mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-09-28 21:55:48 +00:00
Fix oom-score-adj policy in kubelet.
Docker daemon and kubelet needs to be protected by setting oom-score-adj to -999. Signed-off-by: Vishnu kannan <vishnuk@google.com>
This commit is contained in:
@@ -226,6 +226,7 @@ Pod OOM score configuration
|
||||
|
||||
*Pod infra containers* or *Special Pod init process*
|
||||
- OOM_SCORE_ADJ: -998
|
||||
|
||||
*Kubelet, Docker*
|
||||
- OOM_SCORE_ADJ: -999 (won’t be OOM killed)
|
||||
- Hack, because these critical tasks might die if they conflict with guaranteed containers. In the future, we should place all user-pods into a separate cgroup, and set a limit on the memory they can consume.
|
||||
|
@@ -365,7 +365,7 @@ The `kubelet` will set the following:
|
||||
The `kubelet` at bootstrapping will set the `oom_score_adj` value for Kubernetes
|
||||
daemons, and any dependent container-runtime daemons.
|
||||
|
||||
If `container-runtime` is set to `docker`, then set its `oom_score_adj=-900`
|
||||
If `container-runtime` is set to `docker`, then set its `oom_score_adj=-999`
|
||||
|
||||
## Implementation concerns
|
||||
|
||||
|
Reference in New Issue
Block a user