2023-04-10 15:36:59 +00:00
|
|
|
// Copyright (c) HashiCorp, Inc.
|
|
|
|
// SPDX-License-Identifier: MPL-2.0
|
|
|
|
|
2015-07-27 22:31:09 +00:00
|
|
|
package nomad
|
|
|
|
|
2015-08-04 23:32:46 +00:00
|
|
|
import (
|
2019-06-06 22:44:47 +00:00
|
|
|
"context"
|
2015-08-04 23:32:46 +00:00
|
|
|
"fmt"
|
2016-02-20 21:38:46 +00:00
|
|
|
"runtime"
|
2015-08-04 23:35:49 +00:00
|
|
|
"time"
|
2015-08-04 23:32:46 +00:00
|
|
|
|
2019-01-15 19:46:12 +00:00
|
|
|
metrics "github.com/armon/go-metrics"
|
2018-09-15 23:23:13 +00:00
|
|
|
log "github.com/hashicorp/go-hclog"
|
2017-02-08 04:31:23 +00:00
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
2019-01-15 19:46:12 +00:00
|
|
|
multierror "github.com/hashicorp/go-multierror"
|
2018-09-21 21:05:00 +00:00
|
|
|
"github.com/hashicorp/nomad/helper/uuid"
|
2015-08-11 21:27:14 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/state"
|
2015-08-04 23:32:46 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2015-10-11 21:48:18 +00:00
|
|
|
"github.com/hashicorp/raft"
|
2015-08-04 23:32:46 +00:00
|
|
|
)
|
2015-07-27 22:31:09 +00:00
|
|
|
|
2019-03-04 09:49:32 +00:00
|
|
|
// planner is used to manage the submitted allocation plans that are waiting
|
2018-09-15 23:23:13 +00:00
|
|
|
// to be accessed by the leader
|
|
|
|
type planner struct {
|
|
|
|
*Server
|
|
|
|
log log.Logger
|
|
|
|
|
|
|
|
// planQueue is used to manage the submitted allocation
|
|
|
|
// plans that are waiting to be assessed by the leader
|
|
|
|
planQueue *PlanQueue
|
2022-07-12 22:40:20 +00:00
|
|
|
|
|
|
|
// badNodeTracker keeps a score for nodes that have plan rejections.
|
|
|
|
// Plan rejections are somewhat expected given Nomad's optimistic
|
|
|
|
// scheduling, but repeated rejections for the same node may indicate an
|
|
|
|
// undetected issue, so we need to track rejection history.
|
|
|
|
badNodeTracker BadNodeTracker
|
2018-09-15 23:23:13 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// newPlanner returns a new planner to be used for managing allocation plans.
|
|
|
|
func newPlanner(s *Server) (*planner, error) {
|
2022-07-12 22:40:20 +00:00
|
|
|
log := s.logger.Named("planner")
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
// Create a plan queue
|
|
|
|
planQueue, err := NewPlanQueue()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2022-07-12 22:40:20 +00:00
|
|
|
// Create the bad node tracker.
|
|
|
|
var badNodeTracker BadNodeTracker
|
|
|
|
if s.config.NodePlanRejectionEnabled {
|
|
|
|
config := DefaultCachedBadNodeTrackerConfig()
|
|
|
|
|
|
|
|
config.Window = s.config.NodePlanRejectionWindow
|
|
|
|
config.Threshold = s.config.NodePlanRejectionThreshold
|
|
|
|
|
|
|
|
badNodeTracker, err = NewCachedBadNodeTracker(log, config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
badNodeTracker = &NoopBadNodeTracker{}
|
|
|
|
}
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
return &planner{
|
2022-07-12 22:40:20 +00:00
|
|
|
Server: s,
|
|
|
|
log: log,
|
|
|
|
planQueue: planQueue,
|
|
|
|
badNodeTracker: badNodeTracker,
|
2018-09-15 23:23:13 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
2015-07-27 22:31:09 +00:00
|
|
|
// planApply is a long lived goroutine that reads plan allocations from
|
|
|
|
// the plan queue, determines if they can be applied safely and applies
|
|
|
|
// them via Raft.
|
2015-10-11 21:48:18 +00:00
|
|
|
//
|
|
|
|
// Naively, we could simply dequeue a plan, verify, apply and then respond.
|
|
|
|
// However, the plan application is bounded by the Raft apply time and
|
|
|
|
// subject to some latency. This creates a stall condition, where we are
|
2015-10-12 21:35:17 +00:00
|
|
|
// not evaluating, but simply waiting for a transaction to apply.
|
2015-10-11 21:48:18 +00:00
|
|
|
//
|
|
|
|
// To avoid this, we overlap verification with apply. This means once
|
|
|
|
// we've verified plan N we attempt to apply it. However, while waiting
|
|
|
|
// for apply, we begin to verify plan N+1 under the assumption that plan
|
|
|
|
// N has succeeded.
|
|
|
|
//
|
|
|
|
// In this sense, we track two parallel versions of the world. One is
|
|
|
|
// the pessimistic one driven by the Raft log which is replicated. The
|
|
|
|
// other is optimistic and assumes our transactions will succeed. In the
|
|
|
|
// happy path, this lets us do productive work during the latency of
|
|
|
|
// apply.
|
|
|
|
//
|
|
|
|
// In the unhappy path (Raft transaction fails), effectively we only
|
|
|
|
// wasted work during a time we would have been waiting anyways. However,
|
|
|
|
// in anticipation of this case we cannot respond to the plan until
|
|
|
|
// the Raft log is updated. This means our schedulers will stall,
|
|
|
|
// but there are many of those and only a single plan verifier.
|
2018-09-15 23:23:13 +00:00
|
|
|
func (p *planner) planApply() {
|
2019-06-24 18:48:02 +00:00
|
|
|
// planIndexCh is used to track an outstanding application and receive
|
|
|
|
// its committed index while snap holds an optimistic state which
|
|
|
|
// includes that plan application.
|
|
|
|
var planIndexCh chan uint64
|
2015-10-11 22:34:52 +00:00
|
|
|
var snap *state.StateSnapshot
|
2016-02-20 21:38:46 +00:00
|
|
|
|
2019-06-24 18:48:02 +00:00
|
|
|
// prevPlanResultIndex is the index when the last PlanResult was
|
|
|
|
// committed. Since only the last plan is optimistically applied to the
|
|
|
|
// snapshot, it's possible the current snapshot's and plan's indexes
|
|
|
|
// are less than the index the previous plan result was committed at.
|
|
|
|
// prevPlanResultIndex also guards against the previous plan committing
|
|
|
|
// during Dequeue, thus causing the snapshot containing the optimistic
|
|
|
|
// commit to be discarded and potentially evaluating the current plan
|
|
|
|
// against an index older than the previous plan was committed at.
|
|
|
|
var prevPlanResultIndex uint64
|
|
|
|
|
2016-02-20 21:38:46 +00:00
|
|
|
// Setup a worker pool with half the cores, with at least 1
|
|
|
|
poolSize := runtime.NumCPU() / 2
|
|
|
|
if poolSize == 0 {
|
|
|
|
poolSize = 1
|
|
|
|
}
|
|
|
|
pool := NewEvaluatePool(poolSize, workerPoolBufferSize)
|
2016-02-20 21:12:14 +00:00
|
|
|
defer pool.Shutdown()
|
2015-10-11 22:34:52 +00:00
|
|
|
|
2015-07-27 22:31:09 +00:00
|
|
|
for {
|
|
|
|
// Pull the next pending plan, exit if we are no longer leader
|
2018-09-15 23:23:13 +00:00
|
|
|
pending, err := p.planQueue.Dequeue(0)
|
2015-07-27 22:31:09 +00:00
|
|
|
if err != nil {
|
|
|
|
return
|
2015-08-12 22:44:36 +00:00
|
|
|
}
|
|
|
|
|
2019-06-24 18:48:02 +00:00
|
|
|
// If last plan has completed get a new snapshot
|
2015-10-11 22:34:52 +00:00
|
|
|
select {
|
2019-06-24 18:48:02 +00:00
|
|
|
case idx := <-planIndexCh:
|
|
|
|
// Previous plan committed. Discard snapshot and ensure
|
2019-06-26 15:49:24 +00:00
|
|
|
// future snapshots include this plan. idx may be 0 if
|
|
|
|
// plan failed to apply, so use max(prev, idx)
|
2019-06-24 18:48:02 +00:00
|
|
|
prevPlanResultIndex = max(prevPlanResultIndex, idx)
|
|
|
|
planIndexCh = nil
|
2015-10-11 22:34:52 +00:00
|
|
|
snap = nil
|
|
|
|
default:
|
|
|
|
}
|
|
|
|
|
2019-06-24 18:48:02 +00:00
|
|
|
if snap != nil {
|
2019-06-26 15:49:24 +00:00
|
|
|
// If snapshot doesn't contain the previous plan
|
|
|
|
// result's index and the current plan's snapshot it,
|
|
|
|
// discard it and get a new one below.
|
2019-06-24 18:48:02 +00:00
|
|
|
minIndex := max(prevPlanResultIndex, pending.plan.SnapshotIndex)
|
|
|
|
if idx, err := snap.LatestIndex(); err != nil || idx < minIndex {
|
|
|
|
snap = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-08-05 01:30:05 +00:00
|
|
|
// Snapshot the state so that we have a consistent view of the world
|
2019-06-26 15:49:24 +00:00
|
|
|
// if no snapshot is available.
|
|
|
|
// - planIndexCh will be nil if the previous plan result applied
|
|
|
|
// during Dequeue
|
|
|
|
// - snap will be nil if its index < max(prevIndex, curIndex)
|
2019-06-24 18:48:02 +00:00
|
|
|
if planIndexCh == nil || snap == nil {
|
|
|
|
snap, err = p.snapshotMinIndex(prevPlanResultIndex, pending.plan.SnapshotIndex)
|
2015-10-11 22:34:52 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to snapshot state", "error", err)
|
2015-10-11 22:34:52 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
|
|
|
}
|
2015-08-05 01:30:05 +00:00
|
|
|
}
|
|
|
|
|
2015-08-04 23:32:46 +00:00
|
|
|
// Evaluate the plan
|
2018-09-15 23:23:13 +00:00
|
|
|
result, err := evaluatePlan(pool, snap, pending.plan, p.logger)
|
2015-08-04 23:32:46 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to evaluate plan", "error", err)
|
2015-08-04 23:32:46 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
|
|
|
}
|
2015-07-27 22:31:09 +00:00
|
|
|
|
2022-07-12 22:40:20 +00:00
|
|
|
// Check if any of the rejected nodes should be made ineligible.
|
|
|
|
for _, nodeID := range result.RejectedNodes {
|
|
|
|
if p.badNodeTracker.Add(nodeID) {
|
|
|
|
result.IneligibleNodes = append(result.IneligibleNodes, nodeID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-11 21:57:36 +00:00
|
|
|
// Fast-path the response if there is nothing to do
|
|
|
|
if result.IsNoOp() {
|
|
|
|
pending.respond(result, nil)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2015-10-12 21:35:17 +00:00
|
|
|
// Ensure any parallel apply is complete before starting the next one.
|
|
|
|
// This also limits how out of date our snapshot can be.
|
2019-06-24 18:48:02 +00:00
|
|
|
if planIndexCh != nil {
|
|
|
|
idx := <-planIndexCh
|
2022-06-23 16:06:27 +00:00
|
|
|
planIndexCh = nil
|
2019-06-24 18:48:02 +00:00
|
|
|
prevPlanResultIndex = max(prevPlanResultIndex, idx)
|
|
|
|
snap, err = p.snapshotMinIndex(prevPlanResultIndex, pending.plan.SnapshotIndex)
|
2015-10-11 22:34:52 +00:00
|
|
|
if err != nil {
|
2019-06-24 18:48:02 +00:00
|
|
|
p.logger.Error("failed to update snapshot state", "error", err)
|
2015-10-11 22:34:52 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-11 21:57:36 +00:00
|
|
|
// Dispatch the Raft transaction for the plan
|
2018-09-15 23:23:13 +00:00
|
|
|
future, err := p.applyPlan(pending.plan, result, snap)
|
2015-10-11 21:57:36 +00:00
|
|
|
if err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to submit plan", "error", err)
|
2015-10-11 21:57:36 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
continue
|
2015-07-27 22:31:09 +00:00
|
|
|
}
|
|
|
|
|
2019-06-24 18:48:02 +00:00
|
|
|
// Respond to the plan in async; receive plan's committed index via chan
|
|
|
|
planIndexCh = make(chan uint64, 1)
|
|
|
|
go p.asyncPlanWait(planIndexCh, future, result, pending)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-23 16:06:27 +00:00
|
|
|
// snapshotMinIndex wraps SnapshotAfter with a 10s timeout and converts timeout
|
2019-06-24 18:48:02 +00:00
|
|
|
// errors to a more descriptive error message. The snapshot is guaranteed to
|
|
|
|
// include both the previous plan and all objects referenced by the plan or
|
|
|
|
// return an error.
|
|
|
|
func (p *planner) snapshotMinIndex(prevPlanResultIndex, planSnapshotIndex uint64) (*state.StateSnapshot, error) {
|
|
|
|
defer metrics.MeasureSince([]string{"nomad", "plan", "wait_for_index"}, time.Now())
|
|
|
|
|
|
|
|
// Minimum index the snapshot must include is the max of the previous
|
|
|
|
// plan result's and current plan's snapshot index.
|
|
|
|
minIndex := max(prevPlanResultIndex, planSnapshotIndex)
|
|
|
|
|
2022-06-23 16:06:27 +00:00
|
|
|
// This timeout creates backpressure where any concurrent
|
|
|
|
// Plan.Submit RPCs will block waiting for results. This sheds
|
|
|
|
// load across all servers and gives raft some CPU to catch up,
|
|
|
|
// because schedulers won't dequeue more work while waiting.
|
|
|
|
const timeout = 10 * time.Second
|
2019-06-24 18:48:02 +00:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), timeout)
|
2019-06-24 18:59:44 +00:00
|
|
|
snap, err := p.fsm.State().SnapshotMinIndex(ctx, minIndex)
|
2019-06-24 18:48:02 +00:00
|
|
|
cancel()
|
|
|
|
if err == context.DeadlineExceeded {
|
|
|
|
return nil, fmt.Errorf("timed out after %s waiting for index=%d (previous plan result index=%d; plan snapshot index=%d)",
|
|
|
|
timeout, minIndex, prevPlanResultIndex, planSnapshotIndex)
|
2015-07-27 22:31:09 +00:00
|
|
|
}
|
2019-06-24 18:48:02 +00:00
|
|
|
|
|
|
|
return snap, err
|
2015-07-27 22:31:09 +00:00
|
|
|
}
|
2015-08-04 23:32:46 +00:00
|
|
|
|
2015-08-05 01:30:05 +00:00
|
|
|
// applyPlan is used to apply the plan result and to return the alloc index
|
2018-09-15 23:23:13 +00:00
|
|
|
func (p *planner) applyPlan(plan *structs.Plan, result *structs.PlanResult, snap *state.StateSnapshot) (raft.ApplyFuture, error) {
|
2022-07-12 22:40:20 +00:00
|
|
|
now := time.Now().UTC().UnixNano()
|
|
|
|
|
2016-02-21 21:32:45 +00:00
|
|
|
// Setup the update request
|
2017-05-05 20:52:01 +00:00
|
|
|
req := structs.ApplyPlanResultsRequest{
|
|
|
|
AllocUpdateRequest: structs.AllocUpdateRequest{
|
2019-03-04 09:49:32 +00:00
|
|
|
Job: plan.Job,
|
2017-05-05 20:52:01 +00:00
|
|
|
},
|
2017-07-06 04:26:04 +00:00
|
|
|
Deployment: result.Deployment,
|
|
|
|
DeploymentUpdates: result.DeploymentUpdates,
|
2022-07-12 22:40:20 +00:00
|
|
|
IneligibleNodes: result.IneligibleNodes,
|
2017-12-18 16:03:55 +00:00
|
|
|
EvalID: plan.EvalID,
|
2022-07-12 22:40:20 +00:00
|
|
|
UpdatedAt: now,
|
2016-02-21 19:42:54 +00:00
|
|
|
}
|
2015-08-05 01:30:05 +00:00
|
|
|
|
2019-03-04 09:49:32 +00:00
|
|
|
preemptedJobIDs := make(map[structs.NamespacedID]struct{})
|
|
|
|
|
2022-10-17 20:23:51 +00:00
|
|
|
if ServersMeetMinimumVersion(p.Members(), p.Region(), MinVersionPlanNormalization, true) {
|
2019-03-04 09:49:32 +00:00
|
|
|
// Initialize the allocs request using the new optimized log entry format.
|
|
|
|
// Determine the minimum number of updates, could be more if there
|
|
|
|
// are multiple updates per node
|
2019-04-11 00:15:04 +00:00
|
|
|
req.AllocsStopped = make([]*structs.AllocationDiff, 0, len(result.NodeUpdate))
|
2019-03-04 09:49:32 +00:00
|
|
|
req.AllocsUpdated = make([]*structs.Allocation, 0, len(result.NodeAllocation))
|
2019-04-11 00:15:04 +00:00
|
|
|
req.AllocsPreempted = make([]*structs.AllocationDiff, 0, len(result.NodePreemptions))
|
2019-03-04 09:49:32 +00:00
|
|
|
|
|
|
|
for _, updateList := range result.NodeUpdate {
|
|
|
|
for _, stoppedAlloc := range updateList {
|
2019-03-08 11:18:56 +00:00
|
|
|
req.AllocsStopped = append(req.AllocsStopped, normalizeStoppedAlloc(stoppedAlloc, now))
|
2019-03-04 09:49:32 +00:00
|
|
|
}
|
2016-02-09 05:58:05 +00:00
|
|
|
}
|
|
|
|
|
2019-03-04 09:49:32 +00:00
|
|
|
for _, allocList := range result.NodeAllocation {
|
|
|
|
req.AllocsUpdated = append(req.AllocsUpdated, allocList...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the time the alloc was applied for the first time. This can be used
|
|
|
|
// to approximate the scheduling time.
|
|
|
|
updateAllocTimestamps(req.AllocsUpdated, now)
|
|
|
|
|
2022-06-10 13:41:54 +00:00
|
|
|
err := p.signAllocIdentities(plan.Job, req.AllocsUpdated)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2019-03-04 09:49:32 +00:00
|
|
|
for _, preemptions := range result.NodePreemptions {
|
|
|
|
for _, preemptedAlloc := range preemptions {
|
2019-04-11 00:15:04 +00:00
|
|
|
req.AllocsPreempted = append(req.AllocsPreempted, normalizePreemptedAlloc(preemptedAlloc, now))
|
2019-03-04 09:49:32 +00:00
|
|
|
|
|
|
|
// Gather jobids to create follow up evals
|
|
|
|
appendNamespacedJobID(preemptedJobIDs, preemptedAlloc)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
2019-03-08 11:18:56 +00:00
|
|
|
// COMPAT 0.11: This branch is deprecated and will only be used to support
|
2019-03-04 09:49:32 +00:00
|
|
|
// application of older log entries. Expected to be removed in a future version.
|
|
|
|
|
|
|
|
// Determine the minimum number of updates, could be more if there
|
|
|
|
// are multiple updates per node
|
|
|
|
minUpdates := len(result.NodeUpdate)
|
|
|
|
minUpdates += len(result.NodeAllocation)
|
|
|
|
|
2019-04-11 00:15:04 +00:00
|
|
|
// Initialize using the older log entry format for Alloc and NodePreemptions
|
2019-03-04 09:49:32 +00:00
|
|
|
req.Alloc = make([]*structs.Allocation, 0, minUpdates)
|
2019-04-11 00:15:04 +00:00
|
|
|
req.NodePreemptions = make([]*structs.Allocation, 0, len(result.NodePreemptions))
|
2019-03-04 09:49:32 +00:00
|
|
|
|
|
|
|
for _, updateList := range result.NodeUpdate {
|
|
|
|
req.Alloc = append(req.Alloc, updateList...)
|
|
|
|
}
|
|
|
|
for _, allocList := range result.NodeAllocation {
|
|
|
|
req.Alloc = append(req.Alloc, allocList...)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, preemptions := range result.NodePreemptions {
|
|
|
|
req.NodePreemptions = append(req.NodePreemptions, preemptions...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set the time the alloc was applied for the first time. This can be used
|
|
|
|
// to approximate the scheduling time.
|
|
|
|
updateAllocTimestamps(req.Alloc, now)
|
|
|
|
|
|
|
|
// Set modify time for preempted allocs if any
|
|
|
|
// Also gather jobids to create follow up evals
|
|
|
|
for _, alloc := range req.NodePreemptions {
|
|
|
|
alloc.ModifyTime = now
|
|
|
|
appendNamespacedJobID(preemptedJobIDs, alloc)
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
var evals []*structs.Evaluation
|
2018-09-27 20:10:15 +00:00
|
|
|
for preemptedJobID := range preemptedJobIDs {
|
2018-09-24 01:09:14 +00:00
|
|
|
job, _ := p.State().JobByID(nil, preemptedJobID.Namespace, preemptedJobID.ID)
|
2018-09-21 21:05:00 +00:00
|
|
|
if job != nil {
|
|
|
|
eval := &structs.Evaluation{
|
|
|
|
ID: uuid.Generate(),
|
|
|
|
Namespace: job.Namespace,
|
|
|
|
TriggeredBy: structs.EvalTriggerPreemption,
|
|
|
|
JobID: job.ID,
|
|
|
|
Type: job.Type,
|
|
|
|
Priority: job.Priority,
|
|
|
|
Status: structs.EvalStatusPending,
|
2019-08-07 16:50:35 +00:00
|
|
|
CreateTime: now,
|
|
|
|
ModifyTime: now,
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
|
|
|
evals = append(evals, eval)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
req.PreemptionEvals = evals
|
|
|
|
|
2015-10-11 22:19:01 +00:00
|
|
|
// Dispatch the Raft transaction
|
2018-09-15 23:23:13 +00:00
|
|
|
future, err := p.raftApplyFuture(structs.ApplyPlanResultsRequestType, &req)
|
2015-10-11 22:19:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Optimistically apply to our state view
|
|
|
|
if snap != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
nextIdx := p.raft.AppliedIndex() + 1
|
2020-10-02 20:13:49 +00:00
|
|
|
if err := snap.UpsertPlanResults(structs.ApplyPlanResultsRequestType, nextIdx, &req); err != nil {
|
2015-10-11 22:19:01 +00:00
|
|
|
return future, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return future, nil
|
2015-10-11 21:48:18 +00:00
|
|
|
}
|
|
|
|
|
2019-04-11 00:15:04 +00:00
|
|
|
// normalizePreemptedAlloc removes redundant fields from a preempted allocation and
|
|
|
|
// returns AllocationDiff. Since a preempted allocation is always an existing allocation,
|
|
|
|
// the struct returned by this method contains only the differential, which can be
|
|
|
|
// applied to an existing allocation, to yield the updated struct
|
|
|
|
func normalizePreemptedAlloc(preemptedAlloc *structs.Allocation, now int64) *structs.AllocationDiff {
|
|
|
|
return &structs.AllocationDiff{
|
2019-03-08 11:18:56 +00:00
|
|
|
ID: preemptedAlloc.ID,
|
|
|
|
PreemptedByAllocation: preemptedAlloc.PreemptedByAllocation,
|
|
|
|
ModifyTime: now,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-11 00:15:04 +00:00
|
|
|
// normalizeStoppedAlloc removes redundant fields from a stopped allocation and
|
|
|
|
// returns AllocationDiff. Since a stopped allocation is always an existing allocation,
|
|
|
|
// the struct returned by this method contains only the differential, which can be
|
|
|
|
// applied to an existing allocation, to yield the updated struct
|
|
|
|
func normalizeStoppedAlloc(stoppedAlloc *structs.Allocation, now int64) *structs.AllocationDiff {
|
|
|
|
return &structs.AllocationDiff{
|
2019-03-08 11:18:56 +00:00
|
|
|
ID: stoppedAlloc.ID,
|
|
|
|
DesiredDescription: stoppedAlloc.DesiredDescription,
|
|
|
|
ClientStatus: stoppedAlloc.ClientStatus,
|
|
|
|
ModifyTime: now,
|
2020-06-09 21:13:53 +00:00
|
|
|
FollowupEvalID: stoppedAlloc.FollowupEvalID,
|
2019-03-08 11:18:56 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-11 00:15:04 +00:00
|
|
|
// appendNamespacedJobID appends the namespaced Job ID for the alloc to the jobIDs set
|
2019-03-04 09:49:32 +00:00
|
|
|
func appendNamespacedJobID(jobIDs map[structs.NamespacedID]struct{}, alloc *structs.Allocation) {
|
|
|
|
id := structs.NamespacedID{Namespace: alloc.Namespace, ID: alloc.JobID}
|
|
|
|
if _, ok := jobIDs[id]; !ok {
|
|
|
|
jobIDs[id] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-11 00:15:04 +00:00
|
|
|
// updateAllocTimestamps sets the CreateTime and ModifyTime for the allocations
|
|
|
|
// to the timestamp provided
|
2019-03-04 09:49:32 +00:00
|
|
|
func updateAllocTimestamps(allocations []*structs.Allocation, timestamp int64) {
|
|
|
|
for _, alloc := range allocations {
|
|
|
|
if alloc.CreateTime == 0 {
|
|
|
|
alloc.CreateTime = timestamp
|
|
|
|
}
|
|
|
|
alloc.ModifyTime = timestamp
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-06-10 13:41:54 +00:00
|
|
|
func (p *planner) signAllocIdentities(job *structs.Job, allocations []*structs.Allocation) error {
|
|
|
|
|
|
|
|
encrypter := p.Server.encrypter
|
|
|
|
|
|
|
|
for _, alloc := range allocations {
|
|
|
|
alloc.SignedIdentities = map[string]string{}
|
|
|
|
tg := job.LookupTaskGroup(alloc.TaskGroup)
|
|
|
|
for _, task := range tg.Tasks {
|
2022-07-21 13:05:54 +00:00
|
|
|
claims := alloc.ToTaskIdentityClaims(job, task.Name)
|
2022-11-01 19:00:50 +00:00
|
|
|
token, keyID, err := encrypter.SignClaims(claims)
|
2022-06-10 13:41:54 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
alloc.SignedIdentities[task.Name] = token
|
2022-11-01 19:00:50 +00:00
|
|
|
alloc.SigningKeyID = keyID
|
2022-06-10 13:41:54 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-06-24 18:48:02 +00:00
|
|
|
// asyncPlanWait is used to apply and respond to a plan async. On successful
|
|
|
|
// commit the plan's index will be sent on the chan. On error the chan will be
|
|
|
|
// closed.
|
|
|
|
func (p *planner) asyncPlanWait(indexCh chan<- uint64, future raft.ApplyFuture,
|
2015-10-11 21:57:36 +00:00
|
|
|
result *structs.PlanResult, pending *pendingPlan) {
|
2015-10-11 21:48:18 +00:00
|
|
|
defer metrics.MeasureSince([]string{"nomad", "plan", "apply"}, time.Now())
|
2022-06-23 16:06:27 +00:00
|
|
|
defer close(indexCh)
|
2015-10-11 21:57:36 +00:00
|
|
|
|
|
|
|
// Wait for the plan to apply
|
2015-10-11 21:48:18 +00:00
|
|
|
if err := future.Error(); err != nil {
|
2018-09-15 23:23:13 +00:00
|
|
|
p.logger.Error("failed to apply plan", "error", err)
|
2015-10-11 21:57:36 +00:00
|
|
|
pending.respond(nil, err)
|
|
|
|
return
|
2015-10-11 21:48:18 +00:00
|
|
|
}
|
2015-10-11 21:57:36 +00:00
|
|
|
|
|
|
|
// Respond to the plan
|
2019-06-24 18:48:02 +00:00
|
|
|
index := future.Index()
|
|
|
|
result.AllocIndex = index
|
2016-02-22 19:43:41 +00:00
|
|
|
|
|
|
|
// If this is a partial plan application, we need to ensure the scheduler
|
|
|
|
// at least has visibility into any placements it made to avoid double placement.
|
|
|
|
// The RefreshIndex computed by evaluatePlan may be stale due to evaluation
|
|
|
|
// against an optimistic copy of the state.
|
|
|
|
if result.RefreshIndex != 0 {
|
|
|
|
result.RefreshIndex = maxUint64(result.RefreshIndex, result.AllocIndex)
|
|
|
|
}
|
2015-10-11 21:57:36 +00:00
|
|
|
pending.respond(result, nil)
|
2019-06-24 18:48:02 +00:00
|
|
|
indexCh <- index
|
2015-08-05 01:30:05 +00:00
|
|
|
}
|
|
|
|
|
2015-08-04 23:32:46 +00:00
|
|
|
// evaluatePlan is used to determine what portions of a plan
|
|
|
|
// can be applied if any. Returns if there should be a plan application
|
|
|
|
// which may be partial or if there was an error
|
2018-09-15 23:23:13 +00:00
|
|
|
func evaluatePlan(pool *EvaluatePool, snap *state.StateSnapshot, plan *structs.Plan, logger log.Logger) (*structs.PlanResult, error) {
|
2015-08-04 23:35:49 +00:00
|
|
|
defer metrics.MeasureSince([]string{"nomad", "plan", "evaluate"}, time.Now())
|
2015-08-05 01:10:57 +00:00
|
|
|
|
2021-05-27 13:11:50 +00:00
|
|
|
logger.Trace("evaluating plan", "plan", log.Fmt("%#v", plan))
|
|
|
|
|
2019-03-08 11:18:56 +00:00
|
|
|
// Denormalize without the job
|
2019-06-10 21:19:54 +00:00
|
|
|
err := snap.DenormalizeAllocationsMap(plan.NodeUpdate)
|
2019-03-04 09:49:32 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-03-08 11:18:56 +00:00
|
|
|
// Denormalize without the job
|
2019-06-10 21:19:54 +00:00
|
|
|
err = snap.DenormalizeAllocationsMap(plan.NodePreemptions)
|
2019-03-04 09:49:32 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2017-10-13 21:36:02 +00:00
|
|
|
// Check if the plan exceeds quota
|
|
|
|
overQuota, err := evaluatePlanQuota(snap, plan)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Reject the plan and force the scheduler to refresh
|
|
|
|
if overQuota {
|
|
|
|
index, err := refreshIndex(snap)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2018-09-15 23:23:13 +00:00
|
|
|
logger.Debug("plan for evaluation exceeds quota limit. Forcing state refresh", "eval_id", plan.EvalID, "refresh_index", index)
|
2017-10-13 21:36:02 +00:00
|
|
|
return &structs.PlanResult{RefreshIndex: index}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return evaluatePlanPlacements(pool, snap, plan, logger)
|
|
|
|
}
|
|
|
|
|
|
|
|
// evaluatePlanPlacements is used to determine what portions of a plan can be
|
|
|
|
// applied if any, looking for node over commitment. Returns if there should be
|
|
|
|
// a plan application which may be partial or if there was an error
|
2018-09-15 23:23:13 +00:00
|
|
|
func evaluatePlanPlacements(pool *EvaluatePool, snap *state.StateSnapshot, plan *structs.Plan, logger log.Logger) (*structs.PlanResult, error) {
|
2015-08-04 23:32:46 +00:00
|
|
|
// Create a result holder for the plan
|
|
|
|
result := &structs.PlanResult{
|
2017-07-06 04:26:04 +00:00
|
|
|
NodeUpdate: make(map[string][]*structs.Allocation),
|
|
|
|
NodeAllocation: make(map[string][]*structs.Allocation),
|
|
|
|
Deployment: plan.Deployment.Copy(),
|
|
|
|
DeploymentUpdates: plan.DeploymentUpdates,
|
2018-09-21 21:05:00 +00:00
|
|
|
NodePreemptions: make(map[string][]*structs.Allocation),
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
2015-08-26 00:36:52 +00:00
|
|
|
// Collect all the nodeIDs
|
|
|
|
nodeIDs := make(map[string]struct{})
|
2016-02-23 06:31:25 +00:00
|
|
|
nodeIDList := make([]string, 0, len(plan.NodeUpdate)+len(plan.NodeAllocation))
|
2015-08-26 00:36:52 +00:00
|
|
|
for nodeID := range plan.NodeUpdate {
|
2016-02-23 06:31:25 +00:00
|
|
|
if _, ok := nodeIDs[nodeID]; !ok {
|
|
|
|
nodeIDs[nodeID] = struct{}{}
|
|
|
|
nodeIDList = append(nodeIDList, nodeID)
|
|
|
|
}
|
2015-08-26 00:36:52 +00:00
|
|
|
}
|
2015-08-05 01:10:57 +00:00
|
|
|
for nodeID := range plan.NodeAllocation {
|
2016-02-23 06:31:25 +00:00
|
|
|
if _, ok := nodeIDs[nodeID]; !ok {
|
|
|
|
nodeIDs[nodeID] = struct{}{}
|
|
|
|
nodeIDList = append(nodeIDList, nodeID)
|
|
|
|
}
|
2015-08-26 00:36:52 +00:00
|
|
|
}
|
|
|
|
|
2016-02-20 21:12:14 +00:00
|
|
|
// Setup a multierror to handle potentially getting many
|
|
|
|
// errors since we are processing in parallel.
|
|
|
|
var mErr multierror.Error
|
2016-02-22 19:43:41 +00:00
|
|
|
partialCommit := false
|
2022-07-12 22:40:20 +00:00
|
|
|
rejectedNodes := make(map[string]struct{}, 0)
|
2016-02-20 21:12:14 +00:00
|
|
|
|
|
|
|
// handleResult is used to process the result of evaluateNodePlan
|
2017-07-14 00:14:02 +00:00
|
|
|
handleResult := func(nodeID string, fit bool, reason string, err error) (cancel bool) {
|
2015-08-05 01:10:57 +00:00
|
|
|
// Evaluate the plan for this node
|
2015-08-04 23:32:46 +00:00
|
|
|
if err != nil {
|
2016-02-20 21:12:14 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
return true
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
2015-08-05 01:10:57 +00:00
|
|
|
if !fit {
|
2022-01-15 01:09:14 +00:00
|
|
|
metrics.IncrCounterWithLabels([]string{"nomad", "plan", "node_rejected"}, 1, []metrics.Label{{Name: "node_id", Value: nodeID}})
|
|
|
|
|
2017-07-14 00:14:02 +00:00
|
|
|
// Log the reason why the node's allocations could not be made
|
|
|
|
if reason != "" {
|
2021-10-31 19:18:02 +00:00
|
|
|
//TODO This was debug level and should return
|
|
|
|
//to debug level in the future. However until
|
|
|
|
//https://github.com/hashicorp/nomad/issues/9506
|
|
|
|
//is resolved this log line is the only way to
|
|
|
|
//monitor the disagreement between workers and
|
|
|
|
//the plan applier.
|
2021-11-03 00:43:54 +00:00
|
|
|
logger.Info("plan for node rejected, refer to https://www.nomadproject.io/s/port-plan-failure for more information",
|
2022-05-05 08:56:40 +00:00
|
|
|
"node_id", nodeID, "reason", reason, "eval_id", plan.EvalID,
|
|
|
|
"namespace", plan.Job.Namespace)
|
2017-07-14 00:14:02 +00:00
|
|
|
}
|
2022-07-12 22:40:20 +00:00
|
|
|
// Set that this is a partial commit and store the node that was
|
|
|
|
// rejected so the plan applier can detect repeated plan rejections
|
|
|
|
// for the same node.
|
2016-02-22 19:43:41 +00:00
|
|
|
partialCommit = true
|
2022-07-12 22:40:20 +00:00
|
|
|
rejectedNodes[nodeID] = struct{}{}
|
2015-08-04 23:32:46 +00:00
|
|
|
|
|
|
|
// If we require all-at-once scheduling, there is no point
|
|
|
|
// to continue the evaluation, as we've already failed.
|
|
|
|
if plan.AllAtOnce {
|
2015-08-26 00:36:52 +00:00
|
|
|
result.NodeUpdate = nil
|
2015-08-05 01:30:05 +00:00
|
|
|
result.NodeAllocation = nil
|
2017-07-06 04:26:04 +00:00
|
|
|
result.DeploymentUpdates = nil
|
|
|
|
result.Deployment = nil
|
2018-09-21 21:05:00 +00:00
|
|
|
result.NodePreemptions = nil
|
2016-02-20 21:12:14 +00:00
|
|
|
return true
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Skip this node, since it cannot be used.
|
2016-02-20 21:12:14 +00:00
|
|
|
return
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Add this to the plan result
|
2015-08-26 00:36:52 +00:00
|
|
|
if nodeUpdate := plan.NodeUpdate[nodeID]; len(nodeUpdate) > 0 {
|
|
|
|
result.NodeUpdate[nodeID] = nodeUpdate
|
2015-08-07 16:37:45 +00:00
|
|
|
}
|
|
|
|
if nodeAlloc := plan.NodeAllocation[nodeID]; len(nodeAlloc) > 0 {
|
|
|
|
result.NodeAllocation[nodeID] = nodeAlloc
|
|
|
|
}
|
2018-09-21 21:05:00 +00:00
|
|
|
|
|
|
|
if nodePreemptions := plan.NodePreemptions[nodeID]; nodePreemptions != nil {
|
2018-11-02 01:06:32 +00:00
|
|
|
|
2018-09-21 21:05:00 +00:00
|
|
|
// Do a pass over preempted allocs in the plan to check
|
|
|
|
// whether the alloc is already in a terminal state
|
2018-11-02 01:06:32 +00:00
|
|
|
var filteredNodePreemptions []*structs.Allocation
|
2018-09-21 21:05:00 +00:00
|
|
|
for _, preemptedAlloc := range nodePreemptions {
|
|
|
|
alloc, err := snap.AllocByID(nil, preemptedAlloc.ID)
|
|
|
|
if err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
2018-10-18 04:06:53 +00:00
|
|
|
continue
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
2018-10-18 04:06:53 +00:00
|
|
|
if alloc != nil && !alloc.TerminalStatus() {
|
|
|
|
filteredNodePreemptions = append(filteredNodePreemptions, preemptedAlloc)
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
|
|
|
}
|
2018-10-18 04:06:53 +00:00
|
|
|
|
2018-09-21 21:05:00 +00:00
|
|
|
result.NodePreemptions[nodeID] = filteredNodePreemptions
|
|
|
|
}
|
|
|
|
|
2016-02-20 21:12:14 +00:00
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the pool channels
|
|
|
|
req := pool.RequestCh()
|
|
|
|
resp := pool.ResultCh()
|
|
|
|
outstanding := 0
|
|
|
|
didCancel := false
|
|
|
|
|
2018-03-11 18:01:29 +00:00
|
|
|
// Evaluate each node in the plan, handling results as they are ready to
|
2016-02-23 06:31:25 +00:00
|
|
|
// avoid blocking.
|
2017-04-10 21:56:21 +00:00
|
|
|
OUTER:
|
2016-02-23 06:31:25 +00:00
|
|
|
for len(nodeIDList) > 0 {
|
|
|
|
nodeID := nodeIDList[0]
|
2016-02-20 21:12:14 +00:00
|
|
|
select {
|
|
|
|
case req <- evaluateRequest{snap, plan, nodeID}:
|
|
|
|
outstanding++
|
2016-02-23 06:31:25 +00:00
|
|
|
nodeIDList = nodeIDList[1:]
|
2016-02-20 21:12:14 +00:00
|
|
|
case r := <-resp:
|
|
|
|
outstanding--
|
2016-02-20 21:41:49 +00:00
|
|
|
|
|
|
|
// Handle a result that allows us to cancel evaluation,
|
|
|
|
// which may save time processing additional entries.
|
2017-07-14 00:14:02 +00:00
|
|
|
if cancel := handleResult(r.nodeID, r.fit, r.reason, r.err); cancel {
|
2016-02-20 21:12:14 +00:00
|
|
|
didCancel = true
|
2017-04-10 21:56:21 +00:00
|
|
|
break OUTER
|
2016-02-20 21:12:14 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Drain the remaining results
|
|
|
|
for outstanding > 0 {
|
|
|
|
r := <-resp
|
|
|
|
if !didCancel {
|
2017-07-14 00:14:02 +00:00
|
|
|
if cancel := handleResult(r.nodeID, r.fit, r.reason, r.err); cancel {
|
2016-02-20 21:12:14 +00:00
|
|
|
didCancel = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
outstanding--
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
2016-02-22 19:43:41 +00:00
|
|
|
|
|
|
|
// If the plan resulted in a partial commit, we need to determine
|
|
|
|
// a minimum refresh index to force the scheduler to work on a more
|
|
|
|
// up-to-date state to avoid the failures.
|
|
|
|
if partialCommit {
|
2017-10-13 21:36:02 +00:00
|
|
|
index, err := refreshIndex(snap)
|
2016-02-22 19:43:41 +00:00
|
|
|
if err != nil {
|
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2017-10-13 21:36:02 +00:00
|
|
|
result.RefreshIndex = index
|
2016-02-22 21:03:40 +00:00
|
|
|
|
|
|
|
if result.RefreshIndex == 0 {
|
2017-10-13 21:36:02 +00:00
|
|
|
err := fmt.Errorf("partialCommit with RefreshIndex of 0")
|
2016-02-22 21:03:40 +00:00
|
|
|
mErr.Errors = append(mErr.Errors, err)
|
|
|
|
}
|
2017-07-06 04:26:04 +00:00
|
|
|
|
|
|
|
// If there was a partial commit and we are operating within a
|
|
|
|
// deployment correct for any canary that may have been desired to be
|
|
|
|
// placed but wasn't actually placed
|
|
|
|
correctDeploymentCanaries(result)
|
2016-02-22 19:43:41 +00:00
|
|
|
}
|
2022-07-12 22:40:20 +00:00
|
|
|
|
|
|
|
for n := range rejectedNodes {
|
|
|
|
result.RejectedNodes = append(result.RejectedNodes, n)
|
|
|
|
}
|
2016-02-20 21:12:14 +00:00
|
|
|
return result, mErr.ErrorOrNil()
|
2015-08-04 23:32:46 +00:00
|
|
|
}
|
|
|
|
|
2017-07-06 04:26:04 +00:00
|
|
|
// correctDeploymentCanaries ensures that the deployment object doesn't list any
|
|
|
|
// canaries as placed if they didn't actually get placed. This could happen if
|
|
|
|
// the plan had a partial commit.
|
|
|
|
func correctDeploymentCanaries(result *structs.PlanResult) {
|
|
|
|
// Hot path
|
|
|
|
if result.Deployment == nil || !result.Deployment.HasPlacedCanaries() {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build a set of all the allocations IDs that were placed
|
|
|
|
placedAllocs := make(map[string]struct{}, len(result.NodeAllocation))
|
|
|
|
for _, placed := range result.NodeAllocation {
|
|
|
|
for _, alloc := range placed {
|
|
|
|
placedAllocs[alloc.ID] = struct{}{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Go through all the canaries and ensure that the result list only contains
|
|
|
|
// those that have been placed
|
|
|
|
for _, group := range result.Deployment.TaskGroups {
|
|
|
|
canaries := group.PlacedCanaries
|
|
|
|
if len(canaries) == 0 {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Prune the canaries in place to avoid allocating an extra slice
|
|
|
|
i := 0
|
|
|
|
for _, canaryID := range canaries {
|
|
|
|
if _, ok := placedAllocs[canaryID]; ok {
|
|
|
|
canaries[i] = canaryID
|
|
|
|
i++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
group.PlacedCanaries = canaries[:i]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-16 14:55:35 +00:00
|
|
|
// evaluateNodePlan is used to evaluate the plan for a single node,
|
2015-08-05 01:10:57 +00:00
|
|
|
// returning if the plan is valid or if an error is encountered
|
2017-07-14 00:14:02 +00:00
|
|
|
func evaluateNodePlan(snap *state.StateSnapshot, plan *structs.Plan, nodeID string) (bool, string, error) {
|
2015-08-07 16:37:45 +00:00
|
|
|
// If this is an evict-only plan, it always 'fits' since we are removing things.
|
|
|
|
if len(plan.NodeAllocation[nodeID]) == 0 {
|
2017-07-14 00:14:02 +00:00
|
|
|
return true, "", nil
|
2015-08-07 16:37:45 +00:00
|
|
|
}
|
|
|
|
|
2015-08-05 01:10:57 +00:00
|
|
|
// Get the node itself
|
2017-02-08 04:31:23 +00:00
|
|
|
ws := memdb.NewWatchSet()
|
|
|
|
node, err := snap.NodeByID(ws, nodeID)
|
2015-08-05 01:10:57 +00:00
|
|
|
if err != nil {
|
2017-07-14 00:14:02 +00:00
|
|
|
return false, "", fmt.Errorf("failed to get node '%s': %v", nodeID, err)
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
|
|
|
|
2018-03-11 18:53:11 +00:00
|
|
|
// If the node does not exist or is not ready for scheduling it is not fit
|
2015-08-16 01:03:05 +00:00
|
|
|
// XXX: There is a potential race between when we do this check and when
|
|
|
|
// the Raft commit happens.
|
2017-07-14 00:14:02 +00:00
|
|
|
if node == nil {
|
|
|
|
return false, "node does not exist", nil
|
2022-02-22 11:14:00 +00:00
|
|
|
} else if node.Status == structs.NodeStatusDisconnected {
|
|
|
|
if isValidForDisconnectedNode(plan, node.ID) {
|
|
|
|
return true, "", nil
|
|
|
|
}
|
|
|
|
return false, "node is disconnected and contains invalid updates", nil
|
2017-07-14 00:14:02 +00:00
|
|
|
} else if node.Status != structs.NodeStatusReady {
|
|
|
|
return false, "node is not ready for placements", nil
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
|
|
|
|
2016-02-20 19:26:38 +00:00
|
|
|
// Get the existing allocations that are non-terminal
|
2017-02-08 04:31:23 +00:00
|
|
|
existingAlloc, err := snap.AllocsByNodeTerminal(ws, nodeID, false)
|
2015-08-05 01:10:57 +00:00
|
|
|
if err != nil {
|
2017-07-14 00:14:02 +00:00
|
|
|
return false, "", fmt.Errorf("failed to get existing allocations for '%s': %v", nodeID, err)
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
|
|
|
|
2022-04-06 15:30:40 +00:00
|
|
|
// If nodeAllocations is a subset of the existing allocations we can continue,
|
|
|
|
// even if the node is not eligible, as only in-place updates or stop/evict are performed
|
|
|
|
if structs.AllocSubset(existingAlloc, plan.NodeAllocation[nodeID]) {
|
|
|
|
return true, "", nil
|
|
|
|
}
|
|
|
|
if node.SchedulingEligibility == structs.NodeSchedulingIneligible {
|
|
|
|
return false, "node is not eligible", nil
|
|
|
|
}
|
|
|
|
|
2015-08-05 01:10:57 +00:00
|
|
|
// Determine the proposed allocation by first removing allocations
|
|
|
|
// that are planned evictions and adding the new allocations.
|
2015-08-26 00:36:52 +00:00
|
|
|
var remove []*structs.Allocation
|
|
|
|
if update := plan.NodeUpdate[nodeID]; len(update) > 0 {
|
|
|
|
remove = append(remove, update...)
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
2018-09-21 21:05:00 +00:00
|
|
|
|
|
|
|
// Remove any preempted allocs
|
|
|
|
if preempted := plan.NodePreemptions[nodeID]; len(preempted) > 0 {
|
2019-03-04 09:49:32 +00:00
|
|
|
remove = append(remove, preempted...)
|
2018-09-21 21:05:00 +00:00
|
|
|
}
|
|
|
|
|
2015-08-23 02:37:21 +00:00
|
|
|
if updated := plan.NodeAllocation[nodeID]; len(updated) > 0 {
|
2019-03-04 09:49:32 +00:00
|
|
|
remove = append(remove, updated...)
|
2015-08-23 02:37:21 +00:00
|
|
|
}
|
2017-09-26 22:26:33 +00:00
|
|
|
proposed := structs.RemoveAllocs(existingAlloc, remove)
|
2015-08-05 01:10:57 +00:00
|
|
|
proposed = append(proposed, plan.NodeAllocation[nodeID]...)
|
|
|
|
|
|
|
|
// Check if these allocations fit
|
2018-10-17 22:03:38 +00:00
|
|
|
fit, reason, _, err := structs.AllocsFit(node, proposed, nil, true)
|
2017-07-14 00:14:02 +00:00
|
|
|
return fit, reason, err
|
2015-08-05 01:10:57 +00:00
|
|
|
}
|
2019-06-24 18:48:02 +00:00
|
|
|
|
2022-02-22 11:14:00 +00:00
|
|
|
// The plan is only valid for disconnected nodes if it only contains
|
|
|
|
// updates to mark allocations as unknown.
|
|
|
|
func isValidForDisconnectedNode(plan *structs.Plan, nodeID string) bool {
|
|
|
|
for _, alloc := range plan.NodeAllocation[nodeID] {
|
|
|
|
if alloc.ClientStatus != structs.AllocClientStatusUnknown {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true
|
|
|
|
}
|