-
Notifications
You must be signed in to change notification settings - Fork 717
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
handle kubelet skew with and without dockershim support #2626
Comments
first 1.24 PR is here: |
I may take |
I will send PRs for all the 1.24 changes as these are a bit tricky. But
reviews will be appreciated.
…On Dec 14, 2021 10:08, "Paco Xu" ***@***.***> wrote:
I may take change autodetection to not mix containerd and docker sockets
for docker 18.xx+ task.
/assign
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#2626 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AACRATCD2ZJZDIP3SYDUCF3UQ33RPANCNFSM5J2FWSNQ>
.
Triage notifications on the go with GitHub Mobile for iOS
<https://apps.apple.com/app/apple-store/id1477376905?ct=notification-email&mt=8&pt=524675>
or Android
<https://play.google.com/store/apps/details?id=com.github.android&referrer=utm_campaign%3Dnotification-email%26utm_medium%3Demail%26utm_source%3Dgithub>.
|
second PR that changes the kubeadm defaults / auto detection is here: |
tasks are completed for 1.24, moving to 1.25 milestone. |
1.25 cleanup PR is here: |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
so, one issue is that since we now support kubelet skew of N-3, we can't remove the flag --pod-infra-container-image in kubeadm deployments until 1.29 kubelet goes out of support (if my math is correct). EDIT: or 1.30 if the kubelet removes the flag in 1.30...
up until now we waited 2 releases before removing a flag, because the skew was N-1. but N-3 changes this. @liggitt this is an example of the complexity at hand for N-3. x-posting a note here: |
having some way to indicate the version kubeadm should make a config for seems like it could help simplify this |
agreed, and seems like an oversight that kubeadm upgrade is not wrapping this kubelet upgrade and checking what version if kubelet the user installs, and then perform some action. one quick fix might be to call "kubeadm upgrade ..." another time after the user upgrades a kubelet on a node. for control plane nodes this will be a bit slow. what i don't like is the deprecation progression of the --pod-infra-container-image flag in the kubelet and i think it is messy.
that doesn't seem right, and will force all tools on top of kubelet to have version branching around the k8s support skew. if they care about the GC problem, that is.. https://github.com/kubernetes/kubernetes/pull/118544/files#r1359721938 |
Making it easy for tools to keep setting the no-op flag until the release where it was needed hits EOL would be nice, especially if it is ~zero cost for sig-node. I'd ask them about that. |
Hi @liggitt any update about it? kubeadm and scripts are still using this flag in 1.29. Can we remove this flag from kubelet in 1.30?
Or update the deprecated message with a different release? |
In what release can we count on CRI having the info required so |
If the flag is no-op and cheap for node to keep around, I'd ask if they can keep it until 1.29 is the oldest release. Separately, |
@adisky do you know?
+1, but it seems if the flag is no-op-ed this would mean that users need to upgrade their container runtime as well.
yes, that is the upgrade problem discussed earlier. |
kubernetes/kubernetes#106893 (comment) some updates about the pinned image feature in containerd side:
EDITED Add below context To use that feature, we at least should use containerd v1.7.3+ and containerd 1.6.22+. |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
scoped this item in a dedicated ticket: all other AIs are done here. |
dockershim was removed from the kubelet in early 1.24 development. related flags are also being removed.
history here:
#1412
a few tasks need to be performed to adapt kubeadm for 1.24 and later.
1.24:
kubeadm: handle dockershim specific flags for 1.24 kubernetes#106973
unix:///var/run/cri-dockerd.sock
as the default docker socket?kubeadm: adapt CRI detection and defaults after the dockershim removal kubernetes#107317
kubeadm: adapt docs for 1.24 and dockershim removal website#31309
1.25:
in kubeadm 1.25 kubelet 1.23 will go out of support, because kubeadm 1.25 would only support kubelet 1.25 and 1.24:
kubeadm: perform dockershim cleanup for 1.25 kubernetes#110022
--container-runtime=remote
kubeadm: container runtime is by default docker in kubelet v1.23 kubernetes#110047
1.26
kubeadm: remove container-runtime=remote kubernetes#112000
1.27
TODO
pod-infra-container-image
.. ?Clean up dockershim flags in the kubelet kubernetes#106893
The text was updated successfully, but these errors were encountered: