Line 9: | Line 9: | ||
== Systemd unit changes == | == Systemd unit changes == | ||
{{admon/important|The lower level cgroup configuration options as in ControlGroup=* as well as DefaultControllers=cpu are being deprecated!|}} | {{admon/important|The lower level cgroup configuration options as in "ControlGroup=*" as well as "DefaultControllers=cpu" are being deprecated!|}} | ||
== Introduction of slice unit == | == Introduction of slice unit == |
Revision as of 15:32, 12 August 2013
Systemd cgroups changes
Per-controller hierarchies are going away ( in other words the cgroups tree can no longer be considered a shared resource )and is being replaced by an single kernel cgroup hierarchy which will allow controllers to be individually enabled for each cgroup with the hierarchies the controllers see always being subtrees of the full single hierarchy.
This hierarchy is a private property of systemd as in systemd will set it up, systemd will maintain it, systemd will rearrange it.
Other software that wants to make use of cgroups can only do so through systemd's APIs.
Systemd unit changes
Introduction of slice unit
There are four .slice units which form the basis of the hierarchy for assignment of resources for services, users, and virtual machines or containers.
The .slice is the root of the hierarchy. It does not contain services directly, but is used to set defaults for the whole tree.
The machine.slice contains virtual machines and containers registered with systemd-machined and is where all running VMs/containers are located by default.
/sys/fs/cgroup/ `-- systemd |-- machine.slice |...
The system.slice contains services started by systemd and is where all system services are located by default.
/sys/fs/cgroup/ `-- systemd |-- machine.slice |... |-- system.slice |...
The user.slice contains user processes and services started on behalf of the user, including the per-user systemd instance and is where all logged in users are located by default.
/sys/fs/cgroup/ `-- systemd |-- machine.slice |... |-- system.slice |...
The higher level cgroup option which are available and can be used in the following type units slice.slice, scope.scope, service.service, socket.socket, mount.mount, swap.swap are...
CPUAccounting= CPUShares= MemoryAccounting= MemoryLimit= MemorySoftLimit= BlockIOAccounting= BlockIOWeight= BlockIODeviceWeight= BlockIOReadBandwidth= BlockIOWriteBandwidth= DeviceAllow= DevicePolicy= Slice=
CPUAccounting= CPUShares= MemoryAccounting= MemoryLimit= MemorySoftLimit= BlockIOAccounting= BlockIOWeight= BlockIODeviceWeight= BlockIOReadBandwidth= BlockIOWriteBandwidth=
To disable this behavior set corresponding resource accounting entry to no.
Introduction of scopes unit
Scope units are not configured via unit configuration files, but are only created programmatically using the bus interfaces of systemd. They are named similar to filenames. A unit whose name ends in ".scope" refers to a scope unit. Scopes units manage a set of system processes. Unlike service units, scope units manage externally created processes, and do not fork off processes on its own.
systemd-run --scope <command> may be used to launch a command in a new scope unit from the command line.
Default system setup
/sys/fs/cgroup/ `-- systemd |-- machine.slice | `-- machine-f20.scope | |-- system.slice | | |-- console-getty.service | | |-- systemd-journald.service | | `-- ... | `-- user.slice | |-- system.slice | |-- cups.service | |-- ntpd.service | |-- systemd-journald.service | |-- systemd-udevd.service | `-- … | `-- user.slice |-- user-1000.slice | |-- systemd-user@1000.service | | |-- firefox.service | | |-- gnome-shell.service | | `-- ... | `-- session-1.scope | `-- user-2702.slice |-- systemd-user@2702.service | `-- ... |-- session-2.scope `-- session-3.scope
Slices for customers
/sys/fs/cgroup/ `-- systemd |-- machine.slice | |-- machine-web-customer.slice | | |-- machine-web-development.scope | | | `-- system.slice | | | |-- httpd.service | | | |-- systemd-journald.service | | | `-- ... | | | | | |-- machine-web-staging.scope | | | `-- system.slice | | | |-- httpd.service | | | |-- systemd-journald.service | | | `-- ... | | | | | `-- machine-web-production.scope | | `-- system.slice | | |-- httpd.service | | |-- systemd-journald.service | | `-- ... | | | `-- machine-customer2.slice | |-- machine-customer2-test.slice | | `-- machine-test.scope | | `-- system.slice | | |-- apache.service | | |-- systemd-journald.service | | `-- ... | | | `-- machine-customer2-production.slice | |-- machine-web1.scope | | `-- system.slice | | |-- apache.service | | |-- systemd-journald.service | | `-- ... | | | `-- machine-web2.scope | `-- system.slice | |-- apache.service | |-- systemd-journald.service | `-- ... | |-- system.slice | |-- cups.service | |-- ntpd.service | |-- systemd-journald.service | |-- systemd-udevd.service | `-- ... | `-- user.slice `-- user-1000.slice |-- systemd-user@1000.service | `-- ... `-- session-1.scope
Sample run case
TODO something in the line of...
btrfs subvolume create /containers/www.example.com yum -y --releasever=rawhide --nogpg --installroot=/containers/www.example.com --disablerepo='*' --enablerepo=fedora install systemd passwd yum fedora-release vim-minimal httpd systemd-nspawn -bD /containers/www.example.com ....