2018-01-09 18:57:14 +00:00
|
|
|
/*
|
|
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package schedulercache
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"k8s.io/api/core/v1"
|
|
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
|
|
|
|
|
|
"github.com/golang/glog"
|
|
|
|
policy "k8s.io/api/policy/v1beta1"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
cleanAssumedPeriod = 1 * time.Second
|
|
|
|
)
|
|
|
|
|
|
|
|
// New returns a Cache implementation.
|
|
|
|
// It automatically starts a go routine that manages expiration of assumed pods.
|
|
|
|
// "ttl" is how long the assumed pod will get expired.
|
|
|
|
// "stop" is the channel that would close the background goroutine.
|
|
|
|
func New(ttl time.Duration, stop <-chan struct{}) Cache {
|
|
|
|
cache := newSchedulerCache(ttl, cleanAssumedPeriod, stop)
|
|
|
|
cache.run()
|
|
|
|
return cache
|
|
|
|
}
|
|
|
|
|
|
|
|
type schedulerCache struct {
|
|
|
|
stop <-chan struct{}
|
|
|
|
ttl time.Duration
|
|
|
|
period time.Duration
|
|
|
|
|
|
|
|
// This mutex guards all fields within this cache struct.
|
|
|
|
mu sync.Mutex
|
|
|
|
// a set of assumed pod keys.
|
|
|
|
// The key could further be used to get an entry in podStates.
|
|
|
|
assumedPods map[string]bool
|
|
|
|
// a map from pod key to podState.
|
|
|
|
podStates map[string]*podState
|
|
|
|
nodes map[string]*NodeInfo
|
|
|
|
pdbs map[string]*policy.PodDisruptionBudget
|
|
|
|
}
|
|
|
|
|
|
|
|
type podState struct {
|
|
|
|
pod *v1.Pod
|
|
|
|
// Used by assumedPod to determinate expiration.
|
|
|
|
deadline *time.Time
|
|
|
|
// Used to block cache from expiring assumedPod if binding still runs
|
|
|
|
bindingFinished bool
|
|
|
|
}
|
|
|
|
|
|
|
|
func newSchedulerCache(ttl, period time.Duration, stop <-chan struct{}) *schedulerCache {
|
|
|
|
return &schedulerCache{
|
|
|
|
ttl: ttl,
|
|
|
|
period: period,
|
|
|
|
stop: stop,
|
|
|
|
|
|
|
|
nodes: make(map[string]*NodeInfo),
|
|
|
|
assumedPods: make(map[string]bool),
|
|
|
|
podStates: make(map[string]*podState),
|
|
|
|
pdbs: make(map[string]*policy.PodDisruptionBudget),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) UpdateNodeNameToInfoMap(nodeNameToInfo map[string]*NodeInfo) error {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
for name, info := range cache.nodes {
|
|
|
|
if current, ok := nodeNameToInfo[name]; !ok || current.generation != info.generation {
|
|
|
|
nodeNameToInfo[name] = info.Clone()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for name := range nodeNameToInfo {
|
|
|
|
if _, ok := cache.nodes[name]; !ok {
|
|
|
|
delete(nodeNameToInfo, name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) List(selector labels.Selector) ([]*v1.Pod, error) {
|
|
|
|
alwaysTrue := func(p *v1.Pod) bool { return true }
|
|
|
|
return cache.FilteredList(alwaysTrue, selector)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) FilteredList(podFilter PodFilter, selector labels.Selector) ([]*v1.Pod, error) {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
2018-03-06 22:33:18 +00:00
|
|
|
// podFilter is expected to return true for most or all of the pods. We
|
|
|
|
// can avoid expensive array growth without wasting too much memory by
|
|
|
|
// pre-allocating capacity.
|
|
|
|
maxSize := 0
|
|
|
|
for _, info := range cache.nodes {
|
|
|
|
maxSize += len(info.pods)
|
|
|
|
}
|
|
|
|
pods := make([]*v1.Pod, 0, maxSize)
|
2018-01-09 18:57:14 +00:00
|
|
|
for _, info := range cache.nodes {
|
|
|
|
for _, pod := range info.pods {
|
|
|
|
if podFilter(pod) && selector.Matches(labels.Set(pod.Labels)) {
|
|
|
|
pods = append(pods, pod)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return pods, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) AssumePod(pod *v1.Pod) error {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
if _, ok := cache.podStates[key]; ok {
|
2018-03-06 22:33:18 +00:00
|
|
|
return fmt.Errorf("pod %v is in the cache, so can't be assumed", key)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
cache.addPod(pod)
|
|
|
|
ps := &podState{
|
|
|
|
pod: pod,
|
|
|
|
}
|
|
|
|
cache.podStates[key] = ps
|
|
|
|
cache.assumedPods[key] = true
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) FinishBinding(pod *v1.Pod) error {
|
|
|
|
return cache.finishBinding(pod, time.Now())
|
|
|
|
}
|
|
|
|
|
|
|
|
// finishBinding exists to make tests determinitistic by injecting now as an argument
|
|
|
|
func (cache *schedulerCache) finishBinding(pod *v1.Pod, now time.Time) error {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
glog.V(5).Infof("Finished binding for pod %v. Can be expired.", key)
|
|
|
|
currState, ok := cache.podStates[key]
|
|
|
|
if ok && cache.assumedPods[key] {
|
|
|
|
dl := now.Add(cache.ttl)
|
|
|
|
currState.bindingFinished = true
|
|
|
|
currState.deadline = &dl
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) ForgetPod(pod *v1.Pod) error {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
currState, ok := cache.podStates[key]
|
|
|
|
if ok && currState.pod.Spec.NodeName != pod.Spec.NodeName {
|
2018-03-06 22:33:18 +00:00
|
|
|
return fmt.Errorf("pod %v was assumed on %v but assigned to %v", key, pod.Spec.NodeName, currState.pod.Spec.NodeName)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
switch {
|
|
|
|
// Only assumed pod can be forgotten.
|
|
|
|
case ok && cache.assumedPods[key]:
|
|
|
|
err := cache.removePod(pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
delete(cache.assumedPods, key)
|
|
|
|
delete(cache.podStates, key)
|
|
|
|
default:
|
2018-03-06 22:33:18 +00:00
|
|
|
return fmt.Errorf("pod %v wasn't assumed so cannot be forgotten", key)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assumes that lock is already acquired.
|
|
|
|
func (cache *schedulerCache) addPod(pod *v1.Pod) {
|
|
|
|
n, ok := cache.nodes[pod.Spec.NodeName]
|
|
|
|
if !ok {
|
|
|
|
n = NewNodeInfo()
|
|
|
|
cache.nodes[pod.Spec.NodeName] = n
|
|
|
|
}
|
|
|
|
n.AddPod(pod)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assumes that lock is already acquired.
|
|
|
|
func (cache *schedulerCache) updatePod(oldPod, newPod *v1.Pod) error {
|
|
|
|
if err := cache.removePod(oldPod); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
cache.addPod(newPod)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Assumes that lock is already acquired.
|
|
|
|
func (cache *schedulerCache) removePod(pod *v1.Pod) error {
|
|
|
|
n := cache.nodes[pod.Spec.NodeName]
|
|
|
|
if err := n.RemovePod(pod); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(n.pods) == 0 && n.node == nil {
|
|
|
|
delete(cache.nodes, pod.Spec.NodeName)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) AddPod(pod *v1.Pod) error {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
currState, ok := cache.podStates[key]
|
|
|
|
switch {
|
|
|
|
case ok && cache.assumedPods[key]:
|
|
|
|
if currState.pod.Spec.NodeName != pod.Spec.NodeName {
|
|
|
|
// The pod was added to a different node than it was assumed to.
|
2018-03-06 22:33:18 +00:00
|
|
|
glog.Warningf("Pod %v was assumed to be on %v but got added to %v", key, pod.Spec.NodeName, currState.pod.Spec.NodeName)
|
2018-01-09 18:57:14 +00:00
|
|
|
// Clean this up.
|
|
|
|
cache.removePod(currState.pod)
|
|
|
|
cache.addPod(pod)
|
|
|
|
}
|
|
|
|
delete(cache.assumedPods, key)
|
|
|
|
cache.podStates[key].deadline = nil
|
|
|
|
cache.podStates[key].pod = pod
|
|
|
|
case !ok:
|
|
|
|
// Pod was expired. We should add it back.
|
|
|
|
cache.addPod(pod)
|
|
|
|
ps := &podState{
|
|
|
|
pod: pod,
|
|
|
|
}
|
|
|
|
cache.podStates[key] = ps
|
|
|
|
default:
|
2018-03-06 22:33:18 +00:00
|
|
|
return fmt.Errorf("pod %v was already in added state", key)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) UpdatePod(oldPod, newPod *v1.Pod) error {
|
|
|
|
key, err := getPodKey(oldPod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
currState, ok := cache.podStates[key]
|
|
|
|
switch {
|
|
|
|
// An assumed pod won't have Update/Remove event. It needs to have Add event
|
|
|
|
// before Update event, in which case the state would change from Assumed to Added.
|
|
|
|
case ok && !cache.assumedPods[key]:
|
|
|
|
if currState.pod.Spec.NodeName != newPod.Spec.NodeName {
|
|
|
|
glog.Errorf("Pod %v updated on a different node than previously added to.", key)
|
|
|
|
glog.Fatalf("Schedulercache is corrupted and can badly affect scheduling decisions")
|
|
|
|
}
|
|
|
|
if err := cache.updatePod(oldPod, newPod); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
default:
|
2018-03-06 22:33:18 +00:00
|
|
|
return fmt.Errorf("pod %v is not added to scheduler cache, so cannot be updated", key)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) RemovePod(pod *v1.Pod) error {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
currState, ok := cache.podStates[key]
|
|
|
|
switch {
|
|
|
|
// An assumed pod won't have Delete/Remove event. It needs to have Add event
|
|
|
|
// before Remove event, in which case the state would change from Assumed to Added.
|
|
|
|
case ok && !cache.assumedPods[key]:
|
|
|
|
if currState.pod.Spec.NodeName != pod.Spec.NodeName {
|
2018-03-06 22:33:18 +00:00
|
|
|
glog.Errorf("Pod %v was assumed to be on %v but got added to %v", key, pod.Spec.NodeName, currState.pod.Spec.NodeName)
|
2018-01-09 18:57:14 +00:00
|
|
|
glog.Fatalf("Schedulercache is corrupted and can badly affect scheduling decisions")
|
|
|
|
}
|
|
|
|
err := cache.removePod(currState.pod)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
delete(cache.podStates, key)
|
|
|
|
default:
|
2018-03-06 22:33:18 +00:00
|
|
|
return fmt.Errorf("pod %v is not found in scheduler cache, so cannot be removed from it", key)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) IsAssumedPod(pod *v1.Pod) (bool, error) {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
b, found := cache.assumedPods[key]
|
|
|
|
if !found {
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
return b, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) GetPod(pod *v1.Pod) (*v1.Pod, error) {
|
|
|
|
key, err := getPodKey(pod)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
podState, ok := cache.podStates[key]
|
|
|
|
if !ok {
|
2018-03-06 22:33:18 +00:00
|
|
|
return nil, fmt.Errorf("pod %v does not exist in scheduler cache", key)
|
2018-01-09 18:57:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return podState.pod, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) AddNode(node *v1.Node) error {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
n, ok := cache.nodes[node.Name]
|
|
|
|
if !ok {
|
|
|
|
n = NewNodeInfo()
|
|
|
|
cache.nodes[node.Name] = n
|
|
|
|
}
|
|
|
|
return n.SetNode(node)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) UpdateNode(oldNode, newNode *v1.Node) error {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
n, ok := cache.nodes[newNode.Name]
|
|
|
|
if !ok {
|
|
|
|
n = NewNodeInfo()
|
|
|
|
cache.nodes[newNode.Name] = n
|
|
|
|
}
|
|
|
|
return n.SetNode(newNode)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) RemoveNode(node *v1.Node) error {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
n := cache.nodes[node.Name]
|
|
|
|
if err := n.RemoveNode(node); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
// We remove NodeInfo for this node only if there aren't any pods on this node.
|
|
|
|
// We can't do it unconditionally, because notifications about pods are delivered
|
|
|
|
// in a different watch, and thus can potentially be observed later, even though
|
|
|
|
// they happened before node removal.
|
|
|
|
if len(n.pods) == 0 && n.node == nil {
|
|
|
|
delete(cache.nodes, node.Name)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) AddPDB(pdb *policy.PodDisruptionBudget) error {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
// Unconditionally update cache.
|
|
|
|
cache.pdbs[pdb.Name] = pdb
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) UpdatePDB(oldPDB, newPDB *policy.PodDisruptionBudget) error {
|
|
|
|
return cache.AddPDB(newPDB)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) RemovePDB(pdb *policy.PodDisruptionBudget) error {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
delete(cache.pdbs, pdb.Name)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) ListPDBs(selector labels.Selector) ([]*policy.PodDisruptionBudget, error) {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
var pdbs []*policy.PodDisruptionBudget
|
|
|
|
for _, pdb := range cache.pdbs {
|
|
|
|
if selector.Matches(labels.Set(pdb.Labels)) {
|
|
|
|
pdbs = append(pdbs, pdb)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return pdbs, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) run() {
|
|
|
|
go wait.Until(cache.cleanupExpiredAssumedPods, cache.period, cache.stop)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) cleanupExpiredAssumedPods() {
|
|
|
|
cache.cleanupAssumedPods(time.Now())
|
|
|
|
}
|
|
|
|
|
|
|
|
// cleanupAssumedPods exists for making test deterministic by taking time as input argument.
|
|
|
|
func (cache *schedulerCache) cleanupAssumedPods(now time.Time) {
|
|
|
|
cache.mu.Lock()
|
|
|
|
defer cache.mu.Unlock()
|
|
|
|
|
|
|
|
// The size of assumedPods should be small
|
|
|
|
for key := range cache.assumedPods {
|
|
|
|
ps, ok := cache.podStates[key]
|
|
|
|
if !ok {
|
|
|
|
panic("Key found in assumed set but not in podStates. Potentially a logical error.")
|
|
|
|
}
|
|
|
|
if !ps.bindingFinished {
|
|
|
|
glog.V(3).Infof("Couldn't expire cache for pod %v/%v. Binding is still in progress.",
|
|
|
|
ps.pod.Namespace, ps.pod.Name)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
if now.After(*ps.deadline) {
|
|
|
|
glog.Warningf("Pod %s/%s expired", ps.pod.Namespace, ps.pod.Name)
|
|
|
|
if err := cache.expirePod(key, ps); err != nil {
|
|
|
|
glog.Errorf("ExpirePod failed for %s: %v", key, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (cache *schedulerCache) expirePod(key string, ps *podState) error {
|
|
|
|
if err := cache.removePod(ps.pod); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
delete(cache.assumedPods, key)
|
|
|
|
delete(cache.podStates, key)
|
|
|
|
return nil
|
|
|
|
}
|