A quick update: turns out enabling *keepAliveWithoutCalls* for component B
does not resolve the issue.
I would like to understand what kind of guarantees gRPC actually provides
here. Is RPC call delivery on a channel on best effort basis?
If that is the case, sounds like the only way to resolve this is to add
application-level health checking?
Cheers
Jiri
Dne středa 27. listopadu 2024 v 13:44:05 UTC+1 uživatel Jiří Krutil napsal:
> I cannot confirm the exact number of open streaming calls on C during the
> last occurrence, but my assumption is just a few.
>
> I have tried processing one of the unary calls now with debug logging
> enabled on C and this shows:
>
> 2024-11-27 13:17:37.088 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND SETTINGS: ack=false
> settings={MAX_CONCURRENT_STREAMS=2147483647 <(214)%20748-3647>,
> INITIAL_WINDOW_SIZE=1048576, MAX_HEADER_LIST_SIZE=8192}
> 2024-11-27 13:17:37.089 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND WINDOW_UPDATE:
> streamId=0 windowSizeIncrement=983041
> 2024-11-27 13:17:37.090 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND SETTINGS: ack=false
> settings={ENABLE_PUSH=0, MAX_CONCURRENT_STREAMS=0,
> INITIAL_WINDOW_SIZE=1048576, MAX_HEADER_LIST_SIZE=8192}
> 2024-11-27 13:17:37.090 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND SETTINGS: ack=true
> 2024-11-27 13:17:37.090 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND WINDOW_UPDATE:
> streamId=0 windowSizeIncrement=983041
> 2024-11-27 13:17:37.091 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND SETTINGS: ack=true
> 2024-11-27 13:17:37.092 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND HEADERS: streamId=3
> headers=GrpcHttp2RequestHeaders[:path:
> /ra.hub.grpc.api.v1.SessionService/stopSession, :authority: 10.40.80.78,
> :method: POST, :scheme: http, te: trailers, content-type: application/grpc,
> user-agent: grpc-java-netty/1.66.0, grpc-accept-encoding: gzip,
> grpc-timeout: 59969004u] streamDependency=0 weight=16 exclusive=false
> padding=0 endStream=false
> 2024-11-27 13:17:37.110 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND DATA: streamId=3
> padding=0 endStream=true length=63
> bytes=000000003a0a2435373239663665342d396633662d343738382d383132372d32343633636338663339666412120a0a6875622d6575732d3161120455532d31
> 2024-11-27 13:17:37.110 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND PING: ack=false
> bytes=1234
> 2024-11-27 13:17:37.111 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND PING: ack=true
> bytes=1234
> 2024-11-27 13:17:37.112 [INFO] (grpc-default-executor-3)
> org.dett.router.grpc.RouterSessionGrpcService: - Processing stopSession
> request {uuid: "5729f6e4-9f3f-4788-8127-2463cc8f39fd" hubId { name:
> "hub-eus-1a" cluster: "US-1" }}
> 2024-11-27 13:17:37.115 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND HEADERS: streamId=3
> headers=GrpcHttp2OutboundHeaders[:status: 200, content-type:
> application/grpc, grpc-encoding: identity, grpc-accept-encoding: gzip]
> padding=0 endStream=false
> 2024-11-27 13:17:37.115 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND DATA: streamId=3
> padding=0 endStream=false length=5 bytes=0000000000
> 2024-11-27 13:17:37.116 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND HEADERS: streamId=3
> headers=GrpcHttp2OutboundHeaders[grpc-status: 0] padding=0 endStream=true
> 2024-11-27 13:17:37.118 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND PING: ack=false
> bytes=1234
> 2024-11-27 13:17:37.118 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND PING: ack=true
> bytes=1234
> 2024-11-27 13:17:57.118 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] INBOUND PING: ack=false
> bytes=1111
> 2024-11-27 13:17:57.118 [DEBUG] (grpc-default-worker-ELG-3-2)
> io.grpc.netty.shaded.io.grpc.netty.NettyServerHandler: - [id: 0xab7eb2ae,
> L:/10.40.80.78:10010 - R:/10.40.80.77:49754] OUTBOUND PING: ack=true
> bytes=1111
>
> I think this indicates *max_concurrent_streams* for C as a server is
> unlimited.
>
> Maybe I have oversimplified in the original post. We actually have 2
> instances of A, 2 instances of B and N instances of C.
> One observation was that at one time, we had stale channel B1>C2 and stale
> channel B2>C4, while all other channels were working.
> In other words, the problem does not affect all channels from given B
> instance or all channels to given C instance. It seems to be channel
> specific.
>
> Just to check one related idea I had -- is it possible that enabling
> *keepAliveWithoutCalls* on B could make this issue go away? The reasoning
> is that if gRPC client on B sees incoming traffic from C, it may never
> probe the channel to C, thus won't detect the issue without this option.
> Dne úterý 26. listopadu 2024 v 20:53:01 UTC+1 uživatel Yuri Golobokov
> napsal:
>
>> How many server streaming calls are open to C at the time of the issue?
>> Does C limits the number of maximum concurrent streams? (you can see it
>> in the debug logs for the SETTINGS frame coming from C)
>> On Tuesday, November 26, 2024 at 7:22:16 AM UTC-8 Jiří Krutil wrote:
>>
>>> When running our Java application in MS Azure, we sometimes observe very
>>> strange behavior, which appears as if a long-lived gRPC channel was working
>>> only in one direction and was not delivering any RPC calls in the opposite
>>> direction.
>>>
>>> Out setup is that we have three apps connected via gRPC:
>>>
>>> A -> B -> C
>>>
>>> B usually has a long-lived server streaming gRPC requests to C open,
>>> consuming updates from C. When the issue occurs, updates from C are still
>>> streaming to B, but no new unary requests made by B make it to C.
>>>
>>> The unary requests made by B are originated by A. B receives the request
>>> from A and sends an unary request to C with a deadline copied from the
>>> original request. After 20 seconds, B sees an "RPC cancelled" event, which
>>> I believe comes from A in response to some kind of timeout.
>>>
>>> The problem occurs randomly and when it occurs, the channel never
>>> recovers.
>>>
>>> Debug logging seems to show that when B receives the request from A, it
>>> creates a new stub using an existing (cached) channel and attempts to send
>>> a request to C, but that request is actually never sent.
>>>
>>> If I make B forget the cached channel and create a new one, the unary
>>> request to C works fine.
>>>
>>> We have keepAlive enabled on these channels, so I am surprised that
>>> potential issues with the underlying connection are not detected by the
>>> keepAlive mechanism. Is it possible that since traffic is steadily flowing
>>> in the direction from C to B, that B never pings C to see if communication
>>> in the opposite direction works as well?
>>>
>>> I suppose we could work around this by adding application-level health
>>> checking for every channel, but I thought this is already taken care of by
>>> gRPC.
>>>
>>> Any suggestions would be appreciated.
>>>
>>
--
You received this message because you are subscribed to the Google Groups
"grpc.io" group.
To unsubscribe from this group and stop receiving emails from it, send an email
to [email protected].
To view this discussion visit
https://groups.google.com/d/msgid/grpc-io/9a7cf13f-6545-429f-b68b-f880fb967ccbn%40googlegroups.com.