containerd/vendor/github.com/containerd/cgroups
Lantao Liu 5ed43ea1a3 Update containerd to fix long exec issue.
Signed-off-by: Lantao Liu <lantaol@google.com>
2017-11-30 19:24:14 +00:00
..
blkio.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
cgroup.go Update containerd to fix long exec issue. 2017-11-30 19:24:14 +00:00
control.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
cpu.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
cpuacct.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
cpuset.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
devices.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
errors.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
freezer.go update containerd, runc, cgroups, sys and docker version 2017-10-24 22:52:29 +02:00
hierarchy.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
hugetlb.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
LICENSE Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
memory.go update containerd, runc, cgroups, sys and docker version 2017-10-24 22:52:29 +02:00
metrics.pb.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
metrics.proto Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
named.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
net_cls.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
net_prio.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
paths.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
perf_event.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
pids.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
README.md Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
state.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
subsystem.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
systemd.go Update containerd to v1.0.0-beta.0 2017-09-09 04:46:02 +00:00
ticks.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
utils.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00
v1.go Adding option to configure cgroup to start cri-containerd 2017-08-30 14:37:40 -07:00

cgroups

Build Status

codecov

Go package for creating, managing, inspecting, and destroying cgroups. The resources format for settings on the cgroup uses the OCI runtime-spec found here.

Examples

Create a new cgroup

This creates a new cgroup using a static path for all subsystems under /test.

  • /sys/fs/cgroup/cpu/test
  • /sys/fs/cgroup/memory/test
  • etc....

It uses a single hierarchy and specifies cpu shares as a resource constraint and uses the v1 implementation of cgroups.

shares := uint64(100)
control, err := cgroups.New(cgroups.V1, cgroups.StaticPath("/test"), &specs.LinuxResources{
    CPU: &specs.CPU{
        Shares: &shares,
    },
})
defer control.Delete()

Create with systemd slice support

control, err := cgroups.New(cgroups.Systemd, cgroups.Slice("system.slice", "runc-test"), &specs.LinuxResources{
    CPU: &specs.CPU{
        Shares: &shares,
    },
})

Load an existing cgroup

control, err = cgroups.Load(cgroups.V1, cgroups.StaticPath("/test"))

Add a process to the cgroup

if err := control.Add(cgroups.Process{Pid:1234}); err != nil {
}

Update the cgroup

To update the resources applied in the cgroup

shares = uint64(200)
if err := control.Update(&specs.LinuxResources{
    CPU: &specs.CPU{
        Shares: &shares,
    },
}); err != nil {
}

Freeze and Thaw the cgroup

if err := control.Freeze(); err != nil {
}
if err := control.Thaw(); err != nil {
}

List all processes in the cgroup or recursively

processes, err := control.Processes(cgroups.Devices, recursive)

Get Stats on the cgroup

stats, err := control.Stat()

By adding cgroups.IgnoreNotExist all non-existent files will be ignored, e.g. swap memory stats without swap enabled

stats, err := control.Stat(cgroups.IgnoreNotExist)

Move process across cgroups

This allows you to take processes from one cgroup and move them to another.

err := control.MoveTo(destination)

Create subcgroup

subCgroup, err := control.New("child", resources)