Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[netpath] Add option to disable intra-VPC pathtracing #33814

Open
wants to merge 7 commits into
base: main
Choose a base branch
from

Conversation

pimlu
Copy link
Contributor

@pimlu pimlu commented Feb 7, 2025

What does this PR do?

This PR adds the config network_path.collector.disable_intra_vpc_collection which allows us to try disabling dynamic path traceroutes on intra-VPC connections. Currently only supports EC2.

Motivation

Looking through our traceroute data, the majority of traceroutes come from jukebox, which is apparently a connectivity tester fabric uses. These traceroutes aren't useful because AWS handles the routing separately in a way that's invisible to traceroute - they are just a single hop.

Describe how you validated your changes

  1. Create two EC2 instances in the same VPC, set up an HTTP server on the second one.
  2. Start the agent with dynamic paths, but disable_intra_vpc_collection turned off.
    a. If you curl the other server, it should traceroute that path as usual
  3. Turn on disable_intra_vpc_collection and restart the agent
    a. If you curl the other server, it should NOT traceroute it.

Additionally in the flare, system-probe/vpc_subnets.log should contain what subnets it found for the EC2 instance, for example:

10.1.56.0/21
100.64.0.0/16
2600:1f18:6c3:d500::/56

Possible Drawbacks / Trade-offs

Something was wrong with the deb build, it 404'd the /traceroute API for system-probe when I was testing this

Additional Notes

@agent-platform-auto-pr
Copy link
Contributor

agent-platform-auto-pr bot commented Feb 7, 2025

Static quality checks ✅

Please find below the results from static quality gates

Successful checks

Info

Result Quality gate On disk size On disk size limit On wire size On wire size limit
static_quality_gate_agent_deb_amd64 791.69MiB 801.8MiB 192.63MiB 202.62MiB
static_quality_gate_agent_deb_arm64 783.07MiB 793.14MiB 174.21MiB 184.51MiB
static_quality_gate_agent_rpm_amd64 791.81MiB 801.79MiB 195.06MiB 205.03MiB
static_quality_gate_agent_rpm_arm64 783.02MiB 793.09MiB 176.39MiB 186.44MiB
static_quality_gate_agent_suse_amd64 791.82MiB 801.81MiB 195.06MiB 205.03MiB
static_quality_gate_agent_suse_arm64 783.17MiB 793.14MiB 176.39MiB 186.44MiB
static_quality_gate_dogstatsd_deb_amd64 37.67MiB 47.67MiB 9.78MiB 19.78MiB
static_quality_gate_dogstatsd_deb_arm64 36.27MiB 46.27MiB 8.49MiB 18.49MiB
static_quality_gate_dogstatsd_rpm_amd64 37.67MiB 47.67MiB 9.79MiB 19.79MiB
static_quality_gate_dogstatsd_suse_amd64 37.67MiB 47.67MiB 9.79MiB 19.79MiB
static_quality_gate_iot_agent_deb_amd64 59.24MiB 69.0MiB 14.89MiB 24.8MiB
static_quality_gate_iot_agent_deb_arm64 56.6MiB 66.4MiB 12.83MiB 22.8MiB
static_quality_gate_iot_agent_rpm_amd64 59.24MiB 69.0MiB 14.91MiB 24.8MiB
static_quality_gate_iot_agent_rpm_arm64 56.6MiB 66.4MiB 12.85MiB 22.8MiB
static_quality_gate_iot_agent_suse_amd64 59.24MiB 69.0MiB 14.91MiB 24.8MiB
static_quality_gate_docker_agent_amd64 876.15MiB 886.12MiB 294.21MiB 304.21MiB
static_quality_gate_docker_agent_arm64 890.8MiB 900.79MiB 280.49MiB 290.47MiB
static_quality_gate_docker_agent_jmx_amd64 1.05GiB 1.06GiB 369.31MiB 379.33MiB
static_quality_gate_docker_agent_jmx_arm64 1.05GiB 1.06GiB 351.56MiB 361.55MiB
static_quality_gate_docker_dogstatsd_amd64 45.81MiB 55.78MiB 17.28MiB 27.28MiB
static_quality_gate_docker_dogstatsd_arm64 44.47MiB 54.45MiB 16.16MiB 26.16MiB
static_quality_gate_docker_cluster_agent_amd64 264.95MiB 274.78MiB 106.34MiB 116.28MiB
static_quality_gate_docker_cluster_agent_arm64 280.91MiB 290.82MiB 101.19MiB 111.12MiB

@agent-platform-auto-pr
Copy link
Contributor

agent-platform-auto-pr bot commented Feb 7, 2025

Uncompressed package size comparison

Comparison with ancestor e1841bcbca0b8f1e31fd87bfcd6dc75b4ebdbea5

Diff per package
package diff status size ancestor threshold
datadog-agent-x86_64-rpm 0.03MB ⚠️ 827.69MB 827.66MB 0.50MB
datadog-agent-x86_64-suse 0.03MB ⚠️ 827.69MB 827.66MB 0.50MB
datadog-agent-amd64-deb 0.03MB ⚠️ 817.89MB 817.87MB 0.50MB
datadog-agent-aarch64-rpm 0.02MB ⚠️ 818.64MB 818.62MB 0.50MB
datadog-agent-arm64-deb 0.02MB ⚠️ 808.87MB 808.84MB 0.50MB
datadog-iot-agent-amd64-deb 0.02MB ⚠️ 62.04MB 62.02MB 0.50MB
datadog-iot-agent-x86_64-rpm 0.02MB ⚠️ 62.11MB 62.09MB 0.50MB
datadog-iot-agent-x86_64-suse 0.02MB ⚠️ 62.11MB 62.09MB 0.50MB
datadog-heroku-agent-amd64-deb 0.02MB ⚠️ 443.30MB 443.28MB 0.50MB
datadog-iot-agent-aarch64-rpm 0.01MB ⚠️ 59.34MB 59.33MB 0.50MB
datadog-iot-agent-arm64-deb 0.01MB ⚠️ 59.27MB 59.27MB 0.50MB
datadog-dogstatsd-x86_64-rpm 0.00MB 39.50MB 39.50MB 0.50MB
datadog-dogstatsd-x86_64-suse 0.00MB 39.50MB 39.50MB 0.50MB
datadog-dogstatsd-amd64-deb 0.00MB 39.42MB 39.42MB 0.50MB
datadog-dogstatsd-arm64-deb 0.00MB 37.96MB 37.96MB 0.50MB

Decision

⚠️ Warning

@agent-platform-auto-pr
Copy link
Contributor

agent-platform-auto-pr bot commented Feb 7, 2025

Test changes on VM

Use this command from test-infra-definitions to manually test this PR changes on a VM:

inv aws.create-vm --pipeline-id=57090142 --os-family=ubuntu

Note: This applies to commit 286f4cc

Copy link

cit-pr-commenter bot commented Feb 7, 2025

Regression Detector

Regression Detector Results

Metrics dashboard
Target profiles
Run ID: 54cde956-a913-40fa-b840-7e017e7c8471

Baseline: e1841bc
Comparison: 286f4cc
Diff

Optimization Goals: ✅ No significant changes detected

Fine details of change detection per experiment

perf experiment goal Δ mean % Δ mean % CI trials links
quality_gate_logs % cpu utilization +2.26 [-0.65, +5.17] 1 Logs
file_to_blackhole_0ms_latency egress throughput +0.02 [-0.75, +0.79] 1 Logs
file_to_blackhole_0ms_latency_http2 egress throughput +0.02 [-0.86, +0.89] 1 Logs
uds_dogstatsd_to_api ingress throughput +0.01 [-0.29, +0.30] 1 Logs
file_to_blackhole_100ms_latency egress throughput +0.01 [-0.62, +0.64] 1 Logs
file_to_blackhole_0ms_latency_http1 egress throughput +0.00 [-0.81, +0.82] 1 Logs
file_to_blackhole_300ms_latency egress throughput +0.00 [-0.63, +0.64] 1 Logs
tcp_dd_logs_filter_exclude ingress throughput -0.01 [-0.03, +0.01] 1 Logs
file_to_blackhole_500ms_latency egress throughput -0.06 [-0.85, +0.73] 1 Logs
quality_gate_idle_all_features memory utilization -0.15 [-0.20, -0.09] 1 Logs bounds checks dashboard
uds_dogstatsd_to_api_cpu % cpu utilization -0.39 [-1.27, +0.48] 1 Logs
file_to_blackhole_1000ms_latency egress throughput -0.44 [-1.21, +0.33] 1 Logs
file_to_blackhole_1000ms_latency_linear_load egress throughput -0.48 [-0.94, -0.02] 1 Logs
quality_gate_idle memory utilization -0.61 [-0.65, -0.58] 1 Logs bounds checks dashboard
file_tree memory utilization -0.83 [-0.88, -0.77] 1 Logs
tcp_syslog_to_blackhole ingress throughput -1.23 [-1.29, -1.17] 1 Logs

Bounds Checks: ✅ Passed

perf experiment bounds_check_name replicates_passed links
file_to_blackhole_0ms_latency lost_bytes 10/10
file_to_blackhole_0ms_latency memory_usage 10/10
file_to_blackhole_0ms_latency_http1 lost_bytes 10/10
file_to_blackhole_0ms_latency_http1 memory_usage 10/10
file_to_blackhole_0ms_latency_http2 lost_bytes 10/10
file_to_blackhole_0ms_latency_http2 memory_usage 10/10
file_to_blackhole_1000ms_latency memory_usage 10/10
file_to_blackhole_1000ms_latency_linear_load memory_usage 10/10
file_to_blackhole_100ms_latency lost_bytes 10/10
file_to_blackhole_100ms_latency memory_usage 10/10
file_to_blackhole_300ms_latency lost_bytes 10/10
file_to_blackhole_300ms_latency memory_usage 10/10
file_to_blackhole_500ms_latency lost_bytes 10/10
file_to_blackhole_500ms_latency memory_usage 10/10
quality_gate_idle intake_connections 10/10 bounds checks dashboard
quality_gate_idle memory_usage 10/10 bounds checks dashboard
quality_gate_idle_all_features intake_connections 10/10 bounds checks dashboard
quality_gate_idle_all_features memory_usage 10/10 bounds checks dashboard
quality_gate_logs intake_connections 10/10
quality_gate_logs lost_bytes 10/10
quality_gate_logs memory_usage 10/10

Explanation

Confidence level: 90.00%
Effect size tolerance: |Δ mean %| ≥ 5.00%

Performance changes are noted in the perf column of each table:

  • ✅ = significantly better comparison variant performance
  • ❌ = significantly worse comparison variant performance
  • ➖ = no significant change in performance

A regression test is an A/B test of target performance in a repeatable rig, where "performance" is measured as "comparison variant minus baseline variant" for an optimization goal (e.g., ingress throughput). Due to intrinsic variability in measuring that goal, we can only estimate its mean value for each experiment; we report uncertainty in that value as a 90.00% confidence interval denoted "Δ mean % CI".

For each experiment, we decide whether a change in performance is a "regression" -- a change worth investigating further -- if all of the following criteria are true:

  1. Its estimated |Δ mean %| ≥ 5.00%, indicating the change is big enough to merit a closer look.

  2. Its 90.00% confidence interval "Δ mean % CI" does not contain zero, indicating that if our statistical model is accurate, there is at least a 90.00% chance there is a difference in performance between baseline and comparison variants.

  3. Its configuration does not mark it "erratic".

CI Pass/Fail Decision

Passed. All Quality Gates passed.

  • quality_gate_idle_all_features, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_idle_all_features, bounds check intake_connections: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check intake_connections: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check lost_bytes: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_idle, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_idle, bounds check intake_connections: 10/10 replicas passed. Gate passed.

@pimlu pimlu marked this pull request as ready for review February 7, 2025 15:06
@pimlu pimlu requested review from a team as code owners February 7, 2025 15:06
@@ -156,13 +159,54 @@ func makePathtest(conn *model.Connection, dns map[string]*model.DNSEntry) common
}
}

func (s *npCollectorImpl) shouldScheduleNetworkPathForConn(conn *model.Connection, subnetsToSkip []*net.IPNet) bool {
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I moved this into npCollectorImpl in order to get access to statsd telemetry

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good idea.

@pimlu pimlu added changelog/no-changelog qa/done QA done before merge and regressions are covered by tests labels Feb 7, 2025
return false
}
remoteIP := net.ParseIP(conn.Raddr.Ip)
if remoteIP.IsLoopback() || conn.IntraHost {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You could check IntraHost earlier to avoid the ParseIP call as it can be expensive.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Technically unrelated to this PR since Stuart is only moving this function.

But agree with Hasan's suggestion :)

if remoteIP.IsLoopback() || conn.IntraHost {
return false
}
if conn.Family != model.ConnectionFamily_v4 {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same for this, you can check this right at the beginning of the function.

Copy link
Contributor

@rahulkaukuntla rahulkaukuntla left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good from Agent Configuration

@mbakht mbakht removed their request for review February 19, 2025 22:06
return subnet.Contains(remoteIP)
})
if shouldSkipSubnet {
s.statsdClient.Incr("datadog.network_path.collector.skipped_because_subnet", nil, 1) //nolint:errcheck
Copy link
Member

@AlexandreYang AlexandreYang Feb 20, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we use a metric like:

s.statsdClient.Incr("datadog.network_path.collector.conns_skipped", []string{"reason:skip_intra_vpc"}, 1) //nolint:errcheck

Then add the same metric to the other cases above:

s.statsdClient.Incr("datadog.network_path.collector.conn_skipped", []string{"reason:skip_ipv6"}, 1)
s.statsdClient.Incr("datadog.network_path.collector.conn_skipped", []string{"reason:skip_loopback"}, 1)
s.statsdClient.Incr("datadog.network_path.collector.conn_skipped", []string{"reason:skip_intra_host"}, 1)

I think it makes it more friendly to use this metric with a reason tag, compare to having a separate metric for each case.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@pimlu It would be idea, if you can make the metric name consistent with #33767

So, since we have datadog.network_path.collector.conns_received

I think datadog.network_path.collector.conns_skipped + reason:XX tag can make most sense.

WDYT?

return ipNet
}

func Test_npCollectorImpl_shouldScheduleNetworkPathForConn_subnets(t *testing.T) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is seems that the new entries here can be included in Test_npCollectorImpl_shouldScheduleNetworkPathForConn table tests no?

They are both testing the same function.

}

// GetVPCSubnetsForHost gets all the subnets in the VPCs this host has network interfaces for
func GetVPCSubnetsForHost(ctx context.Context) ([]*net.IPNet, error) {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you unit test this?

@@ -98,3 +98,50 @@ func GetSubnetForHardwareAddr(ctx context.Context, hwAddr net.HardwareAddr) (sub
subnet.Cidr = strings.TrimSpace(resp)
return
}

var vpcSubnetFetcher = cachedfetch.Fetcher{
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could you unit test logic of this new code?

@pimlu pimlu force-pushed the stuart.geipel/disable-intra-vpc branch from 143d1d2 to d384137 Compare February 25, 2025 23:24
@github-actions github-actions bot added long review PR is complex, plan time to review it and removed medium review PR review might take time labels Feb 25, 2025
)

const (
networkPathCollectorMetricPrefix = "datadog.network_path.collector."
reverseDNSLookupMetricPrefix = networkPathCollectorMetricPrefix + "reverse_dns_lookup."
reverseDNSLookupFailuresMetricName = reverseDNSLookupMetricPrefix + "failures"
reverseDNSLookupSuccessesMetricName = reverseDNSLookupMetricPrefix + "successes"
netpathConnsSkippedMetricName = networkPathCollectorMetricPrefix + "conns_skipped"
Copy link
Member

@AlexandreYang AlexandreYang Feb 26, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
netpathConnsSkippedMetricName = networkPathCollectorMetricPrefix + "conns_skipped"
netpathConnsSkippedMetricName = networkPathCollectorMetricPrefix + "schedule.conns_skipped"

To be consistent with:

datadog.network_path.collector.schedule.conns_received

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
changelog/no-changelog long review PR is complex, plan time to review it qa/done QA done before merge and regressions are covered by tests team/network-device-monitoring team/networks
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants