// TODO: Consider setting default as a fixed fraction of machine capacity (take "capacity api.ResourceList" // as an additional argument here) rather than using constants func getNonzeroLimits(limits *api.ResourceList) (int64, int64) { var out_millicpu, out_memory int64 // Override if un-set, but not if explicitly set to zero if (*limits.Cpu() == resource.Quantity{}) { out_millicpu = defaultMilliCpuLimit } else { out_millicpu = limits.Cpu().MilliValue() } // Override if un-set, but not if explicitly set to zero if (*limits.Memory() == resource.Quantity{}) { out_memory = defaultMemoryLimit } else { out_memory = limits.Memory().Value() } return out_millicpu, out_memory }
func CheckPodsExceedingCapacity(pods []*api.Pod, capacity api.ResourceList) (fitting []*api.Pod, notFitting []*api.Pod) { totalMilliCPU := capacity.Cpu().MilliValue() totalMemory := capacity.Memory().Value() milliCPURequested := int64(0) memoryRequested := int64(0) for _, pod := range pods { podRequest := getResourceRequest(pod) fitsCPU := totalMilliCPU == 0 || (totalMilliCPU-milliCPURequested) >= podRequest.milliCPU fitsMemory := totalMemory == 0 || (totalMemory-memoryRequested) >= podRequest.memory if !fitsCPU || !fitsMemory { // the pod doesn't fit notFitting = append(notFitting, pod) continue } // the pod fits milliCPURequested += podRequest.milliCPU memoryRequested += podRequest.memory fitting = append(fitting, pod) } return }
// TODO(vmarmol): Add limits to the system containers. // Takes the absolute name of the specified containers. // Empty container name disables use of the specified container. func newContainerManager(cadvisorInterface cadvisor.Interface, dockerDaemonContainerName, systemContainerName, kubeletContainerName string) (containerManager, error) { systemContainers := []*systemContainer{} if dockerDaemonContainerName != "" { cont := newSystemContainer(dockerDaemonContainerName) info, err := cadvisorInterface.MachineInfo() var capacity = api.ResourceList{} if err != nil { } else { capacity = CapacityFromMachineInfo(info) } memoryLimit := (int64(capacity.Memory().Value() * DockerMemoryLimitThresholdPercent / 100)) if memoryLimit < MinDockerMemoryLimit { glog.Warningf("Memory limit %d for container %s is too small, reset it to %d", memoryLimit, dockerDaemonContainerName, MinDockerMemoryLimit) memoryLimit = MinDockerMemoryLimit } glog.V(2).Infof("Configure resource-only container %s with memory limit: %d", dockerDaemonContainerName, memoryLimit) dockerContainer := &fs.Manager{ Cgroups: &configs.Cgroup{ Name: dockerDaemonContainerName, Memory: memoryLimit, MemorySwap: -1, AllowAllDevices: true, }, } cont.ensureStateFunc = func(manager *fs.Manager) error { return ensureDockerInContainer(cadvisorInterface, -900, dockerContainer) } systemContainers = append(systemContainers, cont) } if systemContainerName != "" { if systemContainerName == "/" { return nil, fmt.Errorf("system container cannot be root (\"/\")") } rootContainer := &fs.Manager{ Cgroups: &configs.Cgroup{ Name: "/", }, } manager := createManager(systemContainerName) err := ensureSystemContainer(rootContainer, manager) if err != nil { return nil, err } systemContainers = append(systemContainers, newSystemContainer(systemContainerName)) } if kubeletContainerName != "" { systemContainers = append(systemContainers, newSystemContainer(kubeletContainerName)) } // TODO(vmarmol): Add Kube-proxy container. return &containerManagerImpl{ systemContainers: systemContainers, }, nil }