pluginwatcher

package
v1.33.0 Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Apr 23, 2025 License: Apache-2.0 Imports: 19 Imported by: 2

README

Plugin Registration Service

This folder contains a utility, pluginwatcher, for Kubelet to register different types of node-level plugins such as device plugins or CSI plugins. It discovers plugins by monitoring inotify events under the directory returned by kubelet.getPluginsDir(). We will refer to this directory as PluginsDir.

Plugins are expected to implement the gRPC registration service specified in pkg/kubelet/apis/pluginregistration/v*/api.proto.

Plugin Discovery

The pluginwatcher service will discover plugins in the PluginDir when they place a socket in that directory or, at Kubelet start if the socket is already there.

This socket filename should not start with a '.' as it will be ignored.

To avoid conflicts between different plugins, the recommendation is to use <plugin name>[-<some optional string>].sock as filename. <plugin name> should end with a DNS domain that is unique for the plugin. Each time a plugin starts, it has to delete old sockets if they exist and listen anew under the same filename.

Seamless Upgrade

To avoid downtime of a plugin on a node, it would be nice to support running an old plugin in parallel to the new plugin. When deploying with a DaemonSet, setting maxSurge to a value larger than zero enables such a seamless upgrade.

Warning: Such a seamless upgrade is only supported for DRA at the moment.

In a plugin

Note: For DRA, the k8s.io/dynamic-resource-allocation helper package offers the RollingUpdate option which implements the socket handling as described in this section.

To support seamless upgrades, each plugin instance must use a unique socket filename. Otherwise the following could happen:

  • The old instance is registered with plugin.example.com-reg.sock.
  • The new instance starts, unlinks that file, and starts listening on it again.
  • In parallel, the kubelet notices the removal and unregisters the plugin before probing the new instance, thus breaking the seamless upgrade.

Even if the timing is more favorable and unregistration is avoided, using the same socket is problematic: if the new instance fails, the kubelet cannot fall back to the old instance because that old instance is not listening to the socket that is available under plugin.example.com-reg.sock.

This can be achieved in a DaemonSet by passing the UID of the pod into the pod through the downward API. New instances may try to clean up stale sockets of older instances, but have to be absolutely sure that those sockets really aren't in use anymore. Each instance should catch termination signals and clean up after itself. Then sockets only leak during abnormal events (power loss, killing with SIGKILL).

Last but not least, both plugin instances must be usable in parallel. It is not predictable which instance the kubelet will use for which request.

In the kubelet

For such a seamless upgrade with different sockets per plugin to work reliably, the handler for the plugin type must track all registered instances. Then if one of them fails and gets unregistered, it can fall back to some other. Picking the most recently registered instance is a good heuristic. This isn't perfect because after a kubelet restart, plugin instances get registered in a random order. Restarting the kubelet in the middle of an upgrade should be rare.

At the moment, the following handlers do not support such seamless upgrades:

This supports it:

  • DRA
Deployment

Deploying a plugin with support for seamless upgrades and per-instance socket filenames is not compatible with a kubelet version that does not have support for seamless upgrades yet. It breaks like this:

  • New instance starts, gets registered and replaces the old one.
  • Old instance stops, removing its socket.
  • The kubelet notices that, unregisters the plugin.
  • The plugin handler removes the new instance because it ignores the socket path -> no instance left.

Plugin authors either have to assume that the cluster has a recent enough kubelet or rely on labeling nodes with support. Then the plugin can use one simple DaemonSet for nodes without support and another, more complex one where maxSurge is increased to enable seamless upgrades on nodes which support it. No such label is specified at the moment.

gRPC Service Lifecycle

For any discovered plugin, kubelet will issue a Registration.GetInfo gRPC call to get plugin type, name, endpoint and supported service API versions.

If any of the following steps in registration fails, on retry registration will start from scratch:

  • Registration.GetInfo is called against socket.
  • Validate is called against internal plugin type handler.
  • Register is called against internal plugin type handler.
  • NotifyRegistrationStatus is called against socket to indicate registration result.

During plugin initialization phase, Kubelet will issue Plugin specific calls (e.g: DevicePlugin::GetDevicePluginOptions).

Once Kubelet determines that it is ready to use your plugin it will issue a Registration.NotifyRegistrationStatus gRPC call.

If the plugin removes its socket from the PluginDir this will be interpreted as a plugin Deregistration. If any of the following steps in deregistration fails, on retry deregistration will start from scratch:

  • Registration.GetInfo is called against socket.
  • DeRegisterPlugin is called against internal plugin type handler.

gRPC Service Overview

Here are the general rules that Kubelet plugin developers should follow:

  • Run plugin as 'root' user. Currently creating socket under PluginsDir, a root owned directory, requires plugin process to be running as 'root'.

  • The plugin name sent during Registration.GetInfo grpc should be unique for the given plugin type (CSIPlugin or DevicePlugin).

  • The socket path needs to be unique within one directory, in normal case, each plugin type has its own sub directory, but the design does support socket file under any sub directory of PluginSockDir.

  • A plugin should clean up its own socket upon exiting or when a new instance comes up. A plugin should NOT remove any sockets belonging to other plugins.

  • A plugin should make sure it has service ready for any supported service API version listed in the PluginInfo.

  • For an example plugin implementation, take a look at example_plugin.go included in this directory.

Kubelet Interface

For any kubelet components using the pluginwatcher module, you will need to implement the PluginHandler interface defined in the types.go file.

The interface is documented and the implementations are registered with the pluginwatcher module in kubelet.go by calling AddHandler(pluginType, handler).

The lifecycle follows a simple state machine:

           Validate -> Register -> DeRegister
              ^          +
              |          |
              +--------- +

The pluginwatcher calls the functions with the received plugin name, supported service API versions and the endpoint to call the plugin on.

The Kubelet component that receives this callback can acknowledge or reject the plugin according to its own logic, and use the socket path to establish its service communication with any API version supported by the plugin.

Documentation

Index

Constants

This section is empty.

Variables

This section is empty.

Functions

func GetPluginInfo

func GetPluginInfo(plugin *examplePlugin) cache.PluginInfo

GetPluginInfo returns a PluginInfo object

func NewExampleHandler

func NewExampleHandler(supportedVersions []string, permitDeprecatedDir bool) *exampleHandler

NewExampleHandler provide a example handler

func NewExamplePlugin

func NewExamplePlugin() *examplePlugin

NewExamplePlugin returns an initialized examplePlugin instance

func NewTestExamplePlugin

func NewTestExamplePlugin(pluginName string, pluginType string, endpoint string, advertisedVersions ...string) *examplePlugin

NewTestExamplePlugin returns an initialized examplePlugin instance for testing

Types

type Watcher

type Watcher struct {
	// contains filtered or unexported fields
}

Watcher is the plugin watcher

func NewWatcher

func NewWatcher(sockDir string, desiredStateOfWorld cache.DesiredStateOfWorld) *Watcher

NewWatcher provides a new watcher for socket registration

func (*Watcher) Start

func (w *Watcher) Start(stopCh <-chan struct{}) error

Start watches for the creation and deletion of plugin sockets at the path

Directories

Path Synopsis
example_plugin_apis

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL