Using CGROUPS with redpak and systemd
REDPAK has options to setup CGROUP restriction on started REDNODES. This behaviour duplicates the behaviour of systemd that already manages CGROUP features.
One of the design principle of how systemd manages CGROUP is that only one writer can control a CGROUP (see Two Key Design Rules).
That single-writer behaviour can not be enforced by the kernel. So designers of systemd took the decision that the full CGROUP hierarchy is under the control of systemd except if the opposite is explicitely required.
Using CGROUP features of REDPAK without taking care of what systemd expect is possible but:
-
it violates the single-writer principle because REDWRAP will write and rearrange features in CGROUP where systemd expects to be the only writer
-
it implies that you run REDWRAP as root or with some capabilies for writing where systemd writes
In order to solve this kind of issues, systemd has provision for allowing other writers to manage parts of CGROUP that system will not write after setting it up. This behaviour, called delegation, is described in that document.
Delegation in systemd’s user land
The 2 below lines are from systemd’s service user@.service
Slice=user-%i.slice
Delegate=pids memory
It shows that every user service or application started by
systemd and the children of these services or applications
are in the CGROUP slice user.slice/user-UID.slice/
.
And that slice is restricted to have only access to the
CGROUP’s controllers pids
and memory
.
So if the REDNODE only need to setup pids
and memory
it could be possible in principle because the controllers
are available. But in fact it will not work because the
files controlling behaviour of these CGROUP are owned by
root and are write protected.
Before discussing on how systemd allows delegation of the control of these features, let talk about other CGROUP controllers that REDPAK manages: cpu, cpuset, io.
Because these controllers are not listed in user@.service
,
it cannot be delegated to user services. This can be
changed by adding drop-in configurations. For example
for adding the missing controllers to user 1001, it is
needed to create the file
/etc/systemd/system/user@1001.service.d/delegate.conf
(see) that contains:
[Service]
Delegate=cpu cpuset io
But it can be seen that this action requires system privileges to be achieved.
Without delegation, the CGROUP properties can be controlled by systemd settings and properties.
In order to run redpak in user mode, you need to turn on the delegation. This is done by including the below lines in your service:
[Service]
Delegate=yes
that delegates all available CGROUP controllers.
Or by listing the expected CGROUP controllers as below:
[Service]
Delegate=memory pids
In this cases, systemd creates a slice for controlling
the service. That slice can be named explicitely using
Slice
directive of systemd.
When running REDPAK from command line in the user environment, if the REDNODE has CGROUP setting, they may be applied or not depending on rigths that systemd let to CGROUPS files. But in all cases it enters in conflict with systemd and the single-writer rule.
So the systemd command systemd-run
should be used. Here
is an example of use:
systemd-run --user -p Delegate=yes ...
Using the slice is possible because it allows default controllers, so the command below works as well:
systemd-run --user --slice redpak ...
In this cases, the user still get the ability to modify its CGROUP restictions itself. This is intended for implementing a manager but not for running a restricted program. However redpak allows to run REDNODEs not able to change their CGROUP restrictions if the CGROUP namespace is unshared:
config:
share_cgroup: disabled
Delegation in systemd’s system land
Restriction applied by user@.service
are not existing
in system land. So all CGROUP controllers are available.
But the use of the directive User
even in system’s services
make them user services and then only allow controlllers
pids and memory as seen above. To circumvent this
restriction either follow what is explain above or use
the redpak feature of changing the user.
Since REDPAK version 2.4.2, it is possible to start
a REDNODE from root that will run as an other user.
It opens the possiblity to use all CGROUPS from
system land but in user land. In such case, services
could be change to not set User=...
while still
setting dependency to user@%i.service
. That way,
user services are started and all CGROUP controllers are
available.
When using this option, items of CGROUP hierarchy are owned by root, not by the end user. This is good because it avoid the REDNODE to change its settings.
Security consideration on using CGroup and delegation
When delegation of CGROUP is granted by systemd to a service, the service is allowed to change its CGROUP settings. The hierachical imbrication of the CGROUPs means that it can not be better than what systemd allocated initially to the main service.
But it means that if the service forks, it has to take cautious of what its children running with the same right can change the cgroup settings.
This can be avoided by unsharing the cgroup namespace
in the redpak configuration file (config.share_cgroup: disabled
),
this ensures that the settings of rednode configuration
will not be changed.
REDNODEs, CGROUPS, and russian dolls
For CGROUP management of REDNODE, the concept of russian dolls applies, the hierarchy of rednodes is applied by fitting children in their parent. This behaviour automatically applies cumulated CGROUP restrictions.
So using a dedicated slice for running REDNODEs works correctly because REDWRAP takes care of setting CGROUP features with the hierarchy of nodes.
So we recommand to use the slice named redpak
for
running the CGROUP aware REDNODE. But note well that
using the default slice user-%i
also works.
systemd-run --user -p Delegate=yes --slice redpak ...
or
systemd-run -p Delegate=yes --slice redpak ...