Skip to content

Virtual Machine agent for hardware virtualized containers

License

Notifications You must be signed in to change notification settings

lifupan/agent

This branch is 62 commits behind kata-containers/agent:master.

Folders and files

NameName
Last commit message
Last commit date
Dec 3, 2019
Mar 22, 2018
Jun 13, 2019
Oct 25, 2018
Mar 22, 2019
Apr 20, 2020
Mar 13, 2019
Jan 23, 2020
Mar 13, 2019
Sep 16, 2019
Feb 20, 2019
Dec 4, 2017
Jan 29, 2018
Jan 29, 2020
Jan 23, 2020
Jan 23, 2020
Nov 13, 2017
Feb 24, 2020
Mar 13, 2020
Oct 24, 2019
Apr 17, 2020
Apr 20, 2020
Apr 20, 2020
Mar 13, 2019
Nov 21, 2019
Feb 15, 2019
May 7, 2020
Mar 13, 2019
Mar 13, 2020
Mar 13, 2020
Mar 4, 2020
Mar 4, 2020
Mar 4, 2020
Mar 4, 2020
Mar 4, 2020
Nov 1, 2019
Sep 19, 2018
Sep 19, 2018
Apr 20, 2020
Apr 20, 2020
Mar 13, 2019
Mar 20, 2019
May 31, 2019
Mar 13, 2019
Mar 13, 2019
Apr 11, 2019
May 7, 2018
Sep 19, 2018
Apr 13, 2018
Apr 14, 2020
Apr 14, 2020
Jun 26, 2018
May 22, 2018
Jan 28, 2020
Jan 28, 2020
Oct 3, 2018
Oct 3, 2018
Oct 23, 2019
Oct 23, 2019
Aug 1, 2018
Sep 19, 2018
Mar 25, 2020
May 9, 2018
Oct 18, 2019

Repository files navigation

Build Status codecov

Kata Containers Agent

This project implements an agent called kata-agent that runs inside a virtual machine (VM).

The agent manages container processes inside the VM, on behalf of the runtime running on the host.

Debug mode

To enable agent debug output, add the agent.log=debug option to the guest kernel command line.

See the developer guide for further details.

Developer mode

Add agent.devmode to the guest kernel command line to allow the agent process to coredump (disabled by default). Specifying this option implicitly enables debug mode.

Enable trace support

See the tracing guide.

Enable debug console

Add agent.debug_console to the guest kernel command line to allow the agent process to start a debug console. Debug console is only available if bash or sh is installed in the rootfs or initrd image. Developers can connect to the virtual machine using the debug console

Enable debug console for firecracker

Firecracker doesn't have a UNIX socket connected to /dev/console, hence the kernel command line option agent.debug_console will not work for firecracker. Fortunately, firecracker supports hybrid vsocks, and they can be used to communicate processes in the guest with processes in the host. The kernel command line option agent.debug_console_vport was added to allow developers specify on which vsock port the debugging console should be connected.

In firecracker, the UNIX socket that is connected to the vsock end is created at /var/lib/vc/firecracker/$CID/root/kata.hvsock, where $CID is the container ID.

Run the following commands to have a debugging console in firecracker.

$ conf="/usr/share/defaults/kata-containers/configuration.toml"
$ sudo sed -i 's/^kernel_params.*/kernel_params="agent.debug_console_vport=1026"/g' "${conf}"
$ sudo su -c 'cd /var/lib/vc/firecracker/08facf/root/ && socat stdin unix-connect:kata.hvsock'
CONNECT 1026

NOTE: Ports 1024 and 1025 are reserved for communication with the agent and gathering of agent logs respectively

cpuset cgroup details

See the cpuset cgroup documentation.

Hotplug Timeout

When hot plugging devices into the Kata VM, the agent will wait by default for 3 seconds for the device to be plugged in and the corresponding add uevent for the device. If the timeout is reached without the above happening, the hot plug action will fail.

The length of the timeout can be increased by specifying the agent.hotplug_timeout to the guest kernel command line. For example, agent.hotplug_timeout=10s will increase the timeout to 10 seconds. The value of the option is in the Go duration format.

Any invalid values used for agent.hotplug_timeout will fall back to the default of 3 seconds.

Cgroups V2

Same as systemd, the kata-agent has an option to enable or disable the unified cgroup hierarchy (cgroups v2) in the guest through the kernel command line. Set agent.unified_cgroup_hierarchy to 1 or true to enable cgroups v2. For example, agent.unified_cgroup_hierarchy=true will enable cgroups v2 in the guest. Set agent.unified_cgroup_hierarchy to 0 or false to disable cgroups v2. For example, agent.unified_cgroup_hierarchy=0 will disable cgroups v2 in the guest. By default cgroups v2 is disabled.

Container Pipe Size

The agent will configure a Pipe for stdio (stdout, stderr, stdin) for each container. By default, this will use the OS' defaults in terms of pipe capacity. However, some workloads may require a larger pipe when writing to stdout/stderr in non-blocking mode.

The pipe's capacity for stdout/stderr can be modified by specifying the agent.container_pipe_size flag to the guest kernel command line. For example, agent.container_pipe_size=2097152 will set the stdout and stderr pipes to 2097152 bytes.

About

Virtual Machine agent for hardware virtualized containers

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 96.9%
  • Shell 1.5%
  • Makefile 1.1%
  • Dockerfile 0.5%