-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use default containerd socket path #724
Use default containerd socket path #724
Conversation
fa4ee9e
to
349cf74
Compare
Testing this further it looks like the |
Added a symlink in the bootstrap for |
I have the same problem when up and running datadog agent in EKS with containerd. |
9cebec2
to
fd14027
Compare
Rebased on upstream master, what would be the next steps to get this merged? |
Thanks for the PR helped us fixing our Instana Monitoring. We told the AWS Support about that PR and they escalated it to the ServiceTeam. Hopefully it will be merged. |
Hi, We are testing this changes and will merge this PR once this is done. Thanks |
From my testing, you have your symbolic links backwards. Your change:
Man page for ln
Works for me:
|
Nope, that is the right order, the TARGET of the link is Please note that the PR also changes the contents of Maybe you are trying to just run this Both ways would work for AWS VPC CNI plugin and other components that rely on that path for the socket, and maybe it's just my opinion, but I believe it would be a more elegant solution to keep containerd opening the socket on default path(as it is in this PR) and using the symbolic link for the workaround, instead of the other way around, and I believe this would provide a cleaner path later on when eventually the CNI plugin will have to be updated to support the default socket path. |
If you want just commands to run on top of the current AMI to replicate what this PR does, this is what I have been running via cloud-init in our production clusters for the past month:
Note that this 3 lines comes before executing the |
@ravisinha0506 was able to test this internally for multiple versions and different scenarios. |
My bad, I did not catch that you also edited config.toml. Your change makes sense in that context. |
This PR fixes the issue of missing metrics labels when containerd is used with amazon-eks-node-v20211004 AMIs. But it is still broken for GPU-enabled AMIs (amazon-eks-gpu-node) as of v20211004. GPU instances running amazon-eks-gpu-node-1.21-v20211004 failed to join the cluster. |
Description of changes:
The new containerd option as runtime uses
/run/dockershim.sock
as the path for the socket, that is very confusing for people migrating to containerd just because Kubernetes is deprecating dockershim.But the main issue is that the containerd doesn't live in the default place where it's expected to be, and that breaks for example Datadog integration. Even if I supply the correct path to CRI socket it doesn't realise it's a containerd socket and therefore doesn't collect containerd metrics.
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.