1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
11 "git.arvados.org/arvados.git/lib/dispatchcloud/container"
12 "git.arvados.org/arvados.git/sdk/go/arvados"
13 "github.com/sirupsen/logrus"
16 var quietAfter503 = time.Minute
18 func (sch *Scheduler) runQueue() {
19 unsorted, _ := sch.queue.Entries()
20 sorted := make([]container.QueueEnt, 0, len(unsorted))
21 for _, ent := range unsorted {
22 sorted = append(sorted, ent)
24 sort.Slice(sorted, func(i, j int) bool {
25 if pi, pj := sorted[i].Container.Priority, sorted[j].Container.Priority; pi != pj {
28 // When containers have identical priority,
29 // start them in the order we first noticed
30 // them. This avoids extra lock/unlock cycles
31 // when we unlock the containers that don't
32 // fit in the available pool.
33 return sorted[i].FirstSeenAt.Before(sorted[j].FirstSeenAt)
37 running := sch.pool.Running()
38 unalloc := sch.pool.Unallocated()
40 if t := sch.client.Last503(); t.After(sch.last503time) {
41 // API has sent an HTTP 503 response since last time
42 // we checked. Use current #containers - 1 as
43 // maxConcurrency, i.e., try to stay just below the
44 // level where we see 503s.
46 if newlimit := len(running) - 1; newlimit < 1 {
47 sch.maxConcurrency = 1
49 sch.maxConcurrency = newlimit
51 } else if sch.maxConcurrency > 0 && time.Since(sch.last503time) > quietAfter503 {
52 // If we haven't seen any 503 errors lately, raise
53 // limit to ~10% beyond the current workload.
55 // As we use the added 10% to schedule more
56 // containers, len(running) will increase and we'll
57 // push the limit up further. Soon enough,
58 // maxConcurrency will get high enough to schedule the
59 // entire queue, hit pool quota, or get 503s again.
60 max := len(running)*11/10 + 1
61 if sch.maxConcurrency < max {
62 sch.maxConcurrency = max
65 if sch.last503time.IsZero() {
66 sch.mLast503Time.Set(0)
68 sch.mLast503Time.Set(float64(sch.last503time.Unix()))
70 sch.mMaxContainerConcurrency.Set(float64(sch.maxConcurrency))
72 sch.logger.WithFields(logrus.Fields{
73 "Containers": len(sorted),
74 "Processes": len(running),
75 "maxConcurrency": sch.maxConcurrency,
78 dontstart := map[arvados.InstanceType]bool{}
79 var overquota []container.QueueEnt // entries that are unmappable because of worker pool quota
80 var containerAllocatedWorkerBootingCount int
82 // trying is #containers running + #containers we're trying to
83 // start. We stop trying to start more containers if this
84 // reaches the dynamic maxConcurrency limit.
85 trying := len(running)
88 for i, ctr := range sorted {
89 ctr, it := ctr.Container, ctr.InstanceType
90 logger := sch.logger.WithFields(logrus.Fields{
91 "ContainerUUID": ctr.UUID,
92 "InstanceType": it.Name,
94 if _, running := running[ctr.UUID]; running || ctr.Priority < 1 {
98 case arvados.ContainerStateQueued:
99 if sch.maxConcurrency > 0 && trying >= sch.maxConcurrency {
100 logger.Tracef("not locking: already at maxConcurrency %d", sch.maxConcurrency)
101 overquota = sorted[i:]
105 if unalloc[it] < 1 && sch.pool.AtQuota() {
106 logger.Trace("not locking: AtQuota and no unalloc workers")
107 overquota = sorted[i:]
110 if sch.pool.KillContainer(ctr.UUID, "about to lock") {
111 logger.Info("not locking: crunch-run process from previous attempt has not exited")
114 go sch.lockContainer(logger, ctr.UUID)
116 case arvados.ContainerStateLocked:
117 if sch.maxConcurrency > 0 && trying >= sch.maxConcurrency {
118 logger.Debugf("not starting: already at maxConcurrency %d", sch.maxConcurrency)
119 overquota = sorted[i:]
125 } else if sch.pool.AtQuota() {
126 // Don't let lower-priority containers
127 // starve this one by using keeping
128 // idle workers alive on different
130 logger.Trace("overquota")
131 overquota = sorted[i:]
133 } else if sch.pool.Create(it) {
134 // Success. (Note pool.Create works
135 // asynchronously and does its own
136 // logging about the eventual outcome,
137 // so we don't need to.)
138 logger.Info("creating new instance")
140 // Failed despite not being at quota,
141 // e.g., cloud ops throttled. TODO:
142 // avoid getting starved here if
143 // instances of a specific type always
145 logger.Trace("pool declined to create new instance")
150 // We already tried & failed to start
151 // a higher-priority container on the
152 // same instance type. Don't let this
153 // one sneak in ahead of it.
154 } else if sch.pool.KillContainer(ctr.UUID, "about to start") {
155 logger.Info("not restarting yet: crunch-run process from previous attempt has not exited")
156 } else if sch.pool.StartContainer(it, ctr) {
157 logger.Trace("StartContainer => true")
160 logger.Trace("StartContainer => false")
161 containerAllocatedWorkerBootingCount += 1
167 sch.mContainersAllocatedNotStarted.Set(float64(containerAllocatedWorkerBootingCount))
168 sch.mContainersNotAllocatedOverQuota.Set(float64(len(overquota)))
170 if len(overquota) > 0 {
171 // Unlock any containers that are unmappable while
172 // we're at quota (but if they have already been
173 // scheduled and they're loading docker images etc.,
175 for _, ctr := range overquota {
177 _, toolate := running[ctr.UUID]
178 if ctr.State == arvados.ContainerStateLocked && !toolate {
179 logger := sch.logger.WithField("ContainerUUID", ctr.UUID)
180 logger.Debug("unlock because pool capacity is used by higher priority containers")
181 err := sch.queue.Unlock(ctr.UUID)
183 logger.WithError(err).Warn("error unlocking")
187 // Shut down idle workers that didn't get any
188 // containers mapped onto them before we hit quota.
189 for it, n := range unalloc {
193 sch.pool.Shutdown(it)
198 // Lock the given container. Should be called in a new goroutine.
199 func (sch *Scheduler) lockContainer(logger logrus.FieldLogger, uuid string) {
200 if !sch.uuidLock(uuid, "lock") {
203 defer sch.uuidUnlock(uuid)
204 if ctr, ok := sch.queue.Get(uuid); !ok || ctr.State != arvados.ContainerStateQueued {
205 // This happens if the container has been cancelled or
206 // locked since runQueue called sch.queue.Entries(),
207 // possibly by a lockContainer() call from a previous
208 // runQueue iteration. In any case, we will respond
209 // appropriately on the next runQueue iteration, which
210 // will have already been triggered by the queue
212 logger.WithField("State", ctr.State).Debug("container no longer queued by the time we decided to lock it, doing nothing")
215 err := sch.queue.Lock(uuid)
217 logger.WithError(err).Warn("error locking container")
220 logger.Debug("lock succeeded")
221 ctr, ok := sch.queue.Get(uuid)
223 logger.Error("(BUG?) container disappeared from queue after Lock succeeded")
224 } else if ctr.State != arvados.ContainerStateLocked {
225 logger.Warnf("(race?) container has state=%q after Lock succeeded", ctr.State)
229 // Acquire a non-blocking lock for specified UUID, returning true if
230 // successful. The op argument is used only for debug logs.
232 // If the lock is not available, uuidLock arranges to wake up the
233 // scheduler after a short delay, so it can retry whatever operation
234 // is trying to get the lock (if that operation is still worth doing).
236 // This mechanism helps avoid spamming the controller/database with
237 // concurrent updates for any single container, even when the
238 // scheduler loop is running frequently.
239 func (sch *Scheduler) uuidLock(uuid, op string) bool {
241 defer sch.mtx.Unlock()
242 logger := sch.logger.WithFields(logrus.Fields{
243 "ContainerUUID": uuid,
246 if op, locked := sch.uuidOp[uuid]; locked {
247 logger.Debugf("uuidLock not available, Op=%s in progress", op)
248 // Make sure the scheduler loop wakes up to retry.
249 sch.wakeup.Reset(time.Second / 4)
252 logger.Debug("uuidLock acquired")
253 sch.uuidOp[uuid] = op
257 func (sch *Scheduler) uuidUnlock(uuid string) {
259 defer sch.mtx.Unlock()
260 delete(sch.uuidOp, uuid)