 f25770e48d
			
		
	
	f25770e48d
	
	
	
		
			
			This connects the new CRI ContainerCheckpoint RPC to the existing internal checkpoint functions. With this commit it is possible to checkpoint a container in Kubernetes using the Forensic Container Checkpointing KEP (#2008): # curl X POST "https://localhost:10250/checkpoint/namespace/podId/container" Which will result in containerd creating a checkpoint in the location specified by Kubernetes (usually /var/lib/kubelet/checkpoints). This is a Linux only feature because CRIU only exists on Linux. Rewritten with the help of Phil Estes. Signed-off-by: Phil Estes <estesp@gmail.com> Signed-off-by: Adrian Reber <areber@redhat.com>
		
			
				
	
	
		
			79 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			79 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
|    Copyright The containerd Authors.
 | |
| 
 | |
|    Licensed under the Apache License, Version 2.0 (the "License");
 | |
|    you may not use this file except in compliance with the License.
 | |
|    You may obtain a copy of the License at
 | |
| 
 | |
|        http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
|    Unless required by applicable law or agreed to in writing, software
 | |
|    distributed under the License is distributed on an "AS IS" BASIS,
 | |
|    WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|    See the License for the specific language governing permissions and
 | |
|    limitations under the License.
 | |
| */
 | |
| 
 | |
| package server
 | |
| 
 | |
| import (
 | |
| 	"github.com/docker/go-metrics"
 | |
| )
 | |
| 
 | |
| var (
 | |
| 	sandboxListTimer          metrics.Timer
 | |
| 	sandboxCreateNetworkTimer metrics.Timer
 | |
| 	sandboxDeleteNetwork      metrics.Timer
 | |
| 
 | |
| 	sandboxRuntimeCreateTimer metrics.LabeledTimer
 | |
| 	sandboxRuntimeStopTimer   metrics.LabeledTimer
 | |
| 	sandboxRemoveTimer        metrics.LabeledTimer
 | |
| 
 | |
| 	containerListTimer          metrics.Timer
 | |
| 	containerRemoveTimer        metrics.LabeledTimer
 | |
| 	containerCreateTimer        metrics.LabeledTimer
 | |
| 	containerStopTimer          metrics.LabeledTimer
 | |
| 	containerStartTimer         metrics.LabeledTimer
 | |
| 	containerEventsDroppedCount metrics.Counter
 | |
| 	containerCheckpointTimer    metrics.LabeledTimer
 | |
| 
 | |
| 	networkPluginOperations        metrics.LabeledCounter
 | |
| 	networkPluginOperationsErrors  metrics.LabeledCounter
 | |
| 	networkPluginOperationsLatency metrics.LabeledTimer
 | |
| )
 | |
| 
 | |
| func init() {
 | |
| 	// these CRI metrics record latencies for successful operations around a sandbox and container's lifecycle.
 | |
| 	ns := metrics.NewNamespace("containerd", "cri_sandboxed", nil)
 | |
| 
 | |
| 	sandboxListTimer = ns.NewTimer("sandbox_list", "time to list sandboxes")
 | |
| 	sandboxCreateNetworkTimer = ns.NewTimer("sandbox_create_network", "time to create the network for a sandbox")
 | |
| 	sandboxDeleteNetwork = ns.NewTimer("sandbox_delete_network", "time to delete a sandbox's network")
 | |
| 
 | |
| 	sandboxRuntimeCreateTimer = ns.NewLabeledTimer("sandbox_runtime_create", "time to create a sandbox in the runtime", "runtime")
 | |
| 	sandboxRuntimeStopTimer = ns.NewLabeledTimer("sandbox_runtime_stop", "time to stop a sandbox", "runtime")
 | |
| 	sandboxRemoveTimer = ns.NewLabeledTimer("sandbox_remove", "time to remove a sandbox", "runtime")
 | |
| 
 | |
| 	containerListTimer = ns.NewTimer("container_list", "time to list containers")
 | |
| 	containerRemoveTimer = ns.NewLabeledTimer("container_remove", "time to remove a container", "runtime")
 | |
| 	containerCreateTimer = ns.NewLabeledTimer("container_create", "time to create a container", "runtime")
 | |
| 	containerStopTimer = ns.NewLabeledTimer("container_stop", "time to stop a container", "runtime")
 | |
| 	containerStartTimer = ns.NewLabeledTimer("container_start", "time to start a container", "runtime")
 | |
| 	containerEventsDroppedCount = ns.NewCounter("container_events_dropped", "count container discarding event total from server start")
 | |
| 	containerCheckpointTimer = ns.NewLabeledTimer("container_checkpoint", "time to checkpoint a container", "runtime")
 | |
| 
 | |
| 	networkPluginOperations = ns.NewLabeledCounter("network_plugin_operations_total", "cumulative number of network plugin operations by operation type", "operation_type")
 | |
| 	networkPluginOperationsErrors = ns.NewLabeledCounter("network_plugin_operations_errors_total", "cumulative number of network plugin operations by operation type", "operation_type")
 | |
| 	networkPluginOperationsLatency = ns.NewLabeledTimer("network_plugin_operations_duration_seconds", "latency in seconds of network plugin operations. Broken down by operation type", "operation_type")
 | |
| 
 | |
| 	metrics.Register(ns)
 | |
| }
 | |
| 
 | |
| // for backwards compatibility with kubelet/dockershim metrics
 | |
| // https://github.com/containerd/containerd/issues/7801
 | |
| const (
 | |
| 	networkStatusOp   = "get_pod_network_status"
 | |
| 	networkSetUpOp    = "set_up_pod"
 | |
| 	networkTearDownOp = "tear_down_pod"
 | |
| )
 |