-
Notifications
You must be signed in to change notification settings - Fork 8k
Adaptive System Protection
Adaptive system protection maintains high system throughput under the premise of reliability of the system.
The idea of TCP BBR gives us inspiration. We should balance the requests that the system can handle and the requests that are allowed to pass, rather than relying on a single metric (system load). Our ultimate goal is to increase the throughput of the system within the appropriate system load, rather than the load must be restricted below a threshold.
Sentinel's approach to system load protection is to use load1
as the metric to initiate traffic control, and the traffic allowed to pass is determined by the ability to process the request, including the response time and current QPS.
We've provided a demo for system adaptive protection: SystemGuardDemo.
There are several kinds of global protection item:
- System load (load1)
- System CPU usage
- Global inbound QPS
- Global average response time
- Global max concurrency (of inbound traffic)
Note that the system rules will take effect only for inbound traffic (EntryType.IN
).
Note: load protection only takes effect in Linux/Unix-like OS.
The request will be blocked under the condition:
- Current system load (
load1
) exceeds the threshold (highestSystemLoad
); - Current concurrent requests exceed the estimated capacity (
thread count > minRt * maxQps
)
We have a global statistic node ENTRY_NODE
which records global metrics (e.g. inbound QPS, average RT and thread count).
-
文档
-
Documents
- Read Me
- Introduction
- How to Use
- How it Works
- Flow Control
- Parameter Flow Control
- Cluster Flow Control
- API Gateway Flow Control
- Circuit Breaking
- Adaptive System Protection
- Metrics
- General Configuration
- Dynamic Rule Configuration
- Dashboard
- Integrations with open-source frameworks
- Contribution Guideline