mirror of
https://github.com/kubernetes-sigs/descheduler.git
synced 2026-01-26 05:14:13 +01:00
1324 lines
40 KiB
Go
1324 lines
40 KiB
Go
/*
|
|
Copyright 2022 The Kubernetes Authors.
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package defaultevictor
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"reflect"
|
|
"slices"
|
|
"testing"
|
|
"time"
|
|
|
|
v1 "k8s.io/api/core/v1"
|
|
policyv1 "k8s.io/api/policy/v1"
|
|
"k8s.io/apimachinery/pkg/api/resource"
|
|
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
|
"k8s.io/apimachinery/pkg/runtime"
|
|
"k8s.io/apimachinery/pkg/util/uuid"
|
|
"k8s.io/client-go/informers"
|
|
"k8s.io/client-go/kubernetes/fake"
|
|
"k8s.io/klog/v2"
|
|
"k8s.io/utils/ptr"
|
|
"sigs.k8s.io/descheduler/pkg/api"
|
|
evictionutils "sigs.k8s.io/descheduler/pkg/descheduler/evictions/utils"
|
|
podutil "sigs.k8s.io/descheduler/pkg/descheduler/pod"
|
|
frameworkfake "sigs.k8s.io/descheduler/pkg/framework/fake"
|
|
frameworktypes "sigs.k8s.io/descheduler/pkg/framework/types"
|
|
"sigs.k8s.io/descheduler/pkg/utils"
|
|
"sigs.k8s.io/descheduler/test"
|
|
)
|
|
|
|
type testCase struct {
|
|
description string
|
|
pods []*v1.Pod
|
|
nodes []*v1.Node
|
|
pdbs []*policyv1.PodDisruptionBudget
|
|
evictFailedBarePods bool
|
|
evictLocalStoragePods bool
|
|
evictSystemCriticalPods bool
|
|
ignorePvcPods bool
|
|
priorityThreshold *int32
|
|
nodeFit bool
|
|
minReplicas uint
|
|
minPodAge *metav1.Duration
|
|
result bool
|
|
ignorePodsWithoutPDB bool
|
|
podProtections PodProtections
|
|
noEvictionPolicy NoEvictionPolicy
|
|
pvcs []*v1.PersistentVolumeClaim
|
|
}
|
|
|
|
func buildTestNode(name string, apply func(*v1.Node)) *v1.Node {
|
|
return test.BuildTestNode(name, 1000, 2000, 13, apply)
|
|
}
|
|
|
|
func TestDefaultEvictorPreEvictionFilter(t *testing.T) {
|
|
n1 := buildTestNode("node1", nil)
|
|
|
|
nodeTaintKey := "hardware"
|
|
nodeTaintValue := "gpu"
|
|
|
|
nodeLabelKey := "datacenter"
|
|
nodeLabelValue := "east"
|
|
|
|
testCases := []testCase{
|
|
{
|
|
description: "Pod with no tolerations running on normal node, all other nodes tainted",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
buildTestNode("node2", func(node *v1.Node) {
|
|
node.Spec.Taints = []v1.Taint{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
buildTestNode("node3", func(node *v1.Node) {
|
|
node.Spec.Taints = []v1.Taint{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
}, {
|
|
description: "Pod with correct tolerations running on normal node, all other nodes tainted",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Tolerations = []v1.Toleration{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
buildTestNode("node2", func(node *v1.Node) {
|
|
node.Spec.Taints = []v1.Taint{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
buildTestNode("node3", func(node *v1.Node) {
|
|
node.Spec.Taints = []v1.Taint{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
result: true,
|
|
}, {
|
|
description: "Pod with incorrect node selector",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.NodeSelector = map[string]string{
|
|
nodeLabelKey: "fail",
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
buildTestNode("node2", func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
buildTestNode("node3", func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
}, {
|
|
description: "Pod with correct node selector",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.NodeSelector = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
buildTestNode("node2", func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
buildTestNode("node3", func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
result: true,
|
|
}, {
|
|
description: "Pod with correct node selector, but only available node doesn't have enough CPU",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 12, 8, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.NodeSelector = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
test.BuildTestNode("node2-TEST", 10, 16, 10, func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
test.BuildTestNode("node3-TEST", 10, 16, 10, func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
}, {
|
|
description: "Pod with correct node selector, and one node has enough memory",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 12, 8, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.NodeSelector = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
test.BuildTestPod("node2-pod-10GB-mem", 20, 10, "node2", func(pod *v1.Pod) {
|
|
pod.ObjectMeta.Labels = map[string]string{
|
|
"test": "true",
|
|
}
|
|
}),
|
|
test.BuildTestPod("node3-pod-10GB-mem", 20, 10, "node3", func(pod *v1.Pod) {
|
|
pod.ObjectMeta.Labels = map[string]string{
|
|
"test": "true",
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
test.BuildTestNode("node2", 100, 16, 10, func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
test.BuildTestNode("node3", 100, 20, 10, func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
result: true,
|
|
}, {
|
|
description: "Pod with correct node selector, but both nodes don't have enough memory",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 12, 8, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.NodeSelector = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
test.BuildTestPod("node2-pod-10GB-mem", 10, 10, "node2", func(pod *v1.Pod) {
|
|
pod.ObjectMeta.Labels = map[string]string{
|
|
"test": "true",
|
|
}
|
|
}),
|
|
test.BuildTestPod("node3-pod-10GB-mem", 10, 10, "node3", func(pod *v1.Pod) {
|
|
pod.ObjectMeta.Labels = map[string]string{
|
|
"test": "true",
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
test.BuildTestNode("node2", 100, 16, 10, func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
test.BuildTestNode("node3", 100, 16, 10, func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
}, {
|
|
description: "Pod with incorrect node selector, but nodefit false, should still be evicted",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.NodeSelector = map[string]string{
|
|
nodeLabelKey: "fail",
|
|
}
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
buildTestNode("node2", func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
buildTestNode("node3", func(node *v1.Node) {
|
|
node.ObjectMeta.Labels = map[string]string{
|
|
nodeLabelKey: nodeLabelValue,
|
|
}
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
evictorPlugin, err := initializePlugin(ctx, test)
|
|
if err != nil {
|
|
t.Fatalf("Unable to initialize the plugin: %v", err)
|
|
}
|
|
|
|
result := evictorPlugin.(frameworktypes.EvictorPlugin).PreEvictionFilter(test.pods[0])
|
|
if (result) != test.result {
|
|
t.Errorf("Filter should return for pod %s %t, but it returns %t", test.pods[0].Name, test.result, result)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestDefaultEvictorFilter(t *testing.T) {
|
|
n1 := buildTestNode("node1", nil)
|
|
lowPriority := int32(800)
|
|
highPriority := int32(900)
|
|
|
|
minPodAge := metav1.Duration{Duration: 50 * time.Minute}
|
|
|
|
nodeTaintKey := "hardware"
|
|
nodeTaintValue := "gpu"
|
|
|
|
ownerRefUUID := uuid.NewUUID()
|
|
|
|
testCases := []testCase{
|
|
{
|
|
description: "Failed pod eviction with no ownerRefs",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("bare_pod_failed", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Status.Phase = v1.PodFailed
|
|
}),
|
|
},
|
|
},
|
|
{
|
|
description: "Normal pod eviction with no ownerRefs and evictFailedBarePods enabled",
|
|
pods: []*v1.Pod{test.BuildTestPod("bare_pod", 400, 0, n1.Name, nil)},
|
|
evictFailedBarePods: true,
|
|
},
|
|
{
|
|
description: "Failed pod eviction with no ownerRefs",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("bare_pod_failed_but_can_be_evicted", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Status.Phase = v1.PodFailed
|
|
}),
|
|
},
|
|
evictFailedBarePods: true,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with normal ownerRefs",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with normal ownerRefs and " + evictPodAnnotationKey + " annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p2", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with normal ownerRefs and " + evictionutils.SoftNoEvictionAnnotationKey + " annotation (preference)",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p2", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictionutils.SoftNoEvictionAnnotationKey: ""}
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
evictLocalStoragePods: false,
|
|
evictSystemCriticalPods: false,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with normal ownerRefs and " + evictionutils.SoftNoEvictionAnnotationKey + " annotation (mandatory)",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p2", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictionutils.SoftNoEvictionAnnotationKey: ""}
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
evictLocalStoragePods: false,
|
|
evictSystemCriticalPods: false,
|
|
noEvictionPolicy: MandatoryNoEvictionPolicy,
|
|
result: false,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with replicaSet ownerRefs",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p3", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with replicaSet ownerRefs and " + evictPodAnnotationKey + " annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p4", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.ObjectMeta.OwnerReferences = test.GetReplicaSetOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with statefulSet ownerRefs",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p18", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Normal pod eviction with statefulSet ownerRefs and " + evictPodAnnotationKey + " annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p19", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.ObjectMeta.OwnerReferences = test.GetStatefulSetOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod not evicted because it is bound to a PV and evictLocalStoragePods = false",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p5", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "sample",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{Path: "somePath"},
|
|
EmptyDir: &v1.EmptyDirVolumeSource{
|
|
SizeLimit: resource.NewQuantity(int64(10), resource.BinarySI),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
},
|
|
{
|
|
description: "Pod is evicted because it is bound to a PV and evictLocalStoragePods = true",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p6", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "sample",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{Path: "somePath"},
|
|
EmptyDir: &v1.EmptyDirVolumeSource{
|
|
SizeLimit: resource.NewQuantity(int64(10), resource.BinarySI),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
evictLocalStoragePods: true,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod is evicted because it is bound to a PV and evictLocalStoragePods = false, but it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p7", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "sample",
|
|
VolumeSource: v1.VolumeSource{
|
|
HostPath: &v1.HostPathVolumeSource{Path: "somePath"},
|
|
EmptyDir: &v1.EmptyDirVolumeSource{
|
|
SizeLimit: resource.NewQuantity(int64(10), resource.BinarySI),
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod not evicted because it is part of a daemonSet",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p8", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.ObjectMeta.OwnerReferences = test.GetDaemonSetOwnerRefList()
|
|
}),
|
|
},
|
|
},
|
|
{
|
|
description: "Pod is evicted because it is part of a daemonSet, but it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p9", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.ObjectMeta.OwnerReferences = test.GetDaemonSetOwnerRefList()
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod not evicted because it is a mirror poddsa",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p10", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Annotations = test.GetMirrorPodAnnotation()
|
|
}),
|
|
},
|
|
},
|
|
{
|
|
description: "Pod is evicted because it is a mirror pod, but it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p11", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Annotations = test.GetMirrorPodAnnotation()
|
|
pod.Annotations[evictPodAnnotationKey] = "true"
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod not evicted because it has system critical priority",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p12", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
priority := utils.SystemCriticalPriority
|
|
pod.Spec.Priority = &priority
|
|
}),
|
|
},
|
|
},
|
|
{
|
|
description: "Pod is evicted because it has system critical priority, but it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p13", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
priority := utils.SystemCriticalPriority
|
|
pod.Spec.Priority = &priority
|
|
pod.Annotations = map[string]string{
|
|
evictPodAnnotationKey: "true",
|
|
}
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod not evicted because it has a priority higher than the configured priority threshold",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p14", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Priority = &highPriority
|
|
}),
|
|
},
|
|
priorityThreshold: &lowPriority,
|
|
},
|
|
{
|
|
description: "Pod is evicted because it has a priority higher than the configured priority threshold, but it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p15", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.Spec.Priority = &highPriority
|
|
}),
|
|
},
|
|
priorityThreshold: &lowPriority,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod is evicted because it has system critical priority, but evictSystemCriticalPods = true",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p16", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
priority := utils.SystemCriticalPriority
|
|
pod.Spec.Priority = &priority
|
|
}),
|
|
},
|
|
evictSystemCriticalPods: true,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod is evicted because it has system critical priority, but evictSystemCriticalPods = true and it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p16", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
priority := utils.SystemCriticalPriority
|
|
pod.Spec.Priority = &priority
|
|
}),
|
|
},
|
|
evictSystemCriticalPods: true,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod is evicted because it has a priority higher than the configured priority threshold, but evictSystemCriticalPods = true",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p17", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Priority = &highPriority
|
|
}),
|
|
},
|
|
evictSystemCriticalPods: true,
|
|
priorityThreshold: &lowPriority,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod is evicted because it has a priority higher than the configured priority threshold, but evictSystemCriticalPods = true and it has scheduler.alpha.kubernetes.io/evict annotation",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p17", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Annotations = map[string]string{evictPodAnnotationKey: "true"}
|
|
pod.Spec.Priority = &highPriority
|
|
}),
|
|
},
|
|
evictSystemCriticalPods: true,
|
|
priorityThreshold: &lowPriority,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod with no tolerations running on normal node, all other nodes tainted, no PreEvictionFilter, should ignore nodeFit",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
nodes: []*v1.Node{
|
|
buildTestNode("node2", func(node *v1.Node) {
|
|
node.Spec.Taints = []v1.Taint{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
buildTestNode("node3", func(node *v1.Node) {
|
|
node.Spec.Taints = []v1.Taint{
|
|
{
|
|
Key: nodeTaintKey,
|
|
Value: nodeTaintValue,
|
|
Effect: v1.TaintEffectNoSchedule,
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
nodeFit: true,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "minReplicas of 2, owner with 2 replicas, evicts",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.ObjectMeta.OwnerReferences[0].UID = ownerRefUUID
|
|
}),
|
|
test.BuildTestPod("p2", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.ObjectMeta.OwnerReferences[0].UID = ownerRefUUID
|
|
}),
|
|
},
|
|
minReplicas: 2,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "minReplicas of 3, owner with 2 replicas, no eviction",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.ObjectMeta.OwnerReferences[0].UID = ownerRefUUID
|
|
}),
|
|
test.BuildTestPod("p2", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.ObjectMeta.OwnerReferences[0].UID = ownerRefUUID
|
|
}),
|
|
},
|
|
minReplicas: 3,
|
|
},
|
|
{
|
|
description: "minReplicas of 2, multiple owners, no eviction",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = append(test.GetNormalPodOwnerRefList(), test.GetNormalPodOwnerRefList()...)
|
|
pod.ObjectMeta.OwnerReferences[0].UID = ownerRefUUID
|
|
}),
|
|
test.BuildTestPod("p2", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
minReplicas: 2,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "minPodAge of 50, pod created 10 minutes ago, no eviction",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
podStartTime := metav1.Now().Add(time.Minute * time.Duration(-10))
|
|
pod.Status.StartTime = &metav1.Time{Time: podStartTime}
|
|
}),
|
|
},
|
|
minPodAge: &minPodAge,
|
|
},
|
|
{
|
|
description: "minPodAge of 50, pod created 60 minutes ago, evicts",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
podStartTime := metav1.Now().Add(time.Minute * time.Duration(-60))
|
|
pod.Status.StartTime = &metav1.Time{Time: podStartTime}
|
|
}),
|
|
},
|
|
minPodAge: &minPodAge,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "nil minPodAge, pod created 60 minutes ago, evicts",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
podStartTime := metav1.Now().Add(time.Minute * time.Duration(-60))
|
|
pod.Status.StartTime = &metav1.Time{Time: podStartTime}
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "ignorePodsWithoutPDB, pod with no PDBs, no eviction",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Labels = map[string]string{
|
|
"app": "foo",
|
|
}
|
|
}),
|
|
},
|
|
ignorePodsWithoutPDB: true,
|
|
},
|
|
{
|
|
description: "ignorePodsWithoutPDB, pod with PDBs, evicts",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Labels = map[string]string{
|
|
"app": "foo",
|
|
}
|
|
}),
|
|
},
|
|
pdbs: []*policyv1.PodDisruptionBudget{
|
|
test.BuildTestPDB("pdb1", "foo"),
|
|
},
|
|
ignorePodsWithoutPDB: true,
|
|
result: true,
|
|
},
|
|
{
|
|
description: "ignorePvcPods is set, pod with PVC, not evicts",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p15", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ClaimName: "foo"},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
ignorePvcPods: true,
|
|
},
|
|
{
|
|
description: "ignorePvcPods is not set, pod with PVC, evicts",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p15", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ClaimName: "foo"},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod with local storage is evicted because 'PodsWithLocalStorage' is in DefaultDisabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p18", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "local-storage", VolumeSource: v1.VolumeSource{
|
|
EmptyDir: &v1.EmptyDirVolumeSource{},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{PodsWithLocalStorage},
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "DaemonSet pod is evicted because 'DaemonSetPods' is in DefaultDisabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p19", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = []metav1.OwnerReference{
|
|
{
|
|
Kind: "DaemonSet",
|
|
Name: "daemonset-test",
|
|
UID: "daemonset-uid",
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{DaemonSetPods},
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod with PVC is not evicted because 'PodsWithPVC' is in ExtraEnabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p20", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{ClaimName: "foo"},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
},
|
|
result: false,
|
|
},
|
|
{
|
|
description: "Pod without PDB is not evicted because 'PodsWithoutPDB' is in ExtraEnabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p21", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithoutPDB},
|
|
},
|
|
result: false,
|
|
},
|
|
{
|
|
description: "Pod with ResourceClaims is not evicted because 'PodsWithResourceClaims' is in ExtraEnabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p20", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.ResourceClaims = []v1.PodResourceClaim{
|
|
{
|
|
Name: "test-claim",
|
|
ResourceClaimName: ptr.To("test-resource-claim"),
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithResourceClaims},
|
|
},
|
|
result: false,
|
|
},
|
|
{
|
|
description: "Pod using StorageClass is not evicted because 'PodsWithPVC' is in ExtraEnabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p23", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{
|
|
ClaimName: "foo",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
Config: &PodProtectionsConfig{
|
|
PodsWithPVC: &PodsWithPVCConfig{
|
|
ProtectedStorageClasses: []ProtectedStorageClass{
|
|
{
|
|
Name: "standard",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
pvcs: []*v1.PersistentVolumeClaim{
|
|
test.BuildTestPVC("foo", "standard"),
|
|
},
|
|
result: false,
|
|
},
|
|
{
|
|
description: "Pod using unprotected StorageClass is evicted even though 'PodsWithPVC' is in ExtraEnabled",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p24", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{
|
|
ClaimName: "foo",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
Config: &PodProtectionsConfig{
|
|
PodsWithPVC: &PodsWithPVCConfig{
|
|
ProtectedStorageClasses: []ProtectedStorageClass{
|
|
{
|
|
Name: "protected",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
pvcs: []*v1.PersistentVolumeClaim{
|
|
test.BuildTestPVC("foo", "unprotected"),
|
|
},
|
|
result: true,
|
|
},
|
|
{
|
|
description: "Pod using unexisting PVC is not evicted because we cannot determine if storage class is protected or not",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p25", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{
|
|
ClaimName: "foo",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
Config: &PodProtectionsConfig{
|
|
PodsWithPVC: &PodsWithPVCConfig{
|
|
ProtectedStorageClasses: []ProtectedStorageClass{
|
|
{
|
|
Name: "protected",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
pvcs: []*v1.PersistentVolumeClaim{},
|
|
result: false,
|
|
},
|
|
{
|
|
description: "Pod using protected and unprotected StorageClasses is not evicted",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p26", 400, 0, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
pod.Spec.Volumes = []v1.Volume{
|
|
{
|
|
Name: "protected-pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{
|
|
ClaimName: "protected",
|
|
},
|
|
},
|
|
},
|
|
{
|
|
Name: "unprotected-pvc", VolumeSource: v1.VolumeSource{
|
|
PersistentVolumeClaim: &v1.PersistentVolumeClaimVolumeSource{
|
|
ClaimName: "unprotected",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}),
|
|
},
|
|
podProtections: PodProtections{
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
Config: &PodProtectionsConfig{
|
|
PodsWithPVC: &PodsWithPVCConfig{
|
|
ProtectedStorageClasses: []ProtectedStorageClass{
|
|
{
|
|
Name: "protected",
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
pvcs: []*v1.PersistentVolumeClaim{
|
|
test.BuildTestPVC("protected", "protected"),
|
|
test.BuildTestPVC("unprotected", "unprotected"),
|
|
},
|
|
result: false,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
evictorPlugin, err := initializePlugin(ctx, test)
|
|
if err != nil {
|
|
t.Fatalf("Unable to initialize the plugin: %v", err)
|
|
}
|
|
|
|
result := evictorPlugin.(frameworktypes.EvictorPlugin).Filter(test.pods[0])
|
|
if (result) != test.result {
|
|
t.Errorf("Filter should return for pod %s %t, but it returns %t", test.pods[0].Name, test.result, result)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestReinitialization(t *testing.T) {
|
|
n1 := buildTestNode("node1", nil)
|
|
ownerRefUUID := uuid.NewUUID()
|
|
|
|
testCases := []testCase{
|
|
{
|
|
description: "minReplicas of 2, multiple owners, eviction",
|
|
pods: []*v1.Pod{
|
|
test.BuildTestPod("p1", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = append(test.GetNormalPodOwnerRefList(), test.GetNormalPodOwnerRefList()...)
|
|
pod.ObjectMeta.OwnerReferences[0].UID = ownerRefUUID
|
|
}),
|
|
test.BuildTestPod("p2", 1, 1, n1.Name, func(pod *v1.Pod) {
|
|
pod.ObjectMeta.OwnerReferences = test.GetNormalPodOwnerRefList()
|
|
}),
|
|
},
|
|
minReplicas: 2,
|
|
result: true,
|
|
},
|
|
}
|
|
|
|
for _, test := range testCases {
|
|
t.Run(test.description, func(t *testing.T) {
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
defer cancel()
|
|
|
|
evictorPlugin, err := initializePlugin(ctx, test)
|
|
if err != nil {
|
|
t.Fatalf("Unable to initialize the plugin: %v", err)
|
|
}
|
|
|
|
defaultEvictor, ok := evictorPlugin.(*DefaultEvictor)
|
|
if !ok {
|
|
t.Fatalf("Unable to initialize as a DefaultEvictor plugin")
|
|
}
|
|
_, err = New(ctx, defaultEvictor.args, defaultEvictor.handle)
|
|
if err != nil {
|
|
t.Fatalf("Unable to reinitialize the plugin: %v", err)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func initializePlugin(ctx context.Context, test testCase) (frameworktypes.Plugin, error) {
|
|
var objs []runtime.Object
|
|
for _, node := range test.nodes {
|
|
objs = append(objs, node)
|
|
}
|
|
for _, pod := range test.pods {
|
|
objs = append(objs, pod)
|
|
}
|
|
for _, pdb := range test.pdbs {
|
|
objs = append(objs, pdb)
|
|
}
|
|
for _, pvc := range test.pvcs {
|
|
objs = append(objs, pvc)
|
|
}
|
|
|
|
fakeClient := fake.NewSimpleClientset(objs...)
|
|
|
|
sharedInformerFactory := informers.NewSharedInformerFactory(fakeClient, 0)
|
|
podInformer := sharedInformerFactory.Core().V1().Pods().Informer()
|
|
_ = sharedInformerFactory.Policy().V1().PodDisruptionBudgets().Lister()
|
|
_ = sharedInformerFactory.Core().V1().PersistentVolumeClaims().Lister()
|
|
|
|
getPodsAssignedToNode, err := podutil.BuildGetPodsAssignedToNodeFunc(podInformer)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("build get pods assigned to node function error: %v", err)
|
|
}
|
|
|
|
sharedInformerFactory.Start(ctx.Done())
|
|
sharedInformerFactory.WaitForCacheSync(ctx.Done())
|
|
|
|
defaultEvictorArgs := &DefaultEvictorArgs{
|
|
EvictLocalStoragePods: test.evictLocalStoragePods,
|
|
EvictSystemCriticalPods: test.evictSystemCriticalPods,
|
|
IgnorePvcPods: test.ignorePvcPods,
|
|
EvictFailedBarePods: test.evictFailedBarePods,
|
|
PriorityThreshold: &api.PriorityThreshold{
|
|
Value: test.priorityThreshold,
|
|
},
|
|
NodeFit: test.nodeFit,
|
|
MinReplicas: test.minReplicas,
|
|
MinPodAge: test.minPodAge,
|
|
IgnorePodsWithoutPDB: test.ignorePodsWithoutPDB,
|
|
NoEvictionPolicy: test.noEvictionPolicy,
|
|
PodProtections: test.podProtections,
|
|
}
|
|
|
|
evictorPlugin, err := New(
|
|
ctx,
|
|
defaultEvictorArgs,
|
|
&frameworkfake.HandleImpl{
|
|
ClientsetImpl: fakeClient,
|
|
GetPodsAssignedToNodeFuncImpl: getPodsAssignedToNode,
|
|
SharedInformerFactoryImpl: sharedInformerFactory,
|
|
})
|
|
if err != nil {
|
|
return nil, fmt.Errorf("unable to initialize the plugin: %v", err)
|
|
}
|
|
|
|
return evictorPlugin, nil
|
|
}
|
|
|
|
func TestGetEffectivePodProtections_TableDriven(t *testing.T) {
|
|
// Prepare the default set for easy reference
|
|
defaultSet := defaultPodProtections
|
|
|
|
tests := []struct {
|
|
name string
|
|
args *DefaultEvictorArgs
|
|
wantResult []PodProtection
|
|
}{
|
|
{
|
|
name: "NewConfig_EmptyConfig_ReturnsDefault",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{},
|
|
ExtraEnabled: []PodProtection{},
|
|
},
|
|
},
|
|
wantResult: defaultSet,
|
|
},
|
|
{
|
|
name: "NewConfig_DisableOneDefault_ReturnsDefaultMinusOne",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{PodsWithLocalStorage},
|
|
ExtraEnabled: []PodProtection{},
|
|
},
|
|
},
|
|
wantResult: []PodProtection{DaemonSetPods, SystemCriticalPods, FailedBarePods},
|
|
},
|
|
{
|
|
name: "NewConfig_DisableMultipleDefaults_ReturnsDefaultMinusMultiple",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{DaemonSetPods, SystemCriticalPods},
|
|
ExtraEnabled: []PodProtection{},
|
|
},
|
|
},
|
|
wantResult: []PodProtection{PodsWithLocalStorage, FailedBarePods},
|
|
},
|
|
{
|
|
name: "NewConfig_EnableOneExtra_ReturnsDefaultPlusOne",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{},
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
},
|
|
},
|
|
wantResult: append(defaultSet, PodsWithPVC),
|
|
},
|
|
{
|
|
name: "NewConfig_EnableMultipleExtra_ReturnsDefaultPlusMultiple",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{},
|
|
ExtraEnabled: []PodProtection{PodsWithPVC, PodsWithoutPDB},
|
|
},
|
|
},
|
|
wantResult: append(defaultSet, PodsWithPVC, PodsWithoutPDB),
|
|
},
|
|
{
|
|
name: "NewConfig_DisableAndEnable_ReturnsModifiedSet",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{FailedBarePods, DaemonSetPods},
|
|
ExtraEnabled: []PodProtection{PodsWithPVC},
|
|
},
|
|
},
|
|
wantResult: []PodProtection{PodsWithLocalStorage, SystemCriticalPods, PodsWithPVC},
|
|
},
|
|
{
|
|
name: "NewConfig_EnableOneExtra(PodsWithResourceClaims)_ReturnsDefaultPlusOne",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{},
|
|
ExtraEnabled: []PodProtection{PodsWithResourceClaims},
|
|
},
|
|
},
|
|
wantResult: append(defaultSet, PodsWithResourceClaims),
|
|
},
|
|
{
|
|
name: "NewConfig_DisableAndEnable_ReturnsModifiedSet",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
DefaultDisabled: []PodProtection{FailedBarePods, DaemonSetPods},
|
|
ExtraEnabled: []PodProtection{PodsWithPVC, PodsWithResourceClaims},
|
|
},
|
|
},
|
|
wantResult: []PodProtection{PodsWithLocalStorage, SystemCriticalPods, PodsWithPVC, PodsWithResourceClaims},
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
got := getEffectivePodProtections(tt.args)
|
|
|
|
if !slicesEqualUnordered(tt.wantResult, got) {
|
|
t.Errorf("getEffectivePodProtections() = %v, want %v", got, tt.wantResult)
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func slicesEqualUnordered(expected, actual []PodProtection) bool {
|
|
if len(expected) != len(actual) {
|
|
return false
|
|
}
|
|
for _, exp := range expected {
|
|
if !slices.Contains(actual, exp) {
|
|
return false
|
|
}
|
|
}
|
|
for _, act := range actual {
|
|
if !slices.Contains(expected, act) {
|
|
return false
|
|
}
|
|
}
|
|
return true
|
|
}
|
|
|
|
func Test_protectedPVCStorageClasses(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
args *DefaultEvictorArgs
|
|
expected []ProtectedStorageClass
|
|
}{
|
|
{
|
|
name: "no PodProtections config",
|
|
args: &DefaultEvictorArgs{},
|
|
expected: nil,
|
|
},
|
|
{
|
|
name: "no PodsWithPVC config",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
Config: &PodProtectionsConfig{},
|
|
},
|
|
},
|
|
expected: nil,
|
|
},
|
|
{
|
|
name: "storage classes specified",
|
|
args: &DefaultEvictorArgs{
|
|
PodProtections: PodProtections{
|
|
Config: &PodProtectionsConfig{
|
|
PodsWithPVC: &PodsWithPVCConfig{
|
|
ProtectedStorageClasses: []ProtectedStorageClass{
|
|
{Name: "sc1"},
|
|
{Name: "sc2"},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
expected: []ProtectedStorageClass{
|
|
{Name: "sc1"},
|
|
{Name: "sc2"},
|
|
},
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
ev := &DefaultEvictor{
|
|
logger: klog.NewKlogr(),
|
|
args: test.args,
|
|
}
|
|
result := protectedPVCStorageClasses(ev)
|
|
if !reflect.DeepEqual(result, test.expected) {
|
|
t.Errorf("Expected %v, got %v", test.expected, result)
|
|
}
|
|
})
|
|
}
|
|
}
|