Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[chart/redis-ha][BUG] redhat w/ ulimit unlimited max out cpu & memory, could we add to helm chart a default maxconn? #252

Closed
lknite opened this issue Apr 13, 2023 · 3 comments
Assignees
Labels
bug Something isn't working

Comments

@lknite
Copy link

lknite commented Apr 13, 2023

Describe the bug
On some os's ulimit ends up being unlimited & haproxy will max out cpu & memory in this case.
Reference: docker-library/haproxy#194

To Reproduce
haproxy/haproxy#2121

Steps to reproduce the behavior:

  1. Deploy kubernetes on redhat 9
  2. Deploy redis-ha helm chart

Expected behavior
haproxy to deploy normally

Additional context
Seems a good idea to specify a reasonable value in the haproxy helm chart:
image

@lknite lknite added the bug Something isn't working label Apr 13, 2023
@lknite lknite changed the title [chart/redis-ha][BUG] [chart/redis-ha][BUG] redhat w/ ulimit unlimited max out cpu & memory, could we add to helm chart a default maxconn? Apr 14, 2023
@lknite
Copy link
Author

lknite commented Apr 14, 2023

I'm using an argocd helm chart which uses this helm chart as a subchart, if maxconn were available to be set I could configure this to solve the issue (i think).

Since this seems to be a known issue with the solution being to set maxconn, could we get this added to the helm chart as a value which can be set? Doing so would seemingly avoid an insta-crash on yum-based systems.

Or is there a way to set it via the values.yaml I'm just not seeing?

@lknite
Copy link
Author

lknite commented Apr 14, 2023

I worked around this by adjusting ulimits at the container service level, in my case this is containerd fixed like this:

# sed -i 's/LimitNOFILE=infinity/LimitNOFILE=65535/' /usr/lib/systemd/system/containerd.service
# systemctl daemon-reload
# systemctl restart containerd
# k delete deployment <asdf>

@lknite lknite closed this as completed Apr 14, 2023
@wangycc
Copy link

wangycc commented Nov 21, 2024

I also encountered the same problem in the Linux 6.x kernel. Why is the same LimitNOFILE configuration working fine in lower versions?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

No branches or pull requests

3 participants