- Sort Score
- Result 10 results
- Languages All
Results 1 - 10 of 17 for colgroup (0.63 sec)
-
JavadocStyleGuide.md
### 1.1.2 HTML
Registered: Wed Jun 12 18:38:38 UTC 2024 - Last Modified: Thu Jun 06 15:43:07 UTC 2024 - 11.5K bytes - Viewed (0) -
pkg/kubelet/cm/qos_container_manager_linux.go
"k8s.io/kubernetes/pkg/api/v1/resource" v1qos "k8s.io/kubernetes/pkg/apis/core/v1/helper/qos" kubefeatures "k8s.io/kubernetes/pkg/features" ) const ( // how often the qos cgroup manager will perform periodic update // of the qos level cgroup resource constraints periodicQOSCgroupUpdateInterval = 1 * time.Minute ) type QOSContainerManager interface { Start(func() v1.ResourceList, ActivePodsFunc) error
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 20:42:59 UTC 2024 - 13.3K bytes - Viewed (0) -
cmd/handler-api.go
gzipObjects bool rootAccess bool syncEvents bool objectMaxVersions int64 } const ( cgroupV1MemLimitFile = "/sys/fs/cgroup/memory/memory.limit_in_bytes" cgroupV2MemLimitFile = "/sys/fs/cgroup/memory.max" cgroupMemNoLimit = 9223372036854771712 ) func cgroupMemLimit() (limit uint64) { buf, err := os.ReadFile(cgroupV2MemLimitFile) if err != nil {
Registered: Sun Jun 16 00:44:34 UTC 2024 - Last Modified: Wed Jun 12 08:13:12 UTC 2024 - 10.4K bytes - Viewed (0) -
cmd/kubelet/app/server.go
if err != nil { return err } if reservedSystemCPUs.Size() > 0 { // at cmd option validation phase it is tested either --system-reserved-cgroup or --kube-reserved-cgroup is specified, so overwrite should be ok klog.InfoS("Option --reserved-cpus is specified, it will overwrite the cpu setting in KubeReserved and SystemReserved", "kubeReserved", s.KubeReserved, "systemReserved", s.SystemReserved)
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 07 00:05:34 UTC 2024 - 53.9K bytes - Viewed (0) -
build/common.sh
docker_run_opts+=( --env "GOLDFLAGS=${GOLDFLAGS:-}" ) fi if [[ -n "${DOCKER_CGROUP_PARENT:-}" ]]; then kube::log::status "Using ${DOCKER_CGROUP_PARENT} as container cgroup parent" docker_run_opts+=(--cgroup-parent "${DOCKER_CGROUP_PARENT}") fi # If we have stdin we can run interactive. This allows things like 'shell.sh' # to work. However, if we run this way and don't have stdin, then it ends up
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Thu Jun 06 16:13:15 UTC 2024 - 26.5K bytes - Viewed (0) -
pkg/kubelet/kubelet_pods.go
func (kl *Kubelet) HandlePodCleanups(ctx context.Context) error { // The kubelet lacks checkpointing, so we need to introspect the set of pods // in the cgroup tree prior to inspecting the set of pods in our pod manager. // this ensures our view of the cgroup tree does not mistakenly observe pods // that are added after the fact... var ( cgroupPods map[types.UID]cm.CgroupName err error )
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 14 16:09:17 UTC 2024 - 101.2K bytes - Viewed (0) -
pkg/features/kube_features.go
// owner: @marquiz // kep: http://kep.k8s.io/4033 // alpha: v1.28 // // Enable detection of the kubelet cgroup driver configuration option from // the CRI. The CRI runtime also needs to support this feature in which // case the kubelet will ignore the cgroupDriver (--cgroup-driver) // configuration option. If runtime doesn't support it, the kubelet will // fallback to using it's cgroupDriver option.
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Wed Jun 12 22:51:23 UTC 2024 - 45.2K bytes - Viewed (0) -
cluster/gce/gci/configure-helper.sh
umask 027 echo "Defaults secure_path=\"${KUBE_HOME}/bin:${sudo_path}\"" > /etc/sudoers.d/kube_secure_path ) fi } function detect-cgroup-config { CGROUP_CONFIG=$(stat -fc %T /sys/fs/cgroup/) echo "Detected cgroup config as ${CGROUP_CONFIG}" } function override-pv-recycler { if [[ -z "${PV_RECYCLER_OVERRIDE_TEMPLATE:-}" ]]; then
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Mon Jun 10 22:07:47 UTC 2024 - 141.1K bytes - Viewed (0) -
pkg/kubelet/kubelet.go
// Monitor resource usage resourceAnalyzer serverstats.ResourceAnalyzer // Whether or not we should have the QOS cgroup hierarchy for resource management cgroupsPerQOS bool // If non-empty, pass this to the container runtime as the root cgroup. cgroupRoot string // Mounter to use for volumes. mounter mount.Interface // hostutil to interact with filesystems
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Fri Jun 14 16:09:17 UTC 2024 - 126.1K bytes - Viewed (0) -
CHANGELOG/CHANGELOG-1.28.md
- If using cgroups v2, then the cgroup aware OOM killer will be enabled for container cgroups via `memory.oom.group` . This causes processes within the cgroup to be treated as a unit and killed simultaneously in the event of an OOM kill on any process in the cgroup. ([#117793](https://github.com/kubernetes/kubernetes/pull/117793), [@tzneal](https://github.com/tzneal)) [SIG Apps, Node and Testing]...
Registered: Sat Jun 15 01:39:40 UTC 2024 - Last Modified: Tue Jun 11 23:47:59 UTC 2024 - 408.3K bytes - Viewed (0)