Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[CONTP-521] use a hybrid health check for wlm kubeapiserver collector #31876

Merged

Conversation

adel121
Copy link
Contributor

@adel121 adel121 commented Dec 9, 2024

What does this PR do?

Replaces Startup health check of workloadmeta's kubeapiserver collector by a hybrid check between readiness and startup:

  • if the check didn't pass yet, the DCA pod should be removed from the DCA service
  • if the check didn't pass for some time, the DCA should not be killed and restarted.

Motivation

Reduce CrashLoopbackOff issues faced in the DCA on large clusters due to the time it takes for the kubeapiserver workloadmeta collector to sync kubernetes resources and mark the check as ready.

Full context:

The main problem with using the Readiness probe is that it stays active for the entire lifecycle of the pod. This means that it will keep checking the Readiness probe even though the probe on `workloadmeta-kubeapiserver` was intended as a startup one. This could lead to the Cluster Agent being removed from the Kubernetes Service and therefor unreachable.

The Startup probe will pass once and after validation, be disabled by Kubernetes, fitting the use-case that we have for the `workloadmeta-kubeapiserver`.

The problem with this probe is that the impact is not the same. Instead of removing the pod for Kubernetes Services, the startup probe will, like the liveness one, try to restart the pod.

In specific cases like on large cluster, the `workloadmeta-kubeapiserver` can take more than the allocated time to be validated as the synchronization of the reflector is depends on the Kubernetes API Server. If that happens, then the Cluster Agent gets restarted.

Even worse, this could lead to CrashLoopBackOff as the Cluster Agent never has enough time to sync the reflectors before the probe fails.

Describe how you validated your changes

Unit tests are updated to test the new change.
We also already have E2E tests in place.

As an extra validation, you can deploy the cluster agent on a kubernetes cluster and ensure that you have the correct components healthy in liveness, readiness and startup endpoints:

# startup probe:
curl http://localhost:5556/start

{
  "Healthy":
    [
      "healthcheck",
      "tagger-store",
      "clusterchecks-leadership",
      "ad-config-provider-kubernetes-endpoints",
      "ad-config-provider-kubernetes-services",
      "clusterchecks-dispatch",
      "workloadmeta-puller",
      "ad-servicelistening",
      "workloadmeta-store",
      "tagger-workloadmeta",
      "collector-queue-15s",
      "aggregator",
    ],
  "Unhealthy": null,
}


# liveness probe:
curl http://localhost:5556/live

{
  "Healthy":
    [
      "healthcheck",
      "clusterchecks-leadership",
      "ad-config-provider-kubernetes-endpoints",
      "ad-config-provider-kubernetes-services",
      "clusterchecks-dispatch",
      "workloadmeta-puller",
      "tagger-store",
      "workloadmeta-store",
      "tagger-workloadmeta",
      "collector-queue-15s",
      "aggregator",
      "ad-servicelistening",
    ],
  "Unhealthy": null,
}

# readiness probe:
curl http://localhost:5556/ready

{
  "Healthy":
    [
      "healthcheck",
      "collector-queue-15s",
      "aggregator",
      "ad-servicelistening",
      "workloadmeta-store",
      "tagger-workloadmeta",
      "ad-config-provider-kubernetes-services",
      "clusterchecks-dispatch",
      "workloadmeta-puller",
      "tagger-store",
      "clusterchecks-leadership",
      "ad-config-provider-kubernetes-endpoints",
      "healthcheck",
      "workloadmeta-kubeapiserver",
    ],
  "Unhealthy": null,
}

Possible Drawbacks / Trade-offs

Additional Notes

@adel121 adel121 requested review from a team as code owners December 9, 2024 10:38
@adel121 adel121 requested a review from GustavoCaso December 9, 2024 10:38
@adel121 adel121 force-pushed the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch from 68efa9b to 392568f Compare December 9, 2024 10:39
@adel121 adel121 requested review from a team as code owners December 9, 2024 10:39
@adel121 adel121 requested review from AmitaiBl and IbraheemA December 9, 2024 10:39
@adel121 adel121 added the qa/rc-required Only for a PR that requires validation on the Release Candidate label Dec 9, 2024
@github-actions github-actions bot added long review PR is complex, plan time to review it component/system-probe team/container-platform The Container Platform Team and removed long review PR is complex, plan time to review it labels Dec 9, 2024
@adel121 adel121 added this to the 7.62.0 milestone Dec 9, 2024
@github-actions github-actions bot added the long review PR is complex, plan time to review it label Dec 9, 2024
@adel121 adel121 added component/cluster-agent and removed long review PR is complex, plan time to review it labels Dec 9, 2024
pkg/status/health/global.go Outdated Show resolved Hide resolved
@github-actions github-actions bot added the long review PR is complex, plan time to review it label Dec 9, 2024
@adel121 adel121 force-pushed the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch from 392568f to 7e0559c Compare December 9, 2024 11:21
@adel121 adel121 requested a review from wdhif December 9, 2024 11:25
@adel121 adel121 force-pushed the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch 2 times, most recently from bc7b777 to b7c3419 Compare December 9, 2024 12:04
@agent-platform-auto-pr
Copy link
Contributor

agent-platform-auto-pr bot commented Dec 9, 2024

Test changes on VM

Use this command from test-infra-definitions to manually test this PR changes on a VM:

inv aws.create-vm --pipeline-id=50585312 --os-family=ubuntu

Note: This applies to commit 5a562f8

Copy link

cit-pr-commenter bot commented Dec 9, 2024

Regression Detector

Regression Detector Results

Metrics dashboard
Target profiles
Run ID: f141bd4c-6af5-46bb-b4c3-6a987a15a00d

Baseline: 2491564
Comparison: 5a562f8
Diff

Optimization Goals: ✅ No significant changes detected

Fine details of change detection per experiment

perf experiment goal Δ mean % Δ mean % CI trials links
file_to_blackhole_1000ms_latency egress throughput +0.35 [-0.43, +1.14] 1 Logs
uds_dogstatsd_to_api_cpu % cpu utilization +0.31 [-0.43, +1.04] 1 Logs
quality_gate_idle_all_features memory utilization +0.16 [+0.05, +0.27] 1 Logs bounds checks dashboard
file_to_blackhole_1000ms_latency_linear_load egress throughput +0.14 [-0.33, +0.60] 1 Logs
quality_gate_idle memory utilization +0.03 [-0.01, +0.08] 1 Logs bounds checks dashboard
file_to_blackhole_100ms_latency egress throughput +0.03 [-0.68, +0.74] 1 Logs
tcp_dd_logs_filter_exclude ingress throughput -0.00 [-0.01, +0.01] 1 Logs
uds_dogstatsd_to_api ingress throughput -0.01 [-0.11, +0.10] 1 Logs
file_to_blackhole_0ms_latency egress throughput -0.04 [-0.92, +0.84] 1 Logs
file_to_blackhole_300ms_latency egress throughput -0.07 [-0.70, +0.57] 1 Logs
file_to_blackhole_500ms_latency egress throughput -0.13 [-0.91, +0.65] 1 Logs
otel_to_otel_logs ingress throughput -0.25 [-0.90, +0.41] 1 Logs
tcp_syslog_to_blackhole ingress throughput -0.78 [-0.86, -0.71] 1 Logs
file_tree memory utilization -1.05 [-1.18, -0.92] 1 Logs
quality_gate_logs % cpu utilization -2.29 [-5.20, +0.63] 1 Logs

Bounds Checks: ✅ Passed

perf experiment bounds_check_name replicates_passed links
file_to_blackhole_0ms_latency lost_bytes 10/10
file_to_blackhole_0ms_latency memory_usage 10/10
file_to_blackhole_1000ms_latency memory_usage 10/10
file_to_blackhole_1000ms_latency_linear_load memory_usage 10/10
file_to_blackhole_100ms_latency lost_bytes 10/10
file_to_blackhole_100ms_latency memory_usage 10/10
file_to_blackhole_300ms_latency lost_bytes 10/10
file_to_blackhole_300ms_latency memory_usage 10/10
file_to_blackhole_500ms_latency lost_bytes 10/10
file_to_blackhole_500ms_latency memory_usage 10/10
quality_gate_idle memory_usage 10/10 bounds checks dashboard
quality_gate_idle_all_features memory_usage 10/10 bounds checks dashboard
quality_gate_logs lost_bytes 10/10
quality_gate_logs memory_usage 10/10

Explanation

Confidence level: 90.00%
Effect size tolerance: |Δ mean %| ≥ 5.00%

Performance changes are noted in the perf column of each table:

  • ✅ = significantly better comparison variant performance
  • ❌ = significantly worse comparison variant performance
  • ➖ = no significant change in performance

A regression test is an A/B test of target performance in a repeatable rig, where "performance" is measured as "comparison variant minus baseline variant" for an optimization goal (e.g., ingress throughput). Due to intrinsic variability in measuring that goal, we can only estimate its mean value for each experiment; we report uncertainty in that value as a 90.00% confidence interval denoted "Δ mean % CI".

For each experiment, we decide whether a change in performance is a "regression" -- a change worth investigating further -- if all of the following criteria are true:

  1. Its estimated |Δ mean %| ≥ 5.00%, indicating the change is big enough to merit a closer look.

  2. Its 90.00% confidence interval "Δ mean % CI" does not contain zero, indicating that if our statistical model is accurate, there is at least a 90.00% chance there is a difference in performance between baseline and comparison variants.

  3. Its configuration does not mark it "erratic".

CI Pass/Fail Decision

Passed. All Quality Gates passed.

  • quality_gate_idle, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_idle_all_features, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check lost_bytes: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check memory_usage: 10/10 replicas passed. Gate passed.

@@ -438,7 +438,7 @@ func (s *server) start(context.Context) error {
}
}

s.health = health.RegisterLiveness("dogstatsd-main")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Rather than having to update a lot of code, consider using functional options to pass additional flags. In addition to fewer places to update, RegisterLiveness(..., health.RunOnce) is more explicit than RegisterLiveness(..., true) and will easier to extend later.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks for the suggestion

I wanted to do this at first but I thought it would make the code a bit harder to understand (I mean when reading the health package, while it will definitely be more understandable for external components).

I updated the code with your suggestion, I agree it is cleaner this way

@adel121 adel121 force-pushed the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch from b7c3419 to ba69141 Compare December 9, 2024 15:00
@adel121 adel121 requested a review from a team as a code owner December 9, 2024 15:00
@github-actions github-actions bot added medium review PR review might take time and removed component/system-probe long review PR is complex, plan time to review it labels Dec 9, 2024
@adel121 adel121 force-pushed the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch from ba69141 to 6dac18c Compare December 9, 2024 15:05
@adel121 adel121 force-pushed the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch from 6dac18c to 5a562f8 Compare December 9, 2024 15:35
@adel121 adel121 removed request for a team, IbraheemA and AmitaiBl December 9, 2024 15:35
@adel121
Copy link
Contributor Author

adel121 commented Dec 9, 2024

/merge

@dd-devflow
Copy link

dd-devflow bot commented Dec 9, 2024

Devflow running: /merge

View all feedbacks in Devflow UI.


2024-12-09 18:27:37 UTC ℹ️ MergeQueue: pull request added to the queue

The median merge time in main is 24m.

@dd-mergequeue dd-mergequeue bot merged commit 426d979 into main Dec 9, 2024
229 checks passed
@dd-mergequeue dd-mergequeue bot deleted the adelhajhassan/use_hybrid_healthprobe_for_kubeapiserver branch December 9, 2024 18:49
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
changelog/no-changelog component/cluster-agent kind/enhancement medium review PR review might take time qa/rc-required Only for a PR that requires validation on the Release Candidate team/container-platform The Container Platform Team
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants