Re: [Container-tools] CRI-O vs. ContainerD
On 03/20/2017 12:33 PM, Josh Berkus wrote: > ... can someone give me a practical rundown? > > Speaking as a Kubernetes user, how are these different? > CRI-O is a CRI Daemon that is being developed to support Kubernetes workloads using three sub packages github.com://containers/storage github.comf://containers/image github.com://opencontainers/runtime-spec and github.com://opencontainers/runc Red Hat is taking the lead on this effort, but we have major contributors from Suse, Intel, IBM. It is part of an k8s incubator project. Available now in Rawhide as the ocid package. We are currently passing about 1/3 of the k8s CRI test suite. Hope to pass all within 6 months. ContainerD is an new monolithic daemon from Docker Inc. It includes what is containerd from the docker project which was a daemon built mainly to support the Swarm workloads as well as sucked parts of the docker daemon out to handle container storage and pulling/pushing images. As of now it does not support k8s CRI, although that is clearly Docker Inc's aim. It also only supports storage on Overlay2 and Aufs. They did some redesign of the Storage layer to make it different then Docker mechanism. (We based containers/storage off of the Docker storage). Containerd still has Solomon Sykes as the BDL of containerd. We submitted pull requests to use containers/storage and containers/image to containerd but was rejected by the containerd team. Docker would like to see containerd be the one Daemon to handle all container workloads. We think at some point in the future the upstream docker project will move to containerd. ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] new minishift CDK
On Fri, Mar 17, 2017 at 8:44 PM, Burr Sutterwrote: > We had a situation where a route was misbehaving. My investigation > strategy is to get inside the VM, oc get services and curl the IP address. > > I actually do this as a live demo on the current CDK. > > And I transfer in files that I need via > vagrant rsync > > Do we have an Asher for that? > > With Minishift we have not taken that route as we want to keep the ISO as much as light weighted. But I think we need to provide some sort of way for advance users who want to play with the VM more. At this point we are focusing on making Minishift useful for developers and it is a lot of work. If you think we should take use case like this with high priority then we should talk and discuss. > Also, another inside VM trick, I like checking free memory and disk. > Running out of disk is common with heavy Docker usage. > Right. We also want to add an feature where user can specify a higher size disk. Currently the default is 20GB and there is no way to change it. > > And this reminds me, what is the directory to rm -fr to clean out of stuff > under the Docker daemon? > > I would suggest "docker rmi" command for that. The OpenShift stuff lives in /var/lib/minishift. Thanks, Lala > > > On Fri, Mar 17, 2017 at 2:39 AM Praveen Kumar < > kumarpraveen.nit...@gmail.com> wrote: > >> On Thu, Mar 16, 2017 at 10:42 PM, Burr Sutter wrote: >> >> if I "minishift ssh", I would like "oc" and "kubectl" to be available to >> me in the PATH. Only "docker" seems to be available right now. >> >> >> we don't have "oc" or "kubectl" binary inside the image because VM >> something is blackbox for users and they should interact it from host >> itself. Any specific requirement for which we need it for the iso/vm? >> >> >> >> >> ___ >> Container-tools mailing list >> Container-tools@redhat.com >> https://www.redhat.com/mailman/listinfo/container-tools >> >> >> >> >> -- >> Praveen Kumar >> http://fedoraproject.org/wiki/User:Kumarpraveen >> http://fedoraproject.org/ >> http://kumar-pravin.blogspot.com >> >> > > ___ > Container-tools mailing list > Container-tools@redhat.com > https://www.redhat.com/mailman/listinfo/container-tools > > ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] [node-devel] Community Node.js Builder Images
On Fri, Mar 17, 2017 at 1:57 PM, Lance Ballwrote: > > > On Fri, Mar 17, 2017 at 12:43 PM Ben Parees wrote: > >> On Fri, Mar 17, 2017 at 12:18 PM, Lance Ball wrote: >> >> >>- Allowing for composability so that the developer can add what they >>need at image build time. I think that .s2i/assemble and friends make >>this possible, but maybe I am missing something larger. Am I? >> >> I think you're missing two things: >> >> 1) assemble can't install packages, it doesn't have root permissions >> 2) doing things at assemble time means doing them every time you build >> the application image, instead of just one time when you create the builder >> image, so it dramatically increases build times. >> > > Ahh, good points. Thanks. > > >> >>- Providing two different s2i base images for each runtime >>environment: s2i-core and s2i-base, for example. I think the core >>image should be similar to rhel7-atomic. Just a bare bones, >>optimized-for-the-container image. Developers concerned about image size >>can use this image and .s2i/assemble to have a fully customizable >>build/runtime environment. Developers less concerned about minimal size >>could depend on s2i-base which has all of the tools and development >>libraries that are generally required for the vast majority of >>OS/platform/language environments. >> >> >> s2i-base really started out as an internal thing for us to use as a >> common base for the s2i images we were providing. We actually fought, for >> a long time, making it "public" and having other people start creating >> their own images on top of it because we didn't want to treat it as an api. >> >> If we were going to create a "slimmed down" version of s2i-base, i'd be >> curious what would actually be in it, as opposed to just telling people who >> want to build smaller s2i images, to use some other generic base image. >> The things s2i-base provides are: >> 1) common set of packages that are useful for things built on top (the >> stuff you are suggesting getting rid of) >> 2) a few helper scripts and env variables that provide useful context for >> an s2i image. >> > >> I don't know that there's enough value in (2) to justify created a second >> "s2i-base-lite" image once you get rid of (1). >> > > I think that means that for users who want to build smaller images, > they'll need to use the base image of their choice, and then be aware > of/provide the bits described here: https://docs.openshift.org/ > latest/creating_images/guidelines.html#openshift- > origin-specific-guidelines and here: https://docs.openshift.org/ > latest/creating_images/s2i.html#creating-images-s2i, if I understand > correctly. In my opinion, a slim image that provides these things would be > useful. There is a lot of content in those docs to sift through and > implement for a potentially common case. But I'm a sample size of 1, so... > :) > > >> >>- Allow users to specify the runtime image and runtime artifact(s) on >>the command line, as described in the document linked below. In a >>contrived/simple case, this would mean that a developer could use >>s2i-base for building the application image and s2i-core for the >>runtime. No customization required, just a simple command line option that >>builds in a full featured environment and deploys to a slimmed down >>runtime. >> >> >> fyi we are really encouraging people not to use extended builds(the >> build/runtime image mechanism) and instead accomplish that goal via >> chained-builds: >> >> https://docs.openshift.org/latest/dev_guide/builds/ >> advanced_build_operations.html#dev-guide-chaining-builds >> > > Interesting. If I want to use chained builds, how do I accomplish that? Do > I need to create a build in the UI, then manually edit the BuildConfig? Or > somehow POST a BuildConfig to OpenShift? Is there any easier and more > intuitive way? > > I'm curious why this is the suggested approach. From my perspective, > extended builds seem much more intuitive, and certainly easier for the end > user. > > Lance > Also, will chained builds work on OpenShift Online and OpenShift Dedicated? (I thought that docker builds didn't work on OCO and OCD). Also, also - if docker builds work anyway, could one dispense with the s2i build and do both the compilation and the docker build in a jenkins build pod? -steph ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
[Container-tools] oc cluster up metrics=true
what is the "metrics=true" equivalent in minishift? ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] Community Node.js Builder Images
On 03/17/2017 04:29 PM, Lance Ball wrote: This has been a great conversation. Thanks everyone for your input. One thing that kind of got lost in the shuffle, though is this. On Thu, Mar 16, 2017 at 12:37 PM Lance Ball> wrote: I also think that, in addition to the current OpenShift offerings for Node.js on RHEL and CentOS, we should be providing a larger matrix of options. Is there any reason not to pursue community versions of Node.js builder images for the following combination of OS/Node? RHEL -> Node 4, 5, 6, 7 rhel7-atomic -> Node 4, 5, 6, 7 Fedora -> Node 4, 5, 6, 7 CentOS -> Node 4, 5, 6, 7 Who will do the packaging and support for these versions? Is Middleware engineering signing up or are you asking for the RHEL team to do these? I understand that SCL-provided, supported images for RHEL already exist for Node.js v4.x and soon to be Node.js v6.x. As you probably know, some of us are actively working towards a solution that would allow these supported images to achieve greater turnaround time, and maintain version parity with all current Node.js releases. Would the addition of community provided rhel7-atomic, fedora and perhaps even rhel images be welcomed? Anyone have feedback or concerns about this idea? Thanks Lance ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools -- Brian Gollaher Red Hat Platform Product Management Phone: 978 392-3173 Cell: 508 740-6549 bri...@redhat.com ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] new minishift CDK
Hi, > > We had a situation where a route was misbehaving. My investigation > > strategy is to get inside the VM, oc get services and curl the IP address. We are providing oc on the host, so you can skip the step of logging into the VM. You can execute 'oc get service' on the host. Even better, we have a Minishift specific command (there is a bug we are fixing atm), so that you can do 'minishift openshift service list -n myproject' and you get a list of all routes. > > And I transfer in files that I need via > > vagrant rsync The aim is to do as much as possible on the host. Also, as we are getting closer to a consistent solution for host folders, there should be no need for rsyncing anything. > > Do we have an Asher for that? What's that? > With Minishift we have not taken that route as we want to keep the ISO as > much as light weighted. But I think we need to provide some sort of way for > advance users who want to play with the VM more. And what would you have in mind there? --Hardy signature.asc Description: PGP signature ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] new minishift CDK
On Mon, Mar 20, 2017 at 11:43 AM, Lalatendu Mohantywrote: > > > > On Fri, Mar 17, 2017 at 8:44 PM, Burr Sutter wrote: >> >> We had a situation where a route was misbehaving. My investigation strategy >> is to get inside the VM, oc get services and curl the IP address. >> >> I actually do this as a live demo on the current CDK. >> >> And I transfer in files that I need via >> vagrant rsync >> >> Do we have an Asher for that? >> > > With Minishift we have not taken that route as we want to keep the ISO as > much as light weighted. But I think we need to provide some sort of way for > advance users who want to play with the VM more. > > At this point we are focusing on making Minishift useful for developers and > it is a lot of work. If you think we should take use case like this with high > priority then we should talk and discuss. > >> >> Also, another inside VM trick, I like checking free memory and disk. >> Running out of disk is common with heavy Docker usage. > > > Right. We also want to add an feature where user can specify a higher size > disk. Currently the default is 20GB and there is no way to change it. We do have option in minishift start where you can specify a higher disk space like 40GB when start. `minishift start --disk-size 40g` which create 40GB persistent storage in the VM. -- Praveen Kumar http://fedoraproject.org/wiki/User:Kumarpraveen http://fedoraproject.org/ http://kumar-pravin.blogspot.com ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] new minishift CDK
Will this work with the "config view" command? On Mon, Mar 20, 2017 at 12:07 PM Praveen Kumar < kumarpraveen.nit...@gmail.com> wrote: > On Mon, Mar 20, 2017 at 11:43 AM, Lalatendu Mohanty> wrote: > > > > > > > > On Fri, Mar 17, 2017 at 8:44 PM, Burr Sutter wrote: > >> > >> We had a situation where a route was misbehaving. My investigation > strategy is to get inside the VM, oc get services and curl the IP address. > >> > >> I actually do this as a live demo on the current CDK. > >> > >> And I transfer in files that I need via > >> vagrant rsync > >> > >> Do we have an Asher for that? > >> > > > > With Minishift we have not taken that route as we want to keep the ISO > as much as light weighted. But I think we need to provide some sort of way > for advance users who want to play with the VM more. > > > > At this point we are focusing on making Minishift useful for developers > and it is a lot of work. If you think we should take use case like this > with high priority then we should talk and discuss. > > > >> > >> Also, another inside VM trick, I like checking free memory and disk. > Running out of disk is common with heavy Docker usage. > > > > > > Right. We also want to add an feature where user can specify a higher > size disk. Currently the default is 20GB and there is no way to change it. > > We do have option in minishift start where you can specify a higher > disk space like 40GB when start. `minishift start --disk-size 40g` > which create 40GB persistent storage in the VM. > > > -- > Praveen Kumar > http://fedoraproject.org/wiki/User:Kumarpraveen > http://fedoraproject.org/ > http://kumar-pravin.blogspot.com > ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
[Container-tools] CRI-O vs. ContainerD
... can someone give me a practical rundown? Speaking as a Kubernetes user, how are these different? -- -- Josh Berkus Project Atomic Red Hat OSAS ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools
Re: [Container-tools] [node-devel] Community Node.js Builder Images
On Mon, Mar 20, 2017 at 8:39 AM, Brian Gollaherwrote: > On 03/17/2017 04:29 PM, Lance Ball wrote: > > This has been a great conversation. Thanks everyone for your input. One > thing that kind of got lost in the shuffle, though is this. > > On Thu, Mar 16, 2017 at 12:37 PM Lance Ball wrote: > >> I also think that, in addition to the current OpenShift offerings for >> Node.js on RHEL and CentOS, we should be providing a larger matrix of >> options. Is there any reason not to pursue community versions of Node.js >> builder images for the following combination of OS/Node? >> >> RHEL -> Node 4, 5, 6, 7 >> rhel7-atomic -> Node 4, 5, 6, 7 >> Fedora -> Node 4, 5, 6, 7 >> CentOS -> Node 4, 5, 6, 7 >> > Who will do the packaging and support for these versions? Is Middleware > engineering signing up or are you asking for the RHEL team to do these? > This is part of the we'd like to nail down across the teams, and you'll likely hear from us for another joint discussion soon. This has been mostly R, investigations/discussions, etc... but with some encouraging results. However, the MW node team has the expertise in the node functionality[1], and we think that we could be the maintainers of these artifacts if the base images are there. The devil is in the details, but again, lets think about a follow up discussion on this shortly. [1] Enough that we've already fixed a few things upstream that previous builds needed to work around, which is awesome value add! > >> I understand that SCL-provided, supported images for RHEL already exist >> for Node.js v4.x and soon to be Node.js v6.x. As you probably know, some of >> us are actively working towards a solution that would allow these supported >> images to achieve greater turnaround time, and maintain version parity with >> all current Node.js releases. >> >> Would the addition of community provided rhel7-atomic, fedora and perhaps >> even rhel images be welcomed? >> > > Anyone have feedback or concerns about this idea? > > Thanks > Lance > > > ___ > Container-tools mailing > listContainer-tools@redhat.comhttps://www.redhat.com/mailman/listinfo/container-tools > > > -- > Brian Gollaher > Red Hat Platform Product Management > Phone: 978 392-3173 <(978)%20392-3173> > Cell: 508 740-6549 <(508)%20740-6549>bri...@redhat.com > > ___ Container-tools mailing list Container-tools@redhat.com https://www.redhat.com/mailman/listinfo/container-tools