-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[NPM] use config to size conn_close_flushed map #30638
Conversation
[Fast Unit Tests Report] On pipeline 48062785 (CI Visibility). The following jobs did not run any unit tests: Jobs:
If you modified Go files and expected unit tests to run in these jobs, please double check the job logs. If you think tests should have been executed reach out to #agent-devx-help |
Test changes on VMUse this command from test-infra-definitions to manually test this PR changes on a VM: inv create-vm --pipeline-id=48062785 --os-family=ubuntu Note: This applies to commit e05e8d9 |
Regression DetectorRegression Detector ResultsRun ID: bca89d71-7464-42d5-a334-5cacb44e258c Metrics dashboard Target profiles Baseline: a0e73e3 Performance changes are noted in the perf column of each table:
No significant changes in experiment optimization goalsConfidence level: 90.00% There were no significant changes in experiment optimization goals at this confidence level and effect size tolerance.
|
perf | experiment | goal | Δ mean % | Δ mean % CI | trials | links |
---|---|---|---|---|---|---|
➖ | pycheck_lots_of_tags | % cpu utilization | +2.47 | [-0.09, +5.02] | 1 | Logs |
➖ | file_tree | memory utilization | +1.90 | [+1.74, +2.06] | 1 | Logs |
➖ | idle_all_features | memory utilization | +0.91 | [+0.78, +1.04] | 1 | Logs bounds checks dashboard |
➖ | tcp_syslog_to_blackhole | ingress throughput | +0.10 | [+0.04, +0.15] | 1 | Logs |
➖ | file_to_blackhole_300ms_latency | egress throughput | +0.10 | [-0.08, +0.28] | 1 | Logs |
➖ | file_to_blackhole_500ms_latency | egress throughput | +0.05 | [-0.20, +0.29] | 1 | Logs |
➖ | basic_py_check | % cpu utilization | +0.03 | [-2.70, +2.76] | 1 | Logs |
➖ | uds_dogstatsd_to_api | ingress throughput | +0.01 | [-0.10, +0.13] | 1 | Logs |
➖ | tcp_dd_logs_filter_exclude | ingress throughput | -0.00 | [-0.01, +0.01] | 1 | Logs |
➖ | file_to_blackhole_100ms_latency | egress throughput | -0.01 | [-0.23, +0.21] | 1 | Logs |
➖ | file_to_blackhole_0ms_latency | egress throughput | -0.01 | [-0.36, +0.33] | 1 | Logs |
➖ | quality_gate_idle | memory utilization | -0.25 | [-0.30, -0.19] | 1 | Logs bounds checks dashboard |
➖ | file_to_blackhole_1000ms_latency | egress throughput | -0.26 | [-0.75, +0.23] | 1 | Logs |
➖ | idle | memory utilization | -0.32 | [-0.38, -0.26] | 1 | Logs bounds checks dashboard |
➖ | uds_dogstatsd_to_api_cpu | % cpu utilization | -0.44 | [-1.16, +0.28] | 1 | Logs |
➖ | otel_to_otel_logs | ingress throughput | -0.90 | [-1.70, -0.10] | 1 | Logs |
➖ | quality_gate_idle_all_features | memory utilization | -3.39 | [-3.51, -3.26] | 1 | Logs bounds checks dashboard |
Bounds Checks
perf | experiment | bounds_check_name | replicates_passed |
---|---|---|---|
✅ | file_to_blackhole_0ms_latency | memory_usage | 10/10 |
✅ | file_to_blackhole_1000ms_latency | memory_usage | 10/10 |
✅ | file_to_blackhole_100ms_latency | memory_usage | 10/10 |
✅ | file_to_blackhole_300ms_latency | memory_usage | 10/10 |
✅ | file_to_blackhole_500ms_latency | memory_usage | 10/10 |
✅ | idle | memory_usage | 10/10 |
✅ | idle_all_features | memory_usage | 10/10 |
✅ | quality_gate_idle | memory_usage | 10/10 |
✅ | quality_gate_idle_all_features | memory_usage | 10/10 |
Explanation
A regression test is an A/B test of target performance in a repeatable rig, where "performance" is measured as "comparison variant minus baseline variant" for an optimization goal (e.g., ingress throughput). Due to intrinsic variability in measuring that goal, we can only estimate its mean value for each experiment; we report uncertainty in that value as a 90.00% confidence interval denoted "Δ mean % CI".
For each experiment, we decide whether a change in performance is a "regression" -- a change worth investigating further -- if all of the following criteria are true:
-
Its estimated |Δ mean %| ≥ 5.00%, indicating the change is big enough to merit a closer look.
-
Its 90.00% confidence interval "Δ mean % CI" does not contain zero, indicating that if our statistical model is accurate, there is at least a 90.00% chance there is a difference in performance between baseline and comparison variants.
-
Its configuration does not mark it "erratic".
pkg/network/ebpf/c/tracer.c
Outdated
@@ -286,7 +286,7 @@ int BPF_BYPASSABLE_KPROBE(kprobe__tcp_close, struct sock *sk) { | |||
// upsert the timestamp to the map and delete if it already exists, flush connection otherwise | |||
// skip EEXIST errors for telemetry since it is an expected error | |||
__u64 timestamp = bpf_ktime_get_ns(); | |||
if (bpf_map_update_with_telemetry(conn_close_flushed, &t, ×tamp, BPF_NOEXIST, -EEXIST) == 0) { | |||
if (bpf_map_update_with_telemetry(conn_close_flushed, &t, ×tamp, BPF_NOEXIST, -EEXIST, -E2BIG) == 0) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am not sure I follow the reasoning for suppressing E2BIG errors.
Error suppression should only be used for errors we cannot do anything about, or are expected due to ABI usage. E2BIG does not fall into this category imo.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1, I think we should not suppress E2BIG
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
basically this map is used as a cache for closed connection flushes. if the cache fills up, we will not clean up closed connections (and some other maps will leak). I am fine with focusing on making the cache not fill up in the first place instead, but as a backstop I think it would have been useful to allow this codepath to flush connection closures.
edit: didn't realize this was only for telemetry, I'll change it
// check if there is an entry in the map, meaning the connection was already flushed. | ||
// we don't need to insert an entry here since we are already deleting from the ongoing_connect_pid map, | ||
// so if this probe runs before tcp_done there is no way it will be able to flush this tuple anyway | ||
if (bpf_map_delete_elem(&conn_close_flushed, &t) != 0) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Wouldn't the tcp_done
probe race with this one here to clean up the connection? We will still flush an empty connection in cleanup_conn
whether a "real" connection is flushed here.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
consider a few cases:
tcp_done
first, thentcp_close
:conn_close_flushed
map is cleaned up (NEW), no double flush happenstcp_close
first, thentcp_done
:tcp_done
relies on fetching the PID from theongoing_connect_pid
map, which is cleaned up intcp_close
. So in this case,tcp_done
will bail early and never set an entry in theconn_close_flushed
map or flush any connection.tcp_done
only: entry inconn_close_flushed
leaks, cleaned by map cleaner. connection flushed, and entry inongoing_connect_pid
deleted too.tcp_close
only: no entry created inconn_close_flushed
(NEW),ongoing_connect_pid
entry deleted- both probes execute concurrently. I'm not sure much changes here with this change. Before we could have flushed a connection twice in an edge case, now that is still possible.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The last case is what I don't think works anymore. With the concurrent update to conn_close_flushed by both probes we had a mutex of sorts going; that is not present anymore, and so you could call cleanup_conn
twice while before you wouldn't. Or am I misreading this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hm okay I think you're right.. we can't get rid of this. I'm going to close this PR and open another one with just the config changes for this map and one other I see filling up consistently
What does this PR do?
Instead of hardcoding the allocated max entry count of
conn_close_flushed
, set it as a function of the max connections tracked. With defaults this is a no-op as the current size of the map is 1/4 the defaultmax_connections_tracked
.Also stop inserting into
conn_close_flushed
intcp_close
as there is no mechanism fortcp_done
to flush connections aftertcp_close
executes for a connection anywayMotivation
Describe how to test/QA your changes
Possible Drawbacks / Trade-offs
Additional Notes