Skip to content

Commit 538ea01

Browse files
authored
Merge pull request #273 from Monstrofil/patch-7
Improve web resource limiting docs section
2 parents cf3e278 + c963012 commit 538ea01

File tree

1 file changed

+17
-16
lines changed

1 file changed

+17
-16
lines changed

docs/cloudlinuxos/limits/README.md

Lines changed: 17 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -725,33 +725,34 @@ It is possible that you still have some questions left unanswered about Reseller
725725

726726
## WEB interface resource limiting modes
727727

728-
Ability to manage the limiting modes of user processes started from web interface (e.g. Node.JS, Ruby and Python Selectors). The configuration allows to disable LVE limiting for some commands or don't limit web commands at all.
728+
CloudLinux provides flexible resource limiting modes for user processes started from the web interface (e.g., Node.js, Ruby, and Python Selectors). The configuration allows administrators to control how LVE limits are applied to web commands, with automatic fallback mechanisms to ensure consistent resource management across different environments.
729729

730730
Also, there is a short list of processes, that runs without CageFS in every modes. They are not affecting security, but we are working on removing them from excludes.
731731

732-
The `web_resource_limit_mode` parameter can be added to any section of the configuration file for convenience and better organization. There are no strict requirements on which section it must be placed in, as configuration files ignore sections. However, it is recommended to add the parameter to existing sections or create a new one.
732+
The web_resource_limit_mode parameter controls resource limiting behavior and can be added to any section of `/etc/sysconfig/cloudlinux` for convenience and better organization. Configuration files ignore section boundaries, so the parameter can be placed in existing sections or new custom sections.
733733

734-
Example of Adding the Parameter to Existing Sections:
735-
736-
[license_check]
737-
email = CP`
738-
cpanel_getemail_script = /usr/share/cloudlinux/clgetcpanelemail
739-
plesk_getemail_script = /usr/share/cloudlinux/clgetpleskemail
740-
web_resource_limit_mode = unlimited
734+
Example Configuration:
735+
```
736+
[license_check]
737+
email = CP`
738+
cpanel_getemail_script = /usr/share/cloudlinux/clgetcpanelemail
739+
plesk_getemail_script = /usr/share/cloudlinux/clgetpleskemail
740+
web_resource_limit_mode = unlimited
741741
742-
[cldiag_cron]
743-
disabled_cldiag_cron_checkers = check-usepam
744-
web_resource_limit_mode = all
742+
[cldiag_cron]
743+
disabled_cldiag_cron_checkers = check-usepam
744+
web_resource_limit_mode = all
745745
746-
[custom_section]
747-
web_resource_limit_mode = unlimited
746+
[custom_section]
747+
web_resource_limit_mode = unlimited
748+
```
748749

749750
Possible parameter values:
750751

751752
* `all`: the default option. All processes will run inside CageFS and with LVE limits being applied.
752753
* `heavy`: there is a list of processes that are considered lightweight. In this mode, they will be executed inside CageFS, but no resource limits: CPU, IO, memory, and NUMPROC. List of ligthweight processes is defined by CloudLinux and it's guarantied that user can't bypass LVE limits for a long-term.
753754
For example, this mode allows a user to execute the `cloudlinux-selector stop` process, even if the user hits the NUMPROC limit.
754-
* `unlimited`: all processes will run inside CageFS, but ignore CPU, IO, memory, and NUMPROC limits. Not recommended for production usage.
755+
* `unlimited`: All processes run without CPU, memory, IO, and NUMPROC limits. CageFS isolation is still applied when available for security. Not recommended for production environments.
755756

756757
### Requirements:
757758

@@ -760,4 +761,4 @@ Possible parameter values:
760761
* lve-wrappers >= 0.7.2
761762
* lvemanager >= 7.5.9
762763
* kmod-lve >= 2.0.36
763-
* lve >= 2.1.2
764+
* lve >= 2.1.2

0 commit comments

Comments
 (0)