2015-10-14 23:43:06 +00:00
|
|
|
package scheduler
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2019-03-08 12:48:12 +00:00
|
|
|
"github.com/hashicorp/go-memdb"
|
2017-09-29 16:58:48 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2015-10-14 23:43:06 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
// maxSystemScheduleAttempts is used to limit the number of times
|
|
|
|
// we will attempt to schedule if we continue to hit conflicts for system
|
|
|
|
// jobs.
|
2015-10-16 18:36:26 +00:00
|
|
|
maxSystemScheduleAttempts = 5
|
2020-10-09 21:31:38 +00:00
|
|
|
|
|
|
|
// maxSysBatchScheduleAttempts is used to limit the number of times we will
|
|
|
|
// attempt to schedule if we continue to hit conflicts for sysbatch jobs.
|
|
|
|
maxSysBatchScheduleAttempts = 2
|
2015-10-14 23:43:06 +00:00
|
|
|
)
|
|
|
|
|
2020-10-09 21:31:38 +00:00
|
|
|
// SystemScheduler is used for 'system' and 'sysbatch' jobs. This scheduler is
|
|
|
|
// designed for jobs that should be run on every client. The 'system' mode
|
|
|
|
// will ensure those jobs continuously run regardless of successful task exits,
|
|
|
|
// whereas 'sysbatch' considers the task complete on success.
|
2015-10-14 23:43:06 +00:00
|
|
|
type SystemScheduler struct {
|
2020-10-09 21:31:38 +00:00
|
|
|
logger log.Logger
|
|
|
|
state State
|
|
|
|
planner Planner
|
|
|
|
sysbatch bool
|
2015-10-14 23:43:06 +00:00
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
eval *structs.Evaluation
|
|
|
|
job *structs.Job
|
|
|
|
plan *structs.Plan
|
|
|
|
planResult *structs.PlanResult
|
|
|
|
ctx *EvalContext
|
|
|
|
stack *SystemStack
|
2020-10-09 21:31:38 +00:00
|
|
|
|
|
|
|
nodes []*structs.Node
|
|
|
|
nodesByDC map[string]int
|
2015-10-14 23:43:06 +00:00
|
|
|
|
|
|
|
limitReached bool
|
|
|
|
nextEval *structs.Evaluation
|
2016-06-15 19:58:19 +00:00
|
|
|
|
|
|
|
failedTGAllocs map[string]*structs.AllocMetric
|
2016-07-18 22:04:05 +00:00
|
|
|
queuedAllocs map[string]int
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewSystemScheduler is a factory function to instantiate a new system
|
|
|
|
// scheduler.
|
2019-03-08 12:48:12 +00:00
|
|
|
func NewSystemScheduler(logger log.Logger, state State, planner Planner) Scheduler {
|
2015-10-14 23:43:06 +00:00
|
|
|
return &SystemScheduler{
|
2020-10-09 21:31:38 +00:00
|
|
|
logger: logger.Named("system_sched"),
|
|
|
|
state: state,
|
|
|
|
planner: planner,
|
|
|
|
sysbatch: false,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func NewSysBatchScheduler(logger log.Logger, state State, planner Planner) Scheduler {
|
|
|
|
return &SystemScheduler{
|
|
|
|
logger: logger.Named("sysbatch_sched"),
|
|
|
|
state: state,
|
|
|
|
planner: planner,
|
|
|
|
sysbatch: true,
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Process is used to handle a single evaluation.
|
|
|
|
func (s *SystemScheduler) Process(eval *structs.Evaluation) error {
|
2020-10-09 21:31:38 +00:00
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// Store the evaluation
|
|
|
|
s.eval = eval
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
// Update our logger with the eval's information
|
|
|
|
s.logger = s.logger.With("eval_id", eval.ID, "job_id", eval.JobID, "namespace", eval.Namespace)
|
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// Verify the evaluation trigger reason is understood
|
2020-10-09 21:31:38 +00:00
|
|
|
if !s.canHandle(eval.TriggeredBy) {
|
|
|
|
desc := fmt.Sprintf("scheduler cannot handle '%s' evaluation reason", eval.TriggeredBy)
|
2016-07-18 22:04:05 +00:00
|
|
|
return setStatus(s.logger, s.planner, s.eval, s.nextEval, nil, s.failedTGAllocs, structs.EvalStatusFailed, desc,
|
2017-07-06 00:13:45 +00:00
|
|
|
s.queuedAllocs, "")
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
2020-10-09 21:31:38 +00:00
|
|
|
limit := maxSystemScheduleAttempts
|
|
|
|
if s.sysbatch {
|
|
|
|
limit = maxSysBatchScheduleAttempts
|
|
|
|
}
|
|
|
|
|
2016-02-10 05:24:47 +00:00
|
|
|
// Retry up to the maxSystemScheduleAttempts and reset if progress is made.
|
|
|
|
progress := func() bool { return progressMade(s.planResult) }
|
2020-10-09 21:31:38 +00:00
|
|
|
if err := retryMax(limit, s.process, progress); err != nil {
|
2015-10-14 23:43:06 +00:00
|
|
|
if statusErr, ok := err.(*SetStatusError); ok {
|
2016-07-18 22:04:05 +00:00
|
|
|
return setStatus(s.logger, s.planner, s.eval, s.nextEval, nil, s.failedTGAllocs, statusErr.EvalStatus, err.Error(),
|
2017-07-06 00:13:45 +00:00
|
|
|
s.queuedAllocs, "")
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the status to complete
|
2016-07-18 22:04:05 +00:00
|
|
|
return setStatus(s.logger, s.planner, s.eval, s.nextEval, nil, s.failedTGAllocs, structs.EvalStatusComplete, "",
|
2017-07-06 00:13:45 +00:00
|
|
|
s.queuedAllocs, "")
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// process is wrapped in retryMax to iteratively run the handler until we have no
|
|
|
|
// further work or we've made the maximum number of attempts.
|
|
|
|
func (s *SystemScheduler) process() (bool, error) {
|
|
|
|
// Lookup the Job by ID
|
|
|
|
var err error
|
2017-02-08 04:31:23 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
s.job, err = s.state.JobByID(ws, s.eval.Namespace, s.eval.JobID)
|
2015-10-14 23:43:06 +00:00
|
|
|
if err != nil {
|
2020-10-09 21:31:38 +00:00
|
|
|
return false, fmt.Errorf("failed to get job '%s': %v", s.eval.JobID, err)
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
2020-10-09 21:31:38 +00:00
|
|
|
|
2016-07-26 05:11:11 +00:00
|
|
|
numTaskGroups := 0
|
2017-04-19 17:54:03 +00:00
|
|
|
if !s.job.Stopped() {
|
2016-07-26 05:11:11 +00:00
|
|
|
numTaskGroups = len(s.job.TaskGroups)
|
|
|
|
}
|
|
|
|
s.queuedAllocs = make(map[string]int, numTaskGroups)
|
2015-10-14 23:43:06 +00:00
|
|
|
|
|
|
|
// Get the ready nodes in the required datacenters
|
2017-04-19 17:54:03 +00:00
|
|
|
if !s.job.Stopped() {
|
2016-01-04 22:23:06 +00:00
|
|
|
s.nodes, s.nodesByDC, err = readyNodesInDCs(s.state, s.job.Datacenters)
|
2015-10-14 23:43:06 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, fmt.Errorf("failed to get ready nodes: %v", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a plan
|
2019-03-08 12:48:12 +00:00
|
|
|
s.plan = s.eval.MakePlan(s.job)
|
2015-10-14 23:43:06 +00:00
|
|
|
|
2016-05-19 01:11:40 +00:00
|
|
|
// Reset the failed allocations
|
2016-06-15 19:58:19 +00:00
|
|
|
s.failedTGAllocs = nil
|
2016-05-19 01:11:40 +00:00
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// Create an evaluation context
|
|
|
|
s.ctx = NewEvalContext(s.state, s.plan, s.logger)
|
|
|
|
|
|
|
|
// Construct the placement stack
|
2020-10-09 21:31:38 +00:00
|
|
|
s.stack = NewSystemStack(s.sysbatch, s.ctx)
|
2017-04-19 17:54:03 +00:00
|
|
|
if !s.job.Stopped() {
|
2015-10-14 23:43:06 +00:00
|
|
|
s.stack.SetJob(s.job)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Compute the target job allocations
|
|
|
|
if err := s.computeJobAllocs(); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Error("failed to compute job allocations", "error", err)
|
2015-10-14 23:43:06 +00:00
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
2016-05-05 18:21:58 +00:00
|
|
|
// If the plan is a no-op, we can bail. If AnnotatePlan is set submit the plan
|
|
|
|
// anyways to get the annotations.
|
|
|
|
if s.plan.IsNoOp() && !s.eval.AnnotatePlan {
|
2015-10-14 23:43:06 +00:00
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the limit of placements was reached we need to create an evaluation
|
|
|
|
// to pickup from here after the stagger period.
|
|
|
|
if s.limitReached && s.nextEval == nil {
|
|
|
|
s.nextEval = s.eval.NextRollingEval(s.job.Update.Stagger)
|
|
|
|
if err := s.planner.CreateEval(s.nextEval); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Error("failed to make next eval for rolling update", "error", err)
|
2015-10-14 23:43:06 +00:00
|
|
|
return false, err
|
|
|
|
}
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("rolling update limit reached, next eval created", "next_eval_id", s.nextEval.ID)
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Submit the plan
|
|
|
|
result, newState, err := s.planner.SubmitPlan(s.plan)
|
2016-02-10 05:24:47 +00:00
|
|
|
s.planResult = result
|
2015-10-14 23:43:06 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
2016-07-22 06:13:07 +00:00
|
|
|
// Decrement the number of allocations pending per task group based on the
|
|
|
|
// number of allocations successfully placed
|
2016-07-22 21:53:49 +00:00
|
|
|
adjustQueuedAllocations(s.logger, result, s.queuedAllocs)
|
2016-07-18 22:04:05 +00:00
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// If we got a state refresh, try again since we have stale data
|
|
|
|
if newState != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("refresh forced")
|
2015-10-14 23:43:06 +00:00
|
|
|
s.state = newState
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try again if the plan was not fully committed, potential conflict
|
|
|
|
fullCommit, expected, actual := result.FullCommit(s.plan)
|
|
|
|
if !fullCommit {
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("plan didn't fully commit", "attempted", expected, "placed", actual)
|
2015-10-14 23:43:06 +00:00
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Success!
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// computeJobAllocs is used to reconcile differences between the job,
|
|
|
|
// existing allocations and node status to update the allocations.
|
|
|
|
func (s *SystemScheduler) computeJobAllocs() error {
|
|
|
|
// Lookup the allocations by JobID
|
2017-02-08 04:31:23 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
2017-09-07 23:56:15 +00:00
|
|
|
allocs, err := s.state.AllocsByJob(ws, s.eval.Namespace, s.eval.JobID, true)
|
2015-10-14 23:43:06 +00:00
|
|
|
if err != nil {
|
2020-10-09 21:31:38 +00:00
|
|
|
return fmt.Errorf("failed to get allocs for job '%s': %v", s.eval.JobID, err)
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Determine the tainted nodes containing job allocs
|
|
|
|
tainted, err := taintedNodes(s.state, allocs)
|
|
|
|
if err != nil {
|
2020-10-09 21:31:38 +00:00
|
|
|
return fmt.Errorf("failed to get tainted nodes for job '%s': %v", s.eval.JobID, err)
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
2016-08-09 21:48:25 +00:00
|
|
|
// Update the allocations which are in pending/running state on tainted
|
2020-10-09 21:31:38 +00:00
|
|
|
// nodes to lost.
|
2016-08-09 20:11:58 +00:00
|
|
|
updateNonTerminalAllocsToLost(s.plan, tainted, allocs)
|
|
|
|
|
2020-10-09 21:31:38 +00:00
|
|
|
// Split out terminal allocations
|
|
|
|
live, term := structs.SplitTerminalAllocs(allocs)
|
2016-08-09 20:11:58 +00:00
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// Diff the required and existing allocations
|
2020-10-09 21:31:38 +00:00
|
|
|
diff := diffSystemAllocs(s.job, s.nodes, tainted, live, term)
|
2018-09-15 23:23:13 +00:00
|
|
|
s.logger.Debug("reconciled current state with desired state",
|
|
|
|
"place", len(diff.place), "update", len(diff.update),
|
|
|
|
"migrate", len(diff.migrate), "stop", len(diff.stop),
|
|
|
|
"ignore", len(diff.ignore), "lost", len(diff.lost))
|
2015-10-14 23:43:06 +00:00
|
|
|
|
|
|
|
// Add all the allocs to stop
|
|
|
|
for _, e := range diff.stop {
|
2020-06-09 21:13:53 +00:00
|
|
|
s.plan.AppendStoppedAlloc(e.Alloc, allocNotNeeded, "", "")
|
2016-08-03 22:45:42 +00:00
|
|
|
}
|
|
|
|
|
2018-03-27 00:54:46 +00:00
|
|
|
// Add all the allocs to migrate
|
|
|
|
for _, e := range diff.migrate {
|
2020-06-09 21:13:53 +00:00
|
|
|
s.plan.AppendStoppedAlloc(e.Alloc, allocNodeTainted, "", "")
|
2018-03-27 00:54:46 +00:00
|
|
|
}
|
|
|
|
|
2017-12-13 17:36:03 +00:00
|
|
|
// Lost allocations should be transitioned to desired status stop and client
|
2016-08-03 22:45:42 +00:00
|
|
|
// status lost.
|
|
|
|
for _, e := range diff.lost {
|
2020-06-09 21:13:53 +00:00
|
|
|
s.plan.AppendStoppedAlloc(e.Alloc, allocLost, structs.AllocClientStatusLost, "")
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Attempt to do the upgrades in place
|
2016-05-17 22:37:37 +00:00
|
|
|
destructiveUpdates, inplaceUpdates := inplaceUpdate(s.ctx, s.eval, s.job, s.stack, diff.update)
|
2016-05-05 18:21:58 +00:00
|
|
|
diff.update = destructiveUpdates
|
|
|
|
|
|
|
|
if s.eval.AnnotatePlan {
|
|
|
|
s.plan.Annotations = &structs.PlanAnnotations{
|
|
|
|
DesiredTGUpdates: desiredUpdates(diff, inplaceUpdates, destructiveUpdates),
|
|
|
|
}
|
|
|
|
}
|
2015-10-14 23:43:06 +00:00
|
|
|
|
|
|
|
// Check if a rolling upgrade strategy is being used
|
|
|
|
limit := len(diff.update)
|
2017-04-19 17:54:03 +00:00
|
|
|
if !s.job.Stopped() && s.job.Update.Rolling() {
|
2015-10-14 23:43:06 +00:00
|
|
|
limit = s.job.Update.MaxParallel
|
|
|
|
}
|
|
|
|
|
|
|
|
// Treat non in-place updates as an eviction and new placement.
|
2015-10-15 00:26:20 +00:00
|
|
|
s.limitReached = evictAndPlace(s.ctx, diff, diff.update, allocUpdating, &limit)
|
2015-10-14 23:43:06 +00:00
|
|
|
|
|
|
|
// Nothing remaining to do if placement is not required
|
|
|
|
if len(diff.place) == 0 {
|
2017-04-19 17:54:03 +00:00
|
|
|
if !s.job.Stopped() {
|
2016-07-28 21:02:50 +00:00
|
|
|
for _, tg := range s.job.TaskGroups {
|
|
|
|
s.queuedAllocs[tg.Name] = 0
|
|
|
|
}
|
|
|
|
}
|
2015-10-14 23:43:06 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-07-22 06:13:07 +00:00
|
|
|
// Record the number of allocations that needs to be placed per Task Group
|
2016-07-18 22:04:05 +00:00
|
|
|
for _, allocTuple := range diff.place {
|
2016-07-22 06:13:07 +00:00
|
|
|
s.queuedAllocs[allocTuple.TaskGroup.Name] += 1
|
2016-07-18 22:04:05 +00:00
|
|
|
}
|
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// Compute the placements
|
|
|
|
return s.computePlacements(diff.place)
|
|
|
|
}
|
|
|
|
|
2021-08-31 20:51:30 +00:00
|
|
|
func mergeNodeFiltered(acc, curr *structs.AllocMetric) *structs.AllocMetric {
|
|
|
|
if acc == nil {
|
2021-09-10 23:41:31 +00:00
|
|
|
return curr.Copy()
|
2021-08-31 20:51:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
acc.NodesEvaluated += curr.NodesEvaluated
|
|
|
|
acc.NodesFiltered += curr.NodesFiltered
|
|
|
|
for k, v := range curr.ClassFiltered {
|
|
|
|
acc.ClassFiltered[k] += v
|
|
|
|
}
|
|
|
|
for k, v := range curr.ConstraintFiltered {
|
|
|
|
acc.ConstraintFiltered[k] += v
|
|
|
|
}
|
|
|
|
acc.AllocationTime += curr.AllocationTime
|
|
|
|
return acc
|
|
|
|
}
|
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// computePlacements computes placements for allocations
|
2015-10-16 18:43:09 +00:00
|
|
|
func (s *SystemScheduler) computePlacements(place []allocTuple) error {
|
2015-10-14 23:43:06 +00:00
|
|
|
nodeByID := make(map[string]*structs.Node, len(s.nodes))
|
|
|
|
for _, node := range s.nodes {
|
|
|
|
nodeByID[node.ID] = node
|
|
|
|
}
|
|
|
|
|
2021-08-31 20:51:30 +00:00
|
|
|
// track node filtering, to only report an error if all nodes have been filtered
|
|
|
|
var filteredMetrics map[string]*structs.AllocMetric
|
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
nodes := make([]*structs.Node, 1)
|
|
|
|
for _, missing := range place {
|
2021-08-31 20:51:30 +00:00
|
|
|
tgName := missing.TaskGroup.Name
|
|
|
|
|
2015-10-15 20:14:44 +00:00
|
|
|
node, ok := nodeByID[missing.Alloc.NodeID]
|
2015-10-14 23:43:06 +00:00
|
|
|
if !ok {
|
2020-01-21 19:42:39 +00:00
|
|
|
s.logger.Debug("could not find node %q", missing.Alloc.NodeID)
|
|
|
|
continue
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
2016-01-04 20:07:33 +00:00
|
|
|
// Update the set of placement nodes
|
2015-10-14 23:43:06 +00:00
|
|
|
nodes[0] = node
|
|
|
|
s.stack.SetNodes(nodes)
|
|
|
|
|
|
|
|
// Attempt to match the task group
|
2021-03-18 19:35:11 +00:00
|
|
|
option := s.stack.Select(missing.TaskGroup, &SelectOptions{AllocName: missing.Name})
|
2015-10-14 23:43:06 +00:00
|
|
|
|
2016-05-25 01:12:59 +00:00
|
|
|
if option == nil {
|
2019-04-30 19:32:39 +00:00
|
|
|
// If the task can't be placed on this node, update reporting data
|
|
|
|
// and continue to short circuit the loop
|
|
|
|
|
2021-09-10 23:41:31 +00:00
|
|
|
// If this node was filtered because of constraint
|
|
|
|
// mismatches and we couldn't create an allocation then
|
|
|
|
// decrement queuedAllocs for that task group.
|
2016-09-20 19:05:19 +00:00
|
|
|
if s.ctx.metrics.NodesFiltered > 0 {
|
2021-08-31 20:51:30 +00:00
|
|
|
queued := s.queuedAllocs[tgName] - 1
|
|
|
|
s.queuedAllocs[tgName] = queued
|
2021-09-10 23:41:31 +00:00
|
|
|
|
2021-08-31 20:51:30 +00:00
|
|
|
if filteredMetrics == nil {
|
|
|
|
filteredMetrics = map[string]*structs.AllocMetric{}
|
|
|
|
}
|
|
|
|
filteredMetrics[tgName] = mergeNodeFiltered(filteredMetrics[tgName], s.ctx.Metrics())
|
|
|
|
|
|
|
|
if queued <= 0 {
|
|
|
|
if s.failedTGAllocs == nil {
|
|
|
|
s.failedTGAllocs = make(map[string]*structs.AllocMetric)
|
|
|
|
}
|
|
|
|
s.failedTGAllocs[tgName] = filteredMetrics[tgName]
|
|
|
|
}
|
2016-08-11 22:26:25 +00:00
|
|
|
|
|
|
|
// If we are annotating the plan, then decrement the desired
|
|
|
|
// placements based on whether the node meets the constraints
|
|
|
|
if s.eval.AnnotatePlan && s.plan.Annotations != nil &&
|
|
|
|
s.plan.Annotations.DesiredTGUpdates != nil {
|
2021-08-31 20:51:30 +00:00
|
|
|
desired := s.plan.Annotations.DesiredTGUpdates[tgName]
|
2016-08-11 22:26:25 +00:00
|
|
|
desired.Place -= 1
|
|
|
|
}
|
2019-04-30 19:32:39 +00:00
|
|
|
|
|
|
|
// Filtered nodes are not reported to users, just omitted from the job status
|
2019-04-29 20:58:59 +00:00
|
|
|
continue
|
2016-08-10 21:30:02 +00:00
|
|
|
}
|
2016-08-11 22:26:25 +00:00
|
|
|
|
2019-04-30 19:32:39 +00:00
|
|
|
// Check if this task group has already failed, reported to the user as a count
|
2021-08-31 20:51:30 +00:00
|
|
|
if metric, ok := s.failedTGAllocs[tgName]; ok {
|
2016-05-19 01:11:40 +00:00
|
|
|
metric.CoalescedFailures += 1
|
2021-04-29 19:03:45 +00:00
|
|
|
metric.ExhaustResources(missing.TaskGroup)
|
2015-10-14 23:43:06 +00:00
|
|
|
continue
|
|
|
|
}
|
2019-04-29 20:58:59 +00:00
|
|
|
|
|
|
|
// Store the available nodes by datacenter
|
|
|
|
s.ctx.Metrics().NodesAvailable = s.nodesByDC
|
|
|
|
|
|
|
|
// Compute top K scoring node metadata
|
|
|
|
s.ctx.Metrics().PopulateScoreMetaData()
|
|
|
|
|
|
|
|
// Lazy initialize the failed map
|
|
|
|
if s.failedTGAllocs == nil {
|
|
|
|
s.failedTGAllocs = make(map[string]*structs.AllocMetric)
|
|
|
|
}
|
|
|
|
|
2021-04-29 19:03:45 +00:00
|
|
|
// Update metrics with the resources requested by the task group.
|
|
|
|
s.ctx.Metrics().ExhaustResources(missing.TaskGroup)
|
|
|
|
|
2019-04-30 19:32:39 +00:00
|
|
|
// Actual failure to start this task on this candidate node, report it individually
|
2021-08-31 20:51:30 +00:00
|
|
|
s.failedTGAllocs[tgName] = s.ctx.Metrics()
|
2019-06-19 19:10:57 +00:00
|
|
|
s.addBlocked(node)
|
2020-01-21 19:42:39 +00:00
|
|
|
|
2019-04-29 20:58:59 +00:00
|
|
|
continue
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
|
|
|
|
2016-01-04 22:23:06 +00:00
|
|
|
// Store the available nodes by datacenter
|
|
|
|
s.ctx.Metrics().NodesAvailable = s.nodesByDC
|
|
|
|
|
2018-08-18 01:11:07 +00:00
|
|
|
// Compute top K scoring node metadata
|
|
|
|
s.ctx.Metrics().PopulateScoreMetaData()
|
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
// Set fields based on if we found an allocation option
|
2019-04-29 20:58:59 +00:00
|
|
|
resources := &structs.AllocatedResources{
|
2019-12-16 20:34:58 +00:00
|
|
|
Tasks: option.TaskResources,
|
|
|
|
TaskLifecycles: option.TaskLifecycles,
|
2019-04-29 20:58:59 +00:00
|
|
|
Shared: structs.AllocatedSharedResources{
|
|
|
|
DiskMB: int64(missing.TaskGroup.EphemeralDisk.SizeMB),
|
|
|
|
},
|
|
|
|
}
|
2018-10-02 20:36:04 +00:00
|
|
|
|
2019-07-03 18:29:47 +00:00
|
|
|
if option.AllocResources != nil {
|
|
|
|
resources.Shared.Networks = option.AllocResources.Networks
|
2020-09-22 16:54:34 +00:00
|
|
|
resources.Shared.Ports = option.AllocResources.Ports
|
2019-07-03 18:29:47 +00:00
|
|
|
}
|
|
|
|
|
2019-04-29 20:58:59 +00:00
|
|
|
// Create an allocation for this
|
|
|
|
alloc := &structs.Allocation{
|
|
|
|
ID: uuid.Generate(),
|
|
|
|
Namespace: s.job.Namespace,
|
|
|
|
EvalID: s.eval.ID,
|
|
|
|
Name: missing.Name,
|
|
|
|
JobID: s.job.ID,
|
2021-08-31 20:51:30 +00:00
|
|
|
TaskGroup: tgName,
|
2019-04-29 20:58:59 +00:00
|
|
|
Metrics: s.ctx.Metrics(),
|
|
|
|
NodeID: option.Node.ID,
|
|
|
|
NodeName: option.Node.Name,
|
|
|
|
TaskResources: resources.OldTaskResources(),
|
|
|
|
AllocatedResources: resources,
|
|
|
|
DesiredStatus: structs.AllocDesiredStatusRun,
|
|
|
|
ClientStatus: structs.AllocClientStatusPending,
|
2019-09-05 23:37:24 +00:00
|
|
|
// SharedResources is considered deprecated, will be removed in 0.11.
|
|
|
|
// It is only set for compat reasons
|
2019-04-29 20:58:59 +00:00
|
|
|
SharedResources: &structs.Resources{
|
2019-07-03 18:29:47 +00:00
|
|
|
DiskMB: missing.TaskGroup.EphemeralDisk.SizeMB,
|
2019-09-05 23:37:24 +00:00
|
|
|
Networks: resources.Shared.Networks,
|
2019-04-29 20:58:59 +00:00
|
|
|
},
|
|
|
|
}
|
2016-05-19 01:11:40 +00:00
|
|
|
|
2019-04-30 19:32:39 +00:00
|
|
|
// If the new allocation is replacing an older allocation then we record the
|
|
|
|
// older allocation id so that they are chained
|
2019-04-29 20:58:59 +00:00
|
|
|
if missing.Alloc != nil {
|
|
|
|
alloc.PreviousAllocation = missing.Alloc.ID
|
|
|
|
}
|
2016-08-16 17:49:45 +00:00
|
|
|
|
2019-04-29 20:58:59 +00:00
|
|
|
// If this placement involves preemption, set DesiredState to evict for those allocations
|
|
|
|
if option.PreemptedAllocs != nil {
|
|
|
|
var preemptedAllocIDs []string
|
|
|
|
for _, stop := range option.PreemptedAllocs {
|
|
|
|
s.plan.AppendPreemptedAlloc(stop, alloc.ID)
|
|
|
|
|
|
|
|
preemptedAllocIDs = append(preemptedAllocIDs, stop.ID)
|
|
|
|
if s.eval.AnnotatePlan && s.plan.Annotations != nil {
|
2020-10-09 05:21:41 +00:00
|
|
|
s.plan.Annotations.PreemptedAllocs = append(s.plan.Annotations.PreemptedAllocs, stop.Stub(nil))
|
2019-04-29 20:58:59 +00:00
|
|
|
if s.plan.Annotations.DesiredTGUpdates != nil {
|
2021-08-31 20:51:30 +00:00
|
|
|
desired := s.plan.Annotations.DesiredTGUpdates[tgName]
|
2019-04-29 20:58:59 +00:00
|
|
|
desired.Preemptions += 1
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
|
|
|
}
|
2016-05-19 01:11:40 +00:00
|
|
|
}
|
2019-04-29 20:58:59 +00:00
|
|
|
alloc.PreemptedAllocations = preemptedAllocIDs
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
2019-04-29 20:58:59 +00:00
|
|
|
|
2020-08-25 21:09:21 +00:00
|
|
|
s.plan.AppendAlloc(alloc, nil)
|
2015-10-14 23:43:06 +00:00
|
|
|
}
|
2016-05-19 01:11:40 +00:00
|
|
|
|
2015-10-14 23:43:06 +00:00
|
|
|
return nil
|
|
|
|
}
|
2019-06-19 19:10:57 +00:00
|
|
|
|
|
|
|
// addBlocked creates a new blocked eval for this job on this node
|
|
|
|
// and submit to the planner (worker.go), which keeps the eval for execution later
|
|
|
|
func (s *SystemScheduler) addBlocked(node *structs.Node) error {
|
|
|
|
e := s.ctx.Eligibility()
|
|
|
|
escaped := e.HasEscaped()
|
|
|
|
|
|
|
|
// Only store the eligible classes if the eval hasn't escaped.
|
|
|
|
var classEligibility map[string]bool
|
|
|
|
if !escaped {
|
|
|
|
classEligibility = e.GetClasses()
|
|
|
|
}
|
|
|
|
|
2021-04-29 19:03:45 +00:00
|
|
|
blocked := s.eval.CreateBlockedEval(classEligibility, escaped, e.QuotaLimitReached(), s.failedTGAllocs)
|
2019-06-19 19:10:57 +00:00
|
|
|
blocked.StatusDescription = blockedEvalFailedPlacements
|
|
|
|
blocked.NodeID = node.ID
|
|
|
|
|
|
|
|
return s.planner.CreateEval(blocked)
|
|
|
|
}
|
2020-10-09 21:31:38 +00:00
|
|
|
|
|
|
|
func (s *SystemScheduler) canHandle(trigger string) bool {
|
|
|
|
switch trigger {
|
|
|
|
case structs.EvalTriggerJobRegister:
|
|
|
|
case structs.EvalTriggerNodeUpdate:
|
|
|
|
case structs.EvalTriggerFailedFollowUp:
|
|
|
|
case structs.EvalTriggerJobDeregister:
|
|
|
|
case structs.EvalTriggerRollingUpdate:
|
|
|
|
case structs.EvalTriggerPreemption:
|
|
|
|
case structs.EvalTriggerDeploymentWatcher:
|
|
|
|
case structs.EvalTriggerNodeDrain:
|
|
|
|
case structs.EvalTriggerAllocStop:
|
|
|
|
case structs.EvalTriggerQueuedAllocs:
|
|
|
|
case structs.EvalTriggerScaling:
|
|
|
|
default:
|
|
|
|
switch s.sysbatch {
|
|
|
|
case true:
|
|
|
|
return trigger == structs.EvalTriggerPeriodicJob
|
|
|
|
case false:
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|