Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Simpler v2 cgroup interface #109

Merged
merged 3 commits into from
Nov 6, 2019
Merged

Conversation

crosbymichael
Copy link
Member

The resource type is changed in this but I would rather have a v2 native
Resource type and do a mapping from an OCI spec's resource to the v2.Resource
type.

ref #104

Signed-off-by: Michael Crosby [email protected]

@crosbymichael
Copy link
Member Author

@AkihiroSuda and @Zyqsempai please take a look at this new approach. it should make things much easier to manage and extend.

@codecov-io
Copy link

codecov-io commented Nov 5, 2019

Codecov Report

Merging #109 into master will not change coverage.
The diff coverage is n/a.

Impacted file tree graph

@@           Coverage Diff           @@
##           master     #109   +/-   ##
=======================================
  Coverage   45.42%   45.42%           
=======================================
  Files          23       23           
  Lines        1638     1638           
=======================================
  Hits          744      744           
  Misses        768      768           
  Partials      126      126

Continue to review full report at Codecov.

Legend - Click here to learn more
Δ = absolute <relative> (impact), ø = not affected, ? = missing data
Powered by Codecov. Last update c0a1dbc...54a40c2. Read the comment docs.

v2/controller.go Outdated
}

func (c *Controller) Delete() error {
return remove(c.path)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

can be just os.Remove?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we still need the remove all logic but i'm not sure if this is more robust in v2

@AkihiroSuda
Copy link
Member

cmd/cgroups-playground needs to be updated

@crosbymichael crosbymichael force-pushed the v2-controller branch 2 times, most recently from 3537de5 to 677330f Compare November 6, 2019 15:36
The resource type is changed in this but I would rather have a v2 native
Resource type and do a mapping from an OCI spec's resource to the v2.Resource
type.

Signed-off-by: Michael Crosby <[email protected]>
Copy link
Contributor

@Zyqsempai Zyqsempai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You removed everything from playground, do we have any chance to test your solution?

@crosbymichael
Copy link
Member Author

Ok, pushed a big update. This has stats implemented along with renaming the playground tool to cgctl with a couple methods to play with this.

NAME:
   cgctl - cgroup v2 management tool

USAGE:
   cgctl [global options] command [command options] [arguments...]

VERSION:
   1

COMMANDS:
   new      create a new cgroup
   del      delete a cgroup
   list     list processes in a cgroup
   stat     stat a cgroup
   help, h  Shows a list of commands or help for one command

GLOBAL OPTIONS:
   --debug             enable debug output in the logs
   --mountpoint value  cgroup mountpoint (default: "/sys/fs/cgroup")
   --help, -h          show help
   --version, -v       print the version
> sudo ./cgctl new --enable test
> sudo ./cgctl list test
> sudo ./cgctl stat test
> sudo ./cgctl del test

if err != nil {
return err
}
if err := c.ToggleControllers(controllers, v2.Enable); err != nil {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This needs to be done for the parent group?

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

you don't need to enable this at all if the system is setup to enable them

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

When you have cpu in the top group /sys/fs/cgroup, cpu is enabled for /sys/fs/cgroup/foo, but not enabled for /sys/fs/cgroup/foo/bar.

root@suda-ws01:/sys/fs/cgroup# cat cgroup.controllers 
cpuset cpu io memory pids rdma
root@suda-ws01:/sys/fs/cgroup# mkdir foo
root@suda-ws01:/sys/fs/cgroup# cat foo/cgroup.controllers 
cpu io memory pids
root@suda-ws01:/sys/fs/cgroup# mkdir foo/bar
root@suda-ws01:/sys/fs/cgroup# cat foo/bar/cgroup.controllers 
root@suda-ws01:/sys/fs/cgroup#

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes, its up to the creator of the cgroup to enable these. I don't think the sub cgroup should modify the parent settings


// VerifyGroupPath verifies the format of g.
// VerifyGroupPath doesn't verify whether g actually exists on the system.
func VerifyGroupPath(g GroupPath) error {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

this function can be kept

}
out := make(map[string]uint64)
for _, controller := range controllers {
filename := fmt.Sprintf("%s.stat", controller)
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

how will it work for other files such as pids.current?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Probably we should either add file name to key or return map[string]map[string]interface{}

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

i'ts still a uint

@crosbymichael
Copy link
Member Author

We don't have to fix everything in this PR, it's meant to show that we can simplify things for v2 and to get this in so we can carry on the work

Copy link
Contributor

@Zyqsempai Zyqsempai left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I agree with @crosbymichael we shouldn't waste our time on perfecting this particular Pr, anyway, we have a lot of work to do so far. So I think we can merge it and polish it little by little in further PR's.

Copy link
Member

@estesp estesp left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@estesp estesp merged commit 82928e8 into containerd:master Nov 6, 2019
@crosbymichael crosbymichael deleted the v2-controller branch November 6, 2019 20:04
AkihiroSuda added a commit to AkihiroSuda/containerd-cgroups that referenced this pull request Nov 7, 2019
@AkihiroSuda
Copy link
Member

follow-up: #110

AkihiroSuda added a commit to AkihiroSuda/runc that referenced this pull request Nov 7, 2019
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix opencontainers#2157

Signed-off-by: Akihiro Suda <[email protected]>
AkihiroSuda added a commit to AkihiroSuda/runc that referenced this pull request Dec 6, 2019
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix opencontainers#2157

Signed-off-by: Akihiro Suda <[email protected]>
AkihiroSuda added a commit to AkihiroSuda/runc that referenced this pull request Dec 6, 2019
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix opencontainers#2157

Signed-off-by: Akihiro Suda <[email protected]>
AkihiroSuda added a commit to AkihiroSuda/runc that referenced this pull request Dec 6, 2019
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix opencontainers#2157

Signed-off-by: Akihiro Suda <[email protected]>
adrianreber pushed a commit to adrianreber/runc that referenced this pull request Feb 10, 2020
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix opencontainers#2157

Signed-off-by: Akihiro Suda <[email protected]>
dims pushed a commit to dims/libcontainer that referenced this pull request Oct 19, 2024
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix #2157

Signed-off-by: Akihiro Suda <[email protected]>
dims pushed a commit to dims/libcontainer that referenced this pull request Oct 19, 2024
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix #2157

Signed-off-by: Akihiro Suda <[email protected]>
dims pushed a commit to dims/libcontainer that referenced this pull request Oct 19, 2024
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd/cgroups#109

Fix #2157

Signed-off-by: Akihiro Suda <[email protected]>
kolyshkin pushed a commit to kolyshkin/containerd-cgroups that referenced this pull request Nov 6, 2024
split fs2 package from fs, as mixing up fs and fs2 is very likely to result in
unmaintainable code.

Inspired by containerd#109

Fix #2157

Signed-off-by: Akihiro Suda <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants