Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Current state: Under Discussion

Discussion thread: https://lists.apache.org/thread/3gvsod6vrq5xb415yf0zs8cxry1lnfzf

JIRA:

Jira
serverASF JIRA
serverId5aa69414-a9e9-3523-82ec-879b028fb15b
keyKAFKA-15014

...

KIP-133 introduced AlterConfigPolicy  to enforce validations when requesting configuration changes for Kafka entities (e.g. Topics), similar to how KIP-108 introduced policies for Topic creation.

These 2 policies differ on the following: CreateTopicPolicy  includes all configurations, which allow validations between related configurations; but AlterConfigPolicy  only includes the configuration passed on the request, but not the existing configurations.

At that time, the AlterConfigs  API included all the configurations to be applied (usually after gathering all the current configurations first using DescribeConfigs  call). This has changed after KIP-339 was introduced. With IncrementalAlterConfigs , only configurations to be changed are including to the request and changes are calculated on the broker-side.

Once incremental updates were adopted, only enables This force users to a very limited type of validation validations (e.g. config x  cannot not be y) , when as the current state is not included in the request, while most important validations have a dependency between configurations (e.g. if value of a=b  and c=d  then x  cannot be y). Even morefurther, having these configuration some policies available only on creation , but not on alter when altering means the effort put to validate on creation is wasted when alteringon later changes.

If The purpose of this KIP is accepted, plugin implementations should be able to apply to allow the same policies on incremental alter configs, considering all resulting configurations (similar to topic creation and on alter config timepolicies, and; to some extend; to legacy alter configs).


There has been related KIPs that included this proposal:

...

This KIP borrows parts of KIP-170 discussion. If KIP-201 is resurrected, this changes shouldn't increase complexity of the KIP as it is just another field to map and same migration should apply.

Current workflow

At the moment there are 2 APIs for altering configs:

  • (legacy) alterConfig
  • incrementalAlterConfig

And alter config policy is treated somewhat different on each API.

The following workflows apply on each backend (ZK-based, and KRaft):

Workflows:

  • Zookeeper-based (ZkAdminManager):
    • Legacy Alter Config
      • Received new configs (sum(c^i@n+1)) -- whole new config state
      • Filter nulls and pass values to new props (t@n+1)
      • Validate new props (t@n+1)
      • Apply policy to new configs (sum(c^i@n+1))
      • Store new props (t@n+1)
    • Incremental Alter Config
      • Collect changes (sum(c^i@n+1))
      • Fetch current props (t@n)
      • Apply each alter config op (c^i@n+1) and return new config (t@n+1)
      • Validate new props (t@n+1)
      • Apply policy to new configs (sum(c^i@n+1))
      • Store new props (t@n+1)


  • KRaft (ConfigurationControlManager):
    • Legacy Alter Config
      • Where expected state (t@n+1) is all changes (sum(c^i@n+1))
      • Get current config (t@n)
      • For each change (c^i@n+1),
        • Get current config,
        • If diff value or broker change,
          • Add to records explicitly altered.
      • For each current config (c^i@n),
        • If not found in proposed (t@n+1),
        • Add to records implicitly deleted.
      • Validation
        • Get current config (t@n)
        • Prepare new config (t@n+1)
        • For each explicitly altered config
          • Apply change (c^i@n+1) to new config (t@n+1): including alter and deletes
          • Collect altered config on (sum(c^i@n+1))
        • For each implicit delete (only from legacy)
          • Apply delete to new config (t@n+1)
        • Validate new config (t@n+1)
        • Apply alter policy (sum(c^i@n+1))
        • Save new config (t@n+1)
    • Incremental Alter Config
      • For each change (c^i@n+1)
        • Get current config (c@n) and check current value
        • Prepare and add change request
      • Validation (change requests is explicitly alter configs, no implicit deletes)
        • Get current config (t@n)
        • Prepare new config (t@n+1)
        • For each explicitly altered config
          • Apply change (c^i@n+1) to new config (t@n+1): including alter and deletes
          • Collect altered config on (sum(c^i@n+1))
        • No implicit deletes on incremental
        • Validate new config (t@n+1)
        • Apply alter policy (sum(c^i@n+1))
        • Save new config (t@n+1)


Where:

  • t@n: current set of configs
  • t@n+1: next set of configs (i.e.

...

  • once changes are applied)
  • c^i: individual config key and value pair
  • c^i@n+1: individual config update proposed
  • sum(c^i@n+1): set of configs proposed


Some highlights:

  • On Legacy Alter Config, the set of changes proposed (sum(c^i@n+1)) is the same as the new config (t@n+1) with the difference that null values are removed from the new config.
  • On Incremental Alter Config, the set of changes proposed (sum(c^i@n+1)) is not the same as the new config (t@n+1), it only contains explicit changes to the config
  • Implicit deletes are a set of configs created on legacy alter config, when no value is provided (not in t@n+1) but exists on the current config (t@n)
  • Even though alter config policy receives the "requested" configurations, these have 2 different meanings depending on the API used to update configs.
    • When Legacy Alter Config, it means: requested changes (sum(c^i@n+1)) that is equal to new config state (t@n+1) including explicit deletes (sum(c^i@n+1 == null))
    • When Incremental Alter Config, it means: only requested changes (sum(c^i@n+1)) including explicit deletes (sum(c^i@n+1 == null)) but without any other config from current (!= t@n) or new status (!= t@n+1)
    • Plugin implementations do not know which one are they actually dealing with, and as incremental (new) API becomes broadly adopted, then configurations from the current status (t@n) not included in the request (sum(c^i@n+1)) are not considered.

Proposed Changes

Given the current limitations with the existing Alter Config policies, this KIP proposes to add a new version that explicitly considers the current (before alter) and updated (after alter) set of configurations.

  • New broker configuration: alter.config.v2.policy.class.name 
  • New interface: AlterConfigV2Policy  

Public Interfaces

1. Add AlterConfigV2Policy  including before and after configurations:

Public Interfaces

1. Extend AlterConfigPolicy.RequestMetadata to include existing configurations:

Code Block
public interface AlterConfigPolicyAlterConfigV2Policy extends Configurable, AutoCloseable {

    class RequestMetadata {

        private final ConfigResource resource;
        private final Map<String, String> configsconfigsBefore;
            private final Map<String, String> existingConfigsconfigsAfter;

        public RequestMetadata(ConfigResource resource, Map<String, String> configsconfigsBefore, Map<String, String> configsAfter) {
            this.resource = resource;
            this.configsconfigsBefore = configsconfigsBefore;
            this.existingConfigsconfigsAfter = Collections.emptyMap()configsAfter;
        }

		// ...

         public RequestMetadata(ConfigResource resource,   public Map<String, String> configs, Map<String, String> existingConfigsconfigsBefore() {
            this.resource = resourcereturn configsBefore;
            this.configs = configs;
            this.existingConfigs = existingConfigs;
        }

		// ...

         public   public Map<String, String> existingConfigsconfigsAfter() {
            return existingConfigsconfigsAfter;
        }

        // ...

    void validate(RequestMetadata requestMetadata) throws PolicyViolationException;
}

Proposed Changes

Enable Managers to use the new propertyWhere:

...

  • configsBefore 

...

  • includes current configurations
  • configsAfter includes resulting configurations as if requested configurations are applied

Deleted configurations will either not appear or have null value on the configurations after alter, returning back to default value (if any)existing configurations are already available.

Compatibility, Deprecation, and Migration Plan

  • What impact (if any) will there be on existing users?

Existing policy implementations should be safe, as new attribute won't be expected. New policy implementations will have to be deployed on brokers running newer versions including existing configurationsNone, it's a new API.

  • If we are changing behavior how will we phase out the older behavior?

Will be phased out naturally  by rolling out new versions with the latest APICurrent policy will be kept for compatibility. Later releases can consider deprecation.

  • If we need special migration tools, describe them here.

...

  • When will we remove the existing behavior?

Behavior is extended, not replacedOutside the scope of this KIP.

Test Plan

Extending existing Same as AlterConfigPolicy  tests.

...

If there are alternative ways of accomplishing the same thing, what were they? The purpose of this section is to motivate why the design is the way it is and not some other way.

Reuse existing AlterConfigPolicy

Extending the configs, and its semantics, would be a breaking change on behavior as existing deal with different meaning depending on the alter API used. To avoid dealing with existing issues/bugs a new API is proposed.