Skip to content

Commit

Permalink
client: allow incomplete allocrunners to be removed on restore (#16638)
Browse files Browse the repository at this point in the history
If an allocrunner is persisted to the client state but the client stops before
task runner can start, we end up with an allocation in the database with
allocrunner state but no taskrunner state. This ends up mimicking an old
pre-0.9.5 state where this state was not recorded and that hits a backwards
compatibility shim. This leaves allocations in the client state that can never
be restored, but won't ever be removed either.

Update the backwards compatibility shim so that we fail the restore for the
allocrunner and remove the allocation from the client state. Taskrunners persist
state during graceful shutdown, so it shouldn't be possible to leak tasks that
have actually started. This lets us "start over" with the allocation, if the
server still wants to place it on the client.
  • Loading branch information
tgross committed Dec 7, 2023
1 parent 17e6372 commit 27bd931
Show file tree
Hide file tree
Showing 2 changed files with 24 additions and 27 deletions.
3 changes: 3 additions & 0 deletions .changelog/16638.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:bug
client: remove incomplete allocation entries from client state database during client restarts
```
48 changes: 21 additions & 27 deletions client/client.go
Original file line number Diff line number Diff line change
Expand Up @@ -1160,43 +1160,35 @@ func (c *Client) restoreState() error {
return nil
}

//XXX REMOVED! make a note in backward compat / upgrading doc
// COMPAT: Remove in 0.7.0
// 0.6.0 transitioned from individual state files to a single bolt-db.
// The upgrade path is to:
// Check if old state exists
// If so, restore from that and delete old state
// Restore using state database

// Restore allocations
allocs, allocErrs, err := c.stateDB.GetAllAllocations()
if err != nil {
return err
}

for allocID, err := range allocErrs {
// The boltdb values don't exist or didn't decode correctly. The state
// store is corrupt or there was a backwards incompatibility. Either way
// log it so we can debug it with operator client-state command.
c.logger.Error("error restoring alloc", "error", err, "alloc_id", allocID)
//TODO Cleanup
// Try to clean up alloc dir
// Remove boltdb entries?
// Send to server with clientstatus=failed
}

// Load each alloc back
for _, alloc := range allocs {

// COMPAT(0.12): remove once upgrading from 0.9.5 is no longer supported
// See hasLocalState for details. Skipping suspicious allocs
// now. If allocs should be run, they will be started when the client
// gets allocs from servers.
// If the alloc has no task state, we most likely stopped the client
// after the allocrunner was created but before tasks could
// start. Remove the client state so that we can start over with this
// alloc if the server still wants to place it here.
if !c.hasLocalState(alloc) {
c.logger.Warn("found an alloc without any local state, skipping restore", "alloc_id", alloc.ID)
c.logger.Warn(
"found an alloc without any local state, deleting from client state db",
"alloc_id", alloc.ID)
c.stateDB.DeleteAllocationBucket(alloc.ID, state.WithBatchMode())
continue
}

//XXX On Restore we give up on watching previous allocs because
// we need the local AllocRunners initialized first. We could
// add a second loop to initialize just the alloc watcher.
// On Restore we give up on watching previous allocs because we need the
// local AllocRunners initialized first.
prevAllocWatcher := allocwatcher.NoopPrevAlloc{}
prevAllocMigrator := allocwatcher.NoopPrevAlloc{}

Expand Down Expand Up @@ -1269,11 +1261,15 @@ func (c *Client) restoreState() error {
}

// hasLocalState returns true if we have any other associated state
// with alloc beyond the task itself
// with alloc beyond the task itself. We want to detect two possible scenarios:
//
// Useful for detecting if a potentially completed alloc got resurrected
// after AR was destroyed. In such cases, re-running the alloc lead to
// unexpected reruns and may lead to process and task exhaustion on node.
// 1. A potentially completed alloc got resurrected after AR was destroyed. In
// such cases, re-running the alloc leads to unexpected reruns and may lead
// to process and task exhaustion on node.
//
// 2. The client stopped after the allocrunner was persisted to disk but before
// tasks started. In this case, we don't restart the AR and instead wait until
// we get the desired state from the server.
//
// The heuristic used here is an alloc is suspect if we see no other information
// and no other task/status info is found.
Expand All @@ -1285,8 +1281,6 @@ func (c *Client) restoreState() error {
// See:
// - https://github.com/hashicorp/nomad/pull/6207
// - https://github.com/hashicorp/nomad/issues/5984
//
// COMPAT(0.12): remove once upgrading from 0.9.5 is no longer supported
func (c *Client) hasLocalState(alloc *structs.Allocation) bool {
tg := alloc.Job.LookupTaskGroup(alloc.TaskGroup)
if tg == nil {
Expand Down

0 comments on commit 27bd931

Please sign in to comment.