pkg/datasource/k8s/controllers/hotspotrules_controller.go (165 lines of code) (raw):
/*
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package controllers
import (
"context"
"fmt"
"net/http"
"strconv"
"github.com/alibaba/sentinel-golang/core/hotspot"
"github.com/alibaba/sentinel-golang/logging"
"github.com/go-logr/logr"
"github.com/pkg/errors"
k8sApiError "k8s.io/apimachinery/pkg/api/errors"
"k8s.io/apimachinery/pkg/runtime"
ctrl "sigs.k8s.io/controller-runtime"
"sigs.k8s.io/controller-runtime/pkg/client"
datasourcev1 "github.com/alibaba/sentinel-golang/pkg/datasource/k8s/api/v1alpha1"
)
const (
ConcurrencyMetricType string = "Concurrency"
QPSMetricType string = "QPS"
)
// HotspotRulesReconciler reconciles a HotspotRules object
type HotspotRulesReconciler struct {
client.Client
Logger logr.Logger
Scheme *runtime.Scheme
Namespace string
ExpectedCrName string
}
// +kubebuilder:rbac:groups=datasource.sentinel.io,resources=hotspotrules,verbs=get;list;watch;create;update;patch;delete
// +kubebuilder:rbac:groups=datasource.sentinel.io,resources=hotspotrules/status,verbs=get;update;patch
func (r *HotspotRulesReconciler) Reconcile(req ctrl.Request) (ctrl.Result, error) {
ctx := context.Background()
log := r.Logger.WithValues("expectedNamespace", r.Namespace, "expectedCrName", r.ExpectedCrName, "req", req.String())
if req.Namespace != r.Namespace {
log.V(int(logging.DebugLevel)).Info("ignore unmatched namespace")
return ctrl.Result{
Requeue: false,
RequeueAfter: 0,
}, nil
}
if req.Name != r.ExpectedCrName {
return ctrl.Result{
Requeue: false,
RequeueAfter: 0,
}, nil
}
hotspotRulesCR := &datasourcev1.HotspotRules{}
if err := r.Get(ctx, req.NamespacedName, hotspotRulesCR); err != nil {
k8sApiErr, ok := err.(*k8sApiError.StatusError)
if !ok {
log.Error(err, "Fail to get datasourcev1.HotspotRules.")
return ctrl.Result{
Requeue: false,
RequeueAfter: 0,
}, nil
}
if k8sApiErr.Status().Code != http.StatusNotFound {
log.Error(err, "Fail to get datasourcev1.HotspotRules.")
return ctrl.Result{
Requeue: false,
RequeueAfter: 0,
}, nil
}
log.Info("datasourcev1.CircuitBreakerRules had been deleted.")
hotspotRulesCR = nil
}
var hotspotRules []*hotspot.Rule
if hotspotRulesCR != nil {
log.Info("Receive datasourcev1.HotspotRules", "rules:", hotspotRulesCR.Spec.Rules)
hotspotRules = r.assembleHotspotRules(hotspotRulesCR)
}
_, err := hotspot.LoadRules(hotspotRules)
if err != nil {
log.Error(err, "Fail to Load hotspot.Rules")
return ctrl.Result{
Requeue: false,
RequeueAfter: 0,
}, err
}
return ctrl.Result{}, nil
}
func (r *HotspotRulesReconciler) assembleHotspotRules(rs *datasourcev1.HotspotRules) []*hotspot.Rule {
ret := make([]*hotspot.Rule, 0, len(rs.Spec.Rules))
log := r.Logger
for _, rule := range rs.Spec.Rules {
hotspotRule := &hotspot.Rule{
ID: rule.Id,
Resource: rule.Resource,
MetricType: 0,
ControlBehavior: 0,
ParamIndex: int(rule.ParamIndex),
Threshold: rule.Threshold,
MaxQueueingTimeMs: rule.MaxQueueingTimeMs,
BurstCount: rule.BurstCount,
DurationInSec: rule.DurationInSec,
ParamsMaxCapacity: rule.ParamsMaxCapacity,
SpecificItems: parseSpecificItems(rule.SpecificItems),
}
switch rule.MetricType {
case ConcurrencyMetricType:
hotspotRule.MetricType = hotspot.Concurrency
case QPSMetricType:
hotspotRule.MetricType = hotspot.QPS
default:
log.Error(errors.New("unsupported MetricType for hotspot.Rule"), "", "metricType", rule.MetricType)
continue
}
switch rule.ControlBehavior {
case "":
hotspotRule.ControlBehavior = hotspot.Reject
case RejectControlBehavior:
hotspotRule.ControlBehavior = hotspot.Reject
case ThrottlingControlBehavior:
hotspotRule.ControlBehavior = hotspot.Throttling
default:
log.Error(errors.New("unsupported ControlBehavior for hotspot.Rule"), "", "controlBehavior", rule.ControlBehavior)
continue
}
ret = append(ret, hotspotRule)
}
return ret
}
// parseSpecificItems parses the SpecificValue as real value.
func parseSpecificItems(source []datasourcev1.SpecificValue) map[interface{}]int64 {
ret := make(map[interface{}]int64)
if len(source) == 0 {
return ret
}
for _, item := range source {
switch item.ValKind {
case "KindInt":
realVal, err := strconv.Atoi(item.ValStr)
if err != nil {
logging.Error(errors.Wrap(err, "parseSpecificItems error"), "Failed to parse value for int specific item", "itemValKind", item.ValKind, "itemValStr", item.ValStr)
continue
}
ret[realVal] = item.Threshold
case "KindString":
ret[item.ValStr] = item.Threshold
case "KindBool":
realVal, err := strconv.ParseBool(item.ValStr)
if err != nil {
logging.Error(errors.Wrap(err, "parseSpecificItems error"), "Failed to parse value for bool specific item", "itemValStr", item.ValStr)
continue
}
ret[realVal] = item.Threshold
case "KindFloat64":
realVal, err := strconv.ParseFloat(item.ValStr, 64)
if err != nil {
logging.Error(errors.Wrap(err, "parseSpecificItems error"), "Failed to parse value for float specific item", "itemValStr", item.ValStr)
continue
}
realVal, err = strconv.ParseFloat(fmt.Sprintf("%.5f", realVal), 64)
if err != nil {
logging.Error(errors.Wrap(err, "parseSpecificItems error"), "Failed to parse value for float specific item", "itemValStr", item.ValStr)
continue
}
ret[realVal] = item.Threshold
default:
logging.Error(errors.New("unsupported kind for specific item"), "", item.ValKind)
}
}
return ret
}
func (r *HotspotRulesReconciler) SetupWithManager(mgr ctrl.Manager) error {
return ctrl.NewControllerManagedBy(mgr).
For(&datasourcev1.HotspotRules{}).
Complete(r)
}