New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
systemd-cgroup support #193
Comments
I believe this is the kubelet and runtime (cri-o) not agreeing on how to manage cgroups for the pod, not something that gVisor doesn't have support for. Based on this doc, some Linux distros require extra configuration. |
Hi @kevinGC, Thanks for the information. Though it is still a bit strange that kata and runc work just fine when using systemd. So this issue may only is the case when using kubelet and crio? |
|
Hi @fvoznika, I know |
I got the same error trying to make |
Adds a systemd-cgroup flag option that prints an error letting the user know that systemd cgroups are not supported and points them to the relevant issue. Issue #193 PiperOrigin-RevId: 277837162
@25077667 I ran into this issue both on Debian 11 and Ubuntu 21.10 with normal Docker. Adding |
I had found that answer before. |
@arno01 these pr-s added the support of cgroupv2, but the systemd cgroup-driver isn't implemented yet. It doesn't mean that you can't use gvisor on systemd systems, but you will need to change the default systemd cgroup-drive to cgroupfs. |
Hello, Using cgroupfs may not be an easy option as I believe it is not recommended with kubeadm as mentioned here: https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/configure-cgroup-driver/ ? While possible to run both in parallel, it seems also not recommended: https://kubernetes.io/docs/tasks/administer-cluster/kubeadm/configure-cgroup-driver/#using-the-cgroupfs-driver Many thanks, |
This change adds systemd-cgroup support to cgroupv2 and modifies existing cgroup tests for systemd support. Fixes #193 PiperOrigin-RevId: 427246545
This change adds systemd-cgroup support to cgroupv2 and modifies existing cgroup tests for systemd support. Fixes #193 PiperOrigin-RevId: 427246545
This change adds systemd-cgroup support to cgroupv2 and modifies existing cgroup tests for systemd support. Fixes #193 PiperOrigin-RevId: 427246545
Hello,
I'm trying to setup Kubernetes(kubeadm) + CRI-O + runsc. I'm enabling the runtimes through the alpha feature gate RuntimeClass (crio is dropping support for
untrusted-workload
). I've got it to work with some other runtimes already, but I'm having some issues when trying to run runsc.The error when I'm starting the pod is the following:
kubelet, k8sworker01 Failed create pod sandbox: rpc error: code = Unknown desc = container create failed: flag provided but not defined: -systemd-cgroup
Crio config file:
I was wondering if anyone got runsc working with kubernetes and crio yet.
Edit: when switching the cgroup-manager within the crio config from systemd to groupfs the container wont start at all. Error:
kubelet, k8sworker01 Failed create pod sandbox: rpc error: code = Unknown desc = cri-o configured with cgroupfs cgroup manager, but received systemd slice as parent: /kubepods.slice/kubepods-besteffort.slice/kubepods-besteffort-pode9fd6274_59d1_11e9_af90_9e3c8464d679.slice
Edit2:
Solved it by changing systemd to cgroupfs in crio.conf and in '/etc/default/kubelet':
' KUBELET_EXTRA_ARGS=--cgroup-driver=cgroupfs'
That leaves me with the following question; is 'systemd' not supported yet for gvisor?
The text was updated successfully, but these errors were encountered: