Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Limiter extension interface for memorylimiterextension draft #12601

Closed
wants to merge 5 commits into from

Conversation

jmacd
Copy link
Contributor

@jmacd jmacd commented Mar 11, 2025

Description

This demonstrates how the existing memorylimiter extension will be upgraded to support the proposed limiter extension interface.

Link to tracking issue

Part of #9591.

Testing

TODO

Documentation

TODO

Copy link

codecov bot commented Mar 11, 2025

Codecov Report

All modified and coverable lines are covered by tests ✅

Project coverage is 92.16%. Comparing base (79a0331) to head (722bae1).
Report is 11 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main   #12601      +/-   ##
==========================================
- Coverage   92.18%   92.16%   -0.02%     
==========================================
  Files         469      472       +3     
  Lines       25394    25572     +178     
==========================================
+ Hits        23409    23569     +160     
- Misses       1574     1591      +17     
- Partials      411      412       +1     

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

Copy link
Member

@bogdandrutu bogdandrutu left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Very nice. Thank you

// Copyright The OpenTelemetry Authors
// SPDX-License-Identifier: Apache-2.0

package limit // import "go.opentelemetry.io/collector/extension/xextension/limit"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Based on auth case, I think this should be consistent and be named extensionlimit

Comment on lines +14 to +21
type Extension interface {
extension.Extension

// GetClient will create a client for use by the specified
// component. The component can use the client to limit
// admission to the pipeline.
GetClient(ctx context.Context, kind component.Kind, id component.ID) (Client, error)
}
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Some questions/asks here:

  1. Need to be consistent with decision in [extensionauth] Split extensionauth.Client by protocol type #12574, and not include the extension.Extension into this.
  2. Do we need the "extra" client interface? Asking because we don't follow this pattern in extensionauth but we do this in storage extension. If we need that (there may be good reasons to have it), I would like to make the auth follow the same pattern. cc @mx-psi

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It makes more sense to me, without further context, to use the approach on my PR: if multiple instances of the client are required then the user can define multiple extensions (limiter/1, limiter/2...)

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I didn't mean to be inconsistent with #12574, sorry. That approach looks fine to me.

As noted, the "extra" interface appears valuable to me in the sense that static context (e.g., component metadata) can be used to specialize the limiting conditions at start time similar to x/storage. See my comment in #12603 (comment) on this topic. Today's configgrpc and confighttp helpers do not include the component metadata, so to be realistic I removed the extra parameters. If we remove the extra parameters and do not arrange to pass component metadata (e.g., signal kind, component ID) via context, then there is no reason for the extra interface.

See I opened several drafts--the copy you are commenting on, here, is an older iteration of mine, where I tried to follow the x/storage model before I realized it would not work. In #12600 the interface became simply GetLimiter(ctx), see https://github.com/open-telemetry/opentelemetry-collector/pull/12600/files#diff-8be8b8c994bb03af15a8c1a7cc8953d44053c7b40726d0ec99f365ca29eee608R19.

Comment on lines +51 to +52
// (2) the provided ctx becomes canceled, or
// (3) the limiter determines that the request should fail.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

To clarify, in this case returned err is not nil.

var nopClientInstance Client = &nopClient{}

// NewNopClient returns a nop client
func NewNopClient() Client {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We usually have this in a limittest package/module. Please follow that model.

@jmacd
Copy link
Contributor Author

jmacd commented Mar 12, 2025

See #12603 (comment).

@jmacd jmacd closed this Mar 12, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants