-
Notifications
You must be signed in to change notification settings - Fork 584
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move chroot from multus main process to its child processes #1161
Conversation
Thank you so much for great PR, @pliurh ! Overall desgin makes sense to me. One minor comments but this PR implicitly requires to manifest to mount CNI bin directory to same path in container host. (e.g. if /opt/cni/bin is the CNI bin directory, multus-daemon pod has to mount it with same path /opt/cni/bin, not /opt/bin. |
aa19590
to
e0f3681
Compare
We used to run chroot in multus main process when calling other CNI plugin binary. We also use a mutex to lock the access to pod files. But this causes performance issues when facing heavy CNI_ADD/CNI_DEL requests. With this patch, we do chroot in the child processes instead. So file operations in the main process will not be affected by chroot. This change requires the multus thick plugin pod to mount CNI bin directory to the same path in the container host. Signed-off-by: Peng Liu <[email protected]>
…rkplumbingwg#1161) We used to run chroot in multus main process when calling other CNI plugin binary. We also use a mutex to lock the access to pod files. But this causes performance issues when facing heavy CNI_ADD/CNI_DEL requests. With this patch, we do chroot in the child processes instead. So file operations in the main process will not be affected by chroot. This change requires the multus thick plugin pod to mount CNI bin directory to the same path in the container host. Signed-off-by: Peng Liu <[email protected]>
line 173 of deployments/multus-daemonset-thick.yml should be:
|
…rkplumbingwg#1161) We used to run chroot in multus main process when calling other CNI plugin binary. We also use a mutex to lock the access to pod files. But this causes performance issues when facing heavy CNI_ADD/CNI_DEL requests. With this patch, we do chroot in the child processes instead. So file operations in the main process will not be affected by chroot. This change requires the multus thick plugin pod to mount CNI bin directory to the same path in the container host. Signed-off-by: Peng Liu <[email protected]>
…rkplumbingwg#1161) We used to run chroot in multus main process when calling other CNI plugin binary. We also use a mutex to lock the access to pod files. But this causes performance issues when facing heavy CNI_ADD/CNI_DEL requests. With this patch, we do chroot in the child processes instead. So file operations in the main process will not be affected by chroot. This change requires the multus thick plugin pod to mount CNI bin directory to the same path in the container host. Signed-off-by: Peng Liu <[email protected]>
OCPBUGS-18995: Move chroot from multus main process to its child processes (k8snetworkplumbingwg#1161)
We used to run chroot in multus main process when calling other CNI plugin binary. We also use a mutex to lock the access to pod files. But this causes performance issues when facing heavy CNI_ADD/CNI_DEL requests.
With this patch, we do chroot in the child processes instead. So file operations in the main process will not be affected by chroot.
This change requires the multus thick plugin pod to mount CNI bin directory to the same path in the container host.
fixes https://issues.redhat.com/browse/OCPBUGS-18995