Kubeadm 安装 K8s

5
(1)

以下指令适用于 Kubernetes 1.29.

  1. 更新 apt 包索引并安装使用 Kubernetes apt 仓库所需要的包:sudo apt-get update # apt-transport-https 可能是一个虚拟包(dummy package);如果是的话,你可以跳过安装这个包 sudo apt-get install -y apt-transport-https ca-certificates curl gpg
  2. 下载用于 Kubernetes 软件包仓库的公共签名密钥。所有仓库都使用相同的签名密钥,因此你可以忽略URL中的版本:# 如果 `/etc/apt/keyrings` 目录不存在,则应在 curl 命令之前创建它,请阅读下面的注释。 # sudo mkdir -p -m 755 /etc/apt/keyrings curl -fsSL https://pkgs.k8s.io/core:/stable:/v1.29/deb/Release.key | sudo gpg --dearmor -o /etc/apt/keyrings/kubernetes-apt-keyring.gpg

说明:

在低于 Debian 12 和 Ubuntu 22.04 的发行版本中,/etc/apt/keyrings 默认不存在。 应在 curl 命令之前创建它。

  1. 添加 Kubernetes apt 仓库。 请注意,此仓库仅包含适用于 Kubernetes 1.29 的软件包; 对于其他 Kubernetes 次要版本,则需要更改 URL 中的 Kubernetes 次要版本以匹配你所需的次要版本 (你还应该检查正在阅读的安装文档是否为你计划安装的 Kubernetes 版本的文档)。# 此操作会覆盖 /etc/apt/sources.list.d/kubernetes.list 中现存的所有配置。 echo 'deb [signed-by=/etc/apt/keyrings/kubernetes-apt-keyring.gpg] https://pkgs.k8s.io/core:/stable:/v1.29/deb/ /' | sudo tee /etc/apt/sources.list.d/kubernetes.list
  2. 更新 apt 包索引,安装 kubelet、kubeadm 和 kubectl,并锁定其版本:更新 apt 包索引,安装 kubelet、kubeadm 和 kubectl,并锁定其版本:sudo apt-get update sudo apt-get install -y kubelet kubeadm kubectl sudo apt-mark hold kubelet kubeadm kubectl

安装 kubeadm:

sudo apt-get install -y kubelet kubeadm kubectl

首先说一下镜像下载的问题,一开始找了几个,发现还是阿里的这个可用,别折腾了就用阿里的就行。用 registry.aliyuncs.com/google_containers 而不是 hangzhou 开头的那个,还需要注意的一点是 docker tag的时候,注意tag 是 registry.k8s.io/pause 开头,而不是 k8s.gcr.io/pause 可能和不同的版本有关,我用的是3.9的所以是 registry开头的。

主要取决于`kubeadm config images list` 返回:

~ kubeadm config images list
registry.k8s.io/kube-apiserver:v1.28.1
registry.k8s.io/kube-controller-manager:v1.28.1
registry.k8s.io/kube-scheduler:v1.28.1
registry.k8s.io/kube-proxy:v1.28.1
registry.k8s.io/pause:3.9
registry.k8s.io/etcd:3.5.9-0
registry.k8s.io/coredns/coredns:v1.10.1

部安装好后运行的容器有:

  ~ docker ps | grep ku
43f3dd223c6e   kubernetesui/metrics-scraper                                    "/metrics-sidecar"       4 hours ago      Up 4 hours                                                                                                         k8s_dashboard-metrics-scraper_dashboard-metrics-scraper-5657497c4c-kg5d5_kubernetes-dashboard_aa6a2bbb-4353-465e-8329-daca97fbbd1d_0
5eaec1f1885f   kubernetesui/dashboard                                          "/dashboard --insecu…"   4 hours ago      Up 4 hours                                                                                                         k8s_kubernetes-dashboard_kubernetes-dashboard-78f87ddfc-hjmdg_kubernetes-dashboard_d984a24e-6dd0-4fe1-be5e-b10c0f96cca3_0
7c8b2b0f1486   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 4 hours ago      Up 4 hours                                                                                                         k8s_POD_dashboard-metrics-scraper-5657497c4c-kg5d5_kubernetes-dashboard_aa6a2bbb-4353-465e-8329-daca97fbbd1d_0
8e9261aa7dc3   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 4 hours ago      Up 4 hours                                                                                                         k8s_POD_kubernetes-dashboard-78f87ddfc-hjmdg_kubernetes-dashboard_d984a24e-6dd0-4fe1-be5e-b10c0f96cca3_0
a84cdcd3060f   ead0a4a53df8                                                    "/coredns -conf /etc…"   5 hours ago      Up 5 hours                                                                                                         k8s_coredns_coredns-66f779496c-zcf56_kube-system_2e53844e-ab53-451c-97c6-3d39f01873c2_0
c7c5f219c2c8   ead0a4a53df8                                                    "/coredns -conf /etc…"   5 hours ago      Up 5 hours                                                                                                         k8s_coredns_coredns-66f779496c-qz7s8_kube-system_20a35f8d-e026-4f04-a49c-0407b93845c5_0
6ca2c152ab91   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_coredns-66f779496c-qz7s8_kube-system_20a35f8d-e026-4f04-a49c-0407b93845c5_162
d9c7a137612d   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_coredns-66f779496c-zcf56_kube-system_2e53844e-ab53-451c-97c6-3d39f01873c2_140
7a02d759571f   d73868a08083                                                    "/opt/bin/flanneld -…"   5 hours ago      Up 5 hours                                                                                                         k8s_kube-flannel_kube-flannel-ds-hmg5z_kube-flannel_15864359-7159-41d0-a20b-ad61c5719f86_0
bec36f0de5f0   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_kube-flannel-ds-hmg5z_kube-flannel_15864359-7159-41d0-a20b-ad61c5719f86_0
3df3fd309adb   6cdbabde3874                                                    "/usr/local/bin/kube…"   5 hours ago      Up 5 hours                                                                                                         k8s_kube-proxy_kube-proxy-pn5kl_kube-system_e041867c-a532-44ae-abbf-db23f85fdf61_0
ff25315a8c03   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_kube-proxy-pn5kl_kube-system_e041867c-a532-44ae-abbf-db23f85fdf61_0
152e6a83be5f   73deb9a3f702                                                    "etcd --advertise-cl…"   5 hours ago      Up 5 hours                                                                                                         k8s_etcd_etcd-yangyan-linux_kube-system_1fefc5871a7eddfce29de48ad575e3dc_0
2a4b34745427   5c801295c21d                                                    "kube-apiserver --ad…"   5 hours ago      Up 5 hours                                                                                                         k8s_kube-apiserver_kube-apiserver-yangyan-linux_kube-system_182053f36b75c7913cb63fc07ca73fd3_0
66718debd9a7   b462ce0c8b1f                                                    "kube-scheduler --au…"   5 hours ago      Up 5 hours                                                                                                         k8s_kube-scheduler_kube-scheduler-yangyan-linux_kube-system_d5fdb9d1afd6c19d7d407600f2fa0639_0
3eb2ad8f8a81   821b3dfea27b                                                    "kube-controller-man…"   5 hours ago      Up 5 hours                                                                                                         k8s_kube-controller-manager_kube-controller-manager-yangyan-linux_kube-system_323d7d737f4dbe0c3fcf404ae75c1eed_0
babd2ebc9499   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_kube-scheduler-yangyan-linux_kube-system_d5fdb9d1afd6c19d7d407600f2fa0639_0
06e32960f366   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_kube-controller-manager-yangyan-linux_kube-system_323d7d737f4dbe0c3fcf404ae75c1eed_0
cb8fc520fc29   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_etcd-yangyan-linux_kube-system_1fefc5871a7eddfce29de48ad575e3dc_0
41ba30006b2d   registry.aliyuncs.com/google_containers/pause:3.9               "/pause"                 5 hours ago      Up 5 hours                                                                                                         k8s_POD_kube-apiserver-yangyan-linux_kube-system_182053f36b75c7913cb63fc07ca73fd3

如果打算用Docker作为容器,就使用cri-dockerd这个组件对接CRI。

git clone https://github.com/Mirantis/cri-dockerd.git
cd cri-dockerd
go build -o bin/cri-dockerd

install -o root -g root -m 0755 bin/cri-dockerd /usr/local/bin/cri-dockerd

sudo install -o root -g root -m 0755 bin/cri-dockerd /usr/local/bin/cri-dockerd

sudo sed -i -e 's,/usr/bin/cri-dockerd,/usr/local/bin/cri-dockerd,' /etc/systemd/system/cri-docker.service

如果不用Docker,用Containerd作为容器,不需要安装 cri-dockerd。下面的命令里也就不用指定 –cri-socket参数。

sudo kubeadm init --image-repository registry.aliyuncs.com/google_containers --pod-network-cidr=10.244.0.0/16 --service-cidr=10.96.0.0/16 --cri-socket unix:///var/run/cri-dockerd.sock --kubernetes-version=v1.28.1

在安装过程中,遇到了一些问题,修改了一些配置文件,贴出来,做个记录:

/etc/systemd/system/cri-docker.service 中修改:

ExecStart=/usr/local/bin/cri-dockerd –container-runtime-endpoint fd:// –network-plugin=cni –pod-infra-container-image=registry.aliyuncs.com/google_containers/pause:3.9

下面是正常情况下产生的日志:

➜  ~ 
[init] Using Kubernetes version: v1.28.1
[preflight] Running pre-flight checks
[preflight] Pulling images required for setting up a Kubernetes cluster
[preflight] This might take a minute or two, depending on the speed of your internet connection
[preflight] You can also perform this action in beforehand using 'kubeadm config images pull'
[certs] Using certificateDir folder "/etc/kubernetes/pki"
[certs] Generating "ca" certificate and key
[certs] Generating "apiserver" certificate and key
[certs] apiserver serving cert is signed for DNS names [kubernetes kubernetes.default kubernetes.default.svc kubernetes.default.svc.cluster.local yangyan-linux] and IPs [10.96.0.1 192.168.1.6]
[certs] Generating "apiserver-kubelet-client" certificate and key
[certs] Generating "front-proxy-ca" certificate and key
[certs] Generating "front-proxy-client" certificate and key
[certs] Generating "etcd/ca" certificate and key
[certs] Generating "etcd/server" certificate and key
[certs] etcd/server serving cert is signed for DNS names [localhost yangyan-linux] and IPs [192.168.1.6 127.0.0.1 ::1]
[certs] Generating "etcd/peer" certificate and key
[certs] etcd/peer serving cert is signed for DNS names [localhost yangyan-linux] and IPs [192.168.1.6 127.0.0.1 ::1]
[certs] Generating "etcd/healthcheck-client" certificate and key
[certs] Generating "apiserver-etcd-client" certificate and key
[certs] Generating "sa" key and public key
[kubeconfig] Using kubeconfig folder "/etc/kubernetes"
[kubeconfig] Writing "admin.conf" kubeconfig file
[kubeconfig] Writing "kubelet.conf" kubeconfig file
[kubeconfig] Writing "controller-manager.conf" kubeconfig file
[kubeconfig] Writing "scheduler.conf" kubeconfig file
[etcd] Creating static Pod manifest for local etcd in "/etc/kubernetes/manifests"
[control-plane] Using manifest folder "/etc/kubernetes/manifests"
[control-plane] Creating static Pod manifest for "kube-apiserver"
[control-plane] Creating static Pod manifest for "kube-controller-manager"
[control-plane] Creating static Pod manifest for "kube-scheduler"
[kubelet-start] Writing kubelet environment file with flags to file "/var/lib/kubelet/kubeadm-flags.env"
[kubelet-start] Writing kubelet configuration to file "/var/lib/kubelet/config.yaml"
[kubelet-start] Starting the kubelet
[wait-control-plane] Waiting for the kubelet to boot up the control plane as static Pods from directory "/etc/kubernetes/manifests". This can take up to 4m0s
[apiclient] All control plane components are healthy after 6.002916 seconds
[upload-config] Storing the configuration used in ConfigMap "kubeadm-config" in the "kube-system" Namespace
[kubelet] Creating a ConfigMap "kubelet-config" in namespace kube-system with the configuration for the kubelets in the cluster
[upload-certs] Skipping phase. Please see --upload-certs
[mark-control-plane] Marking the node yangyan-linux as control-plane by adding the labels: [node-role.kubernetes.io/control-plane node.kubernetes.io/exclude-from-external-load-balancers]
[mark-control-plane] Marking the node yangyan-linux as control-plane by adding the taints [node-role.kubernetes.io/control-plane:NoSchedule]
[bootstrap-token] Using token: b2x0d4.FIREGOD.CN
[bootstrap-token] Configuring bootstrap tokens, cluster-info ConfigMap, RBAC Roles
[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to get nodes
[bootstrap-token] Configured RBAC rules to allow Node Bootstrap tokens to post CSRs in order for nodes to get long term certificate credentials
[bootstrap-token] Configured RBAC rules to allow the csrapprover controller automatically approve CSRs from a Node Bootstrap Token
[bootstrap-token] Configured RBAC rules to allow certificate rotation for all node client certificates in the cluster
[bootstrap-token] Creating the "cluster-info" ConfigMap in the "kube-public" namespace
[kubelet-finalize] Updating "/etc/kubernetes/kubelet.conf" to point to a rotatable kubelet client certificate and key
[addons] Applied essential addon: CoreDNS
[addons] Applied essential addon: kube-proxy

Your Kubernetes control-plane has initialized successfully!

To start using your cluster, you need to run the following as a regular user:

  mkdir -p $HOME/.kube
  sudo cp -i /etc/kubernetes/admin.conf $HOME/.kube/config
  sudo chown $(id -u):$(id -g) $HOME/.kube/config

Alternatively, if you are the root user, you can run:

  export KUBECONFIG=/etc/kubernetes/admin.conf

You should now deploy a pod network to the cluster.
Run "kubectl apply -f [podnetwork].yaml" with one of the options listed at:
  https://kubernetes.io/docs/concepts/cluster-administration/addons/

Then you can join any number of worker nodes by running the following on each as root:

kubeadm join 192.168.1.6:6443 --token b2x0d4.FIREGOD.CN \
	--discovery-token-ca-cert-hash sha256:79d54e0af3bf534a3ecce300dd949cbd462fcfiregode6d25e3d60bdf36e3e7f 

启动后`kubectl get node`发现没有Ready,需要安装 flannel:

kubectl apply -f https://raw.githubusercontent.com/coreos/flannel/master/Documentation/kube-flannel.yml

因为为需要在tailscale网络中共享给我的笔记本使用,所以需要加入一个别名给ApiServer证书,原始文件可以使用导出命令(但是我注意到再次到处后并不是修改后的):

kubectl -n kube-system get configmap kubeadm-config -o jsonpath='{.data.ClusterConfiguration}' > kubeadm-config.yml

将修改后的配置保存到文件(我增加了mylinux)

apiServer:
  certSANs:
    - mylinux
    - kubernetes
    - kubernetes.default
    - kubernetes.default.svc
    - kubernetes.default.svc.cluster.local
    - yangyan-linux
  extraArgs:
    authorization-mode: Node,RBAC
  timeoutForControlPlane: 4m0s
apiVersion: kubeadm.k8s.io/v1beta3
certificatesDir: /etc/kubernetes/pki
clusterName: kubernetes
controllerManager: {}
dns: {}
etcd:
  local:
    dataDir: /var/lib/etcd
imageRepository: registry.aliyuncs.com/google_containers
kind: ClusterConfiguration
kubernetesVersion: v1.28.1
networking:
  dnsDomain: cluster.local
  podSubnet: 10.244.0.0/16
  serviceSubnet: 10.96.0.0/16
scheduler: {}

执行重新生成证书:

sudo kubeadm init phase certs apiserver --config=/home/yangyan/kubeadm-config.yml

在执行的时候,我遇到一个问题,总是提示有多个cri-socket,让我指定第一个,但是上面这个重新生成证书的指令并不支持 `–cri-socket`

unknown flag: --cri-socket
To see the stack trace of this error execute with --v=5 or higher

实在是没有办法,将containerd卸载后,才运行过去(证书生成之后为又装回来了),这里有一个前提是为想要用docker的容器,所以才卸载了containerd,但是在为生成证书成功后。

我无意中发现一个问题,发现原来在我docker中的jenkins挂了之后无法启动了,看docker日志,发现docker 它用到 containerd.sock

Sep 03 18:19:28 yangyan-linux dockerd[7754]: time="2023-09-03T18:19:28.258324467+08:00" level=error msg="collecting stats for a84cdcd3060fdecfef9718e055f33d64085d62d066b65d2055c74e3099678a6b: connection error: desc = \"transport: Error while dialing dial unix:///run/containerd/containerd.sock: timeout\": unavailable"

所以后来为又把containerd安装后启用了。

检查一下证书,证明已经有了:

openssl x509 -in /etc/kubernetes/pki/apiserver.crt -noout -text | grep DNS
                DNS:kubernetes, DNS:kubernetes.default, DNS:kubernetes.default.svc, DNS:kubernetes.default.svc.cluster.local, DNS:mylinux, DNS:yangyan-linux, IP Address:10.96.0.1, IP Address:192.168.1.6

也可以不给证书添加域名,只要 ~/.kube/config 配置里面忽略证书验证也可以,如下:

apiVersion: v1
kind: Config
clusters:
- name: kind-kind-cluster
  cluster:
    server: https://127.0.0.1:6443
    certificate-authority-data: 省略
    insecure-skip-tls-verify: true #这里为true表示跳过证书检查

另外后来发现一个在拉取镜像前的一个自动处理方法,替换无法拉取的镜像为国内镜像,参见下文:

对于worker节点,如果想用docker的容器join的命令后面追加cri-socket的参数

sudo kubeadm join 192.168.0.110:6443 --token xxxxxxx --discovery-token-ca-cert-hash sha256:327eb9378418dbf46f14e6078f318f3de8b2f7f0fd9edc0731e363f05507aed8 --cri-socket unix:///var/run/cri-dockerd.sock

下面是Containerd 方式的一些相关配置,如果用docker作为kubelet容器的就不用看下面的了

代理设置:简述关于containerd设置代理 – 知乎 (zhihu.com)

修改containerd服务

执行:

vim /lib/systemd/system/containerd.service

增加以下内容:

Environment="HTTP_PROXY=http://192.168.10.1:1080/"
Environment="HTTPS_PROXY=http://192.168.10.1:1080/"
Environment="NO_PROXY =10.96.0.0/16,127.0.0.1,192.168.0.0/16,localhost"

重启服务:

systemctl daemon-reload
systemctl restart containerd

containerd 配置文件修改

自动生成配置文件

$ containerd config default > /etc/containerd/config.toml

修改配置文件后生效

$ systemctl daemon-reload && systemctl restart containerd

vim /etc/crictl.yaml

runtime-endpoint: unix:///run/containerd/containerd.sock
image-endpoint: unix:///run/containerd/containerd.sock
timeout: 10
debug: false

vim /etc/containerd/config.toml

disabled_plugins = []
imports = []
oom_score = 0
plugin_dir = ""
required_plugins = []
root = "/var/lib/containerd"
state = "/run/containerd"
temp = ""
version = 2

[cgroup]
  path = ""

[debug]
  address = ""
  format = ""
  gid = 0
  level = ""
  uid = 0

[grpc]
  address = "/run/containerd/containerd.sock"
  gid = 0
  max_recv_message_size = 16777216
  max_send_message_size = 16777216
  tcp_address = ""
  tcp_tls_ca = ""
  tcp_tls_cert = ""
  tcp_tls_key = ""
  uid = 0

[metrics]
  address = ""
  grpc_histogram = false

[plugins]

  [plugins."io.containerd.gc.v1.scheduler"]
    deletion_threshold = 0
    mutation_threshold = 100
    pause_threshold = 0.02
    schedule_delay = "0s"
    startup_delay = "100ms"

  [plugins."io.containerd.grpc.v1.cri"]
    device_ownership_from_security_context = false
    disable_apparmor = false
    disable_cgroup = false
    disable_hugetlb_controller = true
    disable_proc_mount = false
    disable_tcp_service = true
    enable_selinux = false
    enable_tls_streaming = false
    enable_unprivileged_icmp = false
    enable_unprivileged_ports = false
    ignore_image_defined_volumes = false
    max_concurrent_downloads = 3
    max_container_log_line_size = 16384
    netns_mounts_under_state_dir = false
    restrict_oom_score_adj = false
    sandbox_image = "registry.aliyuncs.com/google_containers/pause:3.9"
    selinux_category_range = 1024
    stats_collect_period = 10
    stream_idle_timeout = "4h0m0s"
    stream_server_address = "127.0.0.1"
    stream_server_port = "0"
    systemd_cgroup = false
    tolerate_missing_hugetlb_controller = true
    unset_seccomp_profile = ""

    [plugins."io.containerd.grpc.v1.cri".cni]
      bin_dir = "/opt/cni/bin"
      conf_dir = "/etc/cni/net.d"
      conf_template = ""
      ip_pref = ""
      max_conf_num = 1

    [plugins."io.containerd.grpc.v1.cri".containerd]
      default_runtime_name = "runc"
      disable_snapshot_annotations = true
      discard_unpacked_layers = false
      ignore_rdt_not_enabled_errors = false
      no_pivot = false
      snapshotter = "overlayfs"

      [plugins."io.containerd.grpc.v1.cri".containerd.default_runtime]
        base_runtime_spec = ""
        cni_conf_dir = ""
        cni_max_conf_num = 0
        container_annotations = []
        pod_annotations = []
        privileged_without_host_devices = false
        runtime_engine = ""
        runtime_path = ""
        runtime_root = ""
        runtime_type = ""

        [plugins."io.containerd.grpc.v1.cri".containerd.default_runtime.options]

      [plugins."io.containerd.grpc.v1.cri".containerd.runtimes]

        [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc]
          base_runtime_spec = ""
          cni_conf_dir = ""
          cni_max_conf_num = 0
          container_annotations = []
          pod_annotations = []
          privileged_without_host_devices = false
          runtime_engine = ""
          runtime_path = ""
          runtime_root = ""
          runtime_type = "io.containerd.runc.v2"

          [plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc.options]
            BinaryName = ""
            CriuImagePath = ""
            CriuPath = ""
            CriuWorkPath = ""
            IoGid = 0
            IoUid = 0
            NoNewKeyring = false
            NoPivotRoot = false
            Root = ""
            ShimCgroup = ""
            SystemdCgroup = true

      [plugins."io.containerd.grpc.v1.cri".containerd.untrusted_workload_runtime]
        base_runtime_spec = ""
        cni_conf_dir = ""
        cni_max_conf_num = 0
        container_annotations = []
        pod_annotations = []
        privileged_without_host_devices = false
        runtime_engine = ""
        runtime_path = ""
        runtime_root = ""
        runtime_type = ""

        [plugins."io.containerd.grpc.v1.cri".containerd.untrusted_workload_runtime.options]

    [plugins."io.containerd.grpc.v1.cri".image_decryption]
      key_model = "node"

    [plugins."io.containerd.grpc.v1.cri".registry]
      config_path = ""

      [plugins."io.containerd.grpc.v1.cri".registry.auths]

      [plugins."io.containerd.grpc.v1.cri".registry.configs]

      [plugins."io.containerd.grpc.v1.cri".registry.headers]

      [plugins."io.containerd.grpc.v1.cri".registry.mirrors]

    [plugins."io.containerd.grpc.v1.cri".x509_key_pair_streaming]
      tls_cert_file = ""
      tls_key_file = ""

  [plugins."io.containerd.internal.v1.opt"]
    path = "/opt/containerd"

  [plugins."io.containerd.internal.v1.restart"]
    interval = "10s"

  [plugins."io.containerd.internal.v1.tracing"]
    sampling_ratio = 1.0
    service_name = "containerd"

  [plugins."io.containerd.metadata.v1.bolt"]
    content_sharing_policy = "shared"

  [plugins."io.containerd.monitor.v1.cgroups"]
    no_prometheus = false

  [plugins."io.containerd.runtime.v1.linux"]
    no_shim = false
    runtime = "runc"
    runtime_root = ""
    shim = "containerd-shim"
    shim_debug = false

  [plugins."io.containerd.runtime.v2.task"]
    platforms = ["linux/amd64"]
    sched_core = false

  [plugins."io.containerd.service.v1.diff-service"]
    default = ["walking"]

  [plugins."io.containerd.service.v1.tasks-service"]
    rdt_config_file = ""

  [plugins."io.containerd.snapshotter.v1.aufs"]
    root_path = ""

  [plugins."io.containerd.snapshotter.v1.btrfs"]
    root_path = ""

  [plugins."io.containerd.snapshotter.v1.devmapper"]
    async_remove = false
    base_image_size = ""
    discard_blocks = false
    fs_options = ""
    fs_type = ""
    pool_name = ""
    root_path = ""

  [plugins."io.containerd.snapshotter.v1.native"]
    root_path = ""

  [plugins."io.containerd.snapshotter.v1.overlayfs"]
    root_path = ""
    upperdir_label = false

  [plugins."io.containerd.snapshotter.v1.zfs"]
    root_path = ""

  [plugins."io.containerd.tracing.processor.v1.otlp"]
    endpoint = ""
    insecure = false
    protocol = ""

[proxy_plugins]

[stream_processors]

  [stream_processors."io.containerd.ocicrypt.decoder.v1.tar"]
    accepts = ["application/vnd.oci.image.layer.v1.tar+encrypted"]
    args = ["--decryption-keys-path", "/etc/containerd/ocicrypt/keys"]
    env = ["OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf"]
    path = "ctd-decoder"
    returns = "application/vnd.oci.image.layer.v1.tar"

  [stream_processors."io.containerd.ocicrypt.decoder.v1.tar.gzip"]
    accepts = ["application/vnd.oci.image.layer.v1.tar+gzip+encrypted"]
    args = ["--decryption-keys-path", "/etc/containerd/ocicrypt/keys"]
    env = ["OCICRYPT_KEYPROVIDER_CONFIG=/etc/containerd/ocicrypt/ocicrypt_keyprovider.conf"]
    path = "ctd-decoder"
    returns = "application/vnd.oci.image.layer.v1.tar+gzip"

[timeouts]
  "io.containerd.timeout.bolt.open" = "0s"
  "io.containerd.timeout.shim.cleanup" = "5s"
  "io.containerd.timeout.shim.load" = "5s"
  "io.containerd.timeout.shim.shutdown" = "3s"
  "io.containerd.timeout.task.state" = "2s"

[ttrpc]
  address = ""
  gid = 0
  uid = 0

另一片有关的文章:

这篇文章有用吗?

平均评分 5 / 5. 投票数: 1

到目前为止还没有投票!成为第一位评论此文章。

很抱歉,这篇文章对您没有用!

让我们改善这篇文章!

告诉我们我们如何改善这篇文章?