Commit Graph

85 Commits

Author SHA1 Message Date
Ciprian Hacman 938656b5d5 Update containerd to v2.1.4 2025-08-02 18:09:53 +03:00
justinsb 3f38846ca5 refactor: create abstraction over cluster/instancegroup for building assets
This abstraction should let us change the version on an instance group level.
2024-11-27 07:38:34 -05:00
cuiyourong 0aebba8798 Fix function name in comment
Signed-off-by: cuiyourong <cuiyourong@gmail.com>
2024-04-23 18:07:40 +08:00
Davanum Srinivas e1d696ab00
Set LimitNOFILE to 1048576 instead of `infinity`
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
2024-02-08 09:50:19 -05:00
Jesse Haka f445dfc456
Revert "Don't set LimitNoFile for containerd systemd unit file" 2024-01-30 17:35:47 +02:00
upodroid 275c948cb6 stop specifying LimitNoFILE 2023-12-03 21:57:46 +00:00
Ciprian Hacman 7a1af66152 Add option to provide additional config entries for containerd 2023-10-27 08:56:34 +03:00
Feruzjon Muyassarov 0aeab5e523 containerd: introduce a new field containerd.nri to enable NRI
Node Resource Interface (NRI) is a common framework for plugging
domain or vendor-specific custom logic into container runtime like
containerd. This commit introduces a new congiguration field
`containerd.nri`, providing cluster admins the flexibility to opt
in for this feature in containerd and tune some of its parameters.
By default, NRI is disabled here in accordance with the containerd's
default config file.

Signed-off-by: Feruzjon Muyassarov <feruzjon.muyassarov@intel.com>
2023-10-21 00:26:54 +03:00
Ciprian Hacman 6e6a2a4e7b Address review comments 2023-09-05 12:34:20 +03:00
Ciprian Hacman c43b48a8d8 Remove Docker config option 2023-09-05 07:22:33 +03:00
John Gardiner Myers b3908e592c Remove support for Kubernetes 1.23 2023-09-03 16:22:18 -07:00
John Gardiner Myers d926989600 v1alpha3: Rename GCE networking to GCP 2023-07-09 16:48:26 -07:00
justinsb 62e2b9690b ipv6: containerd routes support for IPv6
If using IPv6 and a kubenet-style CNI (which is more common with
IPv6), we need to support an IPv6 route on the pod, or else Pods will
be unable to reach other Pods.

Co-authored-by: Ciprian Hacman <ciprian@hakman.dev>
2023-07-05 22:53:16 -04:00
Kubernetes Prow Robot b4c5a75829
Merge pull request #15487 from jsafrane/add-selinux
Add optional SELinux support to RHEL clusters
2023-06-19 08:54:22 -07:00
Jan Safranek 0d03095fda Add SELinux support to containerd
Add cluster.Spec.Containerd.SELinuxEnabled field that enables SELinux in
containerd.

With SELinux enabled, all pods that use HostPath volumes must run with
SELinux label `spc_t`, otherwise SELinux denies the pods to touch the host
filesystem.
2023-06-19 15:20:08 +02:00
Kubernetes Prow Robot cddf5ba763
Merge pull request #15037 from johngmyers/nonmasq
Don't set up masquerade if NonMasqueradeCIDR is /0
2023-06-17 00:44:19 -07:00
Ciprian Hacman 96115de2eb Switch contained config file path to `/etc/containerd/config.toml` 2023-02-06 08:12:15 +02:00
John Gardiner Myers c7d0fd7dad Don't set up masquerade if NonMasqueradeCIDR is /0 2023-01-21 22:58:08 -08:00
Justin SB 89125664ef nodeup: don't set up masquerade if nonMasqueradeCIDR not set
If the non-masquerade CIDR is not set, take that as an indication that
we don't want masquerade, rather than failing nodeup.

Not setting a non-masquerade CIDR means that we likely won't preserve
pod IPs for pod-to-pod traffic, but likely just means that more
NATting is done than might be needed.

Omitting the value can also be useful if we're using something like
the ip-masq-agent to manage masquerade rules for us.
2023-01-21 23:13:31 -05:00
John Gardiner Myers 0c323445fb Move UsesKubenet to nodeup.Config 2023-01-15 23:12:00 -08:00
John Gardiner Myers da881fb320 Move NonMasqueradeCIDR to nodeup.Config 2023-01-15 17:19:18 -08:00
John Gardiner Myers fe448ef906 Use NodeupConfig for DockerConfig 2023-01-02 13:58:21 -08:00
John Gardiner Myers 125866792d Use NodeupConfig for ContainerdConfig 2023-01-02 13:42:11 -08:00
John Gardiner Myers 25a897b691 Use NodeupConfig for ContainerRuntime 2023-01-02 12:50:23 -08:00
John Gardiner Myers 8aeefe23ed Use NodeupConfig for cluster name 2023-01-01 13:48:01 -08:00
John Gardiner Myers 7c3e32369a Refactor Context into separate cloudup and nodeup types 2022-12-17 17:42:46 -08:00
John Gardiner Myers 235aa61594 v1alpha3: move networking fields under networking 2022-12-02 19:19:59 -08:00
Ciprian Hacman d29812fc6e Replace fi.Bool/Float*/Int*/StringValue() with fi.ValueOf 2022-11-19 03:45:23 +02:00
Ciprian Hacman 8f79c9bd68 Replace fi.Bool/Float*/Int*/String() with fi.PtrTo() 2022-11-19 03:45:22 +02:00
Ole Markus With 950a69857d Remove usage of cluster kubelet config from nodeup 2022-10-16 21:04:20 +02:00
Ole Markus With e5d33401dc Remove k8s GTE 1.20 checks as it is always true 2022-09-17 20:17:23 +02:00
Ciprian Hacman 5746093297 Install contained from the release package
Signed-off-by: Ciprian Hacman <ciprian@hakman.dev>
2022-02-14 11:27:26 +02:00
Ciprian Hacman dfd0f49594 Install runc from opencontainers/runc
Signed-off-by: Ciprian Hacman <ciprian@hakman.dev>
2022-02-12 14:02:43 +02:00
Ciprian Hacman bf82a8f260 Update pause image to v3.6
Signed-off-by: Ciprian Hacman <ciprian@hakman.dev>
2022-01-19 13:00:36 +02:00
Ole Markus With 166860b668 Create cgroups for kube and runtime if configured 2021-12-20 13:36:45 +01:00
Kai Lueke d93033ae75 Simplify Flatcar containerd exec command
The containerd command used in
https://github.com/kubernetes/kops/pull/12177 is a modification from
the torcx containerd unit. However, how torcx starts containerd is a
implementation detail and it's better to not hardcode torcx in case it
isn't used anymore.
Change the ExecStard command to use /usr/bin/containerd directly,
making it simpler and more future-proof.
2021-12-06 14:07:39 +01:00
Ciprian Hacman ea7df00719 Run hack/update-gofmt.sh 2021-12-01 22:39:50 +02:00
Ole Markus With 2d013e460c Install nvidia container runtime 2021-09-05 20:09:04 +02:00
Ciprian Hacman 84bdfd900d Hardcode Flatcar containerd exec command 2021-08-19 09:50:08 +03:00
Ole Markus With c17ec3a7e7 Move containerd config from cloudup to nodeup 2021-07-14 10:28:37 +02:00
Ole Markus With e7fa3fa82c Set containerd config on nodeup.Config instead of clusterspec
This allows us to set a default containerd config per IG (e.g add a different config for GPU IGs)

Can also be considered a cleanup as we no longer use containerd.overrideConfig as a mechanism for bringing the default containerd config from cloudup to nodeup.
2021-06-15 11:08:22 +02:00
Justin SB 071c090065 containerd installation: always configure, even if we don't install
Even if we don't install containerd (e.g. ContainerOS or Flatcar), we
likely still need to configure it; particularly in the case of
kubenet.

Additionally, on ContainerOS we can't change the path from
/etc/containerd/config.toml, so we have to write it there.  We may in
future be able to use this on all distros.
2021-02-13 18:19:16 -05:00
Justin SB c921aff34c kubenet containerd: match upstream configuration
Configure kubenet in containerd/CNI mode to match upstream configuration.

Biggest change is a move to the ptp plugin.

Co-authored-by: Ciprian Hacman <ciprian@hakman.dev>
2021-02-11 08:25:55 -05:00
Ciprian Hacman 7aeb8c2af3 Add back support for kubenet style networking with containerd 2021-01-24 21:16:45 +02:00
Justin SB f9c43bbb3e containerd: Add /etc/crictl config to enable crictl
This configuration file means users don't have to pass the endpoint
to run crictl.
2021-01-14 23:05:47 -05:00
Ciprian Hacman 422cfad1da Add containerd config file to Flatcar based instances 2021-01-06 15:33:17 +02:00
Ciprian Hacman c02e5a20ea Remove support for Kubenet with containerd 2020-12-27 18:21:16 +02:00
Ciprian Hacman 6986df9523 Update containerd.service file 2020-12-15 11:46:03 +02:00
Ciprian Hacman c36262009b Install container runtime packages as assets - Code Review 1 2020-10-23 11:05:41 +03:00
Ciprian Hacman 732a161313 Install container runtime packages as assets - Main 2020-10-14 15:41:51 +03:00