2019-09-27 21:51:53 +00:00
|
|
|
// +build !providerless
|
|
|
|
|
|
|
|
/*
|
|
|
|
Copyright 2018 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package azure
|
|
|
|
|
|
|
|
import (
|
2020-01-15 01:52:20 +00:00
|
|
|
"context"
|
2020-08-13 18:59:02 +00:00
|
|
|
"fmt"
|
2019-09-27 21:51:53 +00:00
|
|
|
"strings"
|
2019-10-16 05:42:28 +00:00
|
|
|
"sync"
|
2019-09-27 21:51:53 +00:00
|
|
|
"time"
|
|
|
|
|
2020-08-10 17:43:49 +00:00
|
|
|
"github.com/Azure/azure-sdk-for-go/services/compute/mgmt/2019-12-01/compute"
|
2019-10-16 05:42:28 +00:00
|
|
|
"github.com/Azure/go-autorest/autorest/to"
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
2020-08-10 17:43:49 +00:00
|
|
|
"k8s.io/klog/v2"
|
2020-03-26 21:07:15 +00:00
|
|
|
azcache "k8s.io/legacy-cloud-providers/azure/cache"
|
2019-09-27 21:51:53 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
2020-03-26 21:07:15 +00:00
|
|
|
vmssNameSeparator = "_"
|
2019-09-27 21:51:53 +00:00
|
|
|
|
2020-01-15 01:52:20 +00:00
|
|
|
vmssKey = "k8svmssKey"
|
2019-10-16 05:42:28 +00:00
|
|
|
availabilitySetNodesKey = "k8sAvailabilitySetNodesKey"
|
2019-09-27 21:51:53 +00:00
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
availabilitySetNodesCacheTTLDefaultInSeconds = 900
|
|
|
|
vmssCacheTTLDefaultInSeconds = 600
|
|
|
|
vmssVirtualMachinesCacheTTLDefaultInSeconds = 600
|
2019-09-27 21:51:53 +00:00
|
|
|
)
|
|
|
|
|
2019-10-16 05:42:28 +00:00
|
|
|
type vmssVirtualMachinesEntry struct {
|
|
|
|
resourceGroup string
|
|
|
|
vmssName string
|
|
|
|
instanceID string
|
|
|
|
virtualMachine *compute.VirtualMachineScaleSetVM
|
2019-11-14 18:56:24 +00:00
|
|
|
lastUpdate time.Time
|
2019-10-16 05:42:28 +00:00
|
|
|
}
|
2019-09-27 21:51:53 +00:00
|
|
|
|
2020-01-15 01:52:20 +00:00
|
|
|
type vmssEntry struct {
|
2020-08-13 18:59:02 +00:00
|
|
|
vmss *compute.VirtualMachineScaleSet
|
|
|
|
resourceGroup string
|
|
|
|
lastUpdate time.Time
|
2020-01-15 01:52:20 +00:00
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
func (ss *scaleSet) newVMSSCache() (*azcache.TimedCache, error) {
|
2020-01-15 01:52:20 +00:00
|
|
|
getter := func(key string) (interface{}, error) {
|
|
|
|
localCache := &sync.Map{} // [vmssName]*vmssEntry
|
|
|
|
|
|
|
|
allResourceGroups, err := ss.GetResourceGroups()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, resourceGroup := range allResourceGroups.List() {
|
2020-03-26 21:07:15 +00:00
|
|
|
allScaleSets, rerr := ss.VirtualMachineScaleSetsClient.List(context.Background(), resourceGroup)
|
|
|
|
if rerr != nil {
|
|
|
|
klog.Errorf("VirtualMachineScaleSetsClient.List failed: %v", rerr)
|
|
|
|
return nil, rerr.Error()
|
2020-01-15 01:52:20 +00:00
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
for i := range allScaleSets {
|
|
|
|
scaleSet := allScaleSets[i]
|
2020-01-15 01:52:20 +00:00
|
|
|
if scaleSet.Name == nil || *scaleSet.Name == "" {
|
|
|
|
klog.Warning("failed to get the name of VMSS")
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
localCache.Store(*scaleSet.Name, &vmssEntry{
|
2020-08-13 18:59:02 +00:00
|
|
|
vmss: &scaleSet,
|
|
|
|
resourceGroup: resourceGroup,
|
|
|
|
lastUpdate: time.Now().UTC(),
|
2020-01-15 01:52:20 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return localCache, nil
|
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
if ss.Config.VmssCacheTTLInSeconds == 0 {
|
|
|
|
ss.Config.VmssCacheTTLInSeconds = vmssCacheTTLDefaultInSeconds
|
|
|
|
}
|
|
|
|
return azcache.NewTimedcache(time.Duration(ss.Config.VmssCacheTTLInSeconds)*time.Second, getter)
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func extractVmssVMName(name string) (string, string, error) {
|
|
|
|
split := strings.SplitAfter(name, vmssNameSeparator)
|
|
|
|
if len(split) < 2 {
|
|
|
|
klog.V(3).Infof("Failed to extract vmssVMName %q", name)
|
|
|
|
return "", "", ErrorNotVmssInstance
|
|
|
|
}
|
|
|
|
|
|
|
|
ssName := strings.Join(split[0:len(split)-1], "")
|
|
|
|
// removing the trailing `vmssNameSeparator` since we used SplitAfter
|
|
|
|
ssName = ssName[:len(ssName)-1]
|
|
|
|
instanceID := split[len(split)-1]
|
|
|
|
return ssName, instanceID, nil
|
|
|
|
}
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
// getVMSSVMCache returns an *azcache.TimedCache and cache key for a VMSS (creating that cache if new).
|
|
|
|
func (ss *scaleSet) getVMSSVMCache(resourceGroup, vmssName string) (string, *azcache.TimedCache, error) {
|
|
|
|
cacheKey := strings.ToLower(fmt.Sprintf("%s/%s", resourceGroup, vmssName))
|
|
|
|
if entry, ok := ss.vmssVMCache.Load(cacheKey); ok {
|
|
|
|
cache := entry.(*azcache.TimedCache)
|
|
|
|
return cacheKey, cache, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
cache, err := ss.newVMSSVirtualMachinesCache(resourceGroup, vmssName, cacheKey)
|
|
|
|
if err != nil {
|
|
|
|
return "", nil, err
|
|
|
|
}
|
|
|
|
ss.vmssVMCache.Store(cacheKey, cache)
|
|
|
|
return cacheKey, cache, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// gcVMSSVMCache delete stale VMSS VMs caches from deleted VMSSes.
|
|
|
|
func (ss *scaleSet) gcVMSSVMCache() error {
|
|
|
|
cached, err := ss.vmssCache.Get(vmssKey, azcache.CacheReadTypeUnsafe)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
vmsses := cached.(*sync.Map)
|
|
|
|
removed := map[string]bool{}
|
|
|
|
ss.vmssVMCache.Range(func(key, value interface{}) bool {
|
|
|
|
cacheKey := key.(string)
|
|
|
|
vlistIdx := cacheKey[strings.LastIndex(cacheKey, "/")+1:]
|
|
|
|
if _, ok := vmsses.Load(vlistIdx); !ok {
|
|
|
|
removed[cacheKey] = true
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
|
|
|
|
for key := range removed {
|
|
|
|
ss.vmssVMCache.Delete(key)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2020-12-01 01:06:26 +00:00
|
|
|
// newVMSSVirtualMachinesCache instantiates a new VMs cache for VMs belonging to the provided VMSS.
|
2020-08-13 18:59:02 +00:00
|
|
|
func (ss *scaleSet) newVMSSVirtualMachinesCache(resourceGroupName, vmssName, cacheKey string) (*azcache.TimedCache, error) {
|
|
|
|
vmssVirtualMachinesCacheTTL := time.Duration(ss.Config.VmssVirtualMachinesCacheTTLInSeconds) * time.Second
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
getter := func(key string) (interface{}, error) {
|
2019-10-16 05:42:28 +00:00
|
|
|
localCache := &sync.Map{} // [nodeName]*vmssVirtualMachinesEntry
|
2019-09-27 21:51:53 +00:00
|
|
|
|
2020-02-14 00:18:16 +00:00
|
|
|
oldCache := make(map[string]vmssVirtualMachinesEntry)
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
if vmssCache, ok := ss.vmssVMCache.Load(cacheKey); ok {
|
2020-02-14 00:18:16 +00:00
|
|
|
// get old cache before refreshing the cache
|
2020-08-13 18:59:02 +00:00
|
|
|
cache := vmssCache.(*azcache.TimedCache)
|
|
|
|
entry, exists, err := cache.Store.GetByKey(cacheKey)
|
2020-02-14 00:18:16 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if exists {
|
2020-03-26 21:07:15 +00:00
|
|
|
cached := entry.(*azcache.AzureCacheEntry).Data
|
2020-02-14 00:18:16 +00:00
|
|
|
if cached != nil {
|
|
|
|
virtualMachines := cached.(*sync.Map)
|
|
|
|
virtualMachines.Range(func(key, value interface{}) bool {
|
|
|
|
oldCache[key.(string)] = *value.(*vmssVirtualMachinesEntry)
|
|
|
|
return true
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
vms, err := ss.listScaleSetVMs(vmssName, resourceGroupName)
|
2019-09-27 21:51:53 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
for i := range vms {
|
|
|
|
vm := vms[i]
|
|
|
|
if vm.OsProfile == nil || vm.OsProfile.ComputerName == nil {
|
|
|
|
klog.Warningf("failed to get computerName for vmssVM (%q)", vmssName)
|
|
|
|
continue
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
computerName := strings.ToLower(*vm.OsProfile.ComputerName)
|
|
|
|
vmssVMCacheEntry := &vmssVirtualMachinesEntry{
|
|
|
|
resourceGroup: resourceGroupName,
|
|
|
|
vmssName: vmssName,
|
|
|
|
instanceID: to.String(vm.InstanceID),
|
|
|
|
virtualMachine: &vm,
|
|
|
|
lastUpdate: time.Now().UTC(),
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
2020-08-13 18:59:02 +00:00
|
|
|
// set cache entry to nil when the VM is under deleting.
|
|
|
|
if vm.VirtualMachineScaleSetVMProperties != nil &&
|
|
|
|
strings.EqualFold(to.String(vm.VirtualMachineScaleSetVMProperties.ProvisioningState), string(compute.ProvisioningStateDeleting)) {
|
|
|
|
klog.V(4).Infof("VMSS virtualMachine %q is under deleting, setting its cache to nil", computerName)
|
|
|
|
vmssVMCacheEntry.virtualMachine = nil
|
|
|
|
}
|
|
|
|
localCache.Store(computerName, vmssVMCacheEntry)
|
2020-02-14 00:18:16 +00:00
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
delete(oldCache, computerName)
|
|
|
|
}
|
2020-02-14 00:18:16 +00:00
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
// add old missing cache data with nil entries to prevent aggressive
|
|
|
|
// ARM calls during cache invalidation
|
|
|
|
for name, vmEntry := range oldCache {
|
|
|
|
// if the nil cache entry has existed for vmssVirtualMachinesCacheTTL in the cache
|
|
|
|
// then it should not be added back to the cache
|
|
|
|
if vmEntry.virtualMachine == nil && time.Since(vmEntry.lastUpdate) > vmssVirtualMachinesCacheTTL {
|
|
|
|
klog.V(5).Infof("ignoring expired entries from old cache for %s", name)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
lastUpdate := time.Now().UTC()
|
|
|
|
if vmEntry.virtualMachine == nil {
|
|
|
|
// if this is already a nil entry then keep the time the nil
|
|
|
|
// entry was first created, so we can cleanup unwanted entries
|
|
|
|
lastUpdate = vmEntry.lastUpdate
|
2020-02-14 00:18:16 +00:00
|
|
|
}
|
2020-08-13 18:59:02 +00:00
|
|
|
|
|
|
|
klog.V(5).Infof("adding old entries to new cache for %s", name)
|
|
|
|
localCache.Store(name, &vmssVirtualMachinesEntry{
|
|
|
|
resourceGroup: vmEntry.resourceGroup,
|
|
|
|
vmssName: vmEntry.vmssName,
|
|
|
|
instanceID: vmEntry.instanceID,
|
|
|
|
virtualMachine: nil,
|
|
|
|
lastUpdate: lastUpdate,
|
|
|
|
})
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return localCache, nil
|
|
|
|
}
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
return azcache.NewTimedcache(vmssVirtualMachinesCacheTTL, getter)
|
2019-10-16 05:42:28 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func (ss *scaleSet) deleteCacheForNode(nodeName string) error {
|
2020-08-13 18:59:02 +00:00
|
|
|
node, err := ss.getNodeIdentityByNodeName(nodeName, azcache.CacheReadTypeUnsafe)
|
2019-10-16 05:42:28 +00:00
|
|
|
if err != nil {
|
2019-12-12 01:27:03 +00:00
|
|
|
klog.Errorf("deleteCacheForNode(%s) failed with error: %v", nodeName, err)
|
2019-10-16 05:42:28 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-08-13 18:59:02 +00:00
|
|
|
cacheKey, timedcache, err := ss.getVMSSVMCache(node.resourceGroup, node.vmssName)
|
|
|
|
if err != nil {
|
|
|
|
klog.Errorf("deleteCacheForNode(%s) failed with error: %v", nodeName, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
vmcache, err := timedcache.Get(cacheKey, azcache.CacheReadTypeUnsafe)
|
|
|
|
if err != nil {
|
|
|
|
klog.Errorf("deleteCacheForNode(%s) failed with error: %v", nodeName, err)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
virtualMachines := vmcache.(*sync.Map)
|
2019-10-16 05:42:28 +00:00
|
|
|
virtualMachines.Delete(nodeName)
|
2020-08-13 18:59:02 +00:00
|
|
|
|
|
|
|
if err := ss.gcVMSSVMCache(); err != nil {
|
|
|
|
klog.Errorf("deleteCacheForNode(%s) failed to gc stale vmss caches: %v", nodeName, err)
|
|
|
|
}
|
|
|
|
|
2019-10-16 05:42:28 +00:00
|
|
|
return nil
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
func (ss *scaleSet) newAvailabilitySetNodesCache() (*azcache.TimedCache, error) {
|
2019-09-27 21:51:53 +00:00
|
|
|
getter := func(key string) (interface{}, error) {
|
|
|
|
localCache := sets.NewString()
|
|
|
|
resourceGroups, err := ss.GetResourceGroups()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, resourceGroup := range resourceGroups.List() {
|
|
|
|
vmList, err := ss.Cloud.ListVirtualMachines(resourceGroup)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, vm := range vmList {
|
|
|
|
if vm.Name != nil {
|
|
|
|
localCache.Insert(*vm.Name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return localCache, nil
|
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
if ss.Config.AvailabilitySetNodesCacheTTLInSeconds == 0 {
|
|
|
|
ss.Config.AvailabilitySetNodesCacheTTLInSeconds = availabilitySetNodesCacheTTLDefaultInSeconds
|
|
|
|
}
|
|
|
|
return azcache.NewTimedcache(time.Duration(ss.Config.AvailabilitySetNodesCacheTTLInSeconds)*time.Second, getter)
|
2019-09-27 21:51:53 +00:00
|
|
|
}
|
|
|
|
|
2020-03-26 21:07:15 +00:00
|
|
|
func (ss *scaleSet) isNodeManagedByAvailabilitySet(nodeName string, crt azcache.AzureCacheReadType) (bool, error) {
|
|
|
|
// Assume all nodes are managed by VMSS when DisableAvailabilitySetNodes is enabled.
|
|
|
|
if ss.DisableAvailabilitySetNodes {
|
|
|
|
klog.V(2).Infof("Assuming node %q is managed by VMSS since DisableAvailabilitySetNodes is set to true", nodeName)
|
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
2019-11-14 18:56:24 +00:00
|
|
|
cached, err := ss.availabilitySetNodesCache.Get(availabilitySetNodesKey, crt)
|
2019-09-27 21:51:53 +00:00
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
availabilitySetNodes := cached.(sets.String)
|
|
|
|
return availabilitySetNodes.Has(nodeName), nil
|
|
|
|
}
|