2015-07-27 22:31:09 +00:00
|
|
|
package nomad
|
|
|
|
|
2015-08-04 23:32:46 +00:00
|
|
|
import (
|
|
|
|
"fmt"
|
2016-02-20 21:38:46 +00:00
|
|
|
"runtime"
|
2015-08-04 23:35:49 +00:00
|
|
|
"time"
|
2015-08-04 23:32:46 +00:00
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2017-02-08 04:31:23 +00:00
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
2018-09-15 23:23:13 +00:00
|
|
|
|
|
|
|
"github.com/armon/go-metrics"
|
2016-02-20 21:12:14 +00:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2018-09-21 21:05:00 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2015-08-11 21:27:14 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/state"
|
2015-08-04 23:32:46 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2015-10-11 21:48:18 +00:00
|
|
|
"github.com/hashicorp/raft"
|
2015-08-04 23:32:46 +00:00
|
|
|
)
|
2015-07-27 22:31:09 +00:00
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
// planner is used to mange the submitted allocation plans that are waiting
|
|
|
|
// to be accessed by the leader
|
|
|
|
type planner struct {
|
|
|
|
*Server
|
|
|
|
log log.Logger
|
|
|
|
|
|
|
|
// planQueue is used to manage the submitted allocation
|
|
|
|
// plans that are waiting to be assessed by the leader
|
|
|
|
planQueue *PlanQueue
|
|
|
|
}
|
|
|
|
|
|
|
|
// newPlanner returns a new planner to be used for managing allocation plans.
|
|
|
|
func newPlanner(s *Server) (*planner, error) {
|
|
|
|
// Create a plan queue
|
|
|
|
planQueue, err := NewPlanQueue()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return &planner{
|
|
|
|
Server: s,
|
|
|
|
log: s.logger.Named("planner"),
|
|
|
|
planQueue: planQueue,
|
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2015-07-27 22:31:09 +00:00
|
|
|
// planApply is a long lived goroutine that reads plan allocations from
|
|
|
|
// the plan queue, determines if they can be applied safely and applies
|
|
|
|
// them via Raft.
|
2015-10-11 21:48:18 +00:00
|
|
|
//
|
|
|
|
// Naively, we could simply dequeue a plan, verify, apply and then respond.
|
|
|
|
// However, the plan application is bounded by the Raft apply time and
|
|
|
|
// subject to some latency. This creates a stall condition, where we are
|
2015-10-12 21:35:17 +00:00
|
|
|
// not evaluating, but simply waiting for a transaction to apply.
|
2015-10-11 21:48:18 +00:00
|
|
|
//
|
|
|
|
// To avoid this, we overlap verification with apply. This means once
|
|
|
|
// we've verified plan N we attempt to apply it. However, while waiting
|
|
|
|
// for apply, we begin to verify plan N+1 under the assumption that plan
|
|
|
|
// N has succeeded.
|
|
|
|
//
|
|
|
|
// In this sense, we track two parallel versions of the world. One is
|
|
|
|
// the pessimistic one driven by the Raft log which is replicated. The
|
|
|
|
// other is optimistic and assumes our transactions will succeed. In the
|
|
|
|
// happy path, this lets us do productive work during the latency of
|
|
|
|
// apply.
|
|
|
|
//
|
|
|
|
// In the unhappy path (Raft transaction fails), effectively we only
|
|
|
|
// wasted work during a time we would have been waiting anyways. However,
|
|
|
|
// in anticipation of this case we cannot respond to the plan until
|
|
|
|
// the Raft log is updated. This means our schedulers will stall,
|
|
|
|
// but there are many of those and only a single plan verifier.
|
|
|
|
//
|
2018-09-15 23:23:13 +00:00
|
|
|
func (p *planner) planApply() {
|
2015-10-12 21:35:17 +00:00
|
|
|
// waitCh is used to track an outstanding application while snap
|
|
|
|
// holds an optimistic state which includes that plan application.
|
2015-10-11 22:34:52 +00:00
|
|
|
var waitCh chan struct{}
|
|
|
|
var snap *state.StateSnapshot
|
2016-02-20 21:38:46 +00:00
|
|
|
|
|
|
|
// Setup a worker pool with half the cores, with at least 1
|
|
|
|
poolSize := runtime.NumCPU() / 2
|
|
|
|
if poolSize == 0 {
|
|
|
|
poolSize = 1
|
|
|
|
}
|
|
|
|
pool := NewEvaluatePool(poolSize, workerPoolBufferSize)
|
2016-02-20 21:12:14 +00:00
|
|
|
defer pool.Shutdown()
|
2015-10-11 22:34:52 +00:00
|
|
|
|
2015-07-27 22:31:09 +00:00
|
|
|
for {
|
|
|
|
// Pull the next pending plan, exit if we are no longer leader
|
2018-09-15 23:23:13 +00:00
|
|
|
pending, err := p.planQueue.Dequeue(0)
|
2015-07-27 22:31:09 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
2015-08-12 22:44:36 +00:00
|
|
|
}
|
|
|
|
|
2015-10-11 22:34:52 +00:00
|
|
|
// Check if out last plan has completed
|
|
|
|
select {
|
|
|
|
case <-waitCh:
|
|
|
|
waitCh = nil
|
|
|
|
snap = nil
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
2015-08-05 01:30:05 +00:00
|
|
|
// Snapshot the state so that we have a consistent view of the world
|
2015-10-11 22:34:52 +00:00
|
|
|
// if no snapshot is available
|
2015-10-11 22:38:07 +00:00
|
|
|
if waitCh == nil || snap == nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
snap, err = p.fsm.State().Snapshot()
|
2015-10-11 22:34:52 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to snapshot state", "error", err)
|
2015-10-11 22:34:52 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
|
|
|
}
|
2015-08-05 01:30:05 +00:00
|
|
|
}
|
|
|
|
|
2015-08-04 23:32:46 +00:00
|
|
|
// Evaluate the plan
|
2018-09-15 23:23:13 +00:00
|
|
|
result, err := evaluatePlan(pool, snap, pending.plan, p.logger)
|
2015-08-04 23:32:46 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to evaluate plan", "error", err)
|
2015-08-04 23:32:46 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
|
|
|
}
|
2015-07-27 22:31:09 +00:00
|
|
|
|
2015-10-11 21:57:36 +00:00
|
|
|
// Fast-path the response if there is nothing to do
|
|
|
|
if result.IsNoOp() {
|
|
|
|
pending.respond(result, nil)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-10-12 21:35:17 +00:00
|
|
|
// Ensure any parallel apply is complete before starting the next one.
|
|
|
|
// This also limits how out of date our snapshot can be.
|
2015-10-11 22:34:52 +00:00
|
|
|
if waitCh != nil {
|
|
|
|
<-waitCh
|
2018-09-15 23:23:13 +00:00
|
|
|
snap, err = p.fsm.State().Snapshot()
|
2015-10-11 22:34:52 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to snapshot state", "error", err)
|
2015-10-11 22:34:52 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-11 21:57:36 +00:00
|
|
|
// Dispatch the Raft transaction for the plan
|
2018-09-15 23:23:13 +00:00
|
|
|
future, err := p.applyPlan(pending.plan, result, snap)
|
2015-10-11 21:57:36 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to submit plan", "error", err)
|
2015-10-11 21:57:36 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
2015-07-27 22:31:09 +00:00
|
|
|
}
|
|
|
|
|
2015-10-11 21:57:36 +00:00
|
|
|
// Respond to the plan in async
|
2015-10-11 22:34:52 +00:00
|
|
|
waitCh = make(chan struct{})
|
2018-09-15 23:23:13 +00:00
|
|
|
go p.asyncPlanWait(waitCh, future, result, pending)
|
2015-07-27 22:31:09 +00:00
|
|
|
}
|
|
|
|
}
|
2015-08-04 23:32:46 +00:00
|
|
|
|
2015-08-05 01:30:05 +00:00
|
|
|
// applyPlan is used to apply the plan result and to return the alloc index
|
2018-09-15 23:23:13 +00:00
|
|
|
func (p *planner) applyPlan(plan *structs.Plan, result *structs.PlanResult, snap *state.StateSnapshot) (raft.ApplyFuture, error) {
|
2018-03-11 18:26:53 +00:00
|
|
|
// Determine the minimum number of updates, could be more if there
|
2016-02-21 21:32:45 +00:00
|
|
|
// are multiple updates per node
|
|
|
|
minUpdates := len(result.NodeUpdate)
|
|
|
|
minUpdates += len(result.NodeAllocation)
|
|
|
|
|
|
|
|
// Setup the update request
|
2017-05-05 20:52:01 +00:00
|
|
|
req := structs.ApplyPlanResultsRequest{
|
|
|
|
AllocUpdateRequest: structs.AllocUpdateRequest{
|
2017-05-18 19:36:04 +00:00
|
|
|
Job: plan.Job,
|
2017-05-05 20:52:01 +00:00
|
|
|
Alloc: make([]*structs.Allocation, 0, minUpdates),
|
|
|
|
},
|
2017-07-06 04:26:04 +00:00
|
|
|
Deployment: result.Deployment,
|
|
|
|
DeploymentUpdates: result.DeploymentUpdates,
|
2017-12-18 16:03:55 +00:00
|
|
|
EvalID: plan.EvalID,
|
2018-09-21 21:05:00 +00:00
|
|
|
NodePreemptions: make([]*structs.Allocation, 0, len(result.NodePreemptions)),
|
2016-02-21 19:42:54 +00:00
|
|
|
}
|
2015-08-26 00:36:52 +00:00
|
|
|
for _, updateList := range result.NodeUpdate {
|
|
|
|
req.Alloc = append(req.Alloc, updateList...)
|
2015-08-05 01:30:05 +00:00
|
|
|
}
|
|
|
|
for _, allocList := range result.NodeAllocation {
|
|
|
|
req.Alloc = append(req.Alloc, allocList...)
|
|
|
|
}
|
|
|
|
|
2018-09-21 21:05:00 +00:00
|
|
|
for _, preemptions := range result.NodePreemptions {
|
|
|
|
req.NodePreemptions = append(req.NodePreemptions, preemptions...)
|
|
|
|
}
|
|
|
|
|
2016-02-09 05:58:05 +00:00
|
|
|
// Set the time the alloc was applied for the first time. This can be used
|
|
|
|
// to approximate the scheduling time.
|
|
|
|
now := time.Now().UTC().UnixNano()
|
|
|
|
for _, alloc := range req.Alloc {
|
|
|
|
if alloc.CreateTime == 0 {
|
|
|
|
alloc.CreateTime = now
|
|
|
|
}
|
2017-10-26 13:52:57 +00:00
|
|
|
alloc.ModifyTime = now
|
2016-02-09 05:58:05 +00:00
|
|
|
}
|
|
|
|
|
2018-11-02 01:06:32 +00:00
|
|
|
// Set modify time for preempted allocs if any
|
2018-09-21 21:05:00 +00:00
|
|
|
// Also gather jobids to create follow up evals
|
|
|
|
preemptedJobIDs := make(map[structs.NamespacedID]struct{})
|
|
|
|
for _, alloc := range req.NodePreemptions {
|
|
|
|
alloc.ModifyTime = now
|
|
|
|
id := structs.NamespacedID{Namespace: alloc.Namespace, ID: alloc.JobID}
|
|
|
|
_, ok := preemptedJobIDs[id]
|
|
|
|
if !ok {
|
|
|
|
preemptedJobIDs[id] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var evals []*structs.Evaluation
|
2018-09-27 20:10:15 +00:00
|
|
|
for preemptedJobID := range preemptedJobIDs {
|
2018-09-24 01:09:14 +00:00
|
|
|
job, _ := p.State().JobByID(nil, preemptedJobID.Namespace, preemptedJobID.ID)
|
2018-09-21 21:05:00 +00:00
|
|
|
if job != nil {
|
|
|
|
eval := &structs.Evaluation{
|
|
|
|
ID: uuid.Generate(),
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
TriggeredBy: structs.EvalTriggerPreemption,
|
|
|
|
JobID: job.ID,
|
|
|
|
Type: job.Type,
|
|
|
|
Priority: job.Priority,
|
|
|
|
Status: structs.EvalStatusPending,
|
|
|
|
}
|
|
|
|
evals = append(evals, eval)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
req.PreemptionEvals = evals
|
|
|
|
|
2015-10-11 22:19:01 +00:00
|
|
|
// Dispatch the Raft transaction
|
2018-09-15 23:23:13 +00:00
|
|
|
future, err := p.raftApplyFuture(structs.ApplyPlanResultsRequestType, &req)
|
2015-10-11 22:19:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Optimistically apply to our state view
|
|
|
|
if snap != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
nextIdx := p.raft.AppliedIndex() + 1
|
2017-05-05 20:52:01 +00:00
|
|
|
if err := snap.UpsertPlanResults(nextIdx, &req); err != nil {
|
2015-10-11 22:19:01 +00:00
|
|
|
return future, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return future, nil
|
2015-10-11 21:48:18 +00:00
|
|
|
}
|
|
|
|
|
2015-10-11 21:57:36 +00:00
|
|
|
// asyncPlanWait is used to apply and respond to a plan async
|
2018-09-15 23:23:13 +00:00
|
|
|
func (p *planner) asyncPlanWait(waitCh chan struct{}, future raft.ApplyFuture,
|
2015-10-11 21:57:36 +00:00
|
|
|
result *structs.PlanResult, pending *pendingPlan) {
|
2015-10-11 21:48:18 +00:00
|
|
|
defer metrics.MeasureSince([]string{"nomad", "plan", "apply"}, time.Now())
|
2015-10-11 21:57:36 +00:00
|
|
|
defer close(waitCh)
|
|
|
|
|
|
|
|
// Wait for the plan to apply
|
2015-10-11 21:48:18 +00:00
|
|
|
if err := future.Error(); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to apply plan", "error", err)
|
2015-10-11 21:57:36 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
return
|
2015-10-11 21:48:18 +00:00
|
|
|
}
|
2015-10-11 21:57:36 +00:00
|
|
|
|
|
|
|
// Respond to the plan
|
|
|
|
result.AllocIndex = future.Index()
|
2016-02-22 19:43:41 +00:00
|
|
|
|
|
|
|
// If this is a partial plan application, we need to ensure the scheduler
|
|
|
|
// at least has visibility into any placements it made to avoid double placement.
|
|
|
|
// The RefreshIndex computed by evaluatePlan may be stale due to evaluation
|
|
|
|
// against an optimistic copy of the state.
|
|
|
|
if result.RefreshIndex != 0 {
|
|
|
|
result.RefreshIndex = maxUint64(result.RefreshIndex, result.AllocIndex)
|
|
|
|
}
|
2015-10-11 21:57:36 +00:00
|
|
|
pending.respond(result, nil)
|
2015-08-05 01:30:05 +00:00
|
|
|
}
|
|
|
|
|
2015-08-04 23:32:46 +00:00
|
|
|
// evaluatePlan is used to determine what portions of a plan
|
|
|
|
// can be applied if any. Returns if there should be a plan application
|
|
|
|
// which may be partial or if there was an error
|
2018-09-15 23:23:13 +00:00
|
|
|
func evaluatePlan(pool *EvaluatePool, snap *state.StateSnapshot, plan *structs.Plan, logger log.Logger) (*structs.PlanResult, error) {
|
2015-08-04 23:35:49 +00:00
|
|
|
defer metrics.MeasureSince([]string{"nomad", "plan", "evaluate"}, time.Now())
|
2015-08-05 01:10:57 +00:00
|
|
|
|
2017-10-13 21:36:02 +00:00
|
|
|
// Check if the plan exceeds quota
|
|
|
|
overQuota, err := evaluatePlanQuota(snap, plan)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reject the plan and force the scheduler to refresh
|
|
|
|
if overQuota {
|
|
|
|
index, err := refreshIndex(snap)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
logger.Debug("plan for evaluation exceeds quota limit. Forcing state refresh", "eval_id", plan.EvalID, "refresh_index", index)
|
2017-10-13 21:36:02 +00:00
|
|
|
return &structs.PlanResult{RefreshIndex: index}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return evaluatePlanPlacements(pool, snap, plan, logger)
|
|
|
|
}
|
|
|
|
|
|
|
|
// evaluatePlanPlacements is used to determine what portions of a plan can be
|
|
|
|
// applied if any, looking for node over commitment. Returns if there should be
|
|
|
|
// a plan application which may be partial or if there was an error
|
2018-09-15 23:23:13 +00:00
|
|
|
func evaluatePlanPlacements(pool *EvaluatePool, snap *state.StateSnapshot, plan *structs.Plan, logger log.Logger) (*structs.PlanResult, error) {
|
2015-08-04 23:32:46 +00:00
|
|
|
// Create a result holder for the plan
|
|
|
|
result := &structs.PlanResult{
|
2017-07-06 04:26:04 +00:00
|
|
|
NodeUpdate: make(map[string][]*structs.Allocation),
|
|
|
|
NodeAllocation: make(map[string][]*structs.Allocation),
|
|
|
|
Deployment: plan.Deployment.Copy(),
|
|
|
|
DeploymentUpdates: plan.DeploymentUpdates,
|
2018-09-21 21:05:00 +00:00
|
|
|
NodePreemptions: make(map[string][]*structs.Allocation),
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
2015-08-26 00:36:52 +00:00
|
|
|
// Collect all the nodeIDs
|
|
|
|
nodeIDs := make(map[string]struct{})
|
2016-02-23 06:31:25 +00:00
|
|
|
nodeIDList := make([]string, 0, len(plan.NodeUpdate)+len(plan.NodeAllocation))
|
2015-08-26 00:36:52 +00:00
|
|
|
for nodeID := range plan.NodeUpdate {
|
2016-02-23 06:31:25 +00:00
|
|
|
if _, ok := nodeIDs[nodeID]; !ok {
|
|
|
|
nodeIDs[nodeID] = struct{}{}
|
|
|
|
nodeIDList = append(nodeIDList, nodeID)
|
|
|
|
}
|
2015-08-26 00:36:52 +00:00
|
|
|
}
|
2015-08-05 01:10:57 +00:00
|
|
|
for nodeID := range plan.NodeAllocation {
|
2016-02-23 06:31:25 +00:00
|
|
|
if _, ok := nodeIDs[nodeID]; !ok {
|
|
|
|
nodeIDs[nodeID] = struct{}{}
|
|
|
|
nodeIDList = append(nodeIDList, nodeID)
|
|
|
|
}
|
2015-08-26 00:36:52 +00:00
|
|
|
}
|
|
|
|
|
2016-02-20 21:12:14 +00:00
|
|
|
// Setup a multierror to handle potentially getting many
|
|
|
|
// errors since we are processing in parallel.
|
|
|
|
var mErr multierror.Error
|
2016-02-22 19:43:41 +00:00
|
|
|
partialCommit := false
|
2016-02-20 21:12:14 +00:00
|
|
|
|
|
|
|
// handleResult is used to process the result of evaluateNodePlan
|
2017-07-14 00:14:02 +00:00
|
|
|
handleResult := func(nodeID string, fit bool, reason string, err error) (cancel bool) {
|
2015-08-05 01:10:57 +00:00
|
|
|
// Evaluate the plan for this node
|
2015-08-04 23:32:46 +00:00
|
|
|
if err != nil {
|
2016-02-20 21:12:14 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
return true
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
2015-08-05 01:10:57 +00:00
|
|
|
if !fit {
|
2017-07-14 00:14:02 +00:00
|
|
|
// Log the reason why the node's allocations could not be made
|
|
|
|
if reason != "" {
|
2018-09-15 23:23:13 +00:00
|
|
|
logger.Debug("plan for node rejected", "node_id", nodeID, "reason", reason)
|
2017-07-14 00:14:02 +00:00
|
|
|
}
|
2016-02-22 19:43:41 +00:00
|
|
|
// Set that this is a partial commit
|
|
|
|
partialCommit = true
|
2015-08-04 23:32:46 +00:00
|
|
|
|
|
|
|
// If we require all-at-once scheduling, there is no point
|
|
|
|
// to continue the evaluation, as we've already failed.
|
|
|
|
if plan.AllAtOnce {
|
2015-08-26 00:36:52 +00:00
|
|
|
result.NodeUpdate = nil
|
2015-08-05 01:30:05 +00:00
|
|
|
result.NodeAllocation = nil
|
2017-07-06 04:26:04 +00:00
|
|
|
result.DeploymentUpdates = nil
|
|
|
|
result.Deployment = nil
|
2018-09-21 21:05:00 +00:00
|
|
|
result.NodePreemptions = nil
|
2016-02-20 21:12:14 +00:00
|
|
|
return true
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Skip this node, since it cannot be used.
|
2016-02-20 21:12:14 +00:00
|
|
|
return
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add this to the plan result
|
2015-08-26 00:36:52 +00:00
|
|
|
if nodeUpdate := plan.NodeUpdate[nodeID]; len(nodeUpdate) > 0 {
|
|
|
|
result.NodeUpdate[nodeID] = nodeUpdate
|
2015-08-07 16:37:45 +00:00
|
|
|
}
|
|
|
|
if nodeAlloc := plan.NodeAllocation[nodeID]; len(nodeAlloc) > 0 {
|
|
|
|
result.NodeAllocation[nodeID] = nodeAlloc
|
|
|
|
}
|
2018-09-21 21:05:00 +00:00
|
|
|
|
|
|
|
if nodePreemptions := plan.NodePreemptions[nodeID]; nodePreemptions != nil {
|
2018-11-02 01:06:32 +00:00
|
|
|
|
2018-09-21 21:05:00 +00:00
|
|
|
// Do a pass over preempted allocs in the plan to check
|
|
|
|
// whether the alloc is already in a terminal state
|
2018-11-02 01:06:32 +00:00
|
|
|
var filteredNodePreemptions []*structs.Allocation
|
2018-09-21 21:05:00 +00:00
|
|
|
for _, preemptedAlloc := range nodePreemptions {
|
|
|
|
alloc, err := snap.AllocByID(nil, preemptedAlloc.ID)
|
|
|
|
if err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
2018-10-18 04:06:53 +00:00
|
|
|
continue
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
2018-10-18 04:06:53 +00:00
|
|
|
if alloc != nil && !alloc.TerminalStatus() {
|
|
|
|
filteredNodePreemptions = append(filteredNodePreemptions, preemptedAlloc)
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
|
|
|
}
|
2018-10-18 04:06:53 +00:00
|
|
|
|
2018-09-21 21:05:00 +00:00
|
|
|
result.NodePreemptions[nodeID] = filteredNodePreemptions
|
|
|
|
}
|
|
|
|
|
2016-02-20 21:12:14 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the pool channels
|
|
|
|
req := pool.RequestCh()
|
|
|
|
resp := pool.ResultCh()
|
|
|
|
outstanding := 0
|
|
|
|
didCancel := false
|
|
|
|
|
2018-03-11 18:01:29 +00:00
|
|
|
// Evaluate each node in the plan, handling results as they are ready to
|
2016-02-23 06:31:25 +00:00
|
|
|
// avoid blocking.
|
2017-04-10 21:56:21 +00:00
|
|
|
OUTER:
|
2016-02-23 06:31:25 +00:00
|
|
|
for len(nodeIDList) > 0 {
|
|
|
|
nodeID := nodeIDList[0]
|
2016-02-20 21:12:14 +00:00
|
|
|
select {
|
|
|
|
case req <- evaluateRequest{snap, plan, nodeID}:
|
|
|
|
outstanding++
|
2016-02-23 06:31:25 +00:00
|
|
|
nodeIDList = nodeIDList[1:]
|
2016-02-20 21:12:14 +00:00
|
|
|
case r := <-resp:
|
|
|
|
outstanding--
|
2016-02-20 21:41:49 +00:00
|
|
|
|
|
|
|
// Handle a result that allows us to cancel evaluation,
|
|
|
|
// which may save time processing additional entries.
|
2017-07-14 00:14:02 +00:00
|
|
|
if cancel := handleResult(r.nodeID, r.fit, r.reason, r.err); cancel {
|
2016-02-20 21:12:14 +00:00
|
|
|
didCancel = true
|
2017-04-10 21:56:21 +00:00
|
|
|
break OUTER
|
2016-02-20 21:12:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Drain the remaining results
|
|
|
|
for outstanding > 0 {
|
|
|
|
r := <-resp
|
|
|
|
if !didCancel {
|
2017-07-14 00:14:02 +00:00
|
|
|
if cancel := handleResult(r.nodeID, r.fit, r.reason, r.err); cancel {
|
2016-02-20 21:12:14 +00:00
|
|
|
didCancel = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
outstanding--
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
2016-02-22 19:43:41 +00:00
|
|
|
|
|
|
|
// If the plan resulted in a partial commit, we need to determine
|
|
|
|
// a minimum refresh index to force the scheduler to work on a more
|
|
|
|
// up-to-date state to avoid the failures.
|
|
|
|
if partialCommit {
|
2017-10-13 21:36:02 +00:00
|
|
|
index, err := refreshIndex(snap)
|
2016-02-22 19:43:41 +00:00
|
|
|
if err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2017-10-13 21:36:02 +00:00
|
|
|
result.RefreshIndex = index
|
2016-02-22 21:03:40 +00:00
|
|
|
|
|
|
|
if result.RefreshIndex == 0 {
|
2017-10-13 21:36:02 +00:00
|
|
|
err := fmt.Errorf("partialCommit with RefreshIndex of 0")
|
2016-02-22 21:03:40 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2017-07-06 04:26:04 +00:00
|
|
|
|
|
|
|
// If there was a partial commit and we are operating within a
|
|
|
|
// deployment correct for any canary that may have been desired to be
|
|
|
|
// placed but wasn't actually placed
|
|
|
|
correctDeploymentCanaries(result)
|
2016-02-22 19:43:41 +00:00
|
|
|
}
|
2016-02-20 21:12:14 +00:00
|
|
|
return result, mErr.ErrorOrNil()
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
2017-07-06 04:26:04 +00:00
|
|
|
// correctDeploymentCanaries ensures that the deployment object doesn't list any
|
|
|
|
// canaries as placed if they didn't actually get placed. This could happen if
|
|
|
|
// the plan had a partial commit.
|
|
|
|
func correctDeploymentCanaries(result *structs.PlanResult) {
|
|
|
|
// Hot path
|
|
|
|
if result.Deployment == nil || !result.Deployment.HasPlacedCanaries() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build a set of all the allocations IDs that were placed
|
|
|
|
placedAllocs := make(map[string]struct{}, len(result.NodeAllocation))
|
|
|
|
for _, placed := range result.NodeAllocation {
|
|
|
|
for _, alloc := range placed {
|
|
|
|
placedAllocs[alloc.ID] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Go through all the canaries and ensure that the result list only contains
|
|
|
|
// those that have been placed
|
|
|
|
for _, group := range result.Deployment.TaskGroups {
|
|
|
|
canaries := group.PlacedCanaries
|
|
|
|
if len(canaries) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prune the canaries in place to avoid allocating an extra slice
|
|
|
|
i := 0
|
|
|
|
for _, canaryID := range canaries {
|
|
|
|
if _, ok := placedAllocs[canaryID]; ok {
|
|
|
|
canaries[i] = canaryID
|
|
|
|
i++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
group.PlacedCanaries = canaries[:i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-16 14:55:35 +00:00
|
|
|
// evaluateNodePlan is used to evaluate the plan for a single node,
|
2015-08-05 01:10:57 +00:00
|
|
|
// returning if the plan is valid or if an error is encountered
|
2017-07-14 00:14:02 +00:00
|
|
|
func evaluateNodePlan(snap *state.StateSnapshot, plan *structs.Plan, nodeID string) (bool, string, error) {
|
2015-08-07 16:37:45 +00:00
|
|
|
// If this is an evict-only plan, it always 'fits' since we are removing things.
|
|
|
|
if len(plan.NodeAllocation[nodeID]) == 0 {
|
2017-07-14 00:14:02 +00:00
|
|
|
return true, "", nil
|
2015-08-07 16:37:45 +00:00
|
|
|
}
|
|
|
|
|
2015-08-05 01:10:57 +00:00
|
|
|
// Get the node itself
|
2017-02-08 04:31:23 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
node, err := snap.NodeByID(ws, nodeID)
|
2015-08-05 01:10:57 +00:00
|
|
|
if err != nil {
|
2017-07-14 00:14:02 +00:00
|
|
|
return false, "", fmt.Errorf("failed to get node '%s': %v", nodeID, err)
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
|
|
|
|
2018-03-11 18:53:11 +00:00
|
|
|
// If the node does not exist or is not ready for scheduling it is not fit
|
2015-08-16 01:03:05 +00:00
|
|
|
// XXX: There is a potential race between when we do this check and when
|
|
|
|
// the Raft commit happens.
|
2017-07-14 00:14:02 +00:00
|
|
|
if node == nil {
|
|
|
|
return false, "node does not exist", nil
|
|
|
|
} else if node.Status != structs.NodeStatusReady {
|
|
|
|
return false, "node is not ready for placements", nil
|
2018-01-24 00:47:00 +00:00
|
|
|
} else if node.SchedulingEligibility == structs.NodeSchedulingIneligible {
|
|
|
|
return false, "node is not eligible for draining", nil
|
2017-07-14 00:14:02 +00:00
|
|
|
} else if node.Drain {
|
2018-01-24 00:47:00 +00:00
|
|
|
// Deprecate in favor of scheduling eligibility and remove post-0.8
|
2017-07-14 00:14:02 +00:00
|
|
|
return false, "node is draining", nil
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
|
|
|
|
2016-02-20 19:26:38 +00:00
|
|
|
// Get the existing allocations that are non-terminal
|
2017-02-08 04:31:23 +00:00
|
|
|
existingAlloc, err := snap.AllocsByNodeTerminal(ws, nodeID, false)
|
2015-08-05 01:10:57 +00:00
|
|
|
if err != nil {
|
2017-07-14 00:14:02 +00:00
|
|
|
return false, "", fmt.Errorf("failed to get existing allocations for '%s': %v", nodeID, err)
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Determine the proposed allocation by first removing allocations
|
|
|
|
// that are planned evictions and adding the new allocations.
|
2015-08-26 00:36:52 +00:00
|
|
|
var remove []*structs.Allocation
|
|
|
|
if update := plan.NodeUpdate[nodeID]; len(update) > 0 {
|
|
|
|
remove = append(remove, update...)
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
2018-09-21 21:05:00 +00:00
|
|
|
|
|
|
|
// Remove any preempted allocs
|
|
|
|
if preempted := plan.NodePreemptions[nodeID]; len(preempted) > 0 {
|
|
|
|
for _, allocs := range preempted {
|
|
|
|
remove = append(remove, allocs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-23 02:37:21 +00:00
|
|
|
if updated := plan.NodeAllocation[nodeID]; len(updated) > 0 {
|
|
|
|
for _, alloc := range updated {
|
2015-08-26 00:36:52 +00:00
|
|
|
remove = append(remove, alloc)
|
2015-08-23 02:37:21 +00:00
|
|
|
}
|
|
|
|
}
|
2017-09-26 22:26:33 +00:00
|
|
|
proposed := structs.RemoveAllocs(existingAlloc, remove)
|
2015-08-05 01:10:57 +00:00
|
|
|
proposed = append(proposed, plan.NodeAllocation[nodeID]...)
|
|
|
|
|
|
|
|
// Check if these allocations fit
|
2017-07-14 00:14:02 +00:00
|
|
|
fit, reason, _, err := structs.AllocsFit(node, proposed, nil)
|
|
|
|
return fit, reason, err
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|