New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Audit Request Counter #358
Comments
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What would you like to be added:
Enable a simple request counter when the user passes the
--verbose
flag. This counter should increment each time the auditor makes an HTTP request to GCR. Every 10min period, the number of queries should printed to logs and reset the counter back to zero. This effectively measures the network performance of the auditor in the same way the Container Registry measures it's quota: 50,000 HTTP requests every 10 minutes.Requirements:
Why is this needed:
The auditor makes many requests to GCR in order to validate children of manifest.lists. This is currently handled by requesting all images within the project:
k8s-artifacts-prod
which is a known bottleneck #259.Additionally, the way in which we request GCR is via simple HTTP requests which are not tracked by the Container Registry API #353. Therefore, gaining visibility into the number of requests the auditor is making while running can help diagnose throttling. This behavior often causes a backup of unacknowledged Pub/Sub messages, resulting in unwanted alerts #2364.
cc: @listx @amwat @justaugustus @kubernetes-sigs/release-engineering
The text was updated successfully, but these errors were encountered: