1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
11 "git.arvados.org/arvados.git/lib/dispatchcloud/container"
12 "git.arvados.org/arvados.git/sdk/go/arvados"
13 "github.com/sirupsen/logrus"
16 var quietAfter503 = time.Minute
18 func (sch *Scheduler) runQueue() {
19 unsorted, _ := sch.queue.Entries()
20 sorted := make([]container.QueueEnt, 0, len(unsorted))
21 for _, ent := range unsorted {
22 sorted = append(sorted, ent)
24 sort.Slice(sorted, func(i, j int) bool {
25 if pi, pj := sorted[i].Container.Priority, sorted[j].Container.Priority; pi != pj {
28 // When containers have identical priority,
29 // start them in the order we first noticed
30 // them. This avoids extra lock/unlock cycles
31 // when we unlock the containers that don't
32 // fit in the available pool.
33 return sorted[i].FirstSeenAt.Before(sorted[j].FirstSeenAt)
37 running := sch.pool.Running()
38 unalloc := sch.pool.Unallocated()
40 if t := sch.client.Last503(); t.After(sch.last503time) {
41 // API has sent an HTTP 503 response since last time
42 // we checked. Use current #containers - 1 as
43 // maxConcurrency, i.e., try to stay just below the
44 // level where we see 503s.
46 if newlimit := len(running) - 1; newlimit < 1 {
47 sch.maxConcurrency = 1
49 sch.maxConcurrency = newlimit
51 } else if sch.maxConcurrency > 0 && time.Since(sch.last503time) > quietAfter503 {
52 // If we haven't seen any 503 errors lately, raise
53 // limit to ~10% beyond the current workload.
55 // As we use the added 10% to schedule more
56 // containers, len(running) will increase and we'll
57 // push the limit up further. Soon enough,
58 // maxConcurrency will get high enough to schedule the
59 // entire queue, hit pool quota, or get 503s again.
60 max := len(running)*11/10 + 1
61 if sch.maxConcurrency < max {
62 sch.maxConcurrency = max
65 if sch.last503time.IsZero() {
66 sch.mLast503Time.Set(0)
68 sch.mLast503Time.Set(float64(sch.last503time.Unix()))
70 sch.mMaxContainerConcurrency.Set(float64(sch.maxConcurrency))
72 sch.logger.WithFields(logrus.Fields{
73 "Containers": len(sorted),
74 "Processes": len(running),
75 "maxConcurrency": sch.maxConcurrency,
78 dontstart := map[arvados.InstanceType]bool{}
79 var overquota []container.QueueEnt // entries that are unmappable because of worker pool quota
80 var containerAllocatedWorkerBootingCount int
82 // trying is #containers running + #containers we're trying to
83 // start. We stop trying to start more containers if this
84 // reaches the dynamic maxConcurrency limit.
85 trying := len(running)
88 for i, ctr := range sorted {
89 ctr, it := ctr.Container, ctr.InstanceType
90 logger := sch.logger.WithFields(logrus.Fields{
91 "ContainerUUID": ctr.UUID,
92 "InstanceType": it.Name,
94 if _, running := running[ctr.UUID]; running || ctr.Priority < 1 {
98 case arvados.ContainerStateQueued:
99 if sch.maxConcurrency > 0 && trying >= sch.maxConcurrency {
100 logger.Tracef("not locking: already at maxConcurrency %d", sch.maxConcurrency)
101 overquota = sorted[i:]
105 if unalloc[it] < 1 && sch.pool.AtQuota() {
106 logger.Trace("not locking: AtQuota and no unalloc workers")
107 overquota = sorted[i:]
110 if sch.pool.KillContainer(ctr.UUID, "about to lock") {
111 logger.Info("not locking: crunch-run process from previous attempt has not exited")
114 go sch.lockContainer(logger, ctr.UUID)
116 case arvados.ContainerStateLocked:
117 if sch.maxConcurrency > 0 && trying >= sch.maxConcurrency {
118 logger.Debugf("not starting: already at maxConcurrency %d", sch.maxConcurrency)
119 overquota = sorted[i:]
125 } else if sch.pool.AtQuota() {
126 // Don't let lower-priority containers
127 // starve this one by using keeping
128 // idle workers alive on different
130 logger.Trace("overquota")
131 overquota = sorted[i:]
133 } else if sch.pool.Create(it) {
134 // Success. (Note pool.Create works
135 // asynchronously and does its own
136 // logging about the eventual outcome,
137 // so we don't need to.)
138 logger.Info("creating new instance")
140 // Failed despite not being at quota,
141 // e.g., cloud ops throttled. TODO:
142 // avoid getting starved here if
143 // instances of a specific type always
145 logger.Trace("pool declined to create new instance")
150 // We already tried & failed to start
151 // a higher-priority container on the
152 // same instance type. Don't let this
153 // one sneak in ahead of it.
154 } else if sch.pool.KillContainer(ctr.UUID, "about to start") {
155 logger.Info("not restarting yet: crunch-run process from previous attempt has not exited")
156 } else if sch.pool.StartContainer(it, ctr) {
159 containerAllocatedWorkerBootingCount += 1
165 sch.mContainersAllocatedNotStarted.Set(float64(containerAllocatedWorkerBootingCount))
166 sch.mContainersNotAllocatedOverQuota.Set(float64(len(overquota)))
168 if len(overquota) > 0 {
169 // Unlock any containers that are unmappable while
170 // we're at quota (but if they have already been
171 // scheduled and they're loading docker images etc.,
173 for _, ctr := range overquota {
175 _, toolate := running[ctr.UUID]
176 if ctr.State == arvados.ContainerStateLocked && !toolate {
177 logger := sch.logger.WithField("ContainerUUID", ctr.UUID)
178 logger.Debug("unlock because pool capacity is used by higher priority containers")
179 err := sch.queue.Unlock(ctr.UUID)
181 logger.WithError(err).Warn("error unlocking")
185 // Shut down idle workers that didn't get any
186 // containers mapped onto them before we hit quota.
187 for it, n := range unalloc {
191 sch.pool.Shutdown(it)
196 // Lock the given container. Should be called in a new goroutine.
197 func (sch *Scheduler) lockContainer(logger logrus.FieldLogger, uuid string) {
198 if !sch.uuidLock(uuid, "lock") {
201 defer sch.uuidUnlock(uuid)
202 if ctr, ok := sch.queue.Get(uuid); !ok || ctr.State != arvados.ContainerStateQueued {
203 // This happens if the container has been cancelled or
204 // locked since runQueue called sch.queue.Entries(),
205 // possibly by a lockContainer() call from a previous
206 // runQueue iteration. In any case, we will respond
207 // appropriately on the next runQueue iteration, which
208 // will have already been triggered by the queue
210 logger.WithField("State", ctr.State).Debug("container no longer queued by the time we decided to lock it, doing nothing")
213 err := sch.queue.Lock(uuid)
215 logger.WithError(err).Warn("error locking container")
218 logger.Debug("lock succeeded")
219 ctr, ok := sch.queue.Get(uuid)
221 logger.Error("(BUG?) container disappeared from queue after Lock succeeded")
222 } else if ctr.State != arvados.ContainerStateLocked {
223 logger.Warnf("(race?) container has state=%q after Lock succeeded", ctr.State)
227 // Acquire a non-blocking lock for specified UUID, returning true if
228 // successful. The op argument is used only for debug logs.
230 // If the lock is not available, uuidLock arranges to wake up the
231 // scheduler after a short delay, so it can retry whatever operation
232 // is trying to get the lock (if that operation is still worth doing).
234 // This mechanism helps avoid spamming the controller/database with
235 // concurrent updates for any single container, even when the
236 // scheduler loop is running frequently.
237 func (sch *Scheduler) uuidLock(uuid, op string) bool {
239 defer sch.mtx.Unlock()
240 logger := sch.logger.WithFields(logrus.Fields{
241 "ContainerUUID": uuid,
244 if op, locked := sch.uuidOp[uuid]; locked {
245 logger.Debugf("uuidLock not available, Op=%s in progress", op)
246 // Make sure the scheduler loop wakes up to retry.
247 sch.wakeup.Reset(time.Second / 4)
250 logger.Debug("uuidLock acquired")
251 sch.uuidOp[uuid] = op
255 func (sch *Scheduler) uuidUnlock(uuid string) {
257 defer sch.mtx.Unlock()
258 delete(sch.uuidOp, uuid)