-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increase the QPS limits on clients slightly and use protobuf for sync #90
Increase the QPS limits on clients slightly and use protobuf for sync #90
Conversation
Missed in a previous PR, this makes the name match `openshift-cluster-version` rather than `version`.
We are getting a fair amount of throttling during deployment and updates. Increase QPS and Burst to be 4x the default. Refactor the start client slightly to allow modifying the client in case we need to do this in the future.
For the kube apis, protobuf is more efficient on both client and server side which reduces the base load of the cluster. We can't set protobuf for custom resource clients or unstructured at the current time.
/retest |
pkg/start/start.go
Outdated
@@ -231,21 +231,24 @@ type ClientBuilder struct { | |||
config *rest.Config | |||
} | |||
|
|||
func (cb *ClientBuilder) RestConfig() *rest.Config { | |||
func (cb *ClientBuilder) RestConfig(fns ...func(*rest.Config)) *rest.Config { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
$ godoc ./pkg/start
PACKAGE DOCUMENTATION
package start
import "./pkg/start"
TYPES
type ClientBuilder struct {
// contains filtered or unexported fields
}
func (cb *ClientBuilder) ClientOrDie(name string, fns ...func(*rest.Config)) clientset.Interface
func (cb *ClientBuilder) KubeClientOrDie(name string, fns ...func(*rest.Config)) kubernetes.Interface
func (cb *ClientBuilder) RestConfig(fns ...func(*rest.Config)) *rest.Config
fns ...
isn't the best godoc
, maybe either add comments / name the variable that it is evident that these are config modifiers...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
oh, sorry
@@ -291,7 +299,7 @@ func (o *Options) NewControllerContext(cb *ClientBuilder) *Context { | |||
resyncPeriod(o.ResyncInterval)(), | |||
cvInformer.Config().V1().ClusterVersions(), | |||
sharedInformers.Config().V1().ClusterOperators(), | |||
cb.RestConfig(), | |||
cb.RestConfig(increaseQPS), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this will only affect the generic resource builders. what about the ClientOrDie, KubeClientOrDie
atleast KubeClientOrDie ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I left those at the defaults, those have low qps and low actions (rest config is what is used for sync loop). I'd like to do a shared qps pool eventually though for everything that isn't status updates to CV (which is effectively what this PR is).
@smarterclayton few nits, lgtm otherwise. |
updated with better godoc |
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: abhinavdahiya, smarterclayton The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Protecting us from [1,2]: converting (v1beta1.Role) to (v1.Role): unknown conversion Because merging and application are also version-dependent, it's hard to paper over this in resourceread with automatic type conversion. Although from [3]: Promotes the rbac.authorization.k8s.io/v1beta1 API to v1 with no changes so all we really need is the apiVersion bump. Anyhow, with this commit, I'm doubling down on the approach from 4ee7b07 (Add apiextensions.k8s.io/v1 support for CRDs, 2019-10-22, openshift#259) and collapsing the readers into two helpers that support all of our types and return runtime.Object. From 0a255ab (cvo: Use protobuf for sending events and other basic API commands, 2019-01-18, openshift#90), protobuf is more efficient, so we should use it where possible. And because all of this is very tedious to maintain by hand, there's now a Python generator to spit out all the boilerplate. [1]: kubernetes/kubernetes#90018 [2]: openshift#420 (comment) [3]: kubernetes/kubernetes#49642
Protecting us from [1,2]: converting (v1beta1.Role) to (v1.Role): unknown conversion Because merging and application are also version-dependent, it's hard to paper over this in resourceread with automatic type conversion. Although from [3]: Promotes the rbac.authorization.k8s.io/v1beta1 API to v1 with no changes so all we really need is the apiVersion bump. Anyhow, with this commit, I'm doubling down on the approach from 4ee7b07 (Add apiextensions.k8s.io/v1 support for CRDs, 2019-10-22, openshift#259) and collapsing the readers into two helpers that support all of our types and return runtime.Object. From 0a255ab (cvo: Use protobuf for sending events and other basic API commands, 2019-01-18, openshift#90), protobuf is more efficient, so we should use it where possible. And because all of this is very tedious to maintain by hand, there's now a Python generator to spit out all the boilerplate. [1]: kubernetes/kubernetes#90018 [2]: openshift#420 (comment) [3]: kubernetes/kubernetes#49642
For the kube apis, protobuf is more efficient on both client and server
side which reduces the base load of the cluster. We can't set protobuf for
custom resource clients or unstructured at the current time.
We are getting a fair amount of throttling during deployment and updates.
Increase QPS and Burst to be 4x the default. Refactor the start client
slightly to allow modifying the client in case we need to do this in the
future.