Colin, Jun, Do the proposed error code and the updated KIP look good to you guys? I’d like to wrap up and close the vote.
Thanks, David Le mer. 10 juin 2020 à 14:50, David Jacot <dja...@confluent.io> a écrit : > Hi Colin and Jun, > > I have no problem if we have to rewrite part of it when the new controller > comes > out. I will be more than happy to help out. > > Regarding KIP-590, I think that we can cope with a principal as a string > when the > time comes. The user entity name is defined with a string already. > > Regarding the name of the error, you have made a good point. I do agree > that it > is important to differentiate the two cases. I propose the following two > errors: > - THROTTLING_QUOTA_EXCEEDED - Throttling is slightly better than rate as > we have quotas which are not rate (e.g. request quota). This one is > retryable > once the throttle time is passed. > - LIMIT_QUOTA_EXCEEDED - This one would indicate that the limit has been > reached and is a final error. > We only need the former in this KIP. What do you think? > > Jun, I have added a few examples in the KIP. The new name works exactly > like > the existing one once it is added to the accepted dynamic configs for the > user > and the client entities. I have added a "Kafka Config Command" chapter in > the > KIP. I will also open a Jira to not forget updating the AK documentation > once > the KIP gets merged. > > Thanks, > David > > On Wed, Jun 10, 2020 at 3:03 AM Jun Rao <j...@confluent.io> wrote: > >> Hi, Colin, >> >> Good point. Maybe sth like THROTTLING_QUOTA_VIOLATED will make this clear. >> >> Hi, David, >> >> We added a new quota name in the KIP. You chose not to bump up the version >> of DESCRIBE_CLIENT_QUOTAS and ALTER_CLIENT_QUOTAS, which seems ok since >> the >> quota name is represented as a string. However, the new quota name can be >> used in client tools for setting and listing the quota ( >> https://kafka.apache.org/documentation/#quotas). Could you document how >> the >> new name will be used in those tools? >> >> Thanks, >> >> Jun >> >> On Tue, Jun 9, 2020 at 3:37 PM Colin McCabe <cmcc...@apache.org> wrote: >> >> > On Tue, Jun 9, 2020, at 05:06, David Jacot wrote: >> > > Hi Colin, >> > > >> > > Thank you for your feedback. >> > > >> > > Jun has summarized the situation pretty well. Thanks Jun! I would >> like to >> > > complement it with the following points: >> > > >> > > 1. Indeed, when the quota is exceeded, the broker will reject the >> topic >> > > creations, partition creations and topics deletions that are exceeding >> > > with the new QUOTA_VIOLATED error. The ThrottleTimeMs field will >> > > be populated accordingly to let the client know how long it must wait. >> > > >> > > 2. I do agree that we actually want a mechanism to apply back pressure >> > > to the clients. The KIP basically proposes a mechanism to control and >> to >> > > limit the rate of operations before entering the controller. I think >> that >> > > it is similar to your thinking but is enforced based on a defined >> > > instead of relying on the number of pending items in the controller. >> > > >> > > 3. You mentioned an alternative idea in your comments that, if I >> > understood >> > > correctly, would bound the queue to limit the overload and reject >> work if >> > > the queue is full. I have been thinking about this as well but I don't >> > think >> > > that it works well in our case. >> > > - The first reason is the one mentioned by Jun. We actually want to be >> > able >> > > to limit specific clients (the misbehaving ones) in a multi-tenant >> > > environment. >> > > - The second reason is that, at least in our current implementation, >> the >> > > length of the queue is not really a good characteristic to estimate >> the >> > load. >> > > Coming back to your example of the CreateTopicsRequest. They create >> path >> > > in ZK for each newly created topics which trigger a ChangeTopic event >> > in >> > > the controller. That single event could be for a single topic in some >> > cases or >> > > for a thousand topics in others. >> > > These two reasons aside, bounding the queue also introduces a knob >> which >> > > requires some tuning and thus suffers from all the points you >> mentioned >> > as >> > > well, isn't it? The value may be true for one version but not for >> > another. >> > > >> > > 4. Regarding the integration with KIP-500. The implementation of this >> KIP >> > > will span across the ApiLayer and the AdminManager. To be honest, we >> > > can influence the implementation to work best with what you have in >> mind >> > > for the future controller. If you could shed some more light on the >> > future >> > > internal architecture, I can take this into account during the >> > > implementation. >> > > >> > >> > Hi David, >> > >> > Good question. The approach we are thinking of is that in the future, >> > topic creation will be a controller RPC. In other words, rather than >> > changing ZK and waiting for the controller code to notice, we'll go >> through >> > the controller code (which may change ZK, or may do something else in >> the >> > ZK-free environment). >> > >> > I don't think there is a good way to write this in the short term that >> > avoids having to rewrite in the long term. That's probably OK though, >> as >> > long as we keep in mind that we'll need to. >> > >> > > >> > > 5. Regarding KIP-590. For the create topics request, create partitions >> > > request, and delete topics request, we are lucky enough to have >> directed >> > > all of them to the controller already so we are fine with doing the >> > admission >> > > in the broker which hosts the controller. If we were to throttle more >> > operations >> > > in the future, >> > > I believe that we can continue to do it centrally while leveraging the >> > > principal that is forwarded to account for the right tenant. The >> reason >> > > why I would like to keep it central is that we are talking about >> sparse >> > (or bursty) >> > > workloads here so distributing the quota among all the brokers makes >> > little sense. >> > > >> > >> > Right. The main requirement here is that the quota must operate based >> on >> > principal names rather than KafkaPrincipal objects. We had a long >> > discussion about KIP-590 and eventually concluded that we didn't want to >> > make KafkaPrincipal serializable (at least not yet) so what would be >> > forwarded is just a string, not the principal object. >> > >> > > >> > > 6. Regarding the naming of the new error code. BUSY sounds too >> generic to >> > > me so I would rather prefer a specific error code. The main reason >> being >> > > that we may be able to reuse it in the future for other quotas. That >> > being said, >> > > we can find another name. QUOTA_EXHAUSTED? I don't feel too strongly >> > about >> > > the naming. I wonder what the others think about this. >> > > >> > >> > Think about if you're someone writing software that uses the Kafka >> > client. Let's say you try to create some topics and get back >> > QUOTA_VIOLATED. What does it mean? Maybe it means that you tried to >> > create too many topics in too short a time (violating the controller >> > throttle). Or maybe it means that you exceeded your quota specifying >> the >> > number of partitions that they are allowed to create (let's assume that >> > someone did a follow-on KIP for that that reuses this error code for >> that.) >> > >> > But now you have a dilemma. If the controller was just busy, then >> trying >> > again is the right thing to do. If there is some other quota you >> violated >> > (number of partitions, number of topics, etc.) then retrying is wasteful >> > and will not accomplish anything. Of course, the Kafka client software >> > itself can tell the two cases apart since it has access to >> throttleTimeMs. >> > But the end user can't (and in certain modes, the exception is exposed >> > directly to the user here). >> > >> > That's why "you violated some quota, not sure which" is not a good error >> > code. So I think we should distinguish the two cases by having two >> > separate error codes. Maybe something like RATE_QUOTA_VIOLATED and >> > RESOURCE_QUOTA_VIOLATED. This KIP would only need the former one. >> > >> > Another possibility is that the user could distinguish the two cases by >> > the error string. But typically we want error strings to be used to >> give >> > extra debugging information, not to make big decisions about what the >> > client should do. So I think that the error code should actually be a >> > little bit more specific, or at least tell the end user what to do with >> it >> > (that's why I suggested "busy"). >> > >> > > >> > > Voilà. I hope that I have addressed all your questions/points and I am >> > > sorry for the lengthy email. >> > > >> > >> > Thanks, David. It looks good to me overall. And I thought your email >> was >> > very clear-- not too long at all. >> > Let's just figure out the error code thing. >> > >> > best, >> > Colin >> > >> > > >> > > Regards, >> > > David >> > > >> > > >> > > On Tue, Jun 9, 2020 at 2:13 AM Colin McCabe <cmcc...@apache.org> >> wrote: >> > > >> > > > On Mon, Jun 8, 2020, at 14:41, Jun Rao wrote: >> > > > > Hi, Colin, >> > > > > >> > > > > Thanks for the comment. You brought up several points. >> > > > > >> > > > > 1. Should we set up a per user quota? To me, it does seem we need >> > some >> > > > sort >> > > > > of a quota. When the controller runs out of resources, ideally, we >> > only >> > > > > want to penalize the bad behaving applications, instead of every >> > > > > application. To do that, we will need to know what each >> application >> > is >> > > > > entitled to and the per user quota is intended to capture that. >> > > > > >> > > > > 2. How easy is it to configure a quota? The following is how an >> admin >> > > > > typically sets up a quota in our existing systems. Pick a generous >> > > > default >> > > > > per user quota works for most applications. For the few resource >> > > > intensive >> > > > > applications, customize a higher quota for them. Reserve enough >> > resources >> > > > > in anticipation that a single (or a few) application will exceed >> the >> > > > quota >> > > > > at a given time. >> > > > > >> > > > >> > > > Hi Jun, >> > > > >> > > > Thanks for the response. >> > > > >> > > > Maybe I was too pessimistic about the ability of admins to >> configure a >> > > > useful quota here. I do agree that it would be nice to have the >> > ability to >> > > > set different quotas for different users, as you mentioned. >> > > > >> > > > > >> > > > > 3. How should the quota be defined? In the discussion thread, we >> > debated >> > > > > between a usage based model vs a rate based model. Dave and Anna >> > argued >> > > > for >> > > > > the rate based model mostly because it's simpler to implement. >> > > > > >> > > > >> > > > I'm trying to think more about how this integrates with our plans >> for >> > > > KIP-500. When we get rid of ZK, we will have to handle this in the >> > > > controller itself, rather than in the AdminManager. That implies >> we'll >> > > > have to rewrite the code. Maybe this is worth it if we want this >> > feature >> > > > now, though. >> > > > >> > > > Another wrinkle here is that as we discussed in KIP-590, controller >> > > > operations will land on a random broker first, and only then be >> > forwarded >> > > > to the active controller. This implies that either admissions >> control >> > > > should happen on all brokers (needing some kind of distributed quota >> > > > scheme), or be done on the controller after we've already done the >> > work of >> > > > forwarding the message. The second approach might not be that bad, >> > but it >> > > > would be nice to figure this out. >> > > > >> > > > > >> > > > > 4. If a quota is exceeded, how is that enforced? My understanding >> of >> > the >> > > > > KIP is that, if a quota is exceeded, the broker immediately sends >> > back >> > > > > a QUOTA_VIOLATED error and a throttle time back to the client, and >> > the >> > > > > client will wait for the throttle time before issuing the next >> > request. >> > > > > This seems to be the same as the BUSY error code you mentioned. >> > > > > >> > > > >> > > > Yes, I agree, it sounds like we're thinking along the same lines. >> > > > However, rather than QUOTA_VIOLATED, how about naming the error code >> > BUSY? >> > > > Then the error text could indicate the quota that we violated. This >> > would >> > > > be more generally useful as an error code and also avoid being >> > confusingly >> > > > similar to POLICY_VIOLATION. >> > > > >> > > > best, >> > > > Colin >> > > > >> > > > > >> > > > > I will let David chime in more on that. >> > > > > >> > > > > Thanks, >> > > > > >> > > > > Jun >> > > > > >> > > > > >> > > > > >> > > > > On Sun, Jun 7, 2020 at 2:30 PM Colin McCabe <cmcc...@apache.org> >> > wrote: >> > > > > >> > > > > > Hi David, >> > > > > > >> > > > > > Thanks for the KIP. >> > > > > > >> > > > > > I thought about this for a while and I actually think this >> > approach is >> > > > not >> > > > > > quite right. The problem that I see here is that using an >> > explicitly >> > > > set >> > > > > > quota here requires careful tuning by the cluster operator. >> Even >> > > > worse, >> > > > > > this tuning might be invalidated by changes in overall >> conditions >> > or >> > > > even >> > > > > > more efficient controller software. >> > > > > > >> > > > > > For example, if we empirically find that the controller can do >> 1000 >> > > > topics >> > > > > > in a minute (or whatever), this tuning might actually be wrong >> if >> > the >> > > > next >> > > > > > version of the software can do 2000 topics in a minute because >> of >> > > > > > efficiency upgrades. Or, the broker that the controller is >> > located on >> > > > > > might be experiencing heavy load from its non-controller >> > operations, >> > > > and so >> > > > > > it can only do 500 topics in a minute during this period. >> > > > > > >> > > > > > So the system administrator gets a very obscure tunable (it's >> not >> > > > clear to >> > > > > > a non-Kafka-developer what "controller mutations" are or why >> they >> > > > should >> > > > > > care). And even worse, they will have to significantly >> "sandbag" >> > the >> > > > value >> > > > > > that they set it to, so that even under the heaviest load and >> > oldest >> > > > > > deployed version of the software, the controller can still >> > function. >> > > > Even >> > > > > > worse, this new quota adds a lot of complexity to the >> controller. >> > > > > > >> > > > > > What we really want is backpressure when the controller is >> > > > overloaded. I >> > > > > > believe this is the alternative you discuss in "Rejected >> > Alternatives" >> > > > > > under "Throttle the Execution instead of the Admission" Your >> > reason >> > > > for >> > > > > > rejecting it is that the client error handling does not work >> well >> > in >> > > > this >> > > > > > case. But actually, this is an artifact of our current >> > implementation, >> > > > > > rather than a fundamental issue with backpressure. >> > > > > > >> > > > > > Consider the example of a CreateTopicsRequest. The controller >> > could >> > > > > > return a special error code if the load was too high, and take >> the >> > > > create >> > > > > > topics event off the controller queue. Let's call that error >> code >> > > > BUSY. >> > > > > > Additionally, the controller could immediately refuse new >> events >> > if >> > > > the >> > > > > > queue had reached its maximum length, and simply return BUSY for >> > that >> > > > case >> > > > > > as well. >> > > > > > >> > > > > > Basically, the way we handle RPC timeouts in the controller >> right >> > now >> > > > is >> > > > > > not very good. As you know, we time out the RPC, so the client >> > gets >> > > > > > TimeoutException, but then keep the event on the queue, so that >> it >> > > > > > eventually gets executed! There's no reason why we have to do >> > that. >> > > > We >> > > > > > could take the event off the queue if there is a timeout. This >> > would >> > > > > > reduce load and mostly avoid the paradoxical situations you >> > describe >> > > > > > (getting TopicExistsException for a CreateTopicsRequest retry, >> > etc.) >> > > > > > >> > > > > > I say "mostly" because there are still cases where retries >> could go >> > > > astray >> > > > > > (for example if we execute the topic creation but a network >> problem >> > > > > > prevents the response from being sent to the client). But this >> > would >> > > > still >> > > > > > be a very big improvement over what we have now. >> > > > > > >> > > > > > Sorry for commenting so late on this but I got distracted by >> some >> > other >> > > > > > things. I hope we can figure this one out-- I feel like there >> is a >> > > > chance >> > > > > > to significantly simplify this. >> > > > > > >> > > > > > best, >> > > > > > Colin >> > > > > > >> > > > > > >> > > > > > On Fri, May 29, 2020, at 07:57, David Jacot wrote: >> > > > > > > Hi folks, >> > > > > > > >> > > > > > > I'd like to start the vote for KIP-599 which proposes a new >> > quota to >> > > > > > > throttle create topic, create partition, and delete topics >> > > > operations to >> > > > > > > protect the Kafka controller: >> > > > > > > >> > > > > > >> > > > >> > >> https://cwiki.apache.org/confluence/display/KAFKA/KIP-599%3A+Throttle+Create+Topic%2C+Create+Partition+and+Delete+Topic+Operations >> > > > > > > >> > > > > > > Please, let me know what you think. >> > > > > > > >> > > > > > > Cheers, >> > > > > > > David >> > > > > > > >> > > > > > >> > > > > >> > > > >> > > >> > >> >