
Automatic merge from submit-queue Revision handling in federated deployment controller Deployment controller in regular kubernetes automatically adds an annotation in deployment. This causes a bit of confusion in controller and tests. This PR skips revision annotation in checks. In the next K8S release we will need to have better support for deployment revisions. Helps with #36588 cc: @nikhiljindal @madhusudancs
652 lines
22 KiB
Go
652 lines
22 KiB
Go
/*
|
|
Copyright 2016 The Kubernetes Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package deployment
|
|
|
|
import (
|
|
"bytes"
|
|
"encoding/json"
|
|
"fmt"
|
|
"sort"
|
|
"time"
|
|
|
|
"github.com/golang/glog"
|
|
|
|
fed "k8s.io/kubernetes/federation/apis/federation"
|
|
fedv1 "k8s.io/kubernetes/federation/apis/federation/v1beta1"
|
|
fedclientset "k8s.io/kubernetes/federation/client/clientset_generated/federation_release_1_5"
|
|
fedutil "k8s.io/kubernetes/federation/pkg/federation-controller/util"
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/deletionhelper"
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/eventsink"
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/planner"
|
|
"k8s.io/kubernetes/federation/pkg/federation-controller/util/podanalyzer"
|
|
"k8s.io/kubernetes/pkg/api"
|
|
"k8s.io/kubernetes/pkg/api/errors"
|
|
apiv1 "k8s.io/kubernetes/pkg/api/v1"
|
|
extensionsv1 "k8s.io/kubernetes/pkg/apis/extensions/v1beta1"
|
|
"k8s.io/kubernetes/pkg/client/cache"
|
|
kubeclientset "k8s.io/kubernetes/pkg/client/clientset_generated/release_1_5"
|
|
"k8s.io/kubernetes/pkg/client/record"
|
|
"k8s.io/kubernetes/pkg/controller"
|
|
"k8s.io/kubernetes/pkg/conversion"
|
|
"k8s.io/kubernetes/pkg/runtime"
|
|
"k8s.io/kubernetes/pkg/util/flowcontrol"
|
|
"k8s.io/kubernetes/pkg/util/wait"
|
|
"k8s.io/kubernetes/pkg/util/workqueue"
|
|
"k8s.io/kubernetes/pkg/watch"
|
|
)
|
|
|
|
const (
|
|
FedDeploymentPreferencesAnnotation = "federation.kubernetes.io/deployment-preferences"
|
|
allClustersKey = "THE_ALL_CLUSTER_KEY"
|
|
UserAgentName = "Federation-Deployment-Controller"
|
|
)
|
|
|
|
var (
|
|
deploymentReviewDelay = 10 * time.Second
|
|
clusterAvailableDelay = 20 * time.Second
|
|
clusterUnavailableDelay = 60 * time.Second
|
|
allDeploymentReviewDelay = 2 * time.Minute
|
|
updateTimeout = 30 * time.Second
|
|
)
|
|
|
|
func parseFederationDeploymentPreference(fd *extensionsv1.Deployment) (*fed.FederatedReplicaSetPreferences, error) {
|
|
if fd.Annotations == nil {
|
|
return nil, nil
|
|
}
|
|
fdPrefString, found := fd.Annotations[FedDeploymentPreferencesAnnotation]
|
|
if !found {
|
|
return nil, nil
|
|
}
|
|
var fdPref fed.FederatedReplicaSetPreferences
|
|
if err := json.Unmarshal([]byte(fdPrefString), &fdPref); err != nil {
|
|
return nil, err
|
|
}
|
|
return &fdPref, nil
|
|
}
|
|
|
|
type DeploymentController struct {
|
|
fedClient fedclientset.Interface
|
|
|
|
deploymentController *cache.Controller
|
|
deploymentStore cache.Store
|
|
|
|
fedDeploymentInformer fedutil.FederatedInformer
|
|
fedPodInformer fedutil.FederatedInformer
|
|
|
|
deploymentDeliverer *fedutil.DelayingDeliverer
|
|
clusterDeliverer *fedutil.DelayingDeliverer
|
|
deploymentWorkQueue workqueue.Interface
|
|
// For updating members of federation.
|
|
fedUpdater fedutil.FederatedUpdater
|
|
deploymentBackoff *flowcontrol.Backoff
|
|
eventRecorder record.EventRecorder
|
|
|
|
deletionHelper *deletionhelper.DeletionHelper
|
|
|
|
defaultPlanner *planner.Planner
|
|
}
|
|
|
|
// NewclusterController returns a new cluster controller
|
|
func NewDeploymentController(federationClient fedclientset.Interface) *DeploymentController {
|
|
broadcaster := record.NewBroadcaster()
|
|
broadcaster.StartRecordingToSink(eventsink.NewFederatedEventSink(federationClient))
|
|
recorder := broadcaster.NewRecorder(apiv1.EventSource{Component: "federated-deployment-controller"})
|
|
|
|
fdc := &DeploymentController{
|
|
fedClient: federationClient,
|
|
deploymentDeliverer: fedutil.NewDelayingDeliverer(),
|
|
clusterDeliverer: fedutil.NewDelayingDeliverer(),
|
|
deploymentWorkQueue: workqueue.New(),
|
|
deploymentBackoff: flowcontrol.NewBackOff(5*time.Second, time.Minute),
|
|
defaultPlanner: planner.NewPlanner(&fed.FederatedReplicaSetPreferences{
|
|
Clusters: map[string]fed.ClusterReplicaSetPreferences{
|
|
"*": {Weight: 1},
|
|
},
|
|
}),
|
|
eventRecorder: recorder,
|
|
}
|
|
|
|
deploymentFedInformerFactory := func(cluster *fedv1.Cluster, clientset kubeclientset.Interface) (cache.Store, cache.ControllerInterface) {
|
|
return cache.NewInformer(
|
|
&cache.ListWatch{
|
|
ListFunc: func(options apiv1.ListOptions) (runtime.Object, error) {
|
|
return clientset.Extensions().Deployments(apiv1.NamespaceAll).List(options)
|
|
},
|
|
WatchFunc: func(options apiv1.ListOptions) (watch.Interface, error) {
|
|
return clientset.Extensions().Deployments(apiv1.NamespaceAll).Watch(options)
|
|
},
|
|
},
|
|
&extensionsv1.Deployment{},
|
|
controller.NoResyncPeriodFunc(),
|
|
fedutil.NewTriggerOnAllChanges(
|
|
func(obj runtime.Object) { fdc.deliverLocalDeployment(obj, deploymentReviewDelay) },
|
|
),
|
|
)
|
|
}
|
|
clusterLifecycle := fedutil.ClusterLifecycleHandlerFuncs{
|
|
ClusterAvailable: func(cluster *fedv1.Cluster) {
|
|
fdc.clusterDeliverer.DeliverAfter(allClustersKey, nil, clusterAvailableDelay)
|
|
},
|
|
ClusterUnavailable: func(cluster *fedv1.Cluster, _ []interface{}) {
|
|
fdc.clusterDeliverer.DeliverAfter(allClustersKey, nil, clusterUnavailableDelay)
|
|
},
|
|
}
|
|
fdc.fedDeploymentInformer = fedutil.NewFederatedInformer(federationClient, deploymentFedInformerFactory, &clusterLifecycle)
|
|
|
|
podFedInformerFactory := func(cluster *fedv1.Cluster, clientset kubeclientset.Interface) (cache.Store, cache.ControllerInterface) {
|
|
return cache.NewInformer(
|
|
&cache.ListWatch{
|
|
ListFunc: func(options apiv1.ListOptions) (runtime.Object, error) {
|
|
return clientset.Core().Pods(apiv1.NamespaceAll).List(options)
|
|
},
|
|
WatchFunc: func(options apiv1.ListOptions) (watch.Interface, error) {
|
|
return clientset.Core().Pods(apiv1.NamespaceAll).Watch(options)
|
|
},
|
|
},
|
|
&apiv1.Pod{},
|
|
controller.NoResyncPeriodFunc(),
|
|
fedutil.NewTriggerOnAllChanges(
|
|
func(obj runtime.Object) {
|
|
fdc.clusterDeliverer.DeliverAfter(allClustersKey, nil, allDeploymentReviewDelay)
|
|
},
|
|
),
|
|
)
|
|
}
|
|
fdc.fedPodInformer = fedutil.NewFederatedInformer(federationClient, podFedInformerFactory, &fedutil.ClusterLifecycleHandlerFuncs{})
|
|
|
|
fdc.deploymentStore, fdc.deploymentController = cache.NewInformer(
|
|
&cache.ListWatch{
|
|
ListFunc: func(options apiv1.ListOptions) (runtime.Object, error) {
|
|
return fdc.fedClient.Extensions().Deployments(apiv1.NamespaceAll).List(options)
|
|
},
|
|
WatchFunc: func(options apiv1.ListOptions) (watch.Interface, error) {
|
|
return fdc.fedClient.Extensions().Deployments(apiv1.NamespaceAll).Watch(options)
|
|
},
|
|
},
|
|
&extensionsv1.Deployment{},
|
|
controller.NoResyncPeriodFunc(),
|
|
fedutil.NewTriggerOnMetaAndSpecChanges(
|
|
func(obj runtime.Object) { fdc.deliverFedDeploymentObj(obj, deploymentReviewDelay) },
|
|
),
|
|
)
|
|
|
|
fdc.fedUpdater = fedutil.NewFederatedUpdater(fdc.fedDeploymentInformer,
|
|
func(client kubeclientset.Interface, obj runtime.Object) error {
|
|
rs := obj.(*extensionsv1.Deployment)
|
|
_, err := client.Extensions().Deployments(rs.Namespace).Create(rs)
|
|
return err
|
|
},
|
|
func(client kubeclientset.Interface, obj runtime.Object) error {
|
|
rs := obj.(*extensionsv1.Deployment)
|
|
_, err := client.Extensions().Deployments(rs.Namespace).Update(rs)
|
|
return err
|
|
},
|
|
func(client kubeclientset.Interface, obj runtime.Object) error {
|
|
rs := obj.(*extensionsv1.Deployment)
|
|
err := client.Extensions().Deployments(rs.Namespace).Delete(rs.Name, &apiv1.DeleteOptions{})
|
|
return err
|
|
})
|
|
|
|
fdc.deletionHelper = deletionhelper.NewDeletionHelper(
|
|
fdc.hasFinalizerFunc,
|
|
fdc.removeFinalizerFunc,
|
|
fdc.addFinalizerFunc,
|
|
// objNameFunc
|
|
func(obj runtime.Object) string {
|
|
deployment := obj.(*extensionsv1.Deployment)
|
|
return deployment.Name
|
|
},
|
|
updateTimeout,
|
|
fdc.eventRecorder,
|
|
fdc.fedDeploymentInformer,
|
|
fdc.fedUpdater,
|
|
)
|
|
|
|
return fdc
|
|
}
|
|
|
|
// Returns true if the given object has the given finalizer in its ObjectMeta.
|
|
func (fdc *DeploymentController) hasFinalizerFunc(obj runtime.Object, finalizer string) bool {
|
|
deployment := obj.(*extensionsv1.Deployment)
|
|
for i := range deployment.ObjectMeta.Finalizers {
|
|
if string(deployment.ObjectMeta.Finalizers[i]) == finalizer {
|
|
return true
|
|
}
|
|
}
|
|
return false
|
|
}
|
|
|
|
// Removes the finalizer from the given objects ObjectMeta.
|
|
// Assumes that the given object is a deployment.
|
|
func (fdc *DeploymentController) removeFinalizerFunc(obj runtime.Object, finalizer string) (runtime.Object, error) {
|
|
deployment := obj.(*extensionsv1.Deployment)
|
|
newFinalizers := []string{}
|
|
hasFinalizer := false
|
|
for i := range deployment.ObjectMeta.Finalizers {
|
|
if string(deployment.ObjectMeta.Finalizers[i]) != finalizer {
|
|
newFinalizers = append(newFinalizers, deployment.ObjectMeta.Finalizers[i])
|
|
} else {
|
|
hasFinalizer = true
|
|
}
|
|
}
|
|
if !hasFinalizer {
|
|
// Nothing to do.
|
|
return obj, nil
|
|
}
|
|
deployment.ObjectMeta.Finalizers = newFinalizers
|
|
deployment, err := fdc.fedClient.Extensions().Deployments(deployment.Namespace).Update(deployment)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to remove finalizer %s from deployment %s: %v", finalizer, deployment.Name, err)
|
|
}
|
|
return deployment, nil
|
|
}
|
|
|
|
// Adds the given finalizer to the given objects ObjectMeta.
|
|
// Assumes that the given object is a deployment.
|
|
func (fdc *DeploymentController) addFinalizerFunc(obj runtime.Object, finalizer string) (runtime.Object, error) {
|
|
deployment := obj.(*extensionsv1.Deployment)
|
|
deployment.ObjectMeta.Finalizers = append(deployment.ObjectMeta.Finalizers, finalizer)
|
|
deployment, err := fdc.fedClient.Extensions().Deployments(deployment.Namespace).Update(deployment)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("failed to add finalizer %s to deployment %s: %v", finalizer, deployment.Name, err)
|
|
}
|
|
return deployment, nil
|
|
}
|
|
|
|
func (fdc *DeploymentController) Run(workers int, stopCh <-chan struct{}) {
|
|
go fdc.deploymentController.Run(stopCh)
|
|
fdc.fedDeploymentInformer.Start()
|
|
fdc.fedPodInformer.Start()
|
|
|
|
fdc.deploymentDeliverer.StartWithHandler(func(item *fedutil.DelayingDelivererItem) {
|
|
fdc.deploymentWorkQueue.Add(item.Key)
|
|
})
|
|
fdc.clusterDeliverer.StartWithHandler(func(_ *fedutil.DelayingDelivererItem) {
|
|
fdc.reconcileDeploymentsOnClusterChange()
|
|
})
|
|
|
|
// Wait until the cluster is synced to prevent the update storm at the very beginning.
|
|
for !fdc.isSynced() {
|
|
time.Sleep(5 * time.Millisecond)
|
|
glog.V(3).Infof("Waiting for controller to sync up")
|
|
}
|
|
|
|
for i := 0; i < workers; i++ {
|
|
go wait.Until(fdc.worker, time.Second, stopCh)
|
|
}
|
|
|
|
fedutil.StartBackoffGC(fdc.deploymentBackoff, stopCh)
|
|
|
|
<-stopCh
|
|
glog.Infof("Shutting down DeploymentController")
|
|
fdc.deploymentDeliverer.Stop()
|
|
fdc.clusterDeliverer.Stop()
|
|
fdc.deploymentWorkQueue.ShutDown()
|
|
fdc.fedDeploymentInformer.Stop()
|
|
fdc.fedPodInformer.Stop()
|
|
}
|
|
|
|
func (fdc *DeploymentController) isSynced() bool {
|
|
if !fdc.fedDeploymentInformer.ClustersSynced() {
|
|
glog.V(2).Infof("Cluster list not synced")
|
|
return false
|
|
}
|
|
clustersFromDeps, err := fdc.fedDeploymentInformer.GetReadyClusters()
|
|
if err != nil {
|
|
glog.Errorf("Failed to get ready clusters: %v", err)
|
|
return false
|
|
}
|
|
if !fdc.fedDeploymentInformer.GetTargetStore().ClustersSynced(clustersFromDeps) {
|
|
return false
|
|
}
|
|
|
|
if !fdc.fedPodInformer.ClustersSynced() {
|
|
glog.V(2).Infof("Cluster list not synced")
|
|
return false
|
|
}
|
|
clustersFromPods, err := fdc.fedPodInformer.GetReadyClusters()
|
|
if err != nil {
|
|
glog.Errorf("Failed to get ready clusters: %v", err)
|
|
return false
|
|
}
|
|
|
|
// This also checks whether podInformer and deploymentInformer have the
|
|
// same cluster lists.
|
|
if !fdc.fedPodInformer.GetTargetStore().ClustersSynced(clustersFromDeps) {
|
|
glog.V(2).Infof("Pod informer not synced")
|
|
return false
|
|
}
|
|
if !fdc.fedPodInformer.GetTargetStore().ClustersSynced(clustersFromPods) {
|
|
glog.V(2).Infof("Pod informer not synced")
|
|
return false
|
|
}
|
|
|
|
if !fdc.deploymentController.HasSynced() {
|
|
glog.V(2).Infof("federation deployment list not synced")
|
|
return false
|
|
}
|
|
return true
|
|
}
|
|
|
|
func (fdc *DeploymentController) deliverLocalDeployment(obj interface{}, duration time.Duration) {
|
|
key, err := controller.KeyFunc(obj)
|
|
if err != nil {
|
|
glog.Errorf("Couldn't get key for object %v: %v", obj, err)
|
|
return
|
|
}
|
|
_, exists, err := fdc.deploymentStore.GetByKey(key)
|
|
if err != nil {
|
|
glog.Errorf("Couldn't get federation deployment %v: %v", key, err)
|
|
return
|
|
}
|
|
if exists { // ignore deployments exists only in local k8s
|
|
fdc.deliverDeploymentByKey(key, duration, false)
|
|
}
|
|
}
|
|
|
|
func (fdc *DeploymentController) deliverFedDeploymentObj(obj interface{}, delay time.Duration) {
|
|
key, err := controller.KeyFunc(obj)
|
|
if err != nil {
|
|
glog.Errorf("Couldn't get key for object %+v: %v", obj, err)
|
|
return
|
|
}
|
|
fdc.deliverDeploymentByKey(key, delay, false)
|
|
}
|
|
|
|
func (fdc *DeploymentController) deliverDeploymentByKey(key string, delay time.Duration, failed bool) {
|
|
if failed {
|
|
fdc.deploymentBackoff.Next(key, time.Now())
|
|
delay = delay + fdc.deploymentBackoff.Get(key)
|
|
} else {
|
|
fdc.deploymentBackoff.Reset(key)
|
|
}
|
|
fdc.deploymentDeliverer.DeliverAfter(key, nil, delay)
|
|
}
|
|
|
|
func (fdc *DeploymentController) worker() {
|
|
for {
|
|
item, quit := fdc.deploymentWorkQueue.Get()
|
|
if quit {
|
|
return
|
|
}
|
|
key := item.(string)
|
|
status, err := fdc.reconcileDeployment(key)
|
|
fdc.deploymentWorkQueue.Done(item)
|
|
if err != nil {
|
|
glog.Errorf("Error syncing cluster controller: %v", err)
|
|
fdc.deliverDeploymentByKey(key, 0, true)
|
|
} else {
|
|
switch status {
|
|
case statusAllOk:
|
|
break
|
|
case statusError:
|
|
fdc.deliverDeploymentByKey(key, 0, true)
|
|
case statusNeedRecheck:
|
|
fdc.deliverDeploymentByKey(key, deploymentReviewDelay, false)
|
|
case statusNotSynced:
|
|
fdc.deliverDeploymentByKey(key, clusterAvailableDelay, false)
|
|
default:
|
|
glog.Errorf("Unhandled reconciliation status: %s", status)
|
|
fdc.deliverDeploymentByKey(key, deploymentReviewDelay, false)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
func (fdc *DeploymentController) schedule(fd *extensionsv1.Deployment, clusters []*fedv1.Cluster,
|
|
current map[string]int64, estimatedCapacity map[string]int64) map[string]int64 {
|
|
// TODO: integrate real scheduler
|
|
|
|
plannerToBeUsed := fdc.defaultPlanner
|
|
fdPref, err := parseFederationDeploymentPreference(fd)
|
|
if err != nil {
|
|
glog.Info("Invalid Deployment specific preference, use default. deployment: %v, err: %v", fd.Name, err)
|
|
}
|
|
if fdPref != nil { // create a new planner if user specified a preference
|
|
plannerToBeUsed = planner.NewPlanner(fdPref)
|
|
}
|
|
|
|
replicas := int64(*fd.Spec.Replicas)
|
|
var clusterNames []string
|
|
for _, cluster := range clusters {
|
|
clusterNames = append(clusterNames, cluster.Name)
|
|
}
|
|
scheduleResult, overflow := plannerToBeUsed.Plan(replicas, clusterNames, current, estimatedCapacity,
|
|
fd.Namespace+"/"+fd.Name)
|
|
// make sure the result contains all clusters that currently have some replicas.
|
|
result := make(map[string]int64)
|
|
for clusterName := range current {
|
|
result[clusterName] = 0
|
|
}
|
|
for clusterName, replicas := range scheduleResult {
|
|
result[clusterName] = replicas
|
|
}
|
|
for clusterName, replicas := range overflow {
|
|
result[clusterName] += replicas
|
|
}
|
|
if glog.V(4) {
|
|
buf := bytes.NewBufferString(fmt.Sprintf("Schedule - Deployment: %s/%s\n", fd.Namespace, fd.Name))
|
|
sort.Strings(clusterNames)
|
|
for _, clusterName := range clusterNames {
|
|
cur := current[clusterName]
|
|
target := scheduleResult[clusterName]
|
|
fmt.Fprintf(buf, "%s: current: %d target: %d", clusterName, cur, target)
|
|
if over, found := overflow[clusterName]; found {
|
|
fmt.Fprintf(buf, " overflow: %d", over)
|
|
}
|
|
if capacity, found := estimatedCapacity[clusterName]; found {
|
|
fmt.Fprintf(buf, " capacity: %d", capacity)
|
|
}
|
|
fmt.Fprintf(buf, "\n")
|
|
}
|
|
glog.V(4).Infof(buf.String())
|
|
}
|
|
return result
|
|
}
|
|
|
|
type reconciliationStatus string
|
|
|
|
const (
|
|
statusAllOk = reconciliationStatus("ALL_OK")
|
|
statusNeedRecheck = reconciliationStatus("RECHECK")
|
|
statusError = reconciliationStatus("ERROR")
|
|
statusNotSynced = reconciliationStatus("NOSYNC")
|
|
)
|
|
|
|
func (fdc *DeploymentController) reconcileDeployment(key string) (reconciliationStatus, error) {
|
|
if !fdc.isSynced() {
|
|
return statusNotSynced, nil
|
|
}
|
|
|
|
glog.V(4).Infof("Start reconcile deployment %q", key)
|
|
startTime := time.Now()
|
|
defer glog.V(4).Infof("Finished reconcile deployment %q (%v)", key, time.Now().Sub(startTime))
|
|
|
|
objFromStore, exists, err := fdc.deploymentStore.GetByKey(key)
|
|
if err != nil {
|
|
return statusError, err
|
|
}
|
|
if !exists {
|
|
// don't delete local deployments for now. Do not reconcile it anymore.
|
|
return statusAllOk, nil
|
|
}
|
|
obj, err := conversion.NewCloner().DeepCopy(objFromStore)
|
|
fd, ok := obj.(*extensionsv1.Deployment)
|
|
if err != nil || !ok {
|
|
glog.Errorf("Error in retrieving obj from store: %v, %v", ok, err)
|
|
return statusError, err
|
|
}
|
|
|
|
if fd.DeletionTimestamp != nil {
|
|
if err := fdc.delete(fd); err != nil {
|
|
glog.Errorf("Failed to delete %s: %v", fd.Name, err)
|
|
fdc.eventRecorder.Eventf(fd, api.EventTypeNormal, "DeleteFailed",
|
|
"Deployment delete failed: %v", err)
|
|
return statusError, err
|
|
}
|
|
return statusAllOk, nil
|
|
}
|
|
|
|
glog.V(3).Infof("Ensuring delete object from underlying clusters finalizer for deployment: %s",
|
|
fd.Name)
|
|
// Add the required finalizers before creating a deployment in underlying clusters.
|
|
updatedDeploymentObj, err := fdc.deletionHelper.EnsureFinalizers(fd)
|
|
if err != nil {
|
|
glog.Errorf("Failed to ensure delete object from underlying clusters finalizer in deployment %s: %v",
|
|
fd.Name, err)
|
|
return statusError, err
|
|
}
|
|
fd = updatedDeploymentObj.(*extensionsv1.Deployment)
|
|
|
|
glog.V(3).Infof("Syncing deployment %s in underlying clusters", fd.Name)
|
|
|
|
clusters, err := fdc.fedDeploymentInformer.GetReadyClusters()
|
|
if err != nil {
|
|
return statusError, err
|
|
}
|
|
|
|
// collect current status and do schedule
|
|
allPods, err := fdc.fedPodInformer.GetTargetStore().List()
|
|
if err != nil {
|
|
return statusError, err
|
|
}
|
|
podStatus, err := podanalyzer.AnalysePods(fd.Spec.Selector, allPods, time.Now())
|
|
current := make(map[string]int64)
|
|
estimatedCapacity := make(map[string]int64)
|
|
for _, cluster := range clusters {
|
|
ldObj, exists, err := fdc.fedDeploymentInformer.GetTargetStore().GetByKey(cluster.Name, key)
|
|
if err != nil {
|
|
return statusError, err
|
|
}
|
|
if exists {
|
|
ld := ldObj.(*extensionsv1.Deployment)
|
|
current[cluster.Name] = int64(podStatus[cluster.Name].RunningAndReady) // include pending as well?
|
|
unschedulable := int64(podStatus[cluster.Name].Unschedulable)
|
|
if unschedulable > 0 {
|
|
estimatedCapacity[cluster.Name] = int64(*ld.Spec.Replicas) - unschedulable
|
|
}
|
|
}
|
|
}
|
|
|
|
scheduleResult := fdc.schedule(fd, clusters, current, estimatedCapacity)
|
|
|
|
glog.V(4).Infof("Start syncing local deployment %s: %v", key, scheduleResult)
|
|
|
|
fedStatus := extensionsv1.DeploymentStatus{ObservedGeneration: fd.Generation}
|
|
operations := make([]fedutil.FederatedOperation, 0)
|
|
for clusterName, replicas := range scheduleResult {
|
|
|
|
ldObj, exists, err := fdc.fedDeploymentInformer.GetTargetStore().GetByKey(clusterName, key)
|
|
if err != nil {
|
|
return statusError, err
|
|
}
|
|
|
|
// The object can be modified.
|
|
ld := fedutil.DeepCopyDeployment(fd)
|
|
specReplicas := int32(replicas)
|
|
ld.Spec.Replicas = &specReplicas
|
|
|
|
if !exists {
|
|
if replicas > 0 {
|
|
fdc.eventRecorder.Eventf(fd, api.EventTypeNormal, "CreateInCluster",
|
|
"Creating deployment in cluster %s", clusterName)
|
|
|
|
operations = append(operations, fedutil.FederatedOperation{
|
|
Type: fedutil.OperationTypeAdd,
|
|
Obj: ld,
|
|
ClusterName: clusterName,
|
|
})
|
|
}
|
|
} else {
|
|
// TODO: Update only one deployment at a time if update strategy is rolling udpate.
|
|
|
|
currentLd := ldObj.(*extensionsv1.Deployment)
|
|
// Update existing replica set, if needed.
|
|
if !fedutil.DeploymentEquivalent(ld, currentLd) {
|
|
fdc.eventRecorder.Eventf(fd, api.EventTypeNormal, "UpdateInCluster",
|
|
"Updating deployment in cluster %s", clusterName)
|
|
|
|
operations = append(operations, fedutil.FederatedOperation{
|
|
Type: fedutil.OperationTypeUpdate,
|
|
Obj: ld,
|
|
ClusterName: clusterName,
|
|
})
|
|
glog.Infof("Updating %s in %s", currentLd.Name, clusterName)
|
|
}
|
|
fedStatus.Replicas += currentLd.Status.Replicas
|
|
fedStatus.AvailableReplicas += currentLd.Status.AvailableReplicas
|
|
fedStatus.UnavailableReplicas += currentLd.Status.UnavailableReplicas
|
|
}
|
|
}
|
|
if fedStatus.Replicas != fd.Status.Replicas ||
|
|
fedStatus.AvailableReplicas != fd.Status.AvailableReplicas ||
|
|
fedStatus.UnavailableReplicas != fd.Status.UnavailableReplicas {
|
|
fd.Status = fedStatus
|
|
_, err = fdc.fedClient.Extensions().Deployments(fd.Namespace).UpdateStatus(fd)
|
|
if err != nil {
|
|
return statusError, err
|
|
}
|
|
}
|
|
|
|
if len(operations) == 0 {
|
|
// Everything is in order
|
|
return statusAllOk, nil
|
|
}
|
|
err = fdc.fedUpdater.UpdateWithOnError(operations, updateTimeout, func(op fedutil.FederatedOperation, operror error) {
|
|
fdc.eventRecorder.Eventf(fd, api.EventTypeNormal, "FailedUpdateInCluster",
|
|
"Deployment update in cluster %s failed: %v", op.ClusterName, operror)
|
|
})
|
|
if err != nil {
|
|
glog.Errorf("Failed to execute updates for %s: %v", key, err)
|
|
return statusError, err
|
|
}
|
|
|
|
// Some operations were made, reconcile after a while.
|
|
return statusNeedRecheck, nil
|
|
}
|
|
|
|
func (fdc *DeploymentController) reconcileDeploymentsOnClusterChange() {
|
|
if !fdc.isSynced() {
|
|
fdc.clusterDeliverer.DeliverAfter(allClustersKey, nil, clusterAvailableDelay)
|
|
}
|
|
deps := fdc.deploymentStore.List()
|
|
for _, dep := range deps {
|
|
key, _ := controller.KeyFunc(dep)
|
|
fdc.deliverDeploymentByKey(key, 0, false)
|
|
}
|
|
}
|
|
|
|
// delete deletes the given deployment or returns error if the deletion was not complete.
|
|
func (fdc *DeploymentController) delete(deployment *extensionsv1.Deployment) error {
|
|
glog.V(3).Infof("Handling deletion of deployment: %v", *deployment)
|
|
_, err := fdc.deletionHelper.HandleObjectInUnderlyingClusters(deployment)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
err = fdc.fedClient.Extensions().Deployments(deployment.Namespace).Delete(deployment.Name, nil)
|
|
if err != nil {
|
|
// Its all good if the error is not found error. That means it is deleted already and we do not have to do anything.
|
|
// This is expected when we are processing an update as a result of deployment finalizer deletion.
|
|
// The process that deleted the last finalizer is also going to delete the deployment and we do not have to do anything.
|
|
if !errors.IsNotFound(err) {
|
|
return fmt.Errorf("failed to delete deployment: %v", err)
|
|
}
|
|
}
|
|
return nil
|
|
}
|