-
Notifications
You must be signed in to change notification settings - Fork 583
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Containerd Support #94
Comments
Up. Containerd is now production ready, and looks a better choice for K8s than docker-ce. |
Is this officially on the roadmap? |
Curious if there are any updates or visibility into how this fits into roadmap. Thx! |
I'd be interested in CRI-O as well, especially since it joined CNCF. |
what is the status now? |
@superseb Since the kubelet supports using containerd out of the box (supported today wiith kubeadm) can there be a way to mount that socket to the kublet container and set the 'container-runtime-endpoint' option? Really should be a way to mount any supported kubelet container runtime endpoint. It's unfortunate that this has been put off for too long. |
It could work with something like the following: services:
kubelet:
extra_binds:
- "/run/containerd/containerd.sock:/run/containerd/containerd.sock"
extra_args:
container-runtime: remote
container-runtime-endpoint: unix:///run/containerd/containerd.sock But be aware that I did not test this, yet! I hope there will be some time over the next couple of days. Edit: Since |
@DerFetzer : I tried something like that but an issue comes up in RKE where it does a cross check on pods coming up within the cluster (such as the networking plugin). These checks are coded to look in docker for the container. So when you configure kubelet to use containerd to run the processes, the cluster creation inevitably fails because RKE can't find the container in docker. |
Ok, thank you very much! I was afraid that there would be some kind of catch. |
having this would be cool |
Hi! |
I have a couple of CentOS 8 VMs ready to be transformed into k8s (RKE) nodes, and I've just ran into the weirdness of docker-ce installation. |
I came across this today as well. We really need to have CRI-O support for RKE. Is anyone on the RKE side exploring this? @superseb |
@Sharma-Rajat I moved on from Rancher to MicroK8S which does have containerd. It's fine if not even better for prod use. |
RKE2 will support integrated containerd just like k3s with the option of bringing your own cri as well. Will just have to wait until that goes GA. |
@mitchellmaler that's really awesome. Do you know where I can find some projected dates for this? |
@Sharma-Rajat I do not, I have just been following the project as a community member. The Rancher 2.5 wiki does mention rke2 so it could be "released" soon |
With Kubernetes deprecating Dockershim and so Docker as runtime, containerd and/or CRI-O support is even more of an issue: |
@superseb |
+1 from my side. With the latest announcements to remove docker, we see a real threat for the future with RKE. |
It's RKE2. RKE1 depends on docker IMHO. |
RKE2 should have been mentioned by Rancher months ago. I didn't know this even existed. |
|
When is RKE2 released or integrated into RKE? Is a roadmap available? |
You can follow the migration issue here: rancher/rke2#562 |
@immanuelfodor so containerd will only be supported in RKE2? |
Dockershim is only deprecated in 1.20, you can still use RKE until 1.23.
|
And once 1.23 reached, will it means the end of RKEv1? I'm asking because I'm in the middle of migrating our clusters to be based on RKE. |
I'd migrate to RKE2 at this point 😃 I'm not part of the Rancher team, so I can only suppose they wouldn't release a new hyperkube image or wouldn't update the rke binary other than the hyperkube patch versions after 1.22. |
Yes, I've figured it out by your profile :) |
Yes, it's still in the works but looks so promising and much easier to setup. What is blocker for you if I may ask? Note: The RKE->RKE2 migration issue rancher/rke2#562 is part of Rancher v2.6 milestone which is due to April 21: https://github.com/rancher/rke2/milestone/12 so we should have a migration option before 1.23 is released in late 2021. |
The dockershim deprecation is covered in https://rancher.zendesk.com/hc/en-us/articles/360053308831-Rancher-Operational-Advisory-Related-to-deprecation-of-dockershim-in-Kubernetes-v1-20, the part that is being removed and separately maintained by Mirantis is already available (see #2565) and will continue to work after the deprecation. Currently, for any other runtime support you can look at the alternatives mentioned here but there are no plans currently to support anything else in RKE. |
@immanuelfodor, @tomerleib, @irLinja, @Sharma-Rajat or anyone interested in running RKE with CRI-O right now, you can make use of the Sysbox runtime installer to have both CRI-O and the Sysbox runtime installed in your k8s nodes. From that moment on you can deploy your pods the usual way, it's up to you if you want to rely on Sysbox low-level runtime or the traditional OCI runc one. See here for more details. |
|
Not quite. That limit only applies to pods that rely on containers launched in different user-namespaces for extra isolation (rootless). You can still launch as many traditional pods as your hardware allows, so there's no limit in the typical scenario. Also, we will be adjusting this logic soon to ensure that those 16 pods only account for Sysbox pods, so that user can launch as many oci-runc pods as they wish, regardless of their 'rootless' character. |
For visibility:
|
@Nowaker do you recommend that the new rancher cluster should go for RKE2? |
But what the option for RKE1 using as CRI containerd ? |
As Docker is not my best choice runtime engine for worker nodes, any chance to include support for Containerd in the roadmap?
gz#6781
The text was updated successfully, but these errors were encountered: