Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,11 @@
},
"transparentHugePageEnabled": "always",
"transparentHugePageDefrag": "madvise",
"swapFileSizeMB": 1500
"swapFileSizeMB": 1500,
"ulimits": {
"maxLockedMemory": "infinity",
"noFile": "1000"
}
}
}
}
Expand Down Expand Up @@ -74,7 +78,11 @@
},
"transparentHugePageEnabled": "always",
"transparentHugePageDefrag": "madvise",
"swapFileSizeMB": 1500
"swapFileSizeMB": 1500,
"ulimits": {
"noFile": "1000",
"maxLockedMemory": "infinity"
}
}
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -6522,6 +6522,10 @@
"type": "integer",
"format": "int32",
"description": "The size in MB of a swap file that will be created on each node."
},
"ulimits": {
"$ref": "#/definitions/UlimitConfig",
"description": "Ulimit settings for Linux agent nodes."
}
}
},
Expand Down Expand Up @@ -6635,6 +6639,8 @@
"netIpv4TcpkeepaliveIntvl": {
"type": "integer",
"format": "int32",
"minimum": 10,
"maximum": 90,
"description": "Sysctl setting net.ipv4.tcp_keepalive_intvl."
},
"netIpv4TcpTwReuse": {
Expand Down Expand Up @@ -6663,11 +6669,15 @@
"netNetfilterNfConntrackMax": {
"type": "integer",
"format": "int32",
"minimum": 131072,
Copy link
Copy Markdown
Contributor Author

@UtheMan UtheMan Jun 21, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

All the changes for minimum/maximum were not there before, hence they are getting reported as broken changes (even though new ranges are bigger than the limits we enforced before)

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We could also remove these range changes to avoid breaking errors, no preference.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Consult with @FumingZhang, but IMO it's OK to add these as they are bigger than the old actual limits enforced by the old RP. Also happy to remove if we don't want to deal with breaking change pain it adds, but if we do decide to remove we should consider putting it into the documentation manually what the min/max values are.

Copy link
Copy Markdown
Contributor Author

@UtheMan UtheMan Jun 22, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

There will be more changes to custom node config in the coming months, I could add all the limitations to swagger then, to avoid adding it only to select few parameters.

So now I'd remove them for easier merge of those changes and re-add them with new changes in the coming months, thoughts? @matthchr @FumingZhang

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should in theory be able to get this merged without too much issue as is, IMO. But really defer to what @FumingZhang thinks/wants here. My 2c is keep them.

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks Matthew! Will wait for Fuming's opinion.

Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think it's ok to have such a breaking change, will go through the breaking change review once I create the PR based on the dev branch later.

"maximum": 2097152,
"description": "Sysctl setting net.netfilter.nf_conntrack_max."
},
"netNetfilterNfConntrackBuckets": {
"type": "integer",
"format": "int32",
"minimum": 65536,
"maximum": 524288,
"description": "Sysctl setting net.netfilter.nf_conntrack_buckets."
},
"fsInotifyMaxUserWatches": {
Expand Down Expand Up @@ -6712,6 +6722,20 @@
}
}
},
"UlimitConfig": {
"description": "Ulimit settings for Linux agent nodes",
"type": "object",
"properties": {
"maxLockedMemory": {
"type": "string",
"description": "Maximum locked-in-memory address space (KB)"
},
"noFile": {
Comment thread
matthchr marked this conversation as resolved.
"type": "string",
"description": "Maximum number of open files"
}
}
},
"ManagedClusterHTTPProxyConfig": {
"description": "Cluster HTTP proxy configuration.",
"type": "object",
Expand Down