[agent] Cleanup unused, shimmed websocket connections after a configurable timeout.#166
[agent] Cleanup unused, shimmed websocket connections after a configurable timeout.#166ojarjur merged 1 commit intogoogle:masterfrom
Conversation
ojarjur
left a comment
There was a problem hiding this comment.
Thanks for the fix!
There are some formatting issues that need to be addressed, but also please update the PR description to give background on what the issue is (connections leaking of the close message gets dropped) and how this PR addresses it.
Thanks!
a045972 to
d24d23c
Compare
agent/websockets/connection.go
Outdated
| // The server messages channel has been closed. | ||
| return nil, fmt.Errorf("attempt to read a server message from a closed websocket connection") | ||
| } | ||
| conn.updateActivity() |
There was a problem hiding this comment.
This also needs to be called at the beginning of this method (i.e. on line 258).
Otherwise, a connection that the client is continuously polling on, but where the server has not yet responded, will be closed as inactive.
There was a problem hiding this comment.
This line can be removed now; it is no longer necessary with the updates on line 258 and 259
agent/websockets/connection.go
Outdated
There was a problem hiding this comment.
The timeout here needs to be the minimum of 20 seconds and some amount less than the configured idle timeout (e.g. half of the idle timeout).
That way, a polling request from an actively connected client will timeout and be re-run before the activity tracking logic decides that the connection is idle.
There was a problem hiding this comment.
Alternatively, we could put in some sort of check to enforce that the idle timeout is greater than 20 seconds (e.g. setting a minimum of 30 seconds).
There was a problem hiding this comment.
Hi Omar,
are you suggesting to implement the above fix for case <-time.After(time.Second * 20): ?
and we should parameterized the timeout value?
There was a problem hiding this comment.
What I'm saying is that the timeout used here (on line 279) needs to be smaller than the timeout used for detecting idle connections.
The issue is that the client might have a connection open and be waiting for a message from the server.
If that happens, then the connection activity is only updated at the start of each polling request from the client.
However, the polling request will be held open as long as the timeout here on line 279.
So, if the idle timeout for connections is not longer than the timeout on line 279, then connection will appear to be idle even though there is a client actively polling it.
To prevent that, we need to do something to make sure that the timeout used on line 279 is shorter than the timeout used for idleness detection.
This can either setting a lower bound on the timeout for idle detection, or making the timeout on line 279 shorter in the case that the idle detection timeout is not longer than 20 seconds.
We also want some buffer between the two timeouts; i.e. the timeout on line 279 needs to be strictly shorter than the timeout used for idle detection.
Finally, we need to add a test case that exercises this scenario to verify that our change doesn't cause the connections to be prematurely pruned.
ojarjur
left a comment
There was a problem hiding this comment.
Thanks! This looks good aside from the one extraneous line that can be removed now (commented below)
agent/websockets/connection.go
Outdated
| // The server messages channel has been closed. | ||
| return nil, fmt.Errorf("attempt to read a server message from a closed websocket connection") | ||
| } | ||
| conn.updateActivity() |
There was a problem hiding this comment.
This line can be removed now; it is no longer necessary with the updates on line 258 and 259
|
All review comments are addressed ,please review. |
|
The build is failing due to a missing import. |
|
is there any way to trigger workflow , so we can get the test results as soon as possible. |
|
Hi Omar, can you please trigger the workflow and see if this looks good to you. |
Done, but the build is still broken. |
The ba-proxy-agent currently experiences increasing memory consumption,
leading to daily or weekly restarts. Previous mitigation attempts were
insufficient, and the issue has been isolated to high memory usage on
the agent connection side.
This CL mitigates the issue by enforcing a timeout on idle connections.
Since the root cause remains elusive, forcefully closing unused
connections prevents memory accumulation from persistent links.
Implementation details:
* Introduced `lastActivityTime` property to agent connections, which
updates upon usage.
* Added a background routine to monitor connection activity.
* Configured the routine to explicitly close connections that remain
idle for more than 30 seconds.
ojarjur
left a comment
There was a problem hiding this comment.
The code changes are good now, but this still needs a proper PR description.
This PR adds a configurable value for how long shimmed websocket connections can remain idle before they are garbage collected.
Previously, the underlying connection from the proxy agent to the backend server was only cleaned up when there was either an error while sending or receiving messages, or if the agent received an explicit close message.
When a client of shim protocol stopped communicating without first sending a close message, this caused the underlying connection between the proxy agent and backend server to be retained indefinitely. That, in turn, can result in a resource leak within the agent (and possibly in the backend server as well).
To account for that scenario, we needed to find some way to identify that a client of the shim protocol had stopped communicating, so that we could clean up those lost connections.
The shim protocol does not include any sort of ping or pong messages, but it does have polling requests sent by the client which can be used as a dead-man switch; once a sufficient amount of time has elapsed since the last such request, we can assume that the client is gone and the underlying connection can be removed.
This PR adds a configuration option to the agent to specify what that amount of time should be (with a default of 1 hour), and implements the agent-side cleanup logic to identify and close expired connections.