mirror of
				https://github.com/k3s-io/kubernetes.git
				synced 2025-10-25 01:20:18 +00:00 
			
		
		
		
	
		
			
				
	
	
		
			464 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			464 lines
		
	
	
		
			18 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| /*
 | |
| Copyright 2014 The Kubernetes Authors All rights reserved.
 | |
| 
 | |
| Licensed under the Apache License, Version 2.0 (the "License");
 | |
| you may not use this file except in compliance with the License.
 | |
| You may obtain a copy of the License at
 | |
| 
 | |
|     http://www.apache.org/licenses/LICENSE-2.0
 | |
| 
 | |
| Unless required by applicable law or agreed to in writing, software
 | |
| distributed under the License is distributed on an "AS IS" BASIS,
 | |
| WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
| See the License for the specific language governing permissions and
 | |
| limitations under the License.
 | |
| */
 | |
| 
 | |
| // If you make changes to this file, you should also make the corresponding change in ReplicaSet.
 | |
| 
 | |
| package replication
 | |
| 
 | |
| import (
 | |
| 	"reflect"
 | |
| 	"sort"
 | |
| 	"sync"
 | |
| 	"time"
 | |
| 
 | |
| 	"github.com/golang/glog"
 | |
| 	"k8s.io/kubernetes/pkg/api"
 | |
| 	"k8s.io/kubernetes/pkg/client/cache"
 | |
| 	clientset "k8s.io/kubernetes/pkg/client/clientset_generated/internalclientset"
 | |
| 	"k8s.io/kubernetes/pkg/client/record"
 | |
| 	unversionedcore "k8s.io/kubernetes/pkg/client/typed/generated/core/unversioned"
 | |
| 	"k8s.io/kubernetes/pkg/controller"
 | |
| 	"k8s.io/kubernetes/pkg/controller/framework"
 | |
| 	"k8s.io/kubernetes/pkg/labels"
 | |
| 	"k8s.io/kubernetes/pkg/runtime"
 | |
| 	utilruntime "k8s.io/kubernetes/pkg/util/runtime"
 | |
| 	"k8s.io/kubernetes/pkg/util/wait"
 | |
| 	"k8s.io/kubernetes/pkg/util/workqueue"
 | |
| 	"k8s.io/kubernetes/pkg/watch"
 | |
| )
 | |
| 
 | |
| const (
 | |
| 	// We'll attempt to recompute the required replicas of all replication controllers
 | |
| 	// that have fulfilled their expectations at least this often. This recomputation
 | |
| 	// happens based on contents in local pod storage.
 | |
| 	FullControllerResyncPeriod = 30 * time.Second
 | |
| 
 | |
| 	// Realistic value of the burstReplica field for the replication manager based off
 | |
| 	// performance requirements for kubernetes 1.0.
 | |
| 	BurstReplicas = 500
 | |
| 
 | |
| 	// We must avoid counting pods until the pod store has synced. If it hasn't synced, to
 | |
| 	// avoid a hot loop, we'll wait this long between checks.
 | |
| 	PodStoreSyncedPollPeriod = 100 * time.Millisecond
 | |
| 
 | |
| 	// The number of times we retry updating a replication controller's status.
 | |
| 	statusUpdateRetries = 1
 | |
| )
 | |
| 
 | |
| // ReplicationManager is responsible for synchronizing ReplicationController objects stored
 | |
| // in the system with actual running pods.
 | |
| // TODO: this really should be called ReplicationController. The only reason why it's a Manager
 | |
| // is to distinguish this type from API object "ReplicationController". We should fix this.
 | |
| type ReplicationManager struct {
 | |
| 	kubeClient clientset.Interface
 | |
| 	podControl controller.PodControlInterface
 | |
| 
 | |
| 	// An rc is temporarily suspended after creating/deleting these many replicas.
 | |
| 	// It resumes normal action after observing the watch events for them.
 | |
| 	burstReplicas int
 | |
| 	// To allow injection of syncReplicationController for testing.
 | |
| 	syncHandler func(rcKey string) error
 | |
| 
 | |
| 	// A TTLCache of pod creates/deletes each rc expects to see
 | |
| 	expectations controller.ControllerExpectationsInterface
 | |
| 
 | |
| 	// A store of replication controllers, populated by the rcController
 | |
| 	rcStore cache.StoreToReplicationControllerLister
 | |
| 	// Watches changes to all replication controllers
 | |
| 	rcController *framework.Controller
 | |
| 	// A store of pods, populated by the podController
 | |
| 	podStore cache.StoreToPodLister
 | |
| 	// Watches changes to all pods
 | |
| 	podController *framework.Controller
 | |
| 	// podStoreSynced returns true if the pod store has been synced at least once.
 | |
| 	// Added as a member to the struct to allow injection for testing.
 | |
| 	podStoreSynced func() bool
 | |
| 
 | |
| 	// Controllers that need to be synced
 | |
| 	queue *workqueue.Type
 | |
| }
 | |
| 
 | |
| // NewReplicationManager creates a new ReplicationManager.
 | |
| func NewReplicationManager(kubeClient clientset.Interface, resyncPeriod controller.ResyncPeriodFunc, burstReplicas int) *ReplicationManager {
 | |
| 	eventBroadcaster := record.NewBroadcaster()
 | |
| 	eventBroadcaster.StartLogging(glog.Infof)
 | |
| 	eventBroadcaster.StartRecordingToSink(&unversionedcore.EventSinkImpl{kubeClient.Core().Events("")})
 | |
| 
 | |
| 	rm := &ReplicationManager{
 | |
| 		kubeClient: kubeClient,
 | |
| 		podControl: controller.RealPodControl{
 | |
| 			KubeClient: kubeClient,
 | |
| 			Recorder:   eventBroadcaster.NewRecorder(api.EventSource{Component: "replication-controller"}),
 | |
| 		},
 | |
| 		burstReplicas: burstReplicas,
 | |
| 		expectations:  controller.NewControllerExpectations(),
 | |
| 		queue:         workqueue.New(),
 | |
| 	}
 | |
| 
 | |
| 	rm.rcStore.Store, rm.rcController = framework.NewInformer(
 | |
| 		&cache.ListWatch{
 | |
| 			ListFunc: func(options api.ListOptions) (runtime.Object, error) {
 | |
| 				return rm.kubeClient.Core().ReplicationControllers(api.NamespaceAll).List(options)
 | |
| 			},
 | |
| 			WatchFunc: func(options api.ListOptions) (watch.Interface, error) {
 | |
| 				return rm.kubeClient.Core().ReplicationControllers(api.NamespaceAll).Watch(options)
 | |
| 			},
 | |
| 		},
 | |
| 		&api.ReplicationController{},
 | |
| 		// TODO: Can we have much longer period here?
 | |
| 		FullControllerResyncPeriod,
 | |
| 		framework.ResourceEventHandlerFuncs{
 | |
| 			AddFunc: rm.enqueueController,
 | |
| 			UpdateFunc: func(old, cur interface{}) {
 | |
| 				// You might imagine that we only really need to enqueue the
 | |
| 				// controller when Spec changes, but it is safer to sync any
 | |
| 				// time this function is triggered. That way a full informer
 | |
| 				// resync can requeue any controllers that don't yet have pods
 | |
| 				// but whose last attempts at creating a pod have failed (since
 | |
| 				// we don't block on creation of pods) instead of those
 | |
| 				// controllers stalling indefinitely. Enqueueing every time
 | |
| 				// does result in some spurious syncs (like when Status.Replica
 | |
| 				// is updated and the watch notification from it retriggers
 | |
| 				// this function), but in general extra resyncs shouldn't be
 | |
| 				// that bad as rcs that haven't met expectations yet won't
 | |
| 				// sync, and all the listing is done using local stores.
 | |
| 				oldRC := old.(*api.ReplicationController)
 | |
| 				curRC := cur.(*api.ReplicationController)
 | |
| 				if oldRC.Status.Replicas != curRC.Status.Replicas {
 | |
| 					glog.V(4).Infof("Observed updated replica count for rc: %v, %d->%d", curRC.Name, oldRC.Status.Replicas, curRC.Status.Replicas)
 | |
| 				}
 | |
| 				rm.enqueueController(cur)
 | |
| 			},
 | |
| 			// This will enter the sync loop and no-op, because the controller has been deleted from the store.
 | |
| 			// Note that deleting a controller immediately after scaling it to 0 will not work. The recommended
 | |
| 			// way of achieving this is by performing a `stop` operation on the controller.
 | |
| 			DeleteFunc: rm.enqueueController,
 | |
| 		},
 | |
| 	)
 | |
| 
 | |
| 	rm.podStore.Store, rm.podController = framework.NewInformer(
 | |
| 		&cache.ListWatch{
 | |
| 			ListFunc: func(options api.ListOptions) (runtime.Object, error) {
 | |
| 				return rm.kubeClient.Core().Pods(api.NamespaceAll).List(options)
 | |
| 			},
 | |
| 			WatchFunc: func(options api.ListOptions) (watch.Interface, error) {
 | |
| 				return rm.kubeClient.Core().Pods(api.NamespaceAll).Watch(options)
 | |
| 			},
 | |
| 		},
 | |
| 		&api.Pod{},
 | |
| 		resyncPeriod(),
 | |
| 		framework.ResourceEventHandlerFuncs{
 | |
| 			AddFunc: rm.addPod,
 | |
| 			// This invokes the rc for every pod change, eg: host assignment. Though this might seem like overkill
 | |
| 			// the most frequent pod update is status, and the associated rc will only list from local storage, so
 | |
| 			// it should be ok.
 | |
| 			UpdateFunc: rm.updatePod,
 | |
| 			DeleteFunc: rm.deletePod,
 | |
| 		},
 | |
| 	)
 | |
| 
 | |
| 	rm.syncHandler = rm.syncReplicationController
 | |
| 	rm.podStoreSynced = rm.podController.HasSynced
 | |
| 	return rm
 | |
| }
 | |
| 
 | |
| // SetEventRecorder replaces the event recorder used by the replication manager
 | |
| // with the given recorder. Only used for testing.
 | |
| func (rm *ReplicationManager) SetEventRecorder(recorder record.EventRecorder) {
 | |
| 	// TODO: Hack. We can't cleanly shutdown the event recorder, so benchmarks
 | |
| 	// need to pass in a fake.
 | |
| 	rm.podControl = controller.RealPodControl{KubeClient: rm.kubeClient, Recorder: recorder}
 | |
| }
 | |
| 
 | |
| // Run begins watching and syncing.
 | |
| func (rm *ReplicationManager) Run(workers int, stopCh <-chan struct{}) {
 | |
| 	defer utilruntime.HandleCrash()
 | |
| 	glog.Infof("Starting RC Manager")
 | |
| 	go rm.rcController.Run(stopCh)
 | |
| 	go rm.podController.Run(stopCh)
 | |
| 	for i := 0; i < workers; i++ {
 | |
| 		go wait.Until(rm.worker, time.Second, stopCh)
 | |
| 	}
 | |
| 	<-stopCh
 | |
| 	glog.Infof("Shutting down RC Manager")
 | |
| 	rm.queue.ShutDown()
 | |
| }
 | |
| 
 | |
| // getPodController returns the controller managing the given pod.
 | |
| // TODO: Surface that we are ignoring multiple controllers for a single pod.
 | |
| func (rm *ReplicationManager) getPodController(pod *api.Pod) *api.ReplicationController {
 | |
| 	controllers, err := rm.rcStore.GetPodControllers(pod)
 | |
| 	if err != nil {
 | |
| 		glog.V(4).Infof("No controllers found for pod %v, replication manager will avoid syncing", pod.Name)
 | |
| 		return nil
 | |
| 	}
 | |
| 	// In theory, overlapping controllers is user error. This sorting will not prevent
 | |
| 	// oscillation of replicas in all cases, eg:
 | |
| 	// rc1 (older rc): [(k1=v1)], replicas=1 rc2: [(k2=v2)], replicas=2
 | |
| 	// pod: [(k1:v1), (k2:v2)] will wake both rc1 and rc2, and we will sync rc1.
 | |
| 	// pod: [(k2:v2)] will wake rc2 which creates a new replica.
 | |
| 	if len(controllers) > 1 {
 | |
| 		// More than two items in this list indicates user error. If two replication-controller
 | |
| 		// overlap, sort by creation timestamp, subsort by name, then pick
 | |
| 		// the first.
 | |
| 		glog.Errorf("user error! more than one replication controller is selecting pods with labels: %+v", pod.Labels)
 | |
| 		sort.Sort(OverlappingControllers(controllers))
 | |
| 	}
 | |
| 	return &controllers[0]
 | |
| }
 | |
| 
 | |
| // When a pod is created, enqueue the controller that manages it and update it's expectations.
 | |
| func (rm *ReplicationManager) addPod(obj interface{}) {
 | |
| 	pod := obj.(*api.Pod)
 | |
| 	if pod.DeletionTimestamp != nil {
 | |
| 		// on a restart of the controller manager, it's possible a new pod shows up in a state that
 | |
| 		// is already pending deletion. Prevent the pod from being a creation observation.
 | |
| 		rm.deletePod(pod)
 | |
| 		return
 | |
| 	}
 | |
| 	if rc := rm.getPodController(pod); rc != nil {
 | |
| 		rcKey, err := controller.KeyFunc(rc)
 | |
| 		if err != nil {
 | |
| 			glog.Errorf("Couldn't get key for replication controller %#v: %v", rc, err)
 | |
| 			return
 | |
| 		}
 | |
| 		rm.expectations.CreationObserved(rcKey)
 | |
| 		rm.enqueueController(rc)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // When a pod is updated, figure out what controller/s manage it and wake them
 | |
| // up. If the labels of the pod have changed we need to awaken both the old
 | |
| // and new controller. old and cur must be *api.Pod types.
 | |
| func (rm *ReplicationManager) updatePod(old, cur interface{}) {
 | |
| 	if api.Semantic.DeepEqual(old, cur) {
 | |
| 		// A periodic relist will send update events for all known pods.
 | |
| 		return
 | |
| 	}
 | |
| 	// TODO: Write a unittest for this case
 | |
| 	curPod := cur.(*api.Pod)
 | |
| 	if curPod.DeletionTimestamp != nil {
 | |
| 		// when a pod is deleted gracefully it's deletion timestamp is first modified to reflect a grace period,
 | |
| 		// and after such time has passed, the kubelet actually deletes it from the store. We receive an update
 | |
| 		// for modification of the deletion timestamp and expect an rc to create more replicas asap, not wait
 | |
| 		// until the kubelet actually deletes the pod. This is different from the Phase of a pod changing, because
 | |
| 		// an rc never initiates a phase change, and so is never asleep waiting for the same.
 | |
| 		rm.deletePod(curPod)
 | |
| 		return
 | |
| 	}
 | |
| 	if rc := rm.getPodController(curPod); rc != nil {
 | |
| 		rm.enqueueController(rc)
 | |
| 	}
 | |
| 	oldPod := old.(*api.Pod)
 | |
| 	// Only need to get the old controller if the labels changed.
 | |
| 	if !reflect.DeepEqual(curPod.Labels, oldPod.Labels) {
 | |
| 		// If the old and new rc are the same, the first one that syncs
 | |
| 		// will set expectations preventing any damage from the second.
 | |
| 		if oldRC := rm.getPodController(oldPod); oldRC != nil {
 | |
| 			rm.enqueueController(oldRC)
 | |
| 		}
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // When a pod is deleted, enqueue the controller that manages the pod and update its expectations.
 | |
| // obj could be an *api.Pod, or a DeletionFinalStateUnknown marker item.
 | |
| func (rm *ReplicationManager) deletePod(obj interface{}) {
 | |
| 	pod, ok := obj.(*api.Pod)
 | |
| 
 | |
| 	// When a delete is dropped, the relist will notice a pod in the store not
 | |
| 	// in the list, leading to the insertion of a tombstone object which contains
 | |
| 	// the deleted key/value. Note that this value might be stale. If the pod
 | |
| 	// changed labels the new rc will not be woken up till the periodic resync.
 | |
| 	if !ok {
 | |
| 		tombstone, ok := obj.(cache.DeletedFinalStateUnknown)
 | |
| 		if !ok {
 | |
| 			glog.Errorf("Couldn't get object from tombstone %+v, could take up to %v before a controller recreates a replica", obj, controller.ExpectationsTimeout)
 | |
| 			return
 | |
| 		}
 | |
| 		pod, ok = tombstone.Obj.(*api.Pod)
 | |
| 		if !ok {
 | |
| 			glog.Errorf("Tombstone contained object that is not a pod %+v, could take up to %v before controller recreates a replica", obj, controller.ExpectationsTimeout)
 | |
| 			return
 | |
| 		}
 | |
| 	}
 | |
| 	if rc := rm.getPodController(pod); rc != nil {
 | |
| 		rcKey, err := controller.KeyFunc(rc)
 | |
| 		if err != nil {
 | |
| 			glog.Errorf("Couldn't get key for replication controller %#v: %v", rc, err)
 | |
| 			return
 | |
| 		}
 | |
| 		rm.expectations.DeletionObserved(rcKey)
 | |
| 		rm.enqueueController(rc)
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // obj could be an *api.ReplicationController, or a DeletionFinalStateUnknown marker item.
 | |
| func (rm *ReplicationManager) enqueueController(obj interface{}) {
 | |
| 	key, err := controller.KeyFunc(obj)
 | |
| 	if err != nil {
 | |
| 		glog.Errorf("Couldn't get key for object %+v: %v", obj, err)
 | |
| 		return
 | |
| 	}
 | |
| 
 | |
| 	// TODO: Handle overlapping controllers better. Either disallow them at admission time or
 | |
| 	// deterministically avoid syncing controllers that fight over pods. Currently, we only
 | |
| 	// ensure that the same controller is synced for a given pod. When we periodically relist
 | |
| 	// all controllers there will still be some replica instability. One way to handle this is
 | |
| 	// by querying the store for all controllers that this rc overlaps, as well as all
 | |
| 	// controllers that overlap this rc, and sorting them.
 | |
| 	rm.queue.Add(key)
 | |
| }
 | |
| 
 | |
| // worker runs a worker thread that just dequeues items, processes them, and marks them done.
 | |
| // It enforces that the syncHandler is never invoked concurrently with the same key.
 | |
| func (rm *ReplicationManager) worker() {
 | |
| 	for {
 | |
| 		func() {
 | |
| 			key, quit := rm.queue.Get()
 | |
| 			if quit {
 | |
| 				return
 | |
| 			}
 | |
| 			defer rm.queue.Done(key)
 | |
| 			err := rm.syncHandler(key.(string))
 | |
| 			if err != nil {
 | |
| 				glog.Errorf("Error syncing replication controller: %v", err)
 | |
| 			}
 | |
| 		}()
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // manageReplicas checks and updates replicas for the given replication controller.
 | |
| func (rm *ReplicationManager) manageReplicas(filteredPods []*api.Pod, rc *api.ReplicationController) {
 | |
| 	diff := len(filteredPods) - rc.Spec.Replicas
 | |
| 	rcKey, err := controller.KeyFunc(rc)
 | |
| 	if err != nil {
 | |
| 		glog.Errorf("Couldn't get key for replication controller %#v: %v", rc, err)
 | |
| 		return
 | |
| 	}
 | |
| 	if diff < 0 {
 | |
| 		diff *= -1
 | |
| 		if diff > rm.burstReplicas {
 | |
| 			diff = rm.burstReplicas
 | |
| 		}
 | |
| 		rm.expectations.ExpectCreations(rcKey, diff)
 | |
| 		wait := sync.WaitGroup{}
 | |
| 		wait.Add(diff)
 | |
| 		glog.V(2).Infof("Too few %q/%q replicas, need %d, creating %d", rc.Namespace, rc.Name, rc.Spec.Replicas, diff)
 | |
| 		for i := 0; i < diff; i++ {
 | |
| 			go func() {
 | |
| 				defer wait.Done()
 | |
| 				if err := rm.podControl.CreatePods(rc.Namespace, rc.Spec.Template, rc); err != nil {
 | |
| 					// Decrement the expected number of creates because the informer won't observe this pod
 | |
| 					glog.V(2).Infof("Failed creation, decrementing expectations for controller %q/%q", rc.Namespace, rc.Name)
 | |
| 					rm.expectations.CreationObserved(rcKey)
 | |
| 					utilruntime.HandleError(err)
 | |
| 				}
 | |
| 			}()
 | |
| 		}
 | |
| 		wait.Wait()
 | |
| 	} else if diff > 0 {
 | |
| 		if diff > rm.burstReplicas {
 | |
| 			diff = rm.burstReplicas
 | |
| 		}
 | |
| 		rm.expectations.ExpectDeletions(rcKey, diff)
 | |
| 		glog.V(2).Infof("Too many %q/%q replicas, need %d, deleting %d", rc.Namespace, rc.Name, rc.Spec.Replicas, diff)
 | |
| 		// No need to sort pods if we are about to delete all of them
 | |
| 		if rc.Spec.Replicas != 0 {
 | |
| 			// Sort the pods in the order such that not-ready < ready, unscheduled
 | |
| 			// < scheduled, and pending < running. This ensures that we delete pods
 | |
| 			// in the earlier stages whenever possible.
 | |
| 			sort.Sort(controller.ActivePods(filteredPods))
 | |
| 		}
 | |
| 
 | |
| 		wait := sync.WaitGroup{}
 | |
| 		wait.Add(diff)
 | |
| 		for i := 0; i < diff; i++ {
 | |
| 			go func(ix int) {
 | |
| 				defer wait.Done()
 | |
| 				if err := rm.podControl.DeletePod(rc.Namespace, filteredPods[ix].Name, rc); err != nil {
 | |
| 					// Decrement the expected number of deletes because the informer won't observe this deletion
 | |
| 					glog.V(2).Infof("Failed deletion, decrementing expectations for controller %q/%q", rc.Namespace, rc.Name)
 | |
| 					rm.expectations.DeletionObserved(rcKey)
 | |
| 					utilruntime.HandleError(err)
 | |
| 				}
 | |
| 			}(i)
 | |
| 		}
 | |
| 		wait.Wait()
 | |
| 	}
 | |
| }
 | |
| 
 | |
| // syncReplicationController will sync the rc with the given key if it has had its expectations fulfilled, meaning
 | |
| // it did not expect to see any more of its pods created or deleted. This function is not meant to be invoked
 | |
| // concurrently with the same key.
 | |
| func (rm *ReplicationManager) syncReplicationController(key string) error {
 | |
| 	startTime := time.Now()
 | |
| 	defer func() {
 | |
| 		glog.V(4).Infof("Finished syncing controller %q (%v)", key, time.Now().Sub(startTime))
 | |
| 	}()
 | |
| 
 | |
| 	if !rm.podStoreSynced() {
 | |
| 		// Sleep so we give the pod reflector goroutine a chance to run.
 | |
| 		time.Sleep(PodStoreSyncedPollPeriod)
 | |
| 		glog.Infof("Waiting for pods controller to sync, requeuing rc %v", key)
 | |
| 		rm.queue.Add(key)
 | |
| 		return nil
 | |
| 	}
 | |
| 
 | |
| 	obj, exists, err := rm.rcStore.Store.GetByKey(key)
 | |
| 	if !exists {
 | |
| 		glog.Infof("Replication Controller has been deleted %v", key)
 | |
| 		rm.expectations.DeleteExpectations(key)
 | |
| 		return nil
 | |
| 	}
 | |
| 	if err != nil {
 | |
| 		glog.Infof("Unable to retrieve rc %v from store: %v", key, err)
 | |
| 		rm.queue.Add(key)
 | |
| 		return err
 | |
| 	}
 | |
| 	rc := *obj.(*api.ReplicationController)
 | |
| 
 | |
| 	// Check the expectations of the rc before counting active pods, otherwise a new pod can sneak in
 | |
| 	// and update the expectations after we've retrieved active pods from the store. If a new pod enters
 | |
| 	// the store after we've checked the expectation, the rc sync is just deferred till the next relist.
 | |
| 	rcKey, err := controller.KeyFunc(&rc)
 | |
| 	if err != nil {
 | |
| 		glog.Errorf("Couldn't get key for replication controller %#v: %v", rc, err)
 | |
| 		return err
 | |
| 	}
 | |
| 	rcNeedsSync := rm.expectations.SatisfiedExpectations(rcKey)
 | |
| 	podList, err := rm.podStore.Pods(rc.Namespace).List(labels.Set(rc.Spec.Selector).AsSelector())
 | |
| 	if err != nil {
 | |
| 		glog.Errorf("Error getting pods for rc %q: %v", key, err)
 | |
| 		rm.queue.Add(key)
 | |
| 		return err
 | |
| 	}
 | |
| 
 | |
| 	// TODO: Do this in a single pass, or use an index.
 | |
| 	filteredPods := controller.FilterActivePods(podList.Items)
 | |
| 	if rcNeedsSync {
 | |
| 		rm.manageReplicas(filteredPods, &rc)
 | |
| 	}
 | |
| 
 | |
| 	// Always updates status as pods come up or die.
 | |
| 	if err := updateReplicaCount(rm.kubeClient.Core().ReplicationControllers(rc.Namespace), rc, len(filteredPods)); err != nil {
 | |
| 		// Multiple things could lead to this update failing. Requeuing the controller ensures
 | |
| 		// we retry with some fairness.
 | |
| 		glog.V(2).Infof("Failed to update replica count for controller %v/%v; requeuing; error: %v", rc.Namespace, rc.Name, err)
 | |
| 		rm.enqueueController(&rc)
 | |
| 	}
 | |
| 	return nil
 | |
| }
 |