Uploaded image for project: 'Mesos'
  1. Mesos
  2. MESOS-6464

Add fine grained control of which namespaces a nested container should inherit (or not).

    XMLWordPrintableJSON

Details

    • Task
    • Status: Resolved
    • Major
    • Resolution: Fixed
    • None
    • 1.2.0
    • None

    Description

      We need finer grained control of which namespaces / cgroups a nested container should inherit or not.

      Right now, there are some implicit assumptions about which cgroups we enter and which namespaces we inherit when we launch a nested container. For example, under the current semantics, a nested container will always get a new pid namespace but inherit the network namespace from its parent. Moreover, nested containers will always inherit all of the cgroups from their parent (except the freezer cgroup), with no possiblity of choosing any different configuration.

      My current thinking is to pass the set of isolators to {{containerizer->launch()} that we would like to have invoked as part of launching a new container. Only if that isolator is enabled (via the agent flags) AND it is passed in via {{launch()}, will it be used to isolate the new container (note that both cgroup isolation as well as namespace membership also implemented using isolators). This is a sort of a whitelist approach, where we have to know the full set of isolators we want our container launched with ahead of time.

      Alternatively, we could consider passing in the set of isolators that we would like disabled instead. This way we could blacklist certain isolators from kicking in, even if they have been enabled via the agent flags.

      In both approaches, one major caveat of this is that it will have to become part of the top-level containerizer API, but it is specific only to the universal containerizer. Maybe this is OK as we phase out the docker containerizer anyway.

      I am leaning towards the blacklist approach at the moment...

      Attachments

        Activity

          People

            klueska Kevin Klues
            klueska Kevin Klues
            Jie Yu Jie Yu
            Votes:
            0 Vote for this issue
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: