前往小程序,Get更优阅读体验!
立即前往
首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >推荐两个Docker配置检查与启动异常修复方法脚本

推荐两个Docker配置检查与启动异常修复方法脚本

作者头像
YP小站
发布2020-10-23 14:38:16
3.3K0
发布2020-10-23 14:38:16
举报
文章被收录于专栏:YP小站YP小站

Docker 报错

Docker 启动或者重启时报以上两个错误:

  • Error starting daemon: Devices cgroup isn't mounted
  • Error response from daemon: Cannot restart container rsnmp_v4: OCI runtime create failed: container_linux.go:349: starting container process caused "process_linux.go:297: applying cgroup configuration for process caused \"mountpoint for devices not found\"": unknown

问题都是 cgroup 未挂载。可以通过下面脚本修复。

修复 Docker 启动或者重启报 cgroup 问题

参考链接:https://github.com/tianon/cgroupfs-mount/blob/master/cgroupfs-mount

代码语言:javascript
复制
#!/bin/sh
# Copyright 2011 Canonical, Inc
#           2014 Tianon Gravi
# Author: Serge Hallyn <serge.hallyn@canonical.com>
#         Tianon Gravi <tianon@debian.org>
set -e

# for simplicity this script provides no flexibility

# if cgroup is mounted by fstab, don't run
# don't get too smart - bail on any uncommented entry with 'cgroup' in it
if grep -v '^#' /etc/fstab | grep -q cgroup; then
 echo 'cgroups mounted from fstab, not mounting /sys/fs/cgroup'
 exit 0
fi

# kernel provides cgroups?
if [ ! -e /proc/cgroups ]; then
 exit 0
fi

# if we don't even have the directory we need, something else must be wrong
if [ ! -d /sys/fs/cgroup ]; then
 exit 0
fi

# mount /sys/fs/cgroup if not already done
if ! mountpoint -q /sys/fs/cgroup; then
 mount -t tmpfs -o uid=0,gid=0,mode=0755 cgroup /sys/fs/cgroup
fi

cd /sys/fs/cgroup

# get/mount list of enabled cgroup controllers
for sys in $(awk '!/^#/ { if ($4 == 1) print $1 }' /proc/cgroups); do
 mkdir -p $sys
 if ! mountpoint -q $sys; then
  if ! mount -n -t cgroup -o $sys cgroup $sys; then
   rmdir $sys || true
  fi
 fi
done

# example /proc/cgroups:
#  #subsys_name hierarchy num_cgroups enabled
#  cpuset 2 3 1
#  cpu 3 3 1
#  cpuacct 4 3 1
#  memory 5 3 0
#  devices 6 3 1
#  freezer 7 3 1
#  blkio 8 3 1

# enable cgroups memory hierarchy, like systemd does (and lxc/docker desires)
# https://github.com/systemd/systemd/blob/v245/src/core/cgroup.c#L2983
# https://bugs.debian.org/940713
if [ -e /sys/fs/cgroup/memory/memory.use_hierarchy ]; then
 echo 1 > /sys/fs/cgroup/memory/memory.use_hierarchy
fi

exit 0

检查 Docker 配置脚本

  • 参考链接:https://raw.githubusercontent.com/moby/moby/master/contrib/check-config.sh
代码语言:javascript
复制
#!/usr/bin/env bash
set -e

EXITCODE=0

# bits of this were adapted from lxc-checkconfig
# see also https://github.com/lxc/lxc/blob/lxc-1.0.2/src/lxc/lxc-checkconfig.in

possibleConfigs=(
 '/proc/config.gz'
 "/boot/config-$(uname -r)"
 "/usr/src/linux-$(uname -r)/.config"
 '/usr/src/linux/.config'
)

if [ $# -gt 0 ]; then
 CONFIG="$1"
else
 : "${CONFIG:="${possibleConfigs[0]}"}"
fi

if ! command -v zgrep &> /dev/null; then
 zgrep() {
  zcat "$2" | grep "$1"
 }
fi

kernelVersion="$(uname -r)"
kernelMajor="${kernelVersion%%.*}"
kernelMinor="${kernelVersion#$kernelMajor.}"
kernelMinor="${kernelMinor%%.*}"

is_set() {
 zgrep "CONFIG_$1=[y|m]" "$CONFIG" > /dev/null
}
is_set_in_kernel() {
 zgrep "CONFIG_$1=y" "$CONFIG" > /dev/null
}
is_set_as_module() {
 zgrep "CONFIG_$1=m" "$CONFIG" > /dev/null
}

color() {
 local codes=()
 if [ "$1" = 'bold' ]; then
  codes=("${codes[@]}" '1')
  shift
 fi
 if [ "$#" -gt 0 ]; then
  local code=
  case "$1" in
   # see https://en.wikipedia.org/wiki/ANSI_escape_code#Colors
   black) code=30 ;;
   red) code=31 ;;
   green) code=32 ;;
   yellow) code=33 ;;
   blue) code=34 ;;
   magenta) code=35 ;;
   cyan) code=36 ;;
   white) code=37 ;;
  esac
  if [ "$code" ]; then
   codes=("${codes[@]}" "$code")
  fi
 fi
 local IFS=';'
 echo -en '\033['"${codes[*]}"'m'
}
wrap_color() {
 text="$1"
 shift
 color "$@"
 echo -n "$text"
 color reset
 echo
}

wrap_good() {
 echo "$(wrap_color "$1" white): $(wrap_color "$2" green)"
}
wrap_bad() {
 echo "$(wrap_color "$1" bold): $(wrap_color "$2" bold red)"
}
wrap_warning() {
 wrap_color >&2 "$*" red
}

check_flag() {
 if is_set_in_kernel "$1"; then
  wrap_good "CONFIG_$1" 'enabled'
 elif is_set_as_module "$1"; then
  wrap_good "CONFIG_$1" 'enabled (as module)'
 else
  wrap_bad "CONFIG_$1" 'missing'
  EXITCODE=1
 fi
}

check_flags() {
 for flag in "$@"; do
  echo -n "- "
  check_flag "$flag"
 done
}

check_command() {
 if command -v "$1" > /dev/null 2>&1; then
  wrap_good "$1 command" 'available'
 else
  wrap_bad "$1 command" 'missing'
  EXITCODE=1
 fi
}

check_device() {
 if [ -c "$1" ]; then
  wrap_good "$1" 'present'
 else
  wrap_bad "$1" 'missing'
  EXITCODE=1
 fi
}

check_distro_userns() {
 source /etc/os-release 2> /dev/null || /bin/true
 if [[ "${ID}" =~ ^(centos|rhel)$ && "${VERSION_ID}" =~ ^7 ]]; then
  # this is a CentOS7 or RHEL7 system
  grep -q "user_namespace.enable=1" /proc/cmdline || {
   # no user namespace support enabled
   wrap_bad "  (RHEL7/CentOS7" "User namespaces disabled; add 'user_namespace.enable=1' to boot command line)"
   EXITCODE=1
  }
 fi
}

if [ ! -e "$CONFIG" ]; then
 wrap_warning "warning: $CONFIG does not exist, searching other paths for kernel config ..."
 for tryConfig in "${possibleConfigs[@]}"; do
  if [ -e "$tryConfig" ]; then
   CONFIG="$tryConfig"
   break
  fi
 done
 if [ ! -e "$CONFIG" ]; then
  wrap_warning "error: cannot find kernel config"
  wrap_warning "  try running this script again, specifying the kernel config:"
  wrap_warning "    CONFIG=/path/to/kernel/.config $0 or $0 /path/to/kernel/.config"
  exit 1
 fi
fi

wrap_color "info: reading kernel config from $CONFIG ..." white
echo

echo 'Generally Necessary:'

echo -n '- '
cgroupSubsystemDir="$(awk '/[, ](cpu|cpuacct|cpuset|devices|freezer|memory)[, ]/ && $3 == "cgroup" { print $2 }' /proc/mounts | head -n1)"
cgroupDir="$(dirname "$cgroupSubsystemDir")"
if [ -d "$cgroupDir/cpu" ] || [ -d "$cgroupDir/cpuacct" ] || [ -d "$cgroupDir/cpuset" ] || [ -d "$cgroupDir/devices" ] || [ -d "$cgroupDir/freezer" ] || [ -d "$cgroupDir/memory" ]; then
 echo "$(wrap_good 'cgroup hierarchy' 'properly mounted') [$cgroupDir]"
else
 if [ "$cgroupSubsystemDir" ]; then
  echo "$(wrap_bad 'cgroup hierarchy' 'single mountpoint!') [$cgroupSubsystemDir]"
 else
  wrap_bad 'cgroup hierarchy' 'nonexistent??'
 fi
 EXITCODE=1
 echo "    $(wrap_color '(see https://github.com/tianon/cgroupfs-mount)' yellow)"
fi

if [ "$(cat /sys/module/apparmor/parameters/enabled 2> /dev/null)" = 'Y' ]; then
 echo -n '- '
 if command -v apparmor_parser &> /dev/null; then
  wrap_good 'apparmor' 'enabled and tools installed'
 else
  wrap_bad 'apparmor' 'enabled, but apparmor_parser missing'
  echo -n '    '
  if command -v apt-get &> /dev/null; then
   wrap_color '(use "apt-get install apparmor" to fix this)'
  elif command -v yum &> /dev/null; then
   wrap_color '(your best bet is "yum install apparmor-parser")'
  else
   wrap_color '(look for an "apparmor" package for your distribution)'
  fi
  EXITCODE=1
 fi
fi

flags=(
 NAMESPACES {NET,PID,IPC,UTS}_NS
 CGROUPS CGROUP_CPUACCT CGROUP_DEVICE CGROUP_FREEZER CGROUP_SCHED CPUSETS MEMCG
 KEYS
 VETH BRIDGE BRIDGE_NETFILTER
 NF_NAT_IPV4 IP_NF_FILTER IP_NF_TARGET_MASQUERADE
 NETFILTER_XT_MATCH_{ADDRTYPE,CONNTRACK,IPVS}
 IP_NF_NAT NF_NAT NF_NAT_NEEDED

 # required for bind-mounting /dev/mqueue into containers
 POSIX_MQUEUE
)
check_flags "${flags[@]}"
if [ "$kernelMajor" -lt 4 ] || ([ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -lt 8 ]); then
 check_flags DEVPTS_MULTIPLE_INSTANCES
fi

echo

echo 'Optional Features:'
{
 check_flags USER_NS
 check_distro_userns
}
{
 check_flags SECCOMP
}
{
 check_flags CGROUP_PIDS
}
{
 CODE=${EXITCODE}
 check_flags MEMCG_SWAP MEMCG_SWAP_ENABLED
 if [ -e /sys/fs/cgroup/memory/memory.memsw.limit_in_bytes ]; then
  echo "    $(wrap_color '(cgroup swap accounting is currently enabled)' bold black)"
  EXITCODE=${CODE}
 elif is_set MEMCG_SWAP && ! is_set MEMCG_SWAP_ENABLED; then
  echo "    $(wrap_color '(cgroup swap accounting is currently not enabled, you can enable it by setting boot option "swapaccount=1")' bold black)"
 fi
}
{
 if is_set LEGACY_VSYSCALL_NATIVE; then
  echo -n "- "
  wrap_bad "CONFIG_LEGACY_VSYSCALL_NATIVE" 'enabled'
  echo "    $(wrap_color '(dangerous, provides an ASLR-bypassing target with usable ROP gadgets.)' bold black)"
 elif is_set LEGACY_VSYSCALL_EMULATE; then
  echo -n "- "
  wrap_good "CONFIG_LEGACY_VSYSCALL_EMULATE" 'enabled'
 elif is_set LEGACY_VSYSCALL_NONE; then
  echo -n "- "
  wrap_bad "CONFIG_LEGACY_VSYSCALL_NONE" 'enabled'
  echo "    $(wrap_color '(containers using eglibc <= 2.13 will not work. Switch to' bold black)"
  echo "    $(wrap_color ' "CONFIG_VSYSCALL_[NATIVE|EMULATE]" or use "vsyscall=[native|emulate]"' bold black)"
  echo "    $(wrap_color ' on kernel command line. Note that this will disable ASLR for the,' bold black)"
  echo "    $(wrap_color ' VDSO which may assist in exploiting security vulnerabilities.)' bold black)"
 # else Older kernels (prior to 3dc33bd30f3e, released in v4.40-rc1) do
 #      not have these LEGACY_VSYSCALL options and are effectively
 #      LEGACY_VSYSCALL_EMULATE. Even older kernels are presumably
 #      effectively LEGACY_VSYSCALL_NATIVE.
 fi
}

if [ "$kernelMajor" -lt 4 ] || ([ "$kernelMajor" -eq 4 ] && [ "$kernelMinor" -le 5 ]); then
 check_flags MEMCG_KMEM
fi

if [ "$kernelMajor" -lt 3 ] || ([ "$kernelMajor" -eq 3 ] && [ "$kernelMinor" -le 18 ]); then
 check_flags RESOURCE_COUNTERS
fi

if [ "$kernelMajor" -lt 3 ] || ([ "$kernelMajor" -eq 3 ] && [ "$kernelMinor" -le 13 ]); then
 netprio=NETPRIO_CGROUP
else
 netprio=CGROUP_NET_PRIO
fi

flags=(
 BLK_CGROUP BLK_DEV_THROTTLING IOSCHED_CFQ CFQ_GROUP_IOSCHED
 CGROUP_PERF
 CGROUP_HUGETLB
 NET_CLS_CGROUP $netprio
 CFS_BANDWIDTH FAIR_GROUP_SCHED RT_GROUP_SCHED
 IP_NF_TARGET_REDIRECT
 IP_VS
 IP_VS_NFCT
 IP_VS_PROTO_TCP
 IP_VS_PROTO_UDP
 IP_VS_RR
)
check_flags "${flags[@]}"

if ! is_set EXT4_USE_FOR_EXT2; then
 check_flags EXT3_FS EXT3_FS_XATTR EXT3_FS_POSIX_ACL EXT3_FS_SECURITY
 if ! is_set EXT3_FS || ! is_set EXT3_FS_XATTR || ! is_set EXT3_FS_POSIX_ACL || ! is_set EXT3_FS_SECURITY; then
  echo "    $(wrap_color '(enable these ext3 configs if you are using ext3 as backing filesystem)' bold black)"
 fi
fi

check_flags EXT4_FS EXT4_FS_POSIX_ACL EXT4_FS_SECURITY
if ! is_set EXT4_FS || ! is_set EXT4_FS_POSIX_ACL || ! is_set EXT4_FS_SECURITY; then
 if is_set EXT4_USE_FOR_EXT2; then
  echo "    $(wrap_color 'enable these ext4 configs if you are using ext3 or ext4 as backing filesystem' bold black)"
 else
  echo "    $(wrap_color 'enable these ext4 configs if you are using ext4 as backing filesystem' bold black)"
 fi
fi

echo '- Network Drivers:'
echo "  - \"$(wrap_color 'overlay' blue)\":"
check_flags VXLAN BRIDGE_VLAN_FILTERING | sed 's/^/    /'
echo '      Optional (for encrypted networks):'
check_flags CRYPTO CRYPTO_AEAD CRYPTO_GCM CRYPTO_SEQIV CRYPTO_GHASH \
 XFRM XFRM_USER XFRM_ALGO INET_ESP INET_XFRM_MODE_TRANSPORT | sed 's/^/      /'
echo "  - \"$(wrap_color 'ipvlan' blue)\":"
check_flags IPVLAN | sed 's/^/    /'
echo "  - \"$(wrap_color 'macvlan' blue)\":"
check_flags MACVLAN DUMMY | sed 's/^/    /'
echo "  - \"$(wrap_color 'ftp,tftp client in container' blue)\":"
check_flags NF_NAT_FTP NF_CONNTRACK_FTP NF_NAT_TFTP NF_CONNTRACK_TFTP | sed 's/^/    /'

# only fail if no storage drivers available
CODE=${EXITCODE}
EXITCODE=0
STORAGE=1

echo '- Storage Drivers:'
echo "  - \"$(wrap_color 'aufs' blue)\":"
check_flags AUFS_FS | sed 's/^/    /'
if ! is_set AUFS_FS && grep -q aufs /proc/filesystems; then
 echo "      $(wrap_color '(note that some kernels include AUFS patches but not the AUFS_FS flag)' bold black)"
fi
[ "$EXITCODE" = 0 ] && STORAGE=0
EXITCODE=0

echo "  - \"$(wrap_color 'btrfs' blue)\":"
check_flags BTRFS_FS | sed 's/^/    /'
check_flags BTRFS_FS_POSIX_ACL | sed 's/^/    /'
[ "$EXITCODE" = 0 ] && STORAGE=0
EXITCODE=0

echo "  - \"$(wrap_color 'devicemapper' blue)\":"
check_flags BLK_DEV_DM DM_THIN_PROVISIONING | sed 's/^/    /'
[ "$EXITCODE" = 0 ] && STORAGE=0
EXITCODE=0

echo "  - \"$(wrap_color 'overlay' blue)\":"
check_flags OVERLAY_FS | sed 's/^/    /'
[ "$EXITCODE" = 0 ] && STORAGE=0
EXITCODE=0

echo "  - \"$(wrap_color 'zfs' blue)\":"
echo -n "    - "
check_device /dev/zfs
echo -n "    - "
check_command zfs
echo -n "    - "
check_command zpool
[ "$EXITCODE" = 0 ] && STORAGE=0
EXITCODE=0

EXITCODE=$CODE
[ "$STORAGE" = 1 ] && EXITCODE=1

echo

check_limit_over() {
 if [ "$(cat "$1")" -le "$2" ]; then
  wrap_bad "- $1" "$(cat "$1")"
  wrap_color "    This should be set to at least $2, for example set: sysctl -w kernel/keys/root_maxkeys=1000000" bold black
  EXITCODE=1
 else
  wrap_good "- $1" "$(cat "$1")"
 fi
}

echo 'Limits:'
check_limit_over /proc/sys/kernel/keys/root_maxkeys 10000
echo

exit $EXITCODE

本文参与 腾讯云自媒体分享计划,分享自微信公众号。
原始发表:2020-10-12,如有侵权请联系 cloudcommunity@tencent.com 删除

本文分享自 YP小站 微信公众号,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文参与 腾讯云自媒体分享计划  ,欢迎热爱写作的你一起参与!

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • Docker 报错
  • 修复 Docker 启动或者重启报 cgroup 问题
  • 检查 Docker 配置脚本
相关产品与服务
容器镜像服务
容器镜像服务(Tencent Container Registry,TCR)为您提供安全独享、高性能的容器镜像托管分发服务。您可同时在全球多个地域创建独享实例,以实现容器镜像的就近拉取,降低拉取时间,节约带宽成本。TCR 提供细颗粒度的权限管理及访问控制,保障您的数据安全。
领券
问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档