Skip to content

Commit b483021

Browse files
authored
Merge pull request #273 from marklogic/MLE-13695/Add-Container-Runtime-Detection
MLE-13695 : Add Container Runtime Detection
2 parents d7d5647 + 76a6fcd commit b483021

File tree

1 file changed

+25
-1
lines changed

1 file changed

+25
-1
lines changed

README.md

Lines changed: 25 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,7 @@
1212
* [Debugging](#Debugging)
1313
* [Clean up](#Clean-up)
1414
* [Image Tag](#Image-Tag)
15+
* [Container Runtime Detection](#container-runtime-detection)
1516
* [Known Issues and Limitations](#Known-Issues-and-Limitations)
1617

1718
# Introduction
@@ -1006,15 +1007,38 @@ It will pull the latest image and can cross patch, minor or major release number
10061007

10071008
**Note: The 'latest' images should not be used in production**
10081009

1010+
# Container Runtime Detection
10091011

1012+
Starting with version 11.2, MarkLogic is able to detect which container runtime the container is running in.
10101013

1014+
## Docker Engine
10111015

1016+
When running on Docker Engine the following entry will show up in the ErrorLogs.txt:
10121017

1018+
`2024-03-15 08:27:36.136 Info: MarkLogic Server is running in a container using Docker runtime. A maximum of <x> huge pages will be used if available.`
1019+
1020+
Where is calculated as described in the [Configuring HugePages](https://github.com/marklogic/marklogic-docker/pull/configuring-hugepages) section.
1021+
1022+
## Containerd Engine
1023+
1024+
When running on Containerd Engine the following entry will show up in the ErrorLogs.txt:
1025+
1026+
`2024-03-15 08:27:36.136 Info: MarkLogic Server is running in a container using Containerd runtime. A maximum of <x> huge pages will be used if available.`
1027+
1028+
Where is calculated as described in the [Configuring HugePages](https://github.com/marklogic/marklogic-docker/pull/configuring-hugepages) section.
1029+
1030+
## CRI-O Engine
1031+
1032+
When running on CRI-O Engine the following entry will show up in the ErrorLogs.txt:
1033+
1034+
`2024-03-15 08:27:36.136 Info: MarkLogic Server is running in a container using CRI-O runtime. A maximum of <x> huge pages will be used if available.`
1035+
1036+
Where is calculated as described in the [Configuring HugePages](https://github.com/marklogic/marklogic-docker/pull/configuring-hugepages) section.
10131037

10141038
# Known Issues and Limitations
10151039

10161040
1. The image must be run in privileged mode. At the moment if the image isn't run as privileged many calls that use `sudo` during the supporting script will fail due to lack of required permissions as the image will not be able to create a user with the required permissions.
10171041
2. Using the "leave" button in the Admin interface to remove a node from a cluster may not succeed, depending on your network configuration. Use the Management API to remove a node from a cluster. See: [https://docs.marklogic.com/REST/DELETE/admin/v1/host-config](https://docs.marklogic.com/REST/DELETE/admin/v1/host-config).
10181042
3. Rejoining a node to a cluster, that had previously left that cluster, may not succeed.
10191043
4. MarkLogic Server will default to the UTC timezone.
1020-
5. The latest released version of CentOS 7 has known security vulnerabilities with respect to glib2 (CVE-2015-8387, CVE-2015-8390, CVE-2015-8394), glibc (CVE-2019-1010022), pcre (CVE-2015-8380, CVE-2015-8387, CVE-2015-8390, CVE-2015-8393, CVE-2015-8394), SQLite (CVE-2019-5827), nss (CVE-2014-3566), and bind-license (CVE-2023-6516, CVE-2023-5679, CVE-2023-5517, CVE-2023-50868, CVE-2023-50387, CVE-2023-4408). These libraries are included in the CentOS base image but, to-date, no fixes have been made available. Even though these libraries may be present in the base image that is used by MarkLogic Server, they are not used by MarkLogic Server itself, hence there is no impact or mitigation required.
1044+
5. The latest released version of CentOS 7 has known security vulnerabilities with respect to glib2 (CVE-2015-8387, CVE-2015-8390, CVE-2015-8394), glibc (CVE-2019-1010022), pcre (CVE-2015-8380, CVE-2015-8387, CVE-2015-8390, CVE-2015-8393, CVE-2015-8394), SQLite (CVE-2019-5827), nss (CVE-2014-3566), and bind-license (CVE-2023-6516, CVE-2023-5679, CVE-2023-5517, CVE-2023-50868, CVE-2023-50387, CVE-2023-4408). These libraries are included in the CentOS base image but, to-date, no fixes have been made available. Even though these libraries may be present in the base image that is used by MarkLogic Server, they are not used by MarkLogic Server itself, hence there is no impact or mitigation required.

0 commit comments

Comments
 (0)