Update GCE cluster bootstrapping and e2e test
Signed-off-by: Lantao Liu <lantaol@google.com>
This commit is contained in:
parent
05bcc3e88c
commit
936dcceb5a
@ -1,29 +1,31 @@
|
|||||||
#cloud-config
|
#cloud-config
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
# Setup cri-containerd.
|
# Setup containerd.
|
||||||
- path: /etc/systemd/system/cri-containerd-installation.service
|
- path: /etc/systemd/system/containerd-installation.service
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
# installed by cloud-init
|
# installed by cloud-init
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Download and install cri-containerd binaries and configurations.
|
Description=Download and install containerd binaries and configurations.
|
||||||
After=network-online.target
|
After=network-online.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=oneshot
|
Type=oneshot
|
||||||
RemainAfterExit=yes
|
RemainAfterExit=yes
|
||||||
ExecStartPre=/bin/mkdir -p /home/cri-containerd
|
ExecStartPre=/bin/mkdir -p /home/containerd
|
||||||
ExecStartPre=/bin/mount --bind /home/cri-containerd /home/cri-containerd
|
ExecStartPre=/bin/mount --bind /home/containerd /home/containerd
|
||||||
ExecStartPre=/bin/mount -o remount,exec /home/cri-containerd
|
ExecStartPre=/bin/mount -o remount,exec /home/containerd
|
||||||
ExecStartPre=/usr/bin/curl --fail --retry 5 --retry-delay 3 --silent --show-error -H "X-Google-Metadata-Request: True" -o /home/cri-containerd/configure.sh http://metadata.google.internal/computeMetadata/v1/instance/attributes/cri-containerd-configure-sh
|
ExecStartPre=/usr/bin/curl --fail --retry 5 --retry-delay 3 --silent --show-error -H "X-Google-Metadata-Request: True" -o /home/containerd/configure.sh http://metadata.google.internal/computeMetadata/v1/instance/attributes/containerd-configure-sh
|
||||||
ExecStartPre=/bin/chmod 544 /home/cri-containerd/configure.sh
|
ExecStartPre=/bin/chmod 544 /home/containerd/configure.sh
|
||||||
ExecStart=/home/cri-containerd/configure.sh
|
ExecStart=/home/containerd/configure.sh
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
|
# containerd on master uses the cni binary and config in the
|
||||||
|
# release tarball.
|
||||||
- path: /etc/containerd/config.toml
|
- path: /etc/containerd/config.toml
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
@ -35,8 +37,14 @@ write_files:
|
|||||||
path = "/runtime"
|
path = "/runtime"
|
||||||
|
|
||||||
[plugins.linux]
|
[plugins.linux]
|
||||||
shim = "/home/cri-containerd/usr/local/bin/containerd-shim"
|
shim = "/home/containerd/usr/local/bin/containerd-shim"
|
||||||
runtime = "/home/cri-containerd/usr/local/sbin/runc"
|
runtime = "/home/containerd/usr/local/sbin/runc"
|
||||||
|
|
||||||
|
[plugins.cri.cni]
|
||||||
|
bin_dir = "/home/containerd/opt/cni/bin"
|
||||||
|
conf_dir = "/home/containerd/etc/cni/net.d"
|
||||||
|
[plugins.cri.registry.mirrors."docker.io"]
|
||||||
|
endpoint = ["https://mirror.gcr.io","https://registry-1.docker.io"]
|
||||||
|
|
||||||
- path: /etc/systemd/system/containerd.service
|
- path: /etc/systemd/system/containerd.service
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
@ -46,7 +54,7 @@ write_files:
|
|||||||
[Unit]
|
[Unit]
|
||||||
Description=containerd container runtime
|
Description=containerd container runtime
|
||||||
Documentation=https://containerd.io
|
Documentation=https://containerd.io
|
||||||
After=cri-containerd-installation.service
|
After=containerd-installation.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
@ -59,67 +67,36 @@ write_files:
|
|||||||
LimitNPROC=infinity
|
LimitNPROC=infinity
|
||||||
LimitCORE=infinity
|
LimitCORE=infinity
|
||||||
ExecStartPre=/sbin/modprobe overlay
|
ExecStartPre=/sbin/modprobe overlay
|
||||||
ExecStart=/home/cri-containerd/usr/local/bin/containerd --log-level debug
|
ExecStart=/home/containerd/usr/local/bin/containerd --log-level debug
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd.service
|
- path: /etc/systemd/system/containerd-monitor.service
|
||||||
permissions: 0644
|
|
||||||
owner: root
|
|
||||||
content: |
|
|
||||||
# installed by cloud-init
|
|
||||||
[Unit]
|
|
||||||
Description=Kubernetes containerd CRI shim
|
|
||||||
Requires=network-online.target
|
|
||||||
After=cri-containerd-installation.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
Restart=always
|
|
||||||
RestartSec=5
|
|
||||||
LimitNOFILE=1048576
|
|
||||||
# Having non-zero Limit*s causes performance problems due to accounting overhead
|
|
||||||
# in the kernel. We recommend using cgroups to do container-local accounting.
|
|
||||||
LimitNPROC=infinity
|
|
||||||
LimitCORE=infinity
|
|
||||||
# cri-containerd on master uses the cni binary and config in the
|
|
||||||
# release tarball.
|
|
||||||
ExecStart=/home/cri-containerd/usr/local/bin/cri-containerd \
|
|
||||||
--log-level=debug \
|
|
||||||
--network-bin-dir=/home/cri-containerd/opt/cni/bin \
|
|
||||||
--network-conf-dir=/home/cri-containerd/etc/cni/net.d \
|
|
||||||
--cgroup-path=/runtime \
|
|
||||||
--registry=docker.io=https://mirror.gcr.io,https://registry-1.docker.io
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=cri-containerd.target
|
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd-monitor.service
|
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Kubernetes health monitoring for cri-containerd and containerd
|
Description=Kubernetes health monitoring for containerd
|
||||||
After=containerd.service cri-containerd.service
|
After=containerd.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
RestartSec=10
|
RestartSec=10
|
||||||
RemainAfterExit=yes
|
RemainAfterExit=yes
|
||||||
ExecStartPre=/bin/chmod 544 /home/cri-containerd/opt/cri-containerd/cluster/health-monitor.sh
|
ExecStartPre=/bin/chmod 544 /home/containerd/opt/containerd/cluster/health-monitor.sh
|
||||||
ExecStart=/bin/bash -c 'CRICTL=/home/cri-containerd/usr/local/bin/crictl \
|
ExecStart=/bin/bash -c 'CRICTL=/home/containerd/usr/local/bin/crictl \
|
||||||
/home/cri-containerd/opt/cri-containerd/cluster/health-monitor.sh'
|
/home/containerd/opt/containerd/cluster/health-monitor.sh'
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
# TODO(random-liu): Guarantee order.
|
- path: /etc/systemd/system/containerd.target
|
||||||
- path: /etc/systemd/system/cri-containerd.target
|
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=CRI Containerd
|
Description=Containerd
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=kubernetes.target
|
WantedBy=kubernetes.target
|
||||||
@ -221,11 +198,10 @@ write_files:
|
|||||||
|
|
||||||
runcmd:
|
runcmd:
|
||||||
- systemctl daemon-reload
|
- systemctl daemon-reload
|
||||||
|
- systemctl enable containerd-installation.service
|
||||||
- systemctl enable containerd.service
|
- systemctl enable containerd.service
|
||||||
- systemctl enable cri-containerd-installation.service
|
- systemctl enable containerd-monitor.service
|
||||||
- systemctl enable cri-containerd.service
|
- systemctl enable containerd.target
|
||||||
- systemctl enable cri-containerd-monitor.service
|
|
||||||
- systemctl enable cri-containerd.target
|
|
||||||
- systemctl enable kube-master-installation.service
|
- systemctl enable kube-master-installation.service
|
||||||
- systemctl enable kube-master-configuration.service
|
- systemctl enable kube-master-configuration.service
|
||||||
- systemctl enable kubelet-monitor.service
|
- systemctl enable kubelet-monitor.service
|
||||||
|
@ -1,28 +1,28 @@
|
|||||||
#cloud-config
|
#cloud-config
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
# Setup cri-containerd.
|
# Setup containerd.
|
||||||
- path: /etc/systemd/system/cri-containerd-installation.service
|
- path: /etc/systemd/system/containerd-installation.service
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
# installed by cloud-init
|
# installed by cloud-init
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Download and install cri-containerd binaries and configurations.
|
Description=Download and install containerd binaries and configurations.
|
||||||
After=network-online.target
|
After=network-online.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=oneshot
|
Type=oneshot
|
||||||
RemainAfterExit=yes
|
RemainAfterExit=yes
|
||||||
ExecStartPre=/bin/mkdir -p /home/cri-containerd
|
ExecStartPre=/bin/mkdir -p /home/containerd
|
||||||
ExecStartPre=/bin/mount --bind /home/cri-containerd /home/cri-containerd
|
ExecStartPre=/bin/mount --bind /home/containerd /home/containerd
|
||||||
ExecStartPre=/bin/mount -o remount,exec /home/cri-containerd
|
ExecStartPre=/bin/mount -o remount,exec /home/containerd
|
||||||
ExecStartPre=/usr/bin/curl --fail --retry 5 --retry-delay 3 --silent --show-error -H "X-Google-Metadata-Request: True" -o /home/cri-containerd/configure.sh http://metadata.google.internal/computeMetadata/v1/instance/attributes/cri-containerd-configure-sh
|
ExecStartPre=/usr/bin/curl --fail --retry 5 --retry-delay 3 --silent --show-error -H "X-Google-Metadata-Request: True" -o /home/containerd/configure.sh http://metadata.google.internal/computeMetadata/v1/instance/attributes/containerd-configure-sh
|
||||||
ExecStartPre=/bin/chmod 544 /home/cri-containerd/configure.sh
|
ExecStartPre=/bin/chmod 544 /home/containerd/configure.sh
|
||||||
ExecStart=/home/cri-containerd/configure.sh
|
ExecStart=/home/containerd/configure.sh
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
- path: /etc/containerd/config.toml
|
- path: /etc/containerd/config.toml
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
@ -35,8 +35,14 @@ write_files:
|
|||||||
path = "/runtime"
|
path = "/runtime"
|
||||||
|
|
||||||
[plugins.linux]
|
[plugins.linux]
|
||||||
shim = "/home/cri-containerd/usr/local/bin/containerd-shim"
|
shim = "/home/containerd/usr/local/bin/containerd-shim"
|
||||||
runtime = "/home/cri-containerd/usr/local/sbin/runc"
|
runtime = "/home/containerd/usr/local/sbin/runc"
|
||||||
|
|
||||||
|
[plugins.cri.cni]
|
||||||
|
bin_dir = "/home/kubernetes/bin"
|
||||||
|
conf_dir = "/etc/cni/net.d"
|
||||||
|
[plugins.cri.registry.mirrors."docker.io"]
|
||||||
|
endpoint = ["https://mirror.gcr.io","https://registry-1.docker.io"]
|
||||||
|
|
||||||
- path: /etc/systemd/system/containerd.service
|
- path: /etc/systemd/system/containerd.service
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
@ -46,7 +52,7 @@ write_files:
|
|||||||
[Unit]
|
[Unit]
|
||||||
Description=containerd container runtime
|
Description=containerd container runtime
|
||||||
Documentation=https://containerd.io
|
Documentation=https://containerd.io
|
||||||
After=cri-containerd-installation.service
|
After=containerd-installation.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
@ -59,66 +65,36 @@ write_files:
|
|||||||
LimitNPROC=infinity
|
LimitNPROC=infinity
|
||||||
LimitCORE=infinity
|
LimitCORE=infinity
|
||||||
ExecStartPre=/sbin/modprobe overlay
|
ExecStartPre=/sbin/modprobe overlay
|
||||||
ExecStart=/home/cri-containerd/usr/local/bin/containerd --log-level debug
|
ExecStart=/home/containerd/usr/local/bin/containerd --log-level debug
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd.service
|
- path: /etc/systemd/system/containerd-monitor.service
|
||||||
permissions: 0644
|
|
||||||
owner: root
|
|
||||||
content: |
|
|
||||||
# installed by cloud-init
|
|
||||||
[Unit]
|
|
||||||
Description=Kubernetes containerd CRI shim
|
|
||||||
Requires=network-online.target
|
|
||||||
After=cri-containerd-installation.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
Restart=always
|
|
||||||
RestartSec=5
|
|
||||||
LimitNOFILE=1048576
|
|
||||||
# Having non-zero Limit*s causes performance problems due to accounting overhead
|
|
||||||
# in the kernel. We recommend using cgroups to do container-local accounting.
|
|
||||||
LimitNPROC=infinity
|
|
||||||
LimitCORE=infinity
|
|
||||||
# Point to /home/kubernetes/bin where calico setup cni binary in kube-up.sh.
|
|
||||||
# Point to /etc/cni/net.d where calico put cni config in kube-up.sh.
|
|
||||||
ExecStart=/home/cri-containerd/usr/local/bin/cri-containerd \
|
|
||||||
--log-level=debug \
|
|
||||||
--network-bin-dir=/home/kubernetes/bin \
|
|
||||||
--network-conf-dir=/etc/cni/net.d \
|
|
||||||
--cgroup-path=/runtime \
|
|
||||||
--registry=docker.io=https://mirror.gcr.io,https://registry-1.docker.io
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=cri-containerd.target
|
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd-monitor.service
|
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Kubernetes health monitoring for cri-containerd and containerd
|
Description=Kubernetes health monitoring for containerd
|
||||||
After=containerd.service cri-containerd.service
|
After=containerd.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
RestartSec=10
|
RestartSec=10
|
||||||
RemainAfterExit=yes
|
RemainAfterExit=yes
|
||||||
ExecStartPre=/bin/chmod 544 /home/cri-containerd/opt/cri-containerd/cluster/health-monitor.sh
|
ExecStartPre=/bin/chmod 544 /home/containerd/opt/containerd/cluster/health-monitor.sh
|
||||||
ExecStart=/bin/bash -c 'CRICTL=/home/cri-containerd/usr/local/bin/crictl \
|
ExecStart=/bin/bash -c 'CRICTL=/home/containerd/usr/local/bin/crictl \
|
||||||
/home/cri-containerd/opt/cri-containerd/cluster/health-monitor.sh'
|
/home/containerd/opt/containerd/cluster/health-monitor.sh'
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd.target
|
- path: /etc/systemd/system/containerd.target
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=CRI Containerd
|
Description=Containerd
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=kubernetes.target
|
WantedBy=kubernetes.target
|
||||||
@ -220,11 +196,10 @@ write_files:
|
|||||||
|
|
||||||
runcmd:
|
runcmd:
|
||||||
- systemctl daemon-reload
|
- systemctl daemon-reload
|
||||||
|
- systemctl enable containerd-installation.service
|
||||||
- systemctl enable containerd.service
|
- systemctl enable containerd.service
|
||||||
- systemctl enable cri-containerd-installation.service
|
- systemctl enable containerd-monitor.service
|
||||||
- systemctl enable cri-containerd.service
|
- systemctl enable containerd.target
|
||||||
- systemctl enable cri-containerd-monitor.service
|
|
||||||
- systemctl enable cri-containerd.target
|
|
||||||
- systemctl enable kube-node-installation.service
|
- systemctl enable kube-node-installation.service
|
||||||
- systemctl enable kube-node-configuration.service
|
- systemctl enable kube-node-configuration.service
|
||||||
- systemctl enable kubelet-monitor.service
|
- systemctl enable kubelet-monitor.service
|
||||||
|
@ -19,9 +19,9 @@ set -o errexit
|
|||||||
set -o nounset
|
set -o nounset
|
||||||
set -o pipefail
|
set -o pipefail
|
||||||
|
|
||||||
# CRI_CONTAINERD_HOME is the directory for cri-containerd.
|
# CONTAINERD_HOME is the directory for containerd.
|
||||||
CRI_CONTAINERD_HOME="/home/cri-containerd"
|
CONTAINERD_HOME="/home/containerd"
|
||||||
cd "${CRI_CONTAINERD_HOME}"
|
cd "${CONTAINERD_HOME}"
|
||||||
|
|
||||||
# fetch_metadata fetches metadata from GCE metadata server.
|
# fetch_metadata fetches metadata from GCE metadata server.
|
||||||
# Var set:
|
# Var set:
|
||||||
@ -63,5 +63,5 @@ tar xvf "${TARBALL}"
|
|||||||
# Copy crictl config.
|
# Copy crictl config.
|
||||||
cp "${CRI_CONTAINERD_HOME}/etc/crictl.yaml" /etc
|
cp "${CRI_CONTAINERD_HOME}/etc/crictl.yaml" /etc
|
||||||
|
|
||||||
echo "export PATH=${CRI_CONTAINERD_HOME}/usr/local/bin/:${CRI_CONTAINERD_HOME}/usr/local/sbin/:\$PATH" > \
|
echo "export PATH=${CONTAINERD_HOME}/usr/local/bin/:${CONTAINERD_HOME}/usr/local/sbin/:\$PATH" > \
|
||||||
/etc/profile.d/cri-containerd_env.sh
|
/etc/profile.d/containerd_env.sh
|
||||||
|
@ -9,11 +9,11 @@ if [ -z "${CRI_CONTAINERD_VERSION:-}" ]; then
|
|||||||
fi
|
fi
|
||||||
version_file=$(mktemp /tmp/version.XXXX)
|
version_file=$(mktemp /tmp/version.XXXX)
|
||||||
echo "${CRI_CONTAINERD_VERSION}" > "$version_file"
|
echo "${CRI_CONTAINERD_VERSION}" > "$version_file"
|
||||||
export KUBE_MASTER_EXTRA_METADATA="user-data=${GCE_DIR}/cloud-init/master.yaml,cri-containerd-configure-sh=${GCE_DIR}/configure.sh,version=${version_file}"
|
export KUBE_MASTER_EXTRA_METADATA="user-data=${GCE_DIR}/cloud-init/master.yaml,containerd-configure-sh=${GCE_DIR}/configure.sh,version=${version_file}"
|
||||||
export KUBE_NODE_EXTRA_METADATA="user-data=${GCE_DIR}/cloud-init/node.yaml,cri-containerd-configure-sh=${GCE_DIR}/configure.sh,version=${version_file}"
|
export KUBE_NODE_EXTRA_METADATA="user-data=${GCE_DIR}/cloud-init/node.yaml,containerd-configure-sh=${GCE_DIR}/configure.sh,version=${version_file}"
|
||||||
export KUBE_CONTAINER_RUNTIME="remote"
|
export KUBE_CONTAINER_RUNTIME="remote"
|
||||||
export KUBE_CONTAINER_RUNTIME_ENDPOINT="/var/run/cri-containerd.sock"
|
export KUBE_CONTAINER_RUNTIME_ENDPOINT="/run/containerd/containerd.sock"
|
||||||
export KUBE_LOAD_IMAGE_COMMAND="/home/cri-containerd/usr/local/bin/ctrcri load"
|
export KUBE_LOAD_IMAGE_COMMAND="/home/containerd/usr/local/bin/ctrcri load"
|
||||||
export NETWORK_POLICY_PROVIDER="calico"
|
export NETWORK_POLICY_PROVIDER="calico"
|
||||||
export NON_MASQUERADE_CIDR="0.0.0.0/0"
|
export NON_MASQUERADE_CIDR="0.0.0.0/0"
|
||||||
export KUBE_KUBELET_EXTRA_ARGS="--runtime-cgroups=/runtime"
|
export KUBE_KUBELET_EXTRA_ARGS="--runtime-cgroups=/runtime"
|
||||||
|
@ -20,16 +20,15 @@ set -o pipefail
|
|||||||
# CRICTL is the path of crictl
|
# CRICTL is the path of crictl
|
||||||
CRICTL=${CRICTL:-"crictl"}
|
CRICTL=${CRICTL:-"crictl"}
|
||||||
# INITIAL_WAIT_ATTEMPTS is the number to attempt, before start
|
# INITIAL_WAIT_ATTEMPTS is the number to attempt, before start
|
||||||
# performing health check. The problem is that cri-containerd
|
# performing health check. The problem is that containerd is
|
||||||
# and containerd are started around the same time with health
|
# started around the same time with health monitor, it may
|
||||||
# monitor, they may not be ready yet when health-monitor is started.
|
# not be ready yet when health-monitor is started.
|
||||||
INITIAL_WAIT_ATTEMPTS=${INITIAL_WAIT_ATTEMPTS:-5}
|
INITIAL_WAIT_ATTEMPTS=${INITIAL_WAIT_ATTEMPTS:-5}
|
||||||
# COMMAND_TIMEOUT is the timeout for the health check command.
|
# COMMAND_TIMEOUT is the timeout for the health check command.
|
||||||
COMMAND_TIMEOUT=${COMMAND_TIMEOUT:-60}
|
COMMAND_TIMEOUT=${COMMAND_TIMEOUT:-60}
|
||||||
# CHECK_PERIOD is the health check period.
|
# CHECK_PERIOD is the health check period.
|
||||||
CHECK_PERIOD=${CHECK_PERIOD:-10}
|
CHECK_PERIOD=${CHECK_PERIOD:-10}
|
||||||
# SLEEP_SECONDS is the time to sleep after killing cri-containerd
|
# SLEEP_SECONDS is the time to sleep after killing containerd.
|
||||||
# and containerd.
|
|
||||||
SLEEP_SECONDS=${SLEEP_SECONDS:-120}
|
SLEEP_SECONDS=${SLEEP_SECONDS:-120}
|
||||||
|
|
||||||
attempt=1
|
attempt=1
|
||||||
@ -41,11 +40,8 @@ done
|
|||||||
|
|
||||||
echo "Start performing health check."
|
echo "Start performing health check."
|
||||||
while true; do
|
while true; do
|
||||||
# Use crictl pods because it requires both containerd and
|
|
||||||
# cri-containerd to be working.
|
|
||||||
if ! timeout ${COMMAND_TIMEOUT} ${CRICTL} pods > /dev/null; then
|
if ! timeout ${COMMAND_TIMEOUT} ${CRICTL} pods > /dev/null; then
|
||||||
echo "\"$CRICTL pods\" failed!"
|
echo "\"$CRICTL pods\" failed!"
|
||||||
pkill -x cri-containerd
|
|
||||||
pkill -x containerd
|
pkill -x containerd
|
||||||
# Wait for a while, as we don't want to kill it again before it is really up.
|
# Wait for a while, as we don't want to kill it again before it is really up.
|
||||||
sleep ${SLEEP_SECONDS}
|
sleep ${SLEEP_SECONDS}
|
||||||
|
@ -55,4 +55,4 @@ make clean
|
|||||||
DEPLOY_DIR=${DEPLOY_DIR:-""} make push
|
DEPLOY_DIR=${DEPLOY_DIR:-""} make push
|
||||||
# Build and push node e2e tarball.
|
# Build and push node e2e tarball.
|
||||||
PUSH_VERSION=true DEPLOY_DIR=${DEPLOY_DIR:-""} \
|
PUSH_VERSION=true DEPLOY_DIR=${DEPLOY_DIR:-""} \
|
||||||
make push TARBALL_PREFIX=cri-containerd-cni INCLUDE_CNI=true
|
make push TARBALL_PREFIX=cri-containerd-cni INCLUDE_CNI=true CUSTOM_CONTAINERD=true
|
||||||
|
@ -19,9 +19,9 @@ set -o errexit
|
|||||||
set -o nounset
|
set -o nounset
|
||||||
set -o pipefail
|
set -o pipefail
|
||||||
|
|
||||||
# CRI_CONTAINERD_HOME is the directory for cri-containerd.
|
# CONTAINERD_HOME is the directory for containerd.
|
||||||
CRI_CONTAINERD_HOME="/home/cri-containerd"
|
CONTAINERD_HOME="/home/containerd"
|
||||||
cd "${CRI_CONTAINERD_HOME}"
|
cd "${CONTAINERD_HOME}"
|
||||||
|
|
||||||
# fetch_metadata fetches metadata from GCE metadata server.
|
# fetch_metadata fetches metadata from GCE metadata server.
|
||||||
# Var set:
|
# Var set:
|
||||||
@ -72,11 +72,11 @@ curl -f --ipv4 -Lo "${TARBALL}" --connect-timeout 20 --max-time 300 --retry 6 --
|
|||||||
tar xvf "${TARBALL}"
|
tar xvf "${TARBALL}"
|
||||||
|
|
||||||
# Copy crictl config.
|
# Copy crictl config.
|
||||||
cp "${CRI_CONTAINERD_HOME}/etc/crictl.yaml" /etc
|
cp "${CONTAINERD_HOME}/etc/crictl.yaml" /etc
|
||||||
|
|
||||||
# TODO(random-liu): Stop docker on the node, this may break docker.
|
# TODO(random-liu): Stop docker on the node, this may break docker.
|
||||||
echo "export PATH=${CRI_CONTAINERD_HOME}/usr/local/bin/:${CRI_CONTAINERD_HOME}/usr/local/sbin/:\$PATH" > \
|
echo "export PATH=${CONTAINERD_HOME}/usr/local/bin/:${CONTAINERD_HOME}/usr/local/sbin/:\$PATH" > \
|
||||||
/etc/profile.d/cri-containerd_env.sh
|
/etc/profile.d/containerd_env.sh
|
||||||
|
|
||||||
# EXTRA_INIT_SCRIPT is the name of the extra init script after being downloaded.
|
# EXTRA_INIT_SCRIPT is the name of the extra init script after being downloaded.
|
||||||
EXTRA_INIT_SCRIPT="extra-init.sh"
|
EXTRA_INIT_SCRIPT="extra-init.sh"
|
||||||
|
@ -4,21 +4,21 @@ images:
|
|||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
||||||
cosstable2-resource2:
|
cosstable2-resource2:
|
||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
||||||
cosstable2-resource3:
|
cosstable2-resource3:
|
||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
||||||
|
|
||||||
@ -26,35 +26,35 @@ images:
|
|||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 35 pods with 0s? interval \[Benchmark\]'
|
- 'create 35 pods with 0s? interval \[Benchmark\]'
|
||||||
cosstable2-density2:
|
cosstable2-density2:
|
||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
||||||
cosstable2-density2-qps60:
|
cosstable2-density2-qps60:
|
||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 0s? interval \(QPS 60\) \[Benchmark\]'
|
- 'create 105 pods with 0s? interval \(QPS 60\) \[Benchmark\]'
|
||||||
cosstable2-density3:
|
cosstable2-density3:
|
||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-2
|
machine: n1-standard-2
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
||||||
cosstable2-density4:
|
cosstable2-density4:
|
||||||
image: cos-stable-60-9592-90-0
|
image: cos-stable-60-9592-90-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 100ms interval \[Benchmark\]'
|
- 'create 105 pods with 100ms interval \[Benchmark\]'
|
||||||
|
|
||||||
@ -62,42 +62,42 @@ images:
|
|||||||
image: cos-stable-63-10032-71-0
|
image: cos-stable-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
||||||
cosstable1-resource2:
|
cosstable1-resource2:
|
||||||
image: cos-stable-63-10032-71-0
|
image: cos-stable-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
||||||
cosstable1-resource3:
|
cosstable1-resource3:
|
||||||
image: cos-stable-63-10032-71-0
|
image: cos-stable-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
||||||
cosbeta-resource1:
|
cosbeta-resource1:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
||||||
cosbeta-resource2:
|
cosbeta-resource2:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
||||||
cosbeta-resource3:
|
cosbeta-resource3:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
||||||
|
|
||||||
@ -105,35 +105,35 @@ images:
|
|||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 35 pods with 0s? interval \[Benchmark\]'
|
- 'create 35 pods with 0s? interval \[Benchmark\]'
|
||||||
cosbeta-density2:
|
cosbeta-density2:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
||||||
cosbeta-density2-qps60:
|
cosbeta-density2-qps60:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 0s? interval \(QPS 60\) \[Benchmark\]'
|
- 'create 105 pods with 0s? interval \(QPS 60\) \[Benchmark\]'
|
||||||
cosbeta-density3:
|
cosbeta-density3:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-2
|
machine: n1-standard-2
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
- 'create 105 pods with 0s? interval \[Benchmark\]'
|
||||||
cosbeta-density4:
|
cosbeta-density4:
|
||||||
image: cos-beta-63-10032-71-0
|
image: cos-beta-63-10032-71-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'create 105 pods with 100ms interval \[Benchmark\]'
|
- 'create 105 pods with 100ms interval \[Benchmark\]'
|
||||||
|
|
||||||
@ -141,21 +141,21 @@ images:
|
|||||||
image: cos-dev-64-10112-0-0
|
image: cos-dev-64-10112-0-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
||||||
cosdev-resource2:
|
cosdev-resource2:
|
||||||
image: cos-dev-64-10112-0-0
|
image: cos-dev-64-10112-0-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
||||||
cosdev-resource3:
|
cosdev-resource3:
|
||||||
image: cos-dev-64-10112-0-0
|
image: cos-dev-64-10112-0-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
||||||
|
|
||||||
@ -163,21 +163,21 @@ images:
|
|||||||
image: ubuntu-gke-1604-xenial-v20170816-1
|
image: ubuntu-gke-1604-xenial-v20170816-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
||||||
ubuntustable2-resource2:
|
ubuntustable2-resource2:
|
||||||
image: ubuntu-gke-1604-xenial-v20170816-1
|
image: ubuntu-gke-1604-xenial-v20170816-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
||||||
ubuntustable2-resource3:
|
ubuntustable2-resource3:
|
||||||
image: ubuntu-gke-1604-xenial-v20170816-1
|
image: ubuntu-gke-1604-xenial-v20170816-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
||||||
|
|
||||||
@ -185,20 +185,20 @@ images:
|
|||||||
image: ubuntu-gke-1604-xenial-v20171108-1
|
image: ubuntu-gke-1604-xenial-v20171108-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
- 'resource tracking for 0 pods per node \[Benchmark\]'
|
||||||
ubuntustable1-resource2:
|
ubuntustable1-resource2:
|
||||||
image: ubuntu-gke-1604-xenial-v20171108-1
|
image: ubuntu-gke-1604-xenial-v20171108-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
- 'resource tracking for 35 pods per node \[Benchmark\]'
|
||||||
ubuntustable1-resource3:
|
ubuntustable1-resource3:
|
||||||
image: ubuntu-gke-1604-xenial-v20171108-1
|
image: ubuntu-gke-1604-xenial-v20171108-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
machine: n1-standard-1
|
machine: n1-standard-1
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
tests:
|
tests:
|
||||||
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
- 'resource tracking for 105 pods per node \[Benchmark\]'
|
||||||
|
@ -2,8 +2,8 @@ images:
|
|||||||
ubuntu:
|
ubuntu:
|
||||||
image: ubuntu-gke-1604-xenial-v20170420-1
|
image: ubuntu-gke-1604-xenial-v20170420-1
|
||||||
project: ubuntu-os-gke-cloud
|
project: ubuntu-os-gke-cloud
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh"
|
||||||
cos-stable:
|
cos-stable:
|
||||||
image_regex: cos-stable-60-9592-84-0
|
image_regex: cos-stable-60-9592-84-0
|
||||||
project: cos-cloud
|
project: cos-cloud
|
||||||
metadata: "user-data<test/e2e_node/init.yaml,cri-containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
metadata: "user-data<test/e2e_node/init.yaml,containerd-configure-sh<test/configure.sh,extra-init-sh<test/e2e_node/gci-init.sh,gci-update-strategy=update_disabled"
|
||||||
|
@ -1,27 +1,27 @@
|
|||||||
#cloud-config
|
#cloud-config
|
||||||
|
|
||||||
write_files:
|
write_files:
|
||||||
- path: /etc/systemd/system/cri-containerd-installation.service
|
- path: /etc/systemd/system/containerd-installation.service
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
# installed by cloud-init
|
# installed by cloud-init
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=Download and install cri-containerd binaries and configurations.
|
Description=Download and install containerd binaries and configurations.
|
||||||
After=network-online.target
|
After=network-online.target
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Type=oneshot
|
Type=oneshot
|
||||||
RemainAfterExit=yes
|
RemainAfterExit=yes
|
||||||
ExecStartPre=/bin/mkdir -p /home/cri-containerd
|
ExecStartPre=/bin/mkdir -p /home/containerd
|
||||||
ExecStartPre=/bin/mount --bind /home/cri-containerd /home/cri-containerd
|
ExecStartPre=/bin/mount --bind /home/containerd /home/containerd
|
||||||
ExecStartPre=/bin/mount -o remount,exec /home/cri-containerd
|
ExecStartPre=/bin/mount -o remount,exec /home/containerd
|
||||||
ExecStartPre=/usr/bin/curl --fail --retry 5 --retry-delay 3 --silent --show-error -H "X-Google-Metadata-Request: True" -o /home/cri-containerd/configure.sh http://metadata.google.internal/computeMetadata/v1/instance/attributes/cri-containerd-configure-sh
|
ExecStartPre=/usr/bin/curl --fail --retry 5 --retry-delay 3 --silent --show-error -H "X-Google-Metadata-Request: True" -o /home/containerd/configure.sh http://metadata.google.internal/computeMetadata/v1/instance/attributes/containerd-configure-sh
|
||||||
ExecStartPre=/bin/chmod 544 /home/cri-containerd/configure.sh
|
ExecStartPre=/bin/chmod 544 /home/containerd/configure.sh
|
||||||
ExecStart=/home/cri-containerd/configure.sh
|
ExecStart=/home/containerd/configure.sh
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
- path: /etc/containerd/config.toml
|
- path: /etc/containerd/config.toml
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
@ -34,8 +34,14 @@ write_files:
|
|||||||
path = "/runtime"
|
path = "/runtime"
|
||||||
|
|
||||||
[plugins.linux]
|
[plugins.linux]
|
||||||
shim = "/home/cri-containerd/usr/local/bin/containerd-shim"
|
shim = "/home/containerd/usr/local/bin/containerd-shim"
|
||||||
runtime = "/home/cri-containerd/usr/local/sbin/runc"
|
runtime = "/home/containerd/usr/local/sbin/runc"
|
||||||
|
|
||||||
|
[plugins.cri.cni]
|
||||||
|
bin_dir = "/home/containerd/opt/cni/bin"
|
||||||
|
conf_dir = "/home/containerd/etc/cni/net.d"
|
||||||
|
[plugins.cri.registry.mirrors."docker.io"]
|
||||||
|
endpoint = ["https://mirror.gcr.io","https://registry-1.docker.io"]
|
||||||
|
|
||||||
- path: /etc/systemd/system/containerd.service
|
- path: /etc/systemd/system/containerd.service
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
@ -45,7 +51,7 @@ write_files:
|
|||||||
[Unit]
|
[Unit]
|
||||||
Description=containerd container runtime
|
Description=containerd container runtime
|
||||||
Documentation=https://containerd.io
|
Documentation=https://containerd.io
|
||||||
After=cri-containerd-installation.service
|
After=containerd-installation.service
|
||||||
|
|
||||||
[Service]
|
[Service]
|
||||||
Restart=always
|
Restart=always
|
||||||
@ -58,53 +64,24 @@ write_files:
|
|||||||
LimitNPROC=infinity
|
LimitNPROC=infinity
|
||||||
LimitCORE=infinity
|
LimitCORE=infinity
|
||||||
ExecStartPre=/sbin/modprobe overlay
|
ExecStartPre=/sbin/modprobe overlay
|
||||||
ExecStart=/home/cri-containerd/usr/local/bin/containerd --log-level debug
|
ExecStart=/home/containerd/usr/local/bin/containerd --log-level debug
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=cri-containerd.target
|
WantedBy=containerd.target
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd.service
|
- path: /etc/systemd/system/containerd.target
|
||||||
permissions: 0644
|
|
||||||
owner: root
|
|
||||||
content: |
|
|
||||||
# installed by cloud-init
|
|
||||||
[Unit]
|
|
||||||
Description=Kubernetes containerd CRI shim
|
|
||||||
Requires=network-online.target
|
|
||||||
After=cri-containerd-installation.service
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
Restart=always
|
|
||||||
RestartSec=5
|
|
||||||
LimitNOFILE=1048576
|
|
||||||
# Having non-zero Limit*s causes performance problems due to accounting overhead
|
|
||||||
# in the kernel. We recommend using cgroups to do container-local accounting.
|
|
||||||
LimitNPROC=infinity
|
|
||||||
LimitCORE=infinity
|
|
||||||
ExecStart=/home/cri-containerd/usr/local/bin/cri-containerd \
|
|
||||||
--log-level=debug \
|
|
||||||
--network-bin-dir=/home/cri-containerd/opt/cni/bin \
|
|
||||||
--network-conf-dir=/home/cri-containerd/etc/cni/net.d \
|
|
||||||
--cgroup-path=/runtime \
|
|
||||||
--registry=docker.io=https://mirror.gcr.io,https://registry-1.docker.io
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=cri-containerd.target
|
|
||||||
|
|
||||||
- path: /etc/systemd/system/cri-containerd.target
|
|
||||||
permissions: 0644
|
permissions: 0644
|
||||||
owner: root
|
owner: root
|
||||||
content: |
|
content: |
|
||||||
[Unit]
|
[Unit]
|
||||||
Description=CRI Containerd
|
Description=Containerd
|
||||||
|
|
||||||
[Install]
|
[Install]
|
||||||
WantedBy=multi-user.target
|
WantedBy=multi-user.target
|
||||||
|
|
||||||
runcmd:
|
runcmd:
|
||||||
- systemctl daemon-reload
|
- systemctl daemon-reload
|
||||||
|
- systemctl enable containerd-installation.service
|
||||||
- systemctl enable containerd.service
|
- systemctl enable containerd.service
|
||||||
- systemctl enable cri-containerd-installation.service
|
- systemctl enable containerd.target
|
||||||
- systemctl enable cri-containerd.service
|
- systemctl start containerd.target
|
||||||
- systemctl enable cri-containerd.target
|
|
||||||
- systemctl start cri-containerd.target
|
|
||||||
|
Loading…
Reference in New Issue
Block a user