How does Sentinel intercept abnormal traffic?

How does Sentinel intercept abnormal traffic?

[[342079]]

When you use electricity at home, you must have experienced "tripping". This "gate" is used to protect our electricity safety when the power exceeds the load. It is also called a "circuit breaker" and has a resounding English name - CircuitBreaker.

Just like electricity safety, you and I should all be familiar with "current limiting", "downgrading", "fusing"... In order to avoid being overwhelmed by abnormal traffic, various software, systems, and Internet applications we develop also need a circuit breaker.

In Spring applications, it is convenient to use circuit breakers. We can use Spring Cloud CircuitBreaker.

What is Spring Cloud Circuit Breaker? If you are familiar with Spring, you can probably guess what it is. Similar to Spring Data JPA, Spring has come up with an abstract, standard API. This time, it abstracts the "circuit breaker" for downgrade circuit breaking. With this layer, the specific implementation can be easily replaced, and the code we use basically has to be changed to zero.

Let's first get a preliminary impression from the official Demo:

  1. @RestController
  2. public class DemoController {
  3. private CircuitBreakerFactory circuitBreakerFactory;
  4. private HttpBinService httpBin;
  5. public DemoController(CircuitBreakerFactory circuitBreakerFactory, HttpBinService httpBinService) {
  6. this.circuitBreakerFactory = circuitBreakerFactory;
  7. this.httpBin = httpBinService;
  8. }
  9. @GetMapping( "/delay/{seconds}" )
  10. public Map delay(@PathVariable int seconds) {
  11. return circuitBreakerFactory. create ( "delay" ).run(httpBin.delaySuppplier(seconds), t -> {
  12. Map<String, String> fallback = new HashMap<>();
  13. fallback.put( "hello" , "world" );
  14. return fallback;
  15. });
  16. }
  17. }

Thousands of words, summed up in one sentence circuitBreakerFactory.create("delay").run()

Because it is abstract, there are many corresponding implementations.

Currently supported implementations are:

  • Hystrix
  • Resilience4j
  • Sentinel
  • Spring Retry

Abstraction is equivalent to setting a standard. Like JDBC, no matter we change the database to MySQL, Oracle or SQLite, the interface and other non-specific code do not need to be changed. The same is true for circuit breakers.

The circuit breaker factory here has standard creation methods. How the circuit breaker implementation intercepts and degrades when executing business logic here can be left to the specific implementation to complete.

This time, we take the open source Sentinel as an example to see how they block abnormal traffic.

First of all, because it is Spring Cloud, it will also be based on Spring Boot's Autoconfiguration. The following is the configuration class, where we can see that a factory is generated.

  1. public class SentinelCircuitBreakerAutoConfiguration {
  2. @Bean
  3. @ConditionalOnMissingBean(CircuitBreakerFactory.class)
  4. public CircuitBreakerFactory sentinelCircuitBreakerFactory() {
  5. return new SentinelCircuitBreakerFactory();
  6. }
  7. }

When we actually execute the logic in the code, what is created?

It is a circuit breaker CircuitBreaker, used to execute code.

  1. public interface CircuitBreaker {
  2.  
  3. default <T> T run(Supplier<T> toRun) {
  4. return run(toRun, throwable -> {
  5. throw new NoFallbackAvailableException( "No fallback available." , throwable);
  6. });
  7. };
  8. <T> T run(Supplier<T> toRun, Function <Throwable, T> fallback);
  9. }

Contains two execution methods, and can specify fallback logic when needed. Specifically for Sentinel:

  1. public CircuitBreaker create (String id) {
  2. SentinelConfigBuilder.SentinelCircuitBreakerConfiguration conf = getConfigurations()
  3. .computeIfAbsent(id, defaultConfiguration);
  4. return new SentinelCircuitBreaker(id, conf.getEntryType(), conf.getRules());
  5. }

You will see that a SentinelCircuitBreaker is created. Our business logic will be executed in this circuit breaker, and the run method is the stage for each specific implementation.

  1. @Override
  2. public <T> T run(Supplier<T> toRun, Function <Throwable, T> fallback) {
  3. Entry entry = null ;
  4. try {
  5. entry = SphU.entry(resourceName, entryType);
  6. // If the SphU.entry() does not throw `BlockException`, it means that the
  7. // request can pass.
  8. return toRun.get();
  9. }
  10. catch (BlockException ex) {
  11. // SphU.entry() may throw BlockException which indicates that
  12. // the request was rejected (flow control or circuit breaking triggered).
  13. // So it should not be counted as the business exception.
  14. return fallback.apply(ex);
  15. }
  16. catch (Exception ex) {
  17. // For other kinds of exceptions, we'll trace the exception count via
  18. // Tracer.trace(ex).
  19. Tracer.trace(ex);
  20. return fallback.apply(ex);
  21. }
  22. finally {
  23. // Guarantee the invocation has been completed.
  24. if (entry != null ) {
  25. entry.exit();
  26. }
  27. }
  28. }

OK, so far, Spring Cloud CircuitBreaker has been presented. Other details are put in the specific implementation "box". Now let's open this box.

Sentinel is a circuit breaker and downgrade framework. The official introduction is as follows:

The high-availability flow control component for distributed service architecture mainly takes flow as the entry point, and helps users ensure the stability of microservices from multiple dimensions such as flow control, circuit breaking and degradation, and system adaptive protection.

This screenshot of the code on the official website succinctly explains how it works.

It stands in front of the business code, and when something happens, it will rush to it first. Only after it can pass, the business logic will be followed. It is really similar to various levels.

In the run method of CircuitBreaker above, we must have noticed this sentence

  1. entry = SphU.entry(resourceName, entryType);

This is the secret of all interceptions.

Whether we use the CircuitBreaker method mentioned above, the @SentinelResource annotation method, or the Interceptor method, there is no essential difference. The only difference is the trigger point. In the end, it is all done through SphU.

Since it is an interception, it must be stopped and checked in one way or another.

During the actual inspection, the core codes in the entry are as follows:

  1. Entry entryWithPriority(ResourceWrapper resourceWrapper, ...)
  2. throws BlockException {
  3. ProcessorSlot<Object> chain = lookProcessChain(resourceWrapper);
  4. Entry e = new CtEntry(resourceWrapper, chain, context);
  5. try {
  6. chain.entry(context, resourceWrapper,...);
  7. } catch (BlockException e1) {
  8. e.exit( count , args);
  9. throw e1;
  10. }
  11. return e;
  12. }

Note that ProcessorSlot chain = lookProcessChain(resourceWrapper); will be initialized when a request comes in for processing. If the processing chain is not initialized, various first and next settings will be set, and subsequent requests will be processed according to this. All slots that need to be intercepted will be added to this chain, and then the slots in the chain will be executed one by one. Similar to Servlet Filter.

What's added to the chain?

  1. public class HotParamSlotChainBuilder implements SlotChainBuilder {
  2. public ProcessorSlotChain build() {
  3. ProcessorSlotChain chain = new DefaultProcessorSlotChain();
  4. chain.addLast(new NodeSelectorSlot());
  5. chain.addLast(new ClusterBuilderSlot());
  6. chain.addLast(new LogSlot());
  7. chain.addLast(new StatisticSlot());
  8. chain.addLast(new ParamFlowSlot());
  9. chain.addLast(new SystemSlot());
  10. chain.addLast(new AuthoritySlot());
  11. chain.addLast(new FlowSlot());
  12. chain.addLast(new DegradeSlot());
  13. return chain;
  14. }

Initially, first points to an anonymous inner class. These added slots will be used as the next in the chain each time addLast is called.

  1. AbstractLinkedProcessorSlot<?> end = first ;
  2.  
  3. @Override
  4. public void addFirst(AbstractLinkedProcessorSlot<?> protocolProcessor) {
  5. protocolProcessor.setNext( first .getNext());
  6. first .setNext(protocolProcessor);
  7. if ( end == first ) {
  8. end = protocolProcessor;
  9. }
  10. }
  11. @Override
  12. public void addLast(AbstractLinkedProcessorSlot<?> protocolProcessor) {
  13. end .setNext(protocolProcessor);
  14. end = protocolProcessor;
  15. }

Each slot has its own specific use. After processing its own logic, it will trigger the execution of the next slot through fireEntry.

Giving you a long thread call stack would make it too obvious:

  1. java.lang.Thread.State: RUNNABLE
  2. at com.alibaba.csp.sentinel.slots.block.flow.FlowSlot.checkFlow(FlowSlot.java:168)
  3. at com.alibaba.csp.sentinel.slots.block.flow.FlowSlot.entry(FlowSlot.java:161)
  4. at com.alibaba.csp.sentinel.slots.block.flow.FlowSlot.entry(FlowSlot.java:139)
  5. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  6. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  7. at com.alibaba.csp.sentinel.slots.block.authority.AuthoritySlot.entry(AuthoritySlot.java:39)
  8. at com.alibaba.csp.sentinel.slots.block.authority.AuthoritySlot.entry(AuthoritySlot.java:33)
  9. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  10. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  11. at com.alibaba.csp.sentinel.slots.system.SystemSlot.entry(SystemSlot.java:36)
  12. at com.alibaba.csp.sentinel.slots.system.SystemSlot.entry(SystemSlot.java:30)
  13. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  14. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  15. at com.alibaba.csp.sentinel.slots.block.flow.param.ParamFlowSlot.entry(ParamFlowSlot.java:39)
  16. at com.alibaba.csp.sentinel.slots.block.flow.param.ParamFlowSlot.entry(ParamFlowSlot.java:33)
  17. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  18. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  19. at com.alibaba.csp.sentinel.slots.statistic.StatisticSlot.entry(StatisticSlot.java:57)
  20. at com.alibaba.csp.sentinel.slots.statistic.StatisticSlot.entry(StatisticSlot.java:50)
  21. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  22. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  23. at com.alibaba.csp.sentinel.slots.logger.LogSlot.entry(LogSlot.java:35)
  24. at com.alibaba.csp.sentinel.slots.logger.LogSlot.entry(LogSlot.java:29)
  25. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  26. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  27. at com.alibaba.csp.sentinel.slots.clusterbuilder.ClusterBuilderSlot.entry(ClusterBuilderSlot.java:101)
  28. at com.alibaba.csp.sentinel.slots.clusterbuilder.ClusterBuilderSlot.entry(ClusterBuilderSlot.java:47)
  29. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  30. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  31. at com.alibaba.csp.sentinel.slots.nodeselector.NodeSelectorSlot.entry(NodeSelectorSlot.java:171)
  32. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  33. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.fireEntry(AbstractLinkedProcessorSlot.java:32)
  34. at com.alibaba.csp.sentinel.slotchain.DefaultProcessorSlotChain$1.entry(DefaultProcessorSlotChain.java:31)
  35. at com.alibaba.csp.sentinel.slotchain.AbstractLinkedProcessorSlot.transformEntry(AbstractLinkedProcessorSlot.java:40)
  36. at com.alibaba.csp.sentinel.slotchain.DefaultProcessorSlotChain.entry(DefaultProcessorSlotChain.java:75)
  37. at com.alibaba.csp.sentinel.CtSph.entryWithPriority(CtSph.java:148)
  38. at com.alibaba.csp.sentinel.CtSph.entryWithType(CtSph.java:347)
  39. at com.alibaba.csp.sentinel.CtSph.entryWithType(CtSph.java:340)
  40. at com.alibaba.csp.sentinel.SphU.entry(SphU.java:285)

There are three types of downgrades

Each type will be compared with the corresponding configuration item data. If it does not match, it will be interrupted. It cannot be interrupted forever. When will it be restored? According to the configured time window, a recovery thread will be started, and it will be scheduled to restore the interruption flag when the time comes.

  1. public boolean passCheck(Context context, DefaultNode node, int acquireCount, Object... args) {
  2. if (cut.get()) {
  3. return   false ;
  4. }
  5. ClusterNode clusterNode = ClusterBuilderSlot.getClusterNode(this.getResource());
  6. if (clusterNode == null ) {
  7. return   true ;
  8. }
  9. if (grade == RuleConstant.DEGRADE_GRADE_RT) {
  10. double rt = clusterNode.avgRt();
  11. if (rt < this. count ) {
  12. passCount.set (0);
  13. return   true ;
  14. }
  15. // Sentinel will degrade the service only if count exceeds.
  16. if (passCount.incrementAndGet() < rtSlowRequestAmount) {
  17. return   true ;
  18. }
  19. } else if (grade == RuleConstant.DEGRADE_GRADE_EXCEPTION_RATIO) {
  20. double exception = clusterNode.exceptionQps();
  21. double success = clusterNode.successQps();
  22. double total = clusterNode.totalQps();
  23. // If total amount is less than minRequestAmount, the request will pass.
  24. if (total < minRequestAmount) {
  25. return   true ;
  26. }
  27. // In the same aligned statistic time window,
  28. // "success" (aka. completed count ) = exception count + non-exception count (realSuccess)
  29. double realSuccess = success - exception;
  30. if (realSuccess <= 0 && exception < minRequestAmount) {
  31. return   true ;
  32. }
  33. if (exception / success < count ) {
  34. return   true ;
  35. }
  36. } else if (grade == RuleConstant.DEGRADE_GRADE_EXCEPTION_COUNT) {
  37. double exception = clusterNode.totalException();
  38. if (exception < count ) {
  39. return   true ;
  40. }
  41. }
  42. if (cut.compareAndSet( false , true )) {
  43. ResetTask resetTask = new ResetTask(this);
  44. pool.schedule(resetTask, timeWindow, TimeUnit.SECONDS);
  45. }
  46. return   false ;
  47. }

The recovery process does two things: 1. Set passCount to 0, 2. Restore the interrupt flag

The above introduces the interception and processing of requests. The core of these two, which are also our main configurations, are "flow control" and "downgrade". These two corresponding slots will be judged according to the configured "rules" when processing requests. For example, the time window, fuse time, etc., as well as the number of threads and QPS of flow control, etc.

These rules are configured in memory by default, and can also be loaded from different data sources. If the Sentinel console is enabled, rules can also be configured in the console. These rules will be sent via HTTP to the corresponding application instance node using Sentinel.

This article is reprinted from the WeChat public account "Tomcat Things", which can be followed through the following QR code. To reprint this article, please contact the Tomcat Things public account.

<<:  Accelerate the release of new infrastructure value with data as the core

>>:  F5G, not so mysterious

Recommend

I would like to say a few more words about this communication failure...

​These days, everyone is paying attention to the ...

SRv6—A killer for 5G technology implementation

The development of 5G services has put forward hi...

Contact centers meet the needs of more connected customers

Call centers took center stage when the coronavir...

Key considerations for deploying Wi-Fi 6

IT managers looking to benefit from Wi-Fi 6 techn...

Five IoT business models that will make you profitable

IoT products have the ability to collect data, cr...

China successfully launches the world's first quantum satellite "Micius"

At 01:40 on August 16, China successfully launche...

5G standard draft released: it’s not just the speed that changes

The Mobile World Congress, the most influential a...

AlienVPS: $5/month KVM-2GB/50GB/1Gbps unlimited traffic/Los Angeles data center

I searched AlienVPS in the blog and found that it...

Detailed explanation of TCP data segment format + UDP data segment format

TCP Message Format TCP (Transmission Control Prot...

5G and Net Zero: Can the Two Overlap?

As COP27 wraps up this year’s agenda, a number of...