Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Increase receive buffer size #65

Closed
acrogenesis opened this issue Sep 13, 2022 · 3 comments
Closed

Increase receive buffer size #65

acrogenesis opened this issue Sep 13, 2022 · 3 comments

Comments

@acrogenesis
Copy link
Contributor

acrogenesis commented Sep 13, 2022

I get this warning when cloudflared starts

failed to sufficiently increase receive buffer size (was: 208 kiB, wanted: 2048 kiB, got: 416 kiB). See https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size for details.

https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size

@acrogenesis
Copy link
Contributor Author

I think something like this would solve it. https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/

apiVersion: v1
kind: Pod
metadata:
  name: sysctl-example
spec:
  securityContext:
    sysctls:
    - name: net.core.rmem_max
      value: "2500000"
  ...

@adyanth
Copy link
Owner

adyanth commented Sep 14, 2022

All unsafe sysctls are disabled by default and must be allowed manually by the cluster admin on a per-node basis. Pods with disabled unsafe sysctls will be scheduled, but will fail to launch.

Here they refer to one of the net.core.* sysctls as unsafe and should be enabled per node by passing it to the kubelet argument list? Looks like it might not be that straightforward. Did doing the above manually on the deployment work for you?

@adyanth
Copy link
Owner

adyanth commented Jan 8, 2023

#52 / #39 will allow the changes to be made.

@adyanth adyanth closed this as completed Jan 8, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants