589 lines
17 KiB
Go
589 lines
17 KiB
Go
package scheduler
|
|
|
|
import (
|
|
"fmt"
|
|
"sort"
|
|
|
|
memdb "github.com/hashicorp/go-memdb"
|
|
"github.com/hashicorp/nomad/helper"
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
|
)
|
|
|
|
type allocReconciler struct {
|
|
// ctx gives access to the state store and logger
|
|
ctx Context
|
|
|
|
// stack allows checking for the ability to do an in-place update
|
|
stack Stack
|
|
|
|
// batch marks whether the job is a batch job
|
|
batch bool
|
|
|
|
// eval is the evaluation triggering the scheduling event
|
|
eval *structs.Evaluation
|
|
|
|
// job is the job being operated on, it may be nil if the job is being
|
|
// stopped via a purge
|
|
job *structs.Job
|
|
|
|
// deployment is the current deployment for the job
|
|
deployment *structs.Deployment
|
|
|
|
// deploymentPaused marks whether the deployment is paused
|
|
deploymentPaused bool
|
|
|
|
// groupUpdateStrategy maps task groups to their update strategy
|
|
groupUpdateStrategy map[string]*structs.UpdateStrategy
|
|
|
|
// taintedNodes contains a map of nodes that are tainted
|
|
taintedNodes map[string]*structs.Node
|
|
|
|
// existingAllocs is non-terminal existing allocations
|
|
existingAllocs []*structs.Allocation
|
|
|
|
// result is the results of the reconcile. During computation it can be
|
|
// used to store intermediate state
|
|
result *reconcileResults
|
|
}
|
|
|
|
type reconcileResults struct {
|
|
createDeployment *structs.Deployment
|
|
deploymentUpdates []*structs.DeploymentStatusUpdate
|
|
|
|
place []allocPlaceResult
|
|
inplaceUpdate []*structs.Allocation
|
|
stop []allocStopResult
|
|
|
|
// TODO track the desired of the deployment
|
|
}
|
|
|
|
type allocPlaceResult struct {
|
|
name string
|
|
canary bool
|
|
taskGroup *structs.TaskGroup
|
|
previousAlloc *structs.Allocation
|
|
}
|
|
|
|
type allocStopResult struct {
|
|
alloc *structs.Allocation
|
|
clientStatus string
|
|
statusDescription string
|
|
}
|
|
|
|
func NewAllocReconciler(ctx Context, stack Stack, batch bool,
|
|
eval *structs.Evaluation, job *structs.Job, deployment *structs.Deployment,
|
|
existingAllocs []*structs.Allocation, taintedNodes map[string]*structs.Node) *allocReconciler {
|
|
|
|
a := &allocReconciler{
|
|
ctx: ctx,
|
|
stack: stack,
|
|
eval: eval,
|
|
batch: batch,
|
|
job: job,
|
|
deployment: deployment,
|
|
existingAllocs: existingAllocs,
|
|
taintedNodes: taintedNodes,
|
|
result: new(reconcileResults),
|
|
}
|
|
|
|
if deployment != nil {
|
|
a.deploymentPaused = deployment.Status == structs.DeploymentStatusPaused
|
|
}
|
|
|
|
// Determine the update strategy for each group
|
|
if job != nil {
|
|
a.groupUpdateStrategy = make(map[string]*structs.UpdateStrategy)
|
|
for _, tg := range job.TaskGroups {
|
|
if u := tg.Update; u != nil {
|
|
a.groupUpdateStrategy[tg.Name] = u
|
|
}
|
|
}
|
|
}
|
|
|
|
return a
|
|
}
|
|
|
|
func (a *allocReconciler) Compute() *reconcileResults {
|
|
// If we are just stopping a job we do not need to do anything more than
|
|
// stopping all running allocs
|
|
if a.job == nil || a.job.Stop {
|
|
a.handleStop()
|
|
|
|
// Cancel the deployment since it is not needed
|
|
if a.deployment != nil {
|
|
a.result.deploymentUpdates = append(a.result.deploymentUpdates, &structs.DeploymentStatusUpdate{
|
|
DeploymentID: a.deployment.ID,
|
|
Status: structs.DeploymentStatusCancelled,
|
|
StatusDescription: structs.DeploymentStatusDescriptionStoppedJob,
|
|
})
|
|
}
|
|
|
|
return a.result
|
|
}
|
|
|
|
m := newAllocMatrix(a.job, a.existingAllocs)
|
|
for group, as := range m {
|
|
a.computeGroup(group, as)
|
|
}
|
|
|
|
return a.result
|
|
}
|
|
|
|
// handleStop marks all allocations to be stopped, handling the lost case
|
|
func (a *allocReconciler) handleStop() {
|
|
as := newAllocSet(a.existingAllocs)
|
|
untainted, migrate, lost := as.filterByTainted(a.taintedNodes)
|
|
a.markStop(untainted, "", allocNotNeeded)
|
|
a.markStop(migrate, "", allocNotNeeded)
|
|
a.markStop(lost, structs.AllocClientStatusLost, allocLost)
|
|
}
|
|
|
|
func (a *allocReconciler) markStop(allocs allocSet, clientStatus, statusDescription string) {
|
|
for _, alloc := range allocs {
|
|
a.result.stop = append(a.result.stop, allocStopResult{
|
|
alloc: alloc,
|
|
clientStatus: clientStatus,
|
|
statusDescription: statusDescription,
|
|
})
|
|
}
|
|
}
|
|
|
|
func (a *allocReconciler) computeGroup(group string, as allocSet) {
|
|
// Get the task group. The task group may be nil if the job was updates such
|
|
// that the task group no longer exists
|
|
tg := a.job.LookupTaskGroup(group)
|
|
|
|
// Determine what set of alloations are on tainted nodes
|
|
untainted, migrate, lost := as.filterByTainted(a.taintedNodes)
|
|
|
|
a.ctx.Logger().Printf("RECONCILER -- untainted (%d); migrate (%d); lost (%d)", len(untainted), len(migrate), len(lost))
|
|
a.ctx.Logger().Printf("RECONCILER -- untainted %#v", untainted)
|
|
|
|
// If the task group is nil, then the task group has been removed so all we
|
|
// need to do is stop everything
|
|
if tg == nil {
|
|
a.ctx.Logger().Printf("RECONCILER -- STOPPING ALL")
|
|
a.markStop(untainted, "", allocNotNeeded)
|
|
a.markStop(migrate, "", allocNotNeeded)
|
|
a.markStop(lost, structs.AllocClientStatusLost, allocLost)
|
|
return
|
|
}
|
|
|
|
// Get the deployment state for the group
|
|
var dstate *structs.DeploymentState
|
|
if a.deployment != nil {
|
|
dstate = a.deployment.TaskGroups[group]
|
|
}
|
|
|
|
// Mark all lost allocations for stop. Previous allocation doesn't matter
|
|
// here since it is on a lost node
|
|
for _, alloc := range lost {
|
|
a.result.stop = append(a.result.stop, allocStopResult{
|
|
alloc: alloc,
|
|
clientStatus: structs.AllocClientStatusLost,
|
|
statusDescription: allocLost,
|
|
})
|
|
}
|
|
|
|
// Get any existing canaries
|
|
canaries := untainted.filterByCanary()
|
|
|
|
// Cancel any canary from a prior deployment
|
|
if len(canaries) != 0 {
|
|
if a.deployment != nil {
|
|
current, older := canaries.filterByDeployment(a.deployment.ID)
|
|
a.markStop(older, "", allocNotNeeded)
|
|
|
|
a.ctx.Logger().Printf("RECONCILER -- older canaries %#v", older)
|
|
a.ctx.Logger().Printf("RECONCILER -- current canaries %#v", current)
|
|
|
|
untainted = untainted.difference(older, current)
|
|
canaries = current
|
|
a.ctx.Logger().Printf("RECONCILER -- untainted - remove canaries %#v", untainted)
|
|
} else {
|
|
// We don't need any of those canaries since there no longer is a
|
|
// deployment
|
|
a.markStop(canaries, "", allocNotNeeded)
|
|
untainted = untainted.difference(canaries)
|
|
canaries = nil
|
|
a.ctx.Logger().Printf("RECONCILER -- untainted - remove canaries %#v", untainted)
|
|
}
|
|
}
|
|
|
|
// Stop any unneeded allocations and update the untainted set to not
|
|
// included stopped allocations
|
|
keep, stop := a.computeStop(tg, untainted)
|
|
a.markStop(stop, "", allocNotNeeded)
|
|
untainted = keep
|
|
|
|
a.ctx.Logger().Printf("RECONCILER -- Stopping (%d); Untainted (%d)", len(stop), len(keep))
|
|
a.ctx.Logger().Printf("RECONCILER -- stopping %#v", stop)
|
|
a.ctx.Logger().Printf("RECONCILER -- untainted %#v", untainted)
|
|
|
|
// Do inplace upgrades where possible and capture the set of upgrades that
|
|
// need to be done destructively.
|
|
_, inplace, destructive := a.computeUpdates(tg, untainted)
|
|
a.ctx.Logger().Printf("RECONCILER -- Inplace (%d); Destructive (%d)", len(inplace), len(destructive))
|
|
|
|
// XXX Not clear if this is needed
|
|
// Update untainted so that it contains all existing allocations that have
|
|
// been inplace updated or do not have to be updated and does not include
|
|
// any canaries.
|
|
//untainted = untainted.difference(destructive)
|
|
//a.ctx.Logger().Printf("RECONCILER -- untainted %#v", untainted)
|
|
|
|
// Get the update strategy of the group
|
|
strategy, update := a.groupUpdateStrategy[group]
|
|
|
|
// XXX need a structure for picking names
|
|
|
|
// The fact that we have destructive updates and have less canaries than is
|
|
// desired means we need to create canaries
|
|
requireCanary := len(destructive) != 0 && update && strategy.Canary != 0 && len(canaries) < strategy.Canary
|
|
if requireCanary && !a.deploymentPaused {
|
|
a.ctx.Logger().Printf("RECONCILER -- Canary (%d)", strategy.Canary-len(canaries))
|
|
for i := len(canaries); i < strategy.Canary; i++ {
|
|
a.result.place = append(a.result.place, allocPlaceResult{
|
|
// XXX Pick better name
|
|
name: structs.GenerateUUID(),
|
|
canary: true,
|
|
taskGroup: tg,
|
|
})
|
|
}
|
|
}
|
|
|
|
// Determine how many we can place
|
|
limit := tg.Count
|
|
if update {
|
|
// XXX This is wrong. Need to detect health first. Probably only within
|
|
// the truly untainted set
|
|
limit = strategy.MaxParallel
|
|
}
|
|
a.ctx.Logger().Printf("RECONCILER -- LIMIT %v", limit)
|
|
|
|
// Place if:
|
|
// * The deployment is not paused
|
|
// * Not placing any canaries
|
|
// * If there are any canaries that they have been promoted
|
|
existingCanariesPromoted := dstate == nil || dstate.DesiredCanaries == 0 || dstate.Promoted
|
|
canPlace := !a.deploymentPaused && !requireCanary && existingCanariesPromoted
|
|
a.ctx.Logger().Printf("RECONCILER -- CAN PLACE %v", canPlace)
|
|
if canPlace {
|
|
// Place all new allocations
|
|
place := a.computePlacements(tg, untainted, destructive)
|
|
a.ctx.Logger().Printf("RECONCILER -- Placing (%d)", len(place))
|
|
for _, p := range place {
|
|
a.result.place = append(a.result.place, p)
|
|
}
|
|
|
|
// Do all destructive updates
|
|
min := helper.IntMin(len(destructive), limit)
|
|
i := 0
|
|
a.ctx.Logger().Printf("RECONCILER -- Destructive Updating (%d)", min)
|
|
for _, alloc := range destructive {
|
|
if i == min {
|
|
break
|
|
}
|
|
i++
|
|
|
|
a.result.stop = append(a.result.stop, allocStopResult{
|
|
alloc: alloc,
|
|
statusDescription: allocUpdating,
|
|
})
|
|
a.result.place = append(a.result.place, allocPlaceResult{
|
|
name: alloc.Name,
|
|
taskGroup: tg,
|
|
previousAlloc: alloc,
|
|
})
|
|
}
|
|
limit -= min
|
|
}
|
|
|
|
// Migrations should be done under the rolling update strategy, however we
|
|
// do not abide by the paused state of the deployment since this could block
|
|
// node draining.
|
|
min := helper.IntMin(len(migrate), limit)
|
|
i := 0
|
|
a.ctx.Logger().Printf("RECONCILER -- Migrating (%d)", min)
|
|
for _, alloc := range migrate {
|
|
if i == min {
|
|
break
|
|
}
|
|
i++
|
|
|
|
a.result.stop = append(a.result.stop, allocStopResult{
|
|
alloc: alloc,
|
|
statusDescription: allocMigrating,
|
|
})
|
|
a.result.place = append(a.result.place, allocPlaceResult{
|
|
name: alloc.Name,
|
|
canary: false,
|
|
taskGroup: tg,
|
|
previousAlloc: alloc,
|
|
})
|
|
}
|
|
}
|
|
|
|
func (a *allocReconciler) computePlacements(group *structs.TaskGroup, untainted, destructiveUpdates allocSet) []allocPlaceResult {
|
|
// Hot path the nothing to do case
|
|
existing := len(untainted) + len(destructiveUpdates)
|
|
if existing == group.Count {
|
|
return nil
|
|
}
|
|
|
|
// XXX need to pick better names
|
|
var place []allocPlaceResult
|
|
for i := existing; i < group.Count; i++ {
|
|
place = append(place, allocPlaceResult{
|
|
name: structs.GenerateUUID(),
|
|
taskGroup: group,
|
|
})
|
|
}
|
|
|
|
return place
|
|
}
|
|
|
|
func (a *allocReconciler) computeStop(group *structs.TaskGroup, untainted allocSet) (keep, stop allocSet) {
|
|
// Hot path the nothing to do case
|
|
if len(untainted) <= group.Count {
|
|
return untainted, nil
|
|
}
|
|
|
|
// XXX Sort doesn't actually do the right thing "foo.bar[11]" < "foo.bar[3]"
|
|
// TODO make name tree
|
|
names := make([]string, 0, len(untainted))
|
|
for name := range untainted {
|
|
names = append(names, name)
|
|
}
|
|
sort.Strings(names)
|
|
|
|
keep = make(map[string]*structs.Allocation)
|
|
stop = make(map[string]*structs.Allocation)
|
|
|
|
for i, name := range names {
|
|
a := untainted[name]
|
|
if i < group.Count {
|
|
keep[a.Name] = a
|
|
} else {
|
|
stop[a.Name] = a
|
|
}
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func (a *allocReconciler) computeUpdates(group *structs.TaskGroup, untainted allocSet) (ignore, inplace, destructive allocSet) {
|
|
// Determine the set of allocations that need to be updated
|
|
ignore = make(map[string]*structs.Allocation)
|
|
inplace = make(map[string]*structs.Allocation)
|
|
destructive = make(map[string]*structs.Allocation)
|
|
|
|
ws := memdb.NewWatchSet()
|
|
for _, alloc := range untainted {
|
|
if alloc.Job.JobModifyIndex == a.job.JobModifyIndex {
|
|
ignore[alloc.ID] = alloc
|
|
continue
|
|
}
|
|
|
|
// Check if the task drivers or config has changed, requires
|
|
// a destructive upgrade since that cannot be done in-place.
|
|
if tasksUpdated(a.job, alloc.Job, group.Name) {
|
|
destructive[alloc.ID] = alloc
|
|
continue
|
|
}
|
|
|
|
// Terminal batch allocations are not filtered when they are completed
|
|
// successfully. We should avoid adding the allocation to the plan in
|
|
// the case that it is an in-place update to avoid both additional data
|
|
// in the plan and work for the clients.
|
|
if alloc.TerminalStatus() {
|
|
ignore[alloc.ID] = alloc
|
|
continue
|
|
}
|
|
|
|
// Get the existing node
|
|
node, err := a.ctx.State().NodeByID(ws, alloc.NodeID)
|
|
if err != nil {
|
|
a.ctx.Logger().Printf("[ERR] sched: %#v failed to get node '%s': %v", a.eval, alloc.NodeID, err)
|
|
continue
|
|
}
|
|
if node == nil {
|
|
destructive[alloc.ID] = alloc
|
|
continue
|
|
}
|
|
|
|
// Set the existing node as the base set
|
|
a.stack.SetNodes([]*structs.Node{node})
|
|
|
|
// Stage an eviction of the current allocation. This is done so that
|
|
// the current allocation is discounted when checking for feasability.
|
|
// Otherwise we would be trying to fit the tasks current resources and
|
|
// updated resources. After select is called we can remove the evict.
|
|
a.ctx.Plan().AppendUpdate(alloc, structs.AllocDesiredStatusStop, allocInPlace, "")
|
|
|
|
// Attempt to match the task group
|
|
option, _ := a.stack.Select(group)
|
|
|
|
// Pop the allocation
|
|
a.ctx.Plan().PopUpdate(alloc)
|
|
|
|
// Skip if we could not do an in-place update
|
|
if option == nil {
|
|
destructive[alloc.ID] = alloc
|
|
continue
|
|
}
|
|
|
|
// Restore the network offers from the existing allocation.
|
|
// We do not allow network resources (reserved/dynamic ports)
|
|
// to be updated. This is guarded in taskUpdated, so we can
|
|
// safely restore those here.
|
|
for task, resources := range option.TaskResources {
|
|
existing := alloc.TaskResources[task]
|
|
resources.Networks = existing.Networks
|
|
}
|
|
|
|
// Create a shallow copy
|
|
newAlloc := new(structs.Allocation)
|
|
*newAlloc = *alloc
|
|
|
|
// Update the allocation
|
|
newAlloc.EvalID = a.eval.ID
|
|
newAlloc.Job = nil // Use the Job in the Plan
|
|
newAlloc.Resources = nil // Computed in Plan Apply
|
|
newAlloc.TaskResources = option.TaskResources
|
|
newAlloc.Metrics = a.ctx.Metrics()
|
|
|
|
// Add this to the result and the tracking allocSet
|
|
inplace[alloc.ID] = alloc
|
|
a.result.inplaceUpdate = append(a.result.inplaceUpdate, newAlloc)
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
type allocMatrix map[string]allocSet
|
|
|
|
func newAllocMatrix(job *structs.Job, allocs []*structs.Allocation) allocMatrix {
|
|
m := allocMatrix(make(map[string]allocSet))
|
|
for _, a := range allocs {
|
|
s, ok := m[a.TaskGroup]
|
|
if !ok {
|
|
s = make(map[string]*structs.Allocation)
|
|
m[a.TaskGroup] = s
|
|
}
|
|
s[a.ID] = a
|
|
}
|
|
for _, tg := range job.TaskGroups {
|
|
s, ok := m[tg.Name]
|
|
if !ok {
|
|
s = make(map[string]*structs.Allocation)
|
|
m[tg.Name] = s
|
|
}
|
|
}
|
|
return m
|
|
}
|
|
|
|
type allocSet map[string]*structs.Allocation
|
|
|
|
func (a allocSet) GoString() string {
|
|
if len(a) == 0 {
|
|
return "[]"
|
|
}
|
|
|
|
start := fmt.Sprintf("len(%d) [\n", len(a))
|
|
for k := range a {
|
|
start += k + ",\n"
|
|
}
|
|
return start + "]"
|
|
}
|
|
|
|
func newAllocSet(allocs []*structs.Allocation) allocSet {
|
|
s := make(map[string]*structs.Allocation, len(allocs))
|
|
for _, a := range allocs {
|
|
s[a.ID] = a
|
|
}
|
|
return s
|
|
}
|
|
|
|
func (a allocSet) difference(others ...allocSet) allocSet {
|
|
diff := make(map[string]*structs.Allocation)
|
|
OUTER:
|
|
for k, v := range a {
|
|
for _, other := range others {
|
|
if _, ok := other[k]; ok {
|
|
continue OUTER
|
|
}
|
|
}
|
|
diff[k] = v
|
|
}
|
|
return diff
|
|
}
|
|
|
|
func (a allocSet) filterByTainted(nodes map[string]*structs.Node) (untainted, migrate, lost allocSet) {
|
|
untainted = make(map[string]*structs.Allocation)
|
|
migrate = make(map[string]*structs.Allocation)
|
|
lost = make(map[string]*structs.Allocation)
|
|
for _, alloc := range a {
|
|
n, ok := nodes[alloc.NodeID]
|
|
switch {
|
|
case !ok:
|
|
untainted[alloc.ID] = alloc
|
|
case n == nil || n.TerminalStatus():
|
|
lost[alloc.ID] = alloc
|
|
default:
|
|
migrate[alloc.ID] = alloc
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func (a allocSet) filterByCanary() allocSet {
|
|
canaries := make(map[string]*structs.Allocation)
|
|
for _, alloc := range a {
|
|
if alloc.Canary {
|
|
canaries[alloc.ID] = alloc
|
|
}
|
|
}
|
|
return canaries
|
|
}
|
|
|
|
func (a allocSet) filterByDeployment(id string) (match, nonmatch allocSet) {
|
|
match = make(map[string]*structs.Allocation)
|
|
nonmatch = make(map[string]*structs.Allocation)
|
|
for _, alloc := range a {
|
|
if alloc.DeploymentID == id {
|
|
match[alloc.ID] = alloc
|
|
} else {
|
|
nonmatch[alloc.ID] = alloc
|
|
}
|
|
}
|
|
return
|
|
}
|
|
|
|
func (a allocSet) filterByDeploymentHealthy() allocSet {
|
|
healthy := make(map[string]*structs.Allocation)
|
|
for _, alloc := range a {
|
|
if alloc.DeploymentStatus != nil &&
|
|
alloc.DeploymentStatus.Healthy != nil &&
|
|
*alloc.DeploymentStatus.Healthy {
|
|
healthy[alloc.ID] = alloc
|
|
}
|
|
}
|
|
return healthy
|
|
}
|
|
|
|
func (a allocSet) filterByUpdateType(ctx Context, stack Stack, eval *structs.Evaluation,
|
|
job *structs.Job) (ignore, inplace, destructive allocSet) {
|
|
ignore = make(map[string]*structs.Allocation)
|
|
inplace = make(map[string]*structs.Allocation)
|
|
destructive = make(map[string]*structs.Allocation)
|
|
|
|
for _, alloc := range a {
|
|
if alloc.Job.JobModifyIndex == job.JobModifyIndex {
|
|
ignore[alloc.ID] = alloc
|
|
continue
|
|
}
|
|
}
|
|
return
|
|
}
|