lhotari commented on code in PR #23398:
URL: https://github.com/apache/pulsar/pull/23398#discussion_r1848761990


##########
pip/pip-385.md:
##########
@@ -0,0 +1,398 @@
+# PIP-385: Add rate limit semantics to pulsar protocol and Java client
+
+<details>
+  <summary><h2>Table of Contents</h2></summary>
+
+- [Background knowledge](#background-knowledge)
+  * [Challenges with the current 
approach](#challenges-with-the-current-approach)
+- [Motivation](#motivation)
+- [Goals](#goals)
+  * [In Scope](#in-scope)
+  * [Out of Scope](#out-of-scope)
+- [High Level Design](#high-level-design)
+  * [New binary protocol commands](#new-binary-protocol-commands)
+  * [Java client changes](#java-client-changes)
+- [Detailed Design](#detailed-design)
+  * [High-level Implementation Details](#high-level-implementation-details)
+    + [Broker Changes](#broker-changes)
+    + [Determining the throttling duration for 
clients](#determining-the-throttling-duration-for-clients)
+    + [Java Client Changes](#java-client-changes-1)
+    + [Blocking messages to be sent during 
throttling](#blocking-messages-to-be-sent-during-throttling)
+    + [Client side rate limit exception](#client-side-rate-limit-exception)
+  * [Public-facing Changes](#public-facing-changes)
+    + [Binary Protocol](#binary-protocol)
+    + [Java Client](#java-client)
+    + [Configuration](#configuration)
+    + [Metrics](#metrics)
+- [Backward & Forward Compatibility](#backward-forward-compatibility)
+  * [Upgrade / Downgrade / Rollback](#upgrade-downgrade-rollback)
+  * [Lower Protocol Client](#lower-protocol-client)
+  * [Lower Protocol Server](#lower-protocol-server)
+- [Alternatives](#alternatives)
+- [Links](#links)
+
+</details>
+
+# Background knowledge
+
+Being a multi tenant system, pulsar supports quality of service constructs 
like topic quotas in bytes per second and
+qps. On top of this, the fact that one broker has only certain limited 
resources, it has to additionally implement some
+other controls to limit the resources usage, like how much message buffer it 
has, etc.
+
+As such, pulsar induces throttling at multiple levels. Just looking at publish 
level throttling, here are the various
+levers that we can configure in pulsar which enables us to rate limit a 
producer, topic or an entire connection from a
+client:
+
+* At the core of it, we can set topic level publish rate in bytes and/or 
messages per second.
+* We can create a resource group (combination of one or more namespaces or 
tenants) and set a publish-rate for that
+  resource group.
+* We can set a broker config to throttle based on pending messages at a 
connection level.
+  See 
[maxPendingPublishRequestsPerConnection](https://github.com/apache/pulsar/blob/4b3b273c1c57741f9f9da2118eb4ec5dfeee2220/pulsar-broker-common/src/main/java/org/apache/pulsar/broker/ServiceConfiguration.java#L750)
+* We can set a broker config to throttle based on message buffer size at a 
thread level.
+  See 
[maxMessagePublishBufferSizeInMB](https://github.com/apache/pulsar/blob/4b3b273c1c57741f9f9da2118eb4ec5dfeee2220/pulsar-broker-common/src/main/java/org/apache/pulsar/broker/ServiceConfiguration.java#L1431C17-L1431C49)
+* We can set a broker level maximum publish rate per broker in bytes and/or 
messages.
+
+Currently, the way pulsar uses these levers and enforces these limits is by 
pausing reading further messages from an
+established connection for a topic. This is transparent to the clients, and 
they continue to publish further messages
+with an increased observed latency. Once the publish-rates are within the 
limits, broker resumes reading from the
+connection.
+
+Here is a small illustration to demonstrate the situation:
+
+```mermaid
+%%{init: {"mirrorActors": false, "rightAngles": false} }%%
+sequenceDiagram
+    Client->>Server: CreateProducer(reqId, myTopic)
+    Note right of Server: Check Authorization
+    Server-->>Client: ProducerSuccess(reqId, producerName)
+    Activate Client
+    Activate Server
+    Client->>Server: Send(1, message1)
+    Client->>Server: Send(2, message2)
+    Server-->>Client: SendReceipt(1, msgId1)
+    Client->>Server: Send(3, message3)
+    Client->>Server: Send(4, message4)
+    Note right of Server: Topic breaching quota
+    Activate Server
+    note right of Server: TCP channel read paused
+    Client-xServer: Send(5, message5)
+    Server-->>Client: SendReceipt(2,msgId2)
+    Server-->>Client: SendReceipt(3,msgId3)
+    Client-xServer: Send(6, message6)
+    Server-->>Client: SendReceipt(4,msgId4)
+    note right of Server: TCP channel read resumed
+    deactivate Server
+    Server-->>Server: read message 5
+    Server-->>Server: read message 6
+    Client->>Server: Send(7, message7)
+    Server-->>Client: SendReceipt(5,msgId5)
+    Server-->>Client: SendReceipt(6,msgId6)
+    Server-->>Client: SendReceipt(7,msgId7)
+
+    Client->>Server: CloseProducer(producerId, reqId)
+    Server-->>-Client: Success(reqId)
+    deactivate Client
+```
+
+## Challenges with the current approach
+
+The current approach may look perfectly fine when looking at the above 
example, but when looked from a wider scope,
+things start looking bad.
+Typically, the clients reuse a single TCP connection from the client to a 
broker to send messages to multiple topics.
+This is controlled by the client side property
+of 
[connectionsPerBroker](https://github.com/apache/pulsar/blob/4b3b273c1c57741f9f9da2118eb4ec5dfeee2220/pulsar-client/src/main/java/org/apache/pulsar/client/impl/conf/ClientConfigurationData.java#L135)
+which defaults to 1. The situation is worsened by the fact that typically, a 
client is used to create producers for
+partitioned topics and generally an application may produce to more than one 
partitioned topic with the producers
+created from the same client object, thus all sharing the same tcp connection.
+
+In this situation, even when a single topic starts breaching the quota, the 
entire TCP connection is paused leading to
+a noisy neighbour effect where effectively all the topics that the client is 
producing to start getting throttled and
+observe high latencies.
+
+# Motivation
+
+The current method of inducing throttling when a topic or connection breaches 
quota has various challenges:
+
+* **Noisy neighbors** - Even if one topic is exceeding the quota, since the 
entire channel read is paused, all topics
+  sharing the same connect (for example - using the same java client object) 
get rate limited.
+* **Unaware clients** - clients are completely unaware that they are being 
rate limited. This leads to all send calls
+  taking super long time or simply timing out (assuming shorter send 
timeouts). If clients were aware, they can either
+  fail fast or induce back-pressure to their upstream.
+* **Impossible debugging** - Since all topics emit the rate limit metric, it 
is practically impossible to figure out
+  which
+  actual topic is breaching the quota in order to update the topic policies.
+* **Missing protocol** - Since rate limiting is a first class citizen of 
messaging sub-system, it really should be
+  present as a response in the protocol as well.
+
+# Goals
+
+## In Scope
+
+* Introduce a new binary protocol command pair to notify clients about 
throttling and get an acknowledgement back from
+  the clients that they respect the throttling and will stop producing further 
until mentioned.
+    * If acknowledgement is received within a configured time, we do not pause 
the connection for further reads.
+* [Java client] Add client public API interface to indicate if a producer is 
being throttled.
+* [Java client] Add relevant new PulsarClientException and logic to throw 
throttling related exception instead of
+  timeout if needed.
+* [Java client] Add OTel metrics about rate limiting.
+
+## Out of Scope
+
+* Changing the core rate limiting logic.
+* Implementation for other language clients
+* Changes in other protocols
+
+# High Level Design
+
+## New binary protocol commands
+
+We introduce a new comment which server will send to clients - 
`ThrottleProducer(reqId, throttleData)` and server will
+expect an acknowledgement command back within a configured time window 
`ThrottleProducerReceipt(reqId)`.
+
+The broker already records different levels of throttling in one way or 
another via metrics or counters, both at a topic
+level and at a connection level as well. The main design idea is that wherever 
today we take action to pause the
+channel, we first instead send the `ThrottleProducer` command and if we 
receive the `ThrottleProducerReceipt` response,
+instead of pausing the channel, we rely on clients not sending further 
messages for the breaching topic. If the response
+doesn't come within the configured window, we continue to pause the channel as 
usual.
+
+For the **case where connection level breaches** happen - i.e. breach due to 
maxPendingPublishRequestsPerConnection,
+maxMessagePublishBufferSizeInMB or broker level rate limit - **we continue to 
pause the connection**, but we still send
+the `ThrottleProducer` command in order to inform the client about the reason 
for any potential timeout. The reason we
+continue to pause reads is that we are already breaching memory limits, thus, 
even if the client sends
+a `ThrottleProducerReceipt` response, we won't be able to read it until 
further pending messages before that are read.
+
+Here is a sequence diagram highlighting the case when a topic level breach 
happens:
+
+```mermaid
+%%{init: {"mirrorActors": false, "rightAngles": false} }%%
+sequenceDiagram
+    Client->>Server: CreateProducer(reqId, myTopic)
+    Note right of Server: Check Authorization
+    Server-->>Client: ProducerSuccess(reqId, producerName)
+    Activate Client
+    Activate Server
+    Client->>Server: Send(1, message1)
+    Client->>Server: Send(2, message2)
+    Server-->>Client: SendReceipt(1, msgId1)
+    Note right of Server: Check Throttling
+
+    opt topic/connection throttled
+        Server->>Client: ThrottleProducer(reqId, throttleData)
+        alt client sends receipt in time
+            Client-->>Server: ThrottleProducerReceipt(reqId)
+            note right of Client: client pauses till specified time
+            Note over Client, Server: After some time
+            Client->>Server: Send(3, message3)
+            Client->>Server: Send(4, message4)
+
+        else no response
+            Activate Server
+            note right of Server: TCP read paused
+            Client-xServer: Send(3, message3)
+            Note over Client, Server: After some time
+            opt topic/connection unthrottled
+                note right of Server: TCP read resumed
+                deactivate Server
+                Server-->>Server: read message 3
+                Client->>Server: Send(4, message4)
+            end
+        end
+    end
+    Server-->>Client: SendReceipt(2,msgId2)
+    Server-->>Client: SendReceipt(3,msgId3)
+    Server-->>Client: SendReceipt(4,msgId4)
+
+    Client->>Server: CloseProducer(producerId, reqId)
+    Server-->>-Client: Success(reqId)
+    deactivate Client
+```
+
+## Java client changes
+
+* Client will now have logic to understand the `ThrottleProducer` command and 
take relevant action of blocking further
+  messages for the relevant topic. It will then respond back with 
`ThrottleProducerReceipt` command.
+    * Client will resume message sending after the specified time in the 
`ThrottleProducer` command's data.
+    * This interval of no messages will be noted as "being throttled"
+    * Within this duration, another `ThrottleProducer` command from server may 
come.
+* Producer will record new OTel metric indicating which topic was throttled 
and the reason.
+* In case a message fails due to timeout and there was a throttled command 
from server for the owning topic, client will
+  instead throw a rate limit exception instead of timeout exception.
+
+# Detailed Design
+
+## High-level Implementation Details
+
+### Broker Changes
+
+* For calls arising from `PublishRateLimiterImpl` class, add logic in 
`ServerCnxThrottleTracker.java` to send the
+  command to client and wait for response for the max configured duration 
before calling `changeAutoRead`. It checks for
+  feature availability first.
+* For calls arising from `ServerCnxThrottleTracker::changeThrottlingFlag`, we 
send the command async (if feature
+  supported) without worrying about response and then call `changeAutoRead`.
+* capture `AbstractTopic::getTotalPublishRateLimitCounter` per publish rate 
limit counter and add relevant attribute in
+  the rate limit metric
+
+### Determining the throttling duration for clients
+
+Broadly, there are 2 different categories for rate limiting - (a) quota 
exceeding at a topic/resource group level OR (b)
+connection level breaches leading to broker's resource crunch.
+
+In case (a), as per the current token bucket based quota tracking introduced 
in PIP-322, we (lazily) resume channel
+reads on the next second mark. i.e. the throttling is only applied at max for 
1 second.

Review Comment:
   > This wasn't the case before PIP-322.. Specifically, it was mentioned that 
overall user facing behavior isn't changing.
   
   > If I look at it from a user perspective, to me, this has now regressed 
from the way it was pre PIP-322. Let's take a look:
   
   From the user's perspective, PIP-322 is a significant improvement. There 
aren't any regressions or breaking changes in behavior. If you test the PIP-322 
solution, you will notice that it behaves in very reasonable ways and provide 
good results. 
   
   > Async token based throttling - bad producers can burst as much as they 
want between an unconfigurable time window. They cannot do this every second, 
but depends on how much they burst.
   
   This isn't the case.
   Pulsar has never dropped or rejected traffic when a producer goes over the 
limit. Before PIP-322, the behavior was that a bad producer can burst as much 
as they want. That has been fixed in PIP-322. 
   If there's a burst and the tokens go negative, the TCP throttling will stop 
reading more messages from the network layer (Netty) and it will throttle until 
there are available tokens available. Due to the use of Netty's 
[io.netty.handler.flow.FlowControlHandler in the channel 
pipeline](https://github.com/apache/pulsar/blob/895e96853e56b7d9c10c6bd0f3bd6105b664eb14/pulsar-broker/src/main/java/org/apache/pulsar/broker/service/PulsarChannelInitializer.java#L101),
 Pulsar can accept messages one-by-one when it's throttling. This is how the 
tokens wouldn't go infinitely negative even when there's a large spike. 
FlowControlHandler has been in use before too so things haven't change there.
   In Pulsar, we don't have a way to configure the token bucket size separately 
from the rate at the moment. The token bucket will fill up in 1 second and 
that's why spikes are limited to that 1 second worth of tokens.
   
   > I think its very straight forward - a rate limiter where "infinite" or 
even significant throughput above the limit is not allowed and is blocked.
   
   As mentioned above, there's no infinite rate limiter in PIP-322 
implementation. The problem you are describing doesn't exist in PIP-322. 
   
   > Sure, in theory, it sounds good. But this is a MAJOR concern in practice. 
There can be bad actors leading to sudden spike in traffic. Sure, they will be 
blocked for relevant time, but when they come back again, they will spike as 
much as they want once again.
   > 
   > imagine this case - a topic with 1000 qps rate limit. So essentially 1000 
tokens gets added every second spread over the 16ms time frame you've mentioned.
   > A bad actor can lead to a burst of 10,000 - then it gets throttled for 10 
seconds, then it can again do 10,000.
   
   This problem doesn't exist in the PIP-322 implementation. Messages (== batch 
messages, a.k.a "entries") are handled one-by-one with FlowControlHandler. The 
maximum amount it can go over the limit is by one entry.
   If the configured rate is very low, 1 batch message can cause the tokens to 
go negative. That's a correct way to handle rate limiting in Pulsar.
   
   > At a macro level, it may seem that throttling is working very well and 
things are getting smoothed out, but that's not how hardware works. That single 
10,000 burst would have added heavy toll to the underlying disk or network 
leading to noisy neighbor impact on all other topics present on that broker. 
How is this being contained?
   
   This is not a problem since the PIP-322 rate limiting is really a "strict" 
rate limiting implementation. I hope the above explanations clarify this.
   
   > the non existence of RTT in this proposal is practically a non-concern if 
the tokens can go to any humongous negative value. That's what I am referring 
to.
   
   tokens don't go to humongous negative values as explained above.
   



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]

Reply via email to