Skip to content

Commit

Permalink
Merge pull request #7120 from comtalyst/comtalyst/azure-managed-insta…
Browse files Browse the repository at this point in the history
…nce-cache-1.27

refactor: upstream Azure managed instance cache refactor for 1.27
  • Loading branch information
k8s-ci-robot committed Aug 9, 2024
2 parents 48071c1 + fd6bd58 commit aa1d438
Show file tree
Hide file tree
Showing 9 changed files with 1,171 additions and 420 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ func newTestAzureManager(t *testing.T) *AzureManager {
ctrl := gomock.NewController(t)
defer ctrl.Finish()

expectedScaleSets := newTestVMSSList(3, testASG, "eastus", compute.Uniform)
expectedScaleSets := newTestVMSSList(3, testASG, compute.Uniform)

expectedVMSSVMs := newTestVMSSVMList(3)
mockVMSSClient := mockvmssclient.NewMockInterface(ctrl)
Expand Down Expand Up @@ -128,7 +128,7 @@ func TestNodeGroupForNode(t *testing.T) {
expectedVMs := newTestVMList(3)

for _, orchMode := range orchestrationModes {
expectedScaleSets := newTestVMSSList(3, testASG, "eastus", orchMode)
expectedScaleSets := newTestVMSSList(3, testASG, orchMode)
provider := newTestProvider(t)
mockVMSSClient := mockvmssclient.NewMockInterface(ctrl)
mockVMSSClient.EXPECT().List(gomock.Any(), provider.azureManager.config.ResourceGroup).Return(expectedScaleSets, nil)
Expand All @@ -154,7 +154,7 @@ func TestNodeGroupForNode(t *testing.T) {
assert.True(t, registered)
assert.Equal(t, len(provider.NodeGroups()), 1)

node := newApiNode(orchMode, 0)
node := newAPINode(orchMode, 0)
// refresh cache
err := provider.azureManager.forceRefresh()
assert.NoError(t, err)
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,90 @@
/*
Copyright 2022 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package azure

import (
"context"
"strings"

"github.com/Azure/azure-sdk-for-go/services/compute/mgmt/2022-03-01/compute" //nolint SA1019 - deprecated package
"github.com/Azure/go-autorest/autorest/azure"

"k8s.io/klog/v2"
"sigs.k8s.io/cloud-provider-azure/pkg/retry"
)

// When Azure Dedicated Host is enabled or using isolated vm skus, force deleting a VMSS fails with the following error:
//
// "predominantErrorDetail": {
// "innererror": {
// "internalErrorCode": "OperationNotAllowedOnResourceThatManagesUpdatesWithMaintenanceControl"
// },
// "code": "OperationNotAllowed",
// "message": "Operation 'ForceDelete' is not allowed on resource 'aks-newnp-11436513-vmss' since it
// manages updates using maintenance control."
// },
//
// A programmatically way to determine if a VM size is isolated or not has not been found. The isolated VM documentation:
// https://docs.microsoft.com/en-us/azure/virtual-machines/isolation
// has the current list of isolated VM sizes, but new isolated VM size could be introduced in the future.
//
// As a result of not being able to find out if a VM size is isolated or not, we'll do the following:
// - if scaleSet has isolated vm size or dedicated host, disable forDelete
// - else use forceDelete
// - if new isolated sku were added or dedicatedHost was not updated properly, this forceDelete call will fail with above error.
// In that case, call normal delete (fall-back)

var isolatedVMSizes = map[string]bool{
strings.ToLower("Standard_E80ids_v4"): true,
strings.ToLower("Standard_E80is_v4"): true,
strings.ToLower("Standard_E104i_v5"): true,
strings.ToLower("Standard_E104is_v5"): true,
strings.ToLower("Standard_E104id_v5"): true,
strings.ToLower("Standard_E104ids_v5"): true,
strings.ToLower("Standard_M192is_v2"): true,
strings.ToLower("Standard_M192ims_v2"): true,
strings.ToLower("Standard_M192ids_v2"): true,
strings.ToLower("Standard_M192idms_v2"): true,
strings.ToLower("Standard_F72s_v2"): true,
strings.ToLower("Standard_M128ms"): true,
}

func (scaleSet *ScaleSet) deleteInstances(ctx context.Context, requiredIds *compute.VirtualMachineScaleSetVMInstanceRequiredIDs,
commonAsgID string) (*azure.Future, *retry.Error) {
scaleSet.instanceMutex.Lock()
defer scaleSet.instanceMutex.Unlock()

skuName := scaleSet.getSKU()
resourceGroup := scaleSet.manager.config.ResourceGroup
forceDelete := shouldForceDelete(skuName, scaleSet)
future, rerr := scaleSet.manager.azClient.virtualMachineScaleSetsClient.DeleteInstancesAsync(ctx, resourceGroup,
commonAsgID, *requiredIds, forceDelete)
if forceDelete && isOperationNotAllowed(rerr) {
klog.Infof("falling back to normal delete for instances %v for %s", requiredIds.InstanceIds, scaleSet.Name)
return scaleSet.manager.azClient.virtualMachineScaleSetsClient.DeleteInstancesAsync(ctx, resourceGroup,
commonAsgID, *requiredIds, false)
}
return future, rerr
}

func shouldForceDelete(skuName string, scaleSet *ScaleSet) bool {
return scaleSet.enableForceDelete && !isolatedVMSizes[strings.ToLower(skuName)] && !scaleSet.dedicatedHost
}

func isOperationNotAllowed(rerr *retry.Error) bool {
return rerr != nil && rerr.ServiceErrorCode() == retry.OperationNotAllowed
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
/*
Copyright 2022 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/

package azure

import (
"net/http"
"testing"

"github.com/Azure/go-autorest/autorest/azure"
"github.com/stretchr/testify/assert"
"sigs.k8s.io/cloud-provider-azure/pkg/retry"
)

func TestShouldForceDelete(t *testing.T) {
skuName := "test-vmssSku"

t.Run("should return true", func(t *testing.T) {
scaleSet := &ScaleSet{}
scaleSet.enableForceDelete = true
assert.Equal(t, shouldForceDelete(skuName, scaleSet), true)
})

t.Run("should return false because of dedicated hosts", func(t *testing.T) {
scaleSet := &ScaleSet{}
scaleSet.enableForceDelete = true
scaleSet.dedicatedHost = true
assert.Equal(t, shouldForceDelete(skuName, scaleSet), false)
})

t.Run("should return false because of isolated sku", func(t *testing.T) {
scaleSet := &ScaleSet{}
scaleSet.enableForceDelete = true
skuName = "Standard_F72s_v2" // belongs to the map isolatedVMSizes
assert.Equal(t, shouldForceDelete(skuName, scaleSet), false)
})
}

func TestIsOperationNotAllowed(t *testing.T) {
t.Run("should return false because it's not OperationNotAllowed error", func(t *testing.T) {
err := &retry.Error{
HTTPStatusCode: http.StatusBadRequest,
}
assert.Equal(t, isOperationNotAllowed(err), false)
})

t.Run("should return false because error is nil", func(t *testing.T) {
assert.Equal(t, isOperationNotAllowed(nil), false)
})

t.Run("should return true if error is OperationNotAllowed", func(t *testing.T) {
sre := &azure.ServiceError{
Code: retry.OperationNotAllowed,
Message: "error-message",
}
err := &retry.Error{
RawError: sre,
}
assert.Equal(t, isOperationNotAllowed(err), false)
})

// It is difficult to condition the case where return error matched expected error string for forceDelete and the
// function should return true.
}
15 changes: 8 additions & 7 deletions cluster-autoscaler/cloudprovider/azure/azure_manager_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -537,7 +537,7 @@ func TestFetchExplicitNodeGroups(t *testing.T) {

for _, orchMode := range orchestrationModes {
manager := newTestAzureManager(t)
expectedScaleSets := newTestVMSSList(3, testASG, "eastus", compute.Uniform)
expectedScaleSets := newTestVMSSList(3, testASG, compute.Uniform)

mockVMSSClient := mockvmssclient.NewMockInterface(ctrl)
mockVMSSClient.EXPECT().List(gomock.Any(), manager.config.ResourceGroup).Return(expectedScaleSets, nil).AnyTimes()
Expand Down Expand Up @@ -634,12 +634,13 @@ func TestGetFilteredAutoscalingGroupsVmss(t *testing.T) {
azureRef: azureRef{
Name: vmssName,
},
minSize: minVal,
maxSize: maxVal,
manager: manager,
curSize: 3,
sizeRefreshPeriod: manager.azureCache.refreshInterval,
instancesRefreshPeriod: defaultVmssInstancesRefreshPeriod,
minSize: minVal,
maxSize: maxVal,
manager: manager,
curSize: 3,
sizeRefreshPeriod: manager.azureCache.refreshInterval,
getVmssSizeRefreshPeriod: manager.azureCache.refreshInterval,
InstanceCache: InstanceCache{instancesRefreshPeriod: defaultVmssInstancesRefreshPeriod},
}}
assert.True(t, assert.ObjectsAreEqualValues(expectedAsgs, asgs), "expected %#v, but found: %#v", expectedAsgs, asgs)
}
Expand Down
Loading

0 comments on commit aa1d438

Please sign in to comment.