From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: X-Spam-Status: No, score=-4.0 required=3.0 tests=ALL_TRUSTED,BAYES_00 shortcircuit=no autolearn=unavailable autolearn_force=no version=3.4.0 Received: from localhost (dcvr.yhbt.net [127.0.0.1]) by dcvr.yhbt.net (Postfix) with ESMTP id 49496201B0; Thu, 23 Feb 2017 01:42:24 +0000 (UTC) Date: Thu, 23 Feb 2017 01:42:23 +0000 From: Eric Wong To: Simon Eskildsen Cc: unicorn-public@bogomips.org, raindrops-public@bogomips.org Subject: Re: check_client_connection using getsockopt(2) Message-ID: <20170223014223.GA15864@starla> References: <20170222183352.GA28771@starla> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline In-Reply-To: List-Id: Simon Eskildsen wrote: Thanks for the writeup! Another sidenote: It seems nginx <-> unicorn is a bit odd for deployment in a containerized environment(*). > I meant to ask, in Raindrops why do you use the netlink API to get the > socket backlog instead of `getsockopt(2)` with `TCP_INFO` to get > `tcpi_unacked`? (as described in > http://www.ryanfrantz.com/posts/apache-tcp-backlog/) We use this to > monitor socket backlogs with a sidekick Ruby daemon. Although we're > looking to replace it with a middleware to simplify for Kubernetes. > It's one of our main metrics for monitoring performance, especially > around deploys. The netlink API allows independently-spawned processes to monitor others; so it can be system-wide. TCP_INFO requires the process doing the checking to also have the socket open. I guess this reasoning for using netlink is invalid for containers, though... > I was going to use `env["unicorn.socket"]`/`env["puma.socket"]`, but > you could also do `env.delete("hijack_io")` after hijacking to allow > Unicorn to still render the response. Unfortunately the > `.socket` key is not part of the Rack standard, so I'm > hesitant to use it. When this gets into Unicorn I'm planning to > propose it upstream to Puma as well. I was going to say env.delete("rack.hijack_io") is dangerous (since env could be copied by middleware); but apparently not: rack.hijack won't work with a copied env, either. You only need to delete with the same env object you call rack.hijack with. But calling rack.hijack followed by env.delete may still have unintended side-effects in other servers; so I guess we (again) cannot rely on hijack working portably. > Cool. How would you suggest I check for TCP_INFO compatible platforms > in Unicorn? Is `RUBY_PLATFORM.ends_with?("linux".freeze)` sufficient > or do you prefer another mechanism? I agree that we should fall back > to the write hack on other platforms. The Raindrops::TCP_Info class should be undefined on unsupported platforms, so I think you can check for that, instead. Then it should be transparent to add FreeBSD support from unicorn's perspective. (*) So I've been wondering if adding a "unicorn-mode" to an existing C10K, slow-client-capable Ruby/Rack server + reverse proxy makes sense for containerized deploys. Maybe...