342 lines
11 KiB
Go
342 lines
11 KiB
Go
/*
|
|
Copyright 2015 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package podgc
|
|
|
|
import (
|
|
"context"
|
|
"sort"
|
|
"sync"
|
|
"time"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
"k8s.io/apimachinery/pkg/api/errors"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/labels"
|
|
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
|
"k8s.io/apimachinery/pkg/util/wait"
|
|
utilfeature "k8s.io/apiserver/pkg/util/feature"
|
|
coreinformers "k8s.io/client-go/informers/core/v1"
|
|
clientset "k8s.io/client-go/kubernetes"
|
|
corelisters "k8s.io/client-go/listers/core/v1"
|
|
"k8s.io/client-go/tools/cache"
|
|
"k8s.io/client-go/util/workqueue"
|
|
"k8s.io/klog/v2"
|
|
apipod "k8s.io/kubernetes/pkg/api/v1/pod"
|
|
"k8s.io/kubernetes/pkg/features"
|
|
nodeutil "k8s.io/kubernetes/pkg/util/node"
|
|
utilpod "k8s.io/kubernetes/pkg/util/pod"
|
|
"k8s.io/kubernetes/pkg/util/taints"
|
|
)
|
|
|
|
const (
|
|
// gcCheckPeriod defines frequency of running main controller loop
|
|
gcCheckPeriod = 20 * time.Second
|
|
// quarantineTime defines how long Orphaned GC waits for nodes to show up
|
|
// in an informer before issuing a GET call to check if they are truly gone
|
|
quarantineTime = 40 * time.Second
|
|
)
|
|
|
|
type PodGCController struct {
|
|
kubeClient clientset.Interface
|
|
|
|
podLister corelisters.PodLister
|
|
podListerSynced cache.InformerSynced
|
|
nodeLister corelisters.NodeLister
|
|
nodeListerSynced cache.InformerSynced
|
|
|
|
nodeQueue workqueue.DelayingInterface
|
|
|
|
terminatedPodThreshold int
|
|
gcCheckPeriod time.Duration
|
|
quarantineTime time.Duration
|
|
}
|
|
|
|
func NewPodGC(ctx context.Context, kubeClient clientset.Interface, podInformer coreinformers.PodInformer,
|
|
nodeInformer coreinformers.NodeInformer, terminatedPodThreshold int) *PodGCController {
|
|
return NewPodGCInternal(ctx, kubeClient, podInformer, nodeInformer, terminatedPodThreshold, gcCheckPeriod, quarantineTime)
|
|
}
|
|
|
|
// This function is only intended for integration tests
|
|
func NewPodGCInternal(ctx context.Context, kubeClient clientset.Interface, podInformer coreinformers.PodInformer,
|
|
nodeInformer coreinformers.NodeInformer, terminatedPodThreshold int, gcCheckPeriod, quarantineTime time.Duration) *PodGCController {
|
|
gcc := &PodGCController{
|
|
kubeClient: kubeClient,
|
|
terminatedPodThreshold: terminatedPodThreshold,
|
|
podLister: podInformer.Lister(),
|
|
podListerSynced: podInformer.Informer().HasSynced,
|
|
nodeLister: nodeInformer.Lister(),
|
|
nodeListerSynced: nodeInformer.Informer().HasSynced,
|
|
nodeQueue: workqueue.NewNamedDelayingQueue("orphaned_pods_nodes"),
|
|
gcCheckPeriod: gcCheckPeriod,
|
|
quarantineTime: quarantineTime,
|
|
}
|
|
|
|
return gcc
|
|
}
|
|
|
|
func (gcc *PodGCController) Run(ctx context.Context) {
|
|
defer utilruntime.HandleCrash()
|
|
|
|
klog.Infof("Starting GC controller")
|
|
defer gcc.nodeQueue.ShutDown()
|
|
defer klog.Infof("Shutting down GC controller")
|
|
|
|
if !cache.WaitForNamedCacheSync("GC", ctx.Done(), gcc.podListerSynced, gcc.nodeListerSynced) {
|
|
return
|
|
}
|
|
|
|
go wait.UntilWithContext(ctx, gcc.gc, gcc.gcCheckPeriod)
|
|
|
|
<-ctx.Done()
|
|
}
|
|
|
|
func (gcc *PodGCController) gc(ctx context.Context) {
|
|
pods, err := gcc.podLister.List(labels.Everything())
|
|
if err != nil {
|
|
klog.Errorf("Error while listing all pods: %v", err)
|
|
return
|
|
}
|
|
nodes, err := gcc.nodeLister.List(labels.Everything())
|
|
if err != nil {
|
|
klog.Errorf("Error while listing all nodes: %v", err)
|
|
return
|
|
}
|
|
if gcc.terminatedPodThreshold > 0 {
|
|
gcc.gcTerminated(ctx, pods)
|
|
}
|
|
if utilfeature.DefaultFeatureGate.Enabled(features.NodeOutOfServiceVolumeDetach) {
|
|
gcc.gcTerminating(ctx, pods)
|
|
}
|
|
gcc.gcOrphaned(ctx, pods, nodes)
|
|
gcc.gcUnscheduledTerminating(ctx, pods)
|
|
}
|
|
|
|
func isPodTerminated(pod *v1.Pod) bool {
|
|
if phase := pod.Status.Phase; phase != v1.PodPending && phase != v1.PodRunning && phase != v1.PodUnknown {
|
|
return true
|
|
}
|
|
return false
|
|
}
|
|
|
|
// isPodTerminating returns true if the pod is terminating.
|
|
func isPodTerminating(pod *v1.Pod) bool {
|
|
return pod.ObjectMeta.DeletionTimestamp != nil
|
|
}
|
|
|
|
func (gcc *PodGCController) gcTerminating(ctx context.Context, pods []*v1.Pod) {
|
|
klog.V(4).Info("GC'ing terminating pods that are on out-of-service nodes")
|
|
terminatingPods := []*v1.Pod{}
|
|
for _, pod := range pods {
|
|
if isPodTerminating(pod) {
|
|
node, err := gcc.nodeLister.Get(string(pod.Spec.NodeName))
|
|
if err != nil {
|
|
klog.Errorf("failed to get node %s : %s", string(pod.Spec.NodeName), err)
|
|
continue
|
|
}
|
|
// Add this pod to terminatingPods list only if the following conditions are met:
|
|
// 1. Node is not ready.
|
|
// 2. Node has `node.kubernetes.io/out-of-service` taint.
|
|
if !nodeutil.IsNodeReady(node) && taints.TaintKeyExists(node.Spec.Taints, v1.TaintNodeOutOfService) {
|
|
klog.V(4).Infof("garbage collecting pod %s that is terminating. Phase [%v]", pod.Name, pod.Status.Phase)
|
|
terminatingPods = append(terminatingPods, pod)
|
|
}
|
|
}
|
|
}
|
|
|
|
deleteCount := len(terminatingPods)
|
|
if deleteCount == 0 {
|
|
return
|
|
}
|
|
|
|
klog.V(4).Infof("Garbage collecting %v pods that are terminating on node tainted with node.kubernetes.io/out-of-service", deleteCount)
|
|
// sort only when necessary
|
|
sort.Sort(byCreationTimestamp(terminatingPods))
|
|
var wait sync.WaitGroup
|
|
for i := 0; i < deleteCount; i++ {
|
|
wait.Add(1)
|
|
go func(pod *v1.Pod) {
|
|
defer wait.Done()
|
|
if err := gcc.markFailedAndDeletePod(ctx, pod); err != nil {
|
|
// ignore not founds
|
|
utilruntime.HandleError(err)
|
|
}
|
|
}(terminatingPods[i])
|
|
}
|
|
wait.Wait()
|
|
}
|
|
|
|
func (gcc *PodGCController) gcTerminated(ctx context.Context, pods []*v1.Pod) {
|
|
terminatedPods := []*v1.Pod{}
|
|
for _, pod := range pods {
|
|
if isPodTerminated(pod) {
|
|
terminatedPods = append(terminatedPods, pod)
|
|
}
|
|
}
|
|
|
|
terminatedPodCount := len(terminatedPods)
|
|
deleteCount := terminatedPodCount - gcc.terminatedPodThreshold
|
|
|
|
if deleteCount <= 0 {
|
|
return
|
|
}
|
|
|
|
klog.InfoS("Garbage collecting pods", "numPods", deleteCount)
|
|
// sort only when necessary
|
|
sort.Sort(byCreationTimestamp(terminatedPods))
|
|
var wait sync.WaitGroup
|
|
for i := 0; i < deleteCount; i++ {
|
|
wait.Add(1)
|
|
go func(pod *v1.Pod) {
|
|
defer wait.Done()
|
|
if err := gcc.markFailedAndDeletePod(ctx, pod); err != nil {
|
|
// ignore not founds
|
|
defer utilruntime.HandleError(err)
|
|
}
|
|
}(terminatedPods[i])
|
|
}
|
|
wait.Wait()
|
|
}
|
|
|
|
// gcOrphaned deletes pods that are bound to nodes that don't exist.
|
|
func (gcc *PodGCController) gcOrphaned(ctx context.Context, pods []*v1.Pod, nodes []*v1.Node) {
|
|
klog.V(4).Infof("GC'ing orphaned")
|
|
existingNodeNames := sets.NewString()
|
|
for _, node := range nodes {
|
|
existingNodeNames.Insert(node.Name)
|
|
}
|
|
// Add newly found unknown nodes to quarantine
|
|
for _, pod := range pods {
|
|
if pod.Spec.NodeName != "" && !existingNodeNames.Has(pod.Spec.NodeName) {
|
|
gcc.nodeQueue.AddAfter(pod.Spec.NodeName, gcc.quarantineTime)
|
|
}
|
|
}
|
|
// Check if nodes are still missing after quarantine period
|
|
deletedNodesNames, quit := gcc.discoverDeletedNodes(ctx, existingNodeNames)
|
|
if quit {
|
|
return
|
|
}
|
|
// Delete orphaned pods
|
|
for _, pod := range pods {
|
|
if !deletedNodesNames.Has(pod.Spec.NodeName) {
|
|
continue
|
|
}
|
|
klog.V(2).InfoS("Found orphaned Pod assigned to the Node, deleting.", "pod", klog.KObj(pod), "node", pod.Spec.NodeName)
|
|
condition := &v1.PodCondition{
|
|
Type: v1.AlphaNoCompatGuaranteeDisruptionTarget,
|
|
Status: v1.ConditionTrue,
|
|
Reason: "DeletionByPodGC",
|
|
Message: "PodGC: node no longer exists",
|
|
}
|
|
if err := gcc.markFailedAndDeletePodWithCondition(ctx, pod, condition); err != nil {
|
|
utilruntime.HandleError(err)
|
|
} else {
|
|
klog.InfoS("Forced deletion of orphaned Pod succeeded", "pod", klog.KObj(pod))
|
|
}
|
|
}
|
|
}
|
|
|
|
func (gcc *PodGCController) discoverDeletedNodes(ctx context.Context, existingNodeNames sets.String) (sets.String, bool) {
|
|
deletedNodesNames := sets.NewString()
|
|
for gcc.nodeQueue.Len() > 0 {
|
|
item, quit := gcc.nodeQueue.Get()
|
|
if quit {
|
|
return nil, true
|
|
}
|
|
nodeName := item.(string)
|
|
if !existingNodeNames.Has(nodeName) {
|
|
exists, err := gcc.checkIfNodeExists(ctx, nodeName)
|
|
switch {
|
|
case err != nil:
|
|
klog.ErrorS(err, "Error while getting node", "node", klog.KRef("", nodeName))
|
|
// Node will be added back to the queue in the subsequent loop if still needed
|
|
case !exists:
|
|
deletedNodesNames.Insert(nodeName)
|
|
}
|
|
}
|
|
gcc.nodeQueue.Done(item)
|
|
}
|
|
return deletedNodesNames, false
|
|
}
|
|
|
|
func (gcc *PodGCController) checkIfNodeExists(ctx context.Context, name string) (bool, error) {
|
|
_, fetchErr := gcc.kubeClient.CoreV1().Nodes().Get(ctx, name, metav1.GetOptions{})
|
|
if errors.IsNotFound(fetchErr) {
|
|
return false, nil
|
|
}
|
|
return fetchErr == nil, fetchErr
|
|
}
|
|
|
|
// gcUnscheduledTerminating deletes pods that are terminating and haven't been scheduled to a particular node.
|
|
func (gcc *PodGCController) gcUnscheduledTerminating(ctx context.Context, pods []*v1.Pod) {
|
|
klog.V(4).Infof("GC'ing unscheduled pods which are terminating.")
|
|
|
|
for _, pod := range pods {
|
|
if pod.DeletionTimestamp == nil || len(pod.Spec.NodeName) > 0 {
|
|
continue
|
|
}
|
|
|
|
klog.V(2).InfoS("Found unscheduled terminating Pod not assigned to any Node, deleting.", "pod", klog.KObj(pod))
|
|
if err := gcc.markFailedAndDeletePod(ctx, pod); err != nil {
|
|
utilruntime.HandleError(err)
|
|
} else {
|
|
klog.InfoS("Forced deletion of unscheduled terminating Pod succeeded", "pod", klog.KObj(pod))
|
|
}
|
|
}
|
|
}
|
|
|
|
// byCreationTimestamp sorts a list by creation timestamp, using their names as a tie breaker.
|
|
type byCreationTimestamp []*v1.Pod
|
|
|
|
func (o byCreationTimestamp) Len() int { return len(o) }
|
|
func (o byCreationTimestamp) Swap(i, j int) { o[i], o[j] = o[j], o[i] }
|
|
|
|
func (o byCreationTimestamp) Less(i, j int) bool {
|
|
if o[i].CreationTimestamp.Equal(&o[j].CreationTimestamp) {
|
|
return o[i].Name < o[j].Name
|
|
}
|
|
return o[i].CreationTimestamp.Before(&o[j].CreationTimestamp)
|
|
}
|
|
|
|
func (gcc *PodGCController) markFailedAndDeletePod(ctx context.Context, pod *v1.Pod) error {
|
|
return gcc.markFailedAndDeletePodWithCondition(ctx, pod, nil)
|
|
}
|
|
|
|
func (gcc *PodGCController) markFailedAndDeletePodWithCondition(ctx context.Context, pod *v1.Pod, condition *v1.PodCondition) error {
|
|
klog.InfoS("PodGC is force deleting Pod", "pod", klog.KRef(pod.Namespace, pod.Name))
|
|
if utilfeature.DefaultFeatureGate.Enabled(features.PodDisruptionConditions) {
|
|
newStatus := pod.Status.DeepCopy()
|
|
updated := false
|
|
if condition != nil {
|
|
updated = apipod.UpdatePodCondition(newStatus, condition)
|
|
}
|
|
// Mark the pod as failed - this is especially important in case the pod
|
|
// is orphaned, in which case the pod would remain in the Running phase
|
|
// forever as there is no kubelet running to change the phase.
|
|
if pod.Status.Phase != v1.PodSucceeded && pod.Status.Phase != v1.PodFailed {
|
|
newStatus.Phase = v1.PodFailed
|
|
updated = true
|
|
}
|
|
if updated {
|
|
if _, _, _, err := utilpod.PatchPodStatus(ctx, gcc.kubeClient, pod.Namespace, pod.Name, pod.UID, pod.Status, *newStatus); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
return gcc.kubeClient.CoreV1().Pods(pod.Namespace).Delete(ctx, pod.Name, *metav1.NewDeleteOptions(0))
|
|
}
|