/* Copyright 2015 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package e2e import ( "fmt" "math" "math/rand" "net" "net/http" "os" "strconv" "sync" "time" "k8s.io/apimachinery/pkg/labels" "k8s.io/apimachinery/pkg/runtime/schema" utilnet "k8s.io/apimachinery/pkg/util/net" "k8s.io/kubernetes/pkg/api" "k8s.io/kubernetes/pkg/api/v1" "k8s.io/kubernetes/pkg/apis/batch" "k8s.io/kubernetes/pkg/apis/extensions" "k8s.io/kubernetes/pkg/client/clientset_generated/clientset" "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset" "k8s.io/kubernetes/pkg/client/restclient" "k8s.io/kubernetes/pkg/client/transport" "k8s.io/kubernetes/pkg/util/intstr" "k8s.io/kubernetes/test/e2e/framework" testutils "k8s.io/kubernetes/test/utils" . "github.com/onsi/ginkgo" . "github.com/onsi/gomega" ) const ( smallGroupSize = 5 mediumGroupSize = 30 bigGroupSize = 250 smallGroupName = "load-small" mediumGroupName = "load-medium" bigGroupName = "load-big" smallGroupBatchSize = 30 mediumGroupBatchSize = 5 bigGroupBatchSize = 1 // We start RCs/Services/pods/... in different namespace in this test. // nodeCountPerNamespace determines how many namespaces we will be using // depending on the number of nodes in the underlying cluster. nodeCountPerNamespace = 100 ) // This test suite can take a long time to run, so by default it is added to // the ginkgo.skip list (see driver.go). // To run this suite you must explicitly ask for it by setting the // -t/--test flag or ginkgo.focus flag. var _ = framework.KubeDescribe("Load capacity", func() { var clientset clientset.Interface var nodeCount int var ns string var configs []testutils.RunObjectConfig var secretConfigs []*testutils.SecretConfig // Gathers metrics before teardown // TODO add flag that allows to skip cleanup on failure AfterEach(func() { // Verify latency metrics highLatencyRequests, err := framework.HighLatencyRequests(clientset) framework.ExpectNoError(err, "Too many instances metrics above the threshold") Expect(highLatencyRequests).NotTo(BeNumerically(">", 0)) }) // We assume a default throughput of 10 pods/second throughput. // We may want to revisit it in the future. // However, this can be overriden by LOAD_TEST_THROUGHPUT env var. throughput := 10 if throughputEnv := os.Getenv("LOAD_TEST_THROUGHPUT"); throughputEnv != "" { if newThroughput, err := strconv.Atoi(throughputEnv); err == nil { throughput = newThroughput } } // Explicitly put here, to delete namespace at the end of the test // (after measuring latency metrics, etc.). options := framework.FrameworkOptions{ ClientQPS: float32(math.Max(50.0, float64(2*throughput))), ClientBurst: int(math.Max(100.0, float64(4*throughput))), } f := framework.NewFramework("load", options, nil) f.NamespaceDeletionTimeout = time.Hour BeforeEach(func() { clientset = f.ClientSet ns = f.Namespace.Name nodes := framework.GetReadySchedulableNodesOrDie(clientset) nodeCount = len(nodes.Items) Expect(nodeCount).NotTo(BeZero()) // Terminating a namespace (deleting the remaining objects from it - which // generally means events) can affect the current run. Thus we wait for all // terminating namespace to be finally deleted before starting this test. err := framework.CheckTestingNSDeletedExcept(clientset, ns) framework.ExpectNoError(err) framework.ExpectNoError(framework.ResetMetrics(clientset)) }) type Load struct { podsPerNode int image string command []string // What kind of resource we want to create kind schema.GroupKind services bool secretsPerPod int daemonsPerNode int } loadTests := []Load{ // The container will consume 1 cpu and 512mb of memory. {podsPerNode: 3, image: "jess/stress", command: []string{"stress", "-c", "1", "-m", "2"}, kind: api.Kind("ReplicationController")}, {podsPerNode: 30, image: "gcr.io/google_containers/serve_hostname:v1.4", kind: api.Kind("ReplicationController")}, // Tests for other resource types {podsPerNode: 30, image: "gcr.io/google_containers/serve_hostname:v1.4", kind: extensions.Kind("Deployment")}, {podsPerNode: 30, image: "gcr.io/google_containers/serve_hostname:v1.4", kind: batch.Kind("Job")}, // Test scheduling when daemons are preset {podsPerNode: 30, image: "gcr.io/google_containers/serve_hostname:v1.4", kind: api.Kind("ReplicationController"), daemonsPerNode: 2}, // Test with secrets {podsPerNode: 30, image: "gcr.io/google_containers/serve_hostname:v1.4", kind: extensions.Kind("Deployment"), secretsPerPod: 2}, } for _, testArg := range loadTests { feature := "ManualPerformance" if testArg.podsPerNode == 30 && testArg.kind == api.Kind("ReplicationController") && testArg.daemonsPerNode == 0 && testArg.secretsPerPod == 0 { feature = "Performance" } name := fmt.Sprintf("[Feature:%s] should be able to handle %v pods per node %v with %v secrets and %v daemons", feature, testArg.podsPerNode, testArg.kind, testArg.secretsPerPod, testArg.daemonsPerNode, ) itArg := testArg itArg.services = os.Getenv("CREATE_SERVICES") == "true" It(name, func() { // Create a number of namespaces. namespaceCount := (nodeCount + nodeCountPerNamespace - 1) / nodeCountPerNamespace namespaces, err := CreateNamespaces(f, namespaceCount, fmt.Sprintf("load-%v-nodepods", itArg.podsPerNode)) framework.ExpectNoError(err) totalPods := (itArg.podsPerNode - itArg.daemonsPerNode) * nodeCount configs, secretConfigs = generateConfigs(totalPods, itArg.image, itArg.command, namespaces, itArg.kind, itArg.secretsPerPod) if itArg.services { framework.Logf("Creating services") services := generateServicesForConfigs(configs) for _, service := range services { _, err := clientset.Core().Services(service.Namespace).Create(service) framework.ExpectNoError(err) } framework.Logf("%v Services created.", len(services)) defer func(services []*v1.Service) { framework.Logf("Starting to delete services...") for _, service := range services { err := clientset.Core().Services(service.Namespace).Delete(service.Name, nil) framework.ExpectNoError(err) } framework.Logf("Services deleted") }(services) } else { framework.Logf("Skipping service creation") } // Create all secrets for i := range secretConfigs { secretConfigs[i].Run() defer secretConfigs[i].Stop() } // StartDeamon if needed for i := 0; i < itArg.daemonsPerNode; i++ { daemonName := fmt.Sprintf("load-daemon-%v", i) daemonConfig := &testutils.DaemonConfig{ Client: f.ClientSet, Name: daemonName, Namespace: f.Namespace.Name, LogFunc: framework.Logf, } daemonConfig.Run() defer func(config *testutils.DaemonConfig) { framework.ExpectNoError(framework.DeleteResourceAndPods( f.ClientSet, f.InternalClientset, extensions.Kind("DaemonSet"), config.Namespace, config.Name, )) }(daemonConfig) } // Simulate lifetime of RC: // * create with initial size // * scale RC to a random size and list all pods // * scale RC to a random size and list all pods // * delete it // // This will generate ~5 creations/deletions per second assuming: // - X small RCs each 5 pods [ 5 * X = totalPods / 2 ] // - Y medium RCs each 30 pods [ 30 * Y = totalPods / 4 ] // - Z big RCs each 250 pods [ 250 * Z = totalPods / 4] // We would like to spread creating replication controllers over time // to make it possible to create/schedule them in the meantime. // Currently we assume pods/second average throughput. // We may want to revisit it in the future. framework.Logf("Starting to create ReplicationControllers...") creatingTime := time.Duration(totalPods/throughput) * time.Second createAllResources(configs, creatingTime) By("============================================================================") // We would like to spread scaling replication controllers over time // to make it possible to create/schedule & delete them in the meantime. // Currently we assume that pods/second average throughput. // The expected number of created/deleted pods is less than totalPods/3. scalingTime := time.Duration(totalPods/(3*throughput)) * time.Second framework.Logf("Starting to scale ReplicationControllers first time...") scaleAllResources(configs, scalingTime) By("============================================================================") framework.Logf("Starting to scale ReplicationControllers second time...") scaleAllResources(configs, scalingTime) By("============================================================================") // Cleanup all created replication controllers. // Currently we assume pods/second average deletion throughput. // We may want to revisit it in the future. deletingTime := time.Duration(totalPods/throughput) * time.Second framework.Logf("Starting to delete ReplicationControllers...") deleteAllResources(configs, deletingTime) }) } }) func createClients(numberOfClients int) ([]*clientset.Clientset, []*internalclientset.Clientset, error) { clients := make([]*clientset.Clientset, numberOfClients) internalClients := make([]*internalclientset.Clientset, numberOfClients) for i := 0; i < numberOfClients; i++ { config, err := framework.LoadConfig() Expect(err).NotTo(HaveOccurred()) config.QPS = 100 config.Burst = 200 if framework.TestContext.KubeAPIContentType != "" { config.ContentType = framework.TestContext.KubeAPIContentType } // For the purpose of this test, we want to force that clients // do not share underlying transport (which is a default behavior // in Kubernetes). Thus, we are explicitly creating transport for // each client here. transportConfig, err := config.TransportConfig() if err != nil { return nil, nil, err } tlsConfig, err := transport.TLSConfigFor(transportConfig) if err != nil { return nil, nil, err } config.Transport = utilnet.SetTransportDefaults(&http.Transport{ Proxy: http.ProxyFromEnvironment, TLSHandshakeTimeout: 10 * time.Second, TLSClientConfig: tlsConfig, MaxIdleConnsPerHost: 100, Dial: (&net.Dialer{ Timeout: 30 * time.Second, KeepAlive: 30 * time.Second, }).Dial, }) // Overwrite TLS-related fields from config to avoid collision with // Transport field. config.TLSClientConfig = restclient.TLSClientConfig{} c, err := clientset.NewForConfig(config) if err != nil { return nil, nil, err } clients[i] = c internalClient, err := internalclientset.NewForConfig(config) if err != nil { return nil, nil, err } internalClients[i] = internalClient } return clients, internalClients, nil } func computePodCounts(total int) (int, int, int) { // Small RCs owns ~0.5 of total number of pods, medium and big RCs ~0.25 each. // For example for 3000 pods (100 nodes, 30 pods per node) there are: // - 300 small RCs each 5 pods // - 25 medium RCs each 30 pods // - 3 big RCs each 250 pods bigGroupCount := total / 4 / bigGroupSize total -= bigGroupCount * bigGroupSize mediumGroupCount := total / 3 / mediumGroupSize total -= mediumGroupCount * mediumGroupSize smallGroupCount := total / smallGroupSize return smallGroupCount, mediumGroupCount, bigGroupCount } func generateConfigs( totalPods int, image string, command []string, nss []*v1.Namespace, kind schema.GroupKind, secretsPerPod int, ) ([]testutils.RunObjectConfig, []*testutils.SecretConfig) { configs := make([]testutils.RunObjectConfig, 0) secretConfigs := make([]*testutils.SecretConfig, 0) smallGroupCount, mediumGroupCount, bigGroupCount := computePodCounts(totalPods) newConfigs, newSecretConfigs := generateConfigsForGroup(nss, smallGroupName, smallGroupSize, smallGroupCount, image, command, kind, secretsPerPod) configs = append(configs, newConfigs...) secretConfigs = append(secretConfigs, newSecretConfigs...) newConfigs, newSecretConfigs = generateConfigsForGroup(nss, mediumGroupName, mediumGroupSize, mediumGroupCount, image, command, kind, secretsPerPod) configs = append(configs, newConfigs...) secretConfigs = append(secretConfigs, newSecretConfigs...) newConfigs, newSecretConfigs = generateConfigsForGroup(nss, bigGroupName, bigGroupSize, bigGroupCount, image, command, kind, secretsPerPod) configs = append(configs, newConfigs...) secretConfigs = append(secretConfigs, newSecretConfigs...) // Create a number of clients to better simulate real usecase // where not everyone is using exactly the same client. rcsPerClient := 20 clients, internalClients, err := createClients((len(configs) + rcsPerClient - 1) / rcsPerClient) framework.ExpectNoError(err) for i := 0; i < len(configs); i++ { configs[i].SetClient(clients[i%len(clients)]) configs[i].SetInternalClient(internalClients[i%len(internalClients)]) } for i := 0; i < len(secretConfigs); i++ { secretConfigs[i].Client = clients[i%len(clients)] } return configs, secretConfigs } func generateConfigsForGroup( nss []*v1.Namespace, groupName string, size, count int, image string, command []string, kind schema.GroupKind, secretsPerPod int, ) ([]testutils.RunObjectConfig, []*testutils.SecretConfig) { configs := make([]testutils.RunObjectConfig, 0, count) secretConfigs := make([]*testutils.SecretConfig, 0, count*secretsPerPod) for i := 1; i <= count; i++ { namespace := nss[i%len(nss)].Name secretNames := make([]string, 0, secretsPerPod) for j := 0; j < secretsPerPod; j++ { secretName := fmt.Sprintf("%v-%v-secret-%v", groupName, i, j) secretConfigs = append(secretConfigs, &testutils.SecretConfig{ Content: map[string]string{"foo": "bar"}, Client: nil, // this will be overwritten later Name: secretName, Namespace: namespace, LogFunc: framework.Logf, }) secretNames = append(secretNames, secretName) } baseConfig := &testutils.RCConfig{ Client: nil, // this will be overwritten later InternalClient: nil, // this will be overwritten later Name: groupName + "-" + strconv.Itoa(i), Namespace: namespace, Timeout: 10 * time.Minute, Image: image, Command: command, Replicas: size, CpuRequest: 10, // 0.01 core MemRequest: 26214400, // 25MB SecretNames: secretNames, } var config testutils.RunObjectConfig switch kind { case api.Kind("ReplicationController"): config = baseConfig case extensions.Kind("ReplicaSet"): config = &testutils.ReplicaSetConfig{RCConfig: *baseConfig} case extensions.Kind("Deployment"): config = &testutils.DeploymentConfig{RCConfig: *baseConfig} case batch.Kind("Job"): config = &testutils.JobConfig{RCConfig: *baseConfig} default: framework.Failf("Unsupported kind for config creation: %v", kind) } configs = append(configs, config) } return configs, secretConfigs } func generateServicesForConfigs(configs []testutils.RunObjectConfig) []*v1.Service { services := make([]*v1.Service, 0, len(configs)) for _, config := range configs { serviceName := config.GetName() + "-svc" labels := map[string]string{"name": config.GetName()} service := &v1.Service{ ObjectMeta: v1.ObjectMeta{ Name: serviceName, Namespace: config.GetNamespace(), }, Spec: v1.ServiceSpec{ Selector: labels, Ports: []v1.ServicePort{{ Port: 80, TargetPort: intstr.FromInt(80), }}, }, } services = append(services, service) } return services } func sleepUpTo(d time.Duration) { time.Sleep(time.Duration(rand.Int63n(d.Nanoseconds()))) } func createAllResources(configs []testutils.RunObjectConfig, creatingTime time.Duration) { var wg sync.WaitGroup wg.Add(len(configs)) for _, config := range configs { go createResource(&wg, config, creatingTime) } wg.Wait() } func createResource(wg *sync.WaitGroup, config testutils.RunObjectConfig, creatingTime time.Duration) { defer GinkgoRecover() defer wg.Done() sleepUpTo(creatingTime) framework.ExpectNoError(config.Run(), fmt.Sprintf("creating %v %s", config.GetKind(), config.GetName())) } func scaleAllResources(configs []testutils.RunObjectConfig, scalingTime time.Duration) { var wg sync.WaitGroup wg.Add(len(configs)) for _, config := range configs { go scaleResource(&wg, config, scalingTime) } wg.Wait() } // Scales RC to a random size within [0.5*size, 1.5*size] and lists all the pods afterwards. // Scaling happens always based on original size, not the current size. func scaleResource(wg *sync.WaitGroup, config testutils.RunObjectConfig, scalingTime time.Duration) { defer GinkgoRecover() defer wg.Done() sleepUpTo(scalingTime) newSize := uint(rand.Intn(config.GetReplicas()) + config.GetReplicas()/2) framework.ExpectNoError(framework.ScaleResource( config.GetClient(), config.GetInternalClient(), config.GetNamespace(), config.GetName(), newSize, true, config.GetKind()), fmt.Sprintf("scaling rc %s for the first time", config.GetName())) selector := labels.SelectorFromSet(labels.Set(map[string]string{"name": config.GetName()})) options := v1.ListOptions{ LabelSelector: selector.String(), ResourceVersion: "0", } _, err := config.GetClient().Core().Pods(config.GetNamespace()).List(options) framework.ExpectNoError(err, fmt.Sprintf("listing pods from rc %v", config.GetName())) } func deleteAllResources(configs []testutils.RunObjectConfig, deletingTime time.Duration) { var wg sync.WaitGroup wg.Add(len(configs)) for _, config := range configs { go deleteResource(&wg, config, deletingTime) } wg.Wait() } func deleteResource(wg *sync.WaitGroup, config testutils.RunObjectConfig, deletingTime time.Duration) { defer GinkgoRecover() defer wg.Done() sleepUpTo(deletingTime) if framework.TestContext.GarbageCollectorEnabled && config.GetKind() != extensions.Kind("Deployment") { framework.ExpectNoError(framework.DeleteResourceAndWaitForGC( config.GetClient(), config.GetKind(), config.GetNamespace(), config.GetName()), fmt.Sprintf("deleting %v %s", config.GetKind(), config.GetName())) } else { framework.ExpectNoError(framework.DeleteResourceAndPods( config.GetClient(), config.GetInternalClient(), config.GetKind(), config.GetNamespace(), config.GetName()), fmt.Sprintf("deleting %v %s", config.GetKind(), config.GetName())) } } func CreateNamespaces(f *framework.Framework, namespaceCount int, namePrefix string) ([]*v1.Namespace, error) { namespaces := []*v1.Namespace{} for i := 1; i <= namespaceCount; i++ { namespace, err := f.CreateNamespace(fmt.Sprintf("%v-%d", namePrefix, i), nil) if err != nil { return []*v1.Namespace{}, err } namespaces = append(namespaces, namespace) } return namespaces, nil }