-
Notifications
You must be signed in to change notification settings - Fork 38.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document per namespace sysctl and how to set them in pods #29572
Comments
@bprashanth see #26057 |
So that says:
which is pretty much what I could figure out from the link to docker source above. But experimentation shows that /proc/sys/net/netfilter/nf_conntrack_max is not per ns, and I think i found a couple more. What am i missing? Without reading through the proposal, setting it on a contaienr pipes through to the host, or does someone still need the daemon set? |
The sysctl proposal mentions maintaining a file that will list sysctl that One of the open questions on that proposal is that of knowing which sysctls On Mon, Jul 25, 2016 at 2:08 PM, Prashanth B notifications@github.com
|
I can write down the common ones for webserver tuning, when i have some time. Maybe @aledbf or @PiotrSikora know off the top of their head the ones we use in https://github.com/kubernetes/contrib/tree/master/ingress/controllers/nginx or commonly with nginx |
|
A list with safe defaults will be helpful. On Mon, Jul 25, 2016 at 3:01 PM, Manuel Alejandro de Brito Fontes <
|
Here is a good starting point in the kernel source to see which namespaced (per netns) sysctls exist under https://github.com/torvalds/linux/search?utf8=%E2%9C%93&q=register_net_sysctl If I understand it correctly, a number of sysctls only exist in It's not that hard to double check: lines like
set a sysctl value destination in the given network namespace object For example here are the netns specific tables for ipv4 and core: https://github.com/torvalds/linux/blob/a7fd20d1c476af4563e66865213474a2f9f473a4/net/ipv4/sysctl_net_ipv4.c#L668 |
Of course, the philosophical question remains: do we want to offer all technically possible sysctls (i.e. all those that are namespaced) or only the most common ones like the two above. |
Issues go stale after 30d of inactivity. Prevent issues from auto-closing with an If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or |
I think we can close this issue now that there is documentation on sysctl and how to use it: https://kubernetes.io/docs/concepts/cluster-administration/sysctl-cluster/ |
Source of major confusion in webserver tuning, but I'm sure that's just one victim.
@kubernetes/sig-node
The text was updated successfully, but these errors were encountered: