From acaaad68bb89933642d05381364ee11185a722a6 Mon Sep 17 00:00:00 2001 From: Raito Bezarius Date: Sat, 5 Oct 2024 17:10:23 +0200 Subject: [PATCH] feat: introduce resource control over all machines We were using over all our machines in the Lix infrastructure. It still makes sense for all our machines. Signed-off-by: Raito Bezarius --- common/base-server.nix | 1 + common/cgroups.nix | 83 ++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 84 insertions(+) create mode 100644 common/cgroups.nix diff --git a/common/base-server.nix b/common/base-server.nix index 8752fa1..ec95eda 100644 --- a/common/base-server.nix +++ b/common/base-server.nix @@ -1,6 +1,7 @@ { lib, pkgs, ... }: { imports = [ ./known-ssh-keys.nix + ./cgroups.nix ]; nixpkgs.overlays = import ../overlays; diff --git a/common/cgroups.nix b/common/cgroups.nix new file mode 100644 index 0000000..4e54281 --- /dev/null +++ b/common/cgroups.nix @@ -0,0 +1,83 @@ +# Relatively inspired by fbtax2: +# https://facebookmicrosites.github.io/cgroup2/docs/fbtax-results.html +# +# See also the Chris Down talk at LISA'21: +# https://www.usenix.org/conference/lisa21/presentation/down +{ ... }: +let + systemCriticalSliceConfig = { + ManagedOOMMemoryPressure = "kill"; + + # guarantee availability of memory + MemoryMin = "192M"; + # default 100 + IOWeight = 1000; + # default 100 + CPUWeight = 1000; + }; +in +{ + systemd.oomd = { + enable = true; + # why not, we have cgroups at user level now so it'll just kill the + # terminal + enableRootSlice = true; + enableSystemSlice = true; + enableUserSlices = true; + }; + + systemd.enableCgroupAccounting = true; + + systemd.services.nix-daemon = { + serviceConfig = { + # FIXME: how do i deprioritize this for memory + CPUWeight = 10; + IOWeight = 10; + }; + }; + + systemd.slices.hostcritical = { + description = "Ensures that services to keep the system alive remain alive"; + + unitConfig = { + # required to avoid a dependency cycle on systemd-oomd. systemd will + # actually guess this right but we should fix it anyway. + DefaultDependencies = false; + }; + + sliceConfig = systemCriticalSliceConfig; + }; + + # make root logins higher priority for resources + systemd.slices."user-0" = { + sliceConfig = systemCriticalSliceConfig; + }; + + + systemd.slices.system = { + sliceConfig = { + ManagedOOMMemoryPressure = "kill"; + ManagedOOMMemoryPressureLimit = "50%"; + + IOWeight = 100; + }; + }; + + systemd.services.sshd = { + serviceConfig = { + Slice = "hostcritical.slice"; + }; + }; + + systemd.services.systemd-oomd = { + serviceConfig = { + Slice = "hostcritical.slice"; + }; + }; + + systemd.services.systemd-journald = { + serviceConfig = { + Slice = "hostcritical.slice"; + }; + }; +}