-
Notifications
You must be signed in to change notification settings - Fork 1.8k
updating sysctls for 3.11 #10361
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
updating sysctls for 3.11 #10361
Conversation
admin_guide/sysctls.adoc
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why the sysctl values have been changed? I'm not against such a change but I'd like to ensure that there is no mistakes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@php-coder, that's what the K8 doc used:
securityContext:
sysctls:
- name: kernel.shm_rmid_forced
value: "0"
- name: net.ipv4.route.min_pmtu
value: "552"
- name: kernel.msgmax
value: "65536"
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok; perhaps our example with kernel.msgmax=1 2 3 was wrong.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
admin_guide/sysctls.adoc
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
net.ipv4.tcp_syncookies is in the safe set as well
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@ingvagabund, how long has net.ipv4.tcp_syncookies been in the safe set? (I can open up a separate PR to fix older versions, if applicable.)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Since k8s 1.4: kubernetes/kubernetes#27180
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Here's a PR to make that change in older versions: #11232
|
@stuartchuan, will you PTAL? @openshift/team-documentation PTAL 🌠 |
admin_guide/sysctls.adoc
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@kalexand-rh Should this be more explicit to point to the previous warning?
Enabling unsafe sysctls
The use of unsafe sysctls is at-your-own-risk. See the xref:linktext[previous warning].
The cluster administrator can allow...
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You're right that it could be clearer, but I don't want to add an xref that I'll have to remove next month. I might move that paragraph into the previous section - if these were modules, that detail would belong in the concept instead of the task.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@kalexand-rh I would think you want the warning in both the concept and the task. But, that is a debate for later...
admin_guide/sysctls.adoc
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Other references to securityContext take markup, securityContext or *securityContext*
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think it's a parameter, so securityContext is correct.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I agree!
admin_guide/sysctls.adoc
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@kalexand-rh This heading appears to be formatted incorrectly on the View page here. But, I think it is OK; the formatting looks off in all points in the repo history since the ifdefs were added right before the heading.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Interesting. It looks ok in a local build, too. Thanks for checking it.
admin_guide/sysctls.adoc
Outdated
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
s/that has not explicitly enabled//that the admin has not explicitly enabled/which were not explicitly enabled/ ??
Currently, it sounds like the node enables the sysctls itself.
|
@kalexand-rh A few comments. Otherwise LGTM |
|
The preview will be availble shortly at:
|
|
@mdshuai PTAL |
|
Checked and LGTM |
|
Thank you @wjiangjay! |
|
/cherrypick enterprise-3.11 |
|
@kalexand-rh: new pull request created: #11384 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Fixes #10225.
@php-coder, @ingvagabund, PTAL