2015-06-01 15:49:10 +00:00
|
|
|
package nomad
|
|
|
|
|
|
|
|
import (
|
|
|
|
"io"
|
2015-06-03 10:26:50 +00:00
|
|
|
"net"
|
2015-06-03 10:58:00 +00:00
|
|
|
"os"
|
2015-08-23 20:59:26 +00:00
|
|
|
"runtime"
|
2015-06-05 21:54:45 +00:00
|
|
|
"time"
|
2015-06-01 15:49:10 +00:00
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2022-08-18 23:32:04 +00:00
|
|
|
"golang.org/x/exp/slices"
|
2018-09-15 23:23:13 +00:00
|
|
|
|
2015-06-03 10:58:00 +00:00
|
|
|
"github.com/hashicorp/memberlist"
|
2022-08-18 23:32:04 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/pointer"
|
2017-11-22 00:29:11 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2021-06-04 19:38:46 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/deploymentwatcher"
|
2015-08-07 00:04:35 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2016-06-14 05:58:39 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs/config"
|
2015-07-28 23:19:52 +00:00
|
|
|
"github.com/hashicorp/nomad/scheduler"
|
2015-06-01 15:49:10 +00:00
|
|
|
"github.com/hashicorp/raft"
|
2015-06-03 10:58:00 +00:00
|
|
|
"github.com/hashicorp/serf/serf"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
2015-09-14 01:18:40 +00:00
|
|
|
DefaultRegion = "global"
|
2015-06-03 10:58:00 +00:00
|
|
|
DefaultDC = "dc1"
|
2015-08-16 22:10:11 +00:00
|
|
|
DefaultSerfPort = 4648
|
2015-06-01 15:49:10 +00:00
|
|
|
)
|
|
|
|
|
2020-02-06 21:38:47 +00:00
|
|
|
func DefaultRPCAddr() *net.TCPAddr {
|
|
|
|
return &net.TCPAddr{IP: net.ParseIP("127.0.0.1"), Port: 4647}
|
|
|
|
}
|
2015-06-03 10:26:50 +00:00
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
// Config is used to parameterize the server
|
|
|
|
type Config struct {
|
2016-05-22 01:06:35 +00:00
|
|
|
// BootstrapExpect mode is used to automatically bring up a
|
|
|
|
// collection of Nomad servers. This can be used to automatically
|
2020-03-02 15:29:24 +00:00
|
|
|
// bring up a collection of nodes.
|
|
|
|
//
|
|
|
|
// The BootstrapExpect can be of any of the following values:
|
|
|
|
// 1: Server will form a single node cluster and become a leader immediately
|
|
|
|
// N, larger than 1: Server will wait until it's connected to N servers
|
|
|
|
// before attempting leadership and forming the cluster. No Raft Log operation
|
|
|
|
// will succeed until then.
|
|
|
|
// 0: Server will wait to get a Raft configuration from another node and may not
|
|
|
|
// attempt to form a cluster or establish leadership on its own.
|
|
|
|
BootstrapExpect int
|
2015-06-03 10:58:00 +00:00
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
// DataDir is the directory to store our state in
|
|
|
|
DataDir string
|
|
|
|
|
2015-06-01 19:11:40 +00:00
|
|
|
// DevMode is used for development purposes only and limits the
|
|
|
|
// use of persistence or state.
|
|
|
|
DevMode bool
|
|
|
|
|
2019-12-13 18:41:55 +00:00
|
|
|
// EnableDebug is used to enable debugging RPC endpoints
|
|
|
|
// in the absence of ACLs
|
|
|
|
EnableDebug bool
|
2015-06-05 21:54:45 +00:00
|
|
|
|
2020-10-08 18:27:52 +00:00
|
|
|
// EnableEventBroker is used to enable or disable state store
|
2020-09-28 14:13:10 +00:00
|
|
|
// event publishing
|
2020-10-08 18:27:52 +00:00
|
|
|
EnableEventBroker bool
|
2020-09-28 14:13:10 +00:00
|
|
|
|
2020-10-06 20:21:58 +00:00
|
|
|
// EventBufferSize is the amount of events to hold in memory.
|
|
|
|
EventBufferSize int64
|
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
// LogOutput is the location to write logs to. If this is not set,
|
|
|
|
// logs will go to stderr.
|
|
|
|
LogOutput io.Writer
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
// Logger is the logger used by the server.
|
2019-10-15 19:14:25 +00:00
|
|
|
Logger log.InterceptLogger
|
2018-09-15 23:23:13 +00:00
|
|
|
|
2015-06-03 10:26:50 +00:00
|
|
|
// RPCAddr is the RPC address used by Nomad. This should be reachable
|
|
|
|
// by the other servers and clients
|
|
|
|
RPCAddr *net.TCPAddr
|
|
|
|
|
2018-03-16 23:23:48 +00:00
|
|
|
// ClientRPCAdvertise is the address that is advertised to client nodes for
|
2015-06-03 10:26:50 +00:00
|
|
|
// the RPC endpoint. This can differ from the RPC address, if for example
|
|
|
|
// the RPCAddr is unspecified "0.0.0.0:4646", but this address must be
|
|
|
|
// reachable
|
2018-03-16 22:24:49 +00:00
|
|
|
ClientRPCAdvertise *net.TCPAddr
|
|
|
|
|
|
|
|
// ServerRPCAdvertise is the address that is advertised to other servers for
|
|
|
|
// the RPC endpoint. This can differ from the RPC address, if for example
|
|
|
|
// the RPCAddr is unspecified "0.0.0.0:4646", but this address must be
|
|
|
|
// reachable
|
|
|
|
ServerRPCAdvertise *net.TCPAddr
|
2015-06-03 10:26:50 +00:00
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
// RaftConfig is the configuration used for Raft in the local DC
|
|
|
|
RaftConfig *raft.Config
|
2015-06-03 10:26:50 +00:00
|
|
|
|
2015-08-26 00:36:52 +00:00
|
|
|
// RaftTimeout is applied to any network traffic for raft. Defaults to 10s.
|
|
|
|
RaftTimeout time.Duration
|
|
|
|
|
2017-12-18 21:16:23 +00:00
|
|
|
// (Enterprise-only) NonVoter is used to prevent this server from being added
|
|
|
|
// as a voting member of the Raft cluster.
|
|
|
|
NonVoter bool
|
|
|
|
|
2018-01-30 03:53:34 +00:00
|
|
|
// (Enterprise-only) RedundancyZone is the redundancy zone to use for this server.
|
|
|
|
RedundancyZone string
|
|
|
|
|
|
|
|
// (Enterprise-only) UpgradeVersion is the custom upgrade version to use when
|
|
|
|
// performing upgrade migrations.
|
|
|
|
UpgradeVersion string
|
|
|
|
|
2015-06-03 10:58:00 +00:00
|
|
|
// SerfConfig is the configuration for the serf cluster
|
|
|
|
SerfConfig *serf.Config
|
|
|
|
|
|
|
|
// Node name is the name we use to advertise. Defaults to hostname.
|
|
|
|
NodeName string
|
|
|
|
|
2017-11-22 00:29:11 +00:00
|
|
|
// NodeID is the uuid of this server.
|
|
|
|
NodeID string
|
|
|
|
|
2015-06-03 10:58:00 +00:00
|
|
|
// Region is the region this Nomad server belongs to.
|
|
|
|
Region string
|
|
|
|
|
2017-08-13 21:11:06 +00:00
|
|
|
// AuthoritativeRegion is the region which is treated as the authoritative source
|
|
|
|
// for ACLs and Policies. This provides a single source of truth to resolve conflicts.
|
|
|
|
AuthoritativeRegion string
|
|
|
|
|
2015-06-03 10:58:00 +00:00
|
|
|
// Datacenter is the datacenter this Nomad server belongs to.
|
|
|
|
Datacenter string
|
|
|
|
|
|
|
|
// Build is a string that is gossiped around, and can be used to help
|
|
|
|
// operators track which versions are actively deployed
|
|
|
|
Build string
|
2015-06-05 21:54:45 +00:00
|
|
|
|
2022-11-07 15:34:33 +00:00
|
|
|
// Revision is a string that carries the version.GitCommit of Nomad that
|
|
|
|
// was compiled.
|
|
|
|
Revision string
|
|
|
|
|
2015-07-28 22:12:08 +00:00
|
|
|
// NumSchedulers is the number of scheduler thread that are run.
|
|
|
|
// This can be as many as one per core, or zero to disable this server
|
|
|
|
// from doing any scheduling work.
|
|
|
|
NumSchedulers int
|
|
|
|
|
|
|
|
// EnabledSchedulers controls the set of sub-schedulers that are
|
|
|
|
// enabled for this server to handle. This will restrict the evaluations
|
|
|
|
// that the workers dequeue for processing.
|
|
|
|
EnabledSchedulers []string
|
|
|
|
|
2015-06-05 21:54:45 +00:00
|
|
|
// ReconcileInterval controls how often we reconcile the strongly
|
|
|
|
// consistent store with the Serf info. This is used to handle nodes
|
|
|
|
// that are force removed, as well as intermittent unavailability during
|
|
|
|
// leader election.
|
|
|
|
ReconcileInterval time.Duration
|
2015-07-24 04:44:17 +00:00
|
|
|
|
2015-08-15 22:15:00 +00:00
|
|
|
// EvalGCInterval is how often we dispatch a job to GC evaluations
|
|
|
|
EvalGCInterval time.Duration
|
|
|
|
|
|
|
|
// EvalGCThreshold is how "old" an evaluation must be to be eligible
|
|
|
|
// for GC. This gives users some time to debug a failed evaluation.
|
2023-01-31 18:32:14 +00:00
|
|
|
//
|
|
|
|
// Please note that the rules for GC of evaluations which belong to a batch
|
|
|
|
// job are separate and controlled by `BatchEvalGCThreshold`
|
2015-08-15 22:15:00 +00:00
|
|
|
EvalGCThreshold time.Duration
|
|
|
|
|
2023-01-31 18:32:14 +00:00
|
|
|
// BatchEvalGCThreshold is how "old" an evaluation must be to be eligible
|
|
|
|
// for GC if the eval belongs to a batch job.
|
|
|
|
BatchEvalGCThreshold time.Duration
|
|
|
|
|
2015-12-15 03:20:57 +00:00
|
|
|
// JobGCInterval is how often we dispatch a job to GC jobs that are
|
|
|
|
// available for garbage collection.
|
|
|
|
JobGCInterval time.Duration
|
|
|
|
|
2015-12-15 21:07:25 +00:00
|
|
|
// JobGCThreshold is how old a job must be before it eligible for GC. This gives
|
|
|
|
// the user time to inspect the job.
|
|
|
|
JobGCThreshold time.Duration
|
|
|
|
|
2015-09-07 18:01:29 +00:00
|
|
|
// NodeGCInterval is how often we dispatch a job to GC failed nodes.
|
|
|
|
NodeGCInterval time.Duration
|
|
|
|
|
2017-06-29 18:29:44 +00:00
|
|
|
// NodeGCThreshold is how "old" a node must be to be eligible
|
2015-09-07 18:01:29 +00:00
|
|
|
// for GC. This gives users some time to view and debug a failed nodes.
|
|
|
|
NodeGCThreshold time.Duration
|
|
|
|
|
2017-06-29 18:29:44 +00:00
|
|
|
// DeploymentGCInterval is how often we dispatch a job to GC terminal
|
|
|
|
// deployments.
|
|
|
|
DeploymentGCInterval time.Duration
|
|
|
|
|
|
|
|
// DeploymentGCThreshold is how "old" a deployment must be to be eligible
|
|
|
|
// for GC. This gives users some time to view terminal deployments.
|
|
|
|
DeploymentGCThreshold time.Duration
|
|
|
|
|
2020-05-06 20:49:12 +00:00
|
|
|
// CSIPluginGCInterval is how often we dispatch a job to GC unused plugins.
|
|
|
|
CSIPluginGCInterval time.Duration
|
|
|
|
|
|
|
|
// CSIPluginGCThreshold is how "old" a plugin must be to be eligible
|
|
|
|
// for GC. This gives users some time to debug plugins.
|
|
|
|
CSIPluginGCThreshold time.Duration
|
|
|
|
|
2020-05-11 12:20:50 +00:00
|
|
|
// CSIVolumeClaimGCInterval is how often we dispatch a job to GC
|
|
|
|
// volume claims.
|
|
|
|
CSIVolumeClaimGCInterval time.Duration
|
|
|
|
|
|
|
|
// CSIVolumeClaimGCThreshold is how "old" a volume must be to be
|
|
|
|
// eligible for GC. This gives users some time to debug volumes.
|
|
|
|
CSIVolumeClaimGCThreshold time.Duration
|
|
|
|
|
2021-02-26 15:20:33 +00:00
|
|
|
// OneTimeTokenGCInterval is how often we dispatch a job to GC
|
|
|
|
// one-time tokens.
|
|
|
|
OneTimeTokenGCInterval time.Duration
|
|
|
|
|
2022-07-12 11:43:25 +00:00
|
|
|
// ACLTokenExpirationGCInterval is how often we dispatch a job to GC
|
|
|
|
// expired ACL tokens.
|
|
|
|
ACLTokenExpirationGCInterval time.Duration
|
|
|
|
|
|
|
|
// ACLTokenExpirationGCThreshold controls how "old" an expired ACL token
|
|
|
|
// must be to be collected by GC.
|
|
|
|
ACLTokenExpirationGCThreshold time.Duration
|
|
|
|
|
2022-06-02 19:48:17 +00:00
|
|
|
// RootKeyGCInterval is how often we dispatch a job to GC
|
|
|
|
// encryption key metadata
|
|
|
|
RootKeyGCInterval time.Duration
|
|
|
|
|
|
|
|
// RootKeyGCThreshold is how "old" encryption key metadata must be
|
|
|
|
// to be eligible for GC.
|
|
|
|
RootKeyGCThreshold time.Duration
|
|
|
|
|
2022-06-20 20:26:05 +00:00
|
|
|
// RootKeyRotationThreshold is how "old" an active key can be
|
|
|
|
// before it's rotated
|
|
|
|
RootKeyRotationThreshold time.Duration
|
|
|
|
|
2022-08-26 18:03:56 +00:00
|
|
|
// VariablesRekeyInterval is how often we dispatch a job to
|
2022-07-07 17:48:38 +00:00
|
|
|
// rekey any variables associated with a key in the Rekeying state
|
2022-08-26 18:03:56 +00:00
|
|
|
VariablesRekeyInterval time.Duration
|
2022-07-07 17:48:38 +00:00
|
|
|
|
2015-07-24 04:44:17 +00:00
|
|
|
// EvalNackTimeout controls how long we allow a sub-scheduler to
|
|
|
|
// work on an evaluation before we consider it failed and Nack it.
|
|
|
|
// This allows that evaluation to be handed to another sub-scheduler
|
|
|
|
// to work on. Defaults to 60 seconds. This should be long enough that
|
|
|
|
// no evaluation hits it unless the sub-scheduler has failed.
|
|
|
|
EvalNackTimeout time.Duration
|
2015-08-16 17:55:55 +00:00
|
|
|
|
|
|
|
// EvalDeliveryLimit is the limit of attempts we make to deliver and
|
|
|
|
// process an evaluation. This is used so that an eval that will never
|
|
|
|
// complete eventually fails out of the system.
|
|
|
|
EvalDeliveryLimit int
|
2015-08-29 21:14:19 +00:00
|
|
|
|
2017-04-14 22:24:55 +00:00
|
|
|
// EvalNackInitialReenqueueDelay is the delay applied before reenqueuing a
|
|
|
|
// Nacked evaluation for the first time. This value should be small as the
|
|
|
|
// initial Nack can be due to a down machine and the eval should be retried
|
|
|
|
// quickly for liveliness.
|
|
|
|
EvalNackInitialReenqueueDelay time.Duration
|
|
|
|
|
|
|
|
// EvalNackSubsequentReenqueueDelay is the delay applied before reenqueuing
|
|
|
|
// an evaluation that has been Nacked more than once. This delay is
|
|
|
|
// compounding after the first Nack. This value should be significantly
|
|
|
|
// longer than the initial delay as the purpose it severs is to apply
|
2018-03-11 18:01:35 +00:00
|
|
|
// back-pressure as evaluations are being Nacked either due to scheduler
|
2017-04-14 22:24:55 +00:00
|
|
|
// failures or because they are hitting their Nack timeout, both of which
|
|
|
|
// are signs of high server resource usage.
|
|
|
|
EvalNackSubsequentReenqueueDelay time.Duration
|
|
|
|
|
|
|
|
// EvalFailedFollowupBaselineDelay is the minimum time waited before
|
|
|
|
// retrying a failed evaluation.
|
|
|
|
EvalFailedFollowupBaselineDelay time.Duration
|
|
|
|
|
2022-11-16 21:10:11 +00:00
|
|
|
// EvalReapCancelableInterval is the interval for the periodic reaping of
|
|
|
|
// cancelable evaluations. Cancelable evaluations are canceled whenever any
|
|
|
|
// eval is ack'd but this sweeps up on quiescent clusters. This config value
|
|
|
|
// exists only for testing.
|
|
|
|
EvalReapCancelableInterval time.Duration
|
|
|
|
|
2017-04-14 22:24:55 +00:00
|
|
|
// EvalFailedFollowupDelayRange defines the range of additional time from
|
|
|
|
// the baseline in which to wait before retrying a failed evaluation. The
|
|
|
|
// additional delay is selected from this range randomly.
|
|
|
|
EvalFailedFollowupDelayRange time.Duration
|
|
|
|
|
2022-07-12 22:40:20 +00:00
|
|
|
// NodePlanRejectionEnabled controls if node rejection tracker is enabled.
|
|
|
|
NodePlanRejectionEnabled bool
|
|
|
|
|
|
|
|
// NodePlanRejectionThreshold is the number of times a node must have a
|
|
|
|
// plan rejection before it is set as ineligible.
|
|
|
|
NodePlanRejectionThreshold int
|
|
|
|
|
|
|
|
// NodePlanRejectionWindow is the time window used to track plan
|
|
|
|
// rejections for nodes.
|
|
|
|
NodePlanRejectionWindow time.Duration
|
|
|
|
|
2015-08-29 21:14:19 +00:00
|
|
|
// MinHeartbeatTTL is the minimum time between heartbeats.
|
|
|
|
// This is used as a floor to prevent excessive updates.
|
|
|
|
MinHeartbeatTTL time.Duration
|
|
|
|
|
|
|
|
// MaxHeartbeatsPerSecond is the maximum target rate of heartbeats
|
|
|
|
// being processed per second. This allows the TTL to be increased
|
|
|
|
// to meet the target rate.
|
|
|
|
MaxHeartbeatsPerSecond float64
|
|
|
|
|
|
|
|
// HeartbeatGrace is the additional time given as a grace period
|
|
|
|
// beyond the TTL to account for network and processing delays
|
|
|
|
// as well as clock skew.
|
|
|
|
HeartbeatGrace time.Duration
|
|
|
|
|
|
|
|
// FailoverHeartbeatTTL is the TTL applied to heartbeats after
|
|
|
|
// a new leader is elected, since we no longer know the status
|
|
|
|
// of all the heartbeats.
|
|
|
|
FailoverHeartbeatTTL time.Duration
|
2016-06-14 05:58:39 +00:00
|
|
|
|
|
|
|
// ConsulConfig is this Agent's Consul configuration
|
|
|
|
ConsulConfig *config.ConsulConfig
|
2016-07-10 17:35:48 +00:00
|
|
|
|
2016-08-09 21:35:40 +00:00
|
|
|
// VaultConfig is this Agent's Vault configuration
|
|
|
|
VaultConfig *config.VaultConfig
|
|
|
|
|
2016-07-10 17:35:48 +00:00
|
|
|
// RPCHoldTimeout is how long an RPC can be "held" before it is errored.
|
|
|
|
// This is used to paper over a loss of leadership by instead holding RPCs,
|
|
|
|
// so that the caller experiences a slow response rather than an error.
|
|
|
|
// This period is meant to be long enough for a leader election to take
|
|
|
|
// place, and a small jitter is applied to avoid a thundering herd.
|
|
|
|
RPCHoldTimeout time.Duration
|
2016-10-24 05:22:00 +00:00
|
|
|
|
2016-10-25 22:57:38 +00:00
|
|
|
// TLSConfig holds various TLS related configurations
|
|
|
|
TLSConfig *config.TLSConfig
|
2017-08-13 21:11:06 +00:00
|
|
|
|
|
|
|
// ACLEnabled controls if ACL enforcement and management is enabled.
|
|
|
|
ACLEnabled bool
|
2017-08-13 23:16:59 +00:00
|
|
|
|
|
|
|
// ReplicationBackoff is how much we backoff when replication errors.
|
|
|
|
// This is a tunable knob for testing primarily.
|
|
|
|
ReplicationBackoff time.Duration
|
2017-08-21 03:51:30 +00:00
|
|
|
|
|
|
|
// ReplicationToken is the ACL Token Secret ID used to fetch from
|
|
|
|
// the Authoritative Region.
|
|
|
|
ReplicationToken string
|
2017-09-19 14:47:10 +00:00
|
|
|
|
2022-07-12 11:43:25 +00:00
|
|
|
// TokenMinExpirationTTL is used to enforce the lowest acceptable value for
|
|
|
|
// ACL token expiration.
|
|
|
|
ACLTokenMinExpirationTTL time.Duration
|
|
|
|
|
|
|
|
// TokenMaxExpirationTTL is used to enforce the highest acceptable value
|
|
|
|
// for ACL token expiration.
|
|
|
|
ACLTokenMaxExpirationTTL time.Duration
|
|
|
|
|
2017-09-19 14:47:10 +00:00
|
|
|
// SentinelGCInterval is the interval that we GC unused policies.
|
|
|
|
SentinelGCInterval time.Duration
|
|
|
|
|
|
|
|
// SentinelConfig is this Agent's Sentinel configuration
|
|
|
|
SentinelConfig *config.SentinelConfig
|
2017-10-30 19:19:11 +00:00
|
|
|
|
|
|
|
// StatsCollectionInterval is the interval at which the Nomad server
|
|
|
|
// publishes metrics which are periodic in nature like updating gauges
|
|
|
|
StatsCollectionInterval time.Duration
|
2017-10-30 23:10:58 +00:00
|
|
|
|
2018-11-14 16:13:52 +00:00
|
|
|
// DisableDispatchedJobSummaryMetrics allows for ignore dispatched jobs when
|
|
|
|
// publishing Job summary metrics
|
|
|
|
DisableDispatchedJobSummaryMetrics bool
|
|
|
|
|
2023-01-24 16:54:20 +00:00
|
|
|
// DisableRPCRateMetricsLabels drops the label for the identity of the
|
|
|
|
// requester when publishing metrics on RPC rate on the server. This may be
|
|
|
|
// useful to control metrics collection costs in environments where request
|
|
|
|
// rate is well-controlled but cardinality of requesters is high.
|
|
|
|
DisableRPCRateMetricsLabels bool
|
|
|
|
|
2017-12-18 21:16:23 +00:00
|
|
|
// AutopilotConfig is used to apply the initial autopilot config when
|
|
|
|
// bootstrapping.
|
2018-01-30 03:53:34 +00:00
|
|
|
AutopilotConfig *structs.AutopilotConfig
|
2017-12-18 21:16:23 +00:00
|
|
|
|
|
|
|
// ServerHealthInterval is the frequency with which the health of the
|
|
|
|
// servers in the cluster will be updated.
|
|
|
|
ServerHealthInterval time.Duration
|
|
|
|
|
|
|
|
// AutopilotInterval is the frequency with which the leader will perform
|
|
|
|
// autopilot tasks, such as promoting eligible non-voters and removing
|
|
|
|
// dead servers.
|
|
|
|
AutopilotInterval time.Duration
|
2018-09-27 01:14:36 +00:00
|
|
|
|
2020-01-28 16:09:36 +00:00
|
|
|
// DefaultSchedulerConfig configures the initial scheduler config to be persisted in Raft.
|
2020-10-09 21:31:38 +00:00
|
|
|
// Once the cluster is bootstrapped, and Raft persists the config (from here or through API)
|
|
|
|
// and this value is ignored.
|
2020-01-28 16:09:36 +00:00
|
|
|
DefaultSchedulerConfig structs.SchedulerConfiguration `hcl:"default_scheduler_config"`
|
2020-01-12 20:50:18 +00:00
|
|
|
|
2020-01-15 15:41:59 +00:00
|
|
|
// RPCHandshakeTimeout is the deadline by which RPC handshakes must
|
|
|
|
// complete. The RPC handshake includes the first byte read as well as
|
|
|
|
// the TLS handshake and subsequent byte read if TLS is enabled.
|
|
|
|
//
|
|
|
|
// The deadline is reset after the first byte is read so when TLS is
|
|
|
|
// enabled RPC connections may take (timeout * 2) to complete.
|
|
|
|
//
|
|
|
|
// 0 means no timeout.
|
|
|
|
RPCHandshakeTimeout time.Duration
|
|
|
|
|
|
|
|
// RPCMaxConnsPerClient is the maximum number of concurrent RPC
|
|
|
|
// connections from a single IP address. nil/0 means no limit.
|
|
|
|
RPCMaxConnsPerClient int
|
2020-05-27 17:46:52 +00:00
|
|
|
|
|
|
|
// LicenseConfig is a tunable knob for enterprise license testing.
|
|
|
|
LicenseConfig *LicenseConfig
|
api: implement fuzzy search API
This PR introduces the /v1/search/fuzzy API endpoint, used for fuzzy
searching objects in Nomad. The fuzzy search endpoint routes requests
to the Nomad Server leader, which implements the Search.FuzzySearch RPC
method.
Requests to the fuzzy search API are based on the api.FuzzySearchRequest
object, e.g.
{
"Text": "ed",
"Context": "all"
}
Responses from the fuzzy search API are based on the api.FuzzySearchResponse
object, e.g.
{
"Index": 27,
"KnownLeader": true,
"LastContact": 0,
"Matches": {
"tasks": [
{
"ID": "redis",
"Scope": [
"default",
"example",
"cache"
]
}
],
"evals": [],
"deployment": [],
"volumes": [],
"scaling_policy": [],
"images": [
{
"ID": "redis:3.2",
"Scope": [
"default",
"example",
"cache",
"redis"
]
}
]
},
"Truncations": {
"volumes": false,
"scaling_policy": false,
"evals": false,
"deployment": false
}
}
The API is tunable using the new server.search stanza, e.g.
server {
search {
fuzzy_enabled = true
limit_query = 200
limit_results = 1000
min_term_length = 5
}
}
These values can be increased or decreased, so as to provide more
search results or to reduce load on the Nomad Server. The fuzzy search
API can be disabled entirely by setting `fuzzy_enabled` to `false`.
2021-02-23 20:24:52 +00:00
|
|
|
LicenseEnv string
|
|
|
|
LicensePath string
|
2020-07-17 15:04:57 +00:00
|
|
|
|
api: implement fuzzy search API
This PR introduces the /v1/search/fuzzy API endpoint, used for fuzzy
searching objects in Nomad. The fuzzy search endpoint routes requests
to the Nomad Server leader, which implements the Search.FuzzySearch RPC
method.
Requests to the fuzzy search API are based on the api.FuzzySearchRequest
object, e.g.
{
"Text": "ed",
"Context": "all"
}
Responses from the fuzzy search API are based on the api.FuzzySearchResponse
object, e.g.
{
"Index": 27,
"KnownLeader": true,
"LastContact": 0,
"Matches": {
"tasks": [
{
"ID": "redis",
"Scope": [
"default",
"example",
"cache"
]
}
],
"evals": [],
"deployment": [],
"volumes": [],
"scaling_policy": [],
"images": [
{
"ID": "redis:3.2",
"Scope": [
"default",
"example",
"cache",
"redis"
]
}
]
},
"Truncations": {
"volumes": false,
"scaling_policy": false,
"evals": false,
"deployment": false
}
}
The API is tunable using the new server.search stanza, e.g.
server {
search {
fuzzy_enabled = true
limit_query = 200
limit_results = 1000
min_term_length = 5
}
}
These values can be increased or decreased, so as to provide more
search results or to reduce load on the Nomad Server. The fuzzy search
API can be disabled entirely by setting `fuzzy_enabled` to `false`.
2021-02-23 20:24:52 +00:00
|
|
|
// SearchConfig provides knobs for Search API.
|
|
|
|
SearchConfig *structs.SearchConfig
|
2021-03-23 13:08:14 +00:00
|
|
|
|
2022-02-16 16:30:03 +00:00
|
|
|
// RaftBoltNoFreelistSync configures whether freelist syncing is enabled.
|
|
|
|
RaftBoltNoFreelistSync bool
|
|
|
|
|
2020-07-17 15:04:57 +00:00
|
|
|
// AgentShutdown is used to call agent.Shutdown from the context of a Server
|
|
|
|
// It is used primarily for licensing
|
|
|
|
AgentShutdown func() error
|
2021-06-04 19:38:46 +00:00
|
|
|
|
|
|
|
// DeploymentQueryRateLimit is in queries per second and is used by the
|
|
|
|
// DeploymentWatcher to throttle the amount of simultaneously deployments
|
|
|
|
DeploymentQueryRateLimit float64
|
2015-06-01 15:49:10 +00:00
|
|
|
}
|
|
|
|
|
2022-08-18 23:32:04 +00:00
|
|
|
func (c *Config) Copy() *Config {
|
|
|
|
if c == nil {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
nc := *c
|
|
|
|
|
|
|
|
// Can't deep copy interfaces
|
|
|
|
// LogOutput io.Writer
|
|
|
|
// Logger log.InterceptLogger
|
|
|
|
// PluginLoader loader.PluginCatalog
|
|
|
|
// PluginSingletonLoader loader.PluginCatalog
|
|
|
|
|
|
|
|
nc.RPCAddr = pointer.Copy(c.RPCAddr)
|
|
|
|
nc.ClientRPCAdvertise = pointer.Copy(c.ClientRPCAdvertise)
|
|
|
|
nc.ServerRPCAdvertise = pointer.Copy(c.ServerRPCAdvertise)
|
|
|
|
nc.RaftConfig = pointer.Copy(c.RaftConfig)
|
|
|
|
nc.SerfConfig = pointer.Copy(c.SerfConfig)
|
|
|
|
nc.EnabledSchedulers = slices.Clone(c.EnabledSchedulers)
|
|
|
|
nc.ConsulConfig = c.ConsulConfig.Copy()
|
|
|
|
nc.VaultConfig = c.VaultConfig.Copy()
|
|
|
|
nc.TLSConfig = c.TLSConfig.Copy()
|
|
|
|
nc.SentinelConfig = c.SentinelConfig.Copy()
|
|
|
|
nc.AutopilotConfig = c.AutopilotConfig.Copy()
|
|
|
|
nc.LicenseConfig = c.LicenseConfig.Copy()
|
|
|
|
nc.SearchConfig = c.SearchConfig.Copy()
|
|
|
|
|
|
|
|
return &nc
|
|
|
|
}
|
|
|
|
|
2020-01-15 15:41:59 +00:00
|
|
|
// DefaultConfig returns the default configuration. Only used as the basis for
|
|
|
|
// merging agent or test parameters.
|
2015-06-01 15:49:10 +00:00
|
|
|
func DefaultConfig() *Config {
|
2015-06-03 10:58:00 +00:00
|
|
|
hostname, err := os.Hostname()
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
c := &Config{
|
2017-04-14 22:24:55 +00:00
|
|
|
Region: DefaultRegion,
|
2017-08-13 23:16:59 +00:00
|
|
|
AuthoritativeRegion: DefaultRegion,
|
2017-04-14 22:24:55 +00:00
|
|
|
Datacenter: DefaultDC,
|
|
|
|
NodeName: hostname,
|
2017-11-22 00:29:11 +00:00
|
|
|
NodeID: uuid.Generate(),
|
2017-04-14 22:24:55 +00:00
|
|
|
RaftConfig: raft.DefaultConfig(),
|
|
|
|
RaftTimeout: 10 * time.Second,
|
|
|
|
LogOutput: os.Stderr,
|
2020-02-06 21:38:47 +00:00
|
|
|
RPCAddr: DefaultRPCAddr(),
|
2017-04-14 22:24:55 +00:00
|
|
|
SerfConfig: serf.DefaultConfig(),
|
|
|
|
NumSchedulers: 1,
|
|
|
|
ReconcileInterval: 60 * time.Second,
|
|
|
|
EvalGCInterval: 5 * time.Minute,
|
|
|
|
EvalGCThreshold: 1 * time.Hour,
|
2023-01-31 18:32:14 +00:00
|
|
|
BatchEvalGCThreshold: 24 * time.Hour,
|
2017-04-14 22:24:55 +00:00
|
|
|
JobGCInterval: 5 * time.Minute,
|
|
|
|
JobGCThreshold: 4 * time.Hour,
|
|
|
|
NodeGCInterval: 5 * time.Minute,
|
|
|
|
NodeGCThreshold: 24 * time.Hour,
|
2017-06-29 18:29:44 +00:00
|
|
|
DeploymentGCInterval: 5 * time.Minute,
|
|
|
|
DeploymentGCThreshold: 1 * time.Hour,
|
2020-05-06 20:49:12 +00:00
|
|
|
CSIPluginGCInterval: 5 * time.Minute,
|
|
|
|
CSIPluginGCThreshold: 1 * time.Hour,
|
2020-05-11 12:20:50 +00:00
|
|
|
CSIVolumeClaimGCInterval: 5 * time.Minute,
|
2020-08-06 18:51:46 +00:00
|
|
|
CSIVolumeClaimGCThreshold: 5 * time.Minute,
|
2021-02-26 15:20:33 +00:00
|
|
|
OneTimeTokenGCInterval: 10 * time.Minute,
|
2022-07-12 11:43:25 +00:00
|
|
|
ACLTokenExpirationGCInterval: 5 * time.Minute,
|
|
|
|
ACLTokenExpirationGCThreshold: 1 * time.Hour,
|
2022-06-02 19:48:17 +00:00
|
|
|
RootKeyGCInterval: 10 * time.Minute,
|
|
|
|
RootKeyGCThreshold: 1 * time.Hour,
|
2022-06-20 20:26:05 +00:00
|
|
|
RootKeyRotationThreshold: 720 * time.Hour, // 30 days
|
2022-08-26 18:03:56 +00:00
|
|
|
VariablesRekeyInterval: 10 * time.Minute,
|
2017-04-14 22:24:55 +00:00
|
|
|
EvalNackTimeout: 60 * time.Second,
|
|
|
|
EvalDeliveryLimit: 3,
|
|
|
|
EvalNackInitialReenqueueDelay: 1 * time.Second,
|
|
|
|
EvalNackSubsequentReenqueueDelay: 20 * time.Second,
|
|
|
|
EvalFailedFollowupBaselineDelay: 1 * time.Minute,
|
|
|
|
EvalFailedFollowupDelayRange: 5 * time.Minute,
|
2022-11-16 21:10:11 +00:00
|
|
|
EvalReapCancelableInterval: 5 * time.Second,
|
2017-04-14 22:24:55 +00:00
|
|
|
MinHeartbeatTTL: 10 * time.Second,
|
|
|
|
MaxHeartbeatsPerSecond: 50.0,
|
|
|
|
HeartbeatGrace: 10 * time.Second,
|
|
|
|
FailoverHeartbeatTTL: 300 * time.Second,
|
2022-07-12 22:40:20 +00:00
|
|
|
NodePlanRejectionEnabled: false,
|
|
|
|
NodePlanRejectionThreshold: 15,
|
|
|
|
NodePlanRejectionWindow: 10 * time.Minute,
|
2017-04-14 22:24:55 +00:00
|
|
|
ConsulConfig: config.DefaultConsulConfig(),
|
|
|
|
VaultConfig: config.DefaultVaultConfig(),
|
|
|
|
RPCHoldTimeout: 5 * time.Second,
|
2017-11-15 01:53:23 +00:00
|
|
|
StatsCollectionInterval: 1 * time.Minute,
|
2017-04-14 22:24:55 +00:00
|
|
|
TLSConfig: &config.TLSConfig{},
|
2017-08-13 23:16:59 +00:00
|
|
|
ReplicationBackoff: 30 * time.Second,
|
2017-09-19 14:47:10 +00:00
|
|
|
SentinelGCInterval: 30 * time.Second,
|
2020-05-27 17:46:52 +00:00
|
|
|
LicenseConfig: &LicenseConfig{},
|
2020-10-08 18:27:52 +00:00
|
|
|
EnableEventBroker: true,
|
|
|
|
EventBufferSize: 100,
|
2022-07-12 11:43:25 +00:00
|
|
|
ACLTokenMinExpirationTTL: 1 * time.Minute,
|
|
|
|
ACLTokenMaxExpirationTTL: 24 * time.Hour,
|
2018-01-30 03:53:34 +00:00
|
|
|
AutopilotConfig: &structs.AutopilotConfig{
|
2017-12-18 21:16:23 +00:00
|
|
|
CleanupDeadServers: true,
|
|
|
|
LastContactThreshold: 200 * time.Millisecond,
|
|
|
|
MaxTrailingLogs: 250,
|
|
|
|
ServerStabilizationTime: 10 * time.Second,
|
|
|
|
},
|
2020-01-28 16:09:36 +00:00
|
|
|
ServerHealthInterval: 2 * time.Second,
|
|
|
|
AutopilotInterval: 10 * time.Second,
|
|
|
|
DefaultSchedulerConfig: structs.SchedulerConfiguration{
|
2020-04-03 23:03:14 +00:00
|
|
|
SchedulerAlgorithm: structs.SchedulerAlgorithmBinpack,
|
2020-01-28 16:09:36 +00:00
|
|
|
PreemptionConfig: structs.PreemptionConfig{
|
2020-10-09 21:31:38 +00:00
|
|
|
SystemSchedulerEnabled: true,
|
|
|
|
SysBatchSchedulerEnabled: false,
|
|
|
|
BatchSchedulerEnabled: false,
|
|
|
|
ServiceSchedulerEnabled: false,
|
2020-01-28 16:09:36 +00:00
|
|
|
},
|
|
|
|
},
|
2021-06-04 19:38:46 +00:00
|
|
|
DeploymentQueryRateLimit: deploymentwatcher.LimitStateQueriesPerSecond,
|
2015-06-01 15:49:10 +00:00
|
|
|
}
|
2015-06-03 10:58:00 +00:00
|
|
|
|
2015-07-28 23:19:52 +00:00
|
|
|
// Enable all known schedulers by default
|
|
|
|
c.EnabledSchedulers = make([]string, 0, len(scheduler.BuiltinSchedulers))
|
|
|
|
for name := range scheduler.BuiltinSchedulers {
|
|
|
|
c.EnabledSchedulers = append(c.EnabledSchedulers, name)
|
2015-07-28 22:12:08 +00:00
|
|
|
}
|
2015-08-15 19:38:58 +00:00
|
|
|
c.EnabledSchedulers = append(c.EnabledSchedulers, structs.JobTypeCore)
|
2015-07-28 22:12:08 +00:00
|
|
|
|
2018-03-11 17:51:20 +00:00
|
|
|
// Default the number of schedulers to match the cores
|
2015-08-23 20:59:26 +00:00
|
|
|
c.NumSchedulers = runtime.NumCPU()
|
|
|
|
|
2015-06-05 22:32:28 +00:00
|
|
|
// Increase our reap interval to 3 days instead of 24h.
|
|
|
|
c.SerfConfig.ReconnectTimeout = 3 * 24 * time.Hour
|
|
|
|
|
2015-06-03 10:58:00 +00:00
|
|
|
// Serf should use the WAN timing, since we are using it
|
|
|
|
// to communicate between DC's
|
|
|
|
c.SerfConfig.MemberlistConfig = memberlist.DefaultWANConfig()
|
|
|
|
c.SerfConfig.MemberlistConfig.BindPort = DefaultSerfPort
|
|
|
|
|
|
|
|
// Disable shutdown on removal
|
|
|
|
c.RaftConfig.ShutdownOnRemove = false
|
2017-02-02 21:52:31 +00:00
|
|
|
|
2022-03-22 19:06:25 +00:00
|
|
|
// Default to Raft v3 since Nomad 1.3
|
|
|
|
c.RaftConfig.ProtocolVersion = 3
|
2017-02-02 21:52:31 +00:00
|
|
|
|
2015-06-01 15:49:10 +00:00
|
|
|
return c
|
|
|
|
}
|