-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Make runtime more friendly to Kubernetes and container systems in general #93030
Comments
Tagging subscribers to this area: @dotnet/area-meta Issue Details
|
Last I looked into this (around 3 years ago), this was restricted to root processes. However, this change made earlier this year torvalds/linux@d82caa2 (which landed in 6.4) allows unprivileged processes to do this as well. |
There was a question here about improving the behavior when multiple .NET processes run in the same container: #84828. It affects in particular building .NET applications in a container, because such builds have several .NET processes running. |
@tmds that's a good point, I'll include it in the list. |
PR: Enable cgroups hierarchical memory limits support #93611 [merged]
Edit:
With cgroups v2, it does set the memory.low to the request size, so we can easily extract it.With cgroups v2, Kubernetes doc states it may set the memory.low to the request size, but in reality, the current Kubernetes based systems don't do that.
PR: Honor virtual memory limit #80295
The text was updated successfully, but these errors were encountered: