-
Hi, The goal of this discussion is to evaluate if this is something Sysbox could help with, or not. I'm not requesting anything. For now, this is simply a question. :) Currently, to be able to use a EDIT: you only run into this problem if you try to deploy a resource constrained pod (cpu requests/limit) in the underlying kind cluster. Otherwise, all seems to work fine without needing to mount I described this at kubernetes-sigs/kind#303 (comment), especially when I say:
So, is this something Sysbox can help with? Kind currently recommends mounting this directory to dind pods (see kubernetes-sigs/kind#303). Would be very nice if Sysbox could help to alleviate this requirement, and therefore, make running kind inside of a k8s dind pod more secure. |
Beta Was this translation helpful? Give feedback.
Replies: 2 comments 9 replies
-
Hi @felipecrs, thanks for opening the issue.
Can you provide a sample pod spec that would trigger this? If we are doing things right in Sysbox, running In general, I don't recommend mounting the host's |
Beta Was this translation helpful? Give feedback.
-
To recap: problem was caused by a misconfiguration: the outer container was assigned less CPU than the inner containers via the Linux cgroups mechanism, causing Linux to block the CPU resource assignment for the inner container. To avoid this, the outer container must be given more cgroup resources (CPU, mem, etc) than the inner container(s). |
Beta Was this translation helpful? Give feedback.
Hi @felipecrs, thanks for opening the issue.
Can you provide a sample pod spec that would trigger this?
If we are doing things right in Sysbox, running
kind
inside a (rootless) Sysbox pod should work, regardless of whether you set CPU requests/limits on the pod, as long as you set them to a value that is large enough to accommodate the values thatkind
will need.In general, I don't recommend mounting the host's
/sys/fs/cgroup
into the pod, as that essentially exposes the entire cgroup hierarchy of the host inside the container, breaking isolation.