Actually, say I was in a fancy mood, could I actually *not* use the Docker
image provider and instead run `nvidia-docker run [more hand-crafted
parameters] myimage <cmd>` as an ordinary command within the Mesos
container, or would I have to dig very deep into Mesos to find the right
parameters to pass to nvidia-docker?

Thanks
Tobias

On Thu, Nov 3, 2016 at 10:18 AM, Tobias Pfeiffer <t...@preferred.jp> wrote:

> Hi,
>
> I asked this question also yesterday in the #mesos channel on IRC, but I
> guess due to timezone differences there were not many people awake and/or
> working, sorry for reposting. (Maybe someone answered after I left, but it
> seems that the IRC bot is only archiving channel joins/leaves? ->
> http://wilderness.apache.org/channels/?f=apache-syncope/2016-11-02)
>
> My question is about the Mesos containerizer. I want to run code using the
> Mesos GPU support and the docs state that this is currently only supported
> by the Mesos containerizer. So my understanding of using the Mesos
> containerizer with Docker images is that
> - the content of the Docker images is unpacked to the filesystem (using
> one of the provisioner backends, such as "copy" or "overlay")
> - the user's command is executed in a chroot in that directory.
> Is that correct?
>
> The first thing I noticed is (besides a much higher latency due to the
> image provisioning process) that `ps aux` and `hostname` expose details of
> the host system, so I was wondering about the level of isolation that I can
> achieve with the Mesos containerizer, as opposed to running in a Docker
> container. In particular:
> - Is it possible to hide host processes from the container?
> - Is it possible to run processes that open network ports (possibly
> already open on the host system) and have them mapped to different ports on
> the host system, just as with Docker's `-p`?
> - I have a USER directive in my Dockerfile in order for the CMD to be
> executed as that user, but that does not seem to be supported (yet?) by the
> Docker image provider. Is there any method (except `sudo`/`setuser`) to
> achieve running as a user present in the image's /etc/fstab?
> - I may have to run untrusted code, so can I make sure that users cannot
> break out of the chroot? What about UID namespacing, so that root in the
> chroot does not become root on the host system when breaking out?
>
> Thanks for your help
> Tobias
>

Reply via email to