2018-01-09 18:57:14 +00:00
|
|
|
/*
|
|
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package prober
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"net/url"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"k8s.io/api/core/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/util/intstr"
|
|
|
|
"k8s.io/client-go/tools/record"
|
|
|
|
kubecontainer "k8s.io/kubernetes/pkg/kubelet/container"
|
|
|
|
"k8s.io/kubernetes/pkg/kubelet/events"
|
|
|
|
"k8s.io/kubernetes/pkg/kubelet/prober/results"
|
|
|
|
"k8s.io/kubernetes/pkg/kubelet/util/format"
|
|
|
|
"k8s.io/kubernetes/pkg/probe"
|
|
|
|
execprobe "k8s.io/kubernetes/pkg/probe/exec"
|
|
|
|
httprobe "k8s.io/kubernetes/pkg/probe/http"
|
|
|
|
tcprobe "k8s.io/kubernetes/pkg/probe/tcp"
|
|
|
|
"k8s.io/utils/exec"
|
|
|
|
|
2018-11-26 18:23:56 +00:00
|
|
|
"k8s.io/klog"
|
2018-01-09 18:57:14 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
const maxProbeRetries = 3
|
|
|
|
|
|
|
|
// Prober helps to check the liveness/readiness of a container.
|
|
|
|
type prober struct {
|
2018-11-26 18:23:56 +00:00
|
|
|
exec execprobe.Prober
|
2018-01-09 18:57:14 +00:00
|
|
|
// probe types needs different httprobe instances so they don't
|
|
|
|
// share a connection pool which can cause collsions to the
|
|
|
|
// same host:port and transient failures. See #49740.
|
2018-11-26 18:23:56 +00:00
|
|
|
readinessHttp httprobe.Prober
|
|
|
|
livenessHttp httprobe.Prober
|
|
|
|
tcp tcprobe.Prober
|
2018-01-09 18:57:14 +00:00
|
|
|
runner kubecontainer.ContainerCommandRunner
|
|
|
|
|
|
|
|
refManager *kubecontainer.RefManager
|
|
|
|
recorder record.EventRecorder
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewProber creates a Prober, it takes a command runner and
|
|
|
|
// several container info managers.
|
|
|
|
func newProber(
|
|
|
|
runner kubecontainer.ContainerCommandRunner,
|
|
|
|
refManager *kubecontainer.RefManager,
|
|
|
|
recorder record.EventRecorder) *prober {
|
|
|
|
|
|
|
|
return &prober{
|
|
|
|
exec: execprobe.New(),
|
|
|
|
readinessHttp: httprobe.New(),
|
|
|
|
livenessHttp: httprobe.New(),
|
|
|
|
tcp: tcprobe.New(),
|
|
|
|
runner: runner,
|
|
|
|
refManager: refManager,
|
|
|
|
recorder: recorder,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// probe probes the container.
|
|
|
|
func (pb *prober) probe(probeType probeType, pod *v1.Pod, status v1.PodStatus, container v1.Container, containerID kubecontainer.ContainerID) (results.Result, error) {
|
|
|
|
var probeSpec *v1.Probe
|
|
|
|
switch probeType {
|
|
|
|
case readiness:
|
|
|
|
probeSpec = container.ReadinessProbe
|
|
|
|
case liveness:
|
|
|
|
probeSpec = container.LivenessProbe
|
|
|
|
default:
|
|
|
|
return results.Failure, fmt.Errorf("Unknown probe type: %q", probeType)
|
|
|
|
}
|
|
|
|
|
|
|
|
ctrName := fmt.Sprintf("%s:%s", format.Pod(pod), container.Name)
|
|
|
|
if probeSpec == nil {
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.Warningf("%s probe for %s is nil", probeType, ctrName)
|
2018-01-09 18:57:14 +00:00
|
|
|
return results.Success, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
result, output, err := pb.runProbeWithRetries(probeType, probeSpec, pod, status, container, containerID, maxProbeRetries)
|
|
|
|
if err != nil || result != probe.Success {
|
|
|
|
// Probe failed in one way or another.
|
|
|
|
ref, hasRef := pb.refManager.GetRef(containerID)
|
|
|
|
if !hasRef {
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.Warningf("No ref for container %q (%s)", containerID.String(), ctrName)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
if err != nil {
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(1).Infof("%s probe for %q errored: %v", probeType, ctrName, err)
|
2018-01-09 18:57:14 +00:00
|
|
|
if hasRef {
|
|
|
|
pb.recorder.Eventf(ref, v1.EventTypeWarning, events.ContainerUnhealthy, "%s probe errored: %v", probeType, err)
|
|
|
|
}
|
|
|
|
} else { // result != probe.Success
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(1).Infof("%s probe for %q failed (%v): %s", probeType, ctrName, result, output)
|
2018-01-09 18:57:14 +00:00
|
|
|
if hasRef {
|
|
|
|
pb.recorder.Eventf(ref, v1.EventTypeWarning, events.ContainerUnhealthy, "%s probe failed: %s", probeType, output)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return results.Failure, err
|
|
|
|
}
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(3).Infof("%s probe for %q succeeded", probeType, ctrName)
|
2018-01-09 18:57:14 +00:00
|
|
|
return results.Success, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// runProbeWithRetries tries to probe the container in a finite loop, it returns the last result
|
|
|
|
// if it never succeeds.
|
|
|
|
func (pb *prober) runProbeWithRetries(probeType probeType, p *v1.Probe, pod *v1.Pod, status v1.PodStatus, container v1.Container, containerID kubecontainer.ContainerID, retries int) (probe.Result, string, error) {
|
|
|
|
var err error
|
|
|
|
var result probe.Result
|
|
|
|
var output string
|
|
|
|
for i := 0; i < retries; i++ {
|
|
|
|
result, output, err = pb.runProbe(probeType, p, pod, status, container, containerID)
|
|
|
|
if err == nil {
|
|
|
|
return result, output, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return result, output, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// buildHeaderMap takes a list of HTTPHeader <name, value> string
|
|
|
|
// pairs and returns a populated string->[]string http.Header map.
|
|
|
|
func buildHeader(headerList []v1.HTTPHeader) http.Header {
|
|
|
|
headers := make(http.Header)
|
|
|
|
for _, header := range headerList {
|
|
|
|
headers[header.Name] = append(headers[header.Name], header.Value)
|
|
|
|
}
|
|
|
|
return headers
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pb *prober) runProbe(probeType probeType, p *v1.Probe, pod *v1.Pod, status v1.PodStatus, container v1.Container, containerID kubecontainer.ContainerID) (probe.Result, string, error) {
|
|
|
|
timeout := time.Duration(p.TimeoutSeconds) * time.Second
|
|
|
|
if p.Exec != nil {
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(4).Infof("Exec-Probe Pod: %v, Container: %v, Command: %v", pod, container, p.Exec.Command)
|
2018-01-09 18:57:14 +00:00
|
|
|
command := kubecontainer.ExpandContainerCommandOnlyStatic(p.Exec.Command, container.Env)
|
|
|
|
return pb.exec.Probe(pb.newExecInContainer(container, containerID, command, timeout))
|
|
|
|
}
|
|
|
|
if p.HTTPGet != nil {
|
|
|
|
scheme := strings.ToLower(string(p.HTTPGet.Scheme))
|
|
|
|
host := p.HTTPGet.Host
|
|
|
|
if host == "" {
|
|
|
|
host = status.PodIP
|
|
|
|
}
|
|
|
|
port, err := extractPort(p.HTTPGet.Port, container)
|
|
|
|
if err != nil {
|
|
|
|
return probe.Unknown, "", err
|
|
|
|
}
|
|
|
|
path := p.HTTPGet.Path
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(4).Infof("HTTP-Probe Host: %v://%v, Port: %v, Path: %v", scheme, host, port, path)
|
2018-01-09 18:57:14 +00:00
|
|
|
url := formatURL(scheme, host, port, path)
|
|
|
|
headers := buildHeader(p.HTTPGet.HTTPHeaders)
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(4).Infof("HTTP-Probe Headers: %v", headers)
|
2018-01-09 18:57:14 +00:00
|
|
|
if probeType == liveness {
|
|
|
|
return pb.livenessHttp.Probe(url, headers, timeout)
|
|
|
|
} else { // readiness
|
|
|
|
return pb.readinessHttp.Probe(url, headers, timeout)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if p.TCPSocket != nil {
|
|
|
|
port, err := extractPort(p.TCPSocket.Port, container)
|
|
|
|
if err != nil {
|
|
|
|
return probe.Unknown, "", err
|
|
|
|
}
|
|
|
|
host := p.TCPSocket.Host
|
|
|
|
if host == "" {
|
|
|
|
host = status.PodIP
|
|
|
|
}
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.V(4).Infof("TCP-Probe Host: %v, Port: %v, Timeout: %v", host, port, timeout)
|
2018-01-09 18:57:14 +00:00
|
|
|
return pb.tcp.Probe(host, port, timeout)
|
|
|
|
}
|
2018-11-26 18:23:56 +00:00
|
|
|
klog.Warningf("Failed to find probe builder for container: %v", container)
|
2018-01-09 18:57:14 +00:00
|
|
|
return probe.Unknown, "", fmt.Errorf("Missing probe handler for %s:%s", format.Pod(pod), container.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
func extractPort(param intstr.IntOrString, container v1.Container) (int, error) {
|
|
|
|
port := -1
|
|
|
|
var err error
|
|
|
|
switch param.Type {
|
|
|
|
case intstr.Int:
|
|
|
|
port = param.IntValue()
|
|
|
|
case intstr.String:
|
|
|
|
if port, err = findPortByName(container, param.StrVal); err != nil {
|
|
|
|
// Last ditch effort - maybe it was an int stored as string?
|
|
|
|
if port, err = strconv.Atoi(param.StrVal); err != nil {
|
|
|
|
return port, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
default:
|
|
|
|
return port, fmt.Errorf("IntOrString had no kind: %+v", param)
|
|
|
|
}
|
|
|
|
if port > 0 && port < 65536 {
|
|
|
|
return port, nil
|
|
|
|
}
|
|
|
|
return port, fmt.Errorf("invalid port number: %v", port)
|
|
|
|
}
|
|
|
|
|
|
|
|
// findPortByName is a helper function to look up a port in a container by name.
|
|
|
|
func findPortByName(container v1.Container, portName string) (int, error) {
|
|
|
|
for _, port := range container.Ports {
|
|
|
|
if port.Name == portName {
|
|
|
|
return int(port.ContainerPort), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return 0, fmt.Errorf("port %s not found", portName)
|
|
|
|
}
|
|
|
|
|
|
|
|
// formatURL formats a URL from args. For testability.
|
|
|
|
func formatURL(scheme string, host string, port int, path string) *url.URL {
|
|
|
|
u, err := url.Parse(path)
|
|
|
|
// Something is busted with the path, but it's too late to reject it. Pass it along as is.
|
|
|
|
if err != nil {
|
|
|
|
u = &url.URL{
|
|
|
|
Path: path,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
u.Scheme = scheme
|
|
|
|
u.Host = net.JoinHostPort(host, strconv.Itoa(port))
|
|
|
|
return u
|
|
|
|
}
|
|
|
|
|
|
|
|
type execInContainer struct {
|
|
|
|
// run executes a command in a container. Combined stdout and stderr output is always returned. An
|
|
|
|
// error is returned if one occurred.
|
|
|
|
run func() ([]byte, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (pb *prober) newExecInContainer(container v1.Container, containerID kubecontainer.ContainerID, cmd []string, timeout time.Duration) exec.Cmd {
|
|
|
|
return execInContainer{func() ([]byte, error) {
|
|
|
|
return pb.runner.RunInContainer(containerID, cmd, timeout)
|
|
|
|
}}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) Run() error {
|
|
|
|
return fmt.Errorf("unimplemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) CombinedOutput() ([]byte, error) {
|
|
|
|
return eic.run()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) Output() ([]byte, error) {
|
|
|
|
return nil, fmt.Errorf("unimplemented")
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) SetDir(dir string) {
|
|
|
|
//unimplemented
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) SetStdin(in io.Reader) {
|
|
|
|
//unimplemented
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) SetStdout(out io.Writer) {
|
|
|
|
//unimplemented
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) SetStderr(out io.Writer) {
|
|
|
|
//unimplemented
|
|
|
|
}
|
|
|
|
|
|
|
|
func (eic execInContainer) Stop() {
|
|
|
|
//unimplemented
|
|
|
|
}
|