Skip to content

Latest commit

 

History

History
232 lines (185 loc) · 4.98 KB

runtime-handler-shim-v2-quickstart.md

File metadata and controls

232 lines (185 loc) · 4.98 KB

Runtime Handler Quickstart (Shim V2)

This document describes how to install and run containerd-shim-runsc-v1 using the containerd runtime handler support. This requires containerd 1.2 or later.

Requirements

Install

Install containerd-shim-runsc-v1

  1. Build and install containerd-shim-runsc-v1.
{ # Step 1(dev): Build and install gvisor-containerd-shim and containerd-shim-runsc-v1
    make
    sudo make install
}

Configure containerd

  1. Update /etc/containerd/config.toml. Make sure containerd-shim-runsc-v1 is in ${PATH}.
{ # Step 1: Create containerd config.toml
cat <<EOF | sudo tee /etc/containerd/config.toml
disabled_plugins = ["restart"]
[plugins.linux]
  shim_debug = true
[plugins.cri.containerd.runtimes.runsc]
  runtime_type = "io.containerd.runsc.v1"
EOF
}
  1. Restart containerd
sudo systemctl restart containerd

Usage

You can run containers in gVisor via containerd's CRI.

Install crictl

  1. Download and install the crictl binary:
{ # Step 1: Download crictl
wget https://github.com/kubernetes-sigs/cri-tools/releases/download/v1.13.0/crictl-v1.13.0-linux-amd64.tar.gz
tar xf crictl-v1.13.0-linux-amd64.tar.gz
sudo mv crictl /usr/local/bin
}
  1. Write the crictl configuration file
{ # Step 2: Configure crictl
cat <<EOF | sudo tee /etc/crictl.yaml
runtime-endpoint: unix:///run/containerd/containerd.sock
EOF
}

Create the nginx Sandbox in gVisor

  1. Pull the nginx image
{ # Step 1: Pull the nginx image
sudo crictl pull nginx
}
  1. Create the sandbox creation request
{ # Step 2: Create sandbox.json
cat <<EOF | tee sandbox.json
{
    "metadata": {
        "name": "nginx-sandbox",
        "namespace": "default",
        "attempt": 1,
        "uid": "hdishd83djaidwnduwk28bcsb"
    },
    "linux": {
    },
    "log_directory": "/tmp"
}
EOF
}
  1. Create the pod in gVisor
{ # Step 3: Create the sandbox
SANDBOX_ID=$(sudo crictl runp --runtime runsc sandbox.json)
}

Run the nginx Container in the Sandbox

  1. Create the nginx container creation request
{ # Step 1: Create nginx container config
cat <<EOF | tee container.json
{
  "metadata": {
      "name": "nginx"
    },
  "image":{
      "image": "nginx"
    },
  "log_path":"nginx.0.log",
  "linux": {
  }
}
EOF
}
  1. Create the nginx container
{ # Step 2: Create nginx container
CONTAINER_ID=$(sudo crictl create ${SANDBOX_ID} container.json sandbox.json)
}
  1. Start the nginx container
{ # Step 3: Start nginx container
sudo crictl start ${CONTAINER_ID}
}

Validate the container

  1. Inspect the created pod
{ # Step 1: Inspect the pod
sudo crictl inspectp ${SANDBOX_ID}
}
  1. Inspect the nginx container
{ # Step 2: Inspect the container
sudo crictl inspect ${CONTAINER_ID}
}
  1. Verify that nginx is running in gVisor
{ # Step 3: Check dmesg
sudo crictl exec ${CONTAINER_ID} dmesg | grep -i gvisor
}

Set up the Kubernetes Runtime Class

  1. Install the Runtime Class for gVisor
{ # Step 1: Install a RuntimeClass
cat <<EOF | kubectl apply -f -
apiVersion: node.k8s.io/v1beta1
kind: RuntimeClass
metadata:
  name: gvisor
handler: runsc
EOF
}
  1. Create a Pod with the gVisor Runtime Class
{ # Step 2: Create a pod
cat <<EOF | kubectl apply -f -
apiVersion: v1
kind: Pod
metadata:
  name: nginx-gvisor
spec:
  runtimeClassName: gvisor
  containers:
  - name: nginx
    image: nginx
EOF
}
  1. Verify that the Pod is running
{ # Step 3: Get the pod
kubectl get pod nginx-gvisor -o wide
}