Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cherry-pick PR #416 to release-v1.3 #432

Merged
merged 1 commit into from
May 14, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 17 additions & 1 deletion controllers/options.go
Original file line number Diff line number Diff line change
@@ -1,10 +1,15 @@
package controllers

import "errors"
import (
"errors"

"k8s.io/client-go/util/workqueue"
)

// ControllerConfig is the configuration for cluster and machine controllers
type ControllerConfig struct {
MaxConcurrentReconciles int
RateLimiter workqueue.RateLimiter
}

// ControllerConfigOpts is a function that can be used to configure the controller config
Expand All @@ -20,3 +25,14 @@ func WithMaxConcurrentReconciles(max int) ControllerConfigOpts {
return nil
}
}

// WithRateLimiter sets the rate limiter for the controller
func WithRateLimiter(rateLimiter workqueue.RateLimiter) ControllerConfigOpts {
return func(c *ControllerConfig) error {
if rateLimiter == nil {
return errors.New("rate limiter cannot be nil")
}
c.RateLimiter = rateLimiter
return nil
}
}
36 changes: 36 additions & 0 deletions controllers/options_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -4,6 +4,7 @@ import (
"testing"

"github.com/stretchr/testify/assert"
"k8s.io/client-go/util/workqueue"
)

func TestWithMaxConcurrentReconciles(t *testing.T) {
Expand Down Expand Up @@ -37,3 +38,38 @@ func TestWithMaxConcurrentReconciles(t *testing.T) {
})
}
}

func TestWithRateLimiter(t *testing.T) {
tests := []struct {
name string
rateLimiter workqueue.RateLimiter
expectError bool
expectedType interface{}
}{
{
name: "TestWithRateLimiterNil",
rateLimiter: nil,
expectError: true,
expectedType: nil,
},
{
name: "TestWithRateLimiterSet",
rateLimiter: workqueue.DefaultControllerRateLimiter(),
expectError: false,
expectedType: &workqueue.MaxOfRateLimiter{},
},
}
for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
opt := WithRateLimiter(tt.rateLimiter)
config := &ControllerConfig{}
err := opt(config)
if tt.expectError {
assert.Error(t, err)
} else {
assert.NoError(t, err)
assert.IsType(t, tt.expectedType, config.RateLimiter)
}
})
}
}
86 changes: 66 additions & 20 deletions main.go
Original file line number Diff line number Diff line change
Expand Up @@ -17,27 +17,21 @@
package main

import (
"errors"
"flag"
"os"
"time"

// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.
// Import all Kubernetes client auth plugins (e.g. Azure, GCP, OIDC, etc.)
// to ensure that exec-entrypoint and run can make use of them.

"go.uber.org/zap/zapcore"
"golang.org/x/time/rate"
"k8s.io/apimachinery/pkg/runtime"
utilruntime "k8s.io/apimachinery/pkg/util/runtime"
"k8s.io/client-go/informers"
"k8s.io/client-go/kubernetes"
clientgoscheme "k8s.io/client-go/kubernetes/scheme"
_ "k8s.io/client-go/plugin/pkg/client/auth"
"k8s.io/client-go/tools/cache"
"k8s.io/client-go/util/workqueue"
capiv1 "sigs.k8s.io/cluster-api/api/v1beta1"
bootstrapv1 "sigs.k8s.io/cluster-api/bootstrap/kubeadm/api/v1beta1"
ctrl "sigs.k8s.io/controller-runtime"
Expand All @@ -60,11 +54,8 @@

func init() {
utilruntime.Must(clientgoscheme.AddToScheme(scheme))

utilruntime.Must(capiv1.AddToScheme(scheme))

utilruntime.Must(bootstrapv1.AddToScheme(scheme))

utilruntime.Must(infrav1alpha4.AddToScheme(scheme))
utilruntime.Must(infrav1beta1.AddToScheme(scheme))

Expand All @@ -82,18 +73,20 @@
enableLeaderElection bool
probeAddr string
maxConcurrentReconciles int
baseDelay time.Duration
maxDelay time.Duration
bucketSize int
qps int
)

flag.StringVar(&metricsAddr, "metrics-bind-address", ":8080", "The address the metric endpoint binds to.")
flag.StringVar(&probeAddr, "health-probe-bind-address", ":8081", "The address the probe endpoint binds to.")
flag.BoolVar(&enableLeaderElection, "leader-elect", false,
"Enable leader election for controller manager. "+
"Enabling this will ensure there is only one active controller manager.")
flag.IntVar(
&maxConcurrentReconciles,
"max-concurrent-reconciles",
defaultMaxConcurrentReconciles,
"The maximum number of allowed, concurrent reconciles.")
flag.BoolVar(&enableLeaderElection, "leader-elect", false, "Enable leader election for controller manager. Enabling this will ensure there is only one active controller manager.")
flag.IntVar(&maxConcurrentReconciles, "max-concurrent-reconciles", defaultMaxConcurrentReconciles, "The maximum number of allowed, concurrent reconciles.")
flag.DurationVar(&baseDelay, "rate-limiter-base-delay", 500*time.Millisecond, "The base delay for the rate limiter.")
flag.DurationVar(&maxDelay, "rate-limiter-max-delay", 15*time.Minute, "The maximum delay for the rate limiter.")
flag.IntVar(&bucketSize, "rate-limiter-bucket-size", 100, "The bucket size for the rate limiter.")
flag.IntVar(&qps, "rate-limiter-qps", 10, "The QPS for the rate limiter.")

Check warning on line 89 in main.go

View check run for this annotation

Codecov / codecov/patch

main.go#L84-L89

Added lines #L84 - L89 were not covered by tests

opts := zap.Options{
TimeEncoder: zapcore.RFC3339TimeEncoder,
Expand All @@ -117,6 +110,12 @@
os.Exit(1)
}

rateLimiter, err := compositeRateLimiter(baseDelay, maxDelay, bucketSize, qps)
if err != nil {
setupLog.Error(err, "unable to create composite rate limiter")
os.Exit(1)

Check warning on line 116 in main.go

View check run for this annotation

Codecov / codecov/patch

main.go#L113-L116

Added lines #L113 - L116 were not covered by tests
}

// Set up the context that's going to be used in controllers and for the manager.
ctx := ctrl.SetupSignalHandler()

Expand All @@ -143,6 +142,7 @@
configMapInformer,
mgr.GetScheme(),
controllers.WithMaxConcurrentReconciles(maxConcurrentReconciles),
controllers.WithRateLimiter(rateLimiter),
)
if err != nil {
setupLog.Error(err, "unable to create controller", "controller", "NutanixCluster")
Expand All @@ -159,6 +159,7 @@
configMapInformer,
mgr.GetScheme(),
controllers.WithMaxConcurrentReconciles(maxConcurrentReconciles),
controllers.WithRateLimiter(rateLimiter),
)
if err != nil {
setupLog.Error(err, "unable to create controller", "controller", "NutanixMachine")
Expand All @@ -185,3 +186,48 @@
os.Exit(1)
}
}

// compositeRateLimiter will build a limiter similar to the default from DefaultControllerRateLimiter but with custom values.
func compositeRateLimiter(baseDelay, maxDelay time.Duration, bucketSize, qps int) (workqueue.RateLimiter, error) {
// Validate the rate limiter configuration
if err := validateRateLimiterConfig(baseDelay, maxDelay, bucketSize, qps); err != nil {
return nil, err
}
exponentialBackoffLimiter := workqueue.NewItemExponentialFailureRateLimiter(baseDelay, maxDelay)
bucketLimiter := &workqueue.BucketRateLimiter{Limiter: rate.NewLimiter(rate.Limit(qps), bucketSize)}
return workqueue.NewMaxOfRateLimiter(exponentialBackoffLimiter, bucketLimiter), nil
}

// validateRateLimiterConfig validates the rate limiter configuration parameters
func validateRateLimiterConfig(baseDelay, maxDelay time.Duration, bucketSize, qps int) error {
// Check if baseDelay is a non-negative value
if baseDelay < 0 {
return errors.New("baseDelay cannot be negative")
}

// Check if maxDelay is non-negative and greater than or equal to baseDelay
if maxDelay < 0 {
return errors.New("maxDelay cannot be negative")
}

if maxDelay < baseDelay {
return errors.New("maxDelay should be greater than or equal to baseDelay")
}

// Check if bucketSize is a positive number
if bucketSize <= 0 {
return errors.New("bucketSize must be positive")
}

// Check if qps is a positive number
if qps <= 0 {
return errors.New("minimum QPS must be positive")
}

// Check if bucketSize is at least as large as the QPS
if bucketSize < qps {
return errors.New("bucketSize must be at least as large as the QPS to handle bursts effectively")
}

return nil
}
87 changes: 87 additions & 0 deletions main_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
package main

import (
"testing"
"time"

"github.com/stretchr/testify/assert"
)

func TestRateLimiter(t *testing.T) {
tests := []struct {
name string
baseDelay time.Duration
maxDelay time.Duration
maxBurst int
qps int
expectedErr string
}{
{
name: "valid rate limiter",
baseDelay: 500 * time.Millisecond,
maxDelay: 15 * time.Minute,
maxBurst: 100,
qps: 10,
},
{
name: "negative base delay",
baseDelay: -500 * time.Millisecond,
maxDelay: 15 * time.Minute,
maxBurst: 100,
qps: 10,
expectedErr: "baseDelay cannot be negative",
},
{
name: "negative max delay",
baseDelay: 500 * time.Millisecond,
maxDelay: -15 * time.Minute,
maxBurst: 100,
qps: 10,
expectedErr: "maxDelay cannot be negative",
},
{
name: "maxDelay should be greater than or equal to baseDelay",
baseDelay: 500 * time.Millisecond,
maxDelay: 400 * time.Millisecond,
maxBurst: 100,
qps: 10,
expectedErr: "maxDelay should be greater than or equal to baseDelay",
},
{
name: "bucketSize must be positive",
baseDelay: 500 * time.Millisecond,
maxDelay: 15 * time.Minute,
maxBurst: 0,
qps: 10,
expectedErr: "bucketSize must be positive",
},
{
name: "qps must be positive",
baseDelay: 500 * time.Millisecond,
maxDelay: 15 * time.Minute,
maxBurst: 100,
qps: 0,
expectedErr: "minimum QPS must be positive",
},
{
name: "bucketSize must be greater than or equal to qps",
baseDelay: 500 * time.Millisecond,
maxDelay: 15 * time.Minute,
maxBurst: 10,
qps: 100,
expectedErr: "bucketSize must be at least as large as the QPS to handle bursts effectively",
},
}

for _, tt := range tests {
t.Run(tt.name, func(t *testing.T) {
_, err := compositeRateLimiter(tt.baseDelay, tt.maxDelay, tt.maxBurst, tt.qps)
if tt.expectedErr != "" {
assert.Error(t, err)
assert.Contains(t, err.Error(), tt.expectedErr)
} else {
assert.NoError(t, err)
}
})
}
}
Loading