2018-01-09 18:57:14 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package scheduling
|
|
|
|
|
|
|
|
import (
|
|
|
|
"time"
|
|
|
|
|
|
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
2018-11-26 18:23:56 +00:00
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
2018-01-09 18:57:14 +00:00
|
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
|
|
"k8s.io/apimachinery/pkg/watch"
|
|
|
|
|
|
|
|
"k8s.io/client-go/tools/cache"
|
|
|
|
|
|
|
|
"k8s.io/api/core/v1"
|
|
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
|
|
"k8s.io/kubernetes/test/e2e/framework"
|
|
|
|
testutils "k8s.io/kubernetes/test/utils"
|
|
|
|
|
|
|
|
. "github.com/onsi/ginkgo"
|
|
|
|
_ "github.com/stretchr/testify/assert"
|
|
|
|
)
|
|
|
|
|
|
|
|
func getTestTaint() v1.Taint {
|
|
|
|
now := metav1.Now()
|
|
|
|
return v1.Taint{
|
|
|
|
Key: "kubernetes.io/e2e-evict-taint-key",
|
|
|
|
Value: "evictTaintVal",
|
|
|
|
Effect: v1.TaintEffectNoExecute,
|
|
|
|
TimeAdded: &now,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Creates a defaut pod for this test, with argument saying if the Pod should have
|
|
|
|
// toleration for Taits used in this test.
|
2018-11-26 18:23:56 +00:00
|
|
|
func createPodForTaintsTest(hasToleration bool, tolerationSeconds int, podName, podLabel, ns string) *v1.Pod {
|
2018-01-09 18:57:14 +00:00
|
|
|
grace := int64(1)
|
|
|
|
if !hasToleration {
|
|
|
|
return &v1.Pod{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2018-11-26 18:23:56 +00:00
|
|
|
Name: podName,
|
|
|
|
Namespace: ns,
|
|
|
|
Labels: map[string]string{"group": podLabel},
|
2018-01-09 18:57:14 +00:00
|
|
|
DeletionGracePeriodSeconds: &grace,
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Containers: []v1.Container{
|
|
|
|
{
|
|
|
|
Name: "pause",
|
2018-11-26 18:23:56 +00:00
|
|
|
Image: "k8s.gcr.io/pause:3.1",
|
2018-01-09 18:57:14 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if tolerationSeconds <= 0 {
|
|
|
|
return &v1.Pod{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2018-11-26 18:23:56 +00:00
|
|
|
Name: podName,
|
|
|
|
Namespace: ns,
|
|
|
|
Labels: map[string]string{"group": podLabel},
|
2018-01-09 18:57:14 +00:00
|
|
|
DeletionGracePeriodSeconds: &grace,
|
|
|
|
// default - tolerate forever
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Containers: []v1.Container{
|
|
|
|
{
|
|
|
|
Name: "pause",
|
2018-11-26 18:23:56 +00:00
|
|
|
Image: "k8s.gcr.io/pause:3.1",
|
2018-01-09 18:57:14 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
Tolerations: []v1.Toleration{{Key: "kubernetes.io/e2e-evict-taint-key", Value: "evictTaintVal", Effect: v1.TaintEffectNoExecute}},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
ts := int64(tolerationSeconds)
|
|
|
|
return &v1.Pod{
|
|
|
|
ObjectMeta: metav1.ObjectMeta{
|
2018-11-26 18:23:56 +00:00
|
|
|
Name: podName,
|
|
|
|
Namespace: ns,
|
|
|
|
Labels: map[string]string{"group": podLabel},
|
2018-01-09 18:57:14 +00:00
|
|
|
DeletionGracePeriodSeconds: &grace,
|
|
|
|
},
|
|
|
|
Spec: v1.PodSpec{
|
|
|
|
Containers: []v1.Container{
|
|
|
|
{
|
|
|
|
Name: "pause",
|
2018-11-26 18:23:56 +00:00
|
|
|
Image: "k8s.gcr.io/pause:3.1",
|
2018-01-09 18:57:14 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
// default - tolerate forever
|
|
|
|
Tolerations: []v1.Toleration{{Key: "kubernetes.io/e2e-evict-taint-key", Value: "evictTaintVal", Effect: v1.TaintEffectNoExecute, TolerationSeconds: &ts}},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Creates and starts a controller (informer) that watches updates on a pod in given namespace with given name. It puts a new
|
|
|
|
// struct into observedDeletion channel for every deletion it sees.
|
2018-11-26 18:23:56 +00:00
|
|
|
func createTestController(cs clientset.Interface, observedDeletions chan string, stopCh chan struct{}, podLabel, ns string) {
|
2018-01-09 18:57:14 +00:00
|
|
|
_, controller := cache.NewInformer(
|
|
|
|
&cache.ListWatch{
|
|
|
|
ListFunc: func(options metav1.ListOptions) (runtime.Object, error) {
|
2018-11-26 18:23:56 +00:00
|
|
|
options.LabelSelector = labels.SelectorFromSet(labels.Set{"group": podLabel}).String()
|
2018-01-09 18:57:14 +00:00
|
|
|
obj, err := cs.CoreV1().Pods(ns).List(options)
|
|
|
|
return runtime.Object(obj), err
|
|
|
|
},
|
|
|
|
WatchFunc: func(options metav1.ListOptions) (watch.Interface, error) {
|
2018-11-26 18:23:56 +00:00
|
|
|
options.LabelSelector = labels.SelectorFromSet(labels.Set{"group": podLabel}).String()
|
2018-01-09 18:57:14 +00:00
|
|
|
return cs.CoreV1().Pods(ns).Watch(options)
|
|
|
|
},
|
|
|
|
},
|
|
|
|
&v1.Pod{},
|
|
|
|
0,
|
|
|
|
cache.ResourceEventHandlerFuncs{
|
2018-11-26 18:23:56 +00:00
|
|
|
DeleteFunc: func(oldObj interface{}) {
|
|
|
|
if delPod, ok := oldObj.(*v1.Pod); ok {
|
|
|
|
observedDeletions <- delPod.Name
|
|
|
|
} else {
|
|
|
|
observedDeletions <- ""
|
|
|
|
}
|
|
|
|
},
|
2018-01-09 18:57:14 +00:00
|
|
|
},
|
|
|
|
)
|
|
|
|
framework.Logf("Starting informer...")
|
|
|
|
go controller.Run(stopCh)
|
|
|
|
}
|
|
|
|
|
|
|
|
const (
|
|
|
|
KubeletPodDeletionDelaySeconds = 60
|
|
|
|
AdditionalWaitPerDeleteSeconds = 5
|
|
|
|
)
|
|
|
|
|
|
|
|
// Tests the behavior of NoExecuteTaintManager. Following scenarios are included:
|
|
|
|
// - eviction of non-tolerating pods from a tainted node,
|
|
|
|
// - lack of eviction of tolerating pods from a tainted node,
|
|
|
|
// - delayed eviction of short-tolerating pod from a tainted node,
|
|
|
|
// - lack of eviction of short-tolerating pod after taint removal.
|
2018-11-26 18:23:56 +00:00
|
|
|
var _ = SIGDescribe("NoExecuteTaintManager Single Pod [Serial]", func() {
|
2018-01-09 18:57:14 +00:00
|
|
|
var cs clientset.Interface
|
|
|
|
var ns string
|
2018-11-26 18:23:56 +00:00
|
|
|
f := framework.NewDefaultFramework("taint-single-pod")
|
2018-01-09 18:57:14 +00:00
|
|
|
|
|
|
|
BeforeEach(func() {
|
|
|
|
cs = f.ClientSet
|
|
|
|
ns = f.Namespace.Name
|
|
|
|
|
|
|
|
framework.WaitForAllNodesHealthy(cs, time.Minute)
|
|
|
|
|
|
|
|
err := framework.CheckTestingNSDeletedExcept(cs, ns)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// 1. Run a pod
|
|
|
|
// 2. Taint the node running this pod with a no-execute taint
|
|
|
|
// 3. See if pod will get evicted
|
|
|
|
It("evicts pods from tainted nodes", func() {
|
|
|
|
podName := "taint-eviction-1"
|
2018-11-26 18:23:56 +00:00
|
|
|
pod := createPodForTaintsTest(false, 0, podName, podName, ns)
|
|
|
|
observedDeletions := make(chan string, 100)
|
2018-01-09 18:57:14 +00:00
|
|
|
stopCh := make(chan struct{})
|
|
|
|
createTestController(cs, observedDeletions, stopCh, podName, ns)
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
By("Starting pod...")
|
2018-01-09 18:57:14 +00:00
|
|
|
nodeName, err := testutils.RunPodAndGetNodeName(cs, pod, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod is running on %v. Tainting Node", nodeName)
|
|
|
|
|
|
|
|
By("Trying to apply a taint on the Node")
|
|
|
|
testTaint := getTestTaint()
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName, &testTaint)
|
|
|
|
defer framework.RemoveTaintOffNode(cs, nodeName, testTaint)
|
|
|
|
|
|
|
|
// Wait a bit
|
|
|
|
By("Waiting for Pod to be deleted")
|
|
|
|
timeoutChannel := time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Failf("Failed to evict Pod")
|
|
|
|
case <-observedDeletions:
|
|
|
|
framework.Logf("Noticed Pod eviction. Test successful")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// 1. Run a pod with toleration
|
|
|
|
// 2. Taint the node running this pod with a no-execute taint
|
2018-03-06 22:33:18 +00:00
|
|
|
// 3. See if pod won't get evicted
|
2018-01-09 18:57:14 +00:00
|
|
|
It("doesn't evict pod with tolerations from tainted nodes", func() {
|
|
|
|
podName := "taint-eviction-2"
|
2018-11-26 18:23:56 +00:00
|
|
|
pod := createPodForTaintsTest(true, 0, podName, podName, ns)
|
|
|
|
observedDeletions := make(chan string, 100)
|
2018-01-09 18:57:14 +00:00
|
|
|
stopCh := make(chan struct{})
|
|
|
|
createTestController(cs, observedDeletions, stopCh, podName, ns)
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
By("Starting pod...")
|
2018-01-09 18:57:14 +00:00
|
|
|
nodeName, err := testutils.RunPodAndGetNodeName(cs, pod, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod is running on %v. Tainting Node", nodeName)
|
|
|
|
|
|
|
|
By("Trying to apply a taint on the Node")
|
|
|
|
testTaint := getTestTaint()
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName, &testTaint)
|
|
|
|
defer framework.RemoveTaintOffNode(cs, nodeName, testTaint)
|
|
|
|
|
|
|
|
// Wait a bit
|
|
|
|
By("Waiting for Pod to be deleted")
|
|
|
|
timeoutChannel := time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Logf("Pod wasn't evicted. Test successful")
|
|
|
|
case <-observedDeletions:
|
|
|
|
framework.Failf("Pod was evicted despite toleration")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// 1. Run a pod with a finite toleration
|
|
|
|
// 2. Taint the node running this pod with a no-execute taint
|
2018-03-06 22:33:18 +00:00
|
|
|
// 3. See if pod won't get evicted before toleration time runs out
|
2018-01-09 18:57:14 +00:00
|
|
|
// 4. See if pod will get evicted after toleration time runs out
|
|
|
|
It("eventually evict pod with finite tolerations from tainted nodes", func() {
|
|
|
|
podName := "taint-eviction-3"
|
2018-11-26 18:23:56 +00:00
|
|
|
pod := createPodForTaintsTest(true, KubeletPodDeletionDelaySeconds+2*AdditionalWaitPerDeleteSeconds, podName, podName, ns)
|
|
|
|
observedDeletions := make(chan string, 100)
|
2018-01-09 18:57:14 +00:00
|
|
|
stopCh := make(chan struct{})
|
|
|
|
createTestController(cs, observedDeletions, stopCh, podName, ns)
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
By("Starting pod...")
|
2018-01-09 18:57:14 +00:00
|
|
|
nodeName, err := testutils.RunPodAndGetNodeName(cs, pod, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod is running on %v. Tainting Node", nodeName)
|
|
|
|
|
|
|
|
By("Trying to apply a taint on the Node")
|
|
|
|
testTaint := getTestTaint()
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName, &testTaint)
|
|
|
|
defer framework.RemoveTaintOffNode(cs, nodeName, testTaint)
|
|
|
|
|
|
|
|
// Wait a bit
|
|
|
|
By("Waiting to see if a Pod won't be deleted")
|
|
|
|
timeoutChannel := time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Logf("Pod wasn't evicted")
|
|
|
|
case <-observedDeletions:
|
|
|
|
framework.Failf("Pod was evicted despite toleration")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
By("Waiting for Pod to be deleted")
|
|
|
|
timeoutChannel = time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Failf("Pod wasn't evicted")
|
|
|
|
case <-observedDeletions:
|
|
|
|
framework.Logf("Pod was evicted after toleration time run out. Test successful")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// 1. Run a pod with short toleration
|
|
|
|
// 2. Taint the node running this pod with a no-execute taint
|
|
|
|
// 3. Wait some time
|
|
|
|
// 4. Remove the taint
|
|
|
|
// 5. See if Pod won't be evicted.
|
|
|
|
It("removing taint cancels eviction", func() {
|
|
|
|
podName := "taint-eviction-4"
|
2018-11-26 18:23:56 +00:00
|
|
|
pod := createPodForTaintsTest(true, 2*AdditionalWaitPerDeleteSeconds, podName, podName, ns)
|
|
|
|
observedDeletions := make(chan string, 100)
|
2018-01-09 18:57:14 +00:00
|
|
|
stopCh := make(chan struct{})
|
|
|
|
createTestController(cs, observedDeletions, stopCh, podName, ns)
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
By("Starting pod...")
|
2018-01-09 18:57:14 +00:00
|
|
|
nodeName, err := testutils.RunPodAndGetNodeName(cs, pod, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod is running on %v. Tainting Node", nodeName)
|
|
|
|
|
|
|
|
By("Trying to apply a taint on the Node")
|
|
|
|
testTaint := getTestTaint()
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName, &testTaint)
|
|
|
|
taintRemoved := false
|
|
|
|
defer func() {
|
|
|
|
if !taintRemoved {
|
|
|
|
framework.RemoveTaintOffNode(cs, nodeName, testTaint)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
// Wait a bit
|
|
|
|
By("Waiting short time to make sure Pod is queued for deletion")
|
|
|
|
timeoutChannel := time.NewTimer(AdditionalWaitPerDeleteSeconds).C
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Logf("Pod wasn't evicted. Proceeding")
|
|
|
|
case <-observedDeletions:
|
|
|
|
framework.Failf("Pod was evicted despite toleration")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
framework.Logf("Removing taint from Node")
|
|
|
|
framework.RemoveTaintOffNode(cs, nodeName, testTaint)
|
|
|
|
taintRemoved = true
|
|
|
|
By("Waiting some time to make sure that toleration time passed.")
|
|
|
|
timeoutChannel = time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+3*AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Logf("Pod wasn't evicted. Test successful")
|
|
|
|
case <-observedDeletions:
|
|
|
|
framework.Failf("Pod was evicted despite toleration")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
2018-11-26 18:23:56 +00:00
|
|
|
|
|
|
|
var _ = SIGDescribe("NoExecuteTaintManager Multiple Pods [Serial]", func() {
|
|
|
|
var cs clientset.Interface
|
|
|
|
var ns string
|
|
|
|
f := framework.NewDefaultFramework("taint-multiple-pods")
|
|
|
|
|
|
|
|
BeforeEach(func() {
|
|
|
|
cs = f.ClientSet
|
|
|
|
ns = f.Namespace.Name
|
|
|
|
|
|
|
|
framework.WaitForAllNodesHealthy(cs, time.Minute)
|
|
|
|
|
|
|
|
err := framework.CheckTestingNSDeletedExcept(cs, ns)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
})
|
|
|
|
|
|
|
|
// 1. Run two pods; one with toleration, one without toleration
|
|
|
|
// 2. Taint the nodes running those pods with a no-execute taint
|
|
|
|
// 3. See if pod-without-toleration get evicted, and pod-with-toleration is kept
|
|
|
|
It("only evicts pods without tolerations from tainted nodes", func() {
|
|
|
|
podGroup := "taint-eviction-a"
|
|
|
|
observedDeletions := make(chan string, 100)
|
|
|
|
stopCh := make(chan struct{})
|
|
|
|
createTestController(cs, observedDeletions, stopCh, podGroup, ns)
|
|
|
|
|
|
|
|
pod1 := createPodForTaintsTest(false, 0, podGroup+"1", podGroup, ns)
|
|
|
|
pod2 := createPodForTaintsTest(true, 0, podGroup+"2", podGroup, ns)
|
|
|
|
|
|
|
|
By("Starting pods...")
|
|
|
|
nodeName1, err := testutils.RunPodAndGetNodeName(cs, pod1, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod1 is running on %v. Tainting Node", nodeName1)
|
|
|
|
nodeName2, err := testutils.RunPodAndGetNodeName(cs, pod2, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod2 is running on %v. Tainting Node", nodeName2)
|
|
|
|
|
|
|
|
By("Trying to apply a taint on the Nodes")
|
|
|
|
testTaint := getTestTaint()
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName1, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName1, &testTaint)
|
|
|
|
defer framework.RemoveTaintOffNode(cs, nodeName1, testTaint)
|
|
|
|
if nodeName2 != nodeName1 {
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName2, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName2, &testTaint)
|
|
|
|
defer framework.RemoveTaintOffNode(cs, nodeName2, testTaint)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait a bit
|
|
|
|
By("Waiting for Pod1 to be deleted")
|
|
|
|
timeoutChannel := time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
var evicted int
|
|
|
|
for {
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
if evicted == 0 {
|
|
|
|
framework.Failf("Failed to evict Pod1.")
|
|
|
|
} else if evicted == 2 {
|
|
|
|
framework.Failf("Pod1 is evicted. But unexpected Pod2 also get evicted.")
|
|
|
|
}
|
|
|
|
return
|
|
|
|
case podName := <-observedDeletions:
|
|
|
|
evicted++
|
|
|
|
if podName == podGroup+"1" {
|
|
|
|
framework.Logf("Noticed Pod %q gets evicted.", podName)
|
|
|
|
} else if podName == podGroup+"2" {
|
|
|
|
framework.Failf("Unexepected Pod %q gets evicted.", podName)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
// 1. Run two pods both with toleration; one with tolerationSeconds=5, the other with 25
|
|
|
|
// 2. Taint the nodes running those pods with a no-execute taint
|
|
|
|
// 3. See if both pods get evicted in between [5, 25] seconds
|
|
|
|
It("evicts pods with minTolerationSeconds", func() {
|
|
|
|
podGroup := "taint-eviction-b"
|
|
|
|
observedDeletions := make(chan string, 100)
|
|
|
|
stopCh := make(chan struct{})
|
|
|
|
createTestController(cs, observedDeletions, stopCh, podGroup, ns)
|
|
|
|
|
|
|
|
pod1 := createPodForTaintsTest(true, AdditionalWaitPerDeleteSeconds, podGroup+"1", podGroup, ns)
|
|
|
|
pod2 := createPodForTaintsTest(true, 5*AdditionalWaitPerDeleteSeconds, podGroup+"2", podGroup, ns)
|
|
|
|
|
|
|
|
By("Starting pods...")
|
|
|
|
nodeName, err := testutils.RunPodAndGetNodeName(cs, pod1, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod1 is running on %v. Tainting Node", nodeName)
|
|
|
|
// ensure pod2 lands on the same node as pod1
|
|
|
|
pod2.Spec.NodeSelector = map[string]string{"kubernetes.io/hostname": nodeName}
|
|
|
|
_, err = testutils.RunPodAndGetNodeName(cs, pod2, 2*time.Minute)
|
|
|
|
framework.ExpectNoError(err)
|
|
|
|
framework.Logf("Pod2 is running on %v. Tainting Node", nodeName)
|
|
|
|
|
|
|
|
By("Trying to apply a taint on the Node")
|
|
|
|
testTaint := getTestTaint()
|
|
|
|
framework.AddOrUpdateTaintOnNode(cs, nodeName, testTaint)
|
|
|
|
framework.ExpectNodeHasTaint(cs, nodeName, &testTaint)
|
|
|
|
defer framework.RemoveTaintOffNode(cs, nodeName, testTaint)
|
|
|
|
|
|
|
|
// Wait a bit
|
|
|
|
By("Waiting for Pod1 and Pod2 to be deleted")
|
|
|
|
timeoutChannel := time.NewTimer(time.Duration(KubeletPodDeletionDelaySeconds+3*AdditionalWaitPerDeleteSeconds) * time.Second).C
|
|
|
|
var evicted int
|
|
|
|
for evicted != 2 {
|
|
|
|
select {
|
|
|
|
case <-timeoutChannel:
|
|
|
|
framework.Failf("Failed to evict all Pods. %d pod(s) is not evicted.", 2-evicted)
|
|
|
|
return
|
|
|
|
case podName := <-observedDeletions:
|
|
|
|
framework.Logf("Noticed Pod %q gets evicted.", podName)
|
|
|
|
evicted++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|