Hi Ilya and others,

Thanks for responding, comments below.

On 8/2/24 7:59 AM, Ilya Maximets wrote:
On 6/6/24 18:02, Ihar Hrachyshka wrote:
On Thu, Jun 6, 2024 at 11:12 AM Ihar Hrachyshka <[email protected] 
<mailto:[email protected]>> wrote:

     On Wed, Jun 5, 2024 at 11:17 AM Brian Haley <[email protected] 
<mailto:[email protected]>> wrote:

         Hi Ilya,

         On 6/4/24 6:27 AM, Ilya Maximets wrote:
         > On 6/4/24 11:54, Alin Serdean wrote:
         >> Does it make sense to make this configurable via automake in order 
to avoid
         >> future patches if we need to bump the value further?
         >
         > I'm still not convinced this is an issue worth fixing.
         >
         > The original discussion is here:
         >    
https://mail.openvswitch.org/pipermail/ovs-discuss/2024-April/053058.html 
<https://mail.openvswitch.org/pipermail/ovs-discuss/2024-April/053058.html>
         >
         > It's not clear if these reconnections actually cause any harm or are
         > even helpful in getting to connect to a less busy server in a general
         > case.

         To me, not having to reconnect is a win, especially given the number of
         client threads here. And 128 is still not that much for a server.

An update on this since maybe it will make people re-think increasing the socket backlog to 128.

After running for 50+ days (now closer to 75) in production with a 128 backlog, my customer has seen no increase in listen queue overflow or "SYN to LISTEN drops" statistics on the OVN units. And the leader elections/changes have dropped to about once an hour. At 64 they are still seen. To me that shows it can help in larger deployments, even if seeing them is more an annoyance than anything (they think it's more).

         > The original number 10 was clearly way too low for any reasonable 
workload.
         > But even with that we lived for a very long time with very large 
clusters
         > without any issues.

         It could have also been that noone ever noticed, I know I didn't until
         digging deeper into this.

         > The main problem in the original thread was that a lot of neutron 
clients
         > are having leader-only connections to the database for seemingly no 
reason.


     They write, so AFAIU they need a leader (even if they connect to 
secondary,>     writes will be proxied), correct?

They will be proxied, however, if you're sending transactions through
the leader, it will not reply until the transaction is replicated to
the majority of followers.  So, there is no much difference in latency.

Only the "heavy" writers benefit from connecting to a leader, because
if you have multiple clients with constant stream of transactions from
all of them, followers will need to re-try due to prerequisite changes
once the other server commits a different transaction.  But AFAIU since
you have many clients, probably none of them are "heavy" writers.

I can't say I have an exact answer for the "heavy" writers question, just that some of our customer clouds are very heavily used, i.e. it's a never-ending cycle of building and tearing-down. Think of a CI pipeline that's run on every patch, to infinity. It's not "light" and never in what I'd call a stable state for very long.

I will say I'm interested in exploring using a "leader-only=false" deployment, I'll try and loop-in some other Canonical people to see what they think of that. Ihar had sent a test patch at [0], not sure if it was linked here before.

Thanks,

-Brian

[0] https://review.opendev.org/c/openstack/neutron/+/921461

     There may be place for some OpenStack optimizations (e.g. consolidating all
neutron agents into one that would maintain a single connection per chassis), 
but
ultimately, it's still O(n) where n = number of chassis in the cluster; and we 
have
to have at least 2 connections per chassis (1 ovn-controller and at least 1 
neutron
agent, for metadata). But I would not overestimate the amount of settings where 
the
number of connections from neutron agents can be reduced. This is only an option
where multiple neutron agents are running on the same chassis. Usually, we run
ovn-controller and ovn-metadata-agent. We may also run ovn-agent (for qos) or
bgp-agent (for BGP) but these are not deployed in all environments / on all 
nodes.

     Apart from it, deploying a proxy per node will allow to coalesce the 
number of
connections to 1 per chassis. One can go further and build a tree of proxies to 
keep
the number of connections to the leader at bay (is it O(log n)?) This is not a 
trivial
change to architecture.


OK disregard this (somewhat): Brian experiences issues with NB, not SB. NB 
connections
come from neutron-server workers (not agents). In this case, OpenStack would 
have to
run its own "proxy", per node - for all workers to share, or an ovsdb proxy.

Regarding the switch from leader-only to any member for NB connections by 
workers: is
the argument to do it about the fact that the number of secondaries is a lot 
lower than
the number of neutron-server workers, so the load on a leader is also lower? (2 
or 4
connections from secondaries vs. N*W connections, where N is number of API 
controllers
and W is the number of workers per neutron-server)

What would be the drawbacks we should consider? I can imagine the load on 
secondary
members will increase (but the load on the leader will decrease). Plus probably 
some
minor lag in request processing because of proxying through secondaries (for 
most - but
not all - neutron-server workers). Anything else?

Lag will likely not be noticeable, since, as I mentioned above, leader waits for
followers to acknowledge every transaction anyway before it is considered 
committed.

There is some extra computational cost on a follower if there are many 
simultaneous
transactions executed through different servers.  Only one of the servers will 
be
able to commit the transaction, others will receive a prerequisite mismatch 
error,
because committing any transaction changes prerequisites.  However, this error 
is
transient and not returned to the client.  Instead, the servers that received 
this
error from the leader will re-try their transactions until they succeed.  This 
takes
some CPU resources.  However, as I said before, this is only a problem if you 
have
many write-heavy clients sending constant stream of transactions without any
breathing room.

So, I'd recommend to try this out.

         > That results in unnecessary mass re-connection on leadership change.
         > So, I'd prefer this fixed in OpenStack instead.

         But isn't having many leader-only connections a perfectly valid config
         when most if not all are writers? And if a small increase in the 
backlog
         helps I don't see any reason not to do it. Fixing in Openstack would
         involve one of two options from what I know - 1) Use a proxy; 2) Just
         connect irregardless of leadership status. I'm not sure #2 won't cause
         some other problems as the secondaries would have to forward things to
         the leader, correct?

         The best solution would be to have this configurable if you see that as
         a viable option.

         -Brian

         > Best regards, Ilya Maximets.
         >
         >>
         >> On Tue, Jun 4, 2024 at 11:05 AM Simon Horman <[email protected] 
<mailto:[email protected]>> wrote:
         >>
         >>> + Ihar
         >>>
         >>> On Fri, May 31, 2024 at 03:40:08PM -0400, Brian Haley wrote:
         >>>> An earlier patch [1] increased the size of the listen
         >>>> backlog to 64. While that was a huge improvement over
         >>>> 10, further testing in large deployments showed 128
         >>>> was even better.
         >>>


     What I lack in this commit message is the definition of "better". I see 
stats of drops using ss and netstat, but it's not clear what the user's visible effect of 
this is. Do you have a bug report to link to, with some symptoms described?
         >>> nit: I would slightly prefer if a commit was referenced like this:
         >>>
         >>>    commit 2b7efee031c3 ("socket: Increase listen backlog to 64 
everywhere.")
         >>>
         >>>> Looking at 'ss -lmt' output over more than one week for
         >>>> port 6641, captured across three different controllers,
         >>>> the average was:
         >>>>
         >>>>      listen(s, 10) : 1213 drops/day
         >>>>      listen(s, 64) : 791 drops/day
         >>>>      listen(s, 128): 657 drops/day
         >>>>
         >>>> Looking at 'netstat -s | egrep -i 'listen|drop|SYN_RECV''
         >>>> output over one week for port 6641, again captured across
         >>>> three different controllers, the average was:
         >>>>
         >>>>      listen(s, 10) : 741 drops/day
         >>>>      listen(s, 64) : 200 drops/day
         >>>>      listen(s, 128): 22 drops/day


     So why not 256? 512? 1024? It's always an issue when a single value is 
picked for all environments, isn't it.

     The suggestion to have it configurable seems to me to be the way to go.
         >>>>
         >>>> While having this value configurable would be the
         >>>> best solution, changing to 128 is a quick fix that
         >>>> should be good for all deployments. A link to the
         >>>> original discussion is at [2].
         >>>>
         >>>> [1]
         >>> 
https://github.com/openvswitch/ovs/commit/2b7efee031c3a2205ad2ee999275893edd083c1c 
<https://github.com/openvswitch/ovs/commit/2b7efee031c3a2205ad2ee999275893edd083c1c>
         >>>> [2]
         >>> 
https://github.com/openvswitch/ovs/commit/2b7efee031c3a2205ad2ee999275893edd083c1c 
<https://github.com/openvswitch/ovs/commit/2b7efee031c3a2205ad2ee999275893edd083c1c>
         >>>
         >>> nit: These two references are the same?
         >>>
         >>>> Signed-off-by: Brian Haley <[email protected] 
<mailto:[email protected]>>
         >>>
         >>> I'd value input on this from Ihar (CCed) who worked on the cited 
commit.
         >>>
         >>>> ---
         >>>>   lib/socket-util.c    | 2 +-
         >>>>   python/ovs/stream.py | 2 +-
         >>>>   2 files changed, 2 insertions(+), 2 deletions(-)
         >>>>
         >>>> diff --git a/lib/socket-util.c b/lib/socket-util.c
         >>>> index c569b7d16..552310266 100644
         >>>> --- a/lib/socket-util.c
         >>>> +++ b/lib/socket-util.c
         >>>> @@ -769,7 +769,7 @@ inet_open_passive(int style, const char 
*target, int
         >>> default_port,
         >>>>       }
         >>>>
         >>>>       /* Listen. */
         >>>> -    if (style == SOCK_STREAM && listen(fd, 64) < 0) {
         >>>> +    if (style == SOCK_STREAM && listen(fd, 128) < 0) {
         >>>>           error = sock_errno();
         >>>>           VLOG_ERR("%s: listen: %s", target, 
sock_strerror(error));
         >>>>           goto error;
         >>>> diff --git a/python/ovs/stream.py b/python/ovs/stream.py
         >>>> index dbb6b2e1f..874fe0bd5 100644
         >>>> --- a/python/ovs/stream.py
         >>>> +++ b/python/ovs/stream.py
         >>>> @@ -620,7 +620,7 @@ class PassiveStream(object):
         >>>>               raise Exception('Unknown connection string')
         >>>>
         >>>>           try:
         >>>> -            sock.listen(64)
         >>>> +            sock.listen(128)
         >>>>           except socket.error as e:
         >>>>               vlog.err("%s: listen: %s" % (name, 
os.strerror(e.error)))
         >>>>               sock.close()
         >>>> --
         >>>> 2.34.1
         >>>>
         >>>> _______________________________________________
         >>>> dev mailing list
         >>>> [email protected] <mailto:[email protected]>
         >>>> https://mail.openvswitch.org/mailman/listinfo/ovs-dev 
<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>
         >>>>
         >>> _______________________________________________
         >>> dev mailing list
         >>> [email protected] <mailto:[email protected]>
         >>> https://mail.openvswitch.org/mailman/listinfo/ovs-dev 
<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>
         >>>
         >> _______________________________________________
         >> dev mailing list
         >> [email protected] <mailto:[email protected]>
         >> https://mail.openvswitch.org/mailman/listinfo/ovs-dev 
<https://mail.openvswitch.org/mailman/listinfo/ovs-dev>
         >


_______________________________________________
dev mailing list
[email protected]
https://mail.openvswitch.org/mailman/listinfo/ovs-dev

Reply via email to