2015-01-30 23:31:36 +00:00
/ *
2015-05-01 16:19:44 +00:00
Copyright 2014 The Kubernetes Authors All rights reserved .
2015-01-30 23:31:36 +00:00
Licensed under the Apache License , Version 2.0 ( the "License" ) ;
you may not use this file except in compliance with the License .
You may obtain a copy of the License at
http : //www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing , software
distributed under the License is distributed on an "AS IS" BASIS ,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND , either express or implied .
See the License for the specific language governing permissions and
limitations under the License .
* /
2015-02-08 04:07:00 +00:00
// Package app implements a server that runs a set of active
2015-01-30 23:31:36 +00:00
// components. This includes replication controllers, service endpoints and
// nodes.
2015-06-11 13:13:19 +00:00
//
// CAUTION: If you update code in this file, you may need to also update code
2015-06-11 19:34:04 +00:00
// in contrib/mesos/pkg/controllermanager/controllermanager.go
2015-02-08 04:07:00 +00:00
package app
2015-01-30 23:31:36 +00:00
import (
2015-06-23 22:43:59 +00:00
"fmt"
"io/ioutil"
2015-10-06 09:12:00 +00:00
"math/rand"
2015-01-30 23:31:36 +00:00
"net"
"net/http"
2015-03-13 15:44:11 +00:00
"net/http/pprof"
2015-11-04 23:22:11 +00:00
"os"
2015-01-30 23:31:36 +00:00
"strconv"
"time"
2015-12-24 23:59:05 +00:00
"k8s.io/kubernetes/cmd/kube-controller-manager/app/options"
2015-11-04 23:22:11 +00:00
"k8s.io/kubernetes/pkg/api"
2015-10-13 00:31:25 +00:00
"k8s.io/kubernetes/pkg/api/unversioned"
2016-02-05 21:58:03 +00:00
clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
2015-11-04 23:22:11 +00:00
"k8s.io/kubernetes/pkg/client/leaderelection"
"k8s.io/kubernetes/pkg/client/record"
2015-08-13 19:01:50 +00:00
client "k8s.io/kubernetes/pkg/client/unversioned"
"k8s.io/kubernetes/pkg/client/unversioned/clientcmd"
2015-08-05 22:03:47 +00:00
"k8s.io/kubernetes/pkg/cloudprovider"
2015-11-11 21:19:39 +00:00
"k8s.io/kubernetes/pkg/controller"
2015-08-27 17:18:01 +00:00
"k8s.io/kubernetes/pkg/controller/daemon"
2015-09-03 00:02:22 +00:00
"k8s.io/kubernetes/pkg/controller/deployment"
2015-10-10 03:58:57 +00:00
endpointcontroller "k8s.io/kubernetes/pkg/controller/endpoint"
2015-09-21 22:51:27 +00:00
"k8s.io/kubernetes/pkg/controller/gc"
2015-08-27 12:19:35 +00:00
"k8s.io/kubernetes/pkg/controller/job"
2015-10-10 03:58:57 +00:00
namespacecontroller "k8s.io/kubernetes/pkg/controller/namespace"
nodecontroller "k8s.io/kubernetes/pkg/controller/node"
persistentvolumecontroller "k8s.io/kubernetes/pkg/controller/persistentvolume"
2015-09-10 13:10:07 +00:00
"k8s.io/kubernetes/pkg/controller/podautoscaler"
"k8s.io/kubernetes/pkg/controller/podautoscaler/metrics"
2016-01-19 00:06:57 +00:00
replicaset "k8s.io/kubernetes/pkg/controller/replicaset"
2015-10-10 03:58:57 +00:00
replicationcontroller "k8s.io/kubernetes/pkg/controller/replication"
resourcequotacontroller "k8s.io/kubernetes/pkg/controller/resourcequota"
routecontroller "k8s.io/kubernetes/pkg/controller/route"
servicecontroller "k8s.io/kubernetes/pkg/controller/service"
2015-12-24 21:54:40 +00:00
serviceaccountcontroller "k8s.io/kubernetes/pkg/controller/serviceaccount"
2015-08-05 22:03:47 +00:00
"k8s.io/kubernetes/pkg/healthz"
2015-12-24 21:54:40 +00:00
"k8s.io/kubernetes/pkg/serviceaccount"
2015-08-05 22:03:47 +00:00
"k8s.io/kubernetes/pkg/util"
2015-10-28 06:46:44 +00:00
"k8s.io/kubernetes/pkg/util/wait"
2015-04-18 13:31:24 +00:00
2015-01-30 23:31:36 +00:00
"github.com/golang/glog"
2015-04-22 14:46:03 +00:00
"github.com/prometheus/client_golang/prometheus"
2015-10-12 14:33:39 +00:00
"github.com/spf13/cobra"
2015-01-30 23:31:36 +00:00
"github.com/spf13/pflag"
)
2015-10-12 14:33:39 +00:00
// NewControllerManagerCommand creates a *cobra.Command object with default parameters
func NewControllerManagerCommand ( ) * cobra . Command {
2015-12-24 23:59:05 +00:00
s := options . NewCMServer ( )
2015-10-12 14:33:39 +00:00
s . AddFlags ( pflag . CommandLine )
cmd := & cobra . Command {
Use : "kube-controller-manager" ,
Long : ` The Kubernetes controller manager is a daemon that embeds
the core control loops shipped with Kubernetes . In applications of robotics and
automation , a control loop is a non - terminating loop that regulates the state of
the system . In Kubernetes , a controller is a control loop that watches the shared
state of the cluster through the apiserver and makes changes attempting to move the
current state towards the desired state . Examples of controllers that ship with
Kubernetes today are the replication controller , endpoints controller , namespace
controller , and serviceaccounts controller . ` ,
Run : func ( cmd * cobra . Command , args [ ] string ) {
} ,
}
return cmd
}
2015-12-24 23:59:05 +00:00
func ResyncPeriod ( s * options . CMServer ) func ( ) time . Duration {
return func ( ) time . Duration {
factor := rand . Float64 ( ) + 1
return time . Duration ( float64 ( s . MinResyncPeriod . Nanoseconds ( ) ) * factor )
}
2015-10-06 09:12:00 +00:00
}
2015-01-30 23:31:36 +00:00
// Run runs the CMServer. This should never exit.
2015-12-24 23:59:05 +00:00
func Run ( s * options . CMServer ) error {
2015-11-06 18:34:49 +00:00
kubeconfig , err := clientcmd . BuildConfigFromFlags ( s . Master , s . Kubeconfig )
2015-04-17 07:18:07 +00:00
if err != nil {
return err
}
2015-10-12 15:56:15 +00:00
// Override kubeconfig qps/burst settings from flags
2015-10-20 12:33:48 +00:00
kubeconfig . QPS = s . KubeAPIQPS
kubeconfig . Burst = s . KubeAPIBurst
2015-04-17 07:18:07 +00:00
kubeClient , err := client . New ( kubeconfig )
2015-01-30 23:31:36 +00:00
if err != nil {
glog . Fatalf ( "Invalid API configuration: %v" , err )
}
2015-03-13 15:44:11 +00:00
go func ( ) {
2015-04-22 14:46:03 +00:00
mux := http . NewServeMux ( )
healthz . InstallHandler ( mux )
2015-03-13 15:44:11 +00:00
if s . EnableProfiling {
mux . HandleFunc ( "/debug/pprof/" , pprof . Index )
mux . HandleFunc ( "/debug/pprof/profile" , pprof . Profile )
mux . HandleFunc ( "/debug/pprof/symbol" , pprof . Symbol )
}
2015-04-22 14:46:03 +00:00
mux . Handle ( "/metrics" , prometheus . Handler ( ) )
server := & http . Server {
Addr : net . JoinHostPort ( s . Address . String ( ) , strconv . Itoa ( s . Port ) ) ,
Handler : mux ,
}
glog . Fatal ( server . ListenAndServe ( ) )
2015-03-13 15:44:11 +00:00
} ( )
2015-01-30 23:31:36 +00:00
2015-11-04 23:22:11 +00:00
run := func ( stop <- chan struct { } ) {
err := StartControllers ( s , kubeClient , kubeconfig , stop )
glog . Fatalf ( "error running controllers: %v" , err )
panic ( "unreachable" )
}
if ! s . LeaderElection . LeaderElect {
run ( nil )
panic ( "unreachable" )
}
eventBroadcaster := record . NewBroadcaster ( )
eventBroadcaster . StartLogging ( glog . Infof )
eventBroadcaster . StartRecordingToSink ( kubeClient . Events ( "" ) )
recorder := eventBroadcaster . NewRecorder ( api . EventSource { Component : "controller-manager" } )
id , err := os . Hostname ( )
if err != nil {
return err
}
leaderelection . RunOrDie ( leaderelection . LeaderElectionConfig {
EndpointsMeta : api . ObjectMeta {
Namespace : "kube-system" ,
Name : "kube-controller-manager" ,
} ,
Client : kubeClient ,
Identity : id ,
EventRecorder : recorder ,
LeaseDuration : s . LeaderElection . LeaseDuration . Duration ,
RenewDeadline : s . LeaderElection . RenewDeadline . Duration ,
RetryPeriod : s . LeaderElection . RetryPeriod . Duration ,
Callbacks : leaderelection . LeaderCallbacks {
OnStartedLeading : run ,
OnStoppedLeading : func ( ) {
glog . Fatalf ( "leaderelection lost" )
} ,
} ,
} )
panic ( "unreachable" )
}
func StartControllers ( s * options . CMServer , kubeClient * client . Client , kubeconfig * client . Config , stop <- chan struct { } ) error {
2016-01-29 06:34:08 +00:00
go endpointcontroller . NewEndpointController ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "endpoint-controller" ) ) , ResyncPeriod ( s ) ) .
2016-02-06 00:13:28 +00:00
Run ( s . ConcurrentEndpointSyncs , util . NeverStop )
2015-01-30 23:31:36 +00:00
2015-12-02 12:12:31 +00:00
go replicationcontroller . NewReplicationManager (
2016-01-15 05:00:58 +00:00
clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "replication-controller" ) ) ,
2015-12-24 23:59:05 +00:00
ResyncPeriod ( s ) ,
2015-12-02 12:12:31 +00:00
replicationcontroller . BurstReplicas ,
2016-02-06 00:13:28 +00:00
) . Run ( s . ConcurrentRCSyncs , util . NeverStop )
2015-01-30 23:31:36 +00:00
2016-02-06 00:13:28 +00:00
if s . TerminatedPodGCThreshold > 0 {
go gc . New ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "garbage-collector" ) ) , ResyncPeriod ( s ) , s . TerminatedPodGCThreshold ) .
2015-09-21 22:51:27 +00:00
Run ( util . NeverStop )
}
2015-07-01 18:41:49 +00:00
cloud , err := cloudprovider . InitCloudProvider ( s . CloudProvider , s . CloudConfigFile )
if err != nil {
glog . Fatalf ( "Cloud provider could not be initialized: %v" , err )
}
2015-02-07 19:53:42 +00:00
2016-01-29 06:34:08 +00:00
nodeController := nodecontroller . NewNodeController ( cloud , clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "node-controller" ) ) ,
2016-02-06 00:13:28 +00:00
s . PodEvictionTimeout , util . NewTokenBucketRateLimiter ( s . DeletingPodsQps , s . DeletingPodsBurst ) ,
util . NewTokenBucketRateLimiter ( s . DeletingPodsQps , s . DeletingPodsBurst ) ,
s . NodeMonitorGracePeriod , s . NodeStartupGracePeriod , s . NodeMonitorPeriod , & s . ClusterCIDR , s . AllocateNodeCIDRs )
2015-05-22 22:14:48 +00:00
nodeController . Run ( s . NodeSyncPeriod )
2015-01-30 23:31:36 +00:00
2016-01-29 06:34:08 +00:00
serviceController := servicecontroller . New ( cloud , clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "service-controller" ) ) , s . ClusterName )
2016-02-06 00:13:28 +00:00
if err := serviceController . Run ( s . ServiceSyncPeriod , s . NodeSyncPeriod ) ; err != nil {
2015-03-24 17:32:43 +00:00
glog . Errorf ( "Failed to start service controller: %v" , err )
}
2016-02-06 00:13:28 +00:00
if s . AllocateNodeCIDRs {
2015-11-24 02:11:51 +00:00
if cloud == nil {
2015-07-26 00:02:23 +00:00
glog . Warning ( "allocate-node-cidrs is set, but no cloud provider specified. Will not manage routes." )
} else if routes , ok := cloud . Routes ( ) ; ! ok {
glog . Warning ( "allocate-node-cidrs is set, but cloud provider does not support routes. Will not manage routes." )
} else {
2016-02-06 00:13:28 +00:00
routeController := routecontroller . New ( routes , clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "route-controller" ) ) , s . ClusterName , & s . ClusterCIDR )
2015-07-26 00:02:23 +00:00
routeController . Run ( s . NodeSyncPeriod )
2015-05-15 21:49:26 +00:00
}
2015-11-24 02:11:51 +00:00
} else {
2016-02-06 00:13:28 +00:00
glog . Infof ( "allocate-node-cidrs set to %v, node controller not creating routes" , s . AllocateNodeCIDRs )
2015-05-15 21:49:26 +00:00
}
2015-11-11 21:19:39 +00:00
go resourcequotacontroller . NewResourceQuotaController (
2016-01-29 06:34:08 +00:00
clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "resourcequota-controller" ) ) ,
2016-02-06 00:13:28 +00:00
controller . StaticResyncPeriodFunc ( s . ResourceQuotaSyncPeriod ) ) . Run ( s . ConcurrentResourceQuotaSyncs , util . NeverStop )
2015-01-30 23:31:36 +00:00
2015-10-28 06:46:44 +00:00
// If apiserver is not running we should wait for some time and fail only then. This is particularly
// important when we start apiserver and controller manager at the same time.
var versionStrings [ ] string
err = wait . PollImmediate ( time . Second , 10 * time . Second , func ( ) ( bool , error ) {
2015-11-11 12:28:25 +00:00
if versionStrings , err = client . ServerAPIVersions ( kubeconfig ) ; err == nil {
return true , nil
}
glog . Errorf ( "Failed to get api versions from server: %v" , err )
return false , nil
2015-10-28 06:46:44 +00:00
} )
2015-10-12 21:23:50 +00:00
if err != nil {
glog . Fatalf ( "Failed to get api versions from server: %v" , err )
}
2015-10-13 00:31:25 +00:00
versions := & unversioned . APIVersions { Versions : versionStrings }
2015-03-20 16:49:03 +00:00
2015-10-15 23:34:30 +00:00
resourceMap , err := kubeClient . Discovery ( ) . ServerResources ( )
2015-10-12 21:23:50 +00:00
if err != nil {
glog . Fatalf ( "Failed to get supported resources from server: %v" , err )
}
2015-10-02 21:42:18 +00:00
2016-02-06 00:13:28 +00:00
namespacecontroller . NewNamespaceController ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "namespace-controller" ) ) , versions , s . NamespaceSyncPeriod ) . Run ( )
2015-10-12 21:23:50 +00:00
groupVersion := "extensions/v1beta1"
resources , found := resourceMap [ groupVersion ]
// TODO: this needs to be dynamic so users don't have to restart their controller manager if they change the apiserver
if containsVersion ( versions , groupVersion ) && found {
glog . Infof ( "Starting %s apis" , groupVersion )
if containsResource ( resources , "horizontalpodautoscalers" ) {
glog . Infof ( "Starting horizontal pod controller." )
2016-01-29 06:34:08 +00:00
hpaClient := clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "horizontal-pod-autoscaler" ) )
2015-12-02 12:12:31 +00:00
metricsClient := metrics . NewHeapsterMetricsClient (
hpaClient ,
metrics . DefaultHeapsterNamespace ,
metrics . DefaultHeapsterScheme ,
metrics . DefaultHeapsterService ,
metrics . DefaultHeapsterPort ,
)
2016-02-03 21:21:05 +00:00
podautoscaler . NewHorizontalController ( hpaClient . Core ( ) , hpaClient . Extensions ( ) , hpaClient , metricsClient ) .
2016-02-06 00:13:28 +00:00
Run ( s . HorizontalPodAutoscalerSyncPeriod )
2015-10-12 21:23:50 +00:00
}
2015-10-02 21:42:18 +00:00
2015-10-12 21:23:50 +00:00
if containsResource ( resources , "daemonsets" ) {
glog . Infof ( "Starting daemon set controller" )
2016-01-15 05:00:58 +00:00
go daemon . NewDaemonSetsController ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "daemon-set-controller" ) ) , ResyncPeriod ( s ) ) .
2016-02-06 00:13:28 +00:00
Run ( s . ConcurrentDSCSyncs , util . NeverStop )
2015-10-12 21:23:50 +00:00
}
if containsResource ( resources , "jobs" ) {
glog . Infof ( "Starting job controller" )
2016-01-15 05:00:58 +00:00
go job . NewJobController ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "job-controller" ) ) , ResyncPeriod ( s ) ) .
2016-02-06 00:13:28 +00:00
Run ( s . ConcurrentJobSyncs , util . NeverStop )
2015-10-12 21:23:50 +00:00
}
2015-10-02 21:42:18 +00:00
2015-10-12 21:23:50 +00:00
if containsResource ( resources , "deployments" ) {
glog . Infof ( "Starting deployment controller" )
2016-01-15 05:00:58 +00:00
go deployment . NewDeploymentController ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "deployment-controller" ) ) , ResyncPeriod ( s ) ) .
2016-02-06 00:13:28 +00:00
Run ( s . ConcurrentDeploymentSyncs , util . NeverStop )
2015-10-12 21:23:50 +00:00
}
2016-01-19 00:06:57 +00:00
if containsResource ( resources , "replicasets" ) {
glog . Infof ( "Starting ReplicaSet controller" )
go replicaset . NewReplicaSetController ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "replicaset-controller" ) ) , ResyncPeriod ( s ) , replicaset . BurstReplicas ) .
Run ( s . ConcurrentRSSyncs , util . NeverStop )
}
2015-09-03 00:02:22 +00:00
}
2015-09-03 14:50:53 +00:00
2016-02-06 00:13:28 +00:00
volumePlugins := ProbeRecyclableVolumePlugins ( s . VolumeConfigFlags )
provisioner , err := NewVolumeProvisioner ( cloud , s . VolumeConfigFlags )
2015-10-12 18:27:49 +00:00
if err != nil {
glog . Fatal ( "A Provisioner could not be created, but one was expected. Provisioning will not work. This functionality is considered an early Alpha version." )
}
2016-02-06 00:13:28 +00:00
pvclaimBinder := persistentvolumecontroller . NewPersistentVolumeClaimBinder ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "persistent-volume-binder" ) ) , s . PVClaimBinderSyncPeriod )
2015-05-13 00:44:29 +00:00
pvclaimBinder . Run ( )
2015-09-03 03:14:26 +00:00
2016-02-05 09:56:36 +00:00
pvRecycler , err := persistentvolumecontroller . NewPersistentVolumeRecycler (
clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "persistent-volume-recycler" ) ) ,
2016-02-06 00:13:28 +00:00
s . PVClaimBinderSyncPeriod ,
s . VolumeConfigFlags . PersistentVolumeRecyclerMaximumRetry ,
ProbeRecyclableVolumePlugins ( s . VolumeConfigFlags ) ,
2016-02-05 09:56:36 +00:00
cloud ,
)
2015-05-29 20:34:32 +00:00
if err != nil {
glog . Fatalf ( "Failed to start persistent volume recycler: %+v" , err )
}
pvRecycler . Run ( )
2015-04-16 17:26:08 +00:00
2015-10-12 18:27:49 +00:00
if provisioner != nil {
2016-02-06 00:13:28 +00:00
pvController , err := persistentvolumecontroller . NewPersistentVolumeProvisionerController ( persistentvolumecontroller . NewControllerClient ( clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "persistent-volume-provisioner" ) ) ) , s . PVClaimBinderSyncPeriod , volumePlugins , provisioner , cloud )
2015-10-12 18:27:49 +00:00
if err != nil {
glog . Fatalf ( "Failed to start persistent volume provisioner controller: %+v" , err )
}
pvController . Run ( )
}
2015-06-23 22:43:59 +00:00
var rootCA [ ] byte
if s . RootCAFile != "" {
2015-06-25 18:40:48 +00:00
rootCA , err = ioutil . ReadFile ( s . RootCAFile )
2015-06-23 22:43:59 +00:00
if err != nil {
return fmt . Errorf ( "error reading root-ca-file at %s: %v" , s . RootCAFile , err )
}
if _ , err := util . CertsFromPEM ( rootCA ) ; err != nil {
return fmt . Errorf ( "error parsing root-ca-file at %s: %v" , s . RootCAFile , err )
}
} else {
rootCA = kubeconfig . CAData
}
2016-02-06 00:13:28 +00:00
if len ( s . ServiceAccountKeyFile ) > 0 {
privateKey , err := serviceaccount . ReadPrivateKey ( s . ServiceAccountKeyFile )
2015-05-01 16:02:38 +00:00
if err != nil {
glog . Errorf ( "Error reading key for service account token controller: %v" , err )
} else {
2015-12-24 21:54:40 +00:00
serviceaccountcontroller . NewTokensController (
2016-01-29 06:34:08 +00:00
clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "tokens-controller" ) ) ,
2015-12-24 21:54:40 +00:00
serviceaccountcontroller . TokensControllerOptions {
2015-06-23 22:43:59 +00:00
TokenGenerator : serviceaccount . JWTTokenGenerator ( privateKey ) ,
RootCA : rootCA ,
} ,
2015-05-01 16:02:38 +00:00
) . Run ( )
}
}
2015-12-24 21:54:40 +00:00
serviceaccountcontroller . NewServiceAccountsController (
2016-01-29 06:34:08 +00:00
clientset . NewForConfigOrDie ( client . AddUserAgent ( kubeconfig , "service-account-controller" ) ) ,
2015-12-24 21:54:40 +00:00
serviceaccountcontroller . DefaultServiceAccountsControllerOptions ( ) ,
2015-05-01 16:02:38 +00:00
) . Run ( )
2015-04-21 03:25:56 +00:00
2015-01-30 23:31:36 +00:00
select { }
}
2015-10-12 21:23:50 +00:00
2015-10-13 00:31:25 +00:00
func containsVersion ( versions * unversioned . APIVersions , version string ) bool {
2015-10-12 21:23:50 +00:00
for ix := range versions . Versions {
if versions . Versions [ ix ] == version {
return true
}
}
return false
}
2015-10-13 00:31:25 +00:00
func containsResource ( resources * unversioned . APIResourceList , resourceName string ) bool {
2015-10-12 21:23:50 +00:00
for ix := range resources . APIResources {
resource := resources . APIResources [ ix ]
if resource . Name == resourceName {
return true
}
}
return false
}