Refining Local Service Backend Pool Updater
Refining Local Service Backend Pool Updater
Purpose
The local service backend pool updater batches EndpointSlice-driven IP changes for local Services and applies them asynchronously to Azure Load Balancer backend pools. Today, when an updater batch observes an error from Get or CreateOrUpdate, it drops the batch after emitting a failure event, except for backend pool 404, which is dropped without emitting a failure event (though a failure metric is currently recorded).
This design adds bounded retry for errors that are worth retrying at the updater layer. It does not duplicate Azure SDK retries for the status codes already handled by the SDK retry policy. The retry behavior is local to the updater, reuses the existing updater tick loop, and avoids unbounded requeue.
Scope
In scope:
- Retry failed local-service backend-pool update operations when the error is classified as retriable.
- Add retry state to queued backend-pool update operations.
- Add a new max-retries configuration field for this updater.
- Emit retry and failure events with bounded event volume.
- Preserve current stale
404event behavior. Stop recording404as a failure metric. - Add unit tests for retry, exhaustion, non-retry, and stale cases.
Out of scope:
- Redesigning multiple standard load balancer selection.
- Changing main Service reconciliation retries.
- Changing Azure SDK retry policy.
- Changing cleanup behavior for local service backend pools.
Configuration
Add a new config field near LoadBalancerBackendPoolUpdateIntervalInSeconds:
// LoadBalancerBackendPoolUpdateMaxRetries is the maximum number of retries for
// retriable local-service backend-pool update failures. Defaults to 3.
LoadBalancerBackendPoolUpdateMaxRetries *int `json:"loadBalancerBackendPoolUpdateMaxRetries,omitempty" yaml:"loadBalancerBackendPoolUpdateMaxRetries,omitempty"`
Add a default constant near DefaultLoadBalancerBackendPoolUpdateIntervalInSeconds:
DefaultLoadBalancerBackendPoolUpdateMaxRetries = 3
Semantics:
niluses the default value3.- Explicit
0disables updater-level retry and preserves today’s drop-after-failure behavior for retriable errors. - Negative values are normalized to
0. - The count means extra retries after the first failed attempt. With the default
3, a retriable error can be observed up to four times: one initial attempt plus three requeued retry attempts.
Use a pointer so the config loader can distinguish “unset” from “explicitly set to 0”. Normalization happens next to the existing LoadBalancerBackendPoolUpdateIntervalInSeconds defaulting in pkg/provider/azure.go: if the pointer is nil, use DefaultLoadBalancerBackendPoolUpdateMaxRetries; if the pointer is non-nil and negative, clamp it to 0.
The omitempty tag is intentional with the pointer field: a nil pointer is omitted and therefore defaults, while a non-nil pointer to 0 is preserved across marshal/unmarshal and keeps retry disabled.
Retry Model
Use requeue-on-retriable-error. Each loadBalancerBackendPoolUpdateOperation carries retry metadata:
retryCount int, tracking how many retryable failures have already been consumednextEligibleAt time.Time, tracking when a throttled operation is eligible to be processed again
On each updater tick:
- Acquire
serviceReconcileLockto serialize with the main service reconciliation loop. - If the queue is empty (
countOperations() == 0), release the lock and return. - Acquire
azureResourceLocker(distributed lease lock) to serialize with other components that update load balancer resources. If the lease lock fails, return without draining. Operations remain in the queue for the next tick. - Drain the queued operations via
drainOperations()(acquiresupdater.lock, moves all operations out, clears the queue, releasesupdater.lock). - Filter and group operations via
groupOperations()underserviceReconcileLock:- the Service is still in
localServiceNameToServiceInfoMap - the Service still points to the same load balancer
- group relevant operations by
loadBalancerName/backendPoolName
- the Service is still in
- If any operation in a group has
nextEligibleAtin the future, requeue the whole group. Do not call ARM, emit an event, record a metric, or increment retry state for skipped groups. - Process each eligible group once.
- On retriable failure of a group, increment each constituent operation’s
retryCountuniformly. - Requeue operations whose retry budget remains (acquire
updater.lockto append back to the live queue). - Drop exhausted operations and emit
LoadBalancerBackendPoolUpdateFailedonce per distinct Service in the group.
Retries do not carry over the in-memory backend pool object. The next tick re-issues Get for the group before re-applying queued operations, which is required for CreateOrUpdate conflicts and stale etags.
The updater must re-acquire the lock only when appending retry operations back to the live queue. New EndpointSlice events can continue adding fresh operations while a previous snapshot is doing Azure calls.
Merge Rule
Fresh operations and requeued operations for the same loadBalancerName/backendPoolName merge on the next updater tick through the existing grouping logic. Each operation keeps its own retryCount and nextEligibleAt; fresh operations start at retryCount=0 and no nextEligibleAt.
The group’s eligibility is determined by the most restrictive member: if any operation in the merged group has a future nextEligibleAt, the whole group is preserved without ARM calls. When an eligible merged group fails, the ARM error applies to the group, not to an individual operation. Per-operation error attribution is not possible at this layer, so every constituent operation consumes one retry. Exhausted operations are dropped and reported, while operations with remaining budget are requeued.
The throttling delay is group-level. If one operation for lbName/backendPoolName is parked by nextEligibleAt, all operations in that same group are preserved until the group becomes eligible. This avoids splitting add/remove operations for the same backend pool and preserves batching order. Unrelated groups continue processing normally.
Before requeueing or emitting retry/failure events, re-check that each operation is still relevant. If the Service is gone or now maps to a different load balancer, drop the stale operation quietly.
Error Classification
Classify updater errors into three categories:
stale: drop quietlyretriable: emit retrying event and requeue while budget remainsterminal: emit failed event and drop
Rules:
- ARM resource-not-found errors as detected by
errutils.CheckResourceExistsFromAzcoreErrorarestale. - ARM wire
429 TooManyRequestsresponses areretriable.- Classify them by checking
errors.As(err, &respErr)for*azcore.ResponseErrorwithStatusCode == http.StatusTooManyRequests. - Extract
Retry-AfterfromrespErr.RawResponse.HeaderwhenRawResponseis non-nil. - Parse
Retry-Afterthe same wayretryrepectthrottled.ThrottlingPolicy.processThrottlePolicydoes: integer seconds or RFC1123 time. - If the response has no parseable
Retry-After, fall back to the next updater tick.
- Classify them by checking
- Local throttle-gate
retryrepectthrottled.ErrTooManyRequestisretriable.- This path is detected with
errors.Is(err, retryrepectthrottled.ErrTooManyRequest)when no*azcore.ResponseError.RawResponseis available. - The local throttle gate returns the sentinel error without a response, header, or exported gate timestamp, so the updater cannot compute the policy’s gate expiry.
- Fall back to the next updater tick for this path.
- The updater does not read
ThrottlingPolicy.RetryAfterReaderorRetryAfterWriterdirectly. The policy instance is not exposed through the backend-pool client factory.
- This path is detected with
- ARM
409 Conflictand412 PreconditionFailedresponses areretriable; no special payload handling is needed because the next updater tick already runs through a freshGetbefore the nextCreateOrUpdate. - ARM response statuses in
retryrepectthrottled.GetRetriableStatusCode()areterminalfor this updater. The Azure SDK already retries those statuses inside the individual ARM call, so if the updater sees one of those errors, the SDK retry budget has already been exhausted. The updater emitsLoadBalancerBackendPoolUpdateFailedand drops the operation instead of adding a second retry layer for the same condition. - Non-ARM errors can opt into retry through a small wrapper/helper, such as:
func newRetriableBackendPoolUpdateError(err error) error
func isRetriableBackendPoolUpdateError(err error) bool
Keep this helper local to pkg/provider/azure_local_services.go unless another caller needs the same marker.
context.Canceledandcontext.DeadlineExceededare terminal whenctx.Err()is non-nil.- Other timeout-like non-ARM errors are terminal unless explicitly wrapped by the local retriable-error helper.
- All other errors are terminal.
The helper should use errors.As and errors.Is so wrapped errors remain classifiable.
The call site does not need generated backend-pool client wrappers to return raw *http.Response values. It should inspect the returned error directly:
var respErr *azcore.ResponseError
if errors.As(err, &respErr) && respErr.RawResponse != nil {
retryAfter := respErr.RawResponse.Header.Get(retryrepectthrottled.HeaderRetryAfter)
// parse retryAfter for 429 handling
}
Event Behavior
Use distinct events for retry and final failure:
LoadBalancerBackendPoolUpdateRetrying: emitted on every retryable failed attempt that will be requeued.LoadBalancerBackendPoolUpdateFailed: emitted when a terminal error occurs or the retry budget is exhausted. The event message should include the error and guidance: “Backend pool update failed: <error>. To retrigger, cause an endpoint change for the Service (e.g., restart or scale a backing pod).”LoadBalancerBackendPoolUpdated: keep existing success behavior.- ARM resource-not-found: no event.
The new LoadBalancerBackendPoolUpdateRetrying reason should be added as a constant in pkg/consts/, consistent with the repository convention for shared constants. If the implementation touches the existing LoadBalancerBackendPoolUpdateFailed or LoadBalancerBackendPoolUpdated literals, move those reasons to pkg/consts/ in the same narrow change.
Events should be emitted once per distinct Service in a backend-pool group, not once per raw add/remove operation. This avoids duplicate retry events when multiple operations for the same Service are batched together.
This intentionally fixes the current notify() behavior that reports only the first operation in a batch because of its break after the first loop iteration. Add a regression test so future changes preserve one event per distinct Service in the group.
When an operation is waiting for nextEligibleAt, the updater should not emit another retrying event on each skipped tick. The retrying event belongs to the failed attempt that scheduled the retry.
Locking And Queue Safety
The process() method acquires locks in a fixed order that matches the main service reconciliation loop:
serviceReconcileLock: serializes with the main reconcile path. Held for the entireprocess()call so thatlocalServiceNameToServiceInfoMapreads ingroupOperations()are consistent andremoveOperation()can cancel queued operations before they are drained.azureResourceLocker: distributed lease lock, serializes with other components that update Azure load balancer resources. If the lease cannot be acquired,process()returns without draining. Operations remain in the queue for the next tick.updater.lock: protectsupdater.operations.- lock to snapshot and clear
updater.operationsviadrainOperations() - unlock while doing filtering, grouping, and Azure calls
- lock to append retry operations back to
updater.operations - keep
addOperationandremoveOperationprotected by the same lock
- lock to snapshot and clear
This lock ordering (serviceReconcileLock before updater.lock) prevents deadlocks: the main reconcile path holds serviceReconcileLock and calls addOperation() (which acquires updater.lock).
addOperation and removeOperation only acquire updater.lock. This prevents slow Azure calls from blocking EndpointSlice event handlers that need to enqueue newer operations.
The removeOperation(serviceName) method cannot remove operations already in a processing snapshot. To avoid stale retry behavior, the processing path must re-check service relevance before requeueing and before sending retry/failure events.
Parked operations waiting for nextEligibleAt live in updater.operations, so removeOperation(serviceName) can remove them while they are parked. If removal races with the short snapshot-to-requeue window, the next tick’s relevance check drops the stale operation quietly.
The relevance re-check depends on the Service cleanup path also removing the Service from localServiceNameToServiceInfoMap. The implementation must preserve that invariant: a deleted Service should either be removed from the live queue by removeOperation(serviceName) or be rejected by the map-based relevance check before a retry is requeued or reported.
Queue Growth During Throttling
The queue is unbounded. During a long Retry-After period, EndpointSlice events continue to arrive and addOperation() appends new operations to the queue. Operation coalescing or a queue size limit can be added as a follow-up if needed.
New retry-path logging should use pkg/log contextual loggers. Do not add new direct klog calls while touching this file.
Cancellation And Shutdown
If the updater context is canceled, the run() loop exits and parked in-memory operations are discarded with the process. The updater should not emit retry or failure events for operations that are only abandoned because the controller is shutting down.
If an in-flight ARM call returns context.Canceled or context.DeadlineExceeded after the updater context is done, treat it as terminal shutdown behavior and do not requeue. If process() observes cancellation before re-appending a snapshot, it should drop the snapshot instead of preserving retry state for a loop that is stopping.
Metrics
The existing updater metric (ObserveOperationWithResult) should describe terminal outcomes, not intermediate retry attempts.
- Requeued attempts do not call
ObserveOperationWithResult(false). - Queue-preservation ticks while waiting for
nextEligibleAtdo not record a metric. - Success records one successful observation when
LoadBalancerBackendPoolUpdatedis emitted. - Terminal failure records one failed observation when
LoadBalancerBackendPoolUpdateFailedis emitted. - Stale resource-not-found and stale Service/LB drops record no observation. Note: this changes current behavior where
ObserveOperationWithResult(false)is called beforeprocessError()checks for 404, recording a failure metric for stale backend pools. The new behavior treats 404 as stale (no metric).
This prevents a retried-then-succeeded operation from appearing as multiple failed operations followed by one success.
Retry Timing
Updater-level retry uses the existing LoadBalancerBackendPoolUpdateIntervalInSeconds tick; this design does not add a separate sleep loop inside process(). Without Retry-After, default retry count 3 and default interval 30s means a continuously failing retriable condition emits retrying events on the first three failed attempts and emits the final failed event on the fourth failed attempt, roughly 90 seconds after the first observed failure plus ARM call latency. Depending on where the first failure lands relative to the updater tick and how long each ARM call takes, the wall-clock time from the original EndpointSlice change to final failure can be close to or above two minutes.
For 429 throttling, Retry-After overrides the next normal updater tick by setting nextEligibleAt. Ticks before nextEligibleAt only preserve the operation in the queue after re-checking Service/LB relevance; they do not call ARM, emit retrying events, or consume retry budget. LoadBalancerBackendPoolUpdateMaxRetries bounds failed processing attempts, not elapsed wall-clock time, so a long Retry-After can delay final success or failure beyond the normal interval-based timing.
During sustained Azure throttling, operators can reduce LoadBalancerBackendPoolUpdateMaxRetries or increase LoadBalancerBackendPoolUpdateIntervalInSeconds to avoid retry amplification when Retry-After is unavailable.
Exponential backoff is not used because the retriable errors at this layer either use server-directed delays (429 with Retry-After) or benefit from a fresh Get rather than longer waits (409/412). When all retries are exhausted without success, the operator receives a LoadBalancerBackendPoolUpdateFailed event with guidance to retrigger (see the Event Behavior section).
Tests
Add focused unit tests in pkg/provider/azure_local_services_test.go:
- ARM wire
429fromGetwith a parseableRetry-Afterinazcore.ResponseError.RawResponsesetsnextEligibleAtand emitsLoadBalancerBackendPoolUpdateRetrying; subsequent ticks beforenextEligibleAtrequeue quietly without ARM calls, retry events, retry-count increments, or metrics. - ARM wire
429fromCreateOrUpdatefollows the sameRetry-After,LoadBalancerBackendPoolUpdateRetrying, and requeue behavior. - ARM wire
429without a parseableRetry-Afterrequeues, emitsLoadBalancerBackendPoolUpdateRetrying, then succeeds on the next eligible tick. - Local-gate
retryrepectthrottled.ErrTooManyRequestwithout a raw response falls back to the next updater tick and does not panic on nil response. - ARM
409or412fromCreateOrUpdaterequeues, emitsLoadBalancerBackendPoolUpdateRetrying, then succeeds on the next tick after a freshGet. - If any operation in a
lbName/backendPoolNamegroup is waiting fornextEligibleAt, the whole group is preserved and no same-group operation is processed early. - A fresh operation merged with a requeued operation keeps its own retry counter; on group failure, all operations in the group consume one retry.
- A group with mixed retry budgets (one operation at max retries, one fresh): the exhausted operation is dropped and reported while the fresh operation is requeued.
- Retry budget exhaustion emits
LoadBalancerBackendPoolUpdateFailedwith guidance text and leaves the queue empty. - Statuses from
retryrepectthrottled.GetRetriableStatusCode()do not requeue and emitLoadBalancerBackendPoolUpdateFailed. - Other non-retriable errors do not requeue and emit
LoadBalancerBackendPoolUpdateFailed. - ARM resource-not-found does not requeue and emits no event.
- Stale service or changed load balancer before requeue is dropped quietly.
- A Service that disappears while its operation is parked behind
nextEligibleAtis dropped quietly on the next relevance check. - Multiple operations for multiple Services in a backend-pool group emit one retry/failure event per distinct Service, covering the current
notify()break-after-first-operation bug. removeOperation(serviceName)removes parked operations whosenextEligibleAtis in the future.- Updater shutdown with parked operations does not emit retry/failure events and does not requeue.
- Explicit
LoadBalancerBackendPoolUpdateMaxRetries: 0remains non-nil through config load and disables updater retry. - A retried-then-succeeded operation records exactly one successful metric observation and no failed metric observations.
Use a fake event recorder where needed to assert retrying and failed event reasons precisely.
Expected Behavior
With default retry count 3, a retriable updater failure behaves as:
- First failed attempt: emit
LoadBalancerBackendPoolUpdateRetrying, requeue. - Second failed attempt: emit
LoadBalancerBackendPoolUpdateRetrying, requeue. - Third failed attempt: emit
LoadBalancerBackendPoolUpdateRetrying, requeue. - Fourth failed attempt: emit
LoadBalancerBackendPoolUpdateFailed, drop.
If a later retry succeeds, the updater emits LoadBalancerBackendPoolUpdated and drops the completed operations.
If the Service becomes stale during retry, the updater drops the operation quietly instead of emitting retry or failure events.
If an ARM call returns a status from retryrepectthrottled.GetRetriableStatusCode() after the SDK retry policy has already run, the updater emits LoadBalancerBackendPoolUpdateFailed immediately and drops the operation.
If a 429 response provides Retry-After, the updater respects that value before the next processing attempt. Intermediate updater ticks before nextEligibleAt are queue-preservation ticks, not retry attempts.
Feedback
Was this page helpful?
Glad to hear it! Please tell us how we can improve.
Sorry to hear that. Please tell us how we can improve.