/* Copyright 2019 The Kubernetes Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package model import ( "fmt" "strings" "k8s.io/kops/pkg/apis/kops" "k8s.io/kops/upup/pkg/fi" "k8s.io/kops/upup/pkg/fi/nodeup/nodetasks" "k8s.io/kops/util/pkg/distributions" ) // SysctlBuilder set up our sysctls type SysctlBuilder struct { *NodeupModelContext } var _ fi.ModelBuilder = &SysctlBuilder{} // Build is responsible for configuring sysctl settings func (b *SysctlBuilder) Build(c *fi.ModelBuilderContext) error { var sysctls []string // Common settings { sysctls = append(sysctls, "# Kubernetes Settings", "") // A higher vm.max_map_count is great for elasticsearch, mongo, or other mmap users // See https://github.com/kubernetes/kops/issues/1340 sysctls = append(sysctls, "vm.max_map_count = 262144", "") // See https://github.com/kubernetes/kubernetes/pull/38001 sysctls = append(sysctls, "kernel.softlockup_panic = 1", "kernel.softlockup_all_cpu_backtrace = 1", "") // See https://github.com/kubernetes/kops/issues/6342 portRange := b.Cluster.Spec.KubeAPIServer.ServiceNodePortRange if portRange == "" { portRange = "30000-32767" // Default kube-apiserver ServiceNodePortRange } sysctls = append(sysctls, "net.ipv4.ip_local_reserved_ports = "+portRange, "") // See https://github.com/kubernetes/kube-deploy/issues/261 sysctls = append(sysctls, "# Increase the number of connections", "net.core.somaxconn = 32768", "", "# Maximum Socket Receive Buffer", "net.core.rmem_max = 16777216", "", "# Maximum Socket Send Buffer", "net.core.wmem_max = 16777216", "", "# Increase the maximum total buffer-space allocatable", "net.ipv4.tcp_wmem = 4096 12582912 16777216", "net.ipv4.tcp_rmem = 4096 12582912 16777216", "", "# Increase the number of outstanding syn requests allowed", "net.ipv4.tcp_max_syn_backlog = 8096", "", "# For persistent HTTP connections", "net.ipv4.tcp_slow_start_after_idle = 0", "", "# Allow to reuse TIME_WAIT sockets for new connections", "# when it is safe from protocol viewpoint", "net.ipv4.tcp_tw_reuse = 1", "", // We can't change the local_port_range without changing the NodePort range //"# Allowed local port range", //"net.ipv4.ip_local_port_range = 10240 65535", //"", "# Max number of packets that can be queued on interface input", "# If kernel is receiving packets faster than can be processed", "# this queue increases", "net.core.netdev_max_backlog = 16384", "", "# Increase size of file handles and inode cache", "fs.file-max = 2097152", "", "# Max number of inotify instances and watches for a user", "# Since dockerd runs as a single user, the default instances value of 128 per user is too low", "# e.g. uses of inotify: nginx ingress controller, kubectl logs -f", "fs.inotify.max_user_instances = 8192", "fs.inotify.max_user_watches = 524288", "", ) } // Running Flannel on CentOS7 / rhel7 needs custom settings if b.Cluster.Spec.Networking.Flannel != nil { proxyMode := b.Cluster.Spec.KubeProxy.ProxyMode if proxyMode == "" { proxyMode = "iptables" } if proxyMode == "iptables" && (b.Distribution == distributions.DistributionCentos7 || b.Distribution == distributions.DistributionRhel7) { sysctls = append(sysctls, "# Flannel settings on CentOS 7", "# Issue https://github.com/coreos/flannel/issues/902", "net.bridge.bridge-nf-call-ip6tables=1", "net.bridge.bridge-nf-call-iptables=1", "") } } if b.Cluster.Spec.CloudProvider == string(kops.CloudProviderAWS) { sysctls = append(sysctls, "# AWS settings", "", "# Issue #23395", "net.ipv4.neigh.default.gc_thresh1=0", "") } sysctls = append(sysctls, "# Prevent docker from changing iptables: https://github.com/kubernetes/kubernetes/issues/40182", "net.ipv4.ip_forward=1", "") if params := b.NodeupConfig.SysctlParameters; len(params) > 0 { sysctls = append(sysctls, "# Custom sysctl parameters from instance group spec", "") for _, param := range params { if !strings.ContainsRune(param, '=') { return fmt.Errorf("Invalid SysctlParameter: expected %q to contain '='", param) } sysctls = append(sysctls, param) } } if params := b.Cluster.Spec.SysctlParameters; len(params) > 0 { sysctls = append(sysctls, "# Custom sysctl parameters from cluster spec", "") for _, param := range params { if !strings.ContainsRune(param, '=') { return fmt.Errorf("Invalid SysctlParameter: expected %q to contain '='", param) } sysctls = append(sysctls, param) } } c.AddTask(&nodetasks.File{ Path: "/etc/sysctl.d/99-k8s-general.conf", Contents: fi.NewStringResource(strings.Join(sysctls, "\n")), Type: nodetasks.FileType_File, OnChangeExecute: [][]string{{"sysctl", "--system"}}, }) return nil }