-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Need to run ulimit -n 3000000
before running m3dbnode
#137
Comments
Hmm, this is a bit tougher now that our changes (#107) to lock down pod privileges are on a tagged release. I'll see if we can do something like an init container if the user sets a security context allowing |
Ref m3db/m3#1666 |
I don't suppose there's any update on this? I'm currently working through deploying an M3 cluster on AWS and, even though the limits are set correctly within the VMs, I'm getting I tried using |
I have tried the following configurations and I'm still getting the errors listed above: Trying workarounds from m3db/m3#1800. Adding just the "SYS_RESOURCE" capability does not work:
Adding the "privileged" flag does not work:
Adding both "privileged" and "SYS_ADMIN" (inspiration from https://godoc.org/k8s.io/api/core/v1#SecurityContext comment on field AllowPrivilegeEscalation) does not work either:
Are the securityContext, podSecurityContext parameters being used or just accepted? When I try to describe my pods, I don't see anything on the pod or stateful set that indicates these values are being used. |
Currently the container will start
m3dbnode
regardless of the ulimit settings for the current user.m3dbnode
will continuously print an error to the log about ulimits:It's possible for
m3dbnode
to use thesetrlimit
system call to change the limit, but that's a separate issue.A workaround is to patch each statefulset like this:
The text was updated successfully, but these errors were encountered: