From 7ce79d58e2fdee3d280473a6cbad92168f14f60c Mon Sep 17 00:00:00 2001 From: Liunardy <54991798+Liunardy@users.noreply.github.com> Date: Thu, 21 May 2026 06:25:26 +0000 Subject: [PATCH] doc: add local service backend pool updater retry design --- ...ning-local-service-backend-pool-updater.md | 261 ++++++++++++++++++ 1 file changed, 261 insertions(+) create mode 100644 content/en/development/design-docs/refining-local-service-backend-pool-updater.md diff --git a/content/en/development/design-docs/refining-local-service-backend-pool-updater.md b/content/en/development/design-docs/refining-local-service-backend-pool-updater.md new file mode 100644 index 0000000000..8e1e83b4a3 --- /dev/null +++ b/content/en/development/design-docs/refining-local-service-backend-pool-updater.md @@ -0,0 +1,261 @@ +--- +title: "Refining Local Service Backend Pool Updater" +linkTitle: "Refining Local Service Backend Pool Updater" +type: docs +description: > + Retry and error handling design for the local service backend pool updater. +--- + +# Refining Local Service Backend Pool Updater + +## Purpose + +The local service backend pool updater batches EndpointSlice-driven IP changes for local Services and applies them asynchronously to Azure Load Balancer backend pools. Today, when an updater batch observes an error from `Get` or `CreateOrUpdate`, it drops the batch after emitting a failure event, except for backend pool `404`, which is dropped without emitting a failure event (though a failure metric is currently recorded). + +This design adds bounded retry for errors that are worth retrying at the updater layer. It does not duplicate Azure SDK retries for the status codes already handled by the SDK retry policy. The retry behavior is local to the updater, reuses the existing updater tick loop, and avoids unbounded requeue. + +## Scope + +In scope: + +- Retry failed local-service backend-pool update operations when the error is classified as retriable. +- Add retry state to queued backend-pool update operations. +- Add a new max-retries configuration field for this updater. +- Emit retry and failure events with bounded event volume. +- Preserve current stale `404` event behavior. Stop recording `404` as a failure metric. +- Add unit tests for retry, exhaustion, non-retry, and stale cases. + +Out of scope: + +- Redesigning multiple standard load balancer selection. +- Changing main Service reconciliation retries. +- Changing Azure SDK retry policy. +- Changing cleanup behavior for local service backend pools. + +## Configuration + +Add a new config field near `LoadBalancerBackendPoolUpdateIntervalInSeconds`: + +```go +// LoadBalancerBackendPoolUpdateMaxRetries is the maximum number of retries for +// retriable local-service backend-pool update failures. Defaults to 3. +LoadBalancerBackendPoolUpdateMaxRetries *int `json:"loadBalancerBackendPoolUpdateMaxRetries,omitempty" yaml:"loadBalancerBackendPoolUpdateMaxRetries,omitempty"` +``` + +Add a default constant near `DefaultLoadBalancerBackendPoolUpdateIntervalInSeconds`: + +```go +DefaultLoadBalancerBackendPoolUpdateMaxRetries = 3 +``` + +Semantics: + +- `nil` uses the default value `3`. +- Explicit `0` disables updater-level retry and preserves today's drop-after-failure behavior for retriable errors. +- Negative values are normalized to `0`. +- The count means extra retries after the first failed attempt. With the default `3`, a retriable error can be observed up to four times: one initial attempt plus three requeued retry attempts. + +Use a pointer so the config loader can distinguish "unset" from "explicitly set to 0". Normalization happens next to the existing `LoadBalancerBackendPoolUpdateIntervalInSeconds` defaulting in `pkg/provider/azure.go`: if the pointer is nil, use `DefaultLoadBalancerBackendPoolUpdateMaxRetries`; if the pointer is non-nil and negative, clamp it to `0`. + +The `omitempty` tag is intentional with the pointer field: a nil pointer is omitted and therefore defaults, while a non-nil pointer to `0` is preserved across marshal/unmarshal and keeps retry disabled. + +## Retry Model + +Use requeue-on-retriable-error. Each `loadBalancerBackendPoolUpdateOperation` carries retry metadata: + +- `retryCount int`, tracking how many retryable failures have already been consumed +- `nextEligibleAt time.Time`, tracking when a throttled operation is eligible to be processed again + +On each updater tick: + +1. Acquire `serviceReconcileLock` to serialize with the main service reconciliation loop. +2. If the queue is empty (`countOperations() == 0`), release the lock and return. +3. Acquire `azureResourceLocker` (distributed lease lock) to serialize with other components that update load balancer resources. If the lease lock fails, return without draining. Operations remain in the queue for the next tick. +4. Drain the queued operations via `drainOperations()` (acquires `updater.lock`, moves all operations out, clears the queue, releases `updater.lock`). +5. Filter and group operations via `groupOperations()` under `serviceReconcileLock`: + - the Service is still in `localServiceNameToServiceInfoMap` + - the Service still points to the same load balancer + - group relevant operations by `loadBalancerName/backendPoolName` +6. If any operation in a group has `nextEligibleAt` in the future, requeue the whole group. Do not call ARM, emit an event, record a metric, or increment retry state for skipped groups. +7. Process each eligible group once. +8. On retriable failure of a group, increment each constituent operation's `retryCount` uniformly. +9. Requeue operations whose retry budget remains (acquire `updater.lock` to append back to the live queue). +10. Drop exhausted operations and emit `LoadBalancerBackendPoolUpdateFailed` once per distinct Service in the group. + +Retries do not carry over the in-memory backend pool object. The next tick re-issues `Get` for the group before re-applying queued operations, which is required for `CreateOrUpdate` conflicts and stale etags. + +The updater must re-acquire the lock only when appending retry operations back to the live queue. New EndpointSlice events can continue adding fresh operations while a previous snapshot is doing Azure calls. + +### Merge Rule + +Fresh operations and requeued operations for the same `loadBalancerName/backendPoolName` merge on the next updater tick through the existing grouping logic. Each operation keeps its own `retryCount` and `nextEligibleAt`; fresh operations start at `retryCount=0` and no `nextEligibleAt`. + +The group's eligibility is determined by the most restrictive member: if any operation in the merged group has a future `nextEligibleAt`, the whole group is preserved without ARM calls. When an eligible merged group fails, the ARM error applies to the group, not to an individual operation. Per-operation error attribution is not possible at this layer, so every constituent operation consumes one retry. Exhausted operations are dropped and reported, while operations with remaining budget are requeued. + +The throttling delay is group-level. If one operation for `lbName/backendPoolName` is parked by `nextEligibleAt`, all operations in that same group are preserved until the group becomes eligible. This avoids splitting add/remove operations for the same backend pool and preserves batching order. Unrelated groups continue processing normally. + +Before requeueing or emitting retry/failure events, re-check that each operation is still relevant. If the Service is gone or now maps to a different load balancer, drop the stale operation quietly. + +## Error Classification + +Classify updater errors into three categories: + +- `stale`: drop quietly +- `retriable`: emit retrying event and requeue while budget remains +- `terminal`: emit failed event and drop + +Rules: + +- ARM resource-not-found errors as detected by `errutils.CheckResourceExistsFromAzcoreError` are `stale`. +- ARM wire `429 TooManyRequests` responses are `retriable`. + - Classify them by checking `errors.As(err, &respErr)` for `*azcore.ResponseError` with `StatusCode == http.StatusTooManyRequests`. + - Extract `Retry-After` from `respErr.RawResponse.Header` when `RawResponse` is non-nil. + - Parse `Retry-After` the same way `retryrepectthrottled.ThrottlingPolicy.processThrottlePolicy` does: integer seconds or RFC1123 time. + - If the response has no parseable `Retry-After`, fall back to the next updater tick. +- Local throttle-gate `retryrepectthrottled.ErrTooManyRequest` is `retriable`. + - This path is detected with `errors.Is(err, retryrepectthrottled.ErrTooManyRequest)` when no `*azcore.ResponseError.RawResponse` is available. + - The local throttle gate returns the sentinel error without a response, header, or exported gate timestamp, so the updater cannot compute the policy's gate expiry. + - Fall back to the next updater tick for this path. + - The updater does not read `ThrottlingPolicy.RetryAfterReader` or `RetryAfterWriter` directly. The policy instance is not exposed through the backend-pool client factory. +- ARM `409 Conflict` and `412 PreconditionFailed` responses are `retriable`; no special payload handling is needed because the next updater tick already runs through a fresh `Get` before the next `CreateOrUpdate`. +- ARM response statuses in `retryrepectthrottled.GetRetriableStatusCode()` are `terminal` for this updater. The Azure SDK already retries those statuses inside the individual ARM call, so if the updater sees one of those errors, the SDK retry budget has already been exhausted. The updater emits `LoadBalancerBackendPoolUpdateFailed` and drops the operation instead of adding a second retry layer for the same condition. +- Non-ARM errors can opt into retry through a small wrapper/helper, such as: + +```go +func newRetriableBackendPoolUpdateError(err error) error +func isRetriableBackendPoolUpdateError(err error) bool +``` + +Keep this helper local to `pkg/provider/azure_local_services.go` unless another caller needs the same marker. + +- `context.Canceled` and `context.DeadlineExceeded` are terminal when `ctx.Err()` is non-nil. +- Other timeout-like non-ARM errors are terminal unless explicitly wrapped by the local retriable-error helper. +- All other errors are terminal. + +The helper should use `errors.As` and `errors.Is` so wrapped errors remain classifiable. + +The call site does not need generated backend-pool client wrappers to return raw `*http.Response` values. It should inspect the returned error directly: + +```go +var respErr *azcore.ResponseError +if errors.As(err, &respErr) && respErr.RawResponse != nil { + retryAfter := respErr.RawResponse.Header.Get(retryrepectthrottled.HeaderRetryAfter) + // parse retryAfter for 429 handling +} +``` + +## Event Behavior + +Use distinct events for retry and final failure: + +- `LoadBalancerBackendPoolUpdateRetrying`: emitted on every retryable failed attempt that will be requeued. +- `LoadBalancerBackendPoolUpdateFailed`: emitted when a terminal error occurs or the retry budget is exhausted. The event message should include the error and guidance: *"Backend pool update failed: \. To retrigger, cause an endpoint change for the Service (e.g., restart or scale a backing pod)."* +- `LoadBalancerBackendPoolUpdated`: keep existing success behavior. +- ARM resource-not-found: no event. + +The new `LoadBalancerBackendPoolUpdateRetrying` reason should be added as a constant in `pkg/consts/`, consistent with the repository convention for shared constants. If the implementation touches the existing `LoadBalancerBackendPoolUpdateFailed` or `LoadBalancerBackendPoolUpdated` literals, move those reasons to `pkg/consts/` in the same narrow change. + +Events should be emitted once per distinct Service in a backend-pool group, not once per raw add/remove operation. This avoids duplicate retry events when multiple operations for the same Service are batched together. + +This intentionally fixes the current `notify()` behavior that reports only the first operation in a batch because of its `break` after the first loop iteration. Add a regression test so future changes preserve one event per distinct Service in the group. + +When an operation is waiting for `nextEligibleAt`, the updater should not emit another retrying event on each skipped tick. The retrying event belongs to the failed attempt that scheduled the retry. + +## Locking And Queue Safety + +The `process()` method acquires locks in a fixed order that matches the main service reconciliation loop: + +1. `serviceReconcileLock`: serializes with the main reconcile path. Held for the entire `process()` call so that `localServiceNameToServiceInfoMap` reads in `groupOperations()` are consistent and `removeOperation()` can cancel queued operations before they are drained. +2. `azureResourceLocker`: distributed lease lock, serializes with other components that update Azure load balancer resources. If the lease cannot be acquired, `process()` returns without draining. Operations remain in the queue for the next tick. +3. `updater.lock`: protects `updater.operations`. + - lock to snapshot and clear `updater.operations` via `drainOperations()` + - unlock while doing filtering, grouping, and Azure calls + - lock to append retry operations back to `updater.operations` + - keep `addOperation` and `removeOperation` protected by the same lock + +This lock ordering (`serviceReconcileLock` before `updater.lock`) prevents deadlocks: the main reconcile path holds `serviceReconcileLock` and calls `addOperation()` (which acquires `updater.lock`). + +`addOperation` and `removeOperation` only acquire `updater.lock`. This prevents slow Azure calls from blocking EndpointSlice event handlers that need to enqueue newer operations. + +The `removeOperation(serviceName)` method cannot remove operations already in a processing snapshot. To avoid stale retry behavior, the processing path must re-check service relevance before requeueing and before sending retry/failure events. + +Parked operations waiting for `nextEligibleAt` live in `updater.operations`, so `removeOperation(serviceName)` can remove them while they are parked. If removal races with the short snapshot-to-requeue window, the next tick's relevance check drops the stale operation quietly. + +The relevance re-check depends on the Service cleanup path also removing the Service from `localServiceNameToServiceInfoMap`. The implementation must preserve that invariant: a deleted Service should either be removed from the live queue by `removeOperation(serviceName)` or be rejected by the map-based relevance check before a retry is requeued or reported. + +### Queue Growth During Throttling + +The queue is unbounded. During a long `Retry-After` period, EndpointSlice events continue to arrive and `addOperation()` appends new operations to the queue. Operation coalescing or a queue size limit can be added as a follow-up if needed. + +New retry-path logging should use `pkg/log` contextual loggers. Do not add new direct `klog` calls while touching this file. + +## Cancellation And Shutdown + +If the updater context is canceled, the `run()` loop exits and parked in-memory operations are discarded with the process. The updater should not emit retry or failure events for operations that are only abandoned because the controller is shutting down. + +If an in-flight ARM call returns `context.Canceled` or `context.DeadlineExceeded` after the updater context is done, treat it as terminal shutdown behavior and do not requeue. If `process()` observes cancellation before re-appending a snapshot, it should drop the snapshot instead of preserving retry state for a loop that is stopping. + +## Metrics + +The existing updater metric (`ObserveOperationWithResult`) should describe terminal outcomes, not intermediate retry attempts. + +- Requeued attempts do not call `ObserveOperationWithResult(false)`. +- Queue-preservation ticks while waiting for `nextEligibleAt` do not record a metric. +- Success records one successful observation when `LoadBalancerBackendPoolUpdated` is emitted. +- Terminal failure records one failed observation when `LoadBalancerBackendPoolUpdateFailed` is emitted. +- Stale resource-not-found and stale Service/LB drops record no observation. Note: this changes current behavior where `ObserveOperationWithResult(false)` is called before `processError()` checks for 404, recording a failure metric for stale backend pools. The new behavior treats 404 as stale (no metric). + +This prevents a retried-then-succeeded operation from appearing as multiple failed operations followed by one success. + +## Retry Timing + +Updater-level retry uses the existing `LoadBalancerBackendPoolUpdateIntervalInSeconds` tick; this design does not add a separate sleep loop inside `process()`. Without `Retry-After`, default retry count `3` and default interval `30s` means a continuously failing retriable condition emits retrying events on the first three failed attempts and emits the final failed event on the fourth failed attempt, roughly 90 seconds after the first observed failure plus ARM call latency. Depending on where the first failure lands relative to the updater tick and how long each ARM call takes, the wall-clock time from the original EndpointSlice change to final failure can be close to or above two minutes. + +For 429 throttling, `Retry-After` overrides the next normal updater tick by setting `nextEligibleAt`. Ticks before `nextEligibleAt` only preserve the operation in the queue after re-checking Service/LB relevance; they do not call ARM, emit retrying events, or consume retry budget. `LoadBalancerBackendPoolUpdateMaxRetries` bounds failed processing attempts, not elapsed wall-clock time, so a long `Retry-After` can delay final success or failure beyond the normal interval-based timing. + +During sustained Azure throttling, operators can reduce `LoadBalancerBackendPoolUpdateMaxRetries` or increase `LoadBalancerBackendPoolUpdateIntervalInSeconds` to avoid retry amplification when `Retry-After` is unavailable. + +Exponential backoff is not used because the retriable errors at this layer either use server-directed delays (429 with `Retry-After`) or benefit from a fresh `Get` rather than longer waits (409/412). When all retries are exhausted without success, the operator receives a `LoadBalancerBackendPoolUpdateFailed` event with guidance to retrigger (see the Event Behavior section). + +## Tests + +Add focused unit tests in `pkg/provider/azure_local_services_test.go`: + +1. ARM wire `429` from `Get` with a parseable `Retry-After` in `azcore.ResponseError.RawResponse` sets `nextEligibleAt` and emits `LoadBalancerBackendPoolUpdateRetrying`; subsequent ticks before `nextEligibleAt` requeue quietly without ARM calls, retry events, retry-count increments, or metrics. +2. ARM wire `429` from `CreateOrUpdate` follows the same `Retry-After`, `LoadBalancerBackendPoolUpdateRetrying`, and requeue behavior. +3. ARM wire `429` without a parseable `Retry-After` requeues, emits `LoadBalancerBackendPoolUpdateRetrying`, then succeeds on the next eligible tick. +4. Local-gate `retryrepectthrottled.ErrTooManyRequest` without a raw response falls back to the next updater tick and does not panic on nil response. +5. ARM `409` or `412` from `CreateOrUpdate` requeues, emits `LoadBalancerBackendPoolUpdateRetrying`, then succeeds on the next tick after a fresh `Get`. +6. If any operation in a `lbName/backendPoolName` group is waiting for `nextEligibleAt`, the whole group is preserved and no same-group operation is processed early. +7. A fresh operation merged with a requeued operation keeps its own retry counter; on group failure, all operations in the group consume one retry. +8. A group with mixed retry budgets (one operation at max retries, one fresh): the exhausted operation is dropped and reported while the fresh operation is requeued. +9. Retry budget exhaustion emits `LoadBalancerBackendPoolUpdateFailed` with guidance text and leaves the queue empty. +10. Statuses from `retryrepectthrottled.GetRetriableStatusCode()` do not requeue and emit `LoadBalancerBackendPoolUpdateFailed`. +11. Other non-retriable errors do not requeue and emit `LoadBalancerBackendPoolUpdateFailed`. +12. ARM resource-not-found does not requeue and emits no event. +13. Stale service or changed load balancer before requeue is dropped quietly. +14. A Service that disappears while its operation is parked behind `nextEligibleAt` is dropped quietly on the next relevance check. +15. Multiple operations for multiple Services in a backend-pool group emit one retry/failure event per distinct Service, covering the current `notify()` break-after-first-operation bug. +16. `removeOperation(serviceName)` removes parked operations whose `nextEligibleAt` is in the future. +17. Updater shutdown with parked operations does not emit retry/failure events and does not requeue. +18. Explicit `LoadBalancerBackendPoolUpdateMaxRetries: 0` remains non-nil through config load and disables updater retry. +19. A retried-then-succeeded operation records exactly one successful metric observation and no failed metric observations. + +Use a fake event recorder where needed to assert retrying and failed event reasons precisely. + +## Expected Behavior + +With default retry count `3`, a retriable updater failure behaves as: + +1. First failed attempt: emit `LoadBalancerBackendPoolUpdateRetrying`, requeue. +2. Second failed attempt: emit `LoadBalancerBackendPoolUpdateRetrying`, requeue. +3. Third failed attempt: emit `LoadBalancerBackendPoolUpdateRetrying`, requeue. +4. Fourth failed attempt: emit `LoadBalancerBackendPoolUpdateFailed`, drop. + +If a later retry succeeds, the updater emits `LoadBalancerBackendPoolUpdated` and drops the completed operations. + +If the Service becomes stale during retry, the updater drops the operation quietly instead of emitting retry or failure events. + +If an ARM call returns a status from `retryrepectthrottled.GetRetriableStatusCode()` after the SDK retry policy has already run, the updater emits `LoadBalancerBackendPoolUpdateFailed` immediately and drops the operation. + +If a 429 response provides `Retry-After`, the updater respects that value before the next processing attempt. Intermediate updater ticks before `nextEligibleAt` are queue-preservation ticks, not retry attempts.