Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Process Repeaters, Part 1 #35033

Open
wants to merge 38 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
50c848a
Add `PROCESS_REPEATERS` toggle
kaapstorm Aug 23, 2024
0db6a6c
`process_repeaters()` task
kaapstorm Aug 23, 2024
e36296c
`get_repeater_lock()`
kaapstorm Aug 23, 2024
aeb10ba
`iter_ready_repeater_ids_once()`
kaapstorm Aug 23, 2024
01e4bc7
Skip rate-limited repeaters
kaapstorm Aug 23, 2024
db2fec2
`process_repeater()` task
kaapstorm Aug 23, 2024
85b952e
Add tests
kaapstorm Aug 4, 2024
c28c11b
`Repeater.max_workers` field
kaapstorm Aug 24, 2024
d8d9642
Index fields used by `RepeaterManager.all_ready()`
kaapstorm Aug 28, 2024
48c3d7c
Use quickcache. Prefilter enabled domains.
kaapstorm Aug 28, 2024
418ed3a
Check randomly-enabled domains
kaapstorm Aug 29, 2024
85bbfa3
Forward new records for synchronous case repeaters
kaapstorm Aug 29, 2024
d1119bb
Add explanatory docstrings and comments
kaapstorm Sep 9, 2024
03b26cf
get_redis_lock() ... acquire(): No TypeError ?!
kaapstorm Sep 9, 2024
de27ba0
Drop unnecessary `iter_domain_repeaters()`
kaapstorm Sep 10, 2024
4955ef4
Don't quickcache `domain_can_forward_now()`
kaapstorm Sep 24, 2024
59aae71
Migration to create indexes concurrently
kaapstorm Sep 24, 2024
f40e6f4
Merge branch 'master' into nh/iter_repeaters_1
orangejenny Oct 4, 2024
b70fc52
Add comment
kaapstorm Oct 19, 2024
7e65b3b
Don't squash BaseExceptions
kaapstorm Oct 19, 2024
4c41896
Drop timeout for `process_repeater_lock`.
kaapstorm Oct 19, 2024
30d4a6f
Add metric for monitoring health
kaapstorm Oct 19, 2024
fc0f174
Merge branch 'master' into nh/iter_repeaters_1
kaapstorm Oct 19, 2024
e32b465
Resolve migration conflict, fix index
kaapstorm Oct 19, 2024
e3bcd74
Fix metric
kaapstorm Oct 19, 2024
efc4dde
Change indexes
kaapstorm Oct 22, 2024
bd37a00
Add one more index. Use UNION ALL queries.
kaapstorm Oct 23, 2024
a448b9e
Don't report attempt too soon
kaapstorm Oct 26, 2024
4321fb7
Add metrics
kaapstorm Oct 26, 2024
74137f9
Improve backoff logic
kaapstorm Oct 26, 2024
968a922
Update comments
kaapstorm Oct 28, 2024
4fd14a0
Show "Next attempt at" in Forwarders page
kaapstorm Oct 28, 2024
07320b9
Merge branch 'master' into nh/iter_repeaters_1
kaapstorm Oct 28, 2024
b1eb171
Fixes migration
kaapstorm Oct 28, 2024
2463348
Merge remote-tracking branch 'origin/master' into nh/iter_repeaters_1
kaapstorm Oct 29, 2024
8a7f343
Add comment on other `True` return value
kaapstorm Nov 19, 2024
0f72ba9
Count repeater backoffs
kaapstorm Dec 2, 2024
7f18e52
Add documentation
kaapstorm Dec 2, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Empty file.
31 changes: 31 additions & 0 deletions corehq/ex-submodules/dimagi/utils/couch/tests/test_redis_lock.py
Original file line number Diff line number Diff line change
@@ -0,0 +1,31 @@
import uuid

from redis.lock import Lock as RedisLock

from dimagi.utils.couch import get_redis_lock

from corehq.tests.noseplugins.redislocks import TestLock
from corehq.util.metrics.lockmeter import MeteredLock


def test_get_redis_lock_with_token():
lock_name = 'test-1'
metered_lock = get_redis_lock(key=lock_name, name=lock_name, timeout=1)
assert isinstance(metered_lock, MeteredLock)
# metered_lock.lock is a TestLock instance because of
# corehq.tests.noseplugins.redislocks.RedisLockTimeoutPlugin
test_lock = metered_lock.lock
assert isinstance(test_lock, TestLock)
redis_lock = test_lock.lock
assert isinstance(redis_lock, RedisLock)

token = uuid.uuid1().hex
acquired = redis_lock.acquire(blocking=False, token=token)
assert acquired

# What we want to be able to do in a separate process:
metered_lock_2 = get_redis_lock(key=lock_name, name=lock_name, timeout=1)
redis_lock_2 = metered_lock_2.lock.lock
redis_lock_2.local.token = token
# Does not raise LockNotOwnedError:
redis_lock_2.release()
2 changes: 2 additions & 0 deletions corehq/motech/repeaters/const.py
Original file line number Diff line number Diff line change
Expand Up @@ -13,6 +13,8 @@
CHECK_REPEATERS_INTERVAL = timedelta(minutes=5)
CHECK_REPEATERS_PARTITION_COUNT = settings.CHECK_REPEATERS_PARTITION_COUNT
CHECK_REPEATERS_KEY = 'check-repeaters-key'
PROCESS_REPEATERS_INTERVAL = timedelta(minutes=1)
PROCESS_REPEATERS_KEY = 'process-repeaters-key'
ENDPOINT_TIMER = 'endpoint_timer'
# Number of attempts to an online endpoint before cancelling payload
MAX_ATTEMPTS = 3
Expand Down
137 changes: 118 additions & 19 deletions corehq/motech/repeaters/models.py
Original file line number Diff line number Diff line change
Expand Up @@ -73,6 +73,7 @@
from http import HTTPStatus
from urllib.parse import parse_qsl, urlencode, urlparse, urlunparse

from django.conf import settings
from django.db import models, router
from django.db.models.base import Deferred
from django.dispatch import receiver
Expand Down Expand Up @@ -237,18 +238,43 @@ def all_ready(self):
"""
Return all Repeaters ready to be forwarded.
"""
not_paused = models.Q(is_paused=False)
next_attempt_not_in_the_future = (
models.Q(next_attempt_at__isnull=True)
| models.Q(next_attempt_at__lte=timezone.now())
return self._all_ready_next_attempt_null().union(
self._all_ready_next_attempt_now(),
all=True,
)
repeat_records_ready_to_send = models.Q(
repeat_records__state__in=(State.Pending, State.Fail)

def get_all_ready_ids_by_domain(self):
next_attempt_null = self._all_ready_next_attempt_null().values_list('domain', 'id')
next_attempt_now = self._all_ready_next_attempt_now().values_list('domain', 'id')
query = next_attempt_null.union(next_attempt_now, all=True)
results = defaultdict(list)
for (domain, id_uuid) in query.all():
results[domain].append(id_uuid.hex)
return results

def all_ready_count(self):
return (
self._all_ready_next_attempt_null().count()
+ self._all_ready_next_attempt_now().count()
)

def _all_ready_next_attempt_null(self):
# Slower query. Uses deleted_partial_idx
return (
self.get_queryset()
.filter(is_paused=False)
.filter(next_attempt_at__isnull=True)
.filter(repeat_records__state__in=(State.Pending, State.Fail))
)

def _all_ready_next_attempt_now(self):
# Fast query. Uses deleted_paused_partial_idx and state_partial_idx
return (
self.get_queryset()
.filter(is_paused=False)
.filter(next_attempt_at__lte=timezone.now())
.filter(repeat_records__state__in=(State.Pending, State.Fail))
)
return (self.get_queryset()
.filter(not_paused)
.filter(next_attempt_not_in_the_future)
.filter(repeat_records_ready_to_send))

def get_queryset(self):
repeater_obj = self.model()
Expand Down Expand Up @@ -378,9 +404,24 @@ def _repeater_type(cls):

@property
def repeat_records_ready(self):
return self.repeat_records.filter(state__in=(State.Pending, State.Fail))
"""
A QuerySet of repeat records in the Pending or Fail state in the
order in which they were registered
"""
return (
self.repeat_records
.filter(state__in=(State.Pending, State.Fail))
.order_by('registered_at')
)

@property
def num_workers(self):
# If num_workers is 1, repeat records are sent in the order in
# which they were registered.
num_workers = self.max_workers or settings.DEFAULT_REPEATER_WORKERS
return min(num_workers, settings.MAX_REPEATER_WORKERS)

def set_next_attempt(self):
def set_backoff(self):
now = datetime.utcnow()
interval = _get_retry_interval(self.last_attempt_at, now)
self.last_attempt_at = now
Expand All @@ -393,8 +434,12 @@ def set_next_attempt(self):
next_attempt_at=now + interval,
)

def reset_next_attempt(self):
def reset_backoff(self):
if self.last_attempt_at or self.next_attempt_at:
# `_get_retry_interval()` implements exponential backoff by
# multiplying the previous interval by 3. Set last_attempt_at
# to None so that the next time we need to back off, we
# know it is the first interval.
self.last_attempt_at = None
kaapstorm marked this conversation as resolved.
Show resolved Hide resolved
self.next_attempt_at = None
# Avoid a possible race condition with self.pause(), etc.
Expand Down Expand Up @@ -1004,11 +1049,16 @@ def get_repeat_record_ids(self, domain, repeater_id=None, state=None, payload_id
class RepeatRecord(models.Model):
domain = models.CharField(max_length=126)
payload_id = models.CharField(max_length=255)
repeater = models.ForeignKey(Repeater,
on_delete=DB_CASCADE,
db_column="repeater_id_",
related_name='repeat_records')
state = models.PositiveSmallIntegerField(choices=State.choices, default=State.Pending)
repeater = models.ForeignKey(
Repeater,
on_delete=DB_CASCADE,
db_column="repeater_id_",
related_name='repeat_records',
)
state = models.PositiveSmallIntegerField(
choices=State.choices,
default=State.Pending,
)
registered_at = models.DateTimeField()
next_check = models.DateTimeField(null=True, default=None)
max_possible_tries = models.IntegerField(default=MAX_BACKOFF_ATTEMPTS)
Expand Down Expand Up @@ -1196,7 +1246,21 @@ def fire(self, force_send=False, timing_context=None):
self.repeater.fire_for_record(self, timing_context=timing_context)
except Exception as e:
self.handle_payload_error(str(e), traceback_str=traceback.format_exc())
raise
# Repeat records with State.Fail are retried, and repeat
# records with State.InvalidPayload are not.
#
# But a repeat record can have State.InvalidPayload
# because it was sent and rejected, so we know that the
# remote endpoint is healthy and responding, or because
# this exception occurred and it was not sent, so we
# don't know anything about the remote endpoint.
#
# Return None so that `tasks.update_repeater()` treats
# the repeat record as unsent, and does not apply or
# reset a backoff.
return None
return self.state
return None

def attempt_forward_now(self, *, is_retry=False, fire_synchronously=False):
from corehq.motech.repeaters.tasks import (
Expand All @@ -1206,6 +1270,22 @@ def attempt_forward_now(self, *, is_retry=False, fire_synchronously=False):
retry_process_datasource_repeat_record,
)

def is_new_synchronous_case_repeater_record():
"""
Repeat record is a new record for a synchronous case repeater
See corehq.motech.repeaters.signals.fire_synchronous_case_repeaters
"""
# This will also return True if a user clicked "Resend" on a
# Pending repeat record in the Repeat Records Report. This
# is not intended, but it's also not harmful.
return fire_synchronously and self.state == State.Pending

if (
toggles.PROCESS_REPEATERS.enabled(self.domain, toggles.NAMESPACE_DOMAIN)
and not is_new_synchronous_case_repeater_record()
):
return
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consider the scenario where this toggle is enabled and then later disabled. With next_check discrepancies between RepeatRecord and Repeater be handled gracefully?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If by "gracefully" you mean "will all repeat records be processed when the toggle is disabled?", then yes.

But if by "gracefully" you mean "will Datadog show the repeat records as not overdue?", then no. Datadog will show the repeat records as overdue.

Alternatively, when we apply a back-off to a repeater, we could also update all its pending and failed repeat records too. I considered this, but it felt like a lot of churn on the repeat records table. I thought a better approach would be to use a new metric for Datadog to gauge when the repeat records queue is getting backed up.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.


if self.next_check is None or self.next_check > datetime.utcnow():
return

Expand Down Expand Up @@ -1361,7 +1441,26 @@ def is_response(duck):


def domain_can_forward(domain):
"""
Returns whether ``domain`` has data forwarding or Zapier integration
privileges.

Used for determining whether to register a repeat record.
"""
return domain and (
domain_has_privilege(domain, ZAPIER_INTEGRATION)
or domain_has_privilege(domain, DATA_FORWARDING)
)


def domain_can_forward_now(domain):
millerdev marked this conversation as resolved.
Show resolved Hide resolved
"""
Returns ``True`` if ``domain`` has the requisite privileges and data
forwarding is not paused.

Used for determining whether to send a repeat record now.
"""
return (
domain_can_forward(domain)
and not toggles.PAUSE_DATA_FORWARDING.enabled(domain)
)
Loading
Loading