-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
decide how to handle the breakout of the dockershim from the kubelet. #1412
Comments
I'll move in on this one. /assign |
We're blocked on kubelet changes first. |
/remove-help This does not fit the help wanted definition because:
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-testing, kubernetes/test-infra and/or fejta. |
/remove-lifecycle stale |
Should cri-dockerd now be distributed by mirantis etc. downstream just as docker and containerd etc. are handled by their vendor(s) / distros? (given that the kubernetes project is not going to own this binary) |
my vote goes for not releasing cri-dockerd as part of the k8s release packages, though this is up to sig-release to decide. on the kubeadm side, my prior proposal was to stop managing the CR cgroup driver and sandbox image for all CRs. docker was the only one we did that for and now that it becomes external we should stop doing these actions completely. a few documentation updates will be required for users to prepare these during node setup at: |
@neolit123 if the docker-shim is remove by kubelet, how will we handle the upgrade of control-plane which is using docker as runtime? |
The plan is for dockershim to be a separete binary downloaded from a third
party location. It would become the responsibility of the cluster admin to
install / configure / upgrade it.
|
status update for 1.23 around the planned dockershim removal in 1.24:
|
looks like dockershim was removed from the kubelet in k/k master (PR is LGTM/approved) this means we have to switch our e2e jobs against k/k master to containerd. since our setup is rather complex it would be easier to switch the jobs against all k/k branches to containerd. to do that we have to modify the base image in all the files here: and then run EDIT: PR for that is here: |
one problem in the kubeadm code base is here: with our support skew we'd have to not manage this branching for kubelet N (assuming one can set it manually in cri-dockerd or if it's i think this issue can be closed after that. in an ideal world the https://github.com/Mirantis/cri-dockerd project should include docs on how to deploy a service (e.g. managed by systemd) for users that never want to move away from docker(shim).also assuming the project will gain maintenance traction. |
BTW, is the description of this issue current? (if not, would it be useful to revise it?) |
good point, updated with a summary |
cross linking to the tracking issue for dockershim removal feedback: |
Currently they refer to https://docs.mirantis.com, which doesn't have any information for cri-dockerd It only documents the Mirantis Container Runtime (MCR) and Mirantis Kubernetes Engine (MKE) products. |
closing in favor of remain tasks for 1.24 and later TBD here: |
this issue tracks the dockershim deprecation / removal with some key events over time.
summary of the kubeadm stance for the dockershim removal:
you'd have to build and deploy cri-dockerd on the host that exposes the dockershim CRI socket:
https://github.com/Mirantis/cri-dockerd
this is possible with init|joinconfiguration.noderegistration.crisocket
history:
update 19.05.2020:
Build Kubelet without Docker enhancements#1546
update 11.11.2020:
Deprecate Dockershim kubernetes#94624
Removing dockershim from kubelet enhancements#1985
update 1.24 / 12.2021:
decide how to handle the breakout of the dockershim from the kubelet. #1412 (comment)
kinder: switch all workflows to containerd #2620
Clean up dockershim flags in the kubelet kubernetes#106907
The text was updated successfully, but these errors were encountered: