docs/userns: Clarify requirements for k8s 1.25/1.26
crun 1.4.3 as well as runc 1.1 both support to open bind-mounts before dropping privileges, as they are inaccessible after switching to the user namespace. So that is the minimum version to use with containerd 1.7. Also, since containerd 2.0 we use idmap mounts for files mounted in the container created by containerd (like etc/hostname, etc/hosts, etc.), so in that case we require newer OCI runtimes too. However, as the kubelet doesn't request idmap mounts for kube volumes, we can lower the kernel version. Signed-off-by: Rodrigo Campos <rodrigoca@microsoft.com>
This commit is contained in:
parent
7a0e6b7e77
commit
f1070c4e18
@ -31,8 +31,20 @@ false` setting in your pod.spec will be **silently ignored**.
|
|||||||
|
|
||||||
### Kubernetes 1.25 and 1.26
|
### Kubernetes 1.25 and 1.26
|
||||||
|
|
||||||
* Containerd 1.7 or greater
|
* Containerd 1.7
|
||||||
* runc 1.1 or greater
|
* You can use runc or crun as the OCI runtime:
|
||||||
|
* runc 1.1 or greater
|
||||||
|
* crun 1.4.3 or greater
|
||||||
|
|
||||||
|
You can also use containerd 2.0 or above, but the same [requirements as Kubernetes 1.27 and
|
||||||
|
greater](#Kubernetes-127-and-greater) apply, except for the Linux kernel. Bear in mind that all the
|
||||||
|
requirements there apply, including file-systems supporting idmap mounts. You can use Linux
|
||||||
|
versions:
|
||||||
|
|
||||||
|
* Linux 5.15: you will suffer from [the containerd 1.7 storage and latency
|
||||||
|
limitations](#Limitations), as it doesn't support idmap mounts for overlayfs.
|
||||||
|
* Linux 5.19 or greater (recommended): it doesn't suffer from any of the containerd 1.7
|
||||||
|
limitations, as overlayfs started supporting idmap mounts on this kernel version.
|
||||||
|
|
||||||
### Kubernetes 1.27 and greater
|
### Kubernetes 1.27 and greater
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user