You are viewing a plain text version of this content. The canonical link for it is here.
Posted to notifications@yetus.apache.org by "Allen Wittenauer (JIRA)" <ji...@apache.org> on 2018/01/17 16:13:00 UTC

[jira] [Updated] (YETUS-561) Ability to limit user process counts and Docker container's RAM usage

     [ https://issues.apache.org/jira/browse/YETUS-561?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ]

Allen Wittenauer updated YETUS-561:
-----------------------------------
    Release Note: 
<!-- markdown -->
Apache Yetus now enforces some basic controls around resource limits.

* `--proclimit` sets `ulimit -Sh` for an upper bound on the amount of processes and Java native threads that may be spawned.  The default is set to 1000.

* Docker `--memory` sizes are now sized with the `--dockermemlimit` option.  By default,  4 gigabytes are allocated.

* Docker mode will set the OOM adjustment value for any process within the container to 500.  This is to help guide the kernel to kill Apache Yetus spawned processes before potentially killing any others in low memory conditions.  This is to prevent the death of, for example, the Jenkins agent.

If any process attempts to violate those controls over those limits, there is a very high chance that any process spawned by Apache Yetus and Apache Yetus itself will be killed.  

  was:
<!-- markdown -->
Apache Yetus now has some basic controls around resource limits:

* `--proclimit` sets `ulimit -Sh` for an upper bound on the amount of processes and Java native threads that may be spawned.  The default is set to 1000.

* Docker `--memory` sizes are now sized with the `--dockermemlimit` option.  By default,  4 gigabytes are allocated.

* Docker mode will set the OOM adjustment value for any process within the container to 500.  This is to help guide the kernel to kill Apache Yetus spawned processes before potentially killing any others in low memory conditions.  This is to prevent the death of, for example, the Jenkins agent.

If any process attempts to violate those controls over those limits, there is a very high chance that any process spawned by Apache Yetus and Apache Yetus itself will be killed.  


> Ability to limit user process counts and Docker container's RAM usage
> ---------------------------------------------------------------------
>
>                 Key: YETUS-561
>                 URL: https://issues.apache.org/jira/browse/YETUS-561
>             Project: Yetus
>          Issue Type: New Feature
>          Components: Test Patch
>    Affects Versions: 0.6.0
>            Reporter: Allen Wittenauer
>            Assignee: Allen Wittenauer
>            Priority: Critical
>             Fix For: 0.7.0
>
>         Attachments: YETUS-561.00.patch, YETUS-561.01.patch, YETUS-561.02.patch, YETUS-561.03.patch, YETUS-561.04.patch, YETUS-561.05.patch
>
>
> Hadoop is blowing up nodes due to unit tests that consume all of RAM.  In an attempt to keep nodes alive, Yetus needs the ability to put an upper limit on the amount that a Docker container can use.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)