YARN-5849. Automatically create YARN control group for pre-mounted cgroups (Contributed by Miklos Szegedi via Daniel Templeton)

(cherry picked from commit 0fffebe51a91023c4949ab560f5c828f1b568072)
This commit is contained in:
Daniel Templeton 2017-01-11 14:48:52 -08:00
parent b089e122b1
commit 718ae2d477
13 changed files with 334 additions and 79 deletions

View File

@ -1424,9 +1424,11 @@
<property> <property>
<description>The cgroups hierarchy under which to place YARN proccesses (cannot contain commas). <description>The cgroups hierarchy under which to place YARN proccesses (cannot contain commas).
If yarn.nodemanager.linux-container-executor.cgroups.mount is false (that is, if cgroups have If yarn.nodemanager.linux-container-executor.cgroups.mount is false
been pre-configured), then this cgroups hierarchy must already exist and be writable by the (that is, if cgroups have been pre-configured) and the Yarn user has write
NodeManager user, otherwise the NodeManager may fail. access to the parent directory, then the directory will be created.
If the directory already exists, the administrator has to give Yarn
write permissions to it recursively.
Only used when the LCE resources handler is set to the CgroupsLCEResourcesHandler.</description> Only used when the LCE resources handler is set to the CgroupsLCEResourcesHandler.</description>
<name>yarn.nodemanager.linux-container-executor.cgroups.hierarchy</name> <name>yarn.nodemanager.linux-container-executor.cgroups.hierarchy</name>
<value>/hadoop-yarn</value> <value>/hadoop-yarn</value>

View File

@ -120,7 +120,7 @@ public class CGroupsBlkioResourceHandlerImpl implements DiskResourceHandler {
// if bootstrap is called on this class, disk is already enabled // if bootstrap is called on this class, disk is already enabled
// so no need to check again // so no need to check again
this.cGroupsHandler this.cGroupsHandler
.mountCGroupController(CGroupsHandler.CGroupController.BLKIO); .initializeCGroupController(CGroupsHandler.CGroupController.BLKIO);
return null; return null;
} }

View File

@ -91,7 +91,7 @@ public class CGroupsCpuResourceHandlerImpl implements CpuResourceHandler {
this.strictResourceUsageMode = conf.getBoolean( this.strictResourceUsageMode = conf.getBoolean(
YarnConfiguration.NM_LINUX_CONTAINER_CGROUPS_STRICT_RESOURCE_USAGE, YarnConfiguration.NM_LINUX_CONTAINER_CGROUPS_STRICT_RESOURCE_USAGE,
YarnConfiguration.DEFAULT_NM_LINUX_CONTAINER_CGROUPS_STRICT_RESOURCE_USAGE); YarnConfiguration.DEFAULT_NM_LINUX_CONTAINER_CGROUPS_STRICT_RESOURCE_USAGE);
this.cGroupsHandler.mountCGroupController(CPU); this.cGroupsHandler.initializeCGroupController(CPU);
nodeVCores = NodeManagerHardwareUtils.getVCores(plugin, conf); nodeVCores = NodeManagerHardwareUtils.getVCores(plugin, conf);
// cap overall usage to the number of cores allocated to YARN // cap overall usage to the number of cores allocated to YARN

View File

@ -32,7 +32,10 @@ import org.apache.hadoop.classification.InterfaceStability;
@InterfaceStability.Unstable @InterfaceStability.Unstable
public interface CGroupsHandler { public interface CGroupsHandler {
public enum CGroupController { /**
* List of supported cgroup subsystem types.
*/
enum CGroupController {
CPU("cpu"), CPU("cpu"),
NET_CLS("net_cls"), NET_CLS("net_cls"),
BLKIO("blkio"), BLKIO("blkio"),
@ -49,9 +52,9 @@ public interface CGroupsHandler {
} }
} }
public static final String CGROUP_FILE_TASKS = "tasks"; String CGROUP_FILE_TASKS = "tasks";
public static final String CGROUP_PARAM_CLASSID = "classid"; String CGROUP_PARAM_CLASSID = "classid";
public static final String CGROUP_PARAM_BLKIO_WEIGHT = "weight"; String CGROUP_PARAM_BLKIO_WEIGHT = "weight";
String CGROUP_PARAM_MEMORY_HARD_LIMIT_BYTES = "limit_in_bytes"; String CGROUP_PARAM_MEMORY_HARD_LIMIT_BYTES = "limit_in_bytes";
String CGROUP_PARAM_MEMORY_SOFT_LIMIT_BYTES = "soft_limit_in_bytes"; String CGROUP_PARAM_MEMORY_SOFT_LIMIT_BYTES = "soft_limit_in_bytes";
@ -63,30 +66,31 @@ public interface CGroupsHandler {
String CGROUP_CPU_SHARES = "shares"; String CGROUP_CPU_SHARES = "shares";
/** /**
* Mounts a cgroup controller * Mounts or initializes a cgroup controller.
* @param controller - the controller being mounted * @param controller - the controller being initialized
* @throws ResourceHandlerException * @throws ResourceHandlerException the initialization failed due to the
* environment
*/ */
public void mountCGroupController(CGroupController controller) void initializeCGroupController(CGroupController controller)
throws ResourceHandlerException; throws ResourceHandlerException;
/** /**
* Creates a cgroup for a given controller * Creates a cgroup for a given controller.
* @param controller - controller type for which the cgroup is being created * @param controller - controller type for which the cgroup is being created
* @param cGroupId - id of the cgroup being created * @param cGroupId - id of the cgroup being created
* @return full path to created cgroup * @return full path to created cgroup
* @throws ResourceHandlerException * @throws ResourceHandlerException creation failed
*/ */
public String createCGroup(CGroupController controller, String cGroupId) String createCGroup(CGroupController controller, String cGroupId)
throws ResourceHandlerException; throws ResourceHandlerException;
/** /**
* Deletes the specified cgroup * Deletes the specified cgroup.
* @param controller - controller type for the cgroup * @param controller - controller type for the cgroup
* @param cGroupId - id of the cgroup being deleted * @param cGroupId - id of the cgroup being deleted
* @throws ResourceHandlerException * @throws ResourceHandlerException deletion failed
*/ */
public void deleteCGroup(CGroupController controller, String cGroupId) throws void deleteCGroup(CGroupController controller, String cGroupId) throws
ResourceHandlerException; ResourceHandlerException;
/** /**
@ -95,59 +99,59 @@ public interface CGroupsHandler {
* @param cGroupId - id of the cgroup * @param cGroupId - id of the cgroup
* @return path for the cgroup relative to the root of (any) controller. * @return path for the cgroup relative to the root of (any) controller.
*/ */
public String getRelativePathForCGroup(String cGroupId); String getRelativePathForCGroup(String cGroupId);
/** /**
* Gets the full path for the cgroup, given a controller and a cgroup id * Gets the full path for the cgroup, given a controller and a cgroup id.
* @param controller - controller type for the cgroup * @param controller - controller type for the cgroup
* @param cGroupId - id of the cgroup * @param cGroupId - id of the cgroup
* @return full path for the cgroup * @return full path for the cgroup
*/ */
public String getPathForCGroup(CGroupController controller, String String getPathForCGroup(CGroupController controller, String
cGroupId); cGroupId);
/** /**
* Gets the full path for the cgroup's tasks file, given a controller and a * Gets the full path for the cgroup's tasks file, given a controller and a
* cgroup id * cgroup id.
* @param controller - controller type for the cgroup * @param controller - controller type for the cgroup
* @param cGroupId - id of the cgroup * @param cGroupId - id of the cgroup
* @return full path for the cgroup's tasks file * @return full path for the cgroup's tasks file
*/ */
public String getPathForCGroupTasks(CGroupController controller, String String getPathForCGroupTasks(CGroupController controller, String
cGroupId); cGroupId);
/** /**
* Gets the full path for a cgroup parameter, given a controller, * Gets the full path for a cgroup parameter, given a controller,
* cgroup id and parameter name * cgroup id and parameter name.
* @param controller - controller type for the cgroup * @param controller - controller type for the cgroup
* @param cGroupId - id of the cgroup * @param cGroupId - id of the cgroup
* @param param - cgroup parameter ( e.g classid ) * @param param - cgroup parameter ( e.g classid )
* @return full path for the cgroup parameter * @return full path for the cgroup parameter
*/ */
public String getPathForCGroupParam(CGroupController controller, String String getPathForCGroupParam(CGroupController controller, String
cGroupId, String param); cGroupId, String param);
/** /**
* updates a cgroup parameter, given a controller, cgroup id, parameter name * updates a cgroup parameter, given a controller, cgroup id, parameter name.
* and a parameter value * and a parameter value
* @param controller - controller type for the cgroup * @param controller - controller type for the cgroup
* @param cGroupId - id of the cgroup * @param cGroupId - id of the cgroup
* @param param - cgroup parameter ( e.g classid ) * @param param - cgroup parameter ( e.g classid )
* @param value - value to be written to the parameter file * @param value - value to be written to the parameter file
* @throws ResourceHandlerException * @throws ResourceHandlerException the operation failed
*/ */
public void updateCGroupParam(CGroupController controller, String cGroupId, void updateCGroupParam(CGroupController controller, String cGroupId,
String param, String value) throws ResourceHandlerException; String param, String value) throws ResourceHandlerException;
/** /**
* reads a cgroup parameter value, given a controller, cgroup id, parameter * reads a cgroup parameter value, given a controller, cgroup id, parameter.
* name * name
* @param controller - controller type for the cgroup * @param controller - controller type for the cgroup
* @param cGroupId - id of the cgroup * @param cGroupId - id of the cgroup
* @param param - cgroup parameter ( e.g classid ) * @param param - cgroup parameter ( e.g classid )
* @return parameter value as read from the parameter file * @return parameter value as read from the parameter file
* @throws ResourceHandlerException * @throws ResourceHandlerException the operation failed
*/ */
public String getCGroupParam(CGroupController controller, String cGroupId, String getCGroupParam(CGroupController controller, String cGroupId,
String param) throws ResourceHandlerException; String param) throws ResourceHandlerException;
} }

View File

@ -39,7 +39,6 @@ import java.io.*;
import java.nio.file.Files; import java.nio.file.Files;
import java.nio.file.Paths; import java.nio.file.Paths;
import java.util.Arrays; import java.util.Arrays;
import java.util.Collections;
import java.util.HashMap; import java.util.HashMap;
import java.util.List; import java.util.List;
import java.util.Map; import java.util.Map;
@ -60,6 +59,7 @@ class CGroupsHandlerImpl implements CGroupsHandler {
private static final String MTAB_FILE = "/proc/mounts"; private static final String MTAB_FILE = "/proc/mounts";
private static final String CGROUPS_FSTYPE = "cgroup"; private static final String CGROUPS_FSTYPE = "cgroup";
private String mtabFile;
private final String cGroupPrefix; private final String cGroupPrefix;
private final boolean enableCGroupMount; private final boolean enableCGroupMount;
private final String cGroupMountPath; private final String cGroupMountPath;
@ -70,8 +70,17 @@ class CGroupsHandlerImpl implements CGroupsHandler {
private final PrivilegedOperationExecutor privilegedOperationExecutor; private final PrivilegedOperationExecutor privilegedOperationExecutor;
private final Clock clock; private final Clock clock;
/**
* Create cgroup handler object.
* @param conf configuration
* @param privilegedOperationExecutor provides mechanisms to execute
* PrivilegedContainerOperations
* @param mtab mount file location
* @throws ResourceHandlerException if initialization failed
*/
public CGroupsHandlerImpl(Configuration conf, PrivilegedOperationExecutor public CGroupsHandlerImpl(Configuration conf, PrivilegedOperationExecutor
privilegedOperationExecutor) throws ResourceHandlerException { privilegedOperationExecutor, String mtab)
throws ResourceHandlerException {
this.cGroupPrefix = conf.get(YarnConfiguration. this.cGroupPrefix = conf.get(YarnConfiguration.
NM_LINUX_CONTAINER_CGROUPS_HIERARCHY, "/hadoop-yarn") NM_LINUX_CONTAINER_CGROUPS_HIERARCHY, "/hadoop-yarn")
.replaceAll("^/", "").replaceAll("$/", ""); .replaceAll("^/", "").replaceAll("$/", "");
@ -89,10 +98,22 @@ class CGroupsHandlerImpl implements CGroupsHandler {
this.rwLock = new ReentrantReadWriteLock(); this.rwLock = new ReentrantReadWriteLock();
this.privilegedOperationExecutor = privilegedOperationExecutor; this.privilegedOperationExecutor = privilegedOperationExecutor;
this.clock = SystemClock.getInstance(); this.clock = SystemClock.getInstance();
mtabFile = mtab;
init(); init();
} }
/**
* Create cgroup handler object.
* @param conf configuration
* @param privilegedOperationExecutor provides mechanisms to execute
* PrivilegedContainerOperations
* @throws ResourceHandlerException if initialization failed
*/
public CGroupsHandlerImpl(Configuration conf, PrivilegedOperationExecutor
privilegedOperationExecutor) throws ResourceHandlerException {
this(conf, privilegedOperationExecutor, MTAB_FILE);
}
private void init() throws ResourceHandlerException { private void init() throws ResourceHandlerException {
initializeControllerPaths(); initializeControllerPaths();
} }
@ -117,7 +138,7 @@ class CGroupsHandlerImpl implements CGroupsHandler {
// locations - we'll attempt to figure out mount points // locations - we'll attempt to figure out mount points
Map<CGroupController, String> cPaths = Map<CGroupController, String> cPaths =
initializeControllerPathsFromMtab(MTAB_FILE, this.cGroupPrefix); initializeControllerPathsFromMtab(mtabFile, this.cGroupPrefix);
// we want to do a bulk update without the paths changing concurrently // we want to do a bulk update without the paths changing concurrently
try { try {
rwLock.writeLock().lock(); rwLock.writeLock().lock();
@ -136,26 +157,14 @@ class CGroupsHandlerImpl implements CGroupsHandler {
Map<CGroupController, String> ret = new HashMap<>(); Map<CGroupController, String> ret = new HashMap<>();
for (CGroupController controller : CGroupController.values()) { for (CGroupController controller : CGroupController.values()) {
String name = controller.getName(); String subsystemName = controller.getName();
String controllerPath = findControllerInMtab(name, parsedMtab); String controllerPath = findControllerInMtab(subsystemName, parsedMtab);
if (controllerPath != null) { if (controllerPath != null) {
File f = new File(controllerPath + "/" + cGroupPrefix); ret.put(controller, controllerPath);
if (FileUtil.canWrite(f)) {
ret.put(controller, controllerPath);
} else {
String error =
new StringBuffer("Mount point Based on mtab file: ")
.append(mtab)
.append(". Controller mount point not writable for: ")
.append(name).toString();
LOG.error(error);
throw new ResourceHandlerException(error);
}
} else { } else {
LOG.warn("Controller not mounted but automount disabled: " + name); LOG.warn("Controller not mounted but automount disabled: " +
subsystemName);
} }
} }
return ret; return ret;
@ -214,25 +223,28 @@ class CGroupsHandlerImpl implements CGroupsHandler {
return ret; return ret;
} }
/**
* Find the hierarchy of the subsystem.
* The kernel ensures that a subsystem can only be part of a single hierarchy.
* The subsystem can be part of multiple mount points, if they belong to the
* same hierarchy.
* @param controller subsystem like cpu, cpuset, etc...
* @param entries map of paths to mount options
* @return the first mount path that has the requested subsystem
*/
private static String findControllerInMtab(String controller, private static String findControllerInMtab(String controller,
Map<String, List<String>> entries) { Map<String, List<String>> entries) {
for (Map.Entry<String, List<String>> e : entries.entrySet()) { for (Map.Entry<String, List<String>> e : entries.entrySet()) {
if (e.getValue().contains(controller)) if (e.getValue().contains(controller)) {
return e.getKey(); return e.getKey();
}
} }
return null; return null;
} }
@Override private void mountCGroupController(CGroupController controller)
public void mountCGroupController(CGroupController controller)
throws ResourceHandlerException { throws ResourceHandlerException {
if (!enableCGroupMount) {
LOG.warn("CGroup mounting is disabled - ignoring mount request for: " +
controller.getName());
return;
}
String path = getControllerPath(controller); String path = getControllerPath(controller);
if (path == null) { if (path == null) {
@ -299,6 +311,105 @@ class CGroupsHandlerImpl implements CGroupsHandler {
.append(param).toString(); .append(param).toString();
} }
/**
* Mount cgroup or use existing mount point based on configuration.
* @param controller - the controller being initialized
* @throws ResourceHandlerException yarn hierarchy cannot be created or
* accessed for any reason
*/
@Override
public void initializeCGroupController(CGroupController controller) throws
ResourceHandlerException {
if (enableCGroupMount) {
// We have a controller that needs to be mounted
mountCGroupController(controller);
} else {
// We are working with a pre-mounted contoller
// Make sure that Yarn cgroup hierarchy path exists
initializePreMountedCGroupController(controller);
}
}
/**
* This function is called when the administrator opted
* to use a pre-mounted cgroup controller.
* There are two options.
* 1. Yarn hierarchy already exists. We verify, whether we have write access
* in this case.
* 2. Yarn hierarchy does not exist, yet. We create it in this case.
* @param controller the controller being initialized
* @throws ResourceHandlerException yarn hierarchy cannot be created or
* accessed for any reason
*/
public void initializePreMountedCGroupController(CGroupController controller)
throws ResourceHandlerException {
// Check permissions to cgroup hierarchy and
// create YARN cgroup if it does not exist, yet
File rootHierarchy = new File(getControllerPath(controller));
File yarnHierarchy = new File(rootHierarchy, cGroupPrefix);
String subsystemName = controller.getName();
LOG.info("Initializing mounted controller " + controller.getName() + " " +
"at " + yarnHierarchy);
if (!rootHierarchy.exists()) {
throw new ResourceHandlerException(getErrorWithDetails(
"Cgroups mount point does not exist or not accessible",
subsystemName,
rootHierarchy.getAbsolutePath()
));
} else if (!yarnHierarchy.exists()) {
LOG.info("Yarn control group does not exist. Creating " +
yarnHierarchy.getAbsolutePath());
try {
if (!yarnHierarchy.mkdir()) {
// Unexpected: we just checked that it was missing
throw new ResourceHandlerException(getErrorWithDetails(
"Unexpected: Cannot create yarn cgroup",
subsystemName,
yarnHierarchy.getAbsolutePath()
));
}
} catch (SecurityException e) {
throw new ResourceHandlerException(getErrorWithDetails(
"No permissions to create yarn cgroup",
subsystemName,
yarnHierarchy.getAbsolutePath()
), e);
}
} else if (!FileUtil.canWrite(yarnHierarchy)) {
throw new ResourceHandlerException(getErrorWithDetails(
"Yarn control group not writable",
subsystemName,
yarnHierarchy.getAbsolutePath()
));
}
}
/**
* Creates an actionable error message for mtab parsing.
* @param errorMessage message to use
* @param subsystemName cgroup subsystem
* @param yarnCgroupPath cgroup path that failed
* @return a string builder that can be appended by the caller
*/
private String getErrorWithDetails(
String errorMessage,
String subsystemName,
String yarnCgroupPath) {
return new StringBuilder()
.append(errorMessage)
.append(" Subsystem:")
.append(subsystemName)
.append(" Mount points:")
.append(mtabFile)
.append(" User:")
.append(System.getProperty("user.name"))
.append(" Path: ")
.append(yarnCgroupPath)
.toString();
}
@Override @Override
public String createCGroup(CGroupController controller, String cGroupId) public String createCGroup(CGroupController controller, String cGroupId)
throws ResourceHandlerException { throws ResourceHandlerException {

View File

@ -74,7 +74,7 @@ public class CGroupsMemoryResourceHandlerImpl implements MemoryResourceHandler {
+ YarnConfiguration.NM_VMEM_CHECK_ENABLED + " to false."; + YarnConfiguration.NM_VMEM_CHECK_ENABLED + " to false.";
throw new ResourceHandlerException(msg); throw new ResourceHandlerException(msg);
} }
this.cGroupsHandler.mountCGroupController(MEMORY); this.cGroupsHandler.initializeCGroupController(MEMORY);
swappiness = conf swappiness = conf
.getInt(YarnConfiguration.NM_MEMORY_RESOURCE_CGROUPS_SWAPPINESS, .getInt(YarnConfiguration.NM_MEMORY_RESOURCE_CGROUPS_SWAPPINESS,
YarnConfiguration.DEFAULT_NM_MEMORY_RESOURCE_CGROUPS_SWAPPINESS); YarnConfiguration.DEFAULT_NM_MEMORY_RESOURCE_CGROUPS_SWAPPINESS);

View File

@ -31,7 +31,6 @@ import org.apache.hadoop.yarn.server.nodemanager.containermanager.container.Cont
import org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.privileged.PrivilegedOperation; import org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.privileged.PrivilegedOperation;
import org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.privileged.PrivilegedOperationException; import org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.privileged.PrivilegedOperationException;
import org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.privileged.PrivilegedOperationExecutor; import org.apache.hadoop.yarn.server.nodemanager.containermanager.linux.privileged.PrivilegedOperationExecutor;
import org.apache.hadoop.yarn.util.SystemClock;
import java.util.ArrayList; import java.util.ArrayList;
import java.util.HashMap; import java.util.HashMap;
@ -88,7 +87,7 @@ public class TrafficControlBandwidthHandlerImpl
//operation. At some point, LCE code can be refactored to batch mount //operation. At some point, LCE code can be refactored to batch mount
//operations across multiple controllers - cpu, net_cls, blkio etc //operations across multiple controllers - cpu, net_cls, blkio etc
cGroupsHandler cGroupsHandler
.mountCGroupController(CGroupsHandler.CGroupController.NET_CLS); .initializeCGroupController(CGroupsHandler.CGroupController.NET_CLS);
device = conf.get(YarnConfiguration.NM_NETWORK_RESOURCE_INTERFACE, device = conf.get(YarnConfiguration.NM_NETWORK_RESOURCE_INTERFACE,
YarnConfiguration.DEFAULT_NM_NETWORK_RESOURCE_INTERFACE); YarnConfiguration.DEFAULT_NM_NETWORK_RESOURCE_INTERFACE);
strictMode = configuration.getBoolean(YarnConfiguration strictMode = configuration.getBoolean(YarnConfiguration

View File

@ -54,7 +54,7 @@ public class TestCGroupsBlkioResourceHandlerImpl {
Configuration conf = new YarnConfiguration(); Configuration conf = new YarnConfiguration();
List<PrivilegedOperation> ret = List<PrivilegedOperation> ret =
cGroupsBlkioResourceHandlerImpl.bootstrap(conf); cGroupsBlkioResourceHandlerImpl.bootstrap(conf);
verify(mockCGroupsHandler, times(1)).mountCGroupController( verify(mockCGroupsHandler, times(1)).initializeCGroupController(
CGroupsHandler.CGroupController.BLKIO); CGroupsHandler.CGroupController.BLKIO);
Assert.assertNull(ret); Assert.assertNull(ret);
} }

View File

@ -62,7 +62,7 @@ public class TestCGroupsCpuResourceHandlerImpl {
List<PrivilegedOperation> ret = List<PrivilegedOperation> ret =
cGroupsCpuResourceHandler.bootstrap(plugin, conf); cGroupsCpuResourceHandler.bootstrap(plugin, conf);
verify(mockCGroupsHandler, times(1)) verify(mockCGroupsHandler, times(1))
.mountCGroupController(CGroupsHandler.CGroupController.CPU); .initializeCGroupController(CGroupsHandler.CGroupController.CPU);
verify(mockCGroupsHandler, times(0)) verify(mockCGroupsHandler, times(0))
.updateCGroupParam(CGroupsHandler.CGroupController.CPU, "", .updateCGroupParam(CGroupsHandler.CGroupController.CPU, "",
CGroupsHandler.CGROUP_CPU_PERIOD_US, ""); CGroupsHandler.CGROUP_CPU_PERIOD_US, "");
@ -84,7 +84,7 @@ public class TestCGroupsCpuResourceHandlerImpl {
List<PrivilegedOperation> ret = List<PrivilegedOperation> ret =
cGroupsCpuResourceHandler.bootstrap(plugin, conf); cGroupsCpuResourceHandler.bootstrap(plugin, conf);
verify(mockCGroupsHandler, times(1)) verify(mockCGroupsHandler, times(1))
.mountCGroupController(CGroupsHandler.CGroupController.CPU); .initializeCGroupController(CGroupsHandler.CGroupController.CPU);
verify(mockCGroupsHandler, times(1)) verify(mockCGroupsHandler, times(1))
.updateCGroupParam(CGroupsHandler.CGroupController.CPU, "", .updateCGroupParam(CGroupsHandler.CGroupController.CPU, "",
CGroupsHandler.CGROUP_CPU_PERIOD_US, String.valueOf(period)); CGroupsHandler.CGROUP_CPU_PERIOD_US, String.valueOf(period));
@ -109,7 +109,7 @@ public class TestCGroupsCpuResourceHandlerImpl {
List<PrivilegedOperation> ret = List<PrivilegedOperation> ret =
cGroupsCpuResourceHandler.bootstrap(plugin, conf); cGroupsCpuResourceHandler.bootstrap(plugin, conf);
verify(mockCGroupsHandler, times(1)) verify(mockCGroupsHandler, times(1))
.mountCGroupController(CGroupsHandler.CGroupController.CPU); .initializeCGroupController(CGroupsHandler.CGroupController.CPU);
verify(mockCGroupsHandler, times(1)) verify(mockCGroupsHandler, times(1))
.updateCGroupParam(CGroupsHandler.CGroupController.CPU, "", .updateCGroupParam(CGroupsHandler.CGroupController.CPU, "",
CGroupsHandler.CGROUP_CPU_QUOTA_US, "-1"); CGroupsHandler.CGROUP_CPU_QUOTA_US, "-1");

View File

@ -39,6 +39,7 @@ import java.io.File;
import java.io.FileWriter; import java.io.FileWriter;
import java.io.IOException; import java.io.IOException;
import java.nio.file.Files; import java.nio.file.Files;
import java.security.Permission;
import java.util.Map; import java.util.Map;
import java.util.UUID; import java.util.UUID;
@ -96,7 +97,7 @@ public class TestCGroupsHandlerImpl {
.append('=').append(tmpPath).append('/').append(controller.getName()); .append('=').append(tmpPath).append('/').append(controller.getName());
expectedOp.appendArgs(hierarchy, controllerKV.toString()); expectedOp.appendArgs(hierarchy, controllerKV.toString());
cGroupsHandler.mountCGroupController(controller); cGroupsHandler.initializeCGroupController(controller);
try { try {
ArgumentCaptor<PrivilegedOperation> opCaptor = ArgumentCaptor.forClass( ArgumentCaptor<PrivilegedOperation> opCaptor = ArgumentCaptor.forClass(
PrivilegedOperation.class); PrivilegedOperation.class);
@ -109,7 +110,7 @@ public class TestCGroupsHandlerImpl {
verifyNoMoreInteractions(privilegedOperationExecutorMock); verifyNoMoreInteractions(privilegedOperationExecutorMock);
//Try mounting the same controller again - this should be a no-op //Try mounting the same controller again - this should be a no-op
cGroupsHandler.mountCGroupController(controller); cGroupsHandler.initializeCGroupController(controller);
verifyNoMoreInteractions(privilegedOperationExecutorMock); verifyNoMoreInteractions(privilegedOperationExecutorMock);
} catch (PrivilegedOperationException e) { } catch (PrivilegedOperationException e) {
LOG.error("Caught exception: " + e); LOG.error("Caught exception: " + e);
@ -131,7 +132,7 @@ public class TestCGroupsHandlerImpl {
try { try {
cGroupsHandler = new CGroupsHandlerImpl(conf, cGroupsHandler = new CGroupsHandlerImpl(conf,
privilegedOperationExecutorMock); privilegedOperationExecutorMock);
cGroupsHandler.mountCGroupController(controller); cGroupsHandler.initializeCGroupController(controller);
} catch (ResourceHandlerException e) { } catch (ResourceHandlerException e) {
LOG.error("Caught exception: " + e); LOG.error("Caught exception: " + e);
Assert.assertTrue( Assert.assertTrue(
@ -167,7 +168,7 @@ public class TestCGroupsHandlerImpl {
try { try {
cGroupsHandler = new CGroupsHandlerImpl(conf, cGroupsHandler = new CGroupsHandlerImpl(conf,
privilegedOperationExecutorMock); privilegedOperationExecutorMock);
cGroupsHandler.mountCGroupController(controller); cGroupsHandler.initializeCGroupController(controller);
} catch (ResourceHandlerException e) { } catch (ResourceHandlerException e) {
LOG.error("Caught exception: " + e); LOG.error("Caught exception: " + e);
Assert.assertTrue( Assert.assertTrue(
@ -234,7 +235,7 @@ public class TestCGroupsHandlerImpl {
return createMockCgroupMount(parentDir, type, "hadoop-yarn"); return createMockCgroupMount(parentDir, type, "hadoop-yarn");
} }
public static File createMockCgroupMount(File parentDir, String type, private static File createMockCgroupMount(File parentDir, String type,
String hierarchy) throws IOException { String hierarchy) throws IOException {
File cgroupMountDir = File cgroupMountDir =
new File(parentDir.getAbsolutePath(), type + "/" + hierarchy); new File(parentDir.getAbsolutePath(), type + "/" + hierarchy);
@ -270,9 +271,13 @@ public class TestCGroupsHandlerImpl {
return mockMtab; return mockMtab;
} }
/**
* Tests whether mtab parsing works as expected with a valid hierarchy set.
* @throws Exception the test will fail
*/
@Test @Test
public void testMtabParsing() throws Exception { public void testMtabParsing() throws Exception {
// Initialize mtab and cgroup dir
File parentDir = new File(tmpPath); File parentDir = new File(tmpPath);
// create mock cgroup // create mock cgroup
File cpuCgroupMountDir = createMockCgroupMount(parentDir, "cpu", File cpuCgroupMountDir = createMockCgroupMount(parentDir, "cpu",
@ -282,9 +287,13 @@ public class TestCGroupsHandlerImpl {
"blkio", hierarchy); "blkio", hierarchy);
Assert.assertTrue(blkioCgroupMountDir.exists()); Assert.assertTrue(blkioCgroupMountDir.exists());
File mockMtabFile = createMockMTab(parentDir); File mockMtabFile = createMockMTab(parentDir);
// Run mtabs parsing
Map<CGroupsHandler.CGroupController, String> controllerPaths = Map<CGroupsHandler.CGroupController, String> controllerPaths =
CGroupsHandlerImpl.initializeControllerPathsFromMtab( CGroupsHandlerImpl.initializeControllerPathsFromMtab(
mockMtabFile.getAbsolutePath(), hierarchy); mockMtabFile.getAbsolutePath(), hierarchy);
// Verify
Assert.assertEquals(2, controllerPaths.size()); Assert.assertEquals(2, controllerPaths.size());
Assert.assertTrue(controllerPaths Assert.assertTrue(controllerPaths
.containsKey(CGroupsHandler.CGroupController.CPU)); .containsKey(CGroupsHandler.CGroupController.CPU));
@ -297,8 +306,138 @@ public class TestCGroupsHandlerImpl {
Assert.assertEquals(parentDir.getAbsolutePath() + "/blkio", blkioDir); Assert.assertEquals(parentDir.getAbsolutePath() + "/blkio", blkioDir);
} }
/**
* Tests whether mtab parsing works as expected with an empty hierarchy set.
* @throws Exception the test will fail
*/
@Test
public void testPreMountedController() throws Exception {
testPreMountedControllerInitialization("hadoop-yarn");
testPreMountedControllerInitialization("");
testPreMountedControllerInitialization("/");
}
/**
* Tests whether mtab parsing works as expected with the specified hierarchy.
* @param myHierarchy path to local cgroup hierarchy
* @throws Exception the test will fail
*/
private void testPreMountedControllerInitialization(String myHierarchy)
throws Exception {
// Initialize mount point
File parentDir = new File(tmpPath);
FileUtils.deleteQuietly(parentDir);
Assert.assertTrue("Could not create dirs", parentDir.mkdirs());
File mtab = createMockMTab(parentDir);
File mountPoint = new File(parentDir, "cpu");
File cpuCgroupMountDir = createMockCgroupMount(
parentDir, "cpu", myHierarchy);
// Initialize Yarn classes
Configuration confNoMount = new Configuration();
confNoMount.set(YarnConfiguration.NM_LINUX_CONTAINER_CGROUPS_HIERARCHY,
myHierarchy);
confNoMount.setBoolean(YarnConfiguration.NM_LINUX_CONTAINER_CGROUPS_MOUNT,
false);
CGroupsHandlerImpl cGroupsHandler = new CGroupsHandlerImpl(confNoMount,
privilegedOperationExecutorMock, mtab.getAbsolutePath());
// Test that a missing yarn hierarchy will be created automatically
if (!cpuCgroupMountDir.equals(mountPoint)) {
Assert.assertTrue("Could not delete cgroups", cpuCgroupMountDir.delete());
Assert.assertTrue("Directory should be deleted",
!cpuCgroupMountDir.exists());
}
cGroupsHandler.initializeCGroupController(
CGroupsHandler.CGroupController.CPU);
Assert.assertTrue("Cgroups not writable", cpuCgroupMountDir.exists() &&
cpuCgroupMountDir.canWrite());
// Test that an inaccessible yarn hierarchy results in an exception
Assert.assertTrue(cpuCgroupMountDir.setWritable(false));
try {
cGroupsHandler.initializeCGroupController(
CGroupsHandler.CGroupController.CPU);
Assert.fail("An inaccessible path should result in an exception");
} catch (Exception e) {
Assert.assertTrue("Unexpected exception " + e.getClass().toString(),
e instanceof ResourceHandlerException);
} finally {
Assert.assertTrue("Could not revert writable permission",
cpuCgroupMountDir.setWritable(true));
}
// Test that a non-accessible mount directory results in an exception
if (!cpuCgroupMountDir.equals(mountPoint)) {
Assert.assertTrue("Could not delete cgroups", cpuCgroupMountDir.delete());
Assert.assertTrue("Directory should be deleted",
!cpuCgroupMountDir.exists());
}
Assert.assertTrue(mountPoint.setWritable(false));
try {
cGroupsHandler.initializeCGroupController(
CGroupsHandler.CGroupController.CPU);
Assert.fail("An inaccessible path should result in an exception");
} catch (Exception e) {
Assert.assertTrue("Unexpected exception " + e.getClass().toString(),
e instanceof ResourceHandlerException);
} finally {
Assert.assertTrue("Could not revert writable permission",
mountPoint.setWritable(true));
}
// Test that a SecurityException results in an exception
if (!cpuCgroupMountDir.equals(mountPoint)) {
Assert.assertFalse("Could not delete cgroups",
cpuCgroupMountDir.delete());
Assert.assertTrue("Directory should be deleted",
!cpuCgroupMountDir.exists());
SecurityManager manager = System.getSecurityManager();
System.setSecurityManager(new MockSecurityManagerDenyWrite());
try {
cGroupsHandler.initializeCGroupController(
CGroupsHandler.CGroupController.CPU);
Assert.fail("An inaccessible path should result in an exception");
} catch (Exception e) {
Assert.assertTrue("Unexpected exception " + e.getClass().toString(),
e instanceof ResourceHandlerException);
} finally {
System.setSecurityManager(manager);
}
}
// Test that a non-existing mount directory results in an exception
if (!cpuCgroupMountDir.equals(mountPoint)) {
Assert.assertFalse("Could not delete cgroups",
cpuCgroupMountDir.delete());
Assert.assertTrue("Directory should be deleted",
!cpuCgroupMountDir.exists());
}
FileUtils.deleteQuietly(mountPoint);
Assert.assertTrue("cgroups mount point should be deleted",
!mountPoint.exists());
try {
cGroupsHandler.initializeCGroupController(
CGroupsHandler.CGroupController.CPU);
Assert.fail("An inaccessible path should result in an exception");
} catch (Exception e) {
Assert.assertTrue("Unexpected exception " + e.getClass().toString(),
e instanceof ResourceHandlerException);
}
}
@After @After
public void teardown() { public void teardown() {
FileUtil.fullyDelete(new File(tmpPath)); FileUtil.fullyDelete(new File(tmpPath));
} }
private class MockSecurityManagerDenyWrite extends SecurityManager {
@Override
public void checkPermission(Permission perm) {
if(perm.getActions().equals("write")) {
throw new SecurityException("Mock not allowed");
}
}
}
} }

View File

@ -52,7 +52,7 @@ public class TestCGroupsMemoryResourceHandlerImpl {
List<PrivilegedOperation> ret = List<PrivilegedOperation> ret =
cGroupsMemoryResourceHandler.bootstrap(conf); cGroupsMemoryResourceHandler.bootstrap(conf);
verify(mockCGroupsHandler, times(1)) verify(mockCGroupsHandler, times(1))
.mountCGroupController(CGroupsHandler.CGroupController.MEMORY); .initializeCGroupController(CGroupsHandler.CGroupController.MEMORY);
Assert.assertNull(ret); Assert.assertNull(ret);
Assert.assertEquals("Default swappiness value incorrect", 0, Assert.assertEquals("Default swappiness value incorrect", 0,
cGroupsMemoryResourceHandler.getSwappiness()); cGroupsMemoryResourceHandler.getSwappiness());

View File

@ -99,7 +99,7 @@ public class TestTrafficControlBandwidthHandlerImpl {
try { try {
handlerImpl.bootstrap(conf); handlerImpl.bootstrap(conf);
verify(cGroupsHandlerMock).mountCGroupController( verify(cGroupsHandlerMock).initializeCGroupController(
eq(CGroupsHandler.CGroupController.NET_CLS)); eq(CGroupsHandler.CGroupController.NET_CLS));
verifyNoMoreInteractions(cGroupsHandlerMock); verifyNoMoreInteractions(cGroupsHandlerMock);
verify(trafficControllerMock).bootstrap(eq(device), verify(trafficControllerMock).bootstrap(eq(device),

View File

@ -31,7 +31,7 @@ The following settings are related to setting up CGroups. These need to be set i
|:---- |:---- | |:---- |:---- |
| `yarn.nodemanager.container-executor.class` | This should be set to "org.apache.hadoop.yarn.server.nodemanager.LinuxContainerExecutor". CGroups is a Linux kernel feature and is exposed via the LinuxContainerExecutor. | | `yarn.nodemanager.container-executor.class` | This should be set to "org.apache.hadoop.yarn.server.nodemanager.LinuxContainerExecutor". CGroups is a Linux kernel feature and is exposed via the LinuxContainerExecutor. |
| `yarn.nodemanager.linux-container-executor.resources-handler.class` | This should be set to "org.apache.hadoop.yarn.server.nodemanager.util.CgroupsLCEResourcesHandler". Using the LinuxContainerExecutor doesn't force you to use CGroups. If you wish to use CGroups, the resource-handler-class must be set to CGroupsLCEResourceHandler. | | `yarn.nodemanager.linux-container-executor.resources-handler.class` | This should be set to "org.apache.hadoop.yarn.server.nodemanager.util.CgroupsLCEResourcesHandler". Using the LinuxContainerExecutor doesn't force you to use CGroups. If you wish to use CGroups, the resource-handler-class must be set to CGroupsLCEResourceHandler. |
| `yarn.nodemanager.linux-container-executor.cgroups.hierarchy` | The cgroups hierarchy under which to place YARN proccesses(cannot contain commas). If yarn.nodemanager.linux-container-executor.cgroups.mount is false (that is, if cgroups have been pre-configured), then this cgroups hierarchy must already exist | | `yarn.nodemanager.linux-container-executor.cgroups.hierarchy` | The cgroups hierarchy under which to place YARN proccesses(cannot contain commas). If yarn.nodemanager.linux-container-executor.cgroups.mount is false (that is, if cgroups have been pre-configured) and the Yarn user has write access to the parent directory, then the directory will be created. If the directory already exists, the administrator has to give Yarn write permissions to it recursively. |
| `yarn.nodemanager.linux-container-executor.cgroups.mount` | Whether the LCE should attempt to mount cgroups if not found - can be true or false. | | `yarn.nodemanager.linux-container-executor.cgroups.mount` | Whether the LCE should attempt to mount cgroups if not found - can be true or false. |
| `yarn.nodemanager.linux-container-executor.cgroups.mount-path` | Where the LCE should attempt to mount cgroups if not found. Common locations include /sys/fs/cgroup and /cgroup; the default location can vary depending on the Linux distribution in use. This path must exist before the NodeManager is launched. Only used when the LCE resources handler is set to the CgroupsLCEResourcesHandler, and yarn.nodemanager.linux-container-executor.cgroups.mount is true. A point to note here is that the container-executor binary will try to mount the path specified + "/" + the subsystem. In our case, since we are trying to limit CPU the binary tries to mount the path specified + "/cpu" and that's the path it expects to exist. | | `yarn.nodemanager.linux-container-executor.cgroups.mount-path` | Where the LCE should attempt to mount cgroups if not found. Common locations include /sys/fs/cgroup and /cgroup; the default location can vary depending on the Linux distribution in use. This path must exist before the NodeManager is launched. Only used when the LCE resources handler is set to the CgroupsLCEResourcesHandler, and yarn.nodemanager.linux-container-executor.cgroups.mount is true. A point to note here is that the container-executor binary will try to mount the path specified + "/" + the subsystem. In our case, since we are trying to limit CPU the binary tries to mount the path specified + "/cpu" and that's the path it expects to exist. |
| `yarn.nodemanager.linux-container-executor.group` | The Unix group of the NodeManager. It should match the setting in "container-executor.cfg". This configuration is required for validating the secure access of the container-executor binary. | | `yarn.nodemanager.linux-container-executor.group` | The Unix group of the NodeManager. It should match the setting in "container-executor.cfg". This configuration is required for validating the secure access of the container-executor binary. |