SlideShare a Scribd company logo
1 of 230
High Performance
Network Programming on the JVM
OSCON, July 2012
Erik Onnen
About Me
•   Director of Architecture and Delivery at Urban Airship
•   Most of my career biased towards performance and scale
•   Java, Python, C++ in service oriented architectures
In this Talk



•   WTF is an “Urban Airship”?
•   Networked Systems on the JVM
•   Choosing a framework
•   Critical learnings
•   Q&A
About This Talk
You probably won’t like this talk if you:
About This Talk
You probably won’t like this talk if you:
•   Are willing to give up orders of magnitude in performance
    for a slower runtime or language
About This Talk
You probably won’t like this talk if you:
•   Are willing to give up orders of magnitude in performance
    for a slower runtime or language
•   Enjoy spending money on virtualized servers (e.g. ec2)
About This Talk
You probably won’t like this talk if you:
•   Are willing to give up orders of magnitude in performance
    for a slower runtime or language
•   Enjoy spending money on virtualized servers (e.g. ec2)
•   Think that a startup should’t worry about CoGS
About This Talk
You probably won’t like this talk if you:
•   Are willing to give up orders of magnitude in performance
    for a slower runtime or language
•   Enjoy spending money on virtualized servers (e.g. ec2)
•   Think that a startup should’t worry about CoGS
•   Think that writing code is the hardest part of a developer’s
    job
About This Talk
You probably won’t like this talk if you:
•   Are willing to give up orders of magnitude in performance
    for a slower runtime or language
•   Enjoy spending money on virtualized servers (e.g. ec2)
•   Think that a startup should’t worry about CoGS
•   Think that writing code is the hardest part of a developer’s
    job
•   Think async for all the things
Lexicon
What makes something “High Performance”?
Lexicon
What makes something “High Performance”?
•   Low Latency - I’m doing an operation that includes a
    request/reply
•   Throughput - how many operations can I drive through my
    architecture at one time?
•   Productivity - how quickly can I create a new operation? A
    new service?
•   Sustainability - when a service breaks, what’s the time to
    RCA
•   Fault tolerance
WTF is an Urban Airship?

•   Fundamentally, an engagement platform
•   Buzzword compliant - Cloud Service providing an API for
    Mobile
•   Unified API for services across platforms for messaging,
    location, content entitlements, in-app purchase
•   SLAs for throughput, latency
•   Heavy users and contributors to HBase, ZooKeeper,
    Cassandra
WTF is an Urban Airship?
What is Push?

•   Cost
•   Throughput and immediacy
•   The platform makes it compelling
    •   Push can be intelligent
    •   Push can be precisely targeted
•   Deeper measurement of user engagement
How does this relate to the JVM?

 •   We deal with lots of heterogeneous connections from the
     public network, the vast majority of them are handled by a
     JVM
 •   We perform millions of operations per second across our
     LAN
 •   Billions and billions of discrete system events a day
 •   Most of those operations are JVM-JVM
We Lived Through...
We Lived Through...
Distributed Systems on the JDK
•   Platform has several tools baked in
    •   HTTP Client and Server
    •   RMI (Remote Method Invocation) or better JINI
    •   CORBA/IIOP
    •   JDBC
•   Lower level
    •   Sockets + streams, channels + buffers
    •   Java5 brought NIO which included Async I/O
•   High performance, high productivity platform when used correctly
•   Missing some low-level capabilities
Synchronous vs. Async I/O
Synchronous vs. Async I/O
•   Synchronous Network I/O on the JRE
    •   Sockets (InputStream, OutputStream)
    •   Channels and Buffers
•   Asynchronous Network I/O on the JRE
    •   Selectors (async)
    •   Buffers fed to Channels which are asynchronous
    •   Almost all asynchronous APIs are for Socket I/O
•   Can operate on direct, off heap buffers
•   Offer decent low-level configuration options
Synchronous vs. Async I/O

•   Synchronous I/O has many upsides on the JVM
    •   Clean streaming - good for moving around really large
        things
    •   Sendfile support for MMap’d files
        (FileChannel::transferTo)
    •   Vectored I/O support
    •   No need for additional SSL abstractions (except for
        maybe Keystore cruft)
    •   No idiomatic impedance for RPC
Synchronous vs. Async I/O
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
        •   Minimize trips across the system boundary
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
        •   Minimize trips across the system boundary
        •   Minimize copies of data
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
        •   Minimize trips across the system boundary
        •   Minimize copies of data
        •   Vector I/O if possible
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
        •   Minimize trips across the system boundary
        •   Minimize copies of data
        •   Vector I/O if possible
        •   MMap if possible
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
        •   Minimize trips across the system boundary
        •   Minimize copies of data
        •   Vector I/O if possible
        •   MMap if possible
    •   Favor direct ByteBufffers and NIO Channels
Synchronous vs. Async I/O
•   Synchronous I/O - doing it well
    •   Buffers all the way down (streams, readers, channels)
        •   Minimize trips across the system boundary
        •   Minimize copies of data
        •   Vector I/O if possible
        •   MMap if possible
    •   Favor direct ByteBufffers and NIO Channels
    •   Netty does support sync. I/O but it feels tedious on that
        abstraction
Synchronous vs. Async I/O
Synchronous vs. Async I/O
•   Async I/O
    •   On Linux, implemented via epoll as the “Selector”
        abstraction with async Channels
    •   Async Channels fed buffers, you have to tend to fully
        reading/writing them
•   Async I/O - doing it well
    •   Again, favor direct ByteBuffers, especially for large data
    •   Consider the application - what do you gain by not
        waiting for a response?
    •   Avoid manual TLS operations
Sync vs. Async - FIGHT!
Async I/O Wins:
Sync vs. Async - FIGHT!
Async I/O Wins:
•   Large numbers of clients
Sync vs. Async - FIGHT!
Async I/O Wins:
•   Large numbers of clients
•   Only way to be notified if a socket is
    closed without trying to read it
Sync vs. Async - FIGHT!
Async I/O Wins:
•   Large numbers of clients
•   Only way to be notified if a socket is
    closed without trying to read it
•   Large number of open sockets
Sync vs. Async - FIGHT!
Async I/O Wins:
•   Large numbers of clients
•   Only way to be notified if a socket is
    closed without trying to read it
•   Large number of open sockets
•   Lightweight proxying of traffic
Sync vs. Async - FIGHT!
Async I/O Loses:
Sync vs. Async - FIGHT!
Async I/O Loses:
•   Context switching, CPU cache
    pipeline loss can be substantial
    overhead for simple protocols
Sync vs. Async - FIGHT!
Async I/O Loses:
•   Context switching, CPU cache
    pipeline loss can be substantial
    overhead for simple protocols
•   Not always the best option for raw,
    full bore throughput
Sync vs. Async - FIGHT!
Async I/O Loses:
•   Context switching, CPU cache
    pipeline loss can be substantial
    overhead for simple protocols
•   Not always the best option for raw,
    full bore throughput
•   Complexity, ability to reason about
    code diminished
Sync vs. Async - FIGHT!
Async I/O Loses:




http://www.youtube.com/watch?v=bzkRVzciAZg&feature=player_detailpage#t=133s
Sync vs. Async - FIGHT!
Sync I/O Wins:
Sync vs. Async - FIGHT!
Sync I/O Wins:
•   Simplicity, readability
Sync vs. Async - FIGHT!
Sync I/O Wins:
•   Simplicity, readability
•   Better fit for dumb protocols, less
    impedance for request/reply
Sync vs. Async - FIGHT!
Sync I/O Wins:
•   Simplicity, readability
•   Better fit for dumb protocols, less
    impedance for request/reply
•   Squeezing every bit of throughput
    out of a single host, small number of
    threads
Sync vs. Async - Memcache

•   UA uses memcached heavily
•   memcached is an awesome example of why choosing
    Sync vs. Async is hard
•   Puts always should be completely asynchronous
•   Reads are fairly useless when done asynchronously
•   Protocol doesn’t lend itself well to Async I/O
•   For Java clients, we experimented with Xmemcached but
    didn’t like its complexity, I/O approach
•   Created FSMC (freakin’ simple memcache client)
FSMC vs. Xmemcached
                                   Synch vs. Async Memcache Client Throughput
                     60000
SET/GET per Second




                     45000




                     30000




                     15000




                         0
                             1      2        4     8          16     32    56   128
                                                    Threads

                                 FSMC (no nagle)       FSMC        Xmemcached
FSMC vs. Xmemcached
FSMC:                                                                  Xmemcached:
% time seconds usecs/call calls errors syscall                         % time seconds usecs/call calls errors syscall
------ ----------- ----------- --------- --------- ----------------    ------ ----------- ----------- --------- --------- ----------------
 99.97 143.825726               11811 12177               2596 futex    54.87 875.668275                4325 202456                   epoll_wait
  0.01 0.014143                  0 402289                 read          45.13 720.259447                 454 1587899 130432 futex
  0.01 0.011088                  0 200000                 writev         0.00 0.020783                  3      6290            sched_yield
  0.01 0.008087                  0 200035                 write          0.00 0.011119                 0 200253                 write
  0.00 0.002831                  0 33223                 mprotect        0.00 0.008682                  0 799387               2 epoll_ctl
  0.00 0.001664                 12        139           madvise          0.00 0.003759                  0 303004 100027 read
  0.00 0.000403                  1       681           brk               0.00 0.000066                  0      1099            mprotect
  0.00 0.000381                  0      1189            sched_yield      0.00 0.000047                  1        81          madvise
  0.00 0.000000                  0       120         59 open             0.00 0.000026                  0        92          sched_getaffinity
  0.00 0.000000                  0        68          close              0.00 0.000000                  0       126         59 open
  0.00 0.000000                  0       108         42 stat             0.00 0.000000                  0       148           close
  0.00 0.000000                  0        59          fstat              0.00 0.000000                  0       109         42 stat
  0.00 0.000000                  0       124          3 lstat            0.00 0.000000                  0        61          fstat
  0.00 0.000000                  0      2248            lseek            0.00 0.000000                  0       124          3 lstat
  0.00 0.000000                  0       210           mmap              0.00 0.000000                  0      2521            lseek
                                                                         0.00 0.000000                  0       292           mmap


14:37:31,568 INFO [main]                                               14:38:09,912 INFO [main]
[com.urbanairship.oscon.memcache.FsmcTest] Finished                    [com.urbanairship.oscon.memcache.XmemcachedTest]
800000 operations in 12659ms.                                          Finished 800000 operations in 18078ms.

real 0m12.881s                                                         real 0m18.248s
user 0m34.430s                                                         user 0m30.020s
sys 0m22.830s                                                          sys 0m16.700s
A Word on Garbage Collection
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
    •   Allocation is near free
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
    •   Allocation is near free
    •   Collection also near free if you don’t copy anything
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
    •   Allocation is near free
    •   Collection also near free if you don’t copy anything
•   Don’t buffer large things, stream or chunck
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
    •   Allocation is near free
    •   Collection also near free if you don’t copy anything
•   Don’t buffer large things, stream or chunck
•   When you must cache:
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
    •   Allocation is near free
    •   Collection also near free if you don’t copy anything
•   Don’t buffer large things, stream or chunck
•   When you must cache:
    •   Cache early and don’t touch
A Word on Garbage Collection
•   Any JVM service on most hardware has to live with GC
•   A good citizen will create lots of ParNew garbage and
    nothing more
    •   Allocation is near free
    •   Collection also near free if you don’t copy anything
•   Don’t buffer large things, stream or chunck
•   When you must cache:
    •   Cache early and don’t touch
    •   Better, cache off heap or use memcache
A Word on Garbage Collection
A Word on Garbage Collection




  GOOD
A Word on Garbage Collection




                BAD

  GOOD
A Word on Garbage Collection

When you care about throughput, the virtualization tax is high
                   ParNew GC Effectiveness
         300




         225




         150




          75




           0

                        MB Collected
                    Bare Metal     EC2 XL
About EC2...

When you care about throughput, the virtualization tax is high
                   Mean Time ParNew GC
       0.04


       0.03


       0.02


       0.01


         0
                     Collection Time (sec)
                   Bare Metal       EC2 XL
How we do at UA

•   Originally our codebase was mostly one giant monolithic
    application, over time several databases
•   Difficult to scale, technically and operationally
•   Wanted to break off large pieces of functionality into coarse
    grained services encapsulating their capability and function
•   Most message exchange was done using beanstalkd after
    migrating off RabbitMQ
•   Fundamentally, our business is message passing
Choosing A Framework
Choosing A Framework

•   All frameworks are a form of concession
Choosing A Framework

•   All frameworks are a form of concession
•   Nobody would use Spring if people called it “Concessions
    to the horrors of EJB”
Choosing A Framework

•   All frameworks are a form of concession
•   Nobody would use Spring if people called it “Concessions
    to the horrors of EJB”
•   Understand concessions when choosing, look for:
Choosing A Framework

•   All frameworks are a form of concession
•   Nobody would use Spring if people called it “Concessions
    to the horrors of EJB”
•   Understand concessions when choosing, look for:
    •   Configuration options - how do I configure Nagle
        behavior?
Choosing A Framework

•   All frameworks are a form of concession
•   Nobody would use Spring if people called it “Concessions
    to the horrors of EJB”
•   Understand concessions when choosing, look for:
    •   Configuration options - how do I configure Nagle
        behavior?
    •   Metrics - what does the framework tell me about its
        internals?
Choosing A Framework

•   All frameworks are a form of concession
•   Nobody would use Spring if people called it “Concessions
    to the horrors of EJB”
•   Understand concessions when choosing, look for:
    •   Configuration options - how do I configure Nagle
        behavior?
    •   Metrics - what does the framework tell me about its
        internals?
    •   Intelligent logging - next level down from metrics
Choosing A Framework

•   All frameworks are a form of concession
•   Nobody would use Spring if people called it “Concessions
    to the horrors of EJB”
•   Understand concessions when choosing, look for:
    •   Configuration options - how do I configure Nagle
        behavior?
    •   Metrics - what does the framework tell me about its
        internals?
    •   Intelligent logging - next level down from metrics
    •   How does the framework play with peers?
Frameworks - DO IT LIVE!
Frameworks - DO IT LIVE!
•   Our requirements:
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
    •   Simple protocol - easy to reason about, inspect
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
    •   Simple protocol - easy to reason about, inspect
    •   Efficient, flexible message format - Google Protocol
        Buffers
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
    •   Simple protocol - easy to reason about, inspect
    •   Efficient, flexible message format - Google Protocol
        Buffers
    •   Compostable - easily create new services
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
    •   Simple protocol - easy to reason about, inspect
    •   Efficient, flexible message format - Google Protocol
        Buffers
    •   Compostable - easily create new services
    •   Support both sync and async operations
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
    •   Simple protocol - easy to reason about, inspect
    •   Efficient, flexible message format - Google Protocol
        Buffers
    •   Compostable - easily create new services
    •   Support both sync and async operations
    •   Support for multiple languages (Python, Java, C++)
Frameworks - DO IT LIVE!
•   Our requirements:
    •   Capable of > 100K requests per second in aggregate
        across multiple threads
    •   Simple protocol - easy to reason about, inspect
    •   Efficient, flexible message format - Google Protocol
        Buffers
    •   Compostable - easily create new services
    •   Support both sync and async operations
    •   Support for multiple languages (Python, Java, C++)
    •   Simple configuration
Frameworks - DO IT LIVE!
Frameworks - DO IT LIVE!
•   Desirable:
Frameworks - DO IT LIVE!
•   Desirable:
    •   Discovery mechanism
Frameworks - DO IT LIVE!
•   Desirable:
    •   Discovery mechanism
    •   Predictable fault handling
Frameworks - DO IT LIVE!
•   Desirable:
    •   Discovery mechanism
    •   Predictable fault handling
    •   Adaptive load balancing
Frameworks - Akka

•   Predominantly Scala platform for sending messages,
    distributed incarnation of the Actor pattern
•   Message abstraction tolerates distribution well
•   If you like OTP, you’ll probably like Akka
Frameworks - Akka
Frameworks - Akka
Frameworks - Akka

•   Cons:
    •   We don’t like reading other people’s Scala
    •   Some pretty strong assertions in the docs that aren’t
        substantiated
    •   Bulky wire protocol, especially for primitives
    •   Configuration felt complicated
    •   Sheer surface area of the framework is daunting
    •   Unclear integration story with Python
Frameworks - Aleph

•   Clojure framework based on Netty, Lamina
•   Conceptually funs are applied to a channels to move
    around messages
•   Channels are refs that you realize when you want data
•   Operations with channels very easy
•   Concise format for standing up clients and services using
    text protocols
Frameworks - Aleph

•   Cons:
    •   Very high level abstraction, knobs are buried if they exist
    •   Channel concept leaky for large messages
    •   Documentation, tests
Frameworks - Netty
•   The preeminent framework for doing Async Network I/O
    on the JVM
•   Netty Channels backed by pipelines on top of Channels
•   Pros:
    •   Abstraction doesn’t hide the important pieces
    •   The only sane way to do TLS with Async I/O on the JVM
    •   Protocols well abstracted into pipeline steps
    •   Clean callback model for events of interest but optional in
        simple cases - no death by callback
    •   Many implementations of interesting protocols
Frameworks - Netty

•   Cons:
    •   Easy to make too many copies of the data
    •   Some old school bootstrap idioms
    •   Writes can occasionally be reordered
    •   Failure conditions can be numerous, difficult to reason
        about
    •   Simple things can feel difficult - UDP, simple request/reply
Frameworks - DO IT LIVE!
Frameworks - DO IT LIVE!
•   Considered but passed:
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
    •   Thrift
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
    •   Thrift
    •   Twitter’s Finagle
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
    •   Thrift
    •   Twitter’s Finagle
    •   Akka
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
    •   Thrift
    •   Twitter’s Finagle
    •   Akka
    •   ØMQ
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
    •   Thrift
    •   Twitter’s Finagle
    •   Akka
    •   ØMQ
    •   HTTP + JSON
Frameworks - DO IT LIVE!
•   Considered but passed:
    •   PB-RPC Implementations
    •   Thrift
    •   Twitter’s Finagle
    •   Akka
    •   ØMQ
    •   HTTP + JSON
    •   ZeroC Ice
Frameworks - DO IT LIVE!
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
•   Discovery (optional) using a defined tree of services in
    ZooKeeper
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
•   Discovery (optional) using a defined tree of services in
    ZooKeeper
•   Service instances periodically publish load factor to
    ZooKeeper for clients to inform routing decisions
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
•   Discovery (optional) using a defined tree of services in
    ZooKeeper
•   Service instances periodically publish load factor to
    ZooKeeper for clients to inform routing decisions
•   Rich metrics using Yammer Metrics
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
•   Discovery (optional) using a defined tree of services in
    ZooKeeper
•   Service instances periodically publish load factor to
    ZooKeeper for clients to inform routing decisions
•   Rich metrics using Yammer Metrics
•   Core service traits are part of the framework
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
•   Discovery (optional) using a defined tree of services in
    ZooKeeper
•   Service instances periodically publish load factor to
    ZooKeeper for clients to inform routing decisions
•   Rich metrics using Yammer Metrics
•   Core service traits are part of the framework
•   Service instances quiesce gracefully
Frameworks - DO IT LIVE!
•   Ultimately implemented our own using combination of
    Netty and Google Protocol Buffers called Reactor
•   Discovery (optional) using a defined tree of services in
    ZooKeeper
•   Service instances periodically publish load factor to
    ZooKeeper for clients to inform routing decisions
•   Rich metrics using Yammer Metrics
•   Core service traits are part of the framework
•   Service instances quiesce gracefully
•   Netty made UDP, Sync, Async. easy
Frameworks - DO IT LIVE!
•   All operations are Callables, services define a mapping b/t
    a request type and a Callable
•   Client API always returns a Future, sometimes it’s always
    materialized
•   Precise tuning from config files
What We Learned - In General
Frameworks - DO IT LIVE!
What We Learned - In General
What We Learned - In General

•   Straight through RPC was fairly easy, edge cases were
    hard
What We Learned - In General

•   Straight through RPC was fairly easy, edge cases were
    hard
•   ZooKeeper is brutal to program with, recover from errors
What We Learned - In General

•   Straight through RPC was fairly easy, edge cases were
    hard
•   ZooKeeper is brutal to program with, recover from errors
•   Discovery is also difficult - clients need to defend
    themselves, consider partitions
What We Learned - In General

•   Straight through RPC was fairly easy, edge cases were
    hard
•   ZooKeeper is brutal to program with, recover from errors
•   Discovery is also difficult - clients need to defend
    themselves, consider partitions
•   RPC is great for latency, but upstream pushback is
    important
What We Learned - In General

•   Straight through RPC was fairly easy, edge cases were
    hard
•   ZooKeeper is brutal to program with, recover from errors
•   Discovery is also difficult - clients need to defend
    themselves, consider partitions
•   RPC is great for latency, but upstream pushback is
    important
•   Save RPC for latency sensitive operations - use Kafka
What We Learned - In General

•   Straight through RPC was fairly easy, edge cases were
    hard
•   ZooKeeper is brutal to program with, recover from errors
•   Discovery is also difficult - clients need to defend
    themselves, consider partitions
•   RPC is great for latency, but upstream pushback is
    important
•   Save RPC for latency sensitive operations - use Kafka
•   RPC less than ideal for fan-out
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
•   RTO (retransmission timeout) and Karn and Jacobson’s
    Algorithms
What We Learned - TCP
•   RTO (retransmission timeout) and Karn and Jacobson’s
    Algorithms
    •   Linux defaults to 15 retry attempts, 3 seconds between
What We Learned - TCP
•   RTO (retransmission timeout) and Karn and Jacobson’s
    Algorithms
    •   Linux defaults to 15 retry attempts, 3 seconds between
    •   With no ACKs, congestion control kicks in and widens
        that 3 second window exponentially, thinking its
        congested
What We Learned - TCP
•   RTO (retransmission timeout) and Karn and Jacobson’s
    Algorithms
    •   Linux defaults to 15 retry attempts, 3 seconds between
    •   With no ACKs, congestion control kicks in and widens
        that 3 second window exponentially, thinking its
        congested
    •   Connection timeout can take up to 30 minutes
What We Learned - TCP
•   RTO (retransmission timeout) and Karn and Jacobson’s
    Algorithms
    •   Linux defaults to 15 retry attempts, 3 seconds between
    •   With no ACKs, congestion control kicks in and widens
        that 3 second window exponentially, thinking its
        congested
    •   Connection timeout can take up to 30 minutes
    •   Devices, Carriers and EC2 at scale eat FIN/RST
What We Learned - TCP
•   RTO (retransmission timeout) and Karn and Jacobson’s
    Algorithms
    •   Linux defaults to 15 retry attempts, 3 seconds between
    •   With no ACKs, congestion control kicks in and widens
        that 3 second window exponentially, thinking its
        congested
    •   Connection timeout can take up to 30 minutes
    •   Devices, Carriers and EC2 at scale eat FIN/RST
    •   Our systems think a device is still online at the time of a
        push
What We Learned - TCP
What We Learned - TCP
•   After changing the RTO
What We Learned - TCP
•   After changing the RTO
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP

•   Efficiency means understanding your traffic
What We Learned - TCP

•   Efficiency means understanding your traffic
•   Size send/recv buffers appropriately (defaults way too low
    for edge tier services)
What We Learned - TCP

•   Efficiency means understanding your traffic
•   Size send/recv buffers appropriately (defaults way too low
    for edge tier services)
•   Nagle! Non-duplex protocols can benefit significantly
What We Learned - TCP

•   Efficiency means understanding your traffic
•   Size send/recv buffers appropriately (defaults way too low
    for edge tier services)
•   Nagle! Non-duplex protocols can benefit significantly
•   Example: 19K message deliveries per second vs. 2K
What We Learned - TCP

•   Efficiency means understanding your traffic
•   Size send/recv buffers appropriately (defaults way too low
    for edge tier services)
•   Nagle! Non-duplex protocols can benefit significantly
•   Example: 19K message deliveries per second vs. 2K
•   Example: our protocol has a size frame, w/o Nagle that
    went in its own packet
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP
What We Learned - TCP

•   Don’t Nagle!
What We Learned - TCP

•   Don’t Nagle!
    •   Again, understand what your traffic is doing
What We Learned - TCP

•   Don’t Nagle!
    •   Again, understand what your traffic is doing
    •   Buffer and make one syscall instead of multiple
What We Learned - TCP

•   Don’t Nagle!
    •   Again, understand what your traffic is doing
    •   Buffer and make one syscall instead of multiple
    •   High-throughput RPC mechanisms disable it explicitly
What We Learned - TCP

•   Don’t Nagle!
    •   Again, understand what your traffic is doing
    •   Buffer and make one syscall instead of multiple
    •   High-throughput RPC mechanisms disable it explicitly
    •   See also:
What We Learned - TCP

•   Don’t Nagle!
    •   Again, understand what your traffic is doing
    •   Buffer and make one syscall instead of multiple
    •   High-throughput RPC mechanisms disable it explicitly
    •   See also:
        •   http://www.evanjones.ca/software/java-
            bytebuffers.html
What We Learned - TCP

•   Don’t Nagle!
    •   Again, understand what your traffic is doing
    •   Buffer and make one syscall instead of multiple
    •   High-throughput RPC mechanisms disable it explicitly
    •   See also:
        •   http://www.evanjones.ca/software/java-
            bytebuffers.html
        •   http://blog.boundary.com/2012/05/02/know-a-delay-
            nagles-algorithm-and-you/
About UDP...
About UDP...
About UDP...

•   Generally to be avoided
About UDP...

•   Generally to be avoided
•   Great for small unimportant data like memcache operations
    at extreme scale
About UDP...

•   Generally to be avoided
•   Great for small unimportant data like memcache operations
    at extreme scale
•   Bad for RPC when you care about knowing if your request
    was handled
About UDP...

•   Generally to be avoided
•   Great for small unimportant data like memcache operations
    at extreme scale
•   Bad for RPC when you care about knowing if your request
    was handled
•   Conditions where you most want your data are also the
    most likely to cause your data to be dropped
About TLS
About TLS

•   Try to avoid it - complex, slow and expensive, especially for
    internal services
About TLS

•   Try to avoid it - complex, slow and expensive, especially for
    internal services
•   ~6.5K and 4 hops to secure the channel
About TLS

•   Try to avoid it - complex, slow and expensive, especially for
    internal services
•   ~6.5K and 4 hops to secure the channel
•   40 bytes overhead per frame
About TLS

•   Try to avoid it - complex, slow and expensive, especially for
    internal services
•   ~6.5K and 4 hops to secure the channel
•   40 bytes overhead per frame
•   38.1MB overhead for every keep-alive sent to 1M devices
About TLS

•   Try to avoid it - complex, slow and expensive, especially for
    internal services
•   ~6.5K and 4 hops to secure the channel
•   40 bytes overhead per frame
•   38.1MB overhead for every keep-alive sent to 1M devices




    TLS source: http://netsekure.org/2010/03/tls-overhead/
We Learned About HTTPS
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
    •   TLS Handshake
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
    •   TLS Handshake
    •   HTTP Request
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
    •   TLS Handshake
    •   HTTP Request
    •   HTTP Response
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
    •   TLS Handshake
    •   HTTP Request
    •   HTTP Response
    •   TLS End
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
    •   TLS Handshake
    •   HTTP Request
    •   HTTP Response
    •   TLS End
    •   Server TIME_WAIT
We Learned About HTTPS
•   Thought we could ignore - basic plumbing of the internet
•   100s of millions of devices, performing 100s of millions of
    tiny request/reply cycles:
    •   TLS Handshake
    •   HTTP Request
    •   HTTP Response
    •   TLS End
    •   Server TIME_WAIT
•   Higher grade crypto eats more cycles
We Learned About HTTPS
We Learned About HTTPS
•   Corrective measures:
We Learned About HTTPS
•   Corrective measures:
    •   Reduce TIME_WAIT - 60 seconds too long for an HTTPS
        connection
We Learned About HTTPS
•   Corrective measures:
    •   Reduce TIME_WAIT - 60 seconds too long for an HTTPS
        connection
    •   Reduce non-critical HTTPS operations to lower cyphers
We Learned About HTTPS
•   Corrective measures:
    •   Reduce TIME_WAIT - 60 seconds too long for an HTTPS
        connection
    •   Reduce non-critical HTTPS operations to lower cyphers
    •   Offload TLS handshake to EC2
We Learned About HTTPS
•   Corrective measures:
    •   Reduce TIME_WAIT - 60 seconds too long for an HTTPS
        connection
    •   Reduce non-critical HTTPS operations to lower cyphers
    •   Offload TLS handshake to EC2
    •   Deployed Akamai for SSL/TCP offload and to pipeline
        device requests into our infrastructure
We Learned About HTTPS
•   Corrective measures:
    •   Reduce TIME_WAIT - 60 seconds too long for an HTTPS
        connection
    •   Reduce non-critical HTTPS operations to lower cyphers
    •   Offload TLS handshake to EC2
    •   Deployed Akamai for SSL/TCP offload and to pipeline
        device requests into our infrastructure
    •   Implement adaptive backoff at the client layer
We Learned About HTTPS
•   Corrective measures:
    •   Reduce TIME_WAIT - 60 seconds too long for an HTTPS
        connection
    •   Reduce non-critical HTTPS operations to lower cyphers
    •   Offload TLS handshake to EC2
    •   Deployed Akamai for SSL/TCP offload and to pipeline
        device requests into our infrastructure
    •   Implement adaptive backoff at the client layer
    •   Aggressive batching
We Learned About Carriers
We Learned About Carriers

•   Data plans are like gym memberships
We Learned About Carriers

•   Data plans are like gym memberships
•   Aggressively cull idle stream connections
We Learned About Carriers

•   Data plans are like gym memberships
•   Aggressively cull idle stream connections
•   Don’t like TCP keepalives
We Learned About Carriers

•   Data plans are like gym memberships
•   Aggressively cull idle stream connections
•   Don’t like TCP keepalives
•   Don’t like UDP
We Learned About Carriers

•   Data plans are like gym memberships
•   Aggressively cull idle stream connections
•   Don’t like TCP keepalives
•   Don’t like UDP
•   Like to batch, delay or just drop FIN/FIN ACK/RST
We Learned About Carriers

•   Data plans are like gym memberships
•   Aggressively cull idle stream connections
•   Don’t like TCP keepalives
•   Don’t like UDP
•   Like to batch, delay or just drop FIN/FIN ACK/RST
•   Move data through aggregators
About Devices...
About Devices...

•   Small compute units that do exactly what you tell them to
About Devices...

•   Small compute units that do exactly what you tell them to
•   Like phone home when you push to them...
About Devices...

•   Small compute units that do exactly what you tell them to
•   Like phone home when you push to them...
•   10M at a time...
About Devices...

•   Small compute units that do exactly what you tell them to
•   Like phone home when you push to them...
•   10M at a time...
•   Causing...
About Devices...

•   Small compute units that do exactly what you tell them to
•   Like phone home when you push to them...
•   10M at a time...
•   Causing...
About Devices...
About Devices...

•   Herds can happen for many of reasons:
About Devices...

•   Herds can happen for many of reasons:
    •   Network events
About Devices...

•   Herds can happen for many of reasons:
    •   Network events
    •   Android imprecise timer
About Devices...

•   Herds can happen for many of reasons:
    •   Network events
    •   Android imprecise timer
About Devices...
About Devices...

•   By virtue of being a mobile device, they move around a lot
About Devices...

•   By virtue of being a mobile device, they move around a lot
•   When they move, they often change IP addresses
About Devices...

•   By virtue of being a mobile device, they move around a lot
•   When they move, they often change IP addresses
    •   New cell tower
About Devices...

•   By virtue of being a mobile device, they move around a lot
•   When they move, they often change IP addresses
    •   New cell tower
    •   Change connectivity - 4G -> 3G, 3G -> WiFi, etc.
About Devices...

•   By virtue of being a mobile device, they move around a lot
•   When they move, they often change IP addresses
    •   New cell tower
    •   Change connectivity - 4G -> 3G, 3G -> WiFi, etc.
•   When they change IP addresses, they need to reconnect
    TCP sockets
About Devices...

•   By virtue of being a mobile device, they move around a lot
•   When they move, they often change IP addresses
    •   New cell tower
    •   Change connectivity - 4G -> 3G, 3G -> WiFi, etc.
•   When they change IP addresses, they need to reconnect
    TCP sockets
•   Sometimes they are kind enough to let us know
About Devices...

•   By virtue of being a mobile device, they move around a lot
•   When they move, they often change IP addresses
    •   New cell tower
    •   Change connectivity - 4G -> 3G, 3G -> WiFi, etc.
•   When they change IP addresses, they need to reconnect
    TCP sockets
•   Sometimes they are kind enough to let us know
•   Those reconnections are expensive for us and the devices
We Learned About EC2
We Learned About EC2

•   EC2 is a great jumping-off point
We Learned About EC2

•   EC2 is a great jumping-off point
•   Scaling vertically is very expensive
We Learned About EC2

•   EC2 is a great jumping-off point
•   Scaling vertically is very expensive
•   Like Carriers, EC2 networking is fond of holding on to TCP
    teardown sequence packets
We Learned About EC2

•   EC2 is a great jumping-off point
•   Scaling vertically is very expensive
•   Like Carriers, EC2 networking is fond of holding on to TCP
    teardown sequence packets
•   vNICs obfuscate important data when you care about 1M
    connections
We Learned About EC2

•   EC2 is a great jumping-off point
•   Scaling vertically is very expensive
•   Like Carriers, EC2 networking is fond of holding on to TCP
    teardown sequence packets
•   vNICs obfuscate important data when you care about 1M
    connections
•   Great for surge capacity
We Learned About EC2

•   EC2 is a great jumping-off point
•   Scaling vertically is very expensive
•   Like Carriers, EC2 networking is fond of holding on to TCP
    teardown sequence packets
•   vNICs obfuscate important data when you care about 1M
    connections
•   Great for surge capacity
•   Don’t split services into the virtual domain
About EC2...

•   When you care about throughput, the virtualization tax is
    high
About EC2...
About EC2...

•   Limited applicability for testing
About EC2...

•   Limited applicability for testing
    •   Egress port limitations kick in at ~63K egress
        connections - 16 XLs to test 1M connections
About EC2...

•   Limited applicability for testing
    •   Egress port limitations kick in at ~63K egress
        connections - 16 XLs to test 1M connections
    •   Can’t create vNIC in an EC2 guest
About EC2...

•   Limited applicability for testing
    •   Egress port limitations kick in at ~63K egress
        connections - 16 XLs to test 1M connections
    •   Can’t create vNIC in an EC2 guest
    •   Killing a client doesn’t disconnect immediately
About EC2...

•   Limited applicability for testing
    •   Egress port limitations kick in at ~63K egress
        connections - 16 XLs to test 1M connections
    •   Can’t create vNIC in an EC2 guest
    •   Killing a client doesn’t disconnect immediately
•   Pragmatically, smalls have no use for our purposes, not
    enough RAM, %steal too high
Lessons Learned - Failing Well
•   Scale vertically and horizontally
•   Scale vertically but remember...
    •   We can reliably take one Java process up to 990K open
        connections
    •   What happens when that one process fails?
    •   What happens when you need to do maintenance?
Thanks!



•   Urban Airship http://urbanairship.com/
•   Me @eonnen on Twitter or erik@urbanairship.com
•   We’re hiring! http://urbanairship.com/company/jobs/
Additional UA Reading
Additional UA Reading



•   Infrastructure Improvements - http://urbanairship.com/
    blog/2012/05/17/scaling-urban-airships-messaging-
    infrastructure-to-light-up-a-stadium-in-one-second/
Additional UA Reading



•   Infrastructure Improvements - http://urbanairship.com/
    blog/2012/05/17/scaling-urban-airships-messaging-
    infrastructure-to-light-up-a-stadium-in-one-second/
•   C500K - http://urbanairship.com/blog/2010/08/24/c500k-
    in-action-at-urban-airship/

More Related Content

What's hot

From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.Taras Matyashovsky
 
The Reactive Principles: Design Principles For Cloud Native Applications
The Reactive Principles: Design Principles For Cloud Native ApplicationsThe Reactive Principles: Design Principles For Cloud Native Applications
The Reactive Principles: Design Principles For Cloud Native ApplicationsJonas Bonér
 
Redis overview for Software Architecture Forum
Redis overview for Software Architecture ForumRedis overview for Software Architecture Forum
Redis overview for Software Architecture ForumChristopher Spring
 
Using LLVM to accelerate processing of data in Apache Arrow
Using LLVM to accelerate processing of data in Apache ArrowUsing LLVM to accelerate processing of data in Apache Arrow
Using LLVM to accelerate processing of data in Apache ArrowDataWorks Summit
 
Algorand Smart Contracts
Algorand Smart ContractsAlgorand Smart Contracts
Algorand Smart Contractsssusercc3bf81
 
Data Structures in and on IPFS
Data Structures in and on IPFSData Structures in and on IPFS
Data Structures in and on IPFSC4Media
 
Apache NiFi- MiNiFi meetup Slides
Apache NiFi- MiNiFi meetup SlidesApache NiFi- MiNiFi meetup Slides
Apache NiFi- MiNiFi meetup SlidesIsheeta Sanghi
 
Building robust CDC pipeline with Apache Hudi and Debezium
Building robust CDC pipeline with Apache Hudi and DebeziumBuilding robust CDC pipeline with Apache Hudi and Debezium
Building robust CDC pipeline with Apache Hudi and DebeziumTathastu.ai
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSASrikrupa Srivatsan
 
Caching solutions with Redis
Caching solutions   with RedisCaching solutions   with Redis
Caching solutions with RedisGeorge Platon
 
Introduction to Redis
Introduction to RedisIntroduction to Redis
Introduction to RedisDvir Volk
 
What is a Network Hypervisor?
What is a Network Hypervisor?What is a Network Hypervisor?
What is a Network Hypervisor?ADVA
 
Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsJonas Bonér
 
[Solr 스터디] Solr 설정 및 색인 (2017)
[Solr 스터디] Solr 설정 및 색인 (2017)[Solr 스터디] Solr 설정 및 색인 (2017)
[Solr 스터디] Solr 설정 및 색인 (2017)용호 최
 
MongoDB Schema Design: Four Real-World Examples
MongoDB Schema Design: Four Real-World ExamplesMongoDB Schema Design: Four Real-World Examples
MongoDB Schema Design: Four Real-World ExamplesMike Friedman
 
RabbitMQ Data Ingestion
RabbitMQ Data IngestionRabbitMQ Data Ingestion
RabbitMQ Data IngestionAlvaro Videla
 

What's hot (20)

From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.From cache to in-memory data grid. Introduction to Hazelcast.
From cache to in-memory data grid. Introduction to Hazelcast.
 
The Reactive Principles: Design Principles For Cloud Native Applications
The Reactive Principles: Design Principles For Cloud Native ApplicationsThe Reactive Principles: Design Principles For Cloud Native Applications
The Reactive Principles: Design Principles For Cloud Native Applications
 
Aruba AP 22X Installation Guide
Aruba  AP 22X Installation GuideAruba  AP 22X Installation Guide
Aruba AP 22X Installation Guide
 
Redis overview for Software Architecture Forum
Redis overview for Software Architecture ForumRedis overview for Software Architecture Forum
Redis overview for Software Architecture Forum
 
redis basics
redis basicsredis basics
redis basics
 
Using LLVM to accelerate processing of data in Apache Arrow
Using LLVM to accelerate processing of data in Apache ArrowUsing LLVM to accelerate processing of data in Apache Arrow
Using LLVM to accelerate processing of data in Apache Arrow
 
Apache Arrow - An Overview
Apache Arrow - An OverviewApache Arrow - An Overview
Apache Arrow - An Overview
 
Algorand Smart Contracts
Algorand Smart ContractsAlgorand Smart Contracts
Algorand Smart Contracts
 
Data Structures in and on IPFS
Data Structures in and on IPFSData Structures in and on IPFS
Data Structures in and on IPFS
 
Apache NiFi- MiNiFi meetup Slides
Apache NiFi- MiNiFi meetup SlidesApache NiFi- MiNiFi meetup Slides
Apache NiFi- MiNiFi meetup Slides
 
Building robust CDC pipeline with Apache Hudi and Debezium
Building robust CDC pipeline with Apache Hudi and DebeziumBuilding robust CDC pipeline with Apache Hudi and Debezium
Building robust CDC pipeline with Apache Hudi and Debezium
 
DNS Security Presentation ISSA
DNS Security Presentation ISSADNS Security Presentation ISSA
DNS Security Presentation ISSA
 
Caching solutions with Redis
Caching solutions   with RedisCaching solutions   with Redis
Caching solutions with Redis
 
Hyperledger BESU
Hyperledger BESUHyperledger BESU
Hyperledger BESU
 
Introduction to Redis
Introduction to RedisIntroduction to Redis
Introduction to Redis
 
What is a Network Hypervisor?
What is a Network Hypervisor?What is a Network Hypervisor?
What is a Network Hypervisor?
 
Scalability, Availability & Stability Patterns
Scalability, Availability & Stability PatternsScalability, Availability & Stability Patterns
Scalability, Availability & Stability Patterns
 
[Solr 스터디] Solr 설정 및 색인 (2017)
[Solr 스터디] Solr 설정 및 색인 (2017)[Solr 스터디] Solr 설정 및 색인 (2017)
[Solr 스터디] Solr 설정 및 색인 (2017)
 
MongoDB Schema Design: Four Real-World Examples
MongoDB Schema Design: Four Real-World ExamplesMongoDB Schema Design: Four Real-World Examples
MongoDB Schema Design: Four Real-World Examples
 
RabbitMQ Data Ingestion
RabbitMQ Data IngestionRabbitMQ Data Ingestion
RabbitMQ Data Ingestion
 

Viewers also liked

U2 product For Wiseeco
U2 product For WiseecoU2 product For Wiseeco
U2 product For Wiseeco호진 하
 
Head first in xmemcached yanf4j
Head first in xmemcached yanf4jHead first in xmemcached yanf4j
Head first in xmemcached yanf4jwavefly
 
Digital Trends Thoughts 2011
Digital Trends Thoughts 2011Digital Trends Thoughts 2011
Digital Trends Thoughts 2011Chris De Abreu
 
Sql join easy
Sql join easySql join easy
Sql join easyHoJin Ha
 
memcached Binary Protocol in a Nutshell
memcached Binary Protocol in a Nutshellmemcached Binary Protocol in a Nutshell
memcached Binary Protocol in a NutshellToru Maesaka
 
Non blocking io with netty
Non blocking io with nettyNon blocking io with netty
Non blocking io with nettyZauber
 
Agile Testing Practices
Agile Testing PracticesAgile Testing Practices
Agile Testing PracticesPaul King
 
[236] 카카오의데이터파이프라인 윤도영
[236] 카카오의데이터파이프라인 윤도영[236] 카카오의데이터파이프라인 윤도영
[236] 카카오의데이터파이프라인 윤도영NAVER D2
 
[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)
[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)
[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)Sang Don Kim
 
3. 마이크로 서비스 아키텍쳐
3. 마이크로 서비스 아키텍쳐3. 마이크로 서비스 아키텍쳐
3. 마이크로 서비스 아키텍쳐Terry Cho
 
Netty: asynchronous data transfer
Netty: asynchronous data transferNetty: asynchronous data transfer
Netty: asynchronous data transferVictor Cherkassky
 
라이브 서비스를 위한 게임 서버 구성
라이브 서비스를 위한 게임 서버 구성라이브 서비스를 위한 게임 서버 구성
라이브 서비스를 위한 게임 서버 구성Hyunjik Bae
 
채팅서버의 부하 분산 사례
채팅서버의 부하 분산 사례채팅서버의 부하 분산 사례
채팅서버의 부하 분산 사례John Kim
 
오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발
오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발
오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발주항 박
 
SK플래닛_README_마이크로서비스 아키텍처로 개발하기
SK플래닛_README_마이크로서비스 아키텍처로 개발하기SK플래닛_README_마이크로서비스 아키텍처로 개발하기
SK플래닛_README_마이크로서비스 아키텍처로 개발하기Lee Ji Eun
 

Viewers also liked (20)

U2 product For Wiseeco
U2 product For WiseecoU2 product For Wiseeco
U2 product For Wiseeco
 
Head first in xmemcached yanf4j
Head first in xmemcached yanf4jHead first in xmemcached yanf4j
Head first in xmemcached yanf4j
 
Digital Trends Thoughts 2011
Digital Trends Thoughts 2011Digital Trends Thoughts 2011
Digital Trends Thoughts 2011
 
Sql join easy
Sql join easySql join easy
Sql join easy
 
Netty
NettyNetty
Netty
 
memcached Binary Protocol in a Nutshell
memcached Binary Protocol in a Nutshellmemcached Binary Protocol in a Nutshell
memcached Binary Protocol in a Nutshell
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Non blocking io with netty
Non blocking io with nettyNon blocking io with netty
Non blocking io with netty
 
Agile Testing Practices
Agile Testing PracticesAgile Testing Practices
Agile Testing Practices
 
[236] 카카오의데이터파이프라인 윤도영
[236] 카카오의데이터파이프라인 윤도영[236] 카카오의데이터파이프라인 윤도영
[236] 카카오의데이터파이프라인 윤도영
 
[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)
[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)
[Td 2015]개발하기 바쁜데 푸시서버와 메시지큐는 있는거 쓸래요(김영재)
 
Vert.x
Vert.xVert.x
Vert.x
 
3. 마이크로 서비스 아키텍쳐
3. 마이크로 서비스 아키텍쳐3. 마이크로 서비스 아키텍쳐
3. 마이크로 서비스 아키텍쳐
 
Netty: asynchronous data transfer
Netty: asynchronous data transferNetty: asynchronous data transfer
Netty: asynchronous data transfer
 
Pro Postgres 9
Pro Postgres 9Pro Postgres 9
Pro Postgres 9
 
라이브 서비스를 위한 게임 서버 구성
라이브 서비스를 위한 게임 서버 구성라이브 서비스를 위한 게임 서버 구성
라이브 서비스를 위한 게임 서버 구성
 
채팅서버의 부하 분산 사례
채팅서버의 부하 분산 사례채팅서버의 부하 분산 사례
채팅서버의 부하 분산 사례
 
Diapositivas
DiapositivasDiapositivas
Diapositivas
 
오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발
오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발
오픈 소스를 활용한 캐쥬얼 게임 서버 프레임워크 개발
 
SK플래닛_README_마이크로서비스 아키텍처로 개발하기
SK플래닛_README_마이크로서비스 아키텍처로 개발하기SK플래닛_README_마이크로서비스 아키텍처로 개발하기
SK플래닛_README_마이크로서비스 아키텍처로 개발하기
 

Similar to High performance network programming on the jvm oscon 2012

Tuning kafka pipelines
Tuning kafka pipelinesTuning kafka pipelines
Tuning kafka pipelinesSumant Tambe
 
Message:Passing - lpw 2012
Message:Passing - lpw 2012Message:Passing - lpw 2012
Message:Passing - lpw 2012Tomas Doran
 
EKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdfEKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdfArnaud Bouchez
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkTomas Doran
 
Hermes Reliable Replication Protocol - ASPLOS'20 Presentation
Hermes Reliable Replication Protocol -  ASPLOS'20 PresentationHermes Reliable Replication Protocol -  ASPLOS'20 Presentation
Hermes Reliable Replication Protocol - ASPLOS'20 PresentationAntonios Katsarakis
 
Real time system_performance_mon
Real time system_performance_monReal time system_performance_mon
Real time system_performance_monTomas Doran
 
The Future of Messaging: RabbitMQ and AMQP
The Future of Messaging: RabbitMQ and AMQP The Future of Messaging: RabbitMQ and AMQP
The Future of Messaging: RabbitMQ and AMQP Eberhard Wolff
 
Messaging with RabbitMQ and AMQP
Messaging with RabbitMQ and AMQPMessaging with RabbitMQ and AMQP
Messaging with RabbitMQ and AMQPEberhard Wolff
 
HowTheInternetWorks.ppt
HowTheInternetWorks.pptHowTheInternetWorks.ppt
HowTheInternetWorks.pptPrakhar Pandey
 
Anton Moldovan "Building an efficient replication system for thousands of ter...
Anton Moldovan "Building an efficient replication system for thousands of ter...Anton Moldovan "Building an efficient replication system for thousands of ter...
Anton Moldovan "Building an efficient replication system for thousands of ter...Fwdays
 
Architecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard Wolff
Architecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard WolffArchitecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard Wolff
Architecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard WolffJAX London
 
Asynchronous programming using CompletableFutures in Java
Asynchronous programming using CompletableFutures in JavaAsynchronous programming using CompletableFutures in Java
Asynchronous programming using CompletableFutures in JavaOresztész Margaritisz
 
Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...
Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...
Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...Ontico
 
Decoupling Compute from Memory, Storage and IO with OMI
Decoupling Compute from Memory, Storage and IO with OMIDecoupling Compute from Memory, Storage and IO with OMI
Decoupling Compute from Memory, Storage and IO with OMIAllan Cantle
 
Ics21 workshop decoupling compute from memory, storage & io with omi - ...
Ics21 workshop   decoupling compute from memory, storage & io with omi - ...Ics21 workshop   decoupling compute from memory, storage & io with omi - ...
Ics21 workshop decoupling compute from memory, storage & io with omi - ...Vaibhav R
 
3.2 Streaming and Messaging
3.2 Streaming and Messaging3.2 Streaming and Messaging
3.2 Streaming and Messaging振东 刘
 
«Scrapy internals» Александр Сибиряков, Scrapinghub
«Scrapy internals» Александр Сибиряков, Scrapinghub«Scrapy internals» Александр Сибиряков, Scrapinghub
«Scrapy internals» Александр Сибиряков, Scrapinghubit-people
 
Modern Distributed Messaging and RPC
Modern Distributed Messaging and RPCModern Distributed Messaging and RPC
Modern Distributed Messaging and RPCMax Alexejev
 

Similar to High performance network programming on the jvm oscon 2012 (20)

C++ scalable network_io
C++ scalable network_ioC++ scalable network_io
C++ scalable network_io
 
Realtime web2012
Realtime web2012Realtime web2012
Realtime web2012
 
Tuning kafka pipelines
Tuning kafka pipelinesTuning kafka pipelines
Tuning kafka pipelines
 
Message:Passing - lpw 2012
Message:Passing - lpw 2012Message:Passing - lpw 2012
Message:Passing - lpw 2012
 
EKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdfEKON27-FrameworksTuning.pdf
EKON27-FrameworksTuning.pdf
 
Messaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new frameworkMessaging, interoperability and log aggregation - a new framework
Messaging, interoperability and log aggregation - a new framework
 
Hermes Reliable Replication Protocol - ASPLOS'20 Presentation
Hermes Reliable Replication Protocol -  ASPLOS'20 PresentationHermes Reliable Replication Protocol -  ASPLOS'20 Presentation
Hermes Reliable Replication Protocol - ASPLOS'20 Presentation
 
Real time system_performance_mon
Real time system_performance_monReal time system_performance_mon
Real time system_performance_mon
 
The Future of Messaging: RabbitMQ and AMQP
The Future of Messaging: RabbitMQ and AMQP The Future of Messaging: RabbitMQ and AMQP
The Future of Messaging: RabbitMQ and AMQP
 
Messaging with RabbitMQ and AMQP
Messaging with RabbitMQ and AMQPMessaging with RabbitMQ and AMQP
Messaging with RabbitMQ and AMQP
 
HowTheInternetWorks.ppt
HowTheInternetWorks.pptHowTheInternetWorks.ppt
HowTheInternetWorks.ppt
 
Anton Moldovan "Building an efficient replication system for thousands of ter...
Anton Moldovan "Building an efficient replication system for thousands of ter...Anton Moldovan "Building an efficient replication system for thousands of ter...
Anton Moldovan "Building an efficient replication system for thousands of ter...
 
Architecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard Wolff
Architecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard WolffArchitecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard Wolff
Architecture | The Future of Messaging: RabbitMQ and AMQP | Eberhard Wolff
 
Asynchronous programming using CompletableFutures in Java
Asynchronous programming using CompletableFutures in JavaAsynchronous programming using CompletableFutures in Java
Asynchronous programming using CompletableFutures in Java
 
Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...
Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...
Построение распределенной системы сбора данных с помощью RabbitMQ, Alvaro Vid...
 
Decoupling Compute from Memory, Storage and IO with OMI
Decoupling Compute from Memory, Storage and IO with OMIDecoupling Compute from Memory, Storage and IO with OMI
Decoupling Compute from Memory, Storage and IO with OMI
 
Ics21 workshop decoupling compute from memory, storage & io with omi - ...
Ics21 workshop   decoupling compute from memory, storage & io with omi - ...Ics21 workshop   decoupling compute from memory, storage & io with omi - ...
Ics21 workshop decoupling compute from memory, storage & io with omi - ...
 
3.2 Streaming and Messaging
3.2 Streaming and Messaging3.2 Streaming and Messaging
3.2 Streaming and Messaging
 
«Scrapy internals» Александр Сибиряков, Scrapinghub
«Scrapy internals» Александр Сибиряков, Scrapinghub«Scrapy internals» Александр Сибиряков, Scrapinghub
«Scrapy internals» Александр Сибиряков, Scrapinghub
 
Modern Distributed Messaging and RPC
Modern Distributed Messaging and RPCModern Distributed Messaging and RPC
Modern Distributed Messaging and RPC
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 

High performance network programming on the jvm oscon 2012

  • 1. High Performance Network Programming on the JVM OSCON, July 2012 Erik Onnen
  • 2. About Me • Director of Architecture and Delivery at Urban Airship • Most of my career biased towards performance and scale • Java, Python, C++ in service oriented architectures
  • 3. In this Talk • WTF is an “Urban Airship”? • Networked Systems on the JVM • Choosing a framework • Critical learnings • Q&A
  • 4. About This Talk You probably won’t like this talk if you:
  • 5. About This Talk You probably won’t like this talk if you: • Are willing to give up orders of magnitude in performance for a slower runtime or language
  • 6. About This Talk You probably won’t like this talk if you: • Are willing to give up orders of magnitude in performance for a slower runtime or language • Enjoy spending money on virtualized servers (e.g. ec2)
  • 7. About This Talk You probably won’t like this talk if you: • Are willing to give up orders of magnitude in performance for a slower runtime or language • Enjoy spending money on virtualized servers (e.g. ec2) • Think that a startup should’t worry about CoGS
  • 8. About This Talk You probably won’t like this talk if you: • Are willing to give up orders of magnitude in performance for a slower runtime or language • Enjoy spending money on virtualized servers (e.g. ec2) • Think that a startup should’t worry about CoGS • Think that writing code is the hardest part of a developer’s job
  • 9. About This Talk You probably won’t like this talk if you: • Are willing to give up orders of magnitude in performance for a slower runtime or language • Enjoy spending money on virtualized servers (e.g. ec2) • Think that a startup should’t worry about CoGS • Think that writing code is the hardest part of a developer’s job • Think async for all the things
  • 10. Lexicon What makes something “High Performance”?
  • 11. Lexicon What makes something “High Performance”? • Low Latency - I’m doing an operation that includes a request/reply • Throughput - how many operations can I drive through my architecture at one time? • Productivity - how quickly can I create a new operation? A new service? • Sustainability - when a service breaks, what’s the time to RCA • Fault tolerance
  • 12. WTF is an Urban Airship? • Fundamentally, an engagement platform • Buzzword compliant - Cloud Service providing an API for Mobile • Unified API for services across platforms for messaging, location, content entitlements, in-app purchase • SLAs for throughput, latency • Heavy users and contributors to HBase, ZooKeeper, Cassandra
  • 13. WTF is an Urban Airship?
  • 14. What is Push? • Cost • Throughput and immediacy • The platform makes it compelling • Push can be intelligent • Push can be precisely targeted • Deeper measurement of user engagement
  • 15. How does this relate to the JVM? • We deal with lots of heterogeneous connections from the public network, the vast majority of them are handled by a JVM • We perform millions of operations per second across our LAN • Billions and billions of discrete system events a day • Most of those operations are JVM-JVM
  • 18. Distributed Systems on the JDK • Platform has several tools baked in • HTTP Client and Server • RMI (Remote Method Invocation) or better JINI • CORBA/IIOP • JDBC • Lower level • Sockets + streams, channels + buffers • Java5 brought NIO which included Async I/O • High performance, high productivity platform when used correctly • Missing some low-level capabilities
  • 20. Synchronous vs. Async I/O • Synchronous Network I/O on the JRE • Sockets (InputStream, OutputStream) • Channels and Buffers • Asynchronous Network I/O on the JRE • Selectors (async) • Buffers fed to Channels which are asynchronous • Almost all asynchronous APIs are for Socket I/O • Can operate on direct, off heap buffers • Offer decent low-level configuration options
  • 21. Synchronous vs. Async I/O • Synchronous I/O has many upsides on the JVM • Clean streaming - good for moving around really large things • Sendfile support for MMap’d files (FileChannel::transferTo) • Vectored I/O support • No need for additional SSL abstractions (except for maybe Keystore cruft) • No idiomatic impedance for RPC
  • 23. Synchronous vs. Async I/O • Synchronous I/O - doing it well
  • 24. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels)
  • 25. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels) • Minimize trips across the system boundary
  • 26. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels) • Minimize trips across the system boundary • Minimize copies of data
  • 27. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels) • Minimize trips across the system boundary • Minimize copies of data • Vector I/O if possible
  • 28. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels) • Minimize trips across the system boundary • Minimize copies of data • Vector I/O if possible • MMap if possible
  • 29. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels) • Minimize trips across the system boundary • Minimize copies of data • Vector I/O if possible • MMap if possible • Favor direct ByteBufffers and NIO Channels
  • 30. Synchronous vs. Async I/O • Synchronous I/O - doing it well • Buffers all the way down (streams, readers, channels) • Minimize trips across the system boundary • Minimize copies of data • Vector I/O if possible • MMap if possible • Favor direct ByteBufffers and NIO Channels • Netty does support sync. I/O but it feels tedious on that abstraction
  • 32. Synchronous vs. Async I/O • Async I/O • On Linux, implemented via epoll as the “Selector” abstraction with async Channels • Async Channels fed buffers, you have to tend to fully reading/writing them • Async I/O - doing it well • Again, favor direct ByteBuffers, especially for large data • Consider the application - what do you gain by not waiting for a response? • Avoid manual TLS operations
  • 33. Sync vs. Async - FIGHT! Async I/O Wins:
  • 34. Sync vs. Async - FIGHT! Async I/O Wins: • Large numbers of clients
  • 35. Sync vs. Async - FIGHT! Async I/O Wins: • Large numbers of clients • Only way to be notified if a socket is closed without trying to read it
  • 36. Sync vs. Async - FIGHT! Async I/O Wins: • Large numbers of clients • Only way to be notified if a socket is closed without trying to read it • Large number of open sockets
  • 37. Sync vs. Async - FIGHT! Async I/O Wins: • Large numbers of clients • Only way to be notified if a socket is closed without trying to read it • Large number of open sockets • Lightweight proxying of traffic
  • 38. Sync vs. Async - FIGHT! Async I/O Loses:
  • 39. Sync vs. Async - FIGHT! Async I/O Loses: • Context switching, CPU cache pipeline loss can be substantial overhead for simple protocols
  • 40. Sync vs. Async - FIGHT! Async I/O Loses: • Context switching, CPU cache pipeline loss can be substantial overhead for simple protocols • Not always the best option for raw, full bore throughput
  • 41. Sync vs. Async - FIGHT! Async I/O Loses: • Context switching, CPU cache pipeline loss can be substantial overhead for simple protocols • Not always the best option for raw, full bore throughput • Complexity, ability to reason about code diminished
  • 42. Sync vs. Async - FIGHT! Async I/O Loses: http://www.youtube.com/watch?v=bzkRVzciAZg&feature=player_detailpage#t=133s
  • 43. Sync vs. Async - FIGHT! Sync I/O Wins:
  • 44. Sync vs. Async - FIGHT! Sync I/O Wins: • Simplicity, readability
  • 45. Sync vs. Async - FIGHT! Sync I/O Wins: • Simplicity, readability • Better fit for dumb protocols, less impedance for request/reply
  • 46. Sync vs. Async - FIGHT! Sync I/O Wins: • Simplicity, readability • Better fit for dumb protocols, less impedance for request/reply • Squeezing every bit of throughput out of a single host, small number of threads
  • 47. Sync vs. Async - Memcache • UA uses memcached heavily • memcached is an awesome example of why choosing Sync vs. Async is hard • Puts always should be completely asynchronous • Reads are fairly useless when done asynchronously • Protocol doesn’t lend itself well to Async I/O • For Java clients, we experimented with Xmemcached but didn’t like its complexity, I/O approach • Created FSMC (freakin’ simple memcache client)
  • 48. FSMC vs. Xmemcached Synch vs. Async Memcache Client Throughput 60000 SET/GET per Second 45000 30000 15000 0 1 2 4 8 16 32 56 128 Threads FSMC (no nagle) FSMC Xmemcached
  • 49. FSMC vs. Xmemcached FSMC: Xmemcached: % time seconds usecs/call calls errors syscall % time seconds usecs/call calls errors syscall ------ ----------- ----------- --------- --------- ---------------- ------ ----------- ----------- --------- --------- ---------------- 99.97 143.825726 11811 12177 2596 futex 54.87 875.668275 4325 202456 epoll_wait 0.01 0.014143 0 402289 read 45.13 720.259447 454 1587899 130432 futex 0.01 0.011088 0 200000 writev 0.00 0.020783 3 6290 sched_yield 0.01 0.008087 0 200035 write 0.00 0.011119 0 200253 write 0.00 0.002831 0 33223 mprotect 0.00 0.008682 0 799387 2 epoll_ctl 0.00 0.001664 12 139 madvise 0.00 0.003759 0 303004 100027 read 0.00 0.000403 1 681 brk 0.00 0.000066 0 1099 mprotect 0.00 0.000381 0 1189 sched_yield 0.00 0.000047 1 81 madvise 0.00 0.000000 0 120 59 open 0.00 0.000026 0 92 sched_getaffinity 0.00 0.000000 0 68 close 0.00 0.000000 0 126 59 open 0.00 0.000000 0 108 42 stat 0.00 0.000000 0 148 close 0.00 0.000000 0 59 fstat 0.00 0.000000 0 109 42 stat 0.00 0.000000 0 124 3 lstat 0.00 0.000000 0 61 fstat 0.00 0.000000 0 2248 lseek 0.00 0.000000 0 124 3 lstat 0.00 0.000000 0 210 mmap 0.00 0.000000 0 2521 lseek 0.00 0.000000 0 292 mmap 14:37:31,568 INFO [main] 14:38:09,912 INFO [main] [com.urbanairship.oscon.memcache.FsmcTest] Finished [com.urbanairship.oscon.memcache.XmemcachedTest] 800000 operations in 12659ms. Finished 800000 operations in 18078ms. real 0m12.881s real 0m18.248s user 0m34.430s user 0m30.020s sys 0m22.830s sys 0m16.700s
  • 50. A Word on Garbage Collection
  • 51. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC
  • 52. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more
  • 53. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more • Allocation is near free
  • 54. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more • Allocation is near free • Collection also near free if you don’t copy anything
  • 55. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more • Allocation is near free • Collection also near free if you don’t copy anything • Don’t buffer large things, stream or chunck
  • 56. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more • Allocation is near free • Collection also near free if you don’t copy anything • Don’t buffer large things, stream or chunck • When you must cache:
  • 57. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more • Allocation is near free • Collection also near free if you don’t copy anything • Don’t buffer large things, stream or chunck • When you must cache: • Cache early and don’t touch
  • 58. A Word on Garbage Collection • Any JVM service on most hardware has to live with GC • A good citizen will create lots of ParNew garbage and nothing more • Allocation is near free • Collection also near free if you don’t copy anything • Don’t buffer large things, stream or chunck • When you must cache: • Cache early and don’t touch • Better, cache off heap or use memcache
  • 59. A Word on Garbage Collection
  • 60. A Word on Garbage Collection GOOD
  • 61. A Word on Garbage Collection BAD GOOD
  • 62. A Word on Garbage Collection When you care about throughput, the virtualization tax is high ParNew GC Effectiveness 300 225 150 75 0 MB Collected Bare Metal EC2 XL
  • 63. About EC2... When you care about throughput, the virtualization tax is high Mean Time ParNew GC 0.04 0.03 0.02 0.01 0 Collection Time (sec) Bare Metal EC2 XL
  • 64. How we do at UA • Originally our codebase was mostly one giant monolithic application, over time several databases • Difficult to scale, technically and operationally • Wanted to break off large pieces of functionality into coarse grained services encapsulating their capability and function • Most message exchange was done using beanstalkd after migrating off RabbitMQ • Fundamentally, our business is message passing
  • 66. Choosing A Framework • All frameworks are a form of concession
  • 67. Choosing A Framework • All frameworks are a form of concession • Nobody would use Spring if people called it “Concessions to the horrors of EJB”
  • 68. Choosing A Framework • All frameworks are a form of concession • Nobody would use Spring if people called it “Concessions to the horrors of EJB” • Understand concessions when choosing, look for:
  • 69. Choosing A Framework • All frameworks are a form of concession • Nobody would use Spring if people called it “Concessions to the horrors of EJB” • Understand concessions when choosing, look for: • Configuration options - how do I configure Nagle behavior?
  • 70. Choosing A Framework • All frameworks are a form of concession • Nobody would use Spring if people called it “Concessions to the horrors of EJB” • Understand concessions when choosing, look for: • Configuration options - how do I configure Nagle behavior? • Metrics - what does the framework tell me about its internals?
  • 71. Choosing A Framework • All frameworks are a form of concession • Nobody would use Spring if people called it “Concessions to the horrors of EJB” • Understand concessions when choosing, look for: • Configuration options - how do I configure Nagle behavior? • Metrics - what does the framework tell me about its internals? • Intelligent logging - next level down from metrics
  • 72. Choosing A Framework • All frameworks are a form of concession • Nobody would use Spring if people called it “Concessions to the horrors of EJB” • Understand concessions when choosing, look for: • Configuration options - how do I configure Nagle behavior? • Metrics - what does the framework tell me about its internals? • Intelligent logging - next level down from metrics • How does the framework play with peers?
  • 73. Frameworks - DO IT LIVE!
  • 74. Frameworks - DO IT LIVE! • Our requirements:
  • 75. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads
  • 76. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads • Simple protocol - easy to reason about, inspect
  • 77. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads • Simple protocol - easy to reason about, inspect • Efficient, flexible message format - Google Protocol Buffers
  • 78. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads • Simple protocol - easy to reason about, inspect • Efficient, flexible message format - Google Protocol Buffers • Compostable - easily create new services
  • 79. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads • Simple protocol - easy to reason about, inspect • Efficient, flexible message format - Google Protocol Buffers • Compostable - easily create new services • Support both sync and async operations
  • 80. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads • Simple protocol - easy to reason about, inspect • Efficient, flexible message format - Google Protocol Buffers • Compostable - easily create new services • Support both sync and async operations • Support for multiple languages (Python, Java, C++)
  • 81. Frameworks - DO IT LIVE! • Our requirements: • Capable of > 100K requests per second in aggregate across multiple threads • Simple protocol - easy to reason about, inspect • Efficient, flexible message format - Google Protocol Buffers • Compostable - easily create new services • Support both sync and async operations • Support for multiple languages (Python, Java, C++) • Simple configuration
  • 82. Frameworks - DO IT LIVE!
  • 83. Frameworks - DO IT LIVE! • Desirable:
  • 84. Frameworks - DO IT LIVE! • Desirable: • Discovery mechanism
  • 85. Frameworks - DO IT LIVE! • Desirable: • Discovery mechanism • Predictable fault handling
  • 86. Frameworks - DO IT LIVE! • Desirable: • Discovery mechanism • Predictable fault handling • Adaptive load balancing
  • 87. Frameworks - Akka • Predominantly Scala platform for sending messages, distributed incarnation of the Actor pattern • Message abstraction tolerates distribution well • If you like OTP, you’ll probably like Akka
  • 90. Frameworks - Akka • Cons: • We don’t like reading other people’s Scala • Some pretty strong assertions in the docs that aren’t substantiated • Bulky wire protocol, especially for primitives • Configuration felt complicated • Sheer surface area of the framework is daunting • Unclear integration story with Python
  • 91. Frameworks - Aleph • Clojure framework based on Netty, Lamina • Conceptually funs are applied to a channels to move around messages • Channels are refs that you realize when you want data • Operations with channels very easy • Concise format for standing up clients and services using text protocols
  • 92.
  • 93.
  • 94. Frameworks - Aleph • Cons: • Very high level abstraction, knobs are buried if they exist • Channel concept leaky for large messages • Documentation, tests
  • 95. Frameworks - Netty • The preeminent framework for doing Async Network I/O on the JVM • Netty Channels backed by pipelines on top of Channels • Pros: • Abstraction doesn’t hide the important pieces • The only sane way to do TLS with Async I/O on the JVM • Protocols well abstracted into pipeline steps • Clean callback model for events of interest but optional in simple cases - no death by callback • Many implementations of interesting protocols
  • 96. Frameworks - Netty • Cons: • Easy to make too many copies of the data • Some old school bootstrap idioms • Writes can occasionally be reordered • Failure conditions can be numerous, difficult to reason about • Simple things can feel difficult - UDP, simple request/reply
  • 97. Frameworks - DO IT LIVE!
  • 98. Frameworks - DO IT LIVE! • Considered but passed:
  • 99. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations
  • 100. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations • Thrift
  • 101. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations • Thrift • Twitter’s Finagle
  • 102. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations • Thrift • Twitter’s Finagle • Akka
  • 103. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations • Thrift • Twitter’s Finagle • Akka • ØMQ
  • 104. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations • Thrift • Twitter’s Finagle • Akka • ØMQ • HTTP + JSON
  • 105. Frameworks - DO IT LIVE! • Considered but passed: • PB-RPC Implementations • Thrift • Twitter’s Finagle • Akka • ØMQ • HTTP + JSON • ZeroC Ice
  • 106. Frameworks - DO IT LIVE!
  • 107. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor
  • 108. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor • Discovery (optional) using a defined tree of services in ZooKeeper
  • 109. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor • Discovery (optional) using a defined tree of services in ZooKeeper • Service instances periodically publish load factor to ZooKeeper for clients to inform routing decisions
  • 110. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor • Discovery (optional) using a defined tree of services in ZooKeeper • Service instances periodically publish load factor to ZooKeeper for clients to inform routing decisions • Rich metrics using Yammer Metrics
  • 111. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor • Discovery (optional) using a defined tree of services in ZooKeeper • Service instances periodically publish load factor to ZooKeeper for clients to inform routing decisions • Rich metrics using Yammer Metrics • Core service traits are part of the framework
  • 112. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor • Discovery (optional) using a defined tree of services in ZooKeeper • Service instances periodically publish load factor to ZooKeeper for clients to inform routing decisions • Rich metrics using Yammer Metrics • Core service traits are part of the framework • Service instances quiesce gracefully
  • 113. Frameworks - DO IT LIVE! • Ultimately implemented our own using combination of Netty and Google Protocol Buffers called Reactor • Discovery (optional) using a defined tree of services in ZooKeeper • Service instances periodically publish load factor to ZooKeeper for clients to inform routing decisions • Rich metrics using Yammer Metrics • Core service traits are part of the framework • Service instances quiesce gracefully • Netty made UDP, Sync, Async. easy
  • 114. Frameworks - DO IT LIVE! • All operations are Callables, services define a mapping b/t a request type and a Callable • Client API always returns a Future, sometimes it’s always materialized • Precise tuning from config files
  • 115. What We Learned - In General
  • 116. Frameworks - DO IT LIVE!
  • 117. What We Learned - In General
  • 118. What We Learned - In General • Straight through RPC was fairly easy, edge cases were hard
  • 119. What We Learned - In General • Straight through RPC was fairly easy, edge cases were hard • ZooKeeper is brutal to program with, recover from errors
  • 120. What We Learned - In General • Straight through RPC was fairly easy, edge cases were hard • ZooKeeper is brutal to program with, recover from errors • Discovery is also difficult - clients need to defend themselves, consider partitions
  • 121. What We Learned - In General • Straight through RPC was fairly easy, edge cases were hard • ZooKeeper is brutal to program with, recover from errors • Discovery is also difficult - clients need to defend themselves, consider partitions • RPC is great for latency, but upstream pushback is important
  • 122. What We Learned - In General • Straight through RPC was fairly easy, edge cases were hard • ZooKeeper is brutal to program with, recover from errors • Discovery is also difficult - clients need to defend themselves, consider partitions • RPC is great for latency, but upstream pushback is important • Save RPC for latency sensitive operations - use Kafka
  • 123. What We Learned - In General • Straight through RPC was fairly easy, edge cases were hard • ZooKeeper is brutal to program with, recover from errors • Discovery is also difficult - clients need to defend themselves, consider partitions • RPC is great for latency, but upstream pushback is important • Save RPC for latency sensitive operations - use Kafka • RPC less than ideal for fan-out
  • 124. What We Learned - TCP
  • 125. What We Learned - TCP
  • 126. What We Learned - TCP • RTO (retransmission timeout) and Karn and Jacobson’s Algorithms
  • 127. What We Learned - TCP • RTO (retransmission timeout) and Karn and Jacobson’s Algorithms • Linux defaults to 15 retry attempts, 3 seconds between
  • 128. What We Learned - TCP • RTO (retransmission timeout) and Karn and Jacobson’s Algorithms • Linux defaults to 15 retry attempts, 3 seconds between • With no ACKs, congestion control kicks in and widens that 3 second window exponentially, thinking its congested
  • 129. What We Learned - TCP • RTO (retransmission timeout) and Karn and Jacobson’s Algorithms • Linux defaults to 15 retry attempts, 3 seconds between • With no ACKs, congestion control kicks in and widens that 3 second window exponentially, thinking its congested • Connection timeout can take up to 30 minutes
  • 130. What We Learned - TCP • RTO (retransmission timeout) and Karn and Jacobson’s Algorithms • Linux defaults to 15 retry attempts, 3 seconds between • With no ACKs, congestion control kicks in and widens that 3 second window exponentially, thinking its congested • Connection timeout can take up to 30 minutes • Devices, Carriers and EC2 at scale eat FIN/RST
  • 131. What We Learned - TCP • RTO (retransmission timeout) and Karn and Jacobson’s Algorithms • Linux defaults to 15 retry attempts, 3 seconds between • With no ACKs, congestion control kicks in and widens that 3 second window exponentially, thinking its congested • Connection timeout can take up to 30 minutes • Devices, Carriers and EC2 at scale eat FIN/RST • Our systems think a device is still online at the time of a push
  • 132. What We Learned - TCP
  • 133. What We Learned - TCP • After changing the RTO
  • 134. What We Learned - TCP • After changing the RTO
  • 135. What We Learned - TCP
  • 136. What We Learned - TCP
  • 137. What We Learned - TCP • Efficiency means understanding your traffic
  • 138. What We Learned - TCP • Efficiency means understanding your traffic • Size send/recv buffers appropriately (defaults way too low for edge tier services)
  • 139. What We Learned - TCP • Efficiency means understanding your traffic • Size send/recv buffers appropriately (defaults way too low for edge tier services) • Nagle! Non-duplex protocols can benefit significantly
  • 140. What We Learned - TCP • Efficiency means understanding your traffic • Size send/recv buffers appropriately (defaults way too low for edge tier services) • Nagle! Non-duplex protocols can benefit significantly • Example: 19K message deliveries per second vs. 2K
  • 141. What We Learned - TCP • Efficiency means understanding your traffic • Size send/recv buffers appropriately (defaults way too low for edge tier services) • Nagle! Non-duplex protocols can benefit significantly • Example: 19K message deliveries per second vs. 2K • Example: our protocol has a size frame, w/o Nagle that went in its own packet
  • 142. What We Learned - TCP
  • 143. What We Learned - TCP
  • 144. What We Learned - TCP
  • 145. What We Learned - TCP
  • 146. What We Learned - TCP
  • 147. What We Learned - TCP
  • 148. What We Learned - TCP
  • 149. What We Learned - TCP
  • 150. What We Learned - TCP • Don’t Nagle!
  • 151. What We Learned - TCP • Don’t Nagle! • Again, understand what your traffic is doing
  • 152. What We Learned - TCP • Don’t Nagle! • Again, understand what your traffic is doing • Buffer and make one syscall instead of multiple
  • 153. What We Learned - TCP • Don’t Nagle! • Again, understand what your traffic is doing • Buffer and make one syscall instead of multiple • High-throughput RPC mechanisms disable it explicitly
  • 154. What We Learned - TCP • Don’t Nagle! • Again, understand what your traffic is doing • Buffer and make one syscall instead of multiple • High-throughput RPC mechanisms disable it explicitly • See also:
  • 155. What We Learned - TCP • Don’t Nagle! • Again, understand what your traffic is doing • Buffer and make one syscall instead of multiple • High-throughput RPC mechanisms disable it explicitly • See also: • http://www.evanjones.ca/software/java- bytebuffers.html
  • 156. What We Learned - TCP • Don’t Nagle! • Again, understand what your traffic is doing • Buffer and make one syscall instead of multiple • High-throughput RPC mechanisms disable it explicitly • See also: • http://www.evanjones.ca/software/java- bytebuffers.html • http://blog.boundary.com/2012/05/02/know-a-delay- nagles-algorithm-and-you/
  • 159. About UDP... • Generally to be avoided
  • 160. About UDP... • Generally to be avoided • Great for small unimportant data like memcache operations at extreme scale
  • 161. About UDP... • Generally to be avoided • Great for small unimportant data like memcache operations at extreme scale • Bad for RPC when you care about knowing if your request was handled
  • 162. About UDP... • Generally to be avoided • Great for small unimportant data like memcache operations at extreme scale • Bad for RPC when you care about knowing if your request was handled • Conditions where you most want your data are also the most likely to cause your data to be dropped
  • 164. About TLS • Try to avoid it - complex, slow and expensive, especially for internal services
  • 165. About TLS • Try to avoid it - complex, slow and expensive, especially for internal services • ~6.5K and 4 hops to secure the channel
  • 166. About TLS • Try to avoid it - complex, slow and expensive, especially for internal services • ~6.5K and 4 hops to secure the channel • 40 bytes overhead per frame
  • 167. About TLS • Try to avoid it - complex, slow and expensive, especially for internal services • ~6.5K and 4 hops to secure the channel • 40 bytes overhead per frame • 38.1MB overhead for every keep-alive sent to 1M devices
  • 168. About TLS • Try to avoid it - complex, slow and expensive, especially for internal services • ~6.5K and 4 hops to secure the channel • 40 bytes overhead per frame • 38.1MB overhead for every keep-alive sent to 1M devices TLS source: http://netsekure.org/2010/03/tls-overhead/
  • 170. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet
  • 171. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles:
  • 172. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles: • TLS Handshake
  • 173. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles: • TLS Handshake • HTTP Request
  • 174. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles: • TLS Handshake • HTTP Request • HTTP Response
  • 175. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles: • TLS Handshake • HTTP Request • HTTP Response • TLS End
  • 176. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles: • TLS Handshake • HTTP Request • HTTP Response • TLS End • Server TIME_WAIT
  • 177. We Learned About HTTPS • Thought we could ignore - basic plumbing of the internet • 100s of millions of devices, performing 100s of millions of tiny request/reply cycles: • TLS Handshake • HTTP Request • HTTP Response • TLS End • Server TIME_WAIT • Higher grade crypto eats more cycles
  • 179. We Learned About HTTPS • Corrective measures:
  • 180. We Learned About HTTPS • Corrective measures: • Reduce TIME_WAIT - 60 seconds too long for an HTTPS connection
  • 181. We Learned About HTTPS • Corrective measures: • Reduce TIME_WAIT - 60 seconds too long for an HTTPS connection • Reduce non-critical HTTPS operations to lower cyphers
  • 182. We Learned About HTTPS • Corrective measures: • Reduce TIME_WAIT - 60 seconds too long for an HTTPS connection • Reduce non-critical HTTPS operations to lower cyphers • Offload TLS handshake to EC2
  • 183. We Learned About HTTPS • Corrective measures: • Reduce TIME_WAIT - 60 seconds too long for an HTTPS connection • Reduce non-critical HTTPS operations to lower cyphers • Offload TLS handshake to EC2 • Deployed Akamai for SSL/TCP offload and to pipeline device requests into our infrastructure
  • 184. We Learned About HTTPS • Corrective measures: • Reduce TIME_WAIT - 60 seconds too long for an HTTPS connection • Reduce non-critical HTTPS operations to lower cyphers • Offload TLS handshake to EC2 • Deployed Akamai for SSL/TCP offload and to pipeline device requests into our infrastructure • Implement adaptive backoff at the client layer
  • 185. We Learned About HTTPS • Corrective measures: • Reduce TIME_WAIT - 60 seconds too long for an HTTPS connection • Reduce non-critical HTTPS operations to lower cyphers • Offload TLS handshake to EC2 • Deployed Akamai for SSL/TCP offload and to pipeline device requests into our infrastructure • Implement adaptive backoff at the client layer • Aggressive batching
  • 186. We Learned About Carriers
  • 187. We Learned About Carriers • Data plans are like gym memberships
  • 188. We Learned About Carriers • Data plans are like gym memberships • Aggressively cull idle stream connections
  • 189. We Learned About Carriers • Data plans are like gym memberships • Aggressively cull idle stream connections • Don’t like TCP keepalives
  • 190. We Learned About Carriers • Data plans are like gym memberships • Aggressively cull idle stream connections • Don’t like TCP keepalives • Don’t like UDP
  • 191. We Learned About Carriers • Data plans are like gym memberships • Aggressively cull idle stream connections • Don’t like TCP keepalives • Don’t like UDP • Like to batch, delay or just drop FIN/FIN ACK/RST
  • 192. We Learned About Carriers • Data plans are like gym memberships • Aggressively cull idle stream connections • Don’t like TCP keepalives • Don’t like UDP • Like to batch, delay or just drop FIN/FIN ACK/RST • Move data through aggregators
  • 194. About Devices... • Small compute units that do exactly what you tell them to
  • 195. About Devices... • Small compute units that do exactly what you tell them to • Like phone home when you push to them...
  • 196. About Devices... • Small compute units that do exactly what you tell them to • Like phone home when you push to them... • 10M at a time...
  • 197. About Devices... • Small compute units that do exactly what you tell them to • Like phone home when you push to them... • 10M at a time... • Causing...
  • 198. About Devices... • Small compute units that do exactly what you tell them to • Like phone home when you push to them... • 10M at a time... • Causing...
  • 200. About Devices... • Herds can happen for many of reasons:
  • 201. About Devices... • Herds can happen for many of reasons: • Network events
  • 202. About Devices... • Herds can happen for many of reasons: • Network events • Android imprecise timer
  • 203. About Devices... • Herds can happen for many of reasons: • Network events • Android imprecise timer
  • 205. About Devices... • By virtue of being a mobile device, they move around a lot
  • 206. About Devices... • By virtue of being a mobile device, they move around a lot • When they move, they often change IP addresses
  • 207. About Devices... • By virtue of being a mobile device, they move around a lot • When they move, they often change IP addresses • New cell tower
  • 208. About Devices... • By virtue of being a mobile device, they move around a lot • When they move, they often change IP addresses • New cell tower • Change connectivity - 4G -> 3G, 3G -> WiFi, etc.
  • 209. About Devices... • By virtue of being a mobile device, they move around a lot • When they move, they often change IP addresses • New cell tower • Change connectivity - 4G -> 3G, 3G -> WiFi, etc. • When they change IP addresses, they need to reconnect TCP sockets
  • 210. About Devices... • By virtue of being a mobile device, they move around a lot • When they move, they often change IP addresses • New cell tower • Change connectivity - 4G -> 3G, 3G -> WiFi, etc. • When they change IP addresses, they need to reconnect TCP sockets • Sometimes they are kind enough to let us know
  • 211. About Devices... • By virtue of being a mobile device, they move around a lot • When they move, they often change IP addresses • New cell tower • Change connectivity - 4G -> 3G, 3G -> WiFi, etc. • When they change IP addresses, they need to reconnect TCP sockets • Sometimes they are kind enough to let us know • Those reconnections are expensive for us and the devices
  • 213. We Learned About EC2 • EC2 is a great jumping-off point
  • 214. We Learned About EC2 • EC2 is a great jumping-off point • Scaling vertically is very expensive
  • 215. We Learned About EC2 • EC2 is a great jumping-off point • Scaling vertically is very expensive • Like Carriers, EC2 networking is fond of holding on to TCP teardown sequence packets
  • 216. We Learned About EC2 • EC2 is a great jumping-off point • Scaling vertically is very expensive • Like Carriers, EC2 networking is fond of holding on to TCP teardown sequence packets • vNICs obfuscate important data when you care about 1M connections
  • 217. We Learned About EC2 • EC2 is a great jumping-off point • Scaling vertically is very expensive • Like Carriers, EC2 networking is fond of holding on to TCP teardown sequence packets • vNICs obfuscate important data when you care about 1M connections • Great for surge capacity
  • 218. We Learned About EC2 • EC2 is a great jumping-off point • Scaling vertically is very expensive • Like Carriers, EC2 networking is fond of holding on to TCP teardown sequence packets • vNICs obfuscate important data when you care about 1M connections • Great for surge capacity • Don’t split services into the virtual domain
  • 219. About EC2... • When you care about throughput, the virtualization tax is high
  • 221. About EC2... • Limited applicability for testing
  • 222. About EC2... • Limited applicability for testing • Egress port limitations kick in at ~63K egress connections - 16 XLs to test 1M connections
  • 223. About EC2... • Limited applicability for testing • Egress port limitations kick in at ~63K egress connections - 16 XLs to test 1M connections • Can’t create vNIC in an EC2 guest
  • 224. About EC2... • Limited applicability for testing • Egress port limitations kick in at ~63K egress connections - 16 XLs to test 1M connections • Can’t create vNIC in an EC2 guest • Killing a client doesn’t disconnect immediately
  • 225. About EC2... • Limited applicability for testing • Egress port limitations kick in at ~63K egress connections - 16 XLs to test 1M connections • Can’t create vNIC in an EC2 guest • Killing a client doesn’t disconnect immediately • Pragmatically, smalls have no use for our purposes, not enough RAM, %steal too high
  • 226. Lessons Learned - Failing Well • Scale vertically and horizontally • Scale vertically but remember... • We can reliably take one Java process up to 990K open connections • What happens when that one process fails? • What happens when you need to do maintenance?
  • 227. Thanks! • Urban Airship http://urbanairship.com/ • Me @eonnen on Twitter or erik@urbanairship.com • We’re hiring! http://urbanairship.com/company/jobs/
  • 229. Additional UA Reading • Infrastructure Improvements - http://urbanairship.com/ blog/2012/05/17/scaling-urban-airships-messaging- infrastructure-to-light-up-a-stadium-in-one-second/
  • 230. Additional UA Reading • Infrastructure Improvements - http://urbanairship.com/ blog/2012/05/17/scaling-urban-airships-messaging- infrastructure-to-light-up-a-stadium-in-one-second/ • C500K - http://urbanairship.com/blog/2010/08/24/c500k- in-action-at-urban-airship/

Editor's Notes

  1. \n
  2. \n
  3. \n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. A perfect storm of growth, EC2, painful lessons learned\n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. \n
  25. \n
  26. \n
  27. \n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. \n
  41. \n
  42. \n
  43. \n
  44. \n
  45. \n
  46. \n
  47. \n
  48. \n
  49. \n
  50. \n
  51. \n
  52. 3.15x garbage 43% of the time \n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. \n
  71. \n
  72. \n
  73. CODE\n
  74. \n
  75. \n
  76. CODE\n
  77. CODE\n
  78. CODE\n
  79. CODE\n
  80. CODE\n
  81. \n
  82. \n
  83. \n
  84. \n
  85. \n
  86. \n
  87. \n
  88. \n
  89. \n
  90. \n
  91. \n
  92. \n
  93. \n
  94. \n
  95. \n
  96. \n
  97. \n
  98. \n
  99. ZK demo\n
  100. \n
  101. ZK demo\n
  102. ZK demo\n
  103. ZK demo\n
  104. ZK demo\n
  105. ZK demo\n
  106. ZK demo\n
  107. \n
  108. \n
  109. \n
  110. \n
  111. \n
  112. \n
  113. \n
  114. \n
  115. \n
  116. Single thread, 1MB buffer vs. 8K buffer on a single channel\n
  117. Single thread, 1MB buffer vs. 8K buffer on a single channel\n
  118. Single thread, 1MB buffer vs. 8K buffer on a single channel\n
  119. Single thread, 1MB buffer vs. 8K buffer on a single channel\n
  120. Single thread, 1MB buffer vs. 8K buffer on a single channel\n
  121. Single thread, 1MB buffer vs. 8K buffer on a single channel\n
  122. \n
  123. \n
  124. 84 bytes per connection is GB of bandwidth per month\n
  125. 84 bytes per connection is GB of bandwidth per month\n
  126. \n
  127. \n
  128. \n
  129. \n
  130. \n
  131. \n
  132. \n
  133. \n
  134. \n
  135. \n
  136. \n
  137. \n
  138. \n
  139. \n
  140. \n
  141. \n
  142. \n
  143. \n
  144. 6.5k for one TLS negotiation, 1K worth of data\n
  145. 6.5k for one TLS negotiation, 1K worth of data\n
  146. 6.5k for one TLS negotiation, 1K worth of data\n
  147. 6.5k for one TLS negotiation, 1K worth of data\n
  148. 6.5k for one TLS negotiation, 1K worth of data\n
  149. 6.5k for one TLS negotiation, 1K worth of data\n
  150. 6.5k for one TLS negotiation, 1K worth of data\n
  151. 6.5k for one TLS negotiation, 1K worth of data\n
  152. Akamai went from 10s of thousands of connections down to 1000s\n
  153. Akamai went from 10s of thousands of connections down to 1000s\n
  154. Akamai went from 10s of thousands of connections down to 1000s\n
  155. Akamai went from 10s of thousands of connections down to 1000s\n
  156. Akamai went from 10s of thousands of connections down to 1000s\n
  157. Akamai went from 10s of thousands of connections down to 1000s\n
  158. Akamai went from 10s of thousands of connections down to 1000s\n
  159. \n
  160. \n
  161. \n
  162. \n
  163. \n
  164. \n
  165. \n
  166. \n
  167. \n
  168. \n
  169. \n
  170. \n
  171. \n
  172. \n
  173. \n
  174. \n
  175. \n
  176. \n
  177. \n
  178. \n
  179. \n
  180. \n
  181. \n
  182. \n
  183. \n
  184. \n
  185. \n
  186. \n
  187. \n
  188. 64511 max\n
  189. 64511 max\n
  190. 64511 max\n
  191. 64511 max\n
  192. 64511 max\n
  193. \n
  194. \n
  195. \n
  196. \n