Skip to content

Commit 396812a

Browse files
authored
Merge pull request #34499 from jmencak/4.9-mention-nto
sysctls: mention NTO as a way to set node-level sysctls.
2 parents 7eb1282 + aa255c0 commit 396812a

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

modules/nodes-containers-sysctls-about.adoc

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -44,7 +44,9 @@ version and distributor.
4444
Sysctls that are not namespaced are called _node-level_ and must be set
4545
manually by the cluster administrator, either by means of the underlying Linux
4646
distribution of the nodes, such as by modifying the *_/etc/sysctls.conf_* file,
47-
or by using a daemon set with privileged containers.
47+
or by using a daemon set with privileged containers. You can use
48+
the Node Tuning Operator to set _node-level_ sysctls.
49+
4850

4951
[NOTE]
5052
====

nodes/containers/nodes-containers-sysctls.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -11,7 +11,8 @@ toc::[]
1111
Sysctl settings are exposed via Kubernetes, allowing users to modify certain
1212
kernel parameters at runtime for namespaces within a container. Only sysctls
1313
that are namespaced can be set independently on pods. If a sysctl is not
14-
namespaced, called _node-level_, it cannot be set within {product-title}.
14+
namespaced, called _node-level_, you must use another method of setting the sysctl, such as the
15+
xref:../../scalability_and_performance/using-node-tuning-operator.adoc#using-node-tuning-operator[Node Tuning Operator].
1516
Moreover, only those sysctls considered _safe_ are whitelisted by default; you
1617
can manually enable other _unsafe_ sysctls on the node to be available to the
1718
user.

0 commit comments

Comments
 (0)