yetus-notifications mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From "Allen Wittenauer (JIRA)" <j...@apache.org>
Subject [jira] [Updated] (YETUS-561) Ability to limit user process counts and Docker container's RAM usage
Date Wed, 17 Jan 2018 16:13:00 GMT

     [ https://issues.apache.org/jira/browse/YETUS-561?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
]

Allen Wittenauer updated YETUS-561:
-----------------------------------
    Release Note: 
<!-- markdown -->
Apache Yetus now enforces some basic controls around resource limits.

* `--proclimit` sets `ulimit -Sh` for an upper bound on the amount of processes and Java native
threads that may be spawned.  The default is set to 1000.

* Docker `--memory` sizes are now sized with the `--dockermemlimit` option.  By default, 
4 gigabytes are allocated.

* Docker mode will set the OOM adjustment value for any process within the container to 500.
 This is to help guide the kernel to kill Apache Yetus spawned processes before potentially
killing any others in low memory conditions.  This is to prevent the death of, for example,
the Jenkins agent.

If any process attempts to violate those controls over those limits, there is a very high
chance that any process spawned by Apache Yetus and Apache Yetus itself will be killed.  

  was:
<!-- markdown -->
Apache Yetus now has some basic controls around resource limits:

* `--proclimit` sets `ulimit -Sh` for an upper bound on the amount of processes and Java native
threads that may be spawned.  The default is set to 1000.

* Docker `--memory` sizes are now sized with the `--dockermemlimit` option.  By default, 
4 gigabytes are allocated.

* Docker mode will set the OOM adjustment value for any process within the container to 500.
 This is to help guide the kernel to kill Apache Yetus spawned processes before potentially
killing any others in low memory conditions.  This is to prevent the death of, for example,
the Jenkins agent.

If any process attempts to violate those controls over those limits, there is a very high
chance that any process spawned by Apache Yetus and Apache Yetus itself will be killed.  


> Ability to limit user process counts and Docker container's RAM usage
> ---------------------------------------------------------------------
>
>                 Key: YETUS-561
>                 URL: https://issues.apache.org/jira/browse/YETUS-561
>             Project: Yetus
>          Issue Type: New Feature
>          Components: Test Patch
>    Affects Versions: 0.6.0
>            Reporter: Allen Wittenauer
>            Assignee: Allen Wittenauer
>            Priority: Critical
>             Fix For: 0.7.0
>
>         Attachments: YETUS-561.00.patch, YETUS-561.01.patch, YETUS-561.02.patch, YETUS-561.03.patch,
YETUS-561.04.patch, YETUS-561.05.patch
>
>
> Hadoop is blowing up nodes due to unit tests that consume all of RAM.  In an attempt
to keep nodes alive, Yetus needs the ability to put an upper limit on the amount that a Docker
container can use.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

Mime
View raw message