-
Notifications
You must be signed in to change notification settings - Fork 195
create docker ramdisk test #429
Comments
@jodh-intel , I can create a test where I set the environment variable of DOCKER_RAMDISK=true and then run a container, do you think this is the best approach? |
Sounds fine to me. Maybe we could get some input from @wwq19920405 on the sorts of test that we could run here? We need to make sure we unset the |
This will set as environment variable DOCKER_RAMDISK=true while doing a docker run. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will set as environment variable DOCKER_RAMDISK=true while doing a docker run. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will set as environment variable DOCKER_RAMDISK=true while doing a docker run. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will set as environment variable DOCKER_RAMDISK=true while doing a docker run. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
backgroundIn our production environment, the OS is running on the memory. We must start dockerd with the
According to the annotation in docker, they will use chroot instead of pivot_root.
The kata-runtime is based on qemu, i'm not sure the difference between chroot and pivot_root in kata-runtime. During the Hackthon in Beijing, i consulted @WeiZhang555 and @gnawux about this question. The kata-runtime don't need to think about chroot or pivot_root, so this PR( kata-containers/runtime#423 ) just add the no-pivot flag without more logic. recent situationDue to some limits, we still use runc in the production environment, and there is no more detailed test data about kata-runtime. Can you (@jodh-intel) provide some suggestions about the test, i would like to test and give a feedback. In the latest version, we can use the runc and kata-runtime together with
Without
|
Hi @wwq19920405 - sorry, I'm confused. It doesn't appear that the docker ramdisk feature is well documented (although maybe I've just been unlucky finding info on it). Can you explain how you setup docker for use with a ramdisk? I read something that suggested you run I retract my "sounds fine to me" comment in #429 (comment) since if we just create a test with the For a good test, we need to ensure our test environment is setup correctly to run docker using a ramdisk (just for this test). But we also need to check that a ramdisk is being used somehow. |
Ping @wwq19920405. |
@wwq19920405 @jodh-intel @GabyCT
I don't think setting Can you confirm pls @wwq19920405 Maybe we can separate this test - 'does |
I agree that for our runtime, it's a "nop". But that makes the test arguably useless - we won't know if it ever breaks. I think a "fuller" test would be to test the four scenarios @wwq19920405 lists in #429 (comment) so that along with the Alternatively, we could just land #446 and create a separate PR for the |
I don't think the test is totally useless - it is checking that our runtime benignly supports I'll open a new issue, and let's try and land #446. |
Yes, it's not totally useless but I'd be concerned that we don't know what it is actually giving us if docker changes. A thought occurs... rather than actually running the docker tests, we could just add the following to our CI to supplement what is already on #446.
Yes, it's totally fragile, but that's kind of the point - we want to know when docker change this code. |
We do have a bot type thing (internal to Intel right now?) that checks for a number of things, such as k8s, OCI and runc version and feature updates I think. This feels like something that belongs more there than in the CI to me - it does not need to run on every CI run, but on a reasonably short periodic cycle (daily would be nice). Let's discuss, and then open an Issue if we see this as a good and viable path. |
hi @jodh-intel, i found You can add a mock-runtime in
And it's easy to find
|
Thanks @wwq19920405. @GabyCT - could you take a look at this? |
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
This will ensure that we can run with DOCKER_RAMDISK and than --no-pivot flag is supported. Fixes kata-containers#429 Signed-off-by: Gabriela Cervantes <[email protected]>
Once kata-containers/runtime#412 lands, we need a test that checks to ensure a container can be run in a ramdisk.
The text was updated successfully, but these errors were encountered: