-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Standardize traffic metrics across traffic sources #354
Comments
@tomkerkhove I really like the idea of having a KEDA-wide standard for HTTP metrics based on the OTEL semantics, so +1 to that. One thing that we should consider having, though, is that the interceptors should be able to push some (primitive) metrics down to external scalers. Doing so would allow for a completely push-based notification system from interceptor -> external scaler -> KEDA itself, and gives us the capability of scaling from zero more quickly. |
Can you elaborate a bit more what you want to achieve here? I presume you mean the external scaler of HTTP add-on then or? |
@tomkerkhove my basic ask is to reduce the latency between when a request comes into the cluster and when the external scaler (and thus, KEDA) knows about it. I'd love to see whether we can design something to push appropriate metrics from "edge" (ingress controllers and/or service meshes) to external scaler |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed in 7 days if no further activity occurs. Thank you for your contributions. |
Could this be related? #910 |
That one feels more to operator HTTP add-on rather than a source of scaling, no? |
@JorTurFer Any Plans for this work to be executed soon. I think it will add much to the Http Add On Traffic to avoid adding another Http Proxy (Interceptor) into the mix? |
WDYT? Improving the metrics won't get rid of the interceptor requirement, as the interceptor is the key stone that enables scaling from/to 0 |
As per #350 our goal is to support various traffic flavors and support them in a neutral way.
The tricky thing here is that there is no standard way of having metrics for these traffic flows and we have to provide our own, use metrics from ingress controllers, or rely on Service Mesh Interface's Traffic Metrics API.
We should move to a standardized approach so that:
Proposal
OpenTelemetry Metrics are about to go stable and is an open standard for using metrics in systems.
Standardizing on OpenTelemetry & its Collector
Our interceptor should be changed so that it can publish its metrics to an OpenTelemetry Collector so that we can bring the metrics where we need them and end-users can re-use these metrics for their own purposes:
These metrics should comply with the defined HTTP semantics as per this doc.
Once the metrics are available, we can choose one of the existing exporters (full overview) to consume the metrics by pushing metrics to our external scaler directly (HTTP-based or gRPC-based, preferred approach) or through an external system such as Prometheus (less preferred).
When end-users install the HTTP add-on, we should automatically install a collector, unless they opt-out and configure a different endpoint. However, ideally, we fully manage and configure the collector with all the bells and whistles that we need.
Bringing existing traffic metrics into our standardized metrics approach
In order to bring existing traffic metrics into our way of working we will need two components:
receiver
processor
to transform the source metrics format to our standardized metrics format (learn more)Some traffic sources might already be supported through an existing
receiver
.For example, it would make sense to have an SMI-receiver that we can rely on instead of rolling our own. (servicemeshinterface/smi-spec#199)
Traffic Metrics Spec
SMI has its Traffic Metrics spec and OpenTelemetry is defining semantics for HTTP metrics.
We should aim to use those before rolling our own standard.
The text was updated successfully, but these errors were encountered: