-
Notifications
You must be signed in to change notification settings - Fork 146
ace: add sysctl isolator #645
Comments
At what level would you expect this to work? (app vs pod vs both) |
This conceptually would be "pod, only". Current k8s proposal also goes into that direction. However, it is my understanding that OCI runtime spec defines this per-app. I'm not sure how k8s will address this when integrating CRI + sysctl + OCI (some discussion here). Looking forward to an OCI transition, an alternative approach would be to define those per-app and also specify the behavior when stacking multiple apps in a pod (in this case: merge with some priority ordering for conflicting entries). Another open question would be: should specs take care of specifying allowed value, e.g. a whitelist of sysctl prefixes? (My personal opinion is that this should be left to implementations to decide). |
On 12 August 2016 at 12:43, Luca Bruno notifications@github.com wrote:
|
Applications running inside pods may need to tweak several namespaced sysctl parameters. There is a need for executor to support this (rkt/rkt#2694), and OCI Linux runtime manifest already features a sysctl stanza (https://github.com/opencontainers/runtime-spec/blob/master/config-linux.md#sysctl).
In short, ACE should provide an
os/linux/sysctl
isolator.The text was updated successfully, but these errors were encountered: