399 lines
20 KiB
Markdown
399 lines
20 KiB
Markdown
---
|
||
layout: blog
|
||
title: "更新:弃用 Dockershim 的常见问题"
|
||
linkTitle: "弃用 Dockershim 的常见问题"
|
||
date: 2022-02-17
|
||
slug: dockershim-faq
|
||
---
|
||
<!--
|
||
layout: blog
|
||
title: "Updated: Dockershim Removal FAQ"
|
||
linkTitle: "Dockershim Removal FAQ"
|
||
date: 2022-02-17
|
||
slug: dockershim-faq
|
||
aliases: [ '/dockershim' ]
|
||
-->
|
||
|
||
<!--
|
||
**This is an update to the original [Dockershim Deprecation FAQ](/blog/2020/12/02/dockershim-faq/) article,
|
||
published in late 2020.**
|
||
-->
|
||
**本文是针对2020年末发布的[弃用 Dockershim 的常见问题](/zh/blog/2020/12/02/dockershim-faq/)的博客更新。**
|
||
|
||
<!--
|
||
This document goes over some frequently asked questions regarding the
|
||
deprecation and removal of _dockershim_, that was
|
||
[announced](/blog/2020/12/08/kubernetes-1-20-release-announcement/)
|
||
as a part of the Kubernetes v1.20 release. For more detail
|
||
on what that means, check out the blog post
|
||
[Don't Panic: Kubernetes and Docker](/blog/2020/12/02/dont-panic-kubernetes-and-docker/).
|
||
-->
|
||
本文回顾了自 Kubernetes v1.20 版本[宣布](/zh/blog/2020/12/08/kubernetes-1-20-release-announcement/)弃用
|
||
Dockershim 以来所引发的一些常见问题。关于弃用细节以及这些细节背后的含义,请参考博文
|
||
[别慌: Kubernetes 和 Docker](/zh/blog/2020/12/02/dont-panic-kubernetes-and-docker/)。
|
||
|
||
<!--
|
||
Also, you can read [check whether dockershim removal affects you](/docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-deprecation-affects-you/)
|
||
to determine how much impact the removal of dockershim would have for you
|
||
or for your organization.
|
||
-->
|
||
你还可以查阅:[检查弃用 Dockershim 对你的影响](/zh/docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-deprecation-affects-you/)这篇文章,
|
||
以确定弃用 dockershim 会对你或你的组织带来多大的影响。
|
||
|
||
<!--
|
||
As the Kubernetes 1.24 release has become imminent, we've been working hard to try to make this a smooth transition.
|
||
-->
|
||
随着 Kubernetes 1.24 版本的发布迫在眉睫,我们一直在努力尝试使其能够平稳升级顺利过渡。
|
||
|
||
<!--
|
||
- We've written a blog post detailing our [commitment and next steps](/blog/2022/01/07/kubernetes-is-moving-on-from-dockershim/).
|
||
- We believe there are no major blockers to migration to [other container runtimes](/docs/setup/production-environment/container-runtimes/#container-runtimes).
|
||
- There is also a [Migrating from dockershim](/docs/tasks/administer-cluster/migrating-from-dockershim/) guide available.
|
||
- We've also created a page to list
|
||
[articles on dockershim removal and on using CRI-compatible runtimes](/docs/reference/node/topics-on-dockershim-and-cri-compatible-runtimes/).
|
||
That list includes some of the already mentioned docs, and also covers selected external sources
|
||
(including vendor guides).
|
||
-->
|
||
- 我们已经写了一篇博文,详细说明了我们的[承诺和后续操作](/blog/2022/01/07/kubernetes-is-moving-on-from-dockershim/)。
|
||
- 我们我们相信可以无障碍的迁移到其他[容器运行时](/zh/docs/setup/production-environment/container-runtimes/#container-runtimes)。
|
||
- 我们撰写了 [dockershim 迁移指南](/docs/tasks/administer-cluster/migrating-from-dockershim/)供你参考。
|
||
- 我们还创建了一个页面来列出[有关 dockershim 移除和使用 CRI 兼容运行时的文章](/zh/docs/reference/node/topics-on-dockershim-and-cri-compatible-runtimes/)。
|
||
该列表包括一些已经提到的文档,还涵盖了选定的外部资源(包括供应商指南)。
|
||
|
||
<!--
|
||
### Why is the dockershim being removed from Kubernetes?
|
||
-->
|
||
### 为什么会从 Kubernetes 中移除 dockershim ?
|
||
|
||
<!--
|
||
Early versions of Kubernetes only worked with a specific container runtime:
|
||
Docker Engine. Later, Kubernetes added support for working with other container runtimes.
|
||
The CRI standard was [created](/blog/2016/12/container-runtime-interface-cri-in-kubernetes/) to
|
||
enable interoperability between orchestrators (like Kubernetes) and many different container
|
||
runtimes.
|
||
Docker Engine doesn't implement that interface (CRI), so the Kubernetes project created
|
||
special code to help with the transition, and made that _dockershim_ code part of Kubernetes
|
||
itself.
|
||
-->
|
||
Kubernetes 的早期版本仅适用于特定的容器运行时:Docker Engine。
|
||
后来,Kubernetes 增加了对使用其他容器运行时的支持。[创建](/blog/2016/12/container-runtime-interface-cri-in-kubernetes/) CRI
|
||
标准是为了实现编排器(如 Kubernetes)和许多不同的容器运行时之间交互操作。
|
||
Docker Engine 没有实现(CRI)接口,因此 Kubernetes 项目创建了特殊代码来帮助过渡,
|
||
并使 dockershim 代码成为 Kubernetes 的一部分。
|
||
|
||
<!--
|
||
The dockershim code was always intended to be a temporary solution (hence the name: shim).
|
||
You can read more about the community discussion and planning in the
|
||
[Dockershim Removal Kubernetes Enhancement Proposal][drkep].
|
||
In fact, maintaining dockershim had become a heavy burden on the Kubernetes maintainers.
|
||
-->
|
||
dockershim 代码一直是一个临时解决方案(因此得名:shim)。
|
||
你可以阅读 [Kubernetes 移除 Dockershim 增强方案](https://github.com/kubernetes/enhancements/tree/master/keps/sig-node/2221-remove-dockershim)
|
||
以了解相关的社区讨论和计划。
|
||
事实上,维护 dockershim 已经成为 Kubernetes 维护者的沉重负担。
|
||
|
||
<!--
|
||
Additionally, features that were largely incompatible with the dockershim, such
|
||
as cgroups v2 and user namespaces are being implemented in these newer CRI
|
||
runtimes. Removing support for the dockershim will allow further development in
|
||
those areas.
|
||
-->
|
||
此外,在较新的 CRI 运行时中实现了与 dockershim 不兼容的功能,例如 cgroups v2 和用户命名空间。
|
||
取消对 dockershim 的支持将加速这些领域的发展。
|
||
|
||
<!--
|
||
### Can I still use Docker Engine in Kubernetes 1.23?
|
||
-->
|
||
### 在 Kubernetes 1.23 版本中还可以使用 Docker Engine 吗?
|
||
|
||
<!--
|
||
Yes, the only thing changed in 1.20 is a single warning log printed at [kubelet]
|
||
startup if using Docker Engine as the runtime. You'll see this warning in all versions up to 1.23. The dockershim removal occurs in Kubernetes 1.24.
|
||
-->
|
||
可以使用,在 1.20 版本中唯一的改动是,如果使用 Docker Engine,
|
||
在 [kubelet](/zh/docs/reference/command-line-tools-reference/kubelet/)
|
||
启动时会打印一个警告日志。
|
||
你将在 1.23 版本及以前版本看到此警告。dockershim 将在 Kubernetes 1.24 版本中移除 。
|
||
|
||
<!--
|
||
### When will dockershim be removed?
|
||
-->
|
||
### 什么时候移除 dockershim ?
|
||
|
||
<!--
|
||
Given the impact of this change, we are using an extended deprecation timeline.
|
||
Removal of dockershim is scheduled for Kubernetes v1.24, see [Dockershim Removal Kubernetes Enhancement Proposal][drkep].
|
||
The Kubernetes project will be working closely with vendors and other ecosystem groups to ensure
|
||
a smooth transition and will evaluate things as the situation evolves.
|
||
-->
|
||
考虑到此变更带来的影响,我们使用了一个加长的废弃时间表。
|
||
dockershim 计划在 Kubernetes v1.24 中进行移除,
|
||
参见 [Kubernetes 移除 Dockershim 增强方案](https://github.com/kubernetes/enhancements/tree/master/keps/sig-node/2221-remove-dockershim)。
|
||
Kubernetes 项目将与供应商和其他生态系统组织密切合作,以确保平稳过渡,并将依据事态的发展评估后续事项。
|
||
|
||
<!--
|
||
### Can I still use Docker Engine as my container runtime?
|
||
-->
|
||
### 我还可以使用 Docker Engine 作为我的容器运行时吗?
|
||
|
||
<!--
|
||
First off, if you use Docker on your own PC to develop or test containers: nothing changes.
|
||
You can still use Docker locally no matter what container runtime(s) you use for your
|
||
Kubernetes clusters. Containers make this kind of interoperability possible.
|
||
-->
|
||
首先,如果你在自己的电脑上使用 Docker 用来做开发或测试容器:它将与之前没有任何变化。
|
||
无论你为 Kubernetes 集群使用什么容器运行时,你都可以在本地使用 Docker。容器使这种交互成为可能。
|
||
|
||
<!--
|
||
Mirantis and Docker have [committed][mirantis] to maintaining a replacement adapter for
|
||
Docker Engine, and to maintain that adapter even after the in-tree dockershim is removed
|
||
from Kubernetes. The replacement adapter is named [`cri-dockerd`](https://github.com/Mirantis/cri-dockerd).
|
||
-->
|
||
Mirantis 和 Docker 已[承诺](https://www.mirantis.com/blog/mirantis-to-take-over-support-of-kubernetes-dockershim-2/)
|
||
为 Docker Engine 维护一个替代适配器,
|
||
并在 dockershim 从 Kubernetes 移除后维护该适配器。
|
||
替代适配器名为 [`cri-dockerd`](https://github.com/Mirantis/cri-dockerd)。
|
||
|
||
<!--
|
||
### Will my existing container images still work?
|
||
-->
|
||
### 我现有的容器镜像还能正常工作吗?
|
||
|
||
<!--
|
||
Yes, the images produced from `docker build` will work with all CRI implementations.
|
||
All your existing images will still work exactly the same.
|
||
-->
|
||
当然可以,`docker build` 创建的镜像适用于任何 CRI 实现。
|
||
所有你的现有镜像将和往常一样工作。
|
||
|
||
<!--
|
||
#### What about private images?
|
||
-->
|
||
### 私有镜像呢?
|
||
|
||
<!--
|
||
Yes. All CRI runtimes support the same pull secrets configuration used in
|
||
Kubernetes, either via the PodSpec or ServiceAccount.
|
||
-->
|
||
当然可以。所有 CRI 运行时均支持在 Kubernetes 中相同的拉取(pull)Secret 配置,
|
||
无论是通过 PodSpec 还是 ServiceAccount。
|
||
|
||
<!--
|
||
### Are Docker and containers the same thing?
|
||
-->
|
||
### Docker 和容器是一回事吗?
|
||
|
||
<!--
|
||
Docker popularized the Linux containers pattern and has been instrumental in
|
||
developing the underlying technology, however containers in Linux have existed
|
||
for a long time. The container ecosystem has grown to be much broader than just
|
||
Docker. Standards like OCI and CRI have helped many tools grow and thrive in our
|
||
ecosystem, some replacing aspects of Docker while others enhance existing
|
||
functionality.
|
||
-->
|
||
Docker 普及了 Linux 容器模式,并在开发底层技术方面发挥了重要作用,
|
||
但是 Linux 中的容器已经存在了很长时间。容器的生态相比于 Docker 具有更宽广的领域。
|
||
OCI 和 CRI 等标准帮助许多工具在我们的生态系统中发展壮大,
|
||
其中一些替代了 Docker 的某些方面,而另一些则增强了现有功能。
|
||
|
||
<!--
|
||
### Are there examples of folks using other runtimes in production today?
|
||
-->
|
||
### 现在是否有在生产系统中使用其他运行时的例子?
|
||
|
||
<!--
|
||
All Kubernetes project produced artifacts (Kubernetes binaries) are validated
|
||
with each release.
|
||
-->
|
||
Kubernetes 所有项目在所有版本中出产的工件(Kubernetes 二进制文件)都经过了验证。
|
||
|
||
<!--
|
||
Additionally, the [kind] project has been using containerd for some time and has
|
||
seen an improvement in stability for its use case. Kind and containerd are leveraged
|
||
multiple times every day to validate any changes to the Kubernetes codebase. Other
|
||
related projects follow a similar pattern as well, demonstrating the stability and
|
||
usability of other container runtimes. As an example, OpenShift 4.x has been
|
||
using the [CRI-O] runtime in production since June 2019.
|
||
-->
|
||
此外,[kind](https://kind.sigs.k8s.io/) 项目使用 containerd 已经有一段时间了,并且提高了其用例的稳定性。
|
||
Kind 和 containerd 每天都会被多次使用来验证对 Kubernetes 代码库的任何更改。
|
||
其他相关项目也遵循同样的模式,从而展示了其他容器运行时的稳定性和可用性。
|
||
例如,OpenShift 4.x 从 2019 年 6 月以来,就一直在生产环境中使用 [CRI-O](https://cri-o.io/) 运行时。
|
||
|
||
<!--
|
||
For other examples and references you can look at the adopters of containerd and
|
||
CRI-O, two container runtimes under the Cloud Native Computing Foundation ([CNCF]).
|
||
-->
|
||
至于其他示例和参考资料,你可以查看 containerd 和 CRI-O 的使用者列表,
|
||
这两个容器运行时是云原生基金会([CNCF](https://cncf.io))下的项目。
|
||
|
||
- [containerd](https://github.com/containerd/containerd/blob/master/ADOPTERS.md)
|
||
- [CRI-O](https://github.com/cri-o/cri-o/blob/master/ADOPTERS.md)
|
||
|
||
<!--
|
||
### People keep referencing OCI, what is that?
|
||
-->
|
||
### 人们总在谈论 OCI,它是什么?
|
||
|
||
<!--
|
||
OCI stands for the [Open Container Initiative], which standardized many of the
|
||
interfaces between container tools and technologies. They maintain a standard
|
||
specification for packaging container images (OCI image-spec) and running containers
|
||
(OCI runtime-spec). They also maintain an actual implementation of the runtime-spec
|
||
in the form of [runc], which is the underlying default runtime for both
|
||
[containerd] and [CRI-O]. The CRI builds on these low-level specifications to
|
||
provide an end-to-end standard for managing containers.
|
||
-->
|
||
OCI 是 [Open Container Initiative](https://opencontainers.org/about/overview/) 的缩写,
|
||
它标准化了容器工具和底层实现之间的大量接口。
|
||
它们维护了打包容器镜像(OCI image)和运行时(OCI runtime)的标准规范。
|
||
它们还以 [runc](https://github.com/opencontainers/runc) 的形式维护了一个 runtime-spec 的真实实现,
|
||
这也是 [containerd](https://containerd.io/) 和 [CRI-O](https://cri-o.io/) 依赖的默认运行时。
|
||
CRI 建立在这些底层规范之上,为管理容器提供端到端的标准。
|
||
|
||
<!--
|
||
### Which CRI implementation should I use?
|
||
-->
|
||
### 我应该用哪个 CRI 实现?
|
||
|
||
<!--
|
||
That’s a complex question and it depends on a lot of factors. If Docker is
|
||
working for you, moving to containerd should be a relatively easy swap and
|
||
will have strictly better performance and less overhead. However, we encourage you
|
||
to explore all the options from the [CNCF landscape] in case another would be an
|
||
even better fit for your environment.
|
||
-->
|
||
这是一个复杂的问题,依赖于许多因素。
|
||
如果你正在使用 Docker,迁移到 containerd 应该是一个相对容易地转换,并将获得更好的性能和更少的开销。
|
||
然而,我们鼓励你探索 [CNCF landscape](https://landscape.cncf.io/card-mode?category=container-runtime&grouping=category)
|
||
提供的所有选项,做出更适合你的选择。
|
||
|
||
<!--
|
||
### What should I look out for when changing CRI implementations?
|
||
-->
|
||
### 当切换 CRI 实现时,应该注意什么?
|
||
|
||
<!--
|
||
While the underlying containerization code is the same between Docker and most
|
||
CRIs (including containerd), there are a few differences around the edges. Some
|
||
common things to consider when migrating are:
|
||
-->
|
||
虽然 Docker 和大多数 CRI(包括 containerd)之间的底层容器化代码是相同的,
|
||
但其周边部分却存在差异。迁移时要考虑如下常见事项:
|
||
|
||
<!--
|
||
- Logging configuration
|
||
- Runtime resource limitations
|
||
- Node provisioning scripts that call docker or use docker via it's control socket
|
||
- Kubectl plugins that require docker CLI or the control socket
|
||
- Tools from the Kubernetes project that require direct access to Docker Engine
|
||
(for example: the deprecated `kube-imagepuller` tool)
|
||
- Configuration of functionality like `registry-mirrors` and insecure registries
|
||
- Other support scripts or daemons that expect Docker Engine to be available and are run
|
||
outside of Kubernetes (for example, monitoring or security agents)
|
||
- GPUs or special hardware and how they integrate with your runtime and Kubernetes
|
||
-->
|
||
- 日志配置
|
||
- 运行时的资源限制
|
||
- 调用 docker 或通过其控制套接字使用 docker 的节点配置脚本
|
||
- 需要访问 docker 命令或控制套接字的 kubectl 插件
|
||
- 需要直接访问 Docker Engine 的 Kubernetes 工具(例如:已弃用的 'kube-imagepuller' 工具)
|
||
- `registry-mirrors` 和不安全注册表等功能的配置
|
||
- 保障 Docker Engine 可用、且运行在 Kubernetes 之外的脚本或守护进程(例如:监视或安全代理)
|
||
- GPU 或特殊硬件,以及它们如何与你的运行时和 Kubernetes 集成
|
||
|
||
<!--
|
||
If you use Kubernetes resource requests/limits or file-based log collection
|
||
DaemonSets then they will continue to work the same, but if you’ve customized
|
||
your `dockerd` configuration, you’ll need to adapt that for your new container
|
||
runtime where possible.
|
||
-->
|
||
如果你只是用了 Kubernetes 资源请求/限制或基于文件的日志收集 DaemonSet,它们将继续稳定工作,
|
||
但是如果你用了自定义了 dockerd 配置,则可能需要为新的容器运行时做一些适配工作。
|
||
|
||
<!--
|
||
Another thing to look out for is anything expecting to run for system maintenance
|
||
or nested inside a container when building images will no longer work. For the
|
||
former, you can use the [`crictl`][cr] tool as a drop-in replacement (see [mapping from docker cli to crictl](https://kubernetes.io/docs/tasks/debug/debug-cluster/crictl/#mapping-from-docker-cli-to-crictl)) and for the
|
||
latter you can use newer container build options like [img], [buildah],
|
||
[kaniko], or [buildkit-cli-for-kubectl] that don’t require Docker.
|
||
-->
|
||
另外还有一个需要关注的点,那就是当创建镜像时,系统维护或嵌入容器方面的任务将无法工作。
|
||
对于前者,可以用 [`crictl`](https://github.com/kubernetes-sigs/cri-tools) 工具作为临时替代方案
|
||
(参阅[从 docker cli 到 crictl 的映射](/zh/docs/tasks/debug/debug-cluster/crictl/#mapping-from-docker-cli-to-crictl))。
|
||
对于后者,可以用新的容器创建选项,例如
|
||
[img](https://github.com/genuinetools/img)、
|
||
[buildah](https://github.com/containers/buildah)、
|
||
[kaniko](https://github.com/GoogleContainerTools/kaniko) 或
|
||
[buildkit-cli-for-kubectl](https://github.com/vmware-tanzu/buildkit-cli-for-kubectl),
|
||
他们都不需要 Docker。
|
||
|
||
<!--
|
||
For containerd, you can start with their [documentation] to see what configuration
|
||
options are available as you migrate things over.
|
||
-->
|
||
对于 containerd,你可查阅有关它的[文档](https://github.com/containerd/cri/blob/master/docs/registry.md),
|
||
获取迁移时可用的配置选项。
|
||
|
||
<!--
|
||
For instructions on how to use containerd and CRI-O with Kubernetes, see the
|
||
Kubernetes documentation on [Container Runtimes].
|
||
-->
|
||
有关如何在 Kubernetes 中使用 containerd 和 CRI-O 的说明,
|
||
请参阅 [Kubernetes 相关文档](/docs/setup/production-environment/container-runtimes/)。
|
||
|
||
<!--
|
||
### What if I have more questions?
|
||
-->
|
||
### 我还有其他问题怎么办?
|
||
|
||
<!--
|
||
If you use a vendor-supported Kubernetes distribution, you can ask them about
|
||
upgrade plans for their products. For end-user questions, please post them
|
||
to our end user community forum: https://discuss.kubernetes.io/.
|
||
-->
|
||
如果你使用了供应商支持的 Kubernetes 发行版,你可以咨询供应商他们产品的升级计划。
|
||
对于最终用户的问题,请把问题发到我们的最终用户社区的论坛:https://discuss.kubernetes.io/。
|
||
|
||
<!--
|
||
You can discuss the decision to remove dockershim via a dedicated
|
||
[GitHub issue](https://github.com/kubernetes/kubernetes/issues/106917).
|
||
-->
|
||
你可以通过专用 [GitHub 问题](https://github.com/kubernetes/kubernetes/issues/106917)
|
||
讨论删除 dockershim 的决定。
|
||
|
||
<!--
|
||
You can also check out the excellent blog post
|
||
[Wait, Docker is deprecated in Kubernetes now?][dep] a more in-depth technical
|
||
discussion of the changes.
|
||
-->
|
||
你也可以看看这篇优秀的博客文章:[等等,Docker 被 Kubernetes 弃用了?](https://dev.to/inductor/wait-docker-is-deprecated-in-kubernetes-now-what-do-i-do-e4m)
|
||
对这些变化进行更深入的技术讨论。
|
||
|
||
<!--
|
||
### Is there any tooling that can help me find dockershim in use
|
||
-->
|
||
### 是否有任何工具可以帮助我找到正在使用的 dockershim
|
||
|
||
<!--
|
||
Yes! The [Detector for Docker Socket (DDS)][dds] is a kubectl plugin that you can
|
||
install and then use to check your cluster. DDS can detect if active Kubernetes workloads
|
||
are mounting the Docker Engine socket (`docker.sock`) as a volume.
|
||
Find more details and usage patterns in the DDS project's [README][dds].
|
||
-->
|
||
是的! [Docker Socket 检测器 (DDS)][dds] 是一个 kubectl 插件,
|
||
你可以安装它用于检查你的集群。 DDS 可以检测运行中的 Kubernetes
|
||
工作负载是否将 Docker 引擎套接字 (`docker.sock`) 作为卷挂载。
|
||
在 DDS 项目的 [README][dds] 中查找更多详细信息和使用方法。
|
||
|
||
[dds]: https://github.com/aws-containers/kubectl-detector-for-docker-socket
|
||
|
||
<!--
|
||
### Can I have a hug?
|
||
-->
|
||
### 我可以加入吗?
|
||
|
||
<!--
|
||
Yes, we're still giving hugs as requested. 🤗🤗🤗
|
||
-->
|
||
当然,只要你愿意,随时随地欢迎。🤗🤗🤗 |