Go to file
Michael Schurter e2544dd089
client: fix waiting on preempted alloc (#12779)
Fixes #10200

**The bug**

A user reported receiving the following error when an alloc was placed
that needed to preempt existing allocs:

```
[ERROR] client.alloc_watcher: error querying previous alloc:
alloc_id=28... previous_alloc=8e... error="rpc error: alloc lookup
failed: index error: UUID must be 36 characters"
```

The previous alloc (8e) was already complete on the client. This is
possible if an alloc stops *after* the scheduling decision was made to
preempt it, but *before* the node running both allocations was able to
pull and start the preemptor. While that is hopefully a narrow window of
time, you can expect it to occur in high throughput batch scheduling
heavy systems.

However the RPC error made no sense! `previous_alloc` in the logs was a
valid 36 character UUID!

**The fix**

The fix is:

```
-		prevAllocID:  c.Alloc.PreviousAllocation,
+		prevAllocID:  watchedAllocID,
```

The alloc watcher new func used for preemption improperly referenced
Alloc.PreviousAllocation instead of the passed in watchedAllocID. When
multiple allocs are preempted, a watcher is created for each with
watchedAllocID set properly by the caller. In this case
Alloc.PreviousAllocation="" -- which is where the `UUID must be 36 characters`
error was coming from! Sadly we were properly referencing
watchedAllocID in the log, so it made the error make no sense!

**The repro**

I was able to reproduce this with a dev agent with [preemption enabled](https://gist.github.com/schmichael/53f79cbd898afdfab76865ad8c7fc6a0#file-preempt-hcl)
and [lowered limits](https://gist.github.com/schmichael/53f79cbd898afdfab76865ad8c7fc6a0#file-limits-hcl)
for ease of repro.

First I started a [low priority count 3 job](https://gist.github.com/schmichael/53f79cbd898afdfab76865ad8c7fc6a0#file-preempt-lo-nomad),
then a [high priority job](https://gist.github.com/schmichael/53f79cbd898afdfab76865ad8c7fc6a0#file-preempt-hi-nomad)
that evicts 2 low priority jobs. Everything worked as expected.

However if I force it to use the [remotePrevAlloc implementation](https://github.com/hashicorp/nomad/blob/v1.3.0-beta.1/client/allocwatcher/alloc_watcher.go#L147),
it reproduces the bug because the watcher references PreviousAllocation
instead of watchedAllocID.
2022-04-26 13:14:43 -07:00
.changelog client: fix waiting on preempted alloc (#12779) 2022-04-26 13:14:43 -07:00
.circleci build: update golang to 1.17.9 2022-04-21 11:43:01 -05:00
.github build: update golang to 1.17.9 2022-04-21 11:43:01 -05:00
.release ci: change notification channel to feed-nomad-releases (#12550) 2022-04-11 19:12:58 -04:00
.semgrep ci: add semgrep rule to catch usage of invalid string extensions (#12509) 2022-04-08 10:58:32 -04:00
.tours
acl ci: swap ci parallelization for unconstrained gomaxprocs 2022-03-15 12:58:52 -05:00
api api: add ParseHCLOpts helper method (#12777) 2022-04-25 11:51:52 -07:00
ci ci: fixup task runner chroot test 2022-04-19 10:37:46 -05:00
client client: fix waiting on preempted alloc (#12779) 2022-04-26 13:14:43 -07:00
command vault: revert support for entity aliases (#12723) 2022-04-22 10:46:34 -04:00
contributing build: update golang to 1.17.9 2022-04-21 11:43:01 -05:00
demo scripts: fix interpreter for bash (#12549) 2022-04-12 10:08:21 -04:00
dev
drivers docker: back out cgroup v2 OOM detection (#12735) 2022-04-21 12:31:34 -04:00
e2e E2E: move volume mounts test to use golang's stdlib test runner (#12788) 2022-04-26 14:28:20 -04:00
helper test: test the buffered pipe used by nsd (#12563) 2022-04-14 08:38:25 -07:00
integrations
internal/testing/apitests ci: swap ci parallelization for unconstrained gomaxprocs 2022-03-15 12:58:52 -05:00
jobspec vault: revert support for entity aliases (#12723) 2022-04-22 10:46:34 -04:00
jobspec2 ci: swap ci parallelization for unconstrained gomaxprocs 2022-03-15 12:58:52 -05:00
lib client: enable support for cgroups v2 2022-03-23 11:35:27 -05:00
nomad vault: revert support for entity aliases (#12723) 2022-04-22 10:46:34 -04:00
plugins ci: fixup task runner chroot test 2022-04-19 10:37:46 -05:00
scheduler CSI: plugin config updates should always be destructive (#12774) 2022-04-25 12:59:25 -04:00
scripts build: update golang version script to use .go-version file 2022-04-21 12:10:14 -05:00
terraform scripts: fix interpreter for bash (#12549) 2022-04-12 10:08:21 -04:00
testutil ci: swap ci parallelization for unconstrained gomaxprocs 2022-03-15 12:58:52 -05:00
tools ci: ensure package coverage of test-core 2022-04-14 19:04:06 -05:00
ui bug: fix filter and search (#12587) 2022-04-22 15:40:13 -04:00
version remove generated files and prepare for next release 2022-04-07 18:51:18 -04:00
website docs: update json jobs docs (#12766) 2022-04-22 15:57:27 -07:00
.gitattributes
.gitignore
.go-version build: update golang version script to use .go-version file 2022-04-21 12:10:14 -05:00
.golangci.yml cleanup: purge github.com/pkg/errors 2022-04-01 19:24:02 -05:00
.semgrepignore
CHANGELOG.md update ci.hcl, version.go and CHANGELOG to v1.3.0-beta.1 2022-04-07 16:13:49 -04:00
CODEOWNERS [Main] Onboard to CRT (#12276) 2022-04-06 11:47:02 -04:00
GNUmakefile update LAST_RELEASE comment to match new release branches structure (#12773) 2022-04-25 11:57:55 -04:00
LICENSE
README.md
Vagrantfile
build_linux_arm.go
go.mod E2E: remove old CLI for driving provisioning (#12787) 2022-04-26 13:43:25 -04:00
go.sum deps: update consul-template to v0.29.0 (#12747) 2022-04-22 09:58:54 -07:00
main.go raw_exec: make raw exec driver work with cgroups v2 2022-04-04 16:11:38 -05:00
main_test.go

README.md

Nomad Build Status Discuss

HashiCorp Nomad logo

Nomad is a simple and flexible workload orchestrator to deploy and manage containers (docker, podman), non-containerized applications (executable, Java), and virtual machines (qemu) across on-prem and clouds at scale.

Nomad is supported on Linux, Windows, and macOS. A commercial version of Nomad, Nomad Enterprise, is also available.

Nomad provides several key features:

  • Deploy Containers and Legacy Applications: Nomads flexibility as an orchestrator enables an organization to run containers, legacy, and batch applications together on the same infrastructure. Nomad brings core orchestration benefits to legacy applications without needing to containerize via pluggable task drivers.

  • Simple & Reliable: Nomad runs as a single binary and is entirely self contained - combining resource management and scheduling into a single system. Nomad does not require any external services for storage or coordination. Nomad automatically handles application, node, and driver failures. Nomad is distributed and resilient, using leader election and state replication to provide high availability in the event of failures.

  • Device Plugins & GPU Support: Nomad offers built-in support for GPU workloads such as machine learning (ML) and artificial intelligence (AI). Nomad uses device plugins to automatically detect and utilize resources from hardware devices such as GPU, FPGAs, and TPUs.

  • Federation for Multi-Region, Multi-Cloud: Nomad was designed to support infrastructure at a global scale. Nomad supports federation out-of-the-box and can deploy applications across multiple regions and clouds.

  • Proven Scalability: Nomad is optimistically concurrent, which increases throughput and reduces latency for workloads. Nomad has been proven to scale to clusters of 10K+ nodes in real-world production environments.

  • HashiCorp Ecosystem: Nomad integrates seamlessly with Terraform, Consul, Vault for provisioning, service discovery, and secrets management.

Quick Start

Testing

See Learn: Getting Started for instructions on setting up a local Nomad cluster for non-production use.

Optionally, find Terraform manifests for bringing up a development Nomad cluster on a public cloud in the terraform directory.

Production

See Learn: Nomad Reference Architecture for recommended practices and a reference architecture for production deployments.

Documentation

Full, comprehensive documentation is available on the Nomad website: https://www.nomadproject.io/docs

Guides are available on HashiCorp Learn.

Contributing

See the contributing directory for more developer documentation.