Container dispatch » History » Revision 18
Revision 17 (Tom Clegg, 01/06/2016 08:46 PM) → Revision 18/26 (Tom Clegg, 01/27/2016 03:42 PM)
h1. Container dispatch
{{toc}}
h2. Summary
A dispatcher uses available compute resources to execute queued containers.
Dispatch is meant to be a small simple component rather than a pluggable framework: e.g., "slurm dispatch" can be a small standalone program, rather than a plugin for a big generic dispatch program.
h2. Pseudocode
* Notice there is a queued container
* Decide whether the required resources are available to run the container
* Lock the container (this avoids races with other dispatch processes)
* Translate the container's runtime constraints and priority to instructions for the lower-level scheduler, if any
* Invoke the "crunch2 run" executor
* When the priority changes on a container taken by this dispatch process, update the lower-level scheduler accordingly (cancel if priority is zero)
* If the lower-level scheduler indicates the container is finished or abandoned, but the Container record is locked by this dispatcher and has state=Running, fail the container
h2. Examples
slurm batch mode
* Use "sinfo" to determine whether it is possible to run the container
* Submit a batch job to the queue: "echo crunch-run --job {uuid} | sbatch -N1"
* When container priority changes, use scontrol and scancel to propagate changes to slurm
* Use strigger to run a cleanup script when a container exits
standalone worker
* Inspect /proc/meminfo, /proc/cpuinfo, "docker ps", etc. to determine local capacity
* Invoke crunch-run as a child process (or perhaps a detached daemon process)
* Signal crunch-run to stop if container priority changes to zero
h2. Arvados API support
Each dispatch process has an Arvados API token that allows it to see queued containers.
* No two dispatch processes can run at the same time with the same token. One way to achieve this is to make a user record for each dispatch service.
Container APIs relevant to a dispatch program:
* List Queued containers (might be a subset of Queued containers)
* List containers with state=Locked or state=Running associated with current token
** arvados.v1.containers.current (equivalent to @filters=[["dispatch_auth_uuid","=",current_client_auth.uuid]]@)
* Receive event when container is created or modified and state is Queued (it might become runnable)
* Change state Queued->Locked
* Change state Locked->Queued
* Change state Locked->Running
* Change state Running->Complete
* Receive event when priority changes
* Receive event when state changes to Complete
* Retrieve an Create a unique API token to pass into the container and its arv-mount process (via crunch-run)
** Token is automatically created/assigned when container state changes to Locked
** Token is automatically expired/destroyed crunch-run (expires when the container state changes away from Running stops)
** arvados.v1.api_client_authorizations.get(uuid=container.auth_uuid)
* Create events/logs
** Decided not to run this container
** Decided to run this container (e.g., no node with those resources)
** Lock failed
** Dispatched to crunch-run
** Cleaned up crashed crunch-run (lower-level scheduler indicates the job finished, but crunch-run didn't leave the container in a final state)
** Cleaned up abandoned container (container belongs to this process, but dispatch and lower-level scheduler don't know about it)
h2. Non-responsibilities
Dispatch doesn't retry failed containers. If something needs to be reattempted, a new container will appear in the queue.
Dispatch doesn't fail a container that it can't run. It doesn't know whether other dispatchers will be able to run it.
h2. Additional notes
(see also #6429 and #6518 and #8028)
Using websockets to listen for container events (new containers added, priority changes) will benefit from some Go SDK support.