-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
It should not consume system reserved computational resources #82
Comments
That is correct, the CSI driver will launch the mountpoint fuse process in the host's systemd under If there is any additional detail you would like to share that can help inform the design and prioritization of this feature, we'd be happy to hear it. |
Thanks, I got it. But, consuming system-reservation would not be good idea. I expect so many cluster admins don't want it. I hope this would be fixed soon.
As I posted here, I think:
There are several OSS that support this:
|
Thank you for the input. We are aware of this alternative design option and the advantages it brings for resource management in particular. The use of sidecars as they exist today also comes with some drawbacks, mostly related to the fact that the sidecar starts in parallel with the application container, so the mount is potentially not available to applications at startup and is not available to init containers at all. The new native sidecars feature looks like a promising solution here and is something we're looking at. So again thank you for the request and the input and we'll share updates as soon as we can. |
As stated here, normally running FUSE process in a container would require privilege permission. It would arise security concern from kubernetes cluster admin perspective. So, running as side-car without any privilege would be great 🙇 |
Requires Mountpoint to have improved memory control: awslabs/mountpoint-s3#987 |
Removing the systemd dependency would enable compatibility with specialized Kubernetes operating systems like Talos, which do not use systemd. Currently, this integration appears infeasible (see #213). |
I understand this CSI driver launches mountpoint-s3(FUSE) process in host's systemd.
In normal kubernetes node, cluster administrator configured appropriate reserved computing resource for system components (non-kubernetes components running in host). (https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/).
Launching fuse processes in host's systemd makes it difficult to manage computational resources and its reservation in the node, doesn't it? Particularly, when many pods using this csi driver are scheduled on the node, the situation could be worse.
When using the csi driver in kubernetes, how to manage node's computational resource as cluster administrator?? Are there any recommendation??
The text was updated successfully, but these errors were encountered: