mirror of
https://github.com/arangodb/kube-arangodb.git
synced 2024-12-14 11:57:37 +00:00
Allow changing storage class of a server group
This commit is contained in:
parent
fefd3ba839
commit
44581c7764
19 changed files with 220 additions and 28 deletions
|
@ -1,10 +1,10 @@
|
|||
apiVersion: "storage.arangodb.com/v1alpha"
|
||||
kind: "ArangoLocalStorage"
|
||||
metadata:
|
||||
name: "arangodb-local-storage"
|
||||
name: "arangodb-new-local-storage"
|
||||
spec:
|
||||
storageClass:
|
||||
name: my-local-ssd
|
||||
name: my-new-local-ssd
|
||||
isDefault: true
|
||||
localPath:
|
||||
- /var/lib/arango-storage
|
||||
- /var/lib/arango-storage-new
|
||||
|
|
|
@ -51,6 +51,12 @@ const (
|
|||
ActionTypeRenewTLSCACertificate ActionType = "RenewTLSCACertificate"
|
||||
)
|
||||
|
||||
const (
|
||||
// MemberIDPreviousAction is used for Action.MemberID when the MemberID
|
||||
// should be derived from the previous action.
|
||||
MemberIDPreviousAction = "@previous"
|
||||
)
|
||||
|
||||
// Action represents a single action to be taken to update a deployment.
|
||||
type Action struct {
|
||||
// ID of this action (unique for every action)
|
||||
|
|
|
@ -191,9 +191,5 @@ func (s ServerGroupSpec) ResetImmutableFields(group ServerGroup, fieldPrefix str
|
|||
resetFields = append(resetFields, fieldPrefix+".count")
|
||||
}
|
||||
}
|
||||
if s.GetStorageClassName() != target.GetStorageClassName() {
|
||||
target.StorageClassName = util.NewStringOrNil(s.StorageClassName)
|
||||
resetFields = append(resetFields, fieldPrefix+".storageClassName")
|
||||
}
|
||||
return resetFields
|
||||
}
|
||||
|
|
|
@ -30,6 +30,7 @@ import (
|
|||
"github.com/arangodb/arangosync/tasks"
|
||||
driver "github.com/arangodb/go-driver"
|
||||
"github.com/arangodb/go-driver/agency"
|
||||
"github.com/rs/zerolog/log"
|
||||
"k8s.io/api/core/v1"
|
||||
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
|
||||
"k8s.io/client-go/kubernetes"
|
||||
|
@ -191,23 +192,23 @@ func (d *Deployment) GetSyncServerClient(ctx context.Context, group api.ServerGr
|
|||
|
||||
// CreateMember adds a new member to the given group.
|
||||
// If ID is non-empty, it will be used, otherwise a new ID is created.
|
||||
func (d *Deployment) CreateMember(group api.ServerGroup, id string) error {
|
||||
func (d *Deployment) CreateMember(group api.ServerGroup, id string) (string, error) {
|
||||
log := d.deps.Log
|
||||
status, lastVersion := d.GetStatus()
|
||||
id, err := createMember(log, &status, group, id, d.apiObject)
|
||||
if err != nil {
|
||||
log.Debug().Err(err).Str("group", group.AsRole()).Msg("Failed to create member")
|
||||
return maskAny(err)
|
||||
return "", maskAny(err)
|
||||
}
|
||||
// Save added member
|
||||
if err := d.UpdateStatus(status, lastVersion); err != nil {
|
||||
log.Debug().Err(err).Msg("Updating CR status failed")
|
||||
return maskAny(err)
|
||||
return "", maskAny(err)
|
||||
}
|
||||
// Create event about it
|
||||
d.CreateEvent(k8sutil.NewMemberAddEvent(id, group.AsRole(), d.apiObject))
|
||||
|
||||
return nil
|
||||
return id, nil
|
||||
}
|
||||
|
||||
// DeletePod deletes a pod with given name in the namespace
|
||||
|
@ -304,6 +305,16 @@ func (d *Deployment) GetOwnedPVCs() ([]v1.PersistentVolumeClaim, error) {
|
|||
return myPVCs, nil
|
||||
}
|
||||
|
||||
// GetPvc gets a PVC by the given name, in the samespace of the deployment.
|
||||
func (d *Deployment) GetPvc(pvcName string) (*v1.PersistentVolumeClaim, error) {
|
||||
pvc, err := d.deps.KubeCli.CoreV1().PersistentVolumeClaims(d.apiObject.GetNamespace()).Get(pvcName, metav1.GetOptions{})
|
||||
if err != nil {
|
||||
log.Debug().Err(err).Str("pvc-name", pvcName).Msg("Failed to get PVC")
|
||||
return nil, maskAny(err)
|
||||
}
|
||||
return pvc, nil
|
||||
}
|
||||
|
||||
// GetTLSKeyfile returns the keyfile encoded TLS certificate+key for
|
||||
// the given member.
|
||||
func (d *Deployment) GetTLSKeyfile(group api.ServerGroup, member api.MemberStatus) (string, error) {
|
||||
|
|
|
@ -38,4 +38,6 @@ type Action interface {
|
|||
CheckProgress(ctx context.Context) (bool, bool, error)
|
||||
// Timeout returns the amount of time after which this action will timeout.
|
||||
Timeout() time.Duration
|
||||
// Return the MemberID used / created in this action
|
||||
MemberID() string
|
||||
}
|
||||
|
|
|
@ -43,19 +43,22 @@ func NewAddMemberAction(log zerolog.Logger, action api.Action, actionCtx ActionC
|
|||
|
||||
// actionAddMember implements an AddMemberAction.
|
||||
type actionAddMember struct {
|
||||
log zerolog.Logger
|
||||
action api.Action
|
||||
actionCtx ActionContext
|
||||
log zerolog.Logger
|
||||
action api.Action
|
||||
actionCtx ActionContext
|
||||
newMemberID string
|
||||
}
|
||||
|
||||
// Start performs the start of the action.
|
||||
// Returns true if the action is completely finished, false in case
|
||||
// the start time needs to be recorded and a ready condition needs to be checked.
|
||||
func (a *actionAddMember) Start(ctx context.Context) (bool, error) {
|
||||
if err := a.actionCtx.CreateMember(a.action.Group, a.action.MemberID); err != nil {
|
||||
newID, err := a.actionCtx.CreateMember(a.action.Group, a.action.MemberID)
|
||||
if err != nil {
|
||||
log.Debug().Err(err).Msg("Failed to create member")
|
||||
return false, maskAny(err)
|
||||
}
|
||||
a.newMemberID = newID
|
||||
return true, nil
|
||||
}
|
||||
|
||||
|
@ -70,3 +73,8 @@ func (a *actionAddMember) CheckProgress(ctx context.Context) (bool, bool, error)
|
|||
func (a *actionAddMember) Timeout() time.Duration {
|
||||
return addMemberTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionAddMember) MemberID() string {
|
||||
return a.newMemberID
|
||||
}
|
||||
|
|
|
@ -155,3 +155,8 @@ func (a *actionCleanoutMember) CheckProgress(ctx context.Context) (bool, bool, e
|
|||
func (a *actionCleanoutMember) Timeout() time.Duration {
|
||||
return cleanoutMemberTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionCleanoutMember) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -59,7 +59,7 @@ type ActionContext interface {
|
|||
GetMemberStatusByID(id string) (api.MemberStatus, bool)
|
||||
// CreateMember adds a new member to the given group.
|
||||
// If ID is non-empty, it will be used, otherwise a new ID is created.
|
||||
CreateMember(group api.ServerGroup, id string) error
|
||||
CreateMember(group api.ServerGroup, id string) (string, error)
|
||||
// UpdateMember updates the deployment status wrt the given member.
|
||||
UpdateMember(member api.MemberStatus) error
|
||||
// RemoveMemberByID removes a member with given id.
|
||||
|
@ -157,11 +157,12 @@ func (ac *actionContext) GetMemberStatusByID(id string) (api.MemberStatus, bool)
|
|||
|
||||
// CreateMember adds a new member to the given group.
|
||||
// If ID is non-empty, it will be used, otherwise a new ID is created.
|
||||
func (ac *actionContext) CreateMember(group api.ServerGroup, id string) error {
|
||||
if err := ac.context.CreateMember(group, id); err != nil {
|
||||
return maskAny(err)
|
||||
func (ac *actionContext) CreateMember(group api.ServerGroup, id string) (string, error) {
|
||||
result, err := ac.context.CreateMember(group, id)
|
||||
if err != nil {
|
||||
return "", maskAny(err)
|
||||
}
|
||||
return nil
|
||||
return result, nil
|
||||
}
|
||||
|
||||
// UpdateMember updates the deployment status wrt the given member.
|
||||
|
|
|
@ -105,3 +105,8 @@ func (a *actionRemoveMember) CheckProgress(ctx context.Context) (bool, bool, err
|
|||
func (a *actionRemoveMember) Timeout() time.Duration {
|
||||
return removeMemberTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionRemoveMember) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -69,3 +69,8 @@ func (a *renewTLSCACertificateAction) CheckProgress(ctx context.Context) (bool,
|
|||
func (a *renewTLSCACertificateAction) Timeout() time.Duration {
|
||||
return renewTLSCACertificateTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *renewTLSCACertificateAction) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -75,3 +75,8 @@ func (a *renewTLSCertificateAction) CheckProgress(ctx context.Context) (bool, bo
|
|||
func (a *renewTLSCertificateAction) Timeout() time.Duration {
|
||||
return renewTLSCertificateTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *renewTLSCertificateAction) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -127,3 +127,8 @@ func (a *actionRotateMember) CheckProgress(ctx context.Context) (bool, bool, err
|
|||
func (a *actionRotateMember) Timeout() time.Duration {
|
||||
return rotateMemberTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionRotateMember) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -116,3 +116,8 @@ func (a *actionShutdownMember) CheckProgress(ctx context.Context) (bool, bool, e
|
|||
func (a *actionShutdownMember) Timeout() time.Duration {
|
||||
return shutdownMemberTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionShutdownMember) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -133,3 +133,8 @@ func (a *actionUpgradeMember) CheckProgress(ctx context.Context) (bool, bool, er
|
|||
func (a *actionUpgradeMember) Timeout() time.Duration {
|
||||
return upgradeMemberTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionUpgradeMember) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -170,3 +170,8 @@ func (a *actionWaitForMemberUp) checkProgressArangoSync(ctx context.Context) (bo
|
|||
func (a *actionWaitForMemberUp) Timeout() time.Duration {
|
||||
return waitForMemberUpTimeout
|
||||
}
|
||||
|
||||
// Return the MemberID used / created in this action
|
||||
func (a *actionWaitForMemberUp) MemberID() string {
|
||||
return a.action.MemberID
|
||||
}
|
||||
|
|
|
@ -62,7 +62,8 @@ type Context interface {
|
|||
CreateEvent(evt *v1.Event)
|
||||
// CreateMember adds a new member to the given group.
|
||||
// If ID is non-empty, it will be used, otherwise a new ID is created.
|
||||
CreateMember(group api.ServerGroup, id string) error
|
||||
// Returns ID, error
|
||||
CreateMember(group api.ServerGroup, id string) (string, error)
|
||||
// DeletePod deletes a pod with given name in the namespace
|
||||
// of the deployment. If the pod does not exist, the error is ignored.
|
||||
DeletePod(podName string) error
|
||||
|
@ -74,6 +75,8 @@ type Context interface {
|
|||
RemovePodFinalizers(podName string) error
|
||||
// GetOwnedPods returns a list of all pods owned by the deployment.
|
||||
GetOwnedPods() ([]v1.Pod, error)
|
||||
// GetPvc gets a PVC by the given name, in the samespace of the deployment.
|
||||
GetPvc(pvcName string) (*v1.PersistentVolumeClaim, error)
|
||||
// GetTLSKeyfile returns the keyfile encoded TLS certificate+key for
|
||||
// the given member.
|
||||
GetTLSKeyfile(group api.ServerGroup, member api.MemberStatus) (string, error)
|
||||
|
|
|
@ -54,7 +54,7 @@ func (d *Reconciler) CreatePlan() error {
|
|||
apiObject := d.context.GetAPIObject()
|
||||
spec := d.context.GetSpec()
|
||||
status, lastVersion := d.context.GetStatus()
|
||||
newPlan, changed := createPlan(d.log, apiObject, status.Plan, spec, status, pods, d.context.GetTLSKeyfile, d.context.GetTLSCA)
|
||||
newPlan, changed := createPlan(d.log, apiObject, status.Plan, spec, status, pods, d.context.GetTLSKeyfile, d.context.GetTLSCA, d.context.GetPvc)
|
||||
|
||||
// If not change, we're done
|
||||
if !changed {
|
||||
|
@ -80,7 +80,8 @@ func createPlan(log zerolog.Logger, apiObject metav1.Object,
|
|||
currentPlan api.Plan, spec api.DeploymentSpec,
|
||||
status api.DeploymentStatus, pods []v1.Pod,
|
||||
getTLSKeyfile func(group api.ServerGroup, member api.MemberStatus) (string, error),
|
||||
getTLSCA func(string) (string, string, bool, error)) (api.Plan, bool) {
|
||||
getTLSCA func(string) (string, string, bool, error),
|
||||
getPVC func(pvcName string) (*v1.PersistentVolumeClaim, error)) (api.Plan, bool) {
|
||||
if len(currentPlan) > 0 {
|
||||
// Plan already exists, complete that first
|
||||
return currentPlan, false
|
||||
|
@ -175,16 +176,21 @@ func createPlan(log zerolog.Logger, apiObject metav1.Object,
|
|||
})
|
||||
}
|
||||
|
||||
// Check for the need to rotate TLS CA certificate and all members
|
||||
if len(plan) == 0 {
|
||||
plan = createRotateTLSCAPlan(log, spec, status, getTLSCA)
|
||||
}
|
||||
|
||||
// Check for the need to rotate TLS certificate of a members
|
||||
if len(plan) == 0 {
|
||||
plan = createRotateTLSServerCertificatePlan(log, spec, status, getTLSKeyfile)
|
||||
}
|
||||
|
||||
// Check for changes storage classes or requirements
|
||||
if len(plan) == 0 {
|
||||
plan = createRotateServerStoragePlan(log, spec, status, getPVC)
|
||||
}
|
||||
|
||||
// Check for the need to rotate TLS CA certificate and all members
|
||||
if len(plan) == 0 {
|
||||
plan = createRotateTLSCAPlan(log, spec, status, getTLSCA)
|
||||
}
|
||||
|
||||
// Return plan
|
||||
return plan, true
|
||||
}
|
||||
|
|
111
pkg/deployment/reconcile/plan_builder_storage.go
Normal file
111
pkg/deployment/reconcile/plan_builder_storage.go
Normal file
|
@ -0,0 +1,111 @@
|
|||
//
|
||||
// DISCLAIMER
|
||||
//
|
||||
// Copyright 2018 ArangoDB GmbH, Cologne, Germany
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
//
|
||||
// Copyright holder is ArangoDB GmbH, Cologne, Germany
|
||||
//
|
||||
// Author Ewout Prangsma
|
||||
//
|
||||
|
||||
package reconcile
|
||||
|
||||
import (
|
||||
"github.com/rs/zerolog"
|
||||
"k8s.io/api/core/v1"
|
||||
|
||||
api "github.com/arangodb/kube-arangodb/pkg/apis/deployment/v1alpha"
|
||||
"github.com/arangodb/kube-arangodb/pkg/util"
|
||||
)
|
||||
|
||||
// createRotateServerStoragePlan creates plan to rotate a server and its volume because of a
|
||||
// different storage class or a difference in storage resource requirements.
|
||||
func createRotateServerStoragePlan(log zerolog.Logger, spec api.DeploymentSpec, status api.DeploymentStatus,
|
||||
getPVC func(pvcName string) (*v1.PersistentVolumeClaim, error)) api.Plan {
|
||||
if spec.GetMode() == api.DeploymentModeSingle {
|
||||
// Storage cannot be changed in single server deployments
|
||||
return nil
|
||||
}
|
||||
var plan api.Plan
|
||||
status.Members.ForeachServerGroup(func(group api.ServerGroup, members api.MemberStatusList) error {
|
||||
for _, m := range members {
|
||||
if len(plan) > 0 {
|
||||
// Only 1 change at a time
|
||||
continue
|
||||
}
|
||||
if m.Phase != api.MemberPhaseCreated {
|
||||
// Only make changes when phase is created
|
||||
continue
|
||||
}
|
||||
if m.PersistentVolumeClaimName == "" {
|
||||
// Plan is irrelevant without PVC
|
||||
continue
|
||||
}
|
||||
if group == api.ServerGroupSyncWorkers {
|
||||
// SyncWorkers have no externally created TLS keyfile
|
||||
continue
|
||||
}
|
||||
groupSpec := spec.GetServerGroupSpec(group)
|
||||
storageClassName := groupSpec.GetStorageClassName()
|
||||
if storageClassName == "" {
|
||||
// Using default storage class name
|
||||
continue
|
||||
}
|
||||
// Load PVC
|
||||
pvc, err := getPVC(m.PersistentVolumeClaimName)
|
||||
if err != nil {
|
||||
log.Warn().Err(err).
|
||||
Str("role", group.AsRole()).
|
||||
Str("id", m.ID).
|
||||
Msg("Failed to get PVC")
|
||||
continue
|
||||
}
|
||||
replacementNeeded := false
|
||||
if util.StringOrDefault(pvc.Spec.StorageClassName) != storageClassName {
|
||||
// Storageclass has changed
|
||||
replacementNeeded = true
|
||||
}
|
||||
if replacementNeeded {
|
||||
if group != api.ServerGroupAgents {
|
||||
plan = append(plan,
|
||||
// Scale up, so we're sure that a new member is available
|
||||
api.NewAction(api.ActionTypeAddMember, group, ""),
|
||||
api.NewAction(api.ActionTypeWaitForMemberUp, group, api.MemberIDPreviousAction),
|
||||
)
|
||||
}
|
||||
if group == api.ServerGroupDBServers {
|
||||
plan = append(plan,
|
||||
// Cleanout
|
||||
api.NewAction(api.ActionTypeCleanOutMember, group, m.ID),
|
||||
)
|
||||
}
|
||||
plan = append(plan,
|
||||
// Shutdown & remove the server
|
||||
api.NewAction(api.ActionTypeShutdownMember, group, m.ID),
|
||||
api.NewAction(api.ActionTypeRemoveMember, group, m.ID),
|
||||
)
|
||||
if group == api.ServerGroupAgents {
|
||||
plan = append(plan,
|
||||
// Scale up, so we're adding the remove agent
|
||||
api.NewAction(api.ActionTypeAddMember, group, ""),
|
||||
api.NewAction(api.ActionTypeWaitForMemberUp, group, api.MemberIDPreviousAction),
|
||||
)
|
||||
}
|
||||
}
|
||||
}
|
||||
return nil
|
||||
})
|
||||
return plan
|
||||
}
|
|
@ -76,6 +76,10 @@ func (d *Reconciler) ExecutePlan(ctx context.Context) (bool, error) {
|
|||
if ready {
|
||||
// Remove action from list
|
||||
status.Plan = status.Plan[1:]
|
||||
if len(status.Plan) > 0 && status.Plan[0].MemberID == api.MemberIDPreviousAction {
|
||||
// Fill in MemberID from previous action
|
||||
status.Plan[0].MemberID = action.MemberID()
|
||||
}
|
||||
} else {
|
||||
// Mark start time
|
||||
now := metav1.Now()
|
||||
|
@ -105,6 +109,10 @@ func (d *Reconciler) ExecutePlan(ctx context.Context) (bool, error) {
|
|||
status, lastVersion := d.context.GetStatus()
|
||||
// Remove action from list
|
||||
status.Plan = status.Plan[1:]
|
||||
if len(status.Plan) > 0 && status.Plan[0].MemberID == api.MemberIDPreviousAction {
|
||||
// Fill in MemberID from previous action
|
||||
status.Plan[0].MemberID = action.MemberID()
|
||||
}
|
||||
// Save plan update
|
||||
if err := d.context.UpdateStatus(status, lastVersion); err != nil {
|
||||
log.Debug().Err(err).Msg("Failed to update CR status")
|
||||
|
|
Loading…
Reference in a new issue