This connects the new CRI ContainerCheckpoint RPC to the existing internal checkpoint functions. With this commit it is possible to checkpoint a container in Kubernetes using the Forensic Container Checkpointing KEP (#2008): # curl X POST "https://localhost:10250/checkpoint/namespace/podId/container" Which will result in containerd creating a checkpoint in the location specified by Kubernetes (usually /var/lib/kubelet/checkpoints). This is a Linux only feature because CRIU only exists on Linux. Rewritten with the help of Phil Estes. Signed-off-by: Phil Estes <estesp@gmail.com> Signed-off-by: Adrian Reber <areber@redhat.com>
		
			
				
	
	
		
			79 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			79 lines
		
	
	
		
			3.7 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/*
 | 
						|
   Copyright The containerd Authors.
 | 
						|
 | 
						|
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
   you may not use this file except in compliance with the License.
 | 
						|
   You may obtain a copy of the License at
 | 
						|
 | 
						|
       http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
   Unless required by applicable law or agreed to in writing, software
 | 
						|
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
   See the License for the specific language governing permissions and
 | 
						|
   limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package server
 | 
						|
 | 
						|
import (
 | 
						|
	"github.com/docker/go-metrics"
 | 
						|
)
 | 
						|
 | 
						|
var (
 | 
						|
	sandboxListTimer          metrics.Timer
 | 
						|
	sandboxCreateNetworkTimer metrics.Timer
 | 
						|
	sandboxDeleteNetwork      metrics.Timer
 | 
						|
 | 
						|
	sandboxRuntimeCreateTimer metrics.LabeledTimer
 | 
						|
	sandboxRuntimeStopTimer   metrics.LabeledTimer
 | 
						|
	sandboxRemoveTimer        metrics.LabeledTimer
 | 
						|
 | 
						|
	containerListTimer          metrics.Timer
 | 
						|
	containerRemoveTimer        metrics.LabeledTimer
 | 
						|
	containerCreateTimer        metrics.LabeledTimer
 | 
						|
	containerStopTimer          metrics.LabeledTimer
 | 
						|
	containerStartTimer         metrics.LabeledTimer
 | 
						|
	containerEventsDroppedCount metrics.Counter
 | 
						|
	containerCheckpointTimer    metrics.LabeledTimer
 | 
						|
 | 
						|
	networkPluginOperations        metrics.LabeledCounter
 | 
						|
	networkPluginOperationsErrors  metrics.LabeledCounter
 | 
						|
	networkPluginOperationsLatency metrics.LabeledTimer
 | 
						|
)
 | 
						|
 | 
						|
func init() {
 | 
						|
	// these CRI metrics record latencies for successful operations around a sandbox and container's lifecycle.
 | 
						|
	ns := metrics.NewNamespace("containerd", "cri_sandboxed", nil)
 | 
						|
 | 
						|
	sandboxListTimer = ns.NewTimer("sandbox_list", "time to list sandboxes")
 | 
						|
	sandboxCreateNetworkTimer = ns.NewTimer("sandbox_create_network", "time to create the network for a sandbox")
 | 
						|
	sandboxDeleteNetwork = ns.NewTimer("sandbox_delete_network", "time to delete a sandbox's network")
 | 
						|
 | 
						|
	sandboxRuntimeCreateTimer = ns.NewLabeledTimer("sandbox_runtime_create", "time to create a sandbox in the runtime", "runtime")
 | 
						|
	sandboxRuntimeStopTimer = ns.NewLabeledTimer("sandbox_runtime_stop", "time to stop a sandbox", "runtime")
 | 
						|
	sandboxRemoveTimer = ns.NewLabeledTimer("sandbox_remove", "time to remove a sandbox", "runtime")
 | 
						|
 | 
						|
	containerListTimer = ns.NewTimer("container_list", "time to list containers")
 | 
						|
	containerRemoveTimer = ns.NewLabeledTimer("container_remove", "time to remove a container", "runtime")
 | 
						|
	containerCreateTimer = ns.NewLabeledTimer("container_create", "time to create a container", "runtime")
 | 
						|
	containerStopTimer = ns.NewLabeledTimer("container_stop", "time to stop a container", "runtime")
 | 
						|
	containerStartTimer = ns.NewLabeledTimer("container_start", "time to start a container", "runtime")
 | 
						|
	containerEventsDroppedCount = ns.NewCounter("container_events_dropped", "count container discarding event total from server start")
 | 
						|
	containerCheckpointTimer = ns.NewLabeledTimer("container_checkpoint", "time to checkpoint a container", "runtime")
 | 
						|
 | 
						|
	networkPluginOperations = ns.NewLabeledCounter("network_plugin_operations_total", "cumulative number of network plugin operations by operation type", "operation_type")
 | 
						|
	networkPluginOperationsErrors = ns.NewLabeledCounter("network_plugin_operations_errors_total", "cumulative number of network plugin operations by operation type", "operation_type")
 | 
						|
	networkPluginOperationsLatency = ns.NewLabeledTimer("network_plugin_operations_duration_seconds", "latency in seconds of network plugin operations. Broken down by operation type", "operation_type")
 | 
						|
 | 
						|
	metrics.Register(ns)
 | 
						|
}
 | 
						|
 | 
						|
// for backwards compatibility with kubelet/dockershim metrics
 | 
						|
// https://github.com/containerd/containerd/issues/7801
 | 
						|
const (
 | 
						|
	networkStatusOp   = "get_pod_network_status"
 | 
						|
	networkSetUpOp    = "set_up_pod"
 | 
						|
	networkTearDownOp = "tear_down_pod"
 | 
						|
)
 |