@@ -167,7 +167,7 @@ The responsibility of managing the Linux cgroups is currently split between the
167
167
kubelet and the container runtime. Kubelet takes care of the pod (sandbox)
168
168
level cgroups whereas the runtime is responsible for per-container cgroups.
169
169
There currently are two different low-level management interfaces for cgroups:
170
- maninpulating the cgroupfs directly or using the systemd system management
170
+ manipulating the cgroupfs directly or using the systemd system management
171
171
daemon to manage them. Currently, both the kubelet and the container runtime
172
172
has a configuration setting for selecting the cgroup driver (cgroupfs or
173
173
systemd). These settings must be in sync, both kubelet and the runtime
@@ -230,7 +230,8 @@ used.
230
230
message RuntimeStatus {
231
231
// List of current observed runtime conditions.
232
232
repeated RuntimeCondition conditions = 1;
233
- + // Configuration settings of the runtime
233
+ + // Configuration settings of the runtime. This field contains global
234
+ + // runtime configuration options that are not specific to runtime handlers.
234
235
+ RuntimeConfiguration configuration = 2;
235
236
}
236
237
@@ -264,9 +265,7 @@ will take precedence over cgroupDriver setting from the kubelet config (or
264
265
` --cgroup-driver ` command line flag). If the runtime does not provide
265
266
information about the cgroup driver, then kubelet will fall back to using its
266
267
own configuration (` cgroupDriver ` from kubeletConfig or the ` --cgroup-driver `
267
- flag). Further, the kubeletConfig field and ` --cgroup-driver ` flag will be
268
- marked as deprecated, to be dropped when the runtimes the Kubelet is supported
269
- to run with all support the flag.
268
+ flag).
270
269
271
270
Kubelet startup is modified so that connection to the CRI server (container
272
271
runtime) is established and RuntimeStatus is queried before initializing the
@@ -622,7 +621,10 @@ checking if there are objects with field X set) may be a last resort. Avoid
622
621
logs or events for this purpose.
623
622
-->
624
623
625
- Kubelet and container runtime version.
624
+ Kubelet and container runtime version. The
625
+ [ ` crictl ` ] ( https://kubernetes.io/docs/tasks/debug/debug-cluster/crictl/ ) tool
626
+ can be used to determine if the container runtime supports the feature (`crictl
627
+ info`).
626
628
627
629
###### How can someone using this feature know that it is working for their instance?
628
630
@@ -839,7 +841,7 @@ For each of them, fill in the following information by copying the below templat
839
841
- Testing: Are there any tests for failure mode? If not, describe why.
840
842
-->
841
843
842
- Same that exist today: Kubelet and the CRI server (container runtime) not
844
+ Same that exists today: Kubelet and the CRI server (container runtime) not
843
845
agreeing on the CgroupDriver while one of them doesn’t support the feature.
844
846
845
847
###### What steps should be taken if SLOs are not being met to determine the problem?
0 commit comments