2015-08-07 00:25:14 +00:00
|
|
|
package scheduler
|
|
|
|
|
|
|
|
import (
|
2015-08-07 00:46:14 +00:00
|
|
|
"fmt"
|
2017-07-07 18:42:51 +00:00
|
|
|
"time"
|
2015-08-07 00:25:14 +00:00
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2019-03-08 12:48:12 +00:00
|
|
|
"github.com/hashicorp/go-memdb"
|
|
|
|
"github.com/hashicorp/go-multierror"
|
2017-09-29 16:58:48 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2015-08-07 00:25:14 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
2015-08-13 22:17:24 +00:00
|
|
|
const (
|
2015-08-14 05:35:48 +00:00
|
|
|
// maxServiceScheduleAttempts is used to limit the number of times
|
|
|
|
// we will attempt to schedule if we continue to hit conflicts for services.
|
|
|
|
maxServiceScheduleAttempts = 5
|
|
|
|
|
|
|
|
// maxBatchScheduleAttempts is used to limit the number of times
|
|
|
|
// we will attempt to schedule if we continue to hit conflicts for batch.
|
|
|
|
maxBatchScheduleAttempts = 2
|
2015-08-26 00:06:06 +00:00
|
|
|
|
|
|
|
// allocNotNeeded is the status used when a job no longer requires an allocation
|
|
|
|
allocNotNeeded = "alloc not needed due to job update"
|
|
|
|
|
|
|
|
// allocMigrating is the status used when we must migrate an allocation
|
|
|
|
allocMigrating = "alloc is being migrated"
|
|
|
|
|
|
|
|
// allocUpdating is the status used when a job requires an update
|
|
|
|
allocUpdating = "alloc is being updated due to job update"
|
2015-09-07 19:27:12 +00:00
|
|
|
|
2016-08-03 22:45:42 +00:00
|
|
|
// allocLost is the status used when an allocation is lost
|
|
|
|
allocLost = "alloc is lost since its node is down"
|
|
|
|
|
2015-09-07 19:27:12 +00:00
|
|
|
// allocInPlace is the status used when speculating on an in-place update
|
|
|
|
allocInPlace = "alloc updating in-place"
|
2016-05-25 21:11:14 +00:00
|
|
|
|
2018-03-27 00:54:46 +00:00
|
|
|
// allocNodeTainted is the status used when stopping an alloc because it's
|
|
|
|
// node is tainted.
|
|
|
|
allocNodeTainted = "alloc not needed as node is tainted"
|
|
|
|
|
2019-06-06 19:04:32 +00:00
|
|
|
// allocRescheduled is the status used when an allocation failed and was rescheduled
|
|
|
|
allocRescheduled = "alloc was rescheduled because it failed"
|
|
|
|
|
2016-05-25 21:11:14 +00:00
|
|
|
// blockedEvalMaxPlanDesc is the description used for blocked evals that are
|
|
|
|
// a result of hitting the max number of plan attempts
|
|
|
|
blockedEvalMaxPlanDesc = "created due to placement conflicts"
|
|
|
|
|
|
|
|
// blockedEvalFailedPlacements is the description used for blocked evals
|
|
|
|
// that are a result of failing to place all allocations.
|
|
|
|
blockedEvalFailedPlacements = "created to place remaining allocations"
|
2018-03-08 00:44:54 +00:00
|
|
|
|
2018-04-10 20:30:15 +00:00
|
|
|
// reschedulingFollowupEvalDesc is the description used when creating follow
|
|
|
|
// up evals for delayed rescheduling
|
|
|
|
reschedulingFollowupEvalDesc = "created for delayed rescheduling"
|
|
|
|
|
2018-03-08 00:44:54 +00:00
|
|
|
// maxPastRescheduleEvents is the maximum number of past reschedule event
|
|
|
|
// that we track when unlimited rescheduling is enabled
|
|
|
|
maxPastRescheduleEvents = 5
|
2015-08-13 22:17:24 +00:00
|
|
|
)
|
|
|
|
|
2015-08-15 21:47:13 +00:00
|
|
|
// SetStatusError is used to set the status of the evaluation to the given error
|
|
|
|
type SetStatusError struct {
|
|
|
|
Err error
|
|
|
|
EvalStatus string
|
|
|
|
}
|
|
|
|
|
|
|
|
func (s *SetStatusError) Error() string {
|
|
|
|
return s.Err.Error()
|
|
|
|
}
|
|
|
|
|
2015-08-14 05:28:37 +00:00
|
|
|
// GenericScheduler is used for 'service' and 'batch' type jobs. This scheduler is
|
2017-12-13 17:36:03 +00:00
|
|
|
// designed for long-lived services, and as such spends more time attempting
|
2015-08-07 00:25:14 +00:00
|
|
|
// to make a high quality placement. This is the primary scheduler for
|
2015-08-14 05:28:37 +00:00
|
|
|
// most workloads. It also supports a 'batch' mode to optimize for fast decision
|
|
|
|
// making at the cost of quality.
|
|
|
|
type GenericScheduler struct {
|
2018-09-15 23:23:13 +00:00
|
|
|
logger log.Logger
|
2015-08-07 00:25:14 +00:00
|
|
|
state State
|
|
|
|
planner Planner
|
2015-08-14 05:28:37 +00:00
|
|
|
batch bool
|
2015-08-14 00:11:20 +00:00
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
eval *structs.Evaluation
|
|
|
|
job *structs.Job
|
|
|
|
plan *structs.Plan
|
|
|
|
planResult *structs.PlanResult
|
|
|
|
ctx *EvalContext
|
|
|
|
stack *GenericStack
|
2015-09-07 22:17:39 +00:00
|
|
|
|
2018-03-12 20:44:33 +00:00
|
|
|
followUpEvals []*structs.Evaluation
|
2016-01-28 21:43:48 +00:00
|
|
|
|
2017-05-18 19:36:04 +00:00
|
|
|
deployment *structs.Deployment
|
|
|
|
|
2016-05-27 18:26:14 +00:00
|
|
|
blocked *structs.Evaluation
|
|
|
|
failedTGAllocs map[string]*structs.AllocMetric
|
2016-07-18 22:04:05 +00:00
|
|
|
queuedAllocs map[string]int
|
2015-08-07 00:25:14 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewServiceScheduler is a factory function to instantiate a new service scheduler
|
2019-03-08 12:48:12 +00:00
|
|
|
func NewServiceScheduler(logger log.Logger, state State, planner Planner) Scheduler {
|
2015-08-14 05:28:37 +00:00
|
|
|
s := &GenericScheduler{
|
2019-03-08 12:48:12 +00:00
|
|
|
logger: logger.Named("service_sched"),
|
|
|
|
state: state,
|
|
|
|
planner: planner,
|
|
|
|
batch: false,
|
2015-08-14 05:28:37 +00:00
|
|
|
}
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewBatchScheduler is a factory function to instantiate a new batch scheduler
|
2019-03-08 12:48:12 +00:00
|
|
|
func NewBatchScheduler(logger log.Logger, state State, planner Planner) Scheduler {
|
2015-08-14 05:28:37 +00:00
|
|
|
s := &GenericScheduler{
|
2019-03-08 12:48:12 +00:00
|
|
|
logger: logger.Named("batch_sched"),
|
|
|
|
state: state,
|
|
|
|
planner: planner,
|
|
|
|
batch: true,
|
2015-08-07 00:25:14 +00:00
|
|
|
}
|
|
|
|
return s
|
|
|
|
}
|
|
|
|
|
|
|
|
// Process is used to handle a single evaluation
|
2015-08-14 05:28:37 +00:00
|
|
|
func (s *GenericScheduler) Process(eval *structs.Evaluation) error {
|
2015-09-23 04:45:20 +00:00
|
|
|
// Store the evaluation
|
|
|
|
s.eval = eval
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
// Update our logger with the eval's information
|
|
|
|
s.logger = s.logger.With("eval_id", eval.ID, "job_id", eval.JobID, "namespace", eval.Namespace)
|
|
|
|
|
2015-08-14 00:40:23 +00:00
|
|
|
// Verify the evaluation trigger reason is understood
|
2015-08-07 00:46:14 +00:00
|
|
|
switch eval.TriggeredBy {
|
2018-01-24 00:47:00 +00:00
|
|
|
case structs.EvalTriggerJobRegister, structs.EvalTriggerJobDeregister,
|
|
|
|
structs.EvalTriggerNodeDrain, structs.EvalTriggerNodeUpdate,
|
2019-04-01 14:21:03 +00:00
|
|
|
structs.EvalTriggerAllocStop,
|
2018-09-24 21:47:49 +00:00
|
|
|
structs.EvalTriggerRollingUpdate, structs.EvalTriggerQueuedAllocs,
|
2017-07-04 19:24:27 +00:00
|
|
|
structs.EvalTriggerPeriodicJob, structs.EvalTriggerMaxPlans,
|
2018-09-21 22:28:18 +00:00
|
|
|
structs.EvalTriggerDeploymentWatcher, structs.EvalTriggerRetryFailedAlloc,
|
2018-10-18 04:49:37 +00:00
|
|
|
structs.EvalTriggerFailedFollowUp, structs.EvalTriggerPreemption:
|
2015-08-07 00:46:14 +00:00
|
|
|
default:
|
2015-08-15 21:47:13 +00:00
|
|
|
desc := fmt.Sprintf("scheduler cannot handle '%s' evaluation reason",
|
2015-08-07 00:46:14 +00:00
|
|
|
eval.TriggeredBy)
|
2018-03-12 20:44:33 +00:00
|
|
|
return setStatus(s.logger, s.planner, s.eval, nil, s.blocked,
|
2017-07-06 00:13:45 +00:00
|
|
|
s.failedTGAllocs, structs.EvalStatusFailed, desc, s.queuedAllocs,
|
|
|
|
s.deployment.GetID())
|
2015-08-07 00:46:14 +00:00
|
|
|
}
|
2015-08-14 00:40:23 +00:00
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
// Retry up to the maxScheduleAttempts and reset if progress is made.
|
|
|
|
progress := func() bool { return progressMade(s.planResult) }
|
2015-08-14 05:35:48 +00:00
|
|
|
limit := maxServiceScheduleAttempts
|
|
|
|
if s.batch {
|
|
|
|
limit = maxBatchScheduleAttempts
|
|
|
|
}
|
2016-02-10 05:24:47 +00:00
|
|
|
if err := retryMax(limit, s.process, progress); err != nil {
|
2015-08-15 21:47:13 +00:00
|
|
|
if statusErr, ok := err.(*SetStatusError); ok {
|
2016-02-10 05:24:47 +00:00
|
|
|
// Scheduling was tried but made no forward progress so create a
|
|
|
|
// blocked eval to retry once resources become available.
|
|
|
|
var mErr multierror.Error
|
2016-05-23 23:27:26 +00:00
|
|
|
if err := s.createBlockedEval(true); err != nil {
|
2016-02-10 05:24:47 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2018-03-12 20:44:33 +00:00
|
|
|
if err := setStatus(s.logger, s.planner, s.eval, nil, s.blocked,
|
2016-07-18 22:04:05 +00:00
|
|
|
s.failedTGAllocs, statusErr.EvalStatus, err.Error(),
|
2017-07-06 00:13:45 +00:00
|
|
|
s.queuedAllocs, s.deployment.GetID()); err != nil {
|
2016-02-10 05:24:47 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
|
|
|
return mErr.ErrorOrNil()
|
2015-08-15 21:47:13 +00:00
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-05-20 23:03:53 +00:00
|
|
|
// If the current evaluation is a blocked evaluation and we didn't place
|
|
|
|
// everything, do not update the status to complete.
|
2016-05-27 18:26:14 +00:00
|
|
|
if s.eval.Status == structs.EvalStatusBlocked && len(s.failedTGAllocs) != 0 {
|
2016-06-10 22:24:06 +00:00
|
|
|
e := s.ctx.Eligibility()
|
|
|
|
newEval := s.eval.Copy()
|
|
|
|
newEval.EscapedComputedClass = e.HasEscaped()
|
|
|
|
newEval.ClassEligibility = e.GetClasses()
|
2017-10-13 21:36:02 +00:00
|
|
|
newEval.QuotaLimitReached = e.QuotaLimitReached()
|
2016-06-10 22:24:06 +00:00
|
|
|
return s.planner.ReblockEval(newEval)
|
2016-05-20 23:03:53 +00:00
|
|
|
}
|
|
|
|
|
2015-08-15 21:47:13 +00:00
|
|
|
// Update the status to complete
|
2018-03-12 20:44:33 +00:00
|
|
|
return setStatus(s.logger, s.planner, s.eval, nil, s.blocked,
|
2017-07-06 00:13:45 +00:00
|
|
|
s.failedTGAllocs, structs.EvalStatusComplete, "", s.queuedAllocs,
|
|
|
|
s.deployment.GetID())
|
2015-08-07 00:46:14 +00:00
|
|
|
}
|
|
|
|
|
2016-05-23 23:27:26 +00:00
|
|
|
// createBlockedEval creates a blocked eval and submits it to the planner. If
|
|
|
|
// failure is set to true, the eval's trigger reason reflects that.
|
|
|
|
func (s *GenericScheduler) createBlockedEval(planFailure bool) error {
|
2016-02-11 17:45:27 +00:00
|
|
|
e := s.ctx.Eligibility()
|
|
|
|
escaped := e.HasEscaped()
|
|
|
|
|
|
|
|
// Only store the eligible classes if the eval hasn't escaped.
|
|
|
|
var classEligibility map[string]bool
|
|
|
|
if !escaped {
|
|
|
|
classEligibility = e.GetClasses()
|
2016-02-10 05:24:47 +00:00
|
|
|
}
|
|
|
|
|
2017-10-13 21:36:02 +00:00
|
|
|
s.blocked = s.eval.CreateBlockedEval(classEligibility, escaped, e.QuotaLimitReached())
|
2016-05-23 23:27:26 +00:00
|
|
|
if planFailure {
|
|
|
|
s.blocked.TriggeredBy = structs.EvalTriggerMaxPlans
|
2016-05-25 21:11:14 +00:00
|
|
|
s.blocked.StatusDescription = blockedEvalMaxPlanDesc
|
|
|
|
} else {
|
|
|
|
s.blocked.StatusDescription = blockedEvalFailedPlacements
|
2016-05-23 23:27:26 +00:00
|
|
|
}
|
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
return s.planner.CreateEval(s.blocked)
|
|
|
|
}
|
|
|
|
|
2015-08-14 00:40:23 +00:00
|
|
|
// process is wrapped in retryMax to iteratively run the handler until we have no
|
2015-08-14 00:11:20 +00:00
|
|
|
// further work or we've made the maximum number of attempts.
|
2015-08-14 05:28:37 +00:00
|
|
|
func (s *GenericScheduler) process() (bool, error) {
|
2015-08-11 23:41:48 +00:00
|
|
|
// Lookup the Job by ID
|
2015-09-07 19:27:12 +00:00
|
|
|
var err error
|
2017-02-08 04:31:23 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
s.job, err = s.state.JobByID(ws, s.eval.Namespace, s.eval.JobID)
|
2015-08-11 23:41:48 +00:00
|
|
|
if err != nil {
|
2017-05-18 19:36:04 +00:00
|
|
|
return false, fmt.Errorf("failed to get job %q: %v", s.eval.JobID, err)
|
2015-08-14 00:11:20 +00:00
|
|
|
}
|
2017-05-18 19:36:04 +00:00
|
|
|
|
2016-07-26 05:11:11 +00:00
|
|
|
numTaskGroups := 0
|
2017-05-18 19:36:04 +00:00
|
|
|
stopped := s.job.Stopped()
|
|
|
|
if !stopped {
|
2016-07-26 05:11:11 +00:00
|
|
|
numTaskGroups = len(s.job.TaskGroups)
|
|
|
|
}
|
|
|
|
s.queuedAllocs = make(map[string]int, numTaskGroups)
|
2018-03-08 00:44:54 +00:00
|
|
|
s.followUpEvals = nil
|
2015-08-14 00:11:20 +00:00
|
|
|
|
|
|
|
// Create a plan
|
2019-03-08 12:48:12 +00:00
|
|
|
s.plan = s.eval.MakePlan(s.job)
|
2015-08-14 00:11:20 +00:00
|
|
|
|
2017-05-18 19:36:04 +00:00
|
|
|
if !s.batch {
|
|
|
|
// Get any existing deployment
|
2017-09-07 23:56:15 +00:00
|
|
|
s.deployment, err = s.state.LatestDeploymentByJobID(ws, s.eval.Namespace, s.eval.JobID)
|
2017-05-18 19:36:04 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed to get job deployment %q: %v", s.eval.JobID, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-05-19 01:11:40 +00:00
|
|
|
// Reset the failed allocations
|
2016-05-27 18:26:14 +00:00
|
|
|
s.failedTGAllocs = nil
|
2016-05-19 01:11:40 +00:00
|
|
|
|
2015-09-07 18:34:59 +00:00
|
|
|
// Create an evaluation context
|
|
|
|
s.ctx = NewEvalContext(s.state, s.plan, s.logger)
|
|
|
|
|
|
|
|
// Construct the placement stack
|
2015-10-17 00:05:23 +00:00
|
|
|
s.stack = NewGenericStack(s.batch, s.ctx)
|
2017-04-19 17:54:03 +00:00
|
|
|
if !s.job.Stopped() {
|
2015-09-07 19:27:12 +00:00
|
|
|
s.stack.SetJob(s.job)
|
|
|
|
}
|
2015-09-07 18:34:59 +00:00
|
|
|
|
2015-08-14 00:40:23 +00:00
|
|
|
// Compute the target job allocations
|
2017-05-23 23:39:15 +00:00
|
|
|
if err := s.computeJobAllocs(); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Error("failed to compute job allocations", "error", err)
|
2015-08-14 00:40:23 +00:00
|
|
|
return false, err
|
2015-08-11 23:41:48 +00:00
|
|
|
}
|
|
|
|
|
2016-05-19 01:11:40 +00:00
|
|
|
// If there are failed allocations, we need to create a blocked evaluation
|
2016-05-20 23:03:53 +00:00
|
|
|
// to place the failed allocations when resources become available. If the
|
2019-06-19 19:10:57 +00:00
|
|
|
// current evaluation is already a blocked eval, we reuse it by submitting
|
|
|
|
// a new eval to the planner in createBlockedEval
|
2016-05-27 18:26:14 +00:00
|
|
|
if s.eval.Status != structs.EvalStatusBlocked && len(s.failedTGAllocs) != 0 && s.blocked == nil {
|
2016-05-23 23:27:26 +00:00
|
|
|
if err := s.createBlockedEval(false); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Error("failed to make blocked eval", "error", err)
|
2016-05-19 01:11:40 +00:00
|
|
|
return false, err
|
|
|
|
}
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("failed to place all allocations, blocked eval created", "blocked_eval_id", s.blocked.ID)
|
2016-05-19 01:11:40 +00:00
|
|
|
}
|
|
|
|
|
2016-05-05 18:21:58 +00:00
|
|
|
// If the plan is a no-op, we can bail. If AnnotatePlan is set submit the plan
|
|
|
|
// anyways to get the annotations.
|
|
|
|
if s.plan.IsNoOp() && !s.eval.AnnotatePlan {
|
2015-08-14 01:16:32 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
2018-03-02 00:23:44 +00:00
|
|
|
// Create follow up evals for any delayed reschedule eligible allocations
|
|
|
|
if len(s.followUpEvals) > 0 {
|
|
|
|
for _, eval := range s.followUpEvals {
|
|
|
|
eval.PreviousEval = s.eval.ID
|
|
|
|
// TODO(preetha) this should be batching evals before inserting them
|
|
|
|
if err := s.planner.CreateEval(eval); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Error("failed to make next eval for rescheduling", "error", err)
|
2018-03-02 00:23:44 +00:00
|
|
|
return false, err
|
|
|
|
}
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("found reschedulable allocs, followup eval created", "followup_eval_id", eval.ID)
|
2018-03-02 00:23:44 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
// Submit the plan and store the results.
|
2015-08-14 00:11:20 +00:00
|
|
|
result, newState, err := s.planner.SubmitPlan(s.plan)
|
2016-02-10 05:24:47 +00:00
|
|
|
s.planResult = result
|
2015-08-14 00:11:20 +00:00
|
|
|
if err != nil {
|
2015-08-14 00:40:23 +00:00
|
|
|
return false, err
|
2015-08-14 00:11:20 +00:00
|
|
|
}
|
2016-07-22 06:13:07 +00:00
|
|
|
|
|
|
|
// Decrement the number of allocations pending per task group based on the
|
|
|
|
// number of allocations successfully placed
|
2016-07-22 21:53:49 +00:00
|
|
|
adjustQueuedAllocations(s.logger, result, s.queuedAllocs)
|
2015-08-14 00:11:20 +00:00
|
|
|
|
|
|
|
// If we got a state refresh, try again since we have stale data
|
|
|
|
if newState != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("refresh forced")
|
2015-08-14 00:11:20 +00:00
|
|
|
s.state = newState
|
2015-08-14 00:40:23 +00:00
|
|
|
return false, nil
|
2015-08-14 00:11:20 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Try again if the plan was not fully committed, potential conflict
|
|
|
|
fullCommit, expected, actual := result.FullCommit(s.plan)
|
|
|
|
if !fullCommit {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("plan didn't fully commit", "attempted", expected, "placed", actual)
|
2016-02-22 20:15:40 +00:00
|
|
|
if newState == nil {
|
|
|
|
return false, fmt.Errorf("missing state refresh after partial commit")
|
|
|
|
}
|
2015-08-14 00:40:23 +00:00
|
|
|
return false, nil
|
2015-08-14 00:11:20 +00:00
|
|
|
}
|
2015-08-14 00:40:23 +00:00
|
|
|
|
|
|
|
// Success!
|
|
|
|
return true, nil
|
2015-08-14 00:11:20 +00:00
|
|
|
}
|
|
|
|
|
2017-05-22 17:58:34 +00:00
|
|
|
// computeJobAllocs is used to reconcile differences between the job,
|
|
|
|
// existing allocations and node status to update the allocations.
|
2017-05-23 23:39:15 +00:00
|
|
|
func (s *GenericScheduler) computeJobAllocs() error {
|
2017-05-22 17:58:34 +00:00
|
|
|
// Lookup the allocations by JobID
|
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
allocs, err := s.state.AllocsByJob(ws, s.eval.Namespace, s.eval.JobID, true)
|
2017-05-22 17:58:34 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to get allocs for job '%s': %v",
|
|
|
|
s.eval.JobID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Determine the tainted nodes containing job allocs
|
|
|
|
tainted, err := taintedNodes(s.state, allocs)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("failed to get tainted nodes for job '%s': %v",
|
|
|
|
s.eval.JobID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the allocations which are in pending/running state on tainted
|
|
|
|
// nodes to lost
|
|
|
|
updateNonTerminalAllocsToLost(s.plan, tainted, allocs)
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
reconciler := NewAllocReconciler(s.logger,
|
2017-06-21 20:26:45 +00:00
|
|
|
genericAllocUpdateFn(s.ctx, s.stack, s.eval.ID),
|
2018-04-03 20:49:18 +00:00
|
|
|
s.batch, s.eval.JobID, s.job, s.deployment, allocs, tainted, s.eval.ID)
|
2017-05-22 17:58:34 +00:00
|
|
|
results := reconciler.Compute()
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("reconciled current state with desired state", "results", log.Fmt("%#v", results))
|
2017-05-22 17:58:34 +00:00
|
|
|
|
2017-05-23 20:02:47 +00:00
|
|
|
if s.eval.AnnotatePlan {
|
|
|
|
s.plan.Annotations = &structs.PlanAnnotations{
|
|
|
|
DesiredTGUpdates: results.desiredTGUpdates,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-05-22 17:58:34 +00:00
|
|
|
// Add the deployment changes to the plan
|
2017-07-04 20:31:01 +00:00
|
|
|
s.plan.Deployment = results.deployment
|
2017-05-22 17:58:34 +00:00
|
|
|
s.plan.DeploymentUpdates = results.deploymentUpdates
|
|
|
|
|
2018-03-02 00:23:44 +00:00
|
|
|
// Store all the follow up evaluations from rescheduled allocations
|
|
|
|
if len(results.desiredFollowupEvals) > 0 {
|
|
|
|
for _, evals := range results.desiredFollowupEvals {
|
|
|
|
s.followUpEvals = append(s.followUpEvals, evals...)
|
|
|
|
}
|
|
|
|
}
|
2018-03-12 20:44:33 +00:00
|
|
|
|
2017-05-23 00:02:20 +00:00
|
|
|
// Update the stored deployment
|
2017-07-04 20:31:01 +00:00
|
|
|
if results.deployment != nil {
|
|
|
|
s.deployment = results.deployment
|
2017-05-23 00:02:20 +00:00
|
|
|
}
|
|
|
|
|
2017-05-22 17:58:34 +00:00
|
|
|
// Handle the stop
|
|
|
|
for _, stop := range results.stop {
|
2019-03-04 09:49:32 +00:00
|
|
|
s.plan.AppendStoppedAlloc(stop.alloc, stop.statusDescription, stop.clientStatus)
|
2017-05-22 17:58:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Handle the in-place updates
|
|
|
|
for _, update := range results.inplaceUpdate {
|
2017-07-06 00:13:45 +00:00
|
|
|
if update.DeploymentID != s.deployment.GetID() {
|
|
|
|
update.DeploymentID = s.deployment.GetID()
|
2017-07-05 19:50:40 +00:00
|
|
|
update.DeploymentStatus = nil
|
|
|
|
}
|
2017-05-22 17:58:34 +00:00
|
|
|
s.ctx.Plan().AppendAlloc(update)
|
|
|
|
}
|
|
|
|
|
2018-03-23 23:55:21 +00:00
|
|
|
// Handle the annotation updates
|
2018-03-26 18:06:21 +00:00
|
|
|
for _, update := range results.attributeUpdates {
|
2018-03-23 23:55:21 +00:00
|
|
|
s.ctx.Plan().AppendAlloc(update)
|
|
|
|
}
|
|
|
|
|
2017-05-23 20:02:47 +00:00
|
|
|
// Nothing remaining to do if placement is not required
|
2017-07-15 23:31:33 +00:00
|
|
|
if len(results.place)+len(results.destructiveUpdate) == 0 {
|
2018-06-13 17:46:39 +00:00
|
|
|
// If the job has been purged we don't have access to the job. Otherwise
|
|
|
|
// set the queued allocs to zero. This is true if the job is being
|
|
|
|
// stopped as well.
|
|
|
|
if s.job != nil {
|
2017-05-23 20:02:47 +00:00
|
|
|
for _, tg := range s.job.TaskGroups {
|
|
|
|
s.queuedAllocs[tg.Name] = 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Record the number of allocations that needs to be placed per Task Group
|
|
|
|
for _, place := range results.place {
|
|
|
|
s.queuedAllocs[place.taskGroup.Name] += 1
|
|
|
|
}
|
2017-07-18 00:18:12 +00:00
|
|
|
for _, destructive := range results.destructiveUpdate {
|
|
|
|
s.queuedAllocs[destructive.placeTaskGroup.Name] += 1
|
|
|
|
}
|
2017-05-23 20:02:47 +00:00
|
|
|
|
2017-05-22 17:58:34 +00:00
|
|
|
// Compute the placements
|
2017-07-20 19:23:46 +00:00
|
|
|
place := make([]placementResult, 0, len(results.place))
|
2017-07-15 23:31:33 +00:00
|
|
|
for _, p := range results.place {
|
|
|
|
place = append(place, p)
|
|
|
|
}
|
2017-07-20 19:23:46 +00:00
|
|
|
|
|
|
|
destructive := make([]placementResult, 0, len(results.destructiveUpdate))
|
2017-07-15 23:31:33 +00:00
|
|
|
for _, p := range results.destructiveUpdate {
|
2017-07-20 19:23:46 +00:00
|
|
|
destructive = append(destructive, p)
|
2017-07-15 23:31:33 +00:00
|
|
|
}
|
2017-07-20 19:23:46 +00:00
|
|
|
return s.computePlacements(destructive, place)
|
2015-08-14 01:16:32 +00:00
|
|
|
}
|
|
|
|
|
2017-07-20 19:31:08 +00:00
|
|
|
// computePlacements computes placements for allocations. It is given the set of
|
|
|
|
// destructive updates to place and the set of new placements to place.
|
2017-07-20 19:23:46 +00:00
|
|
|
func (s *GenericScheduler) computePlacements(destructive, place []placementResult) error {
|
2017-05-22 17:58:34 +00:00
|
|
|
// Get the base nodes
|
|
|
|
nodes, byDC, err := readyNodesInDCs(s.state, s.job.Datacenters)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
var deploymentID string
|
2018-04-05 22:40:49 +00:00
|
|
|
if s.deployment != nil && s.deployment.Active() {
|
2017-05-22 17:58:34 +00:00
|
|
|
deploymentID = s.deployment.ID
|
|
|
|
}
|
|
|
|
|
2017-12-13 17:36:03 +00:00
|
|
|
// Update the set of placement nodes
|
2017-05-22 17:58:34 +00:00
|
|
|
s.stack.SetNodes(nodes)
|
|
|
|
|
2018-03-12 19:32:43 +00:00
|
|
|
// Capture current time to use as the start time for any rescheduled allocations
|
|
|
|
now := time.Now()
|
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Have to handle destructive changes first as we need to discount their
|
|
|
|
// resources. To understand this imagine the resources were reduced and the
|
|
|
|
// count was scaled up.
|
|
|
|
for _, results := range [][]placementResult{destructive, place} {
|
|
|
|
for _, missing := range results {
|
|
|
|
// Get the task group
|
|
|
|
tg := missing.TaskGroup()
|
|
|
|
|
|
|
|
// Check if this task group has already failed
|
|
|
|
if metric, ok := s.failedTGAllocs[tg.Name]; ok {
|
|
|
|
metric.CoalescedFailures += 1
|
|
|
|
continue
|
|
|
|
}
|
2017-07-18 00:18:12 +00:00
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Find the preferred node
|
|
|
|
preferredNode, err := s.findPreferredNode(missing)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-05-22 17:58:34 +00:00
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Check if we should stop the previous allocation upon successful
|
|
|
|
// placement of its replacement. This allow atomic placements/stops. We
|
|
|
|
// stop the allocation before trying to find a replacement because this
|
|
|
|
// frees the resources currently used by the previous allocation.
|
|
|
|
stopPrevAlloc, stopPrevAllocDesc := missing.StopPreviousAlloc()
|
2018-01-14 22:47:21 +00:00
|
|
|
prevAllocation := missing.PreviousAllocation()
|
2017-07-20 19:23:46 +00:00
|
|
|
if stopPrevAlloc {
|
2019-03-04 09:49:32 +00:00
|
|
|
s.plan.AppendStoppedAlloc(prevAllocation, stopPrevAllocDesc, "")
|
2018-01-14 22:47:21 +00:00
|
|
|
}
|
|
|
|
|
2018-01-16 14:01:36 +00:00
|
|
|
// Compute penalty nodes for rescheduled allocs
|
2018-01-19 14:41:53 +00:00
|
|
|
selectOptions := getSelectOptions(prevAllocation, preferredNode)
|
2019-04-11 01:20:22 +00:00
|
|
|
option := s.selectNextOption(tg, selectOptions)
|
2017-05-22 17:58:34 +00:00
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Store the available nodes by datacenter
|
|
|
|
s.ctx.Metrics().NodesAvailable = byDC
|
|
|
|
|
2018-08-08 14:41:56 +00:00
|
|
|
// Compute top K scoring node metadata
|
|
|
|
s.ctx.Metrics().PopulateScoreMetaData()
|
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Set fields based on if we found an allocation option
|
|
|
|
if option != nil {
|
2018-10-02 20:36:04 +00:00
|
|
|
resources := &structs.AllocatedResources{
|
2019-06-18 04:55:43 +00:00
|
|
|
Tasks: option.TaskResources,
|
2019-06-18 17:12:23 +00:00
|
|
|
Shared: structs.AllocatedSharedResources{
|
|
|
|
DiskMB: int64(tg.EphemeralDisk.SizeMB),
|
|
|
|
},
|
2019-06-18 04:55:43 +00:00
|
|
|
}
|
|
|
|
if option.AllocResources != nil {
|
2019-06-18 17:12:23 +00:00
|
|
|
resources.Shared.Networks = option.AllocResources.Networks
|
2018-10-02 20:36:04 +00:00
|
|
|
}
|
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Create an allocation for this
|
|
|
|
alloc := &structs.Allocation{
|
2018-10-02 20:36:04 +00:00
|
|
|
ID: uuid.Generate(),
|
|
|
|
Namespace: s.job.Namespace,
|
|
|
|
EvalID: s.eval.ID,
|
|
|
|
Name: missing.Name(),
|
|
|
|
JobID: s.job.ID,
|
|
|
|
TaskGroup: tg.Name,
|
|
|
|
Metrics: s.ctx.Metrics(),
|
|
|
|
NodeID: option.Node.ID,
|
2018-07-17 10:03:13 +00:00
|
|
|
NodeName: option.Node.Name,
|
2018-10-02 20:36:04 +00:00
|
|
|
DeploymentID: deploymentID,
|
|
|
|
TaskResources: resources.OldTaskResources(),
|
|
|
|
AllocatedResources: resources,
|
|
|
|
DesiredStatus: structs.AllocDesiredStatusRun,
|
|
|
|
ClientStatus: structs.AllocClientStatusPending,
|
2019-09-05 23:37:24 +00:00
|
|
|
// SharedResources is considered deprecated, will be removed in 0.11.
|
|
|
|
// It is only set for compat reasons.
|
2017-07-20 19:23:46 +00:00
|
|
|
SharedResources: &structs.Resources{
|
2019-06-11 04:29:12 +00:00
|
|
|
DiskMB: tg.EphemeralDisk.SizeMB,
|
2019-09-05 23:37:24 +00:00
|
|
|
Networks: resources.Shared.Networks,
|
2017-07-20 19:23:46 +00:00
|
|
|
},
|
2017-07-05 19:50:40 +00:00
|
|
|
}
|
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// If the new allocation is replacing an older allocation then we
|
|
|
|
// set the record the older allocation id so that they are chained
|
2018-01-19 14:41:53 +00:00
|
|
|
if prevAllocation != nil {
|
|
|
|
alloc.PreviousAllocation = prevAllocation.ID
|
2018-01-19 21:20:00 +00:00
|
|
|
if missing.IsRescheduling() {
|
2018-03-08 15:36:01 +00:00
|
|
|
updateRescheduleTracker(alloc, prevAllocation, now)
|
2018-01-14 22:47:21 +00:00
|
|
|
}
|
2017-07-20 19:23:46 +00:00
|
|
|
}
|
2017-07-15 23:31:33 +00:00
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// If we are placing a canary and we found a match, add the canary
|
2018-04-19 20:58:06 +00:00
|
|
|
// to the deployment state object and mark it as a canary.
|
2019-01-25 04:57:07 +00:00
|
|
|
if missing.Canary() && s.deployment != nil {
|
2017-07-20 19:23:46 +00:00
|
|
|
if state, ok := s.deployment.TaskGroups[tg.Name]; ok {
|
|
|
|
state.PlacedCanaries = append(state.PlacedCanaries, alloc.ID)
|
|
|
|
}
|
2018-04-19 20:58:06 +00:00
|
|
|
|
|
|
|
alloc.DeploymentStatus = &structs.AllocDeploymentStatus{
|
|
|
|
Canary: true,
|
|
|
|
}
|
2017-07-20 19:23:46 +00:00
|
|
|
}
|
2017-05-22 17:58:34 +00:00
|
|
|
|
2019-04-11 01:20:22 +00:00
|
|
|
s.handlePreemptions(option, alloc, missing)
|
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
// Track the placement
|
|
|
|
s.plan.AppendAlloc(alloc)
|
2017-07-18 00:18:12 +00:00
|
|
|
|
2017-07-20 19:23:46 +00:00
|
|
|
} else {
|
|
|
|
// Lazy initialize the failed map
|
|
|
|
if s.failedTGAllocs == nil {
|
|
|
|
s.failedTGAllocs = make(map[string]*structs.AllocMetric)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Track the fact that we didn't find a placement
|
|
|
|
s.failedTGAllocs[tg.Name] = s.ctx.Metrics()
|
|
|
|
|
|
|
|
// If we weren't able to find a replacement for the allocation, back
|
|
|
|
// out the fact that we asked to stop the allocation.
|
|
|
|
if stopPrevAlloc {
|
2018-01-14 22:47:21 +00:00
|
|
|
s.plan.PopUpdate(prevAllocation)
|
2017-07-20 19:23:46 +00:00
|
|
|
}
|
2017-07-18 00:18:12 +00:00
|
|
|
}
|
2018-01-19 14:41:53 +00:00
|
|
|
|
2017-05-22 17:58:34 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-01-19 14:41:53 +00:00
|
|
|
// getSelectOptions sets up preferred nodes and penalty nodes
|
|
|
|
func getSelectOptions(prevAllocation *structs.Allocation, preferredNode *structs.Node) *SelectOptions {
|
|
|
|
selectOptions := &SelectOptions{}
|
|
|
|
if prevAllocation != nil {
|
|
|
|
penaltyNodes := make(map[string]struct{})
|
2019-12-03 14:14:49 +00:00
|
|
|
|
|
|
|
// If alloc failed, penalize the node it failed on to encourage
|
|
|
|
// rescheduling on a new node.
|
|
|
|
if prevAllocation.ClientStatus == structs.AllocClientStatusFailed {
|
|
|
|
penaltyNodes[prevAllocation.NodeID] = struct{}{}
|
|
|
|
}
|
2018-01-19 14:41:53 +00:00
|
|
|
if prevAllocation.RescheduleTracker != nil {
|
|
|
|
for _, reschedEvent := range prevAllocation.RescheduleTracker.Events {
|
|
|
|
penaltyNodes[reschedEvent.PrevNodeID] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
selectOptions.PenaltyNodeIDs = penaltyNodes
|
|
|
|
}
|
|
|
|
if preferredNode != nil {
|
|
|
|
selectOptions.PreferredNodes = []*structs.Node{preferredNode}
|
|
|
|
}
|
|
|
|
return selectOptions
|
|
|
|
}
|
|
|
|
|
2018-01-19 21:20:00 +00:00
|
|
|
// updateRescheduleTracker carries over previous restart attempts and adds the most recent restart
|
2018-03-08 15:36:01 +00:00
|
|
|
func updateRescheduleTracker(alloc *structs.Allocation, prev *structs.Allocation, now time.Time) {
|
|
|
|
reschedPolicy := prev.ReschedulePolicy()
|
2018-01-19 14:41:53 +00:00
|
|
|
var rescheduleEvents []*structs.RescheduleEvent
|
|
|
|
if prev.RescheduleTracker != nil {
|
2018-03-02 00:23:44 +00:00
|
|
|
var interval time.Duration
|
|
|
|
if reschedPolicy != nil {
|
|
|
|
interval = reschedPolicy.Interval
|
|
|
|
}
|
2018-03-08 00:44:54 +00:00
|
|
|
// If attempts is set copy all events in the interval range
|
2018-03-02 00:23:44 +00:00
|
|
|
if reschedPolicy.Attempts > 0 {
|
|
|
|
for _, reschedEvent := range prev.RescheduleTracker.Events {
|
2018-03-08 00:44:54 +00:00
|
|
|
timeDiff := now.UnixNano() - reschedEvent.RescheduleTime
|
2018-03-02 00:23:44 +00:00
|
|
|
// Only copy over events that are within restart interval
|
|
|
|
// This keeps the list of events small in cases where there's a long chain of old restart events
|
|
|
|
if interval > 0 && timeDiff <= interval.Nanoseconds() {
|
|
|
|
rescheduleEvents = append(rescheduleEvents, reschedEvent.Copy())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2018-03-08 00:44:54 +00:00
|
|
|
// Only copy the last n if unlimited is set
|
|
|
|
start := 0
|
|
|
|
if len(prev.RescheduleTracker.Events) > maxPastRescheduleEvents {
|
|
|
|
start = len(prev.RescheduleTracker.Events) - maxPastRescheduleEvents
|
|
|
|
}
|
|
|
|
for i := start; i < len(prev.RescheduleTracker.Events); i++ {
|
2018-03-02 00:23:44 +00:00
|
|
|
reschedEvent := prev.RescheduleTracker.Events[i]
|
|
|
|
rescheduleEvents = append(rescheduleEvents, reschedEvent.Copy())
|
|
|
|
}
|
2018-01-19 14:41:53 +00:00
|
|
|
}
|
|
|
|
}
|
2018-03-08 15:36:01 +00:00
|
|
|
nextDelay := prev.NextDelay()
|
2018-03-02 00:23:44 +00:00
|
|
|
rescheduleEvent := structs.NewRescheduleEvent(now.UnixNano(), prev.ID, prev.NodeID, nextDelay)
|
2018-01-19 21:20:00 +00:00
|
|
|
rescheduleEvents = append(rescheduleEvents, rescheduleEvent)
|
2018-01-19 14:41:53 +00:00
|
|
|
alloc.RescheduleTracker = &structs.RescheduleTracker{Events: rescheduleEvents}
|
|
|
|
}
|
|
|
|
|
2017-05-22 17:58:34 +00:00
|
|
|
// findPreferredNode finds the preferred node for an allocation
|
2018-07-05 15:00:03 +00:00
|
|
|
func (s *GenericScheduler) findPreferredNode(place placementResult) (*structs.Node, error) {
|
2017-07-15 23:31:33 +00:00
|
|
|
if prev := place.PreviousAllocation(); prev != nil && place.TaskGroup().EphemeralDisk.Sticky == true {
|
2017-06-06 21:08:46 +00:00
|
|
|
var preferredNode *structs.Node
|
|
|
|
ws := memdb.NewWatchSet()
|
2018-07-11 18:27:10 +00:00
|
|
|
preferredNode, err := s.state.NodeByID(ws, prev.NodeID)
|
2018-07-05 15:00:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-07-02 20:05:38 +00:00
|
|
|
if preferredNode != nil && preferredNode.Ready() {
|
2018-07-05 15:00:03 +00:00
|
|
|
return preferredNode, nil
|
2017-05-22 17:58:34 +00:00
|
|
|
}
|
|
|
|
}
|
2018-07-05 15:00:03 +00:00
|
|
|
return nil, nil
|
2017-05-22 17:58:34 +00:00
|
|
|
}
|