You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can use xref:../architecture/admission-plug-ins.adoc#admission-plug-ins[admission plugins] to regulate how {product-title} functions. After a resource request is authenticated and authorized, admission plugins intercept the resource request to the master API to validate resource requests and to ensure that scaling policies are adhered to. Admission plugins are used to enforce security policies, resource limitations, configuration requirements, and other settings.
You must configure {rh-openstack} before you install a cluster that uses SR-IOV on it.
19
19
20
-
When installing a cluster using SR-IOV, you must deploy clusters using cgroup v1. For more information, xref:../../installing/install_config/enabling-cgroup-v1.adoc#enabling-cgroup-v1[Enabling Linux control group version 1 (cgroup v1)].
{product-title} uses link:https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html[Linux control group version 2] (cgroup v2) in your cluster.
10
+
11
+
cgroup v2 offers several improvements over cgroup v1, including a unified hierarchy, safer sub-tree delegation, features such as link:https://www.kernel.org/doc/html/latest/accounting/psi.html[Pressure Stall Information], and enhanced resource management and isolation. However, cgroup v2 has different CPU, memory, and I/O management characteristics than cgroup v1. Therefore, some workloads might experience slight differences in memory or CPU usage on clusters that run cgroup v2.
12
+
13
+
[NOTE]
14
+
====
15
+
* If you run third-party monitoring and security agents that depend on the cgroup file system, update the agents to a version that supports cgroup v2.
16
+
* If you have configured cgroup v2 and run cAdvisor as a stand-alone daemon set for monitoring pods and containers, update cAdvisor to v0.43.0 or later.
17
+
* If you deploy Java applications, use versions that fully support cgroup v2, such as the following packages:
18
+
** OpenJDK / HotSpot: jdk8u372, 11.0.16, 15 and later
19
+
** NodeJs 20.3.0 and later
20
+
** IBM Semeru Runtimes: jdk8u345-b01, 11.0.16.0, 17.0.4.0, 18.0.2.0 and later
21
+
** IBM SDK Java Technology Edition Version (IBM Java): 8.0.7.15 and later
Copy file name to clipboardExpand all lines: modules/cnf-tuning-nodes-for-low-latency-via-performanceprofile.adoc
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,9 +14,6 @@ The performance profile lets you control latency tuning aspects of nodes that be
14
14
15
15
You can use a performance profile to specify whether to update the kernel to kernel-rt, to allocate huge pages, and to partition the CPUs for performing housekeeping duties or running workloads.
16
16
17
-
:FeatureName: cgroup v1
18
-
include::snippets/deprecated-feature.adoc[]
19
-
20
17
[NOTE]
21
18
====
22
19
You can manually create the `PerformanceProfile` object or use the Performance Profile Creator (PPC) to generate a performance profile. See the additional resources below for more information on the PPC.
Copy file name to clipboardExpand all lines: modules/nodes-nodes-kernel-arguments.adoc
-59Lines changed: 0 additions & 59 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -18,29 +18,6 @@ Examples of kernel arguments you could set include:
18
18
19
19
* **nosmt**: Disables symmetric multithreading (SMT) in the kernel. Multithreading allows multiple logical threads for each CPU. You could consider `nosmt` in multi-tenant environments to reduce risks from potential cross-thread attacks. By disabling SMT, you essentially choose security over performance.
20
20
21
-
ifndef::openshift-origin[]
22
-
* **systemd.unified_cgroup_hierarchy**: Enables link:https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html[Linux control group version 2] (cgroup v2). cgroup v2 is the next version of the kernel link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/resource_management_guide/ch01[control group] and offers multiple improvements.
23
-
+
24
-
--
25
-
:FeatureName: cgroup v1
26
-
include::snippets/deprecated-feature.adoc[]
27
-
--
28
-
endif::openshift-origin[]
29
-
30
-
ifdef::openshift-origin[]
31
-
* **systemd.unified_cgroup_hierarchy**: Configures the version of Linux control group that is installed on your nodes: link:https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v1.html[cgroup v1] or link:https://www.kernel.org/doc/html/latest/admin-guide/cgroup-v2.html[cgroup v2]. cgroup v2 is the next version of the kernel link:https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/6/html/resource_management_guide/ch01[control group] and offers multiple improvements. However, it can have some unwanted effects on your nodes.
32
-
+
33
-
[NOTE]
34
-
====
35
-
cgroup v2 is enabled by default. To disable cgroup v2, use the `systemd.unified_cgroup_hierarchy=0` kernel argument, as shown in the following procedure.
36
-
====
37
-
+
38
-
--
39
-
:FeatureName: cgroup v1
40
-
include::snippets/deprecated-feature.adoc[]
41
-
--
42
-
endif::openshift-origin[]
43
-
44
21
* **enforcing=0**: Configures Security Enhanced Linux (SELinux) to run in permissive mode. In permissive mode, the system acts as if SELinux is enforcing the loaded security policy, including labeling objects and emitting access denial entries in the logs, but it does not actually deny any operations. While not supported for production systems, permissive mode can be helpful for debugging.
Copy file name to clipboardExpand all lines: modules/telco-core-application-workloads.adoc
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -20,6 +20,8 @@ Engineering considerations::
20
20
--
21
21
Use the following information to plan telco core workloads and cluster resources:
22
22
23
+
include::snippets/nodes-cgroup-vi-removed.adoc[]
24
+
23
25
* CNF applications should conform to the latest version of https://redhat-best-practices-for-k8s.github.io/guide/[Red Hat Best Practices for Kubernetes].
24
26
* Use a mix of best-effort and burstable QoS pods as required by your applications.
25
27
** Use guaranteed QoS pods with proper configuration of reserved or isolated CPUs in the `PerformanceProfile` CR that configures the node.
Copy file name to clipboardExpand all lines: modules/telco-core-cpu-partitioning-and-performance-tuning.adoc
+3-9Lines changed: 3 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,6 +24,9 @@ Limits and requirements::
24
24
For more information, see "Creating a performance profile".
25
25
26
26
Engineering considerations::
27
+
28
+
include::snippets/nodes-cgroup-vi-removed.adoc[]
29
+
27
30
* The minimum reserved capacity (`systemReserved`) required can be found by following the guidance in the link:https://access.redhat.com/solutions/5843241[Which amount of CPU and memory are recommended to reserve for the system in OpenShift 4 nodes?] Knowledgebase article.
28
31
* The actual required reserved CPU capacity depends on the cluster configuration and workload attributes.
29
32
* The reserved CPU value must be rounded up to a full core (2 hyper-threads) alignment.
@@ -46,12 +49,3 @@ With no configuration, the default queue count is one RX/TX queue per online CPU
46
49
====
47
50
Some drivers do not deallocate the interrupts even after reducing the queue count.
48
51
====
49
-
50
-
* If workloads running on the cluster require cgroup v1, you can configure nodes to use cgroup v1 as part of the initial cluster deployment.
51
-
See "Enabling Linux control group version 1 (cgroup v1)" and link:https://www.redhat.com/en/blog/rhel-9-changes-context-red-hat-openshift-workloads[Red Hat Enterprise Linux 9 changes in the context of Red Hat OpenShift workloads].
52
-
+
53
-
[NOTE]
54
-
====
55
-
Support for cgroup v1 is planned for removal in {product-title} 4.19.
56
-
Clusters running cgroup v1 must transition to cgroup v2.
0 commit comments