mirror of https://github.com/k3s-io/k3s
Enable per pod cgroups, fix defaulting of cgroup-root when not specified
parent
7fe105ebc7
commit
43ae6f49ad
|
@ -452,6 +452,10 @@ func run(s *options.KubeletServer, kubeDeps *kubelet.KubeletDeps) (err error) {
|
||||||
if s.SystemCgroups != "" && s.CgroupRoot == "" {
|
if s.SystemCgroups != "" && s.CgroupRoot == "" {
|
||||||
return fmt.Errorf("invalid configuration: system container was specified and cgroup root was not specified")
|
return fmt.Errorf("invalid configuration: system container was specified and cgroup root was not specified")
|
||||||
}
|
}
|
||||||
|
if s.CgroupsPerQOS && s.CgroupRoot == "" {
|
||||||
|
glog.Infof("--cgroups-per-qos enabled, but --cgroup-root was not specified. defaulting to /")
|
||||||
|
s.CgroupRoot = "/"
|
||||||
|
}
|
||||||
kubeDeps.ContainerManager, err = cm.NewContainerManager(
|
kubeDeps.ContainerManager, err = cm.NewContainerManager(
|
||||||
kubeDeps.Mounter,
|
kubeDeps.Mounter,
|
||||||
kubeDeps.CAdvisorInterface,
|
kubeDeps.CAdvisorInterface,
|
||||||
|
|
|
@ -36,10 +36,7 @@ NET_PLUGIN_DIR=${NET_PLUGIN_DIR:-""}
|
||||||
SERVICE_CLUSTER_IP_RANGE=${SERVICE_CLUSTER_IP_RANGE:-10.0.0.0/24}
|
SERVICE_CLUSTER_IP_RANGE=${SERVICE_CLUSTER_IP_RANGE:-10.0.0.0/24}
|
||||||
FIRST_SERVICE_CLUSTER_IP=${FIRST_SERVICE_CLUSTER_IP:-10.0.0.1}
|
FIRST_SERVICE_CLUSTER_IP=${FIRST_SERVICE_CLUSTER_IP:-10.0.0.1}
|
||||||
# if enabled, must set CGROUP_ROOT
|
# if enabled, must set CGROUP_ROOT
|
||||||
CGROUPS_PER_QOS=${CGROUPS_PER_QOS:-false}
|
CGROUPS_PER_QOS=${CGROUPS_PER_QOS:-true}
|
||||||
# this is not defaulted to preserve backward compatibility.
|
|
||||||
# if EXPERIMENTAL_CGROUPS_PER_QOS is enabled, recommend setting to /
|
|
||||||
CGROUP_ROOT=${CGROUP_ROOT:-""}
|
|
||||||
# name of the cgroup driver, i.e. cgroupfs or systemd
|
# name of the cgroup driver, i.e. cgroupfs or systemd
|
||||||
CGROUP_DRIVER=${CGROUP_DRIVER:-""}
|
CGROUP_DRIVER=${CGROUP_DRIVER:-""}
|
||||||
# owner of client certs, default to current user if not specified
|
# owner of client certs, default to current user if not specified
|
||||||
|
@ -594,7 +591,6 @@ function start_kubelet {
|
||||||
--enable-controller-attach-detach="${ENABLE_CONTROLLER_ATTACH_DETACH}" \
|
--enable-controller-attach-detach="${ENABLE_CONTROLLER_ATTACH_DETACH}" \
|
||||||
--cgroups-per-qos=${CGROUPS_PER_QOS} \
|
--cgroups-per-qos=${CGROUPS_PER_QOS} \
|
||||||
--cgroup-driver=${CGROUP_DRIVER} \
|
--cgroup-driver=${CGROUP_DRIVER} \
|
||||||
--cgroup-root=${CGROUP_ROOT} \
|
|
||||||
--keep-terminated-pod-volumes=true \
|
--keep-terminated-pod-volumes=true \
|
||||||
--eviction-hard=${EVICTION_HARD} \
|
--eviction-hard=${EVICTION_HARD} \
|
||||||
--eviction-soft=${EVICTION_SOFT} \
|
--eviction-soft=${EVICTION_SOFT} \
|
||||||
|
|
|
@ -204,9 +204,6 @@ func SetDefaults_KubeletConfiguration(obj *KubeletConfiguration) {
|
||||||
if obj.CertDirectory == "" {
|
if obj.CertDirectory == "" {
|
||||||
obj.CertDirectory = "/var/run/kubernetes"
|
obj.CertDirectory = "/var/run/kubernetes"
|
||||||
}
|
}
|
||||||
if obj.CgroupsPerQOS == nil {
|
|
||||||
obj.CgroupsPerQOS = boolVar(false)
|
|
||||||
}
|
|
||||||
if obj.ContainerRuntime == "" {
|
if obj.ContainerRuntime == "" {
|
||||||
obj.ContainerRuntime = "docker"
|
obj.ContainerRuntime = "docker"
|
||||||
}
|
}
|
||||||
|
@ -395,22 +392,12 @@ func SetDefaults_KubeletConfiguration(obj *KubeletConfiguration) {
|
||||||
obj.IPTablesDropBit = &temp
|
obj.IPTablesDropBit = &temp
|
||||||
}
|
}
|
||||||
if obj.CgroupsPerQOS == nil {
|
if obj.CgroupsPerQOS == nil {
|
||||||
temp := false
|
temp := true
|
||||||
obj.CgroupsPerQOS = &temp
|
obj.CgroupsPerQOS = &temp
|
||||||
}
|
}
|
||||||
if obj.CgroupDriver == "" {
|
if obj.CgroupDriver == "" {
|
||||||
obj.CgroupDriver = "cgroupfs"
|
obj.CgroupDriver = "cgroupfs"
|
||||||
}
|
}
|
||||||
// NOTE: this is for backwards compatibility with earlier releases where cgroup-root was optional.
|
|
||||||
// if cgroups per qos is not enabled, and cgroup-root is not specified, we need to default to the
|
|
||||||
// container runtime default and not default to the root cgroup.
|
|
||||||
if obj.CgroupsPerQOS != nil {
|
|
||||||
if *obj.CgroupsPerQOS {
|
|
||||||
if obj.CgroupRoot == "" {
|
|
||||||
obj.CgroupRoot = "/"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
if obj.EnableCRI == nil {
|
if obj.EnableCRI == nil {
|
||||||
obj.EnableCRI = boolVar(true)
|
obj.EnableCRI = boolVar(true)
|
||||||
}
|
}
|
||||||
|
|
|
@ -220,6 +220,7 @@ func NewContainerManager(mountUtil mount.Interface, cadvisorInterface cadvisor.I
|
||||||
if !cgroupManager.Exists(CgroupName(nodeConfig.CgroupRoot)) {
|
if !cgroupManager.Exists(CgroupName(nodeConfig.CgroupRoot)) {
|
||||||
return nil, fmt.Errorf("invalid configuration: cgroup-root doesn't exist: %v", err)
|
return nil, fmt.Errorf("invalid configuration: cgroup-root doesn't exist: %v", err)
|
||||||
}
|
}
|
||||||
|
glog.Infof("container manager verified cgroup-root exists: %v", nodeConfig.CgroupRoot)
|
||||||
}
|
}
|
||||||
return &containerManagerImpl{
|
return &containerManagerImpl{
|
||||||
cadvisorInterface: cadvisorInterface,
|
cadvisorInterface: cadvisorInterface,
|
||||||
|
|
|
@ -194,6 +194,9 @@ func (m *podContainerManagerImpl) GetAllPodsFromCgroups() (map[types.UID]CgroupN
|
||||||
qc := path.Join(val, qcConversion)
|
qc := path.Join(val, qcConversion)
|
||||||
dirInfo, err := ioutil.ReadDir(qc)
|
dirInfo, err := ioutil.ReadDir(qc)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
if os.IsNotExist(err) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
return nil, fmt.Errorf("failed to read the cgroup directory %v : %v", qc, err)
|
return nil, fmt.Errorf("failed to read the cgroup directory %v : %v", qc, err)
|
||||||
}
|
}
|
||||||
for i := range dirInfo {
|
for i := range dirInfo {
|
||||||
|
|
|
@ -5,5 +5,5 @@ GCE_PROJECT=k8s-jkns-ci-node-e2e
|
||||||
CLEANUP=true
|
CLEANUP=true
|
||||||
GINKGO_FLAGS='--skip="\[Flaky\]"'
|
GINKGO_FLAGS='--skip="\[Flaky\]"'
|
||||||
TEST_ARGS='--feature-gates=DynamicKubeletConfig=true'
|
TEST_ARGS='--feature-gates=DynamicKubeletConfig=true'
|
||||||
KUBELET_ARGS='--cgroups-per-qos=false --cgroup-root=/'
|
KUBELET_ARGS='--cgroups-per-qos=true --cgroup-root=/'
|
||||||
PARALLELISM=1
|
PARALLELISM=1
|
||||||
|
|
|
@ -3,4 +3,4 @@ GCE_IMAGE_CONFIG_PATH=test/e2e_node/jenkins/image-config.yaml
|
||||||
GCE_ZONE=us-central1-f
|
GCE_ZONE=us-central1-f
|
||||||
GCE_PROJECT=k8s-jkns-ci-node-e2e
|
GCE_PROJECT=k8s-jkns-ci-node-e2e
|
||||||
CLEANUP=true
|
CLEANUP=true
|
||||||
KUBELET_ARGS='--cgroups-per-qos=false --cgroup-root=/'
|
KUBELET_ARGS='--cgroups-per-qos=true --cgroup-root=/'
|
||||||
|
|
Loading…
Reference in New Issue