-
Notifications
You must be signed in to change notification settings - Fork 524
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Non-1.23 K8s: Deprecate dockershim.sock and use containerd.sock
for container runtime
#2212
Labels
status/needs-triage
Pending triage or re-evaluation
Comments
4 tasks
4 tasks
psact
pushed a commit
to psact/core-dump-handler
that referenced
this issue
Jul 18, 2022
Bottlerocket mounts the containerd socket under /run/dockershim.sock, which does not appear to be part of the standard privileged container. Add mountContainerRuntimeEndpoint: false hostContainerRuntimeEndpoint: "/run/containerd/containerd.sock" as chart defaults. bottlerocket-os/bottlerocket@91810c8 bottlerocket-os/bottlerocket#2212
psact
pushed a commit
to psact/core-dump-handler
that referenced
this issue
Jul 18, 2022
Bottlerocket mounts the containerd socket under /run/dockershim.sock, which does not appear to be part of the standard privileged container. Add mountContainerRuntimeEndpoint: false hostContainerRuntimeEndpoint: "/run/containerd/containerd.sock" as chart defaults. bottlerocket-os/bottlerocket@91810c8 bottlerocket-os/bottlerocket#2212
psact
pushed a commit
to psact/core-dump-handler
that referenced
this issue
Jul 20, 2022
Bottlerocket mounts the containerd socket under /run/dockershim.sock, which does not appear to be part of the standard privileged container. Add mountContainerRuntimeEndpoint: false hostContainerRuntimeEndpoint: "/run/containerd/containerd.sock" as chart defaults. bottlerocket-os/bottlerocket@91810c8 bottlerocket-os/bottlerocket#2212 Signed-off-by: Peter Scamardo <peter.scamardo@arthrex.com>
Resolved by #2173. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
What I'd like:
More K8s deployments are now containerd-aware so customers are having to do K8s manifest edits for solutions that assume containerd as the underlying runtime.
In the containerd systemd service, we will create a symlink for the containerd socket at
/run/dockershim.sock
just so other deployments that assume docker as underlying runtime can still work.We've already done this for 1.23 variants, this issue for tracking this change for other variants.
We tried implementing this change in #2173, but decided to delay the push-out until we can give sufficient notice to existing users.
Any alternatives you've considered:
The text was updated successfully, but these errors were encountered: