Logo
PREGNANCY
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
 
 
Windows Server

SharePoint 2013 Request Management (part 1) - The Request Management Process

3/8/2014 7:53:53 PM

Request Management is a new feature of SharePoint 2013. Although the topic of Request Management does not directly relate to disaster recovery and health.

Request Management allows SharePoint to understand more about, and control the handling of, incoming requests for pages, documents, and any other content that SharePoint may deliver to end users. The Request Management service encompasses a rules engine to make decisions on delegation of server requests to different servers in a multi-server SharePoint 2013 farm.

A new SharePoint service called “Microsoft SharePoint Foundation Web Application” handles Request Management for the SharePoint farm. The following steps show the location of this service in Central Administration:

  1. Navigate to Central Administration.
  2. Click the link for Manage Services on Server, under the System Settings heading.
  3. Scroll down the list of services.
  4. The Microsoft SharePoint Foundation Web Application should have a state of Started.

As the service name suggests, Request Management is part of the core SharePoint platform and available to all versions of SharePoint 2013, including Foundation.

Wait a minute! Request Management sounds like the job of a load balancer, outside the responsibility of SharePoint. Yes and no. Any administrator responsible for a multi-server and multiple web-front-end SharePoint farm is probably aware of the role of a hardware or software load balancer. A load balancer sits in front of all incoming requests and redirects traffic to one of a pool of web servers, depending on availability of these servers. Typically, load balancers make determinations on what server they forward requests to based on DNS settings and servers that respond to IP requests. Some more intelligent load balancers can monitor server utilization and route traffic based on available load. However, SharePoint is a dynamic platform, which might consist of many different servers, providing different services. Some servers in a SharePoint farm may provide multiple functions. Request Management provides better granular control over which servers receive which requests, based on data in each request. For example, by looking at the user agent, content type, etc. within a request, the Request Management service can direct traffic to a SharePoint server that is best equipped to service a response.

The Request Management Process

Request Management consists of the Web Application service, running on every SharePoint server in the farm. This is important to note—Request Management requires knowledge of the performance and characteristics of each SharePoint server available to service requests, and this is the job of this service.

The Request Manager (the service running on each SharePoint server) provides three levels of operation:

  • Load balancing
  • Prioritization
  • Throttling and routing

Figure 1 illustrates rule flow of Request Management in SharePoint 2013. Based on a set of routing rules, Request Management makes decisions on where to route server requests.

Each potential target server to respond to a request resides within a machine pool. Each server in a machine pool has a static weighting and health weighting, which the routing rules use to determine the eligibility of servers to service requests. Static weights are numeric values assigned by administrators to weight particular servers in the farm, whereas SharePoint changes health weights as the performance and health of servers changes over time.

Routing rules group into execution groups, of which there are three: Execution Group 0, 1, and 2 (Execution Group 2 not shown in Figure 1). Any rule not explicitly assigned to an execution group assumes Execution Group 0. Execution groups denote precedence; rules in Group 0 are evaluated before those in Group 1, which are evaluated before those in Group 2. It is the job of routing rules to determine which machine pool will service an incoming request.

9781430249412_Fig05-21.jpg

Figure 1. Request Management flow

Throttling rules (not shown in Figure 1) refuse incoming requests that match these rules, and act as a gatekeeper for all requests. For example, requests that have inappropriate parameters or request data might trigger a throttling rule.

The Request Manager evaluates which server shall service an incoming request as follows:

  1. Compare the request with a set of throttling rules; if the request matches any of these rules then refuse the request.
  2. Evaluate the request by matching it against all routing rules in Execution Group 0, followed by Execution Group 1, and then Execution Group 2.
  3. Depending on matching to routing rules in a specific execution group, route the request to the machine pool associated with the routing rule satisfied by the request.

Any routing rule can route requests to any machine pool. The presence of the routing rule in one of the execution groups ascertains priority. Thus, rules in Execution Group 0 will evaluate first and target machine pools determined best equipped to satisfy the requests.

Other -----------------
- Windows Server 2012 : Deploying Storage Spaces (part 5) - Implementing Storage Spaces, Using Windows PowerShell
- Windows Server 2012 : Deploying Storage Spaces (part 4) - Planning a Storage Spaces deployment - Availability, Management
- Windows Server 2012 : Deploying Storage Spaces (part 3) - Planning a Storage Spaces deployment - Hardware, Performance, Resiliency
- Windows Server 2012 : Deploying Storage Spaces (part 2) - Understanding Storage Spaces - Fixed vs. thin provisioning
- Windows Server 2012 : Deploying Storage Spaces (part 1) - Understanding Storage Spaces - Concepts and terminology
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 8) - Connecting to Exchange 2003 Routing Groups
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 7) - Viewing and Managing Receive Connectors
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 6) - Creating Receive Connectors
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 5) - Configuring Send Connector DNS Lookups, Setting Send Connector Limits
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 4) - Viewing and Managing Send Connectors
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 3) - Creating Send Connectors
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 2) - Viewing and Managing Active Directory Site Link Details
- Microsoft Exchange Server 2010 : Working with SMTP Connectors, Sites, and Links (part 1) - Viewing and Managing Active Directory Site Details
- Administering an Exchange Server 2013 Environment (part 9) - Server Administration
- Administering an Exchange Server 2013 Environment (part 8) - Understanding Archiving
- Administering an Exchange Server 2013 Environment (part 7) - Understanding Journaling
- Administering an Exchange Server 2013 Environment (part 6) - Introduction to Role Based Access Control
- Administering an Exchange Server 2013 Environment (part 5) - Performing Common Tasks - Creating Multiple Mailboxes in the Exchange Management Shell
- Administering an Exchange Server 2013 Environment (part 4) - Performing Common Tasks - Creating User Mailboxes
- Administering an Exchange Server 2013 Environment (part 3) - Exchange Management Shell
 
 
Most view of day
- Microsoft Exchange Server 2010 : Managing Transport and Journaling Rules - Setting Up Message Classifications (part 2)
- Microsoft Exchange Server 2013 : Mailbox management - Setting mailbox permissions (part 1) - Mailbox delegation
- Using Micrsosft Outlook 2010 with SharePoint and OCS : Using SharePoint Document Libraries in Outlook
- Backup and Restore of Microsoft Lync Server 2010 : Restore Processes
- Tracking Change in Vista : Turning on the audit policy, Exploring the Vista Event Log
- Zero Touch Installations : Creating and Capturing a Reference Image (part 2) - Install Packages on the Distribution Points, Create a Collection and a Computer Association
- Multi-Tenancy in SharePoint 2013 (part 2) - Multi-Tenant Use Cases, Partitioning in the Enterprise
- Windows Server 2008 R2 high-availability and recovery features : Installing and Administering Failover Clustering (part 4) - Verifying cluster configuration using the Cluster Validation Wizard
- Exchange Server 2007 : Using OWA Mail Features (part 2)
- Sharepoint 2013 : The Office JavaScript Object Model (part 1) - Document-based Apps
Top 10
- Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 6) - Tracking installed roles, role services, and features
- Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 5) - Installing components at the prompt
- Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 4) - Managing server binaries
- Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 3) - Adding server roles and features
- Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 2) - Installing components with Server Manager - Viewing configured roles and role services
- Managing Windows Server 2012 Systems : Configuring Roles, Role Services, and Features (part 1) - Using roles, role services, and features
- Windows Server 2012 : Configuring IPsec (part 7) - Configuring connection security rules - Monitoring IPsec
- Windows Server 2012 : Configuring IPsec (part 6) - Configuring connection security rules - Creating a custom rule, Configuring authenticated bypass
- Windows Server 2012 : Configuring IPsec (part 5) - Configuring connection security rules - Creating an authentication exemption rule, Creating a server-to-server rule, Creating a tunnel rule
- Windows Server 2012 : Configuring IPsec (part 4) - Configuring connection security rules - Types of connection security rules, Creating an isolation rule
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro