-
Notifications
You must be signed in to change notification settings - Fork 604
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add kubernetes with containerd example #339
Conversation
Maybe should move the k3s.yaml to the same place, since it's not really a container engine (it uses a containerd fork) Container engines:
Container orchestration:
Going with the vulgar k8s.yaml could work, but I think I prefer not to... Seems to be mostly used by a7s (Americans) ? |
SGTM |
I agree with moving k3s to the "orchestration" category, but it is not using a fork of
Maybe use "Kubernetes via kubeadm" and "Kubernetes via k3s" to explain the difference, which is really just the bootstrapping method, (and that
I don't care much either way, but I think |
Fair points, and the differences probably don't matter here anyway. Maybe I will go with k8s.yaml after all, since it looks nicer. Maybe not so much "fork" than recompiled, it does have the benefit of using less resources (compared to using containers for it) $ limactl shell k3s sudo crictl version
Version: 0.1.0
RuntimeName: containerd
RuntimeVersion: v1.4.11-k3s1
RuntimeApiVersion: v1alpha2
$ limactl shell k3s sudo crictl images
IMAGE TAG IMAGE ID SIZE
docker.io/rancher/coredns-coredns 1.8.3 3885a5b7f138c 12.9MB
docker.io/rancher/klipper-helm v0.6.4-build20210813 f0b5a8f3a50a8 64.8MB
docker.io/rancher/klipper-lb v0.2.0 465db341a9e5b 2.71MB
docker.io/rancher/library-traefik 2.4.8 deaf4b1027ed4 27.8MB
docker.io/rancher/local-path-provisioner v0.0.19 148c192562719 13.6MB
docker.io/rancher/metrics-server v0.3.6 9dd718864ce61 10.5MB
docker.io/rancher/pause 3.1 da86e6ba6ca19 327kB Looks like the |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM; maybe squash commits?
Will set up a single-node (i.e. no workers) Kubernetes cluster with kubeadm, using containerd as the CRI and flannel as the CNI. Signed-off-by: Anders F Björklund <[email protected]>
7fdc065
to
d4636b8
Compare
apt-get update | ||
apt-get install -y apt-transport-https ca-certificates curl | ||
curl -fsSLo /usr/share/keyrings/kubernetes-archive-keyring.gpg https://packages.cloud.google.com/apt/doc/apt-key.gpg | ||
echo "deb [signed-by=/usr/share/keyrings/kubernetes-archive-keyring.gpg] https://apt.kubernetes.io/ kubernetes-xenial main" | sudo tee /etc/apt/sources.list.d/kubernetes.list |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why xenial (16.04)?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe we should just use binary tarball if apt.kubernetes.io
is not maintained for recent distros.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
They ship one static go binary to all distros, I think "xenial" and "el7" was just the ones that was there in the beginning ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The deb and rpm packages also handles the dependencies and systemd units, unlike e.g. the containerd/buildkit tarballs
Will set up a single-node (i.e. no workers) Kubernetes "cluster"
with
kubeadm
, using containerd as the CRI and flannel as the CNI.https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/
(this is still the simplest networking: https://github.com/flannel-io/flannel)