Guozhang/Dong, Thank you for the feedback.
Guozhang : I have updated the section on co-existence of byte rate and request time quotas. Dong: I hadn't added much detail to the metrics and sensors since they are going to be very similar to the existing metrics and sensors. To avoid confusion, I have now added more detail. All metrics are in the group "quotaType" and all sensors have names starting with "quotaType" (where quotaType is Produce/Fetch/LeaderReplication/FollowerReplication/*IOThread*). So there will be no reuse of existing metrics/sensors. The new ones for request processing time based throttling will be completely independent of existing metrics/sensors, but will be consistent in format. The existing throttle_time_ms field in produce/fetch responses will not be impacted by this KIP. That will continue to return byte-rate based throttling times. In addition, a new field request_throttle_time_ms will be added to return request quota based throttling times. These will be exposed as new metrics on the client-side. Since all metrics and sensors are different for each type of quota, I believe there is already sufficient metrics to monitor throttling on both client and broker side for each type of throttling. Regards, Rajini On Thu, Feb 23, 2017 at 4:32 AM, Dong Lin <lindon...@gmail.com> wrote: > Hey Rajini, > > I think it makes a lot of sense to use io_thread_units as metric to quota > user's traffic here. LGTM overall. I have some questions regarding sensors. > > - Can you be more specific in the KIP what sensors will be added? For > example, it will be useful to specify the name and attributes of these new > sensors. > > - We currently have throttle-time and queue-size for byte-rate based quota. > Are you going to have separate throttle-time and queue-size for requests > throttled by io_thread_unit-based quota, or will they share the same > sensor? > > - Does the throttle-time in the ProduceResponse and FetchResponse contains > time due to io_thread_unit-based quota? > > - Currently kafka server doesn't not provide any log or metrics that tells > whether any given clientId (or user) is throttled. This is not too bad > because we can still check the client-side byte-rate metric to validate > whether a given client is throttled. But with this io_thread_unit, there > will be no way to validate whether a given client is slow because it has > exceeded its io_thread_unit limit. It is necessary for user to be able to > know this information to figure how whether they have reached there quota > limit. How about we add log4j log on the server side to periodically print > the (client_id, byte-rate-throttle-time, io-thread-unit-throttle-time) so > that kafka administrator can figure those users that have reached their > limit and act accordingly? > > Thanks, > Dong > > > > > > On Wed, Feb 22, 2017 at 4:46 PM, Guozhang Wang <wangg...@gmail.com> wrote: > > > Made a pass over the doc, overall LGTM except a minor comment on the > > throttling implementation: > > > > Stated as "Request processing time throttling will be applied on top if > > necessary." I thought that it meant the request processing time > throttling > > is applied first, but continue reading I found it actually meant to apply > > produce / fetch byte rate throttling first. > > > > Also the last sentence "The remaining delay if any is applied to the > > response." is a bit confusing to me. Maybe rewording it a bit? > > > > > > Guozhang > > > > > > On Wed, Feb 22, 2017 at 3:24 PM, Jun Rao <j...@confluent.io> wrote: > > > > > Hi, Rajini, > > > > > > Thanks for the updated KIP. The latest proposal looks good to me. > > > > > > Jun > > > > > > On Wed, Feb 22, 2017 at 2:19 PM, Rajini Sivaram < > rajinisiva...@gmail.com > > > > > > wrote: > > > > > > > Jun/Roger, > > > > > > > > Thank you for the feedback. > > > > > > > > 1. I have updated the KIP to use absolute units instead of > percentage. > > > The > > > > property is called* io_thread_units* to align with the thread count > > > > property *num.io.threads*. When we implement network thread > utilization > > > > quotas, we can add another property *network_thread_units.* > > > > > > > > 2. ControlledShutdown is already listed under the exempt requests. > Jun, > > > did > > > > you mean a different request that needs to be added? The four > requests > > > > currently exempt in the KIP are StopReplica, ControlledShutdown, > > > > LeaderAndIsr and UpdateMetadata. These are controlled using > > ClusterAction > > > > ACL, so it is easy to exclude and only throttle if unauthorized. I > > wasn't > > > > sure if there are other requests used only for inter-broker that > needed > > > to > > > > be excluded. > > > > > > > > 3. I was thinking the smallest change would be to replace all > > references > > > to > > > > *requestChannel.sendResponse()* with a local method > > > > *sendResponseMaybeThrottle()* that does the throttling if any plus > send > > > > response. If we throttle first in *KafkaApis.handle()*, the time > spent > > > > within the method handling the request will not be recorded or used > in > > > > throttling. We can look into this again when the PR is ready for > > review. > > > > > > > > Regards, > > > > > > > > Rajini > > > > > > > > > > > > > > > > On Wed, Feb 22, 2017 at 5:55 PM, Roger Hoover < > roger.hoo...@gmail.com> > > > > wrote: > > > > > > > > > Great to see this KIP and the excellent discussion. > > > > > > > > > > To me, Jun's suggestion makes sense. If my application is > allocated > > 1 > > > > > request handler unit, then it's as if I have a Kafka broker with a > > > single > > > > > request handler thread dedicated to me. That's the most I can use, > > at > > > > > least. That allocation doesn't change even if an admin later > > increases > > > > the > > > > > size of the request thread pool on the broker. It's similar to the > > CPU > > > > > abstraction that VMs and containers get from hypervisors or OS > > > > schedulers. > > > > > While different client access patterns can use wildly different > > amounts > > > > of > > > > > request thread resources per request, a given application will > > > generally > > > > > have a stable access pattern and can figure out empirically how > many > > > > > "request thread units" it needs to meet it's throughput/latency > > goals. > > > > > > > > > > Cheers, > > > > > > > > > > Roger > > > > > > > > > > On Wed, Feb 22, 2017 at 8:53 AM, Jun Rao <j...@confluent.io> wrote: > > > > > > > > > > > Hi, Rajini, > > > > > > > > > > > > Thanks for the updated KIP. A few more comments. > > > > > > > > > > > > 1. A concern of request_time_percent is that it's not an absolute > > > > value. > > > > > > Let's say you give a user a 10% limit. If the admin doubles the > > > number > > > > of > > > > > > request handler threads, that user now actually has twice the > > > absolute > > > > > > capacity. This may confuse people a bit. So, perhaps setting the > > > quota > > > > > > based on an absolute request thread unit is better. > > > > > > > > > > > > 2. ControlledShutdownRequest is also an inter-broker request and > > > needs > > > > to > > > > > > be excluded from throttling. > > > > > > > > > > > > 3. Implementation wise, I am wondering if it's simpler to apply > the > > > > > request > > > > > > time throttling first in KafkaApis.handle(). Otherwise, we will > > need > > > to > > > > > add > > > > > > the throttling logic in each type of request. > > > > > > > > > > > > Thanks, > > > > > > > > > > > > Jun > > > > > > > > > > > > On Wed, Feb 22, 2017 at 5:58 AM, Rajini Sivaram < > > > > rajinisiva...@gmail.com > > > > > > > > > > > > wrote: > > > > > > > > > > > > > Jun, > > > > > > > > > > > > > > Thank you for the review. > > > > > > > > > > > > > > I have reverted to the original KIP that throttles based on > > request > > > > > > handler > > > > > > > utilization. At the moment, it uses percentage, but I am happy > to > > > > > change > > > > > > to > > > > > > > a fraction (out of 1 instead of 100) if required. I have added > > the > > > > > > examples > > > > > > > from this discussion to the KIP. Also added a "Future Work" > > section > > > > to > > > > > > > address network thread utilization. The configuration is named > > > > > > > "request_time_percent" with the expectation that it can also be > > > used > > > > as > > > > > > the > > > > > > > limit for network thread utilization when that is implemented, > so > > > > that > > > > > > > users have to set only one config for the two and not have to > > worry > > > > > about > > > > > > > the internal distribution of the work between the two thread > > pools > > > in > > > > > > > Kafka. > > > > > > > > > > > > > > > > > > > > > Regards, > > > > > > > > > > > > > > Rajini > > > > > > > > > > > > > > > > > > > > > On Wed, Feb 22, 2017 at 12:23 AM, Jun Rao <j...@confluent.io> > > > wrote: > > > > > > > > > > > > > > > Hi, Rajini, > > > > > > > > > > > > > > > > Thanks for the proposal. > > > > > > > > > > > > > > > > The benefit of using the request processing time over the > > request > > > > > rate > > > > > > is > > > > > > > > exactly what people have said. I will just expand that a bit. > > > > > Consider > > > > > > > the > > > > > > > > following case. The producer sends a produce request with a > > 10MB > > > > > > message > > > > > > > > but compressed to 100KB with gzip. The decompression of the > > > message > > > > > on > > > > > > > the > > > > > > > > broker could take 10-15 seconds, during which time, a request > > > > handler > > > > > > > > thread is completely blocked. In this case, neither the > byte-in > > > > quota > > > > > > nor > > > > > > > > the request rate quota may be effective in protecting the > > broker. > > > > > > > Consider > > > > > > > > another case. A consumer group starts with 10 instances and > > later > > > > on > > > > > > > > switches to 20 instances. The request rate will likely > double, > > > but > > > > > the > > > > > > > > actually load on the broker may not double since each fetch > > > request > > > > > > only > > > > > > > > contains half of the partitions. Request rate quota may not > be > > > easy > > > > > to > > > > > > > > configure in this case. > > > > > > > > > > > > > > > > What we really want is to be able to prevent a client from > > using > > > > too > > > > > > much > > > > > > > > of the server side resources. In this particular KIP, this > > > resource > > > > > is > > > > > > > the > > > > > > > > capacity of the request handler threads. I agree that it may > > not > > > be > > > > > > > > intuitive for the users to determine how to set the right > > limit. > > > > > > However, > > > > > > > > this is not completely new and has been done in the container > > > world > > > > > > > > already. For example, Linux cgroup ( > https://access.redhat.com/ > > > > > > > > documentation/en-US/Red_Hat_Enterprise_Linux/6/html/ > > > > > > > > Resource_Management_Guide/sec-cpu.html) has the concept of > > > > > > > > cpu.cfs_quota_us, > > > > > > > > which specifies the total amount of time in microseconds for > > > which > > > > > all > > > > > > > > tasks in a cgroup can run during a one second period. We can > > > > > > potentially > > > > > > > > model the request handler threads in a similar way. For > > example, > > > > each > > > > > > > > request handler thread can be 1 request handler unit and the > > > admin > > > > > can > > > > > > > > configure a limit on how many units (say 0.01) a client can > > have. > > > > > > > > > > > > > > > > Regarding not throttling the internal broker to broker > > requests. > > > We > > > > > > could > > > > > > > > do that. Alternatively, we could just let the admin > configure a > > > > high > > > > > > > limit > > > > > > > > for the kafka user (it may not be able to do that easily > based > > on > > > > > > > clientId > > > > > > > > though). > > > > > > > > > > > > > > > > Ideally we want to be able to protect the utilization of the > > > > network > > > > > > > thread > > > > > > > > pool too. The difficult is mostly what Rajini said: (1) The > > > > mechanism > > > > > > for > > > > > > > > throttling the requests is through Purgatory and we will have > > to > > > > > think > > > > > > > > through how to integrate that into the network layer. (2) In > > the > > > > > > network > > > > > > > > layer, currently we know the user, but not the clientId of > the > > > > > request. > > > > > > > So, > > > > > > > > it's a bit tricky to throttle based on clientId there. Plus, > > the > > > > > > byteOut > > > > > > > > quota can already protect the network thread utilization for > > > fetch > > > > > > > > requests. So, if we can't figure out this part right now, > just > > > > > focusing > > > > > > > on > > > > > > > > the request handling threads for this KIP is still a useful > > > > feature. > > > > > > > > > > > > > > > > Thanks, > > > > > > > > > > > > > > > > Jun > > > > > > > > > > > > > > > > > > > > > > > > On Tue, Feb 21, 2017 at 4:27 AM, Rajini Sivaram < > > > > > > rajinisiva...@gmail.com > > > > > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > Thank you all for the feedback. > > > > > > > > > > > > > > > > > > Jay: I have removed exemption for consumer heartbeat etc. > > Agree > > > > > that > > > > > > > > > protecting the cluster is more important than protecting > > > > individual > > > > > > > apps. > > > > > > > > > Have retained the exemption for StopReplicat/LeaderAndIsr > > etc, > > > > > these > > > > > > > are > > > > > > > > > throttled only if authorization fails (so can't be used for > > DoS > > > > > > attacks > > > > > > > > in > > > > > > > > > a secure cluster, but allows inter-broker requests to > > complete > > > > > > without > > > > > > > > > delays). > > > > > > > > > > > > > > > > > > I will wait another day to see if these is any objection to > > > > quotas > > > > > > > based > > > > > > > > on > > > > > > > > > request processing time (as opposed to request rate) and if > > > there > > > > > are > > > > > > > no > > > > > > > > > objections, I will revert to the original proposal with > some > > > > > changes. > > > > > > > > > > > > > > > > > > The original proposal was only including the time used by > the > > > > > request > > > > > > > > > handler threads (that made calculation easy). I think the > > > > > suggestion > > > > > > is > > > > > > > > to > > > > > > > > > include the time spent in the network threads as well since > > > that > > > > > may > > > > > > be > > > > > > > > > significant. As Jay pointed out, it is more complicated to > > > > > calculate > > > > > > > the > > > > > > > > > total available CPU time and convert to a ratio when there > > *m* > > > > I/O > > > > > > > > threads > > > > > > > > > and *n* network threads. ThreadMXBean#getThreadCPUTime() > may > > > > give > > > > > us > > > > > > > > what > > > > > > > > > we want, but it can be very expensive on some platforms. As > > > > Becket > > > > > > and > > > > > > > > > Guozhang have pointed out, we do have several time > > measurements > > > > > > already > > > > > > > > for > > > > > > > > > generating metrics that we could use, though we might want > to > > > > > switch > > > > > > to > > > > > > > > > nanoTime() instead of currentTimeMillis() since some of the > > > > values > > > > > > for > > > > > > > > > small requests may be < 1ms. But rather than add up the > time > > > > spent > > > > > in > > > > > > > I/O > > > > > > > > > thread and network thread, wouldn't it be better to convert > > the > > > > > time > > > > > > > > spent > > > > > > > > > on each thread into a separate ratio? UserA has a request > > quota > > > > of > > > > > > 5%. > > > > > > > > Can > > > > > > > > > we take that to mean that UserA can use 5% of the time on > > > network > > > > > > > threads > > > > > > > > > and 5% of the time on I/O threads? If either is exceeded, > the > > > > > > response > > > > > > > is > > > > > > > > > throttled - it would mean maintaining two sets of metrics > for > > > the > > > > > two > > > > > > > > > durations, but would result in more meaningful ratios. We > > could > > > > > > define > > > > > > > > two > > > > > > > > > quota limits (UserA has 5% of request threads and 10% of > > > network > > > > > > > > threads), > > > > > > > > > but that seems unnecessary and harder to explain to users. > > > > > > > > > > > > > > > > > > Back to why and how quotas are applied to network thread > > > > > utilization: > > > > > > > > > a) In the case of fetch, the time spent in the network > > thread > > > > may > > > > > be > > > > > > > > > significant and I can see the need to include this. Are > there > > > > other > > > > > > > > > requests where the network thread utilization is > significant? > > > In > > > > > the > > > > > > > case > > > > > > > > > of fetch, request handler thread utilization would throttle > > > > clients > > > > > > > with > > > > > > > > > high request rate, low data volume and fetch byte rate > quota > > > will > > > > > > > > throttle > > > > > > > > > clients with high data volume. Network thread utilization > is > > > > > perhaps > > > > > > > > > proportional to the data volume. I am wondering if we even > > need > > > > to > > > > > > > > throttle > > > > > > > > > based on network thread utilization or whether the data > > volume > > > > > quota > > > > > > > > covers > > > > > > > > > this case. > > > > > > > > > > > > > > > > > > b) At the moment, we record and check for quota violation > at > > > the > > > > > same > > > > > > > > time. > > > > > > > > > If a quota is violated, the response is delayed. Using > Jay'e > > > > > example > > > > > > of > > > > > > > > > disk reads for fetches happening in the network thread, We > > > can't > > > > > > record > > > > > > > > and > > > > > > > > > delay a response after the disk reads. We could record the > > time > > > > > spent > > > > > > > on > > > > > > > > > the network thread when the response is complete and > > introduce > > > a > > > > > > delay > > > > > > > > for > > > > > > > > > handling a subsequent request (separate out recording and > > quota > > > > > > > violation > > > > > > > > > handling in the case of network thread overload). Does that > > > make > > > > > > sense? > > > > > > > > > > > > > > > > > > > > > > > > > > > Regards, > > > > > > > > > > > > > > > > > > Rajini > > > > > > > > > > > > > > > > > > > > > > > > > > > On Tue, Feb 21, 2017 at 2:58 AM, Becket Qin < > > > > becket....@gmail.com> > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > Hey Jay, > > > > > > > > > > > > > > > > > > > > Yeah, I agree that enforcing the CPU time is a little > > > tricky. I > > > > > am > > > > > > > > > thinking > > > > > > > > > > that maybe we can use the existing request statistics. > They > > > are > > > > > > > already > > > > > > > > > > very detailed so we can probably see the approximate CPU > > time > > > > > from > > > > > > > it, > > > > > > > > > e.g. > > > > > > > > > > something like (total_time - request/response_queue_time > - > > > > > > > > remote_time). > > > > > > > > > > > > > > > > > > > > I agree with Guozhang that when a user is throttled it is > > > > likely > > > > > > that > > > > > > > > we > > > > > > > > > > need to see if anything has went wrong first, and if the > > > users > > > > > are > > > > > > > well > > > > > > > > > > behaving and just need more resources, we will have to > bump > > > up > > > > > the > > > > > > > > quota > > > > > > > > > > for them. It is true that pre-allocating CPU time quota > > > > precisely > > > > > > for > > > > > > > > the > > > > > > > > > > users is difficult. So in practice it would probably be > > more > > > > like > > > > > > > first > > > > > > > > > set > > > > > > > > > > a relative high protective CPU time quota for everyone > and > > > > > increase > > > > > > > > that > > > > > > > > > > for some individual clients on demand. > > > > > > > > > > > > > > > > > > > > Thanks, > > > > > > > > > > > > > > > > > > > > Jiangjie (Becket) Qin > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > On Mon, Feb 20, 2017 at 5:48 PM, Guozhang Wang < > > > > > wangg...@gmail.com > > > > > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > This is a great proposal, glad to see it happening. > > > > > > > > > > > > > > > > > > > > > > I am inclined to the CPU throttling, or more > specifically > > > > > > > processing > > > > > > > > > time > > > > > > > > > > > ratio instead of the request rate throttling as well. > > > Becket > > > > > has > > > > > > > very > > > > > > > > > > well > > > > > > > > > > > summed my rationales above, and one thing to add here > is > > > that > > > > > the > > > > > > > > > former > > > > > > > > > > > has a good support for both "protecting against rogue > > > > clients" > > > > > as > > > > > > > > well > > > > > > > > > as > > > > > > > > > > > "utilizing a cluster for multi-tenancy usage": when > > > thinking > > > > > > about > > > > > > > > how > > > > > > > > > to > > > > > > > > > > > explain this to the end users, I find it actually more > > > > natural > > > > > > than > > > > > > > > the > > > > > > > > > > > request rate since as mentioned above, different > requests > > > > will > > > > > > have > > > > > > > > > quite > > > > > > > > > > > different "cost", and Kafka today already have various > > > > request > > > > > > > types > > > > > > > > > > > (produce, fetch, admin, metadata, etc), because of that > > the > > > > > > request > > > > > > > > > rate > > > > > > > > > > > throttling may not be as effective unless it is set > very > > > > > > > > > conservatively. > > > > > > > > > > > > > > > > > > > > > > Regarding to user reactions when they are throttled, I > > > think > > > > it > > > > > > may > > > > > > > > > > differ > > > > > > > > > > > case-by-case, and need to be discovered / guided by > > looking > > > > at > > > > > > > > relative > > > > > > > > > > > metrics. So in other words users would not expect to > get > > > > > > additional > > > > > > > > > > > information by simply being told "hey, you are > > throttled", > > > > > which > > > > > > is > > > > > > > > all > > > > > > > > > > > what throttling does; they need to take a follow-up > step > > > and > > > > > see > > > > > > > > "hmm, > > > > > > > > > > I'm > > > > > > > > > > > throttled probably because of ..", which is by looking > at > > > > other > > > > > > > > metric > > > > > > > > > > > values: e.g. whether I'm bombarding the brokers with > > > metadata > > > > > > > > request, > > > > > > > > > > > which are usually cheap to handle but I'm sending > > thousands > > > > per > > > > > > > > second; > > > > > > > > > > or > > > > > > > > > > > is it because I'm catching up and hence sending very > > heavy > > > > > > fetching > > > > > > > > > > request > > > > > > > > > > > with large min.bytes, etc. > > > > > > > > > > > > > > > > > > > > > > Regarding to the implementation, as once discussed with > > > Jun, > > > > > this > > > > > > > > seems > > > > > > > > > > not > > > > > > > > > > > very difficult since today we are already collecting > the > > > > > "thread > > > > > > > pool > > > > > > > > > > > utilization" metrics, which is a single percentage > > > > > > > > "aggregateIdleMeter" > > > > > > > > > > > value; but we are already effectively aggregating it > for > > > each > > > > > > > > requests > > > > > > > > > in > > > > > > > > > > > KafkaRequestHandler, and we can just extend it by > > recording > > > > the > > > > > > > > source > > > > > > > > > > > client id when handling them and aggregating by > clientId > > as > > > > > well > > > > > > as > > > > > > > > the > > > > > > > > > > > total aggregate. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Guozhang > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > On Mon, Feb 20, 2017 at 4:27 PM, Jay Kreps < > > > j...@confluent.io > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > > > Hey Becket/Rajini, > > > > > > > > > > > > > > > > > > > > > > > > When I thought about it more deeply I came around to > > the > > > > > > "percent > > > > > > > > of > > > > > > > > > > > > processing time" metric too. It seems a lot closer to > > the > > > > > thing > > > > > > > we > > > > > > > > > > > actually > > > > > > > > > > > > care about and need to protect. I also think this > would > > > be > > > > a > > > > > > very > > > > > > > > > > useful > > > > > > > > > > > > metric even in the absence of throttling just to > debug > > > > whose > > > > > > > using > > > > > > > > > > > > capacity. > > > > > > > > > > > > > > > > > > > > > > > > Two problems to consider: > > > > > > > > > > > > > > > > > > > > > > > > 1. I agree that for the user it is understandable > > what > > > > > lead > > > > > > to > > > > > > > > > their > > > > > > > > > > > > being throttled, but it is a bit hard to figure > out > > > the > > > > > safe > > > > > > > > range > > > > > > > > > > for > > > > > > > > > > > > them. i.e. if I have a new app that will send 200 > > > > > > > messages/sec I > > > > > > > > > can > > > > > > > > > > > > probably reason that I'll be under the throttling > > > limit > > > > of > > > > > > 300 > > > > > > > > > > > req/sec. > > > > > > > > > > > > However if I need to be under a 10% CPU resources > > > limit > > > > it > > > > > > may > > > > > > > > be > > > > > > > > > a > > > > > > > > > > > bit > > > > > > > > > > > > harder for me to know a priori if i will or won't. > > > > > > > > > > > > 2. Calculating the available CPU time is a bit > > > difficult > > > > > > since > > > > > > > > > there > > > > > > > > > > > are > > > > > > > > > > > > actually two thread pools--the I/O threads and the > > > > network > > > > > > > > > threads. > > > > > > > > > > I > > > > > > > > > > > > think > > > > > > > > > > > > it might be workable to count just the I/O thread > > time > > > > as > > > > > in > > > > > > > the > > > > > > > > > > > > proposal, > > > > > > > > > > > > but the network thread work is actually > non-trivial > > > > (e.g. > > > > > > all > > > > > > > > the > > > > > > > > > > disk > > > > > > > > > > > > reads for fetches happen in that thread). If you > > count > > > > > both > > > > > > > the > > > > > > > > > > > network > > > > > > > > > > > > and > > > > > > > > > > > > I/O threads it can skew things a bit. E.g. say you > > > have > > > > 50 > > > > > > > > network > > > > > > > > > > > > threads, > > > > > > > > > > > > 10 I/O threads, and 8 cores, what is the available > > cpu > > > > > time > > > > > > > > > > available > > > > > > > > > > > > in a > > > > > > > > > > > > second? I suppose this is a problem whenever you > > have > > > a > > > > > > > > bottleneck > > > > > > > > > > > > between > > > > > > > > > > > > I/O and network threads or if you end up > > significantly > > > > > > > > > > > over-provisioning > > > > > > > > > > > > one pool (both of which are hard to avoid). > > > > > > > > > > > > > > > > > > > > > > > > An alternative for CPU throttling would be to use > this > > > api: > > > > > > > > > > > > http://docs.oracle.com/javase/ > > 1.5.0/docs/api/java/lang/ > > > > > > > > > > > > management/ThreadMXBean.html#getThreadCpuTime(long) > > > > > > > > > > > > > > > > > > > > > > > > That would let you track actual CPU usage across the > > > > network, > > > > > > I/O > > > > > > > > > > > threads, > > > > > > > > > > > > and purgatory threads and look at it as a percentage > of > > > > total > > > > > > > > cores. > > > > > > > > > I > > > > > > > > > > > > think this fixes many problems in the reliability of > > the > > > > > > metric. > > > > > > > > It's > > > > > > > > > > > > meaning is slightly different as it is just CPU (you > > > don't > > > > > get > > > > > > > > > charged > > > > > > > > > > > for > > > > > > > > > > > > time blocking on I/O) but that may be okay because we > > > > already > > > > > > > have > > > > > > > > a > > > > > > > > > > > > throttle on I/O. The downside is I think it is > possible > > > > this > > > > > > api > > > > > > > > can > > > > > > > > > be > > > > > > > > > > > > disabled or isn't always available and it may also be > > > > > expensive > > > > > > > > (also > > > > > > > > > > > I've > > > > > > > > > > > > never used it so not sure if it really works the way > i > > > > > think). > > > > > > > > > > > > > > > > > > > > > > > > -Jay > > > > > > > > > > > > > > > > > > > > > > > > On Mon, Feb 20, 2017 at 3:17 PM, Becket Qin < > > > > > > > becket....@gmail.com> > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > > > > > If the purpose of the KIP is only to protect the > > > cluster > > > > > from > > > > > > > > being > > > > > > > > > > > > > overwhelmed by crazy clients and is not intended to > > > > address > > > > > > > > > resource > > > > > > > > > > > > > allocation problem among the clients, I am > wondering > > if > > > > > using > > > > > > > > > request > > > > > > > > > > > > > handling time quota (CPU time quota) is a better > > > option. > > > > > Here > > > > > > > are > > > > > > > > > the > > > > > > > > > > > > > reasons: > > > > > > > > > > > > > > > > > > > > > > > > > > 1. request handling time quota has better > protection. > > > Say > > > > > we > > > > > > > have > > > > > > > > > > > request > > > > > > > > > > > > > rate quota and set that to some value like 100 > > > > > requests/sec, > > > > > > it > > > > > > > > is > > > > > > > > > > > > possible > > > > > > > > > > > > > that some of the requests are very expensive > actually > > > > take > > > > > a > > > > > > > lot > > > > > > > > of > > > > > > > > > > > time > > > > > > > > > > > > to > > > > > > > > > > > > > handle. In that case a few clients may still > occupy a > > > lot > > > > > of > > > > > > > CPU > > > > > > > > > time > > > > > > > > > > > > even > > > > > > > > > > > > > the request rate is low. Arguably we can carefully > > set > > > > > > request > > > > > > > > rate > > > > > > > > > > > quota > > > > > > > > > > > > > for each request and client id combination, but it > > > could > > > > > > still > > > > > > > be > > > > > > > > > > > tricky > > > > > > > > > > > > to > > > > > > > > > > > > > get it right for everyone. > > > > > > > > > > > > > > > > > > > > > > > > > > If we use the request time handling quota, we can > > > simply > > > > > say > > > > > > no > > > > > > > > > > clients > > > > > > > > > > > > can > > > > > > > > > > > > > take up to more than 30% of the total request > > handling > > > > > > capacity > > > > > > > > > > > (measured > > > > > > > > > > > > > by time), regardless of the difference among > > different > > > > > > requests > > > > > > > > or > > > > > > > > > > what > > > > > > > > > > > > is > > > > > > > > > > > > > the client doing. In this case maybe we can quota > all > > > the > > > > > > > > requests > > > > > > > > > if > > > > > > > > > > > we > > > > > > > > > > > > > want to. > > > > > > > > > > > > > > > > > > > > > > > > > > 2. The main benefit of using request rate limit is > > that > > > > it > > > > > > > seems > > > > > > > > > more > > > > > > > > > > > > > intuitive. It is true that it is probably easier to > > > > explain > > > > > > to > > > > > > > > the > > > > > > > > > > user > > > > > > > > > > > > > what does that mean. However, in practice it looks > > the > > > > > impact > > > > > > > of > > > > > > > > > > > request > > > > > > > > > > > > > rate quota is not more quantifiable than the > request > > > > > handling > > > > > > > > time > > > > > > > > > > > quota. > > > > > > > > > > > > > Unlike the byte rate quota, it is still difficult > to > > > > give a > > > > > > > > number > > > > > > > > > > > about > > > > > > > > > > > > > impact of throughput or latency when a request rate > > > quota > > > > > is > > > > > > > hit. > > > > > > > > > So > > > > > > > > > > it > > > > > > > > > > > > is > > > > > > > > > > > > > not better than the request handling time quota. In > > > fact > > > > I > > > > > > feel > > > > > > > > it > > > > > > > > > is > > > > > > > > > > > > > clearer to tell user that "you are limited because > > you > > > > have > > > > > > > taken > > > > > > > > > 30% > > > > > > > > > > > of > > > > > > > > > > > > > the CPU time on the broker" than otherwise > something > > > like > > > > > > "your > > > > > > > > > > request > > > > > > > > > > > > > rate quota on metadata request has reached". > > > > > > > > > > > > > > > > > > > > > > > > > > Thanks, > > > > > > > > > > > > > > > > > > > > > > > > > > Jiangjie (Becket) Qin > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > On Mon, Feb 20, 2017 at 2:23 PM, Jay Kreps < > > > > > j...@confluent.io > > > > > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > I think this proposal makes a lot of sense > > > (especially > > > > > now > > > > > > > that > > > > > > > > > it > > > > > > > > > > is > > > > > > > > > > > > > > oriented around request rate) and fills the > biggest > > > > > > remaining > > > > > > > > gap > > > > > > > > > > in > > > > > > > > > > > > the > > > > > > > > > > > > > > multi-tenancy story. > > > > > > > > > > > > > > > > > > > > > > > > > > > > I think for intra-cluster communication > > (StopReplica, > > > > > etc) > > > > > > we > > > > > > > > > could > > > > > > > > > > > > avoid > > > > > > > > > > > > > > throttling entirely. You can secure or otherwise > > > > > lock-down > > > > > > > the > > > > > > > > > > > cluster > > > > > > > > > > > > > > communication to avoid any unauthorized external > > > party > > > > > from > > > > > > > > > trying > > > > > > > > > > to > > > > > > > > > > > > > > initiate these requests. As a result we are as > > likely > > > > to > > > > > > > cause > > > > > > > > > > > problems > > > > > > > > > > > > > as > > > > > > > > > > > > > > solve them by throttling these, right? > > > > > > > > > > > > > > > > > > > > > > > > > > > > I'm not so sure that we should exempt the > consumer > > > > > requests > > > > > > > > such > > > > > > > > > as > > > > > > > > > > > > > > heartbeat. It's true that if we throttle an app's > > > > > heartbeat > > > > > > > > > > requests > > > > > > > > > > > it > > > > > > > > > > > > > may > > > > > > > > > > > > > > cause it to fall out of its consumer group. > However > > > if > > > > we > > > > > > > don't > > > > > > > > > > > > throttle > > > > > > > > > > > > > it > > > > > > > > > > > > > > it may DDOS the cluster if the heartbeat interval > > is > > > > set > > > > > > > > > > incorrectly > > > > > > > > > > > or > > > > > > > > > > > > > if > > > > > > > > > > > > > > some client in some language has a bug. I think > the > > > > > policy > > > > > > > with > > > > > > > > > > this > > > > > > > > > > > > kind > > > > > > > > > > > > > > of throttling is to protect the cluster above any > > > > > > individual > > > > > > > > app, > > > > > > > > > > > > right? > > > > > > > > > > > > > I > > > > > > > > > > > > > > think in general this should be okay since for > most > > > > > > > deployments > > > > > > > > > > this > > > > > > > > > > > > > > setting is meant as more of a safety valve---that > > is > > > > > rather > > > > > > > > than > > > > > > > > > > set > > > > > > > > > > > > > > something very close to what you expect to need > > (say > > > 2 > > > > > > > req/sec > > > > > > > > or > > > > > > > > > > > > > whatever) > > > > > > > > > > > > > > you would have something quite high (like 100 > > > req/sec) > > > > > with > > > > > > > > this > > > > > > > > > > > meant > > > > > > > > > > > > to > > > > > > > > > > > > > > prevent a client gone crazy. I think when used > this > > > way > > > > > > > > allowing > > > > > > > > > > > those > > > > > > > > > > > > to > > > > > > > > > > > > > > be throttled would actually provide meaningful > > > > > protection. > > > > > > > > > > > > > > > > > > > > > > > > > > > > -Jay > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > On Fri, Feb 17, 2017 at 9:05 AM, Rajini Sivaram < > > > > > > > > > > > > rajinisiva...@gmail.com > > > > > > > > > > > > > > > > > > > > > > > > > > > > wrote: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Hi all, > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > I have just created KIP-124 to introduce > request > > > rate > > > > > > > quotas > > > > > > > > to > > > > > > > > > > > > Kafka: > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > https://cwiki.apache.org/ > > > > confluence/display/KAFKA/KIP- > > > > > > > > > > > > > > > 124+-+Request+rate+quotas > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > The proposal is for a simple percentage request > > > > > handling > > > > > > > time > > > > > > > > > > quota > > > > > > > > > > > > > that > > > > > > > > > > > > > > > can be allocated to *<client-id>*, *<user>* or > > > > *<user, > > > > > > > > > > client-id>*. > > > > > > > > > > > > > There > > > > > > > > > > > > > > > are a few other suggestions also under > "Rejected > > > > > > > > alternatives". > > > > > > > > > > > > > Feedback > > > > > > > > > > > > > > > and suggestions are welcome. > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Thank you... > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Regards, > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > Rajini > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > > > > > > > > > > -- Guozhang > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > > -- > > -- Guozhang > > >