Closed jRilkef closed 9 months ago
$ ulimit -n 1024
Podman and no other process in rootless mode can override the limits set for the user running the podman command.
If you raise the limits for the user, then the ulimit should increase.
During build time, both soft and hard limits seem to inherit from the user's soft limit. During run time, however (aka podman run --entrypoint cat alpine /proc/self/limits
), both inherit from the user's hard limit. Is that expected behavior?
That sounds like a bug - Buildah grabbing different limits from Podman. Question would be which to standardize on; I would vote for hard limit as that's likely higher, and we see a lot of folks running out of resources.
In the meantime that the fix get downstreamed on every podman installs, is there a solution to manually up the limit beside running as root ?
Issue Description
When an image is build with
docker-compose
orpodman-compose
, thenofile
ulimit is 1024 which is too low.Steps to reproduce the issue
Build the following with either
podman-compose
ordocker-compose
that's using podman socket:Describe the results you received
Describe the results you expected
I expect this limit to be configurable. Podman has the following overrides set up:
However, builds using *-compose are not honoring those overrides.
podman info output
$ podman info
```yaml host: arch: amd64 buildahVersion: 1.33.2 cgroupControllers: - cpu - io - memory - pids cgroupManager: systemd cgroupVersion: v2 conmon: package: conmon-2.1.8-2.fc39.x86_64 path: /usr/bin/conmon version: 'conmon version 2.1.8, commit: ' cpuUtilization: idlePercent: 98.78 systemPercent: 0.87 userPercent: 0.35 cpus: 4 databaseBackend: sqlite distribution: distribution: fedora variant: coreos version: "39" eventLogger: journald freeLocks: 2048 hostname: localhost.localdomain idMappings: gidmap: - container_id: 0 host_id: 1000 size: 1 - container_id: 1 host_id: 100000 size: 1000000 uidmap: - container_id: 0 host_id: 501 size: 1 - container_id: 1 host_id: 100000 size: 1000000 kernel: 6.6.8-200.fc39.x86_64 linkmode: dynamic logDriver: journald memFree: 627404800 memTotal: 2059902976 networkBackend: netavark networkBackendInfo: backend: netavark dns: package: aardvark-dns-1.9.0-1.fc39.x86_64 path: /usr/libexec/podman/aardvark-dns version: aardvark-dns 1.9.0 package: netavark-1.9.0-1.fc39.x86_64 path: /usr/libexec/podman/netavark version: netavark 1.9.0 ociRuntime: name: crun package: crun-1.12-1.fc39.x86_64 path: /usr/bin/crun version: |- crun version 1.12 commit: ce429cb2e277d001c2179df1ac66a470f00802ae rundir: /run/user/501/crun spec: 1.0.0 +SYSTEMD +SELINUX +APPARMOR +CAP +SECCOMP +EBPF +CRIU +LIBKRUN +WASM:wasmedge +YAJL os: linux pasta: executable: /usr/bin/pasta package: passt-0^20231204.gb86afe3-1.fc39.x86_64 version: | pasta 0^20231204.gb86afe3-1.fc39.x86_64 Copyright Red Hat GNU General Public License, version 2 or laterPodman in a container
No
Privileged Or Rootless
None
Upstream Latest Release
Yes
Additional environment details
I'm facing the same issue with podman on macOS and with privileged podman in a container.
Additional information
n/a