-
Notifications
You must be signed in to change notification settings - Fork 350
Sandbox config - rlimit #515
Comments
@DefunctExodus Thanks for reporting this issue! I think the problem is that:
Kubernetes doesn't have rlimit support today kubernetes/kubernetes#3595, so it's using the Docker default. We should avoid regression for user switching from Docker to containerd. @crosbymichael Do you think we should remove this from containerd default, or should cri-containerd do that? Maybe cri-containerd should just use |
@DefunctExodus I discussed with @crosbymichael. To avoid regression, we'll remove the rlimit from the default spec for now. However, please note that it means all your processes will inherit the limit from containerd. https://github.com/kubernetes-incubator/cri-containerd/blob/master/contrib/systemd-units/containerd.service#L14-L18 |
So really two issues, one is the regression when moving from cri docker, the other is the CRI issue for specifying OCI runtime spec rlimits per pod/containerd. |
Thanks for looking into this so quickly, that fix sounds just fine. |
@mikebrow Yeah, the rlimit issue for Kubernetes is tracked in kubernetes/kubernetes#3595. |
I am currently in the midst of configuring a cluster with
cri-contianerd
and I am struggling with the default rlimits that are passed down.I am wondering if there is a method to configure the rlimits.
Thanks
The text was updated successfully, but these errors were encountered: