1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

sysctl tutorial: drop net.ipv4.route.min_pmtu

The tutorial is busted, and likely always has been busted. the net.* sysctls are applied to containers when they're in a private network namespace.
However, net.ipv4.route.min_pmtu is not one of the sysctls that are added to a new network namespace.

This commit replaces uses with "net.core.somaxconn", an unsafe sysctl that is able to be applied to a namespace

Signed-off-by: Peter Hunt <pehunt@redhat.com>
This commit is contained in:
Peter Hunt
2021-05-27 15:09:10 -04:00
committed by openshift-cherrypick-robot
parent f87e75acfe
commit 3ccf736bd1
2 changed files with 4 additions and 4 deletions

View File

@@ -14,7 +14,7 @@ that node. As with node-level sysctls, use the taints and toleration feature
or labels on nodes to schedule those pods onto the right nodes.
The following example uses the pod `securityContext` to set a safe sysctl
`kernel.shm_rmid_forced` and two unsafe sysctls, `net.ipv4.route.min_pmtu` and
`kernel.shm_rmid_forced` and two unsafe sysctls, `net.core.somaxconn` and
`kernel.msgmax`. There is no distinction between _safe_ and _unsafe_ sysctls in
the specification.
@@ -42,8 +42,8 @@ spec:
sysctls:
- name: kernel.shm_rmid_forced
value: "0"
- name: net.ipv4.route.min_pmtu
value: "552"
- name: net.core.somaxconn
value: "1024"
- name: kernel.msgmax
value: "65536"
...

View File

@@ -60,7 +60,7 @@ spec:
kubeletConfig:
allowedUnsafeSysctls: <2>
- "kernel.msg*"
- "net.ipv4.route.min_pmtu"
- "net.core.somaxconn"
----
<1> Specify the label from the machine config pool.
<2> List the unsafe sysctls you want to allow.