2019-01-12 04:58:27 +00:00
|
|
|
/*
|
|
|
|
Copyright 2014 The Kubernetes Authors.
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
package userspace
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"net"
|
|
|
|
"reflect"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
2019-09-27 21:51:53 +00:00
|
|
|
v1 "k8s.io/api/core/v1"
|
2019-01-12 04:58:27 +00:00
|
|
|
"k8s.io/apimachinery/pkg/types"
|
2019-12-12 01:27:03 +00:00
|
|
|
"k8s.io/apimachinery/pkg/util/sets"
|
2019-01-12 04:58:27 +00:00
|
|
|
"k8s.io/klog"
|
|
|
|
"k8s.io/kubernetes/pkg/proxy"
|
2019-09-27 21:51:53 +00:00
|
|
|
"k8s.io/kubernetes/pkg/proxy/util"
|
2019-01-12 04:58:27 +00:00
|
|
|
"k8s.io/kubernetes/pkg/util/slice"
|
|
|
|
)
|
|
|
|
|
|
|
|
var (
|
|
|
|
ErrMissingServiceEntry = errors.New("missing service entry")
|
|
|
|
ErrMissingEndpoints = errors.New("missing endpoints")
|
|
|
|
)
|
|
|
|
|
|
|
|
type affinityState struct {
|
|
|
|
clientIP string
|
|
|
|
//clientProtocol api.Protocol //not yet used
|
|
|
|
//sessionCookie string //not yet used
|
|
|
|
endpoint string
|
|
|
|
lastUsed time.Time
|
|
|
|
}
|
|
|
|
|
|
|
|
type affinityPolicy struct {
|
|
|
|
affinityType v1.ServiceAffinity
|
|
|
|
affinityMap map[string]*affinityState // map client IP -> affinity info
|
|
|
|
ttlSeconds int
|
|
|
|
}
|
|
|
|
|
|
|
|
// LoadBalancerRR is a round-robin load balancer.
|
|
|
|
type LoadBalancerRR struct {
|
|
|
|
lock sync.RWMutex
|
|
|
|
services map[proxy.ServicePortName]*balancerState
|
|
|
|
}
|
|
|
|
|
|
|
|
// Ensure this implements LoadBalancer.
|
|
|
|
var _ LoadBalancer = &LoadBalancerRR{}
|
|
|
|
|
|
|
|
type balancerState struct {
|
|
|
|
endpoints []string // a list of "ip:port" style strings
|
|
|
|
index int // current index into endpoints
|
|
|
|
affinity affinityPolicy
|
|
|
|
}
|
|
|
|
|
|
|
|
func newAffinityPolicy(affinityType v1.ServiceAffinity, ttlSeconds int) *affinityPolicy {
|
|
|
|
return &affinityPolicy{
|
|
|
|
affinityType: affinityType,
|
|
|
|
affinityMap: make(map[string]*affinityState),
|
|
|
|
ttlSeconds: ttlSeconds,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// NewLoadBalancerRR returns a new LoadBalancerRR.
|
|
|
|
func NewLoadBalancerRR() *LoadBalancerRR {
|
|
|
|
return &LoadBalancerRR{
|
|
|
|
services: map[proxy.ServicePortName]*balancerState{},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) NewService(svcPort proxy.ServicePortName, affinityType v1.ServiceAffinity, ttlSeconds int) error {
|
|
|
|
klog.V(4).Infof("LoadBalancerRR NewService %q", svcPort)
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
lb.newServiceInternal(svcPort, affinityType, ttlSeconds)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// This assumes that lb.lock is already held.
|
|
|
|
func (lb *LoadBalancerRR) newServiceInternal(svcPort proxy.ServicePortName, affinityType v1.ServiceAffinity, ttlSeconds int) *balancerState {
|
|
|
|
if ttlSeconds == 0 {
|
|
|
|
ttlSeconds = int(v1.DefaultClientIPServiceAffinitySeconds) //default to 3 hours if not specified. Should 0 be unlimited instead????
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, exists := lb.services[svcPort]; !exists {
|
|
|
|
lb.services[svcPort] = &balancerState{affinity: *newAffinityPolicy(affinityType, ttlSeconds)}
|
|
|
|
klog.V(4).Infof("LoadBalancerRR service %q did not exist, created", svcPort)
|
|
|
|
} else if affinityType != "" {
|
|
|
|
lb.services[svcPort].affinity.affinityType = affinityType
|
|
|
|
}
|
|
|
|
return lb.services[svcPort]
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) DeleteService(svcPort proxy.ServicePortName) {
|
|
|
|
klog.V(4).Infof("LoadBalancerRR DeleteService %q", svcPort)
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
delete(lb.services, svcPort)
|
|
|
|
}
|
|
|
|
|
|
|
|
// return true if this service is using some form of session affinity.
|
|
|
|
func isSessionAffinity(affinity *affinityPolicy) bool {
|
|
|
|
// Should never be empty string, but checking for it to be safe.
|
|
|
|
if affinity.affinityType == "" || affinity.affinityType == v1.ServiceAffinityNone {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
// ServiceHasEndpoints checks whether a service entry has endpoints.
|
|
|
|
func (lb *LoadBalancerRR) ServiceHasEndpoints(svcPort proxy.ServicePortName) bool {
|
2019-08-30 18:33:25 +00:00
|
|
|
lb.lock.RLock()
|
|
|
|
defer lb.lock.RUnlock()
|
2019-01-12 04:58:27 +00:00
|
|
|
state, exists := lb.services[svcPort]
|
|
|
|
// TODO: while nothing ever assigns nil to the map, *some* of the code using the map
|
|
|
|
// checks for it. The code should all follow the same convention.
|
|
|
|
return exists && state != nil && len(state.endpoints) > 0
|
|
|
|
}
|
|
|
|
|
|
|
|
// NextEndpoint returns a service endpoint.
|
|
|
|
// The service endpoint is chosen using the round-robin algorithm.
|
|
|
|
func (lb *LoadBalancerRR) NextEndpoint(svcPort proxy.ServicePortName, srcAddr net.Addr, sessionAffinityReset bool) (string, error) {
|
|
|
|
// Coarse locking is simple. We can get more fine-grained if/when we
|
|
|
|
// can prove it matters.
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
|
|
|
|
state, exists := lb.services[svcPort]
|
|
|
|
if !exists || state == nil {
|
|
|
|
return "", ErrMissingServiceEntry
|
|
|
|
}
|
|
|
|
if len(state.endpoints) == 0 {
|
|
|
|
return "", ErrMissingEndpoints
|
|
|
|
}
|
|
|
|
klog.V(4).Infof("NextEndpoint for service %q, srcAddr=%v: endpoints: %+v", svcPort, srcAddr, state.endpoints)
|
|
|
|
|
|
|
|
sessionAffinityEnabled := isSessionAffinity(&state.affinity)
|
|
|
|
|
|
|
|
var ipaddr string
|
|
|
|
if sessionAffinityEnabled {
|
|
|
|
// Caution: don't shadow ipaddr
|
|
|
|
var err error
|
|
|
|
ipaddr, _, err = net.SplitHostPort(srcAddr.String())
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("malformed source address %q: %v", srcAddr.String(), err)
|
|
|
|
}
|
|
|
|
if !sessionAffinityReset {
|
|
|
|
sessionAffinity, exists := state.affinity.affinityMap[ipaddr]
|
|
|
|
if exists && int(time.Since(sessionAffinity.lastUsed).Seconds()) < state.affinity.ttlSeconds {
|
|
|
|
// Affinity wins.
|
|
|
|
endpoint := sessionAffinity.endpoint
|
|
|
|
sessionAffinity.lastUsed = time.Now()
|
|
|
|
klog.V(4).Infof("NextEndpoint for service %q from IP %s with sessionAffinity %#v: %s", svcPort, ipaddr, sessionAffinity, endpoint)
|
|
|
|
return endpoint, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// Take the next endpoint.
|
|
|
|
endpoint := state.endpoints[state.index]
|
|
|
|
state.index = (state.index + 1) % len(state.endpoints)
|
|
|
|
|
|
|
|
if sessionAffinityEnabled {
|
|
|
|
var affinity *affinityState
|
|
|
|
affinity = state.affinity.affinityMap[ipaddr]
|
|
|
|
if affinity == nil {
|
|
|
|
affinity = new(affinityState) //&affinityState{ipaddr, "TCP", "", endpoint, time.Now()}
|
|
|
|
state.affinity.affinityMap[ipaddr] = affinity
|
|
|
|
}
|
|
|
|
affinity.lastUsed = time.Now()
|
|
|
|
affinity.endpoint = endpoint
|
|
|
|
affinity.clientIP = ipaddr
|
|
|
|
klog.V(4).Infof("Updated affinity key %s: %#v", ipaddr, state.affinity.affinityMap[ipaddr])
|
|
|
|
}
|
|
|
|
|
|
|
|
return endpoint, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Remove any session affinity records associated to a particular endpoint (for example when a pod goes down).
|
|
|
|
func removeSessionAffinityByEndpoint(state *balancerState, svcPort proxy.ServicePortName, endpoint string) {
|
|
|
|
for _, affinity := range state.affinity.affinityMap {
|
|
|
|
if affinity.endpoint == endpoint {
|
|
|
|
klog.V(4).Infof("Removing client: %s from affinityMap for service %q", affinity.endpoint, svcPort)
|
|
|
|
delete(state.affinity.affinityMap, affinity.clientIP)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Loop through the valid endpoints and then the endpoints associated with the Load Balancer.
|
|
|
|
// Then remove any session affinity records that are not in both lists.
|
|
|
|
// This assumes the lb.lock is held.
|
2019-12-12 01:27:03 +00:00
|
|
|
func (lb *LoadBalancerRR) removeStaleAffinity(svcPort proxy.ServicePortName, newEndpoints []string) {
|
|
|
|
newEndpointsSet := sets.NewString()
|
2019-01-12 04:58:27 +00:00
|
|
|
for _, newEndpoint := range newEndpoints {
|
2019-12-12 01:27:03 +00:00
|
|
|
newEndpointsSet.Insert(newEndpoint)
|
2019-01-12 04:58:27 +00:00
|
|
|
}
|
2019-12-12 01:27:03 +00:00
|
|
|
|
2019-01-12 04:58:27 +00:00
|
|
|
state, exists := lb.services[svcPort]
|
|
|
|
if !exists {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for _, existingEndpoint := range state.endpoints {
|
2019-12-12 01:27:03 +00:00
|
|
|
if !newEndpointsSet.Has(existingEndpoint) {
|
|
|
|
klog.V(2).Infof("Delete endpoint %s for service %q", existingEndpoint, svcPort)
|
|
|
|
removeSessionAffinityByEndpoint(state, svcPort, existingEndpoint)
|
2019-01-12 04:58:27 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) OnEndpointsAdd(endpoints *v1.Endpoints) {
|
2019-09-27 21:51:53 +00:00
|
|
|
portsToEndpoints := util.BuildPortsToEndpointsMap(endpoints)
|
2019-01-12 04:58:27 +00:00
|
|
|
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
|
|
|
|
for portname := range portsToEndpoints {
|
|
|
|
svcPort := proxy.ServicePortName{NamespacedName: types.NamespacedName{Namespace: endpoints.Namespace, Name: endpoints.Name}, Port: portname}
|
2019-09-27 21:51:53 +00:00
|
|
|
newEndpoints := portsToEndpoints[portname]
|
2019-01-12 04:58:27 +00:00
|
|
|
state, exists := lb.services[svcPort]
|
|
|
|
|
|
|
|
if !exists || state == nil || len(newEndpoints) > 0 {
|
|
|
|
klog.V(1).Infof("LoadBalancerRR: Setting endpoints for %s to %+v", svcPort, newEndpoints)
|
|
|
|
// OnEndpointsAdd can be called without NewService being called externally.
|
|
|
|
// To be safe we will call it here. A new service will only be created
|
2019-12-12 01:27:03 +00:00
|
|
|
// if one does not already exist.
|
2019-01-12 04:58:27 +00:00
|
|
|
state = lb.newServiceInternal(svcPort, v1.ServiceAffinity(""), 0)
|
2019-09-27 21:51:53 +00:00
|
|
|
state.endpoints = util.ShuffleStrings(newEndpoints)
|
2019-01-12 04:58:27 +00:00
|
|
|
|
|
|
|
// Reset the round-robin index.
|
|
|
|
state.index = 0
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) OnEndpointsUpdate(oldEndpoints, endpoints *v1.Endpoints) {
|
2019-09-27 21:51:53 +00:00
|
|
|
portsToEndpoints := util.BuildPortsToEndpointsMap(endpoints)
|
|
|
|
oldPortsToEndpoints := util.BuildPortsToEndpointsMap(oldEndpoints)
|
2019-01-12 04:58:27 +00:00
|
|
|
registeredEndpoints := make(map[proxy.ServicePortName]bool)
|
|
|
|
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
|
|
|
|
for portname := range portsToEndpoints {
|
|
|
|
svcPort := proxy.ServicePortName{NamespacedName: types.NamespacedName{Namespace: endpoints.Namespace, Name: endpoints.Name}, Port: portname}
|
2019-09-27 21:51:53 +00:00
|
|
|
newEndpoints := portsToEndpoints[portname]
|
2019-01-12 04:58:27 +00:00
|
|
|
state, exists := lb.services[svcPort]
|
|
|
|
|
|
|
|
curEndpoints := []string{}
|
|
|
|
if state != nil {
|
|
|
|
curEndpoints = state.endpoints
|
|
|
|
}
|
|
|
|
|
|
|
|
if !exists || state == nil || len(curEndpoints) != len(newEndpoints) || !slicesEquiv(slice.CopyStrings(curEndpoints), newEndpoints) {
|
|
|
|
klog.V(1).Infof("LoadBalancerRR: Setting endpoints for %s to %+v", svcPort, newEndpoints)
|
2019-12-12 01:27:03 +00:00
|
|
|
lb.removeStaleAffinity(svcPort, newEndpoints)
|
2019-01-12 04:58:27 +00:00
|
|
|
// OnEndpointsUpdate can be called without NewService being called externally.
|
|
|
|
// To be safe we will call it here. A new service will only be created
|
|
|
|
// if one does not already exist. The affinity will be updated
|
|
|
|
// later, once NewService is called.
|
|
|
|
state = lb.newServiceInternal(svcPort, v1.ServiceAffinity(""), 0)
|
2019-09-27 21:51:53 +00:00
|
|
|
state.endpoints = util.ShuffleStrings(newEndpoints)
|
2019-01-12 04:58:27 +00:00
|
|
|
|
|
|
|
// Reset the round-robin index.
|
|
|
|
state.index = 0
|
|
|
|
}
|
|
|
|
registeredEndpoints[svcPort] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// Now remove all endpoints missing from the update.
|
|
|
|
for portname := range oldPortsToEndpoints {
|
|
|
|
svcPort := proxy.ServicePortName{NamespacedName: types.NamespacedName{Namespace: oldEndpoints.Namespace, Name: oldEndpoints.Name}, Port: portname}
|
|
|
|
if _, exists := registeredEndpoints[svcPort]; !exists {
|
|
|
|
lb.resetService(svcPort)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) resetService(svcPort proxy.ServicePortName) {
|
|
|
|
// If the service is still around, reset but don't delete.
|
|
|
|
if state, ok := lb.services[svcPort]; ok {
|
|
|
|
if len(state.endpoints) > 0 {
|
|
|
|
klog.V(2).Infof("LoadBalancerRR: Removing endpoints for %s", svcPort)
|
|
|
|
state.endpoints = []string{}
|
|
|
|
}
|
|
|
|
state.index = 0
|
|
|
|
state.affinity.affinityMap = map[string]*affinityState{}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) OnEndpointsDelete(endpoints *v1.Endpoints) {
|
2019-09-27 21:51:53 +00:00
|
|
|
portsToEndpoints := util.BuildPortsToEndpointsMap(endpoints)
|
2019-01-12 04:58:27 +00:00
|
|
|
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
|
|
|
|
for portname := range portsToEndpoints {
|
|
|
|
svcPort := proxy.ServicePortName{NamespacedName: types.NamespacedName{Namespace: endpoints.Namespace, Name: endpoints.Name}, Port: portname}
|
|
|
|
lb.resetService(svcPort)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) OnEndpointsSynced() {
|
|
|
|
}
|
|
|
|
|
|
|
|
// Tests whether two slices are equivalent. This sorts both slices in-place.
|
|
|
|
func slicesEquiv(lhs, rhs []string) bool {
|
|
|
|
if len(lhs) != len(rhs) {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
if reflect.DeepEqual(slice.SortStrings(lhs), slice.SortStrings(rhs)) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (lb *LoadBalancerRR) CleanupStaleStickySessions(svcPort proxy.ServicePortName) {
|
|
|
|
lb.lock.Lock()
|
|
|
|
defer lb.lock.Unlock()
|
|
|
|
|
|
|
|
state, exists := lb.services[svcPort]
|
|
|
|
if !exists {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
for ip, affinity := range state.affinity.affinityMap {
|
|
|
|
if int(time.Since(affinity.lastUsed).Seconds()) >= state.affinity.ttlSeconds {
|
|
|
|
klog.V(4).Infof("Removing client %s from affinityMap for service %q", affinity.clientIP, svcPort)
|
|
|
|
delete(state.affinity.affinityMap, ip)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|