mirror of
https://github.com/k3s-io/k3s.git
synced 2024-06-07 19:41:36 +00:00
6e8284e3d4
Now rootless mode can be used with cgroup v2 resource limitations. A pod is executed in a cgroup like "/user.slice/user-1001.slice/user@1001.service/k3s-rootless.service/kubepods/podd0eb6921-c81a-4214-b36c-d3b9bb212fac/63b5a253a1fd4627da16bfce9bec58d72144cf30fe833e0ca9a6d60ebf837475". This is accomplished by running `kubelet` in a cgroup namespace, and enabling `cgroupfs` driver for the cgroup hierarchy delegated by systemd. To enable cgroup v2 resource limitation, `k3s server --rootless` needs to be launched as `systemctl --user` service. Please see the comment lines in `k3s-rootless.service` for the usage. Running `k3s server --rootless` via a terminal is not supported. When it really needs to be launched via a terminal, `systemd-run --user -p Delegate --tty` needs to be prepended to create a systemd scope. Signed-off-by: Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> |
||
---|---|---|
.. | ||
agent | ||
apiaddresses | ||
apis/k3s.cattle.io | ||
authenticator | ||
bootstrap | ||
cli | ||
clientaccess | ||
cloudprovider | ||
cluster | ||
codegen | ||
configfilearg | ||
containerd | ||
ctr | ||
daemons | ||
datadir | ||
dataverify | ||
deploy | ||
etcd | ||
flock | ||
generated | ||
kubectl | ||
netutil | ||
node | ||
nodeconfig | ||
nodepassword | ||
passwd | ||
rootless | ||
rootlessports | ||
server | ||
servicelb | ||
static | ||
token | ||
untar | ||
util | ||
version |