Add QoS support on node
This commit is contained in:
25
pkg/kubelet/qos/doc.go
Normal file
25
pkg/kubelet/qos/doc.go
Normal file
@@ -0,0 +1,25 @@
|
||||
/*
|
||||
Copyright 2015 The Kubernetes Authors All rights reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
// package qos contains helper functions for quality of service.
|
||||
// For each resource (memory, CPU) Kubelet supports three classes of containers.
|
||||
// Memory guaranteed containers will receive the highest priority and will get all the resources
|
||||
// they need.
|
||||
// Burstable containers will be guaranteed their request and can “burst” and use more resources
|
||||
// when available.
|
||||
// Best-Effort containers, which don’t specify a request, can use resources only if not being used
|
||||
// by other pods.
|
||||
package qos
|
75
pkg/kubelet/qos/memory_policy.go
Normal file
75
pkg/kubelet/qos/memory_policy.go
Normal file
@@ -0,0 +1,75 @@
|
||||
/*
|
||||
Copyright 2015 The Kubernetes Authors All rights reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package qos
|
||||
|
||||
import (
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
)
|
||||
|
||||
const (
|
||||
PodInfraOomAdj int = -999
|
||||
KubeletOomScoreAdj int = -999
|
||||
KubeProxyOomScoreAdj int = -999
|
||||
)
|
||||
|
||||
// isMemoryBestEffort returns true if the container's memory requirements are best-effort.
|
||||
func isMemoryBestEffort(container *api.Container) bool {
|
||||
// A container is memory best-effort if its memory request is unspecified or 0.
|
||||
// If a request is specified, then the user expects some kind of resource guarantee.
|
||||
return container.Resources.Requests.Memory().Value() == 0
|
||||
}
|
||||
|
||||
// isMemoryGuaranteed returns true if the container's memory requirements are Guaranteed.
|
||||
func isMemoryGuaranteed(container *api.Container) bool {
|
||||
// A container is memory guaranteed if its memory request == memory limit.
|
||||
// If memory request == memory limit, the user is very confident of resource consumption.
|
||||
memoryRequestValue := container.Resources.Requests.Memory().Value()
|
||||
memoryLimitValue := container.Resources.Limits.Memory().Value()
|
||||
return memoryRequestValue == memoryLimitValue && memoryRequestValue != 0
|
||||
}
|
||||
|
||||
// GetContainerOomAdjust returns the amount by which the OOM score of all processes in the
|
||||
// container should be adjusted. The OOM score of a process is the percentage of memory it consumes
|
||||
// multiplied by 100 (barring exceptional cases) + a configurable quantity which is between -1000
|
||||
// and 1000. Containers with higher OOM scores are killed if the system runs out of memory.
|
||||
// See https://lwn.net/Articles/391222/ for more information.
|
||||
func GetContainerOomScoreAdjust(container *api.Container, memoryCapacity int64) int {
|
||||
if isMemoryGuaranteed(container) {
|
||||
// Memory guaranteed containers should be the last to get killed.
|
||||
return -999
|
||||
} else if isMemoryBestEffort(container) {
|
||||
// Memory best-effort containers should be the first to be killed.
|
||||
return 1000
|
||||
} else {
|
||||
// Burstable containers are a middle tier, between Guaranteed and Best-Effort. Ideally,
|
||||
// we want to protect Burstable containers that consume less memory than requested.
|
||||
// The formula below is a heuristic. A container requesting for 10% of a system's
|
||||
// memory will have an oom score adjust of 900. If a process in container Y
|
||||
// uses over 10% of memory, its OOM score will be 1000. The idea is that containers
|
||||
// which use more than their request will have an OOM score of 1000 and will be prime
|
||||
// targets for OOM kills.
|
||||
// Note that this is a heuristic, it won't work if a container has many small processes.
|
||||
memoryRequest := container.Resources.Requests.Memory().Value()
|
||||
oomScoreAdjust := 1000 - (1000*memoryRequest)/memoryCapacity
|
||||
// A memory guaranteed container using 100% of memory can have an OOM score of 1. Ensure
|
||||
// that memory burstable containers have a higher OOM score.
|
||||
if oomScoreAdjust < 2 {
|
||||
return 2
|
||||
}
|
||||
return int(oomScoreAdjust)
|
||||
}
|
||||
}
|
187
pkg/kubelet/qos/memory_policy_test.go
Normal file
187
pkg/kubelet/qos/memory_policy_test.go
Normal file
@@ -0,0 +1,187 @@
|
||||
/*
|
||||
Copyright 2015 The Kubernetes Authors All rights reserved.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
|
||||
package qos
|
||||
|
||||
import (
|
||||
"strconv"
|
||||
"testing"
|
||||
|
||||
"k8s.io/kubernetes/pkg/api"
|
||||
"k8s.io/kubernetes/pkg/api/resource"
|
||||
)
|
||||
|
||||
const (
|
||||
standardMemoryAmount = 8000000000
|
||||
)
|
||||
|
||||
var (
|
||||
zeroRequestMemoryBestEffort = api.Container{
|
||||
Resources: api.ResourceRequirements{
|
||||
Requests: api.ResourceList{
|
||||
api.ResourceName(api.ResourceCPU): resource.MustParse("5m"),
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("0G"),
|
||||
},
|
||||
Limits: api.ResourceList{
|
||||
api.ResourceName(api.ResourceCPU): resource.MustParse("5m"),
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("10G"),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
edgeMemoryBestEffort = api.Container{
|
||||
Resources: api.ResourceRequirements{
|
||||
Requests: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("0G"),
|
||||
},
|
||||
Limits: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("0G"),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
noRequestMemoryBestEffort = api.Container{
|
||||
Resources: api.ResourceRequirements{
|
||||
Limits: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("10G"),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
noLimitMemoryBestEffort = api.Container{}
|
||||
|
||||
memoryGuaranteed = api.Container{
|
||||
Resources: api.ResourceRequirements{
|
||||
Requests: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("10G"),
|
||||
},
|
||||
Limits: api.ResourceList{
|
||||
api.ResourceName(api.ResourceCPU): resource.MustParse("5m"),
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("10G"),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
memoryBurstable = api.Container{
|
||||
Resources: api.ResourceRequirements{
|
||||
Requests: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse(strconv.Itoa(standardMemoryAmount / 2)),
|
||||
},
|
||||
Limits: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse("10G"),
|
||||
},
|
||||
},
|
||||
}
|
||||
|
||||
memoryBurstableNoLimit = api.Container{
|
||||
Resources: api.ResourceRequirements{
|
||||
Requests: api.ResourceList{
|
||||
api.ResourceName(api.ResourceMemory): resource.MustParse(strconv.Itoa(standardMemoryAmount - 1)),
|
||||
},
|
||||
},
|
||||
}
|
||||
)
|
||||
|
||||
func TestIsMemoryBestEffort(t *testing.T) {
|
||||
validCases := []api.Container{zeroRequestMemoryBestEffort, noRequestMemoryBestEffort, noLimitMemoryBestEffort, edgeMemoryBestEffort}
|
||||
for _, container := range validCases {
|
||||
if !isMemoryBestEffort(&container) {
|
||||
t.Errorf("container %+v is memory best-effort", container)
|
||||
}
|
||||
}
|
||||
invalidCases := []api.Container{memoryGuaranteed, memoryBurstable}
|
||||
for _, container := range invalidCases {
|
||||
if isMemoryBestEffort(&container) {
|
||||
t.Errorf("container %+v is not memory best-effort", container)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
func TestIsMemoryGuaranteed(t *testing.T) {
|
||||
validCases := []api.Container{memoryGuaranteed}
|
||||
for _, container := range validCases {
|
||||
if !isMemoryGuaranteed(&container) {
|
||||
t.Errorf("container %+v is memory guaranteed", container)
|
||||
}
|
||||
}
|
||||
invalidCases := []api.Container{zeroRequestMemoryBestEffort, noRequestMemoryBestEffort, noLimitMemoryBestEffort, edgeMemoryBestEffort, memoryBurstable}
|
||||
for _, container := range invalidCases {
|
||||
if isMemoryGuaranteed(&container) {
|
||||
t.Errorf("container %+v is not memory guaranteed", container)
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
type oomTest struct {
|
||||
container *api.Container
|
||||
memoryCapacity int64
|
||||
lowOomScoreAdj int // The max oom_score_adj score the container should be assigned.
|
||||
highOomScoreAdj int // The min oom_score_adj score the container should be assigned.
|
||||
}
|
||||
|
||||
func TestGetContainerOomScoreAdjust(t *testing.T) {
|
||||
|
||||
oomTests := []oomTest{
|
||||
{
|
||||
container: &zeroRequestMemoryBestEffort,
|
||||
memoryCapacity: 4000000000,
|
||||
lowOomScoreAdj: 1000,
|
||||
highOomScoreAdj: 1000,
|
||||
},
|
||||
{
|
||||
container: &edgeMemoryBestEffort,
|
||||
memoryCapacity: 8000000000,
|
||||
lowOomScoreAdj: 1000,
|
||||
highOomScoreAdj: 1000,
|
||||
},
|
||||
{
|
||||
container: &noRequestMemoryBestEffort,
|
||||
memoryCapacity: 7230457451,
|
||||
lowOomScoreAdj: 1000,
|
||||
highOomScoreAdj: 1000,
|
||||
},
|
||||
{
|
||||
container: &noLimitMemoryBestEffort,
|
||||
memoryCapacity: 4000000000,
|
||||
lowOomScoreAdj: 1000,
|
||||
highOomScoreAdj: 1000,
|
||||
},
|
||||
{
|
||||
container: &memoryGuaranteed,
|
||||
memoryCapacity: 123456789,
|
||||
lowOomScoreAdj: -999,
|
||||
highOomScoreAdj: -999,
|
||||
},
|
||||
{
|
||||
container: &memoryBurstable,
|
||||
memoryCapacity: standardMemoryAmount,
|
||||
lowOomScoreAdj: 495,
|
||||
highOomScoreAdj: 505,
|
||||
},
|
||||
{
|
||||
container: &memoryBurstableNoLimit,
|
||||
memoryCapacity: standardMemoryAmount,
|
||||
lowOomScoreAdj: 2,
|
||||
highOomScoreAdj: 2,
|
||||
},
|
||||
}
|
||||
for _, test := range oomTests {
|
||||
oomScoreAdj := GetContainerOomScoreAdjust(test.container, test.memoryCapacity)
|
||||
if oomScoreAdj < test.lowOomScoreAdj || oomScoreAdj > test.highOomScoreAdj {
|
||||
t.Errorf("oom_score_adj should be between %d and %d, but was %d", test.lowOomScoreAdj, test.highOomScoreAdj, oomScoreAdj)
|
||||
}
|
||||
}
|
||||
}
|
Reference in New Issue
Block a user