5 include ApplicationHelper
9 EXIT_RETRY_UNLOCKED = 93
10 RETRY_UNLOCKED_LIMIT = 3
14 self.utc.strftime "%Y-%m-%d_%H:%M:%S"
19 @crunch_job_bin = (ENV['CRUNCH_JOB_BIN'] || `which arv-crunch-job`.strip)
20 if @crunch_job_bin.empty?
21 raise "No CRUNCH_JOB_BIN env var, and crunch-job not in path."
24 @docker_bin = ENV['CRUNCH_JOB_DOCKER_BIN']
26 @arvados_internal = Rails.configuration.git_internal_dir
27 if not File.exists? @arvados_internal
28 $stderr.puts `mkdir -p #{@arvados_internal.shellescape} && git init --bare #{@arvados_internal.shellescape}`
29 raise "No internal git repository available" unless ($? == 0)
32 @repo_root = Rails.configuration.git_repositories_dir
33 @arvados_repo_path = Repository.where(name: "arvados").first.server_path
39 @pipe_auth_tokens = {}
42 @todo_job_retries = {}
43 @job_retry_counts = Hash.new(0)
48 return act_as_system_user
53 @todo = @todo_job_retries.values + Job.queue.select(&:repository)
55 if @runoptions[:pipelines]
56 @todo_pipelines = PipelineInstance.queue
60 def each_slurm_line(cmd, outfmt, max_fields=nil)
61 max_fields ||= outfmt.split(":").size
62 max_fields += 1 # To accommodate the node field we add
63 @@slurm_version ||= Gem::Version.new(`sinfo --version`.match(/\b[\d\.]+\b/)[0])
64 if Gem::Version.new('2.3') <= @@slurm_version
65 `#{cmd} --noheader -o '%n:#{outfmt}'`.each_line do |line|
66 yield line.chomp.split(":", max_fields)
69 # Expand rows with hostname ranges (like "foo[1-3,5,9-12]:idle")
70 # into multiple rows with one hostname each.
71 `#{cmd} --noheader -o '%N:#{outfmt}'`.each_line do |line|
72 tokens = line.chomp.split(":", max_fields)
73 if (re = tokens[0].match /^(.*?)\[([-,\d]+)\]$/)
75 re[2].split(",").each do |range|
76 range = range.split("-").collect(&:to_i)
77 (range[0]..range[-1]).each do |n|
78 yield [re[1] + n.to_s] + tokens
90 each_slurm_line("sinfo", "%t") do |hostname, state|
91 # Treat nodes in idle* state as down, because the * means that slurm
92 # hasn't been able to communicate with it recently.
93 state.sub!(/^idle\*/, "down")
94 state.sub!(/\W+$/, "")
95 state = "down" unless %w(idle alloc down).include?(state)
96 slurm_nodes[hostname] = {state: state, job: nil}
98 each_slurm_line("squeue", "%j") do |hostname, job_uuid|
99 slurm_nodes[hostname][:job] = job_uuid if slurm_nodes[hostname]
104 def update_node_status
105 return unless Server::Application.config.crunch_job_wrapper.to_s.match /^slurm/
106 slurm_status.each_pair do |hostname, slurmdata|
107 next if @node_state[hostname] == slurmdata
109 node = Node.where('hostname=?', hostname).order(:last_ping_at).last
111 $stderr.puts "dispatch: update #{hostname} state to #{slurmdata}"
112 node.info["slurm_state"] = slurmdata[:state]
113 node.job_uuid = slurmdata[:job]
115 @node_state[hostname] = slurmdata
117 $stderr.puts "dispatch: failed to update #{node.uuid}: #{node.errors.messages}"
119 elsif slurmdata[:state] != 'down'
120 $stderr.puts "dispatch: SLURM reports '#{hostname}' is not down, but no node has that name"
123 $stderr.puts "dispatch: error updating #{hostname} node status: #{error}"
128 def positive_int(raw_value, default=nil)
129 value = begin raw_value.to_i rescue 0 end
137 NODE_CONSTRAINT_MAP = {
138 # Map Job runtime_constraints keys to the corresponding Node info key.
139 'min_ram_mb_per_node' => 'total_ram_mb',
140 'min_scratch_mb_per_node' => 'total_scratch_mb',
141 'min_cores_per_node' => 'total_cpu_cores',
144 def nodes_available_for_job_now(job)
145 # Find Nodes that satisfy a Job's runtime constraints (by building
146 # a list of Procs and using them to test each Node). If there
147 # enough to run the Job, return an array of their names.
148 # Otherwise, return nil.
149 need_procs = NODE_CONSTRAINT_MAP.each_pair.map do |job_key, node_key|
151 positive_int(node.properties[node_key], 0) >=
152 positive_int(job.runtime_constraints[job_key], 0)
155 min_node_count = positive_int(job.runtime_constraints['min_nodes'], 1)
157 Node.all.select do |node|
158 node.info['slurm_state'] == 'idle'
159 end.sort_by do |node|
160 # Prefer nodes with no price, then cheap nodes, then expensive nodes
161 node.properties['cloud_node']['price'].to_f rescue 0
163 if need_procs.select { |need_proc| not need_proc.call(node) }.any?
164 # At least one runtime constraint is not satisfied by this node
168 if usable_nodes.count >= min_node_count
169 return usable_nodes.map { |node| node.hostname }
175 def nodes_available_for_job(job)
176 # Check if there are enough idle nodes with the Job's minimum
177 # hardware requirements to run it. If so, return an array of
178 # their names. If not, up to once per hour, signal start_jobs to
179 # hold off launching Jobs. This delay is meant to give the Node
180 # Manager an opportunity to make new resources available for new
183 # The exact timing parameters here might need to be adjusted for
184 # the best balance between helping the longest-waiting Jobs run,
185 # and making efficient use of immediately available resources.
186 # These are all just first efforts until we have more data to work
188 nodelist = nodes_available_for_job_now(job)
189 if nodelist.nil? and not did_recently(:wait_for_available_nodes, 3600)
190 $stderr.puts "dispatch: waiting for nodes for #{job.uuid}"
191 @node_wait_deadline = Time.now + 5.minutes
196 def fail_job job, message
197 $stderr.puts "dispatch: #{job.uuid}: #{message}"
199 Log.new(object_uuid: job.uuid,
200 event_type: 'dispatch',
201 owner_uuid: job.owner_uuid,
203 properties: {"text" => message}).save!
205 $stderr.puts "dispatch: log.create failed"
208 if not have_job_lock?(job)
210 job.lock @authorizations[job.uuid].user.uuid
211 rescue ArvadosModel::AlreadyLockedError
212 $stderr.puts "dispatch: tried to mark job #{job.uuid} as failed but it was already locked by someone else"
219 $stderr.puts "dispatch: save failed setting job #{job.uuid} to failed"
223 def stdout_s(cmd_a, opts={})
224 IO.popen(cmd_a, "r", opts) do |pipe|
225 return pipe.read.chomp
230 ["git", "--git-dir=#{@arvados_internal}"] + cmd_a
233 def get_authorization(job)
234 if @authorizations[job.uuid] and
235 @authorizations[job.uuid].user.uuid != job.modified_by_user_uuid
236 # We already made a token for this job, but we need a new one
237 # because modified_by_user_uuid has changed (the job will run
238 # as a different user).
239 @authorizations[job.uuid].update_attributes expires_at: Time.now
240 @authorizations[job.uuid] = nil
242 if not @authorizations[job.uuid]
243 auth = ApiClientAuthorization.
244 new(user: User.where('uuid=?', job.modified_by_user_uuid).first,
247 $stderr.puts "dispatch: auth.save failed for #{job.uuid}"
249 @authorizations[job.uuid] = auth
252 @authorizations[job.uuid]
255 def internal_repo_has_commit? sha1
256 if (not @fetched_commits[sha1] and
257 sha1 == stdout_s(git_cmd("rev-list", "-n1", sha1), err: "/dev/null") and
259 @fetched_commits[sha1] = true
261 return @fetched_commits[sha1]
264 def get_commit src_repo, sha1
265 return true if internal_repo_has_commit? sha1
267 # commit does not exist in internal repository, so import the
268 # source repository using git fetch-pack
269 cmd = git_cmd("fetch-pack", "--no-progress", "--all", src_repo)
270 $stderr.puts "dispatch: #{cmd}"
271 $stderr.puts(stdout_s(cmd))
272 @fetched_commits[sha1] = ($? == 0)
275 def tag_commit(commit_hash, tag_name)
276 # @git_tags[T]==V if we know commit V has been tagged T in the
277 # arvados_internal repository.
278 if not @git_tags[tag_name]
279 cmd = git_cmd("tag", tag_name, commit_hash)
280 $stderr.puts "dispatch: #{cmd}"
281 $stderr.puts(stdout_s(cmd, err: "/dev/null"))
283 # git tag failed. This may be because the tag already exists, so check for that.
284 tag_rev = stdout_s(git_cmd("rev-list", "-n1", tag_name))
286 # We got a revision back
287 if tag_rev != commit_hash
288 # Uh oh, the tag doesn't point to the revision we were expecting.
289 # Someone has been monkeying with the job record and/or git.
290 fail_job job, "Existing tag #{tag_name} points to commit #{tag_rev} but expected commit #{commit_hash}"
293 # we're okay (fall through to setting @git_tags below)
295 # git rev-list failed for some reason.
296 fail_job job, "'git tag' for #{tag_name} failed but did not find any existing tag using 'git rev-list'"
300 # 'git tag' was successful, or there is an existing tag that points to the same revision.
301 @git_tags[tag_name] = commit_hash
302 elsif @git_tags[tag_name] != commit_hash
303 fail_job job, "Existing tag #{tag_name} points to commit #{@git_tags[tag_name]} but this job uses commit #{commit_hash}"
311 next if @running[job.uuid]
314 case Server::Application.config.crunch_job_wrapper
317 # Don't run more than one at a time.
321 when :slurm_immediate
322 nodelist = nodes_available_for_job(job)
324 if Time.now < @node_wait_deadline
330 cmd_args = ["salloc",
335 "--job-name=#{job.uuid}",
336 "--nodelist=#{nodelist.join(',')}"]
338 raise "Unknown crunch_job_wrapper: #{Server::Application.config.crunch_job_wrapper}"
341 if Server::Application.config.crunch_job_user
342 cmd_args.unshift("sudo", "-E", "-u",
343 Server::Application.config.crunch_job_user,
344 "LD_LIBRARY_PATH=#{ENV['LD_LIBRARY_PATH']}",
345 "PATH=#{ENV['PATH']}",
346 "PERLLIB=#{ENV['PERLLIB']}",
347 "PYTHONPATH=#{ENV['PYTHONPATH']}",
348 "RUBYLIB=#{ENV['RUBYLIB']}",
349 "GEM_PATH=#{ENV['GEM_PATH']}")
352 next unless get_authorization job
354 ready = internal_repo_has_commit? job.script_version
357 # Import the commit from the specified repository into the
358 # internal repository. This should have been done already when
359 # the job was created/updated; this code is obsolete except to
360 # avoid deployment races. Failing the job would be a
361 # reasonable thing to do at this point.
362 repo = Repository.where(name: job.repository).first
363 if repo.nil? or repo.server_path.nil?
364 fail_job "Repository #{job.repository} not found under #{@repo_root}"
367 ready &&= get_commit repo.server_path, job.script_version
368 ready &&= tag_commit job.script_version, job.uuid
371 # This should be unnecessary, because API server does it during
372 # job create/update, but it's still not a bad idea to verify the
373 # tag is correct before starting the job:
374 ready &&= tag_commit job.script_version, job.uuid
376 # The arvados_sdk_version doesn't support use of arbitrary
377 # remote URLs, so the requested version isn't necessarily copied
378 # into the internal repository yet.
379 if job.arvados_sdk_version
380 ready &&= get_commit @arvados_repo_path, job.arvados_sdk_version
381 ready &&= tag_commit job.arvados_sdk_version, "#{job.uuid}-arvados-sdk"
385 fail_job job, "commit not present in internal repository"
389 cmd_args += [@crunch_job_bin,
390 '--job-api-token', @authorizations[job.uuid].api_token,
392 '--git-dir', @arvados_internal]
395 cmd_args += ['--docker-bin', @docker_bin]
398 if have_job_lock?(job)
399 cmd_args << "--force-unlock"
402 $stderr.puts "dispatch: #{cmd_args.join ' '}"
405 i, o, e, t = Open3.popen3(*cmd_args)
407 $stderr.puts "dispatch: popen3: #{$!}"
412 $stderr.puts "dispatch: job #{job.uuid}"
413 start_banner = "dispatch: child #{t.pid} start #{LogTime.now}"
414 $stderr.puts start_banner
416 @running[job.uuid] = {
422 buf: {stderr: '', stdout: ''},
425 job_auth: @authorizations[job.uuid],
426 stderr_buf_to_flush: '',
427 stderr_flushed_at: Time.new(0),
430 log_throttle_is_open: true,
431 log_throttle_reset_time: Time.now + Rails.configuration.crunch_log_throttle_period,
432 log_throttle_bytes_so_far: 0,
433 log_throttle_lines_so_far: 0,
434 log_throttle_bytes_skipped: 0,
437 @todo_job_retries.delete(job.uuid)
442 # Test for hard cap on total output and for log throttling. Returns whether
443 # the log line should go to output or not. Modifies "line" in place to
444 # replace it with an error if a logging limit is tripped.
445 def rate_limit running_job, line
448 if running_job[:log_throttle_is_open]
449 running_job[:log_throttle_lines_so_far] += 1
450 running_job[:log_throttle_bytes_so_far] += linesize
451 running_job[:bytes_logged] += linesize
453 if (running_job[:bytes_logged] >
454 Rails.configuration.crunch_limit_log_bytes_per_job)
455 message = "Exceeded log limit #{Rails.configuration.crunch_limit_log_bytes_per_job} bytes (crunch_limit_log_bytes_per_job). Log will be truncated."
456 running_job[:log_throttle_reset_time] = Time.now + 100.years
457 running_job[:log_throttle_is_open] = false
459 elsif (running_job[:log_throttle_bytes_so_far] >
460 Rails.configuration.crunch_log_throttle_bytes)
461 remaining_time = running_job[:log_throttle_reset_time] - Time.now
462 message = "Exceeded rate #{Rails.configuration.crunch_log_throttle_bytes} bytes per #{Rails.configuration.crunch_log_throttle_period} seconds (crunch_log_throttle_bytes). Logging will be silenced for the next #{remaining_time.round} seconds.\n"
463 running_job[:log_throttle_is_open] = false
465 elsif (running_job[:log_throttle_lines_so_far] >
466 Rails.configuration.crunch_log_throttle_lines)
467 remaining_time = running_job[:log_throttle_reset_time] - Time.now
468 message = "Exceeded rate #{Rails.configuration.crunch_log_throttle_lines} lines per #{Rails.configuration.crunch_log_throttle_period} seconds (crunch_log_throttle_lines), logging will be silenced for the next #{remaining_time.round} seconds.\n"
469 running_job[:log_throttle_is_open] = false
473 if not running_job[:log_throttle_is_open]
474 # Don't log anything if any limit has been exceeded. Just count lossage.
475 running_job[:log_throttle_bytes_skipped] += linesize
479 # Yes, write to logs, but use our "rate exceeded" message
480 # instead of the log message that exceeded the limit.
484 running_job[:log_throttle_is_open]
489 @running.each do |job_uuid, j|
493 if now > j[:log_throttle_reset_time]
494 # It has been more than throttle_period seconds since the last
495 # checkpoint so reset the throttle
496 if j[:log_throttle_bytes_skipped] > 0
497 message = "#{job_uuid} ! Skipped #{j[:log_throttle_bytes_skipped]} bytes of log"
499 j[:stderr_buf_to_flush] << "#{LogTime.now} #{message}\n"
502 j[:log_throttle_reset_time] = now + Rails.configuration.crunch_log_throttle_period
503 j[:log_throttle_bytes_so_far] = 0
504 j[:log_throttle_lines_so_far] = 0
505 j[:log_throttle_bytes_skipped] = 0
506 j[:log_throttle_is_open] = true
509 j[:buf].each do |stream, streambuf|
510 # Read some data from the child stream
513 # It's important to use a big enough buffer here. When we're
514 # being flooded with logs, we must read and discard many
515 # bytes at once. Otherwise, we can easily peg a CPU with
516 # time-checking and other loop overhead. (Quick tests show a
517 # 1MiB buffer working 2.5x as fast as a 64 KiB buffer.)
519 # So don't reduce this buffer size!
520 buf = j[stream].read_nonblock(2**20)
521 rescue Errno::EAGAIN, EOFError
524 # Short circuit the counting code if we're just going to throw
525 # away the data anyway.
526 if not j[:log_throttle_is_open]
527 j[:log_throttle_bytes_skipped] += streambuf.size + buf.size
534 # Append to incomplete line from previous read, if any
538 streambuf.each_line do |line|
539 if not line.end_with? $/
540 if line.size > Rails.configuration.crunch_log_throttle_bytes
541 # Without a limit here, we'll use 2x an arbitrary amount
542 # of memory, and waste a lot of time copying strings
543 # around, all without providing any feedback to anyone
544 # about what's going on _or_ hitting any of our throttle
547 # Here we leave "line" alone, knowing it will never be
548 # sent anywhere: rate_limit() will reach
549 # crunch_log_throttle_bytes immediately. However, we'll
550 # leave [...] in bufend: if the trailing end of the long
551 # line does end up getting sent anywhere, it will have
552 # some indication that it is incomplete.
555 # If line length is sane, we'll wait for the rest of the
556 # line to appear in the next read_pipes() call.
561 # rate_limit returns true or false as to whether to actually log
562 # the line or not. It also modifies "line" in place to replace
563 # it with an error if a logging limit is tripped.
564 if rate_limit j, line
565 $stderr.print "#{job_uuid} ! " unless line.index(job_uuid)
567 pub_msg = "#{LogTime.now} #{line.strip}\n"
568 j[:stderr_buf_to_flush] << pub_msg
572 # Leave the trailing incomplete line (if any) in streambuf for
574 streambuf.replace bufend
576 # Flush buffered logs to the logs table, if appropriate. We have
577 # to do this even if we didn't collect any new logs this time:
578 # otherwise, buffered data older than seconds_between_events
579 # won't get flushed until new data arrives.
585 return if 0 == @running.size
591 pid_done = waitpid(-1, Process::WNOHANG | Process::WUNTRACED)
593 j_done = @running.values.
594 select { |j| j[:wait_thr].pid == pid_done }.
597 rescue SystemCallError
598 # I have @running processes but system reports I have no
599 # children. This is likely to happen repeatedly if it happens at
600 # all; I will log this no more than once per child process I
602 if 0 < @running.select { |uuid,j| j[:warned_waitpid_error].nil? }.size
603 children = @running.values.collect { |j| j[:wait_thr].pid }.join ' '
604 $stderr.puts "dispatch: IPC bug: waitpid() error (#{$!}), but I have children #{children}"
606 @running.each do |uuid,j| j[:warned_waitpid_error] = true end
609 @running.each do |uuid, j|
610 if j[:wait_thr].status == false
611 pid_done = j[:wait_thr].pid
619 job_done = j_done[:job]
621 # Ensure every last drop of stdout and stderr is consumed.
623 # Reset flush timestamp to make sure log gets written.
624 j_done[:stderr_flushed_at] = Time.new(0)
625 # Write any remaining logs.
628 j_done[:buf].each do |stream, streambuf|
630 $stderr.puts streambuf + "\n"
634 # Wait the thread (returns a Process::Status)
635 exit_status = j_done[:wait_thr].value.exitstatus
636 exit_tempfail = exit_status == EXIT_TEMPFAIL
638 $stderr.puts "dispatch: child #{pid_done} exit #{exit_status}"
639 $stderr.puts "dispatch: job #{job_done.uuid} end"
641 jobrecord = Job.find_by_uuid(job_done.uuid)
643 if exit_status == EXIT_RETRY_UNLOCKED
644 # The job failed because all of the nodes allocated to it
645 # failed. Only this crunch-dispatch process can retry the job:
646 # it's already locked, and there's no way to put it back in the
647 # Queued state. Put it in our internal todo list unless the job
648 # has failed this way excessively.
649 @job_retry_counts[jobrecord.uuid] += 1
650 exit_tempfail = @job_retry_counts[jobrecord.uuid] <= RETRY_UNLOCKED_LIMIT
652 @todo_job_retries[jobrecord.uuid] = jobrecord
654 $stderr.puts("dispatch: job #{jobrecord.uuid} exceeded node failure retry limit -- giving up")
659 @job_retry_counts.delete(jobrecord.uuid)
660 if jobrecord.state == "Running"
661 # Apparently there was an unhandled error. That could potentially
662 # include "all allocated nodes failed" when we don't to retry
663 # because the job has already been retried RETRY_UNLOCKED_LIMIT
664 # times. Fail the job.
665 jobrecord.state = "Failed"
666 if not jobrecord.save
667 $stderr.puts "dispatch: jobrecord.save failed"
671 # If the job failed to run due to an infrastructure
672 # issue with crunch-job or slurm, we want the job to stay in the
673 # queue. If crunch-job exited after losing a race to another
674 # crunch-job process, it exits 75 and we should leave the job
675 # record alone so the winner of the race can do its thing.
676 # If crunch-job exited after all of its allocated nodes failed,
677 # it exits 93, and we want to retry it later (see the
678 # EXIT_RETRY_UNLOCKED `if` block).
680 # There is still an unhandled race condition: If our crunch-job
681 # process is about to lose a race with another crunch-job
682 # process, but crashes before getting to its "exit 75" (for
683 # example, "cannot fork" or "cannot reach API server") then we
684 # will assume incorrectly that it's our process's fault
685 # jobrecord.started_at is non-nil, and mark the job as failed
686 # even though the winner of the race is probably still doing
690 # Invalidate the per-job auth token, unless the job is still queued and we
691 # might want to try it again.
692 if jobrecord.state != "Queued" and !@todo_job_retries.include?(jobrecord.uuid)
693 j_done[:job_auth].update_attributes expires_at: Time.now
696 @running.delete job_done.uuid
700 expire_tokens = @pipe_auth_tokens.dup
701 @todo_pipelines.each do |p|
702 pipe_auth = (@pipe_auth_tokens[p.uuid] ||= ApiClientAuthorization.
703 create(user: User.where('uuid=?', p.modified_by_user_uuid).first,
705 puts `export ARVADOS_API_TOKEN=#{pipe_auth.api_token} && arv-run-pipeline-instance --run-pipeline-here --no-wait --instance #{p.uuid}`
706 expire_tokens.delete p.uuid
709 expire_tokens.each do |k, v|
710 v.update_attributes expires_at: Time.now
711 @pipe_auth_tokens.delete k
717 (argv.any? ? argv : ['--jobs', '--pipelines']).each do |arg|
720 @runoptions[:jobs] = true
722 @runoptions[:pipelines] = true
724 abort "Unrecognized command line option '#{arg}'"
727 if not (@runoptions[:jobs] or @runoptions[:pipelines])
728 abort "Nothing to do. Please specify at least one of: --jobs, --pipelines."
735 # We want files written by crunch-dispatch to be writable by other
736 # processes with the same GID, see bug #7228
739 # This is how crunch-job child procs know where the "refresh"
741 ENV["CRUNCH_REFRESH_TRIGGER"] = Rails.configuration.crunch_refresh_trigger
743 # If salloc can't allocate resources immediately, make it use our
744 # temporary failure exit code. This ensures crunch-dispatch won't
745 # mark a job failed because of an issue with node allocation.
746 # This often happens when another dispatcher wins the race to
748 ENV["SLURM_EXIT_IMMEDIATE"] = CrunchDispatch::EXIT_TEMPFAIL.to_s
750 if ENV["CRUNCH_DISPATCH_LOCKFILE"]
751 lockfilename = ENV.delete "CRUNCH_DISPATCH_LOCKFILE"
752 lockfile = File.open(lockfilename, File::RDWR|File::CREAT, 0644)
753 unless lockfile.flock File::LOCK_EX|File::LOCK_NB
754 abort "Lock unavailable on #{lockfilename} - exit"
759 %w{TERM INT}.each do |sig|
762 $stderr.puts "Received #{signame} signal"
763 @signal[:term] = true
768 User.first.group_permissions
769 $stderr.puts "dispatch: ready"
770 while !@signal[:term] or @running.size > 0
773 @running.each do |uuid, j|
774 if !j[:started] and j[:sent_int] < 2
776 Process.kill 'INT', j[:wait_thr].pid
778 # No such pid = race condition + desired result is
785 refresh_todo unless did_recently(:refresh_todo, 1.0)
786 update_node_status unless did_recently(:update_node_status, 1.0)
787 unless @todo.empty? or did_recently(:start_jobs, 1.0) or @signal[:term]
790 unless (@todo_pipelines.empty? and @pipe_auth_tokens.empty?) or did_recently(:update_pipelines, 5.0)
795 select(@running.values.collect { |j| [j[:stdout], j[:stderr]] }.flatten,
798 # If there are jobs we wanted to retry, we have to mark them as failed now.
799 # Other dispatchers can't pick them up because we hold their lock.
800 @todo_job_retries.each_key do |job_uuid|
801 job = Job.find_by_uuid(job_uuid)
802 if job.state == "Running"
803 fail_job(job, "crunch-dispatch was stopped during job's tempfail retry loop")
810 def have_job_lock?(job)
811 # Return true if the given job is locked by this crunch-dispatch, normally
812 # because we've run crunch-job for it.
813 @todo_job_retries.include?(job.uuid)
816 def did_recently(thing, min_interval)
817 if !@did_recently[thing] or @did_recently[thing] < Time.now - min_interval
818 @did_recently[thing] = Time.now
825 # send message to log table. we want these records to be transient
826 def write_log running_job
827 return if running_job[:stderr_buf_to_flush] == ''
829 # Send out to log event if buffer size exceeds the bytes per event or if
830 # it has been at least crunch_log_seconds_between_events seconds since
832 if running_job[:stderr_buf_to_flush].size > Rails.configuration.crunch_log_bytes_per_event or
833 (Time.now - running_job[:stderr_flushed_at]) >= Rails.configuration.crunch_log_seconds_between_events
835 log = Log.new(object_uuid: running_job[:job].uuid,
836 event_type: 'stderr',
837 owner_uuid: running_job[:job].owner_uuid,
838 properties: {"text" => running_job[:stderr_buf_to_flush]})
840 running_job[:events_logged] += 1
842 $stderr.puts "Failed to write logs"
843 $stderr.puts exception.backtrace
845 running_job[:stderr_buf_to_flush] = ''
846 running_job[:stderr_flushed_at] = Time.now