Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Revert "unbundle agent and remove associated code (#31228)" #31796

Merged
merged 2 commits into from
Dec 12, 2024

Conversation

alopezz
Copy link
Contributor

@alopezz alopezz commented Dec 5, 2024

What does this PR do?

It reverts the cleanup around the single-binary agent done in #31228 so that the Heroku Agent can keep a single-binary Agent including the core agent and the process-agent.

Motivation

Removing "bundling" on #31228 made the two Agent builds done for the heroku target essentially the same, when one of them is actually expected to include the process agent (bundled in the same binary).

This is the core logic that was lost and that this revert would recover:

if heroku_target?
bundled_agents = ["process-agent"]
end

bundle_arg = bundled_agents ? bundled_agents.map { |k| "--bundle #{k}" }.join(" ") : "--bundle agent"

command "inv -e agent.build --exclude-rtloader #{include_sds} --major-version #{major_version_arg} --rebuild --no-development --install-path=#{install_dir} --embedded-path=#{install_dir}/embedded --flavor #{flavor_arg} #{bundle_arg}", env: env

This was discovered when we were investigating why we were building the Agent twice for Heroku with no clear differences (#31572, #31625).

This single-binary build was added for Heroku in #23422.

The Heroku Buildpack relies on the presence of a "core-agent" and a "core-agent+process-agent" and chooses between the two (deleting the other) depending on whether the process agent is required. The logic where this is done is here:
https://github.com/DataDog/heroku-buildpack-datadog/blob/5034fb2a7840a8996dee968bf7004f830f4c3149/bin/compile#L241-L262.

Describe how you validated your changes

TODO: Ideally we would confirm that we stopped having the process agent when the change was introduced and that we've recovered it with this PR, though as of now I have no idea how to do that for Heroku.

Possible Drawbacks / Trade-offs

This reverts the original PR wholesale, whereas this could probably be achieved with a smaller change. But we're in the middle of a release and the fix looks urgent to me to try to do it cleanly now.

A longer term discussion might still be needed regarding how we want to support this specific use case.

Additional Notes

This will have to be backported to 7.61.

@alopezz alopezz requested review from a team as code owners December 5, 2024 14:33
@alopezz alopezz requested a review from jeremy-hanna December 5, 2024 14:33
@agent-platform-auto-pr
Copy link
Contributor

agent-platform-auto-pr bot commented Dec 5, 2024

Test changes on VM

Use this command from test-infra-definitions to manually test this PR changes on a VM:

inv aws.create-vm --pipeline-id=50963946 --os-family=ubuntu

Note: This applies to commit ce7fc27

Copy link

cit-pr-commenter bot commented Dec 5, 2024

Regression Detector

Regression Detector Results

Metrics dashboard
Target profiles
Run ID: 1c0b6b8c-8e44-4ff6-bb9d-0a21b77cabd8

Baseline: 68f07c6
Comparison: ce7fc27
Diff

Optimization Goals: ✅ No significant changes detected

Fine details of change detection per experiment

perf experiment goal Δ mean % Δ mean % CI trials links
quality_gate_idle memory utilization +0.32 [+0.27, +0.36] 1 Logs bounds checks dashboard
file_tree memory utilization +0.07 [-0.06, +0.20] 1 Logs
file_to_blackhole_300ms_latency egress throughput +0.01 [-0.62, +0.65] 1 Logs
file_to_blackhole_0ms_latency_http2 egress throughput +0.00 [-0.84, +0.85] 1 Logs
tcp_dd_logs_filter_exclude ingress throughput -0.00 [-0.01, +0.01] 1 Logs
file_to_blackhole_0ms_latency egress throughput -0.00 [-0.85, +0.84] 1 Logs
uds_dogstatsd_to_api ingress throughput -0.01 [-0.10, +0.08] 1 Logs
file_to_blackhole_100ms_latency egress throughput -0.01 [-0.69, +0.66] 1 Logs
file_to_blackhole_0ms_latency_http1 egress throughput -0.02 [-0.85, +0.81] 1 Logs
quality_gate_logs % cpu utilization -0.02 [-2.95, +2.90] 1 Logs
file_to_blackhole_500ms_latency egress throughput -0.06 [-0.82, +0.71] 1 Logs
file_to_blackhole_1000ms_latency egress throughput -0.30 [-1.08, +0.48] 1 Logs
file_to_blackhole_1000ms_latency_linear_load egress throughput -0.36 [-0.81, +0.10] 1 Logs
tcp_syslog_to_blackhole ingress throughput -0.50 [-0.56, -0.43] 1 Logs
otel_to_otel_logs ingress throughput -0.52 [-1.19, +0.15] 1 Logs
quality_gate_idle_all_features memory utilization -0.66 [-0.77, -0.54] 1 Logs bounds checks dashboard
uds_dogstatsd_to_api_cpu % cpu utilization -0.80 [-1.51, -0.09] 1 Logs

Bounds Checks: ❌ Failed

perf experiment bounds_check_name replicates_passed links
file_to_blackhole_500ms_latency lost_bytes 8/10
file_to_blackhole_0ms_latency lost_bytes 10/10
file_to_blackhole_0ms_latency memory_usage 10/10
file_to_blackhole_0ms_latency_http1 lost_bytes 10/10
file_to_blackhole_0ms_latency_http1 memory_usage 10/10
file_to_blackhole_0ms_latency_http2 lost_bytes 10/10
file_to_blackhole_0ms_latency_http2 memory_usage 10/10
file_to_blackhole_1000ms_latency memory_usage 10/10
file_to_blackhole_1000ms_latency_linear_load memory_usage 10/10
file_to_blackhole_100ms_latency lost_bytes 10/10
file_to_blackhole_100ms_latency memory_usage 10/10
file_to_blackhole_300ms_latency lost_bytes 10/10
file_to_blackhole_300ms_latency memory_usage 10/10
file_to_blackhole_500ms_latency memory_usage 10/10
quality_gate_idle memory_usage 10/10 bounds checks dashboard
quality_gate_idle_all_features memory_usage 10/10 bounds checks dashboard
quality_gate_logs lost_bytes 10/10
quality_gate_logs memory_usage 10/10

Explanation

Confidence level: 90.00%
Effect size tolerance: |Δ mean %| ≥ 5.00%

Performance changes are noted in the perf column of each table:

  • ✅ = significantly better comparison variant performance
  • ❌ = significantly worse comparison variant performance
  • ➖ = no significant change in performance

A regression test is an A/B test of target performance in a repeatable rig, where "performance" is measured as "comparison variant minus baseline variant" for an optimization goal (e.g., ingress throughput). Due to intrinsic variability in measuring that goal, we can only estimate its mean value for each experiment; we report uncertainty in that value as a 90.00% confidence interval denoted "Δ mean % CI".

For each experiment, we decide whether a change in performance is a "regression" -- a change worth investigating further -- if all of the following criteria are true:

  1. Its estimated |Δ mean %| ≥ 5.00%, indicating the change is big enough to merit a closer look.

  2. Its 90.00% confidence interval "Δ mean % CI" does not contain zero, indicating that if our statistical model is accurate, there is at least a 90.00% chance there is a difference in performance between baseline and comparison variants.

  3. Its configuration does not mark it "erratic".

CI Pass/Fail Decision

Passed. All Quality Gates passed.

  • quality_gate_idle, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_idle_all_features, bounds check memory_usage: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check lost_bytes: 10/10 replicas passed. Gate passed.
  • quality_gate_logs, bounds check memory_usage: 10/10 replicas passed. Gate passed.

deva agent.build --bundle process-agent --bundle security-agent
```

To disable bundling entirely:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

❓ question
Sounds confusing that this doc says that the agent can combine multiple functionalities as an option, and then here it says that to disable bundling you have to pass --bundle agent. What is the default?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

If you don't put anything it's equivalent to --bundle agent

@Pythyu Pythyu added the backport/7.61.x Automatically create a backport PR to 7.61.x label Dec 12, 2024
@Pythyu Pythyu added the qa/done QA done before merge and regressions are covered by tests label Dec 12, 2024
@Pythyu
Copy link
Contributor

Pythyu commented Dec 12, 2024

/merge

@dd-devflow
Copy link

dd-devflow bot commented Dec 12, 2024

Devflow running: /merge

View all feedbacks in Devflow UI.


2024-12-12 15:13:24 UTC ℹ️ MergeQueue: waiting for PR to be ready

This merge request is not mergeable yet, because of pending checks/missing approvals. It will be added to the queue as soon as checks pass and/or get approvals.
Note: if you pushed new commits since the last approval, you may need additional approval.
You can remove it from the waiting list with /remove command.


2024-12-12 16:20:51 UTC ℹ️ MergeQueue: merge request added to the queue

The median merge time in main is 26m.


2024-12-12 16:54:36 UTC ℹ️ MergeQueue: This merge request was merged

@agent-platform-auto-pr
Copy link
Contributor

Package size comparison

Comparison with ancestor 68f07c6efd56010f4c23d64da525f3aadc8b3409

Diff per package
package diff status size ancestor threshold
datadog-agent-amd64-deb 1.41MB ⚠️ 1267.14MB 1265.73MB 140.00MB
datadog-iot-agent-amd64-deb 0.00MB 113.24MB 113.24MB 10.00MB
datadog-dogstatsd-amd64-deb 0.00MB 78.41MB 78.41MB 10.00MB
datadog-heroku-agent-amd64-deb -22.79MB 503.79MB 526.58MB 70.00MB
datadog-agent-x86_64-rpm 1.41MB ⚠️ 1276.38MB 1274.97MB 140.00MB
datadog-agent-x86_64-suse 1.41MB ⚠️ 1276.38MB 1274.97MB 140.00MB
datadog-iot-agent-x86_64-rpm 0.00MB 113.31MB 113.31MB 10.00MB
datadog-iot-agent-x86_64-suse 0.00MB 113.31MB 113.31MB 10.00MB
datadog-dogstatsd-x86_64-rpm 0.00MB 78.49MB 78.49MB 10.00MB
datadog-dogstatsd-x86_64-suse 0.00MB 78.49MB 78.49MB 10.00MB
datadog-agent-arm64-deb 1.41MB ⚠️ 1002.26MB 1000.85MB 140.00MB
datadog-iot-agent-arm64-deb 0.00MB 108.72MB 108.72MB 10.00MB
datadog-dogstatsd-arm64-deb 0.00MB 55.65MB 55.65MB 10.00MB
datadog-agent-aarch64-rpm 1.41MB ⚠️ 1011.47MB 1010.07MB 140.00MB
datadog-iot-agent-aarch64-rpm 0.00MB 108.79MB 108.79MB 10.00MB

Decision

⚠️ Warning

@dd-mergequeue dd-mergequeue bot merged commit 906f61a into main Dec 12, 2024
259 checks passed
@dd-mergequeue dd-mergequeue bot deleted the alopez/revert-31228 branch December 12, 2024 16:54
@github-actions github-actions bot added this to the 7.62.0 milestone Dec 12, 2024
@agent-platform-auto-pr
Copy link
Contributor

The backport to 7.61.x failed:

The process '/usr/bin/git' failed with exit code 1

To backport manually, run these commands in your terminal:

# Fetch latest updates from GitHub
git fetch
# Create a new working tree
git worktree add .worktrees/backport-7.61.x 7.61.x
# Navigate to the new working tree
cd .worktrees/backport-7.61.x
# Create a new branch
git switch --create backport-31796-to-7.61.x
# Cherry-pick the merged commit of this pull request and resolve the conflicts
git cherry-pick -x --mainline 1 906f61a453542d379ddfd379b9c53d401a9b696b
# Push it to GitHub
git push --set-upstream origin backport-31796-to-7.61.x
# Go back to the original working tree
cd ../..
# Delete the working tree
git worktree remove .worktrees/backport-7.61.x

Then, create a pull request where the base branch is 7.61.x and the compare/head branch is backport-31796-to-7.61.x.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backport/7.61.x Automatically create a backport PR to 7.61.x changelog/no-changelog medium review PR review might take time qa/done QA done before merge and regressions are covered by tests team/agent-shared-components
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants