Closed. This question does not meet Stack Overflow guidelines. It is not currently accepting answers. This question does not appear to be about a specific programming problem, a software algorithm, or software tools primarily used by programmers. If you believe the question would be on-topic on another Stack Exchange site, you can leave a comment to explain where the question
Tag: cgroups
On Debian 11 (Bullseye) /proc/self/cgroup inside a docker container does not show docker infos
I recently updated from Debian 10 (Buster) to 11 (Bullseye) and since then my Jenkins setup inside Docker is not working anymore, as Jenkins tries to find out if it is running in a docker container by checking /proc/self/cgroup. Normally /proc/self/cgroup inside a docker container would look something like this: but since I updated to Debian 11 it looks pretty
Difference between `–privileged` and `–cap-add=all` in docker
Background: I am running a docker container which needs to load/remove a kernel module which makes USB devices attached to a remote server available on the host which I then want to make available in the container. It works when running the container with —-privileged and bind mounts for /lib/modules and /dev. Now I want to remove privileged mode and
Is there a way to read the memory counter used by cgroups to kill processes?
I am running a process under a cgroup with an OOM Killer. When it performs a kill, dmesg outputs messages such as the following. I would like to be able to tell how much memory the cgroups OOM Killer believes the process is using at any given time. Is there a way to query for this quantity? Answer I found
Does Linux system load account for throttling of the Completely Fair Scheduler?
On Linux, system load is defined as the exponentially decaying average of num runnable processes + num uninterruptable processes. I am wondering if it will correctly account for CFS cgroup quota used to limit the number of cpu shares a group of processes may use in a given interval. In other word: If a process is throttled due to depleted
Security concerns around KSM
When using KSM (Kernel Same-page Mapping), if two completely identical pages of memory are owned by two completely isolated processes, for example, two virtual machines, will those pages be merged? Or will they remain separate due to the fact that each process is isolated from each other? I’m confused because the VMs boil down to a single process on the
Using Cgroups to limit cpu usage
I am trying to use cgroups in order to limit the CPU usage. I am using this guide https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/6/html/Resource_Management_Guide/sec-cpu_and_memory-use_case.html My /etc/cgconfig.conf file is the following My cgrules.conf is the following Althouth when I try to run: I see that the cpu usage in 100% for the users belong to group wheel and test1 I have checked the services with service