12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788 |
- /*
- Copyright 2015 The Kubernetes Authors.
- Licensed under the Apache License, Version 2.0 (the "License");
- you may not use this file except in compliance with the License.
- You may obtain a copy of the License at
- http://www.apache.org/licenses/LICENSE-2.0
- Unless required by applicable law or agreed to in writing, software
- distributed under the License is distributed on an "AS IS" BASIS,
- WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
- See the License for the specific language governing permissions and
- limitations under the License.
- */
- package app
- import (
- "errors"
- "io/ioutil"
- "strconv"
- "github.com/golang/glog"
- "k8s.io/kubernetes/pkg/util/mount"
- "k8s.io/kubernetes/pkg/util/sysctl"
- )
- type Conntracker interface {
- SetMax(max int) error
- SetTCPEstablishedTimeout(seconds int) error
- }
- type realConntracker struct{}
- var readOnlySysFSError = errors.New("ReadOnlySysFS")
- func (realConntracker) SetMax(max int) error {
- glog.Infof("Setting nf_conntrack_max to %d", max)
- if err := sysctl.New().SetSysctl("net/netfilter/nf_conntrack_max", max); err != nil {
- return err
- }
- // sysfs is expected to be mounted as 'rw'. However, it may be unexpectedly mounted as
- // 'ro' by docker because of a known docker issue (https://github.com/docker/docker/issues/24000).
- // Setting conntrack will fail when sysfs is readonly. When that happens, we don't set conntrack
- // hashsize and return a special error readOnlySysFSError here. The caller should deal with
- // readOnlySysFSError differently.
- writable, err := isSysFSWritable()
- if err != nil {
- return err
- }
- if !writable {
- return readOnlySysFSError
- }
- // TODO: generify this and sysctl to a new sysfs.WriteInt()
- glog.Infof("Setting conntrack hashsize to %d", max/4)
- return ioutil.WriteFile("/sys/module/nf_conntrack/parameters/hashsize", []byte(strconv.Itoa(max/4)), 0640)
- }
- func (realConntracker) SetTCPEstablishedTimeout(seconds int) error {
- glog.Infof("Setting nf_conntrack_tcp_timeout_established to %d", seconds)
- return sysctl.New().SetSysctl("net/netfilter/nf_conntrack_tcp_timeout_established", seconds)
- }
- // isSysFSWritable checks /proc/mounts to see whether sysfs is 'rw' or not.
- func isSysFSWritable() (bool, error) {
- const permWritable = "rw"
- const sysfsDevice = "sysfs"
- m := mount.New()
- mountPoints, err := m.List()
- if err != nil {
- glog.Errorf("failed to list mount points: %v", err)
- return false, err
- }
- for _, mountPoint := range mountPoints {
- if mountPoint.Device != sysfsDevice {
- continue
- }
- // Check whether sysfs is 'rw'
- if len(mountPoint.Opts) > 0 && mountPoint.Opts[0] == permWritable {
- return true, nil
- }
- glog.Errorf("sysfs is not writable: %+v", mountPoint)
- break
- }
- return false, nil
- }
|