Comments (16)
--docker_only=true would filter cgroups to only report docker and root containers.
from cadvisor.
👍
from cadvisor.
some cgroups are under /system.slice/docker-*. lmctfy stats doesn't detect that. It should use device or cpu cgroup to detect. For libcontainer, one way to track stats is to use nsinit pid and find paths using /proc/pid-nsinit/cgroups
$ ps -efww | grep cadvisor
root 3490 3362 0 21:26 ? 00:00:00 /bin/sh -c /usr/bin/cadvisor
root 3514 3490 0 21:26 ? 00:00:02 /usr/bin/cadvisor
$ cat /proc/3490/cgroup
10:perf_event:/
9:blkio:/system.slice/docker-d293e6edbf522628caf322c1d603ddbfbd891c7014e7a747e1bb4bfa122d3b1f.scope
8:net_cls:/
7:freezer:/
6:devices:/system.slice/docker-d293e6edbf522628caf322c1d603ddbfbd891c7014e7a747e1bb4bfa122d3b1f.scope
5:memory:/system.slice/docker-d293e6edbf522628caf322c1d603ddbfbd891c7014e7a747e1bb4bfa122d3b1f.scope
4:cpu,cpuacct:/system.slice/docker-d293e6edbf522628caf322c1d603ddbfbd891c7014e7a747e1bb4bfa122d3b1f.scope
3:cpuset:/
2:name=systemd:/system.slice/docker-d293e6edbf522628caf322c1d603ddbfbd891c7014e7a747e1bb4bfa122d3b1f.scope
from cadvisor.
Does this affect /, /docker, /docker/, or all?
from cadvisor.
Perhaps lmctfy should have configurable job tracking hierarchy and we
should use /systemd hierarchy on systemd machines? Using device or cpu
hierarchy to detect seems somewhat arbitrary?
On Tue, Jun 17, 2014 at 2:39 PM, Victor Marmol [email protected]
wrote:
Does this affect /, /docker, /docker/, or all?
—
Reply to this email directly or view it on GitHub
#59 (comment).
from cadvisor.
+1
On Tue, Jun 17, 2014 at 2:39 PM, Victor Marmol [email protected]
wrote:
Does this affect /, /docker, /docker/, or all?
—
Reply to this email directly or view it on GitHub
#59 (comment).
from cadvisor.
That may be tricky given freezer support and systemd not using freezer.
from cadvisor.
Why can't we change libcontainer as Rohit suggested and not change lmctfy?
On Tue, Jun 17, 2014 at 2:42 PM, Victor Marmol [email protected]
wrote:
That may be tricky given freezer support and systemd not using freezer.
—
Reply to this email directly or view it on GitHub
#59 (comment).
from cadvisor.
Changing libcontainer makes sense but at the moment lmctfy gives us more
detailed statistics so there is benefit for handling this in lmctfy.
On Tue, Jun 17, 2014 at 2:45 PM, Vish Kannan [email protected]
wrote:
Why can't we change libcontainer as Rohit suggested and not change lmctfy?
On Tue, Jun 17, 2014 at 2:42 PM, Victor Marmol [email protected]
wrote:That may be tricky given freezer support and systemd not using freezer.
—
Reply to this email directly or view it on GitHub
#59 (comment).—
Reply to this email directly or view it on GitHub
#59 (comment).
from cadvisor.
We will need to change both :)
from cadvisor.
/ is fine. Everything else is broken.
libcontainer seems like a simpler change, but I am going to try and change both lmctfy and libcontainer.
One problem with systemd systems is that there are many containers (some of them just within a named systemd hierarchy). We might want to filter some out.
I'd be fine if anyone wants to take over either of the changes :)
from cadvisor.
/ is handled by lmctfy, everything else is handled by libcontainer. So the
libcontainer change should be enough to fix this.
WDYT of ignoring non-Docker and non-root containers in systemd systems? We
should be able to degrade gracefully if that's the case anyways.
On Tue, Jun 17, 2014 at 4:07 PM, Rohit Jnagal [email protected]
wrote:
/ is fine. Everything else is broken.
libcontainer seems like a simpler change, but I am going to try and change
both lmctfy and libcontainer.One problem with systemd systems is that there are many containers (some
of them just within a named systemd hierarchy). We might want to filter
some out.I'd be fine if anyone wants to take over either of the changes :)
—
Reply to this email directly or view it on GitHub
#59 (comment).
from cadvisor.
This is done thanks to the raw driver. We've tested in CoreOS and RHEL. If you find any issues on other systems please file issues :)
from cadvisor.
@vmarmol Was a patch applied to cadvisor to ignore non-docker and non-root containers in systemd systems? I'm using the latest tag of google/cadvisor available on docker hub with CentOS Linux release 7.2.1511 and still seeing systemd containers appearing in the stats from cadvisor.
from cadvisor.
cAdvisor does not ignore any containers as of now.
On Thu, Jan 28, 2016 at 1:23 AM, Kamba Abudu [email protected]
wrote:
@vmarmol https://github.com/vmarmol Was a patch applied to cadvisor to
ignore non-docker and non-root containers in systemd systems? I'm using the
latest tag of google/cadvisor available on docker hub with CentOS Linux
release 7.2.1511 and still seeing systemd containers appearing in the stats
from cadvisor.—
Reply to this email directly or view it on GitHub
#59 (comment).
from cadvisor.
--docker_only=true would filter cgroups to only report docker and root containers.
This is really use to reduce the output from stats/container
when used with heapster legacy kubelet source.
from cadvisor.
Related Issues (20)
- missing binaries for v0.48 HOT 1
- cadvisor:latest container tag is outdated HOT 1
- libipmctl build dependencies are failing on new alpine image HOT 2
- Latest release on github points to older version. HOT 1
- Missing docker. images in registry HOT 2
- Docker tag v0.47.2 retroactively changed to other image HOT 1
- Issue w/ SemVer tags (`v0.999-bobbpage`,`0.99-porterdavid`] HOT 1
- l3_misses and l3_accesses perf events unable to retrieve on AMD host HOT 1
- v0.49.1 arm64 - Error while reading product_name: open /sys/class/dmi/id/product_name: no such file or directory HOT 2
- container_fs_usage_bytes metrics miss pod/container label HOT 4
- Does rootless podman works? Can someone help me with setup? HOT 2
- No processes found is shown within a container/problem regarding the number of file descriptors
- feature: add oom_score_adj metric for containers
- Implemented cAdvisor as a container now how to use whitelisted_container_labels at run time?
- SECURITY: verifying github.com/google/[email protected]: checksum mismatch HOT 1
- Podman-docker HOT 1
- Cadvisor / prometheus logging stops at night
- Prometheus `container_network_receive_bytes_total` metric is not grouped by container ports
- Memory metrics like `container_memory_max_usage_bytes` are always zero / 0
- Many zombie processes into cadvisor container
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from cadvisor.