[ 
https://issues.apache.org/jira/browse/YARN-9561?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=16924470#comment-16924470
 ] 

Eric Yang commented on YARN-9561:
---------------------------------

{quote}There's currently a debug line at the end of 
RuncContainerRuntime.launchContainer() that will get printed to the nodemanager 
that has the entire JSON that was used to launch the container-executor. I 
didn't want to print this to info since the JSON is very large and scary 
looking. What do you think?{quote}

I was thinking to print the config.json instead of runc-config.json.  This 
provide ability to verify that no incorrect syntax was passed onto runc.  If 
this is too wordy, a line of the current stage of the execution would help to 
know that runc command is called.

{quote}I'm confused as to what you're asking here. In this comment on YARN-9560 
you didn't want the configs to be mapped together. Now it sounds like you want 
there to be integration. Could you clarify this for me?{quote}

Direct mapping of the config key is not a good idea because the parameter value 
might look different even though their purpose might be the same.  For example, 
YARN_CONTAINER_RUNTIME_DOCKER_RUN_OVERRIDE_DISABLE is to support Docker entry 
point, but that concept does not exist with runc.  If user does not want the 
wrapper launch_container.sh and like to specify the launch command directly, 
configuration mechanism  defines how to control the container via either 
properties or environment variable to control those behaviors.  The 
documentation is a list of available customizable controls that is available to 
application developers.  Similar set of controls needs to be developed for 
application developer to configure runc containers.

{quote}
If you have specific suggestions on things that you would like to be added, 
feel free to create JIRAs. Otherwise I'll create a list at some point.
{quote}

The configurable properties is the suggested list to start.  Mount point is the 
most important one.  The current patch offers its own implementation of default 
mount point.  The app submission REST API offers a different way to mount 
devices with acl check.  I think the second approach provides better security.  
What is the right way to ensure the two techniques are complementary of each 
other and reduce divergence?  Can someone submit a job.xml that customize 
yarn.nodemanager.runtime.linux.runc.default-rw-mounts?  It looks like possible 
today, but should it be allowed?


> Add C changes for the new RuncContainerRuntime
> ----------------------------------------------
>
>                 Key: YARN-9561
>                 URL: https://issues.apache.org/jira/browse/YARN-9561
>             Project: Hadoop YARN
>          Issue Type: Sub-task
>            Reporter: Eric Badger
>            Assignee: Eric Badger
>            Priority: Major
>         Attachments: YARN-9561.001.patch, YARN-9561.002.patch, 
> YARN-9561.003.patch, YARN-9561.004.patch
>
>
> This JIRA will be used to add the C changes to the container-executor native 
> binary that are necessary for the new RuncContainerRuntime. There should be 
> no changes to existing code paths. 



--
This message was sent by Atlassian Jira
(v8.3.2#803003)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to