ComputeStacks offers multiple ways to restrict resource consumption by individual containers.
CPU, Memory, and Swap usage can be limited by defining those values within the container package.
Parameter | Default | Description |
---|---|---|
OOM Killer | Enabled |
Enable or Disable the OOM Killer for containers. If disabled, a container may become hung and require manual intervention. |
PID Limit | 0 (Unlimited) |
Maximum number of active processes allowed inside a container. |
Max Open Files (Soft) | 0 (Unlimited) |
Soft limit for maximum allowed open files within a container. |
Max Open Files (Hard) | 0 (Unlimited) |
Hard limit for maximum allowed open files within a container. |
<aside>
🚨 In order for these settings to be applied, you must define the block device path
on the node. This should be set to where /var/lib/docker
is mounted. Examples include: /dev/sda1
, /dev/mapper/hostname--vg-root
.
Incorrect setting will prevent the container from starting.
</aside>
Parameter | Default | Description |
---|---|---|
Write Bytes Per Second | 0 (Unlimited) |
Maximum allowed Bytes Per Second written to disk, per container. |
Write Operations Per Second | 0 (Unlimited) |
Maximum allowed Operations Per Second (IOPS) written to disk, per container. |
Read Bytes Per Second | 0 (Unlimited) |
Maximum allowed Bytes Per Second read from disk, per container. |
Read Operations Per Second | 0 (Unlimited) |
Maximum allowed Operations Per Second (IOPS) read from disk, per container. |