"
ratemetrics "github.com/cilium/cilium/pkg/rate/metrics"
"github.com/cilium/cilium/pkg/recorder"
"github.com/cilium/cilium/pkg/redirectpolicy"
"github.com/cilium/cilium/pkg/service"
Expand Down Expand Up @@ -418,7 +419,7 @@ func newDaemon(ctx context.Context, cleaner *daemonCleanup, params *daemonParams
log.WithField("mtu", configuredMTU).Info("Overwriting MTU based on CNI configuration")
}

apiLimiterSet, err := rate.NewAPILimiterSet(option.Config.APIRateLimit, apiRateLimitDefaults, &apiRateLimitingMetrics{})
apiLimiterSet, err := rate.NewAPILimiterSet(option.Config.APIRateLimit, apiRateLimitDefaults, ratemetrics.APILimiterObserver())
if err != nil {
log.WithError(err).Error("unable to configure API rate limiting")
return nil, nil, fmt.Errorf("unable to configure API rate limiting: %w", err)
Expand Down
2 changes: 1 addition & 1 deletion pkg/clustermesh/remote_cluster.go
Original file line number Diff line number Diff line change
Expand Up @@ -300,7 +300,7 @@ func (rc *remoteCluster) makeEtcdOpts() map[string]string {

for key, value := range option.Config.KVStoreOpt {
switch key {
case kvstore.EtcdRateLimitOption, kvstore.EtcdListLimitOption,
case kvstore.EtcdRateLimitOption, kvstore.EtcdMaxInflightOption, kvstore.EtcdListLimitOption,
kvstore.EtcdOptionKeepAliveHeartbeat, kvstore.EtcdOptionKeepAliveTimeout:
opts[key] = value
}
Expand Down