Add document for kube-up.sh
Signed-off-by: Lantao Liu <lantaol@google.com>
This commit is contained in:
@@ -66,7 +66,7 @@ The release tarball could be downloaded from either of the following sources:
|
||||
|
||||
## Step 0: Install Dependent Libraries
|
||||
Install required libraries for seccomp and libapparmor.
|
||||
```shell
|
||||
```bash
|
||||
sudo apt-get update
|
||||
sudo apt-get install libseccomp2
|
||||
sudo apt-get install libapparmor
|
||||
@@ -76,12 +76,18 @@ Note that:
|
||||
2) If your OS distro doesn't support AppArmor, please skip installing `libapparmor`, and AppArmor will be disabled.
|
||||
## Step 1: Download CRI-Containerd Release Tarball
|
||||
Download release tarball for the cri-containerd version you want to install from sources listed [above](#download).
|
||||
```console
|
||||
$ wget https://storage.googleapis.com/cri-containerd-release/cri-containerd-${VERSION}.linux-amd64.tar.gz
|
||||
```bash
|
||||
wget https://storage.googleapis.com/cri-containerd-release/cri-containerd-${VERSION}.linux-amd64.tar.gz
|
||||
```
|
||||
Validate checksum of the release tarball (note that checksum is added since v1.0.0-beta.0):
|
||||
```bash
|
||||
sha1sum cri-containerd-${VERSION}.linux-amd64.tar.gz
|
||||
curl https://storage.googleapis.com/cri-containerd-release/cri-containerd-${VERSION}.linux-amd64.tar.gz.sha1
|
||||
# Compare to make sure the 2 checksums are the same.
|
||||
```
|
||||
## Step 2: Install CRI-Containerd
|
||||
If you are using systemd, just simply unpack the tarball to the root directory:
|
||||
```shell
|
||||
```bash
|
||||
sudo tar -C / -xzf cri-containerd-${VERSION}.linux-amd64.tar.gz
|
||||
sudo mkdir -p /opt/cni/bin/
|
||||
sudo mkdir -p /etc/cni/net.d
|
||||
@@ -98,7 +104,7 @@ Create the systemd drop-in file `/etc/systemd/system/kubelet.service.d/0-cri-con
|
||||
Environment="KUBELET_EXTRA_ARGS=--container-runtime=remote --runtime-request-timeout=15m --container-runtime-endpoint=/var/run/cri-containerd.sock"
|
||||
```
|
||||
And reload systemd configuration:
|
||||
```shell
|
||||
```bash
|
||||
systemctl daemon-reload
|
||||
```
|
||||
## Bring Up the Cluster
|
||||
|
||||
22
docs/kube-up.md
Normal file
22
docs/kube-up.md
Normal file
@@ -0,0 +1,22 @@
|
||||
# Production Quality Cluster on GCE
|
||||
This document provides the steps to bring up a production quality cluster on GCE with [`kube-up.sh`](https://kubernetes.io/docs/getting-started-guides/gce/).
|
||||
|
||||
## Download CRI-Containerd Release Tarball
|
||||
To download release tarball, see [step 1](./installation.md#step-1-download-cri-containerd-release-tarball) in installation.md.
|
||||
|
||||
Unpack release tarball to any directory, using `${CRI_CONTAINERD_PATH}` to indicate the directory in the doc:
|
||||
```bash
|
||||
tar -C ${CRI_CONTAINERD_PATH} -xzf cri-containerd-${VERSION}.linux-amd64.tar.gz
|
||||
```
|
||||
## Set Environment Variables for CRI-Containerd
|
||||
Use environment variable `CRI_CONTAINERD_VERSION` to specify `cri-containerd` version. By default,
|
||||
latest version will be used.
|
||||
```bash
|
||||
. ${CRI_CONTAINERD_PATH}/cluster/gce/env
|
||||
```
|
||||
## Create Kubernetes Cluster on GCE
|
||||
Follow these instructions [here](https://kubernetes.io/docs/getting-started-guides/gce/) to create a production quality Kubernetes cluster on GCE.
|
||||
|
||||
**Make sure the Kubernetes version you are using is v1.9 or greater:**
|
||||
* When using `https://get.k8s.io`, use the environment variable `KUBERNETES_RELEASE` to set version.
|
||||
* When using a Kubernetes release tarball, make sure to select version 1.9 or greater.
|
||||
@@ -6,23 +6,23 @@ Before sending pull requests you should at least make sure your changes have pas
|
||||
## Code Verification
|
||||
Code verification includes lint, code formatting, boilerplate check etc.
|
||||
* Install tools used by code verification:
|
||||
```shell
|
||||
```bash
|
||||
make install.tools
|
||||
```
|
||||
* Run code verification:
|
||||
```shell
|
||||
```bash
|
||||
make verify
|
||||
```
|
||||
## Unit Test
|
||||
Run all unit tests in `cri-containerd` repo.
|
||||
```shell
|
||||
```bash
|
||||
make test
|
||||
```
|
||||
## Integration Test
|
||||
Run all integration tests in `cri-containerd` repo.
|
||||
* [Install dependencies](../README.md#install-dependencies).
|
||||
* Run integration test:
|
||||
```shell
|
||||
```bash
|
||||
make test-integration
|
||||
```
|
||||
## CRI Validation Test
|
||||
@@ -31,15 +31,15 @@ make test-integration
|
||||
CRI validation test makes it possible to verify CRI conformance of `cri-containerd` without setting up Kubernetes components or running Kubernetes end-to-end tests.
|
||||
* [Install dependencies](../README.md#install-dependencies).
|
||||
* Build `cri-containerd`:
|
||||
```shell
|
||||
```bash
|
||||
make
|
||||
```
|
||||
* Run CRI validation test:
|
||||
```shell
|
||||
```bash
|
||||
make test-cri
|
||||
```
|
||||
* Focus or skip specific CRI validation test:
|
||||
```shell
|
||||
```bash
|
||||
make test-cri FOCUS=REGEXP_TO_FOCUS SKIP=REGEXP_TO_SKIP
|
||||
```
|
||||
[More information](https://github.com/kubernetes-incubator/cri-tools) about CRI validation test.
|
||||
@@ -47,11 +47,11 @@ make test-cri FOCUS=REGEXP_TO_FOCUS SKIP=REGEXP_TO_SKIP
|
||||
[Node e2e test](https://github.com/kubernetes/community/blob/master/contributors/devel/e2e-node-tests.md) is a test framework testing Kubernetes node level functionalities such as managing pods, mounting volumes etc. It starts a local cluster with Kubelet and a few other minimum dependencies, and runs node functionality tests against the local cluster.
|
||||
* [Install dependencies](../README.md#install-dependencies).
|
||||
* Run node e2e test:
|
||||
```shell
|
||||
```bash
|
||||
make test-e2e-node
|
||||
```
|
||||
* Focus or skip specific node e2e test:
|
||||
```shell
|
||||
```bash
|
||||
make test-e2e-node FOCUS=REGEXP_TO_FOCUS SKIP=REGEXP_TO_SKIP
|
||||
```
|
||||
[More information](https://github.com/kubernetes/community/blob/master/contributors/devel/e2e-node-tests.md) about Kubernetes node e2e test.
|
||||
|
||||
Reference in New Issue
Block a user