RFD 445
Crucible Upstairs Backpressure
RFD
445
Authors
Updated

It is a truth universally acknowledged, that a system in possession of an input queue, must be in want of a backpressure implementation.

As we have improved the performance of the Crucible Upstairs, an issue has emerged: it’s possible to submit BlockOp jobs much faster than they can be handled. This is exacerbated by the "fast ack" optimization: according to our contract, we can acknowledge writes to the caller immediately, without waiting for them to actually complete. The next flush or read operation, however, will have to wait for all of those writes to actually finish, meaning it will take a surprisingly long time.

(See crucible#902 for an example of this behavior leading to the host reporting disk errors!)

During early development, there were many sources of Accidental Backpressure in the system, e.g. checking every previous job when adding a new job. We have been gradually removing these sources of accidental backpressure as we optimize the upstairs implementation.

To keep our systems behaving without accidental backpressure, we introduced intentional backpressure in crucible#916 and refined it further in crucible#990 and crucible#1047. However, it’s still not perfect: especially on unencrypted volumes (which lack the unintentional backpressure of encryption), the right pattern of large block writes can lead to pile-ups in various queues.

This document explains the various places where backpressure and queue limits are implemented, explains limitations of the current implementation, and suggests a path forward.

Queues in the Crucible Upstairs

The diagram below summarizes major queues and limits in the system:

Backpressure implementation

The current backpressure implementation is based on two values:

  • Total write bytes in flight

  • Live job count (i.e. the number of new and in-progress jobs)

Backpressure is calculated as the maximum of two computed values:

  • Backpressure due to write bytes, which begins at 1 GiB in-flight and has a quadratic scale such that there’s a delay of 10 ms at 2 GiB in-flight.

  • Backpressure due to live job count, which starts at 0.05 * IO_OUTSTANDING_MAX and has a quadratic scale with a maximum delay of 5ms at IO_OUTSTANDING_MAX.

Using the maximum of these two values makes backpressure robust against both small and large write jobs. Comparing active jobs at a variety of write sizes, we see the following:

bbp

For small writes, we’re limited by total jobs; the black line indicates where backpressure kicks in at IO_OUTSTANDING_MAX / 2. Large writes stabilize at fewer outstanding jobs, presumably due to the bytes-in-flight backpressure.

Note
1M and 4M writes both stabilize at the same number of jobs in flight because something upstack (be it the host or OS) splits large writes into smaller jobs.

The backpressure is implemented as an artificial delay before returning when performing a write operation (only); reads and flushes actually wait for the operation to complete, so they don’t need artificial backpressure.

There’s one subtlety here: once backpressure kicks in, the writer must hold a mutex lock during the backpressure delay. Otherwise, arbitrarily many writers can send writes simultaneously; even though each one is delayed by backpressure, it would still be possible to overwhelm the system. We saw this in practice: Propolis uses an 8-task worker pool to send jobs to Crucible, so our initial backpressure implementation didn’t slow things down fast enough.

Mental model for throughput backpressure

The current backpressure implementation can be thought of as "throughput backpressure": given an infinite stream of incoming writes, the system stabilizes at a point where the backpressure delay matches the true time to complete each write.

In other words, the system stabilizes in a "one-in, one-out" state: each new write is delayed for long enough that the oldest write in the queue completes as it’s added to the queue. If the backpressure delay is too short, then the queue grows (and the delay increases); vice versa if the delay is too long.

In the diagram below, the Upstairs ⟷ Downstairs operation (including backpressure) matches the Upstairs ⟷ Disk time.

Deficiencies of the current system

IOP and bandwidth limits do not cause backpressure

In the current implementation, IOP and bandwidth limits are implemented by limiting the rate at which Guest::consume_req can be called (by up_listen). Those limits are not connected to the backpressure system, meaning jobs simply accumulate Upstairs in Guest::reqs, and the guest could use unbounded amounts of RAM.

This is mitigated by the fact that we never enable IOP or bandwidth limiting.

Recommendation: Remove the current IOP and bandwidth limit implementation; reimplement it as part of the backpressure system further down the road.

What is MAX_ACTIVE_COUNT doing?

Right now, we limit in-progress jobs (i.e. jobs that are heading through the network to the Downstairs and back) to 2600 on a per-client basis. New jobs above that threshold stay in ds_new for that client; they’re still counted as live work for the purposes of other backpressure. The MAX_ACTIVE_COUNT limit is a hard limit and isn’t connected to the rest of the backpressure system.

This is a little weird but isn’t obviously misbehaving. The implementation does what it’s intended to do, and is compatible with the rest of the backpressure system; jobs in ds_new still count for backpressure.

Problematic bytes-in-flight delay

There’s a subtle failure mode in our current bytes-in-flight backpressure limitation.

First, remember that we use "total live jobs" as our indication that a Downstairs has stopped responding, marking the Downstairs as faulted when total live jobs reaches IO_OUTSTANDING_MAX (by default 57000).

If we send many small writes to a Downstairs that is no longer responding, backpressure will be determined by the "live jobs" limit, which maxes out at 5 ms. The total delay with our current parameters will be 47 seconds, which does not seem unreasonable.

However, if we send large writes, the backpressure delay will be determined by the bytes-in-flight limitation, which is not clamped. As we approach 57000 jobs, the delay due to bytes-in-flight will become enormous; in practice, we’ll never hit the 57000-job fault threshold (a quick Python calculation tells me it would take 107 days).

Recommendation: We should also fault at a particular level of bytes-in-flight. Doing so would create a pleasing symmetry between our two sources of backpressure: both sources could kick in at some fraction of the fault threshold, and scale up (quadratically) to a particular maximum delay before faulting.

Warning
This seems incompatible with allowing guests to submit operations of arbitrary size; e.g. if we fault at 2 GiB of data in flight, how do avoid faulting immediately if the guest sends a 3 GiB write? One option is to automatically split large guest writes into multiple jobs, which are submitted (and experience back-pressure) independently. Alternatively, we could assume cooperative guests, e.g. Propolis includes a configurable Maximum Data Transfer Size (MDTS).

Whither latency?

This model works fine for writes, which are delayed due to backpressure but then return immediately. However, it’s problematic for other operations: for example, a flush will have to wait for every single preceeding write operation to complete, so write × N, flush can be slow.

We may also want to exert backpressure to limit maximum latency.

It’s not obvious to me how we could do this cleanly. Some operations will necessarily take longer than others (e.g. the hypothetical 3 GiB write above), and we don’t directly control latency.

We could try adding an addition backpressure source based on latency of periodic operations (e.g. the periodic ping). However, this seems tricky: the pings only occur every 5 seconds, so the control loop would have to be very slow to be stable. As the ZFS write throttle blog post notes, measuring throughput is generally problematic!

A more reasonable option may be to tune the existing backpressure limits such that our max latency is never particularly long. For example, we could begin exerting backpressure at 100 MiB of data in-flight instead of 1 GiB. We implemented such a change in crucible#1047, changing the jobs-in-flight backpressure to start at 5700 jobs in flight (down from 28500), which improved system robustness.

Aside: counter-intuitive latency behavior

It’s possible for speeding up the Upstairs to actually increase latency, when we’re sending many writes followed by a read or flush (as described in the section above).

For a write job, there are three times to consider. The first two are

  • T_ack, how long it takes to ack. This is "as fast as possible", limited only by data structures in the Upstairs

  • T_done, how long the write actually takes to finish.

The Guest is limited by T_ack as to how fast it can submit writes.

If T_ack >= T_done, then the queue length will remain at (roughly) 0, because jobs are submitted as quickly as they are completed.

If T_ack < T_done, then the queue length will increase internally. At a certain point, backpressure will kick in, delaying guest requests to T_ack + T_bp (our third time to consider). The queue length will stabilize at a length such that T_ack + T_bp == T_done.

The total latency to actually complete a job is given by T_done * number of writes in the queue. This is invisible to writes (because they ack right away), but a subsequent read (or flush) will see this true latency.

If T_ack gets smaller (because we are processing jobs faster), then T_bp must become larger to compensate, so the queue length will stabilize at a longer length. This means that the latency for a subsequent flush or read will increase.

Determinations

  • Add "too many bytes in flight" as a failure condition, analogous to the existing "too many jobs in flight" failure condition. This would improve failure detection for large-write workloads if a Downstairs goes away.

  • Tune the start points and initial slope of the backpressure curves to keep worst-case latency to a reasonable level. We’ve already done this for jobs-in-flight, but should do the same for bytes-in-flight.

  • Consider removing (and eventually reimplementing) IOP and bandwidth limiting on the Guest: they’re not used at the moment (outside of unit tests), and should be implemented in a way that feeds into the backpressure system.

Open Questions

What is the correct shape for the backpressure curve?

Right now, the implementation is quadratic; the ZFS write throttle (which is very relevant prior art!) has the form delay = (dirty - min_dirty) / (max_dirty - dirty).

What other sources of backpressure do we want?

We already discussed implementing IOP and bandwidth limits as backpressure. Are there other resources that we should limit to ensure quality-of-service across many VMs in the rack? For example, we could use backpressure to maintain a maximum level of RAM consumption by the Upstairs (although this specific example may already be approximated by bytes-in-flight).

Security Considerations

This RFD does not open any new security considerations, but reminds us that the rack exists in a world of bounded resources.

A robust and well-tuned backpressure implementation is necessary to ensure availability and quality of service. Without backpressure, write-heavy guests could consume disproportionate amounts of RAM on their physical sled, because the upstairs would end up buffering arbitrarily large numbers of writes.