containerd相关

一、修改containerd配置文件,添加私有仓库配置
 查看containerd的默认配置
 containerd config default  

k3s集群配置文件位置:
/etc/rancher/k3s/registries.yaml
/var/lib/rancher/k3s/agent/etc/containerd/config.toml

(1)修改配置文件,内容如下:
cat >> /etc/rancher/k3s/registries.yaml <<EOF
mirrors:
  "harbor.test.in":
    endpoint:
      - "https://harbor.test.in"
  "docker.io":
    endpoint:
      - "https://registry-1.docker.io"
configs:
  "harbor.test.in":
    auth:
      username: admin # this is the registry username
      password: 123456 # this is the registry password
    tls:
      ca_file: /etc/ssl/harbor.test.in.crt
EOF

(2)配置信任私有证书(k8s同样操作):
  cp /etc/ssl/harbor.test.in.crt /etc/pki/ca-trust/source/anchors/
  update-ca-trust extract
 
(3)重启k3s:
(经确认:不重启k3s,/var/lib/rancher/k3s/agent/etc/containerd/config.toml文件内容不会更新)
  systemctl restart k3s          #master
  systemctl restart k3s-agent    #work
 注意:work节点需要先创建目录/etc/rancher/k3s/

(4)查看containerd的配置:
  cat /var/lib/rancher/k3s/agent/etc/containerd/config.toml

参考:https://www.infoq.cn/article/jizyup2sl30kkfqjfbl
​ https://rancher.com/docs/k3s/latest/en/installation/private-registry/

二、containerd常用命令行工具

安装k3s集群时默认安装以下两个工具:

ctr:是containerd本身的CLI (对镜像相关操作,推荐ctr)
crictl :是Kubernetes社区定义的专门CLI工具(推荐使用)

containerd命令docker命令注解其他
crictl pulldocker pull拉取镜像
crictl imagesdocker images查看镜像crictl images -q 只打印镜像id
crictl inspectidocker inspect查看镜像详情
crictl rmidocker rmi删除镜像
docker push推送镜像可使用ctr image push
docker load/save -i导入/导出镜像可使用ctr images import/export
crictl psdocker ps查看容器
crictl inspectdocker inspect查看容器详情
crictl logsdocker logs查看容器日志
crictl execdocker exec容器内执行命令
crictl statsdocker stats查看容器资源使用情况
crictl createdocker create创建容器
crictl start/stopdocker start/stop启动/停止容器
crictl rmdocker rm删除容器
crictl pods查看Pod列表
crictl inspectp查看Pod详情
crictl runp启动Pod
crictl stopp停止Pod

crictl工具缺点:
(1)无法给镜像打tag,需要使用docker或ctr打好镜像标签
(2)无法导入/导出镜像

三、使用ctr导入/导出镜像
docker save -o stmp.tar 1a93cf297986    //1a93cf297986为镜像id
ctr image import stmp.tar  //导入镜像。docker save -o 时,不能使用镜像id,要使用镜像名:tag,避免导入报错
ctr image ls     //查看镜像列表
ctr images export  stmp.tar <image-name>  //ctr工具导出镜像命令

导出镜像遇到报错:

ctr: failed to dial “/run/containerd/containerd.sock”: context deadline exceeded

参考解决:https://github.com/containerd/containerd/issues/2758

常用命令:

ctr命令示例说明
ctr image lsctr -n k8s.io i ls查看本地镜像
ctr image pullctr image pull docker.io/library/nginx:alpine拉取镜像
ctr image pushctr image push --plain-http --user admin:123456 192.168.20.11/test/coredns:1.2.0 或者
ctr -n=k8s.io image push --user admin:Harbor12345 harbor.test.in/security/sonarqube:8.9.2-community
推送镜像
ctr image importctr image import coredns.tar 或者 ctr --namespace default image import pg_dump.tar - docker.v1.1导入镜像
ctr image exportctr image export coredns.tar 192.168.20.11/source/coredns:1.2.0导出镜像
ctr image tagctr -n=k8s.io image tag docker.io/library/sonarqube:8.9.2-community harbor.test.in/security/sonarqube:8.9.2-community打镜像标签
ctr image rmctr image rm docker.io/rancher/pause:3.1 或 ctr i rm docker.io/rancher/pause:3.1删除镜像
ctr namespaces lsctr namespaces ls查看命名空间
ctr task ls查看运行的容器

注意

有的环境使用ctr导入镜像后,启动容器无法识别导入的镜像!

此时:ctr image ls 可以查看到镜像列表,但使用crictl images ls 无法查看到导入的镜像。

原因:镜像导入需在特定目录(/var/lib/rancher/k3s/agent/images/)执行导入命令,必要时导入镜像后,需要重启k3s

相关命令:
ctr -n=k8s.io image import xxx.tar    (-n=k8s.io必不可少,否则导入的镜像无法用于集群)
crictl image list   <==>   ctr -n=k8s.io image list
四、ctr私有仓库配置以及使用
1、运行私有仓库
1.1 下载docker私有仓库镜像
镜像:docker.io/library/registry:latest
ctr images import registry.tar
mkdir /home/registry
1.2 生成证书

生成证书(需使用最新版的openssl:https://blog.csdn.net/jugtba/article/details/115484589):

mkdir /home/registry/certs
cd /home/registry/
openssl req \
  -newkey rsa:4096 -nodes -sha256 -keyout certs/domain.key \
  -addext "subjectAltName = DNS:registry-1.docker.io" \
  -x509 -days 365 -out certs/domain.crt

查看证书有效期

openssl x509 -in domain.crt -noout -dates
1.3 创建registry配置文件

配置私有仓库config.yml,内容如下:

version: 0.1
log:
  fields:
    service: registry
storage:
  cache:
    blobdescriptor: inmemory
  filesystem:
    rootdirectory: /var/lib/registry
http:
  addr: :5000      #运行到虚拟机上面不能使用443端口,运行到k8s环境中可以使用443端口
  tls:
    certificate: /home/registry/certs/domain.crt
    key: /home/registry/certs/domain.key
health:
  storagedriver:
    enabled: true
    interval: 10s
    threshold: 3
1.4 运行私有仓库

方法一:运行容器(ctr命令)

ctr run --null-io --net-host  -d --mount type=bind,src=/home/registry,dst=/var/lib/registry,options=rbind:rw   --mount type=bind,src=/home/registry/certs,dst=/certs,options=rbind:rw --mount type=bind,src=/home/registry/config.yml,dst=/etc/docker/registry/config.yml,options=rbind:rw   docker.io/library/registry:latest   v2
##src=/home/registry  表示设置改目录为存放镜像路径

查看容器创建是否成功

ctr c list
netstat -tulnp|grep 5000

方法二:deployment运行私有仓库

镜像名: harbor.test.in/image/registry-server:v1.0 创建deployment:

kubectl create deployment registry -n registry --image=harbor.test.in/iamge/registry-server:v1.0

创建service

kubectl expose deployment registry -n registry --type=NodePort --port=443 --target-port=443
2、配置使用私有仓库(所有节点)
mkdir /etc/rancher/k3s/
touch /etc/rancher/k3s/registries.yaml
cat >> /etc/rancher/k3s/registries.yaml  <<EOF
mirrors:
  "harbor.test.in":
    endpoint:
      - "https://harbor.test.in:5000" 
configs:
  "harbor.test.in:5000":
    tls:
      ca_file: /home/registry/certs/domain.crt
EOF

重启k3s服务
systemctl restart k3s 或 systemctl restart k3s-agent

查看配置 cat /var/lib/rancher/k3s/agent/etc/containerd/config.toml

配置主机信任自签名证书

cp /home/registry/certs/* /etc/pki/ca-trust/source/anchors/
update-ca-trust extract
3、添加harbor域名映射:
vi /etc/hosts
192.168.1.10 harbor.test.in

10.67.240.91 registry-1.docker.io

访问:https://192.168.1.10:5000/v2/_catalog
     或https://harbor.test.in:5000/v2/_catalog
4、测试(默认push到443端口,以ctr部署为例):

修改镜像tag

ctr i tag docker.io/rancher/pause:3.1 harbor.test.in:5000/library/pause:3.1

push到本地私有仓库

ctr i push harbor.test.in:5000/library/pause:3.1
五、查看containerd运行时某个pod对应的主机虚拟网卡信息
brctl show           //查看虚拟化网络设备列表
crictl ps            //找到运行的pod对应的containerd id,如:f3a1d5beb595c

crictl inspect f3a1d5beb595c | grep -i pid //查看该containerd对应的进程id

"pid": 24739,
        "pid": 1
        "type": "pid"
crictl inspect f3a1d5beb595c | grep proc        //获取容器在主机上的工作目录
nsenter -n -t 24739                             //进入容器netns,24739为进程id
ethtool -S  eth0                             //查看容器对应的主机网卡id
NIC statistics:
     peer_ifindex: 52

主机上输入:ip a

找到52对应的网卡名:vetha0e21ec6

手动设置网络该网卡延迟时间:tc qdisc add dev vetha0e21ec6 root netem delay 100ms

此时ping该pod ip:

[root@node1 ~]# ping 10.50.13.36
PING 10.50.13.36 (10.50.13.36) 56(84) bytes of data.
64 bytes from 10.50.13.36: icmp_seq=1 ttl=63 time=100 ms
64 bytes from 10.50.13.36: icmp_seq=2 ttl=63 time=100 ms
64 bytes from 10.50.13.36: icmp_seq=3 ttl=63 time=100 ms
64 bytes from 10.50.13.36: icmp_seq=4 ttl=63 time=100 ms
Logo

为开发者提供学习成长、分享交流、生态实践、资源工具等服务,帮助开发者快速成长。

更多推荐