-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use "systemd" cgroup driver as default instead of dockers' "cgroupfs" #490
Comments
I would also highlight this part of https://kubernetes.io/docs/setup/production-environment/container-runtimes/#cgroup-drivers
That would lead me to believe that the current config in EKS AMI-s needs this this improvement, since the current config might lead to unstable nodes. |
@jjjms I have created a PR with the changes you have described. Now we just need to get that merged! |
I also found that kubeadm now actively checks for the cgroup driver to be systemd: kubernetes/kubernetes#73837 |
Another interesting issue that might block this change is this one: kubernetes-sigs/kubespray#5134 (comment) Systemd had some dbus issues that only got fixed in systemd 242. Apparently RedHat has backported that to 219, so Checking my own cluster systemd version seems to be 219 and I'm on the latest AMI for 1.15: [root@ip-x-x-x-x /]# curl 169.254.169.254/latest/meta-data/placement/region
us-west-2[root@ip-x-x-x-x /]# curl 169.254.169.254/latest/meta-data/ami-id
ami-0b4f1df0761911a2a[root@ip-x-x-x-x /]# systemctl --version
systemd 219
+PAM +AUDIT +SELINUX +IMA -APPARMOR +SMACK +SYSVINIT +UTMP +LIBCRYPTSETUP +GCRYPT +GNUTLS +ACL +XZ +LZ4 -SECCOMP +BLKID +ELFUTILS +KMOD +IDN
[root@ip-x-x-x-x /]# |
Kubernetes documentation indicates that for stability reasons one should run kubernetes with the systemd cgroup driver if the init system itself is systemd. https://kubernetes.io/docs/setup/production-environment/container-runtimes/#cgroup-drivers Fixes #490
FYI, we're picking this issue back up. Asked @reegnz to post a new PR; otherwise, I can post one with the same changes. |
We made this change for |
What would you like to be added:
EKS AMI by default to use "systemd" cgroups driver for both kubelet and docker.
Why is this needed:
Since AL2 is using systemd and used systemd driver for cgroups managing, kubelet and docker using cgroupfs would result in systemd unaware of the resource allocation by cgroupfs and could result in system crash in certain cases.
https://kubernetes.io/docs/setup/production-environment/container-runtimes/#cgroup-drivers
I have tested this by performing the following change in config files and adding the node back to master. In my testing the node was marked as Ready and I was able to create pods in this node.
Can we move into "systemd" driver for eks-optimized AMIs ?
Note: Found following GH Issue where setting kube-reserved/system-reserved memory was not taken into while calculating kubepods.slice "MemoryLimit". It was using node memory as its value.
kubernetes/kubernetes#88197
The text was updated successfully, but these errors were encountered: