Skip to main content

A hot fix for a Service Bus problem

In this post we will talk about a performance problem that occurred in an application that is using Service Bus On-premises. But the problem and solution is applicable also for any other system that is using not only Service Bus On-premises but also Azure Service Bus.

Context
We have an application that process a specific type of messages that are coming through Service Bus. Our application has a dedicated Topic that is used only by them. A Subscription from another Topic forward automatically the messages to our application topic.
The current requirement requires that we need to write in logs all the messages that we are reading from our Application Subscription, even the one that we don’t need to process. The system that push messages to our Topic, is pushing a lot of messages to our topic, even messages that we don’t need to process, but because we need to log all messages that we receive we add a filter to our Subscription to receive and consume only the messages that we care.
The application cannot scale by adding more instances. Only one instance of our app can run, we can only scale up by adding more horse power (CPU, Memory).

Problem
Because of this we can end up with millions of messages, where only 2-3% of them are messages that need to be process. A Topic can reach a limited size and because of the noise that the other system sends to us we end up with millions of messages that stays in the queue.
The application was design in such a way that cannot scale. When the load is medium, we reach easily 3-4M messages in the subscription (it seems that when we reach 4M messages, we start to have stability problem).


What we can do consume all this messages, but reducing the load on our application with minimal costs?
Of course we could say that we should change the system that push messages to not push messages that we don’t need, but this is not possible. Another solution is to add a filter on our subscription to ignore messages that we don’t care, but this is not possible also because we need to log all messages that were send to our Subscription (Topic).

Solution
A simple solution that I see, that would be compliant will the given context is to create on our topic one more subscription. On our initial subscription we would add a filter that would accept only the messages that we need to process, and a second subscription that accepts messages that we don’t care, but we need to log.
We can listen to our the second subscription with another application or with even a listener that is running in the same process like our main application and the only thing that he does is to log the message in our logger.




In this way, even if we cannot scale our application, by adding more resources, we can eliminate from our Topic as soon as possible the messages that we don’t care (having control on the size of the Topic/Subscription) - having control on the Topic size.

Comments

Popular posts from this blog

Windows Docker Containers can make WIN32 API calls, use COM and ASP.NET WebForms

After the last post , I received two interesting questions related to Docker and Windows. People were interested if we do Win32 API calls from a Docker container and if there is support for COM. WIN32 Support To test calls to WIN32 API, let’s try to populate SYSTEM_INFO class. [StructLayout(LayoutKind.Sequential)] public struct SYSTEM_INFO { public uint dwOemId; public uint dwPageSize; public uint lpMinimumApplicationAddress; public uint lpMaximumApplicationAddress; public uint dwActiveProcessorMask; public uint dwNumberOfProcessors; public uint dwProcessorType; public uint dwAllocationGranularity; public uint dwProcessorLevel; public uint dwProcessorRevision; } ... [DllImport("kernel32")] static extern void GetSystemInfo(ref SYSTEM_INFO pSI); ... SYSTEM_INFO pSI = new SYSTEM_INFO(

Azure AD and AWS Cognito side-by-side

In the last few weeks, I was involved in multiple opportunities on Microsoft Azure and Amazon, where we had to analyse AWS Cognito, Azure AD and other solutions that are available on the market. I decided to consolidate in one post all features and differences that I identified for both of them that we should need to take into account. Take into account that Azure AD is an identity and access management services well integrated with Microsoft stack. In comparison, AWS Cognito is just a user sign-up, sign-in and access control and nothing more. The focus is not on the main features, is more on small things that can make a difference when you want to decide where we want to store and manage our users.  This information might be useful in the future when we need to decide where we want to keep and manage our users.  Feature Azure AD (B2C, B2C) AWS Cognito Access token lifetime Default 1h – the value is configurable 1h – cannot be modified

What to do when you hit the throughput limits of Azure Storage (Blobs)

In this post we will talk about how we can detect when we hit a throughput limit of Azure Storage and what we can do in that moment. Context If we take a look on Scalability Targets of Azure Storage ( https://azure.microsoft.com/en-us/documentation/articles/storage-scalability-targets/ ) we will observe that the limits are prety high. But, based on our business logic we can end up at this limits. If you create a system that is hitted by a high number of device, you can hit easily the total number of requests rate that can be done on a Storage Account. This limits on Azure is 20.000 IOPS (entities or messages per second) where (and this is very important) the size of the request is 1KB. Normally, if you make a load tests where 20.000 clients will hit different blobs storages from the same Azure Storage Account, this limits can be reached. How we can detect this problem? From client, we can detect that this limits was reached based on the HTTP error code that is returned by HTTP