Skip to content

Commit ad5dd73

Browse files
committed
Removing references to Docker from Nodes topics
1 parent 9aeab98 commit ad5dd73

17 files changed

+28
-155
lines changed

modules/nodes-cluster-overcommit-node-resources.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88

99
To provide more reliable scheduling and minimize node resource overcommitment,
1010
each node can reserve a portion of its resources for use by system daemons
11-
that are required to run on your node for your cluster to function (*sshd*, *docker*, etc.).
11+
that are required to run on your node for your cluster to function (*sshd*, etc.).
1212
In particular, it is recommended that you reserve resources for incompressible resources such as memory.
1313

1414
.Procedure

modules/nodes-containers-using-about.adoc

Lines changed: 2 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -17,16 +17,6 @@ as a web server or a database, though containers can be used for arbitrary
1717
workloads.
1818

1919
The Linux kernel has been incorporating capabilities for container technologies
20-
for years. More recently the Docker project has developed a convenient
21-
management interface for Linux containers on a host. {product-title} and
22-
Kubernetes add the ability to orchestrate Docker-formatted containers across
20+
for years. {product-title} and
21+
Kubernetes add the ability to orchestrate containers across
2322
multi-host installations.
24-
25-
Though you do not directly interact with the Docker CLI or service when using
26-
{product-title}, understanding their capabilities and terminology is
27-
important for understanding their role in {product-title} and how your
28-
applications function inside of containers. The *docker* RPM is available
29-
as part of RHEL 7, as well as CentOS and Fedora, so you can
30-
experiment with it separately from {product-title}. Refer to the article
31-
link:https://access.redhat.com/articles/881893[Get Started with Docker Formatted Container Images on Red Hat Systems] for a guided introduction.
32-

modules/nodes-nodes-garbage-collection-containers.adoc

Lines changed: 0 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -59,14 +59,6 @@ the `*maximum-dead-containers*` limit.
5959
When the node removes the dead containers, all files inside those containers are
6060
removed as well. Only containers created by the node are removed.
6161

62-
ifdef::openshift-origin[]
63-
[NOTE]
64-
====
65-
Currently, Docker and rkt are supported. The following only applies to Docker;
66-
rkt has its own garbage collection.
67-
====
68-
endif::[]
69-
7062
Each spin of the garbage collector loop goes through the following steps:
7163

7264
1. Retrieve a list of available containers.

modules/nodes-nodes-modifying-maximum.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,11 +20,11 @@ maximum number of pods that can be scheduled to a node: `pods-per-core` and
2020
`max-pods`. When both options are in use, the lower of the two limits the number
2121
of pods on a node. Exceeding these values can result in:
2222

23-
* Increased CPU utilization on both {product-title} and Docker.
23+
* Increased CPU utilization on {product-title}.
2424
* Slow pod scheduling.
2525
* Potential out-of-memory scenarios (depends on the amount of memory in the node).
2626
* Exhausting the pool of IP addresses.
27-
* Resource overcommitting, leading to poor user application performance.
27+
// * Resource overcommitting, leading to poor user application performance.
2828

2929
[NOTE]
3030
====

modules/nodes-nodes-problem-detector-about.adoc

Lines changed: 0 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -54,15 +54,6 @@ status: false
5454
type: KernelDeadLock
5555
----
5656

57-
.Sample output for KernelDeadLock condition
58-
[source,bash]
59-
----
60-
message: task docker:1234 blocked for more than 120 seconds
61-
reason: DockerHung
62-
status: true
63-
type: KernelDeadLock
64-
----
65-
6657
This example shows output from the Node Problem Detector watching for events on a node.
6758
The following command uses `oc get event` against the *default* project watching for
6859
events listed in the `kernel-monitor.json` section of the Node Problem Detector configuration map.
@@ -76,7 +67,6 @@ events listed in the `kernel-monitor.json` section of the Node Problem Detector
7667
[source,bash]
7768
----
7869
LAST SEEN FIRST SEEN COUNT NAME KIND SUBOBJECT TYPE REASON SOURCE MESSAGE
79-
2018-06-27 09:08:27 -0400 EDT 2018-06-27 09:08:27 -0400 EDT 1 my-node1 node Warning TaskHunk kernel-monitor.my-node1 docker:1234 blocked for more than 300 seconds
8070
2018-06-27 09:08:27 -0400 EDT 2018-06-27 09:08:27 -0400 EDT 3 my-node2 node Warning KernelOops kernel-monitor.my-node2 BUG: unable to handle kernel NULL pointer deference at nowhere
8171
2018-06-27 09:08:27 -0400 EDT 2018-06-27 09:08:27 -0400 EDT 1 my-node1 node Warning KernelOops kernel-monitor.my-node2 divide error 0000 [#0] SMP
8272
----

modules/nodes-nodes-problem-detector-customizing.adoc

Lines changed: 2 additions & 27 deletions
Original file line numberDiff line numberDiff line change
@@ -26,26 +26,7 @@ kind: ConfigMap
2626
metadata:
2727
name: node-problem-detector
2828
data:
29-
docker-monitor.json: | <1>
30-
{
31-
"plugin": "journald", <2>
32-
"pluginConfig": {
33-
"source": "docker"
34-
},
35-
"logPath": "/host/log/journal", <3>
36-
"lookback": "5m",
37-
"bufferSize": 10,
38-
"source": "docker-monitor",
39-
"conditions": [],
40-
"rules": [ <4>
41-
{
42-
"type": "temporary", <5>
43-
"reason": "CorruptDockerImage", <6>
44-
"pattern": "Error trying v2 registry: failed to register layer: rename /var/lib/docker/image/(.+) /var/lib/docker/image/(.+): directory not empty.*" <7>
45-
}
46-
]
47-
}
48-
kernel-monitor.json: | <8>
29+
kernel-monitor.json: | <8>
4930
{
5031
"plugin": "journald", <2>
5132
"pluginConfig": {
@@ -94,12 +75,6 @@ data:
9475
"reason": "AUFSUmountHung",
9576
"pattern": "task umount\\.aufs:\\w+ blocked for more than \\w+ seconds\\."
9677
},
97-
{
98-
"type": "permanent",
99-
"condition": "KernelDeadlock",
100-
"reason": "DockerHung",
101-
"pattern": "task docker:\\w+ blocked for more than \\w+ seconds\\."
102-
}
10378
]
10479
}
10580
----
@@ -161,7 +136,7 @@ spec:
161136
- node-problem-detector
162137
- --alsologtostderr=true <1>
163138
- --log_dir="/tmp" <2>
164-
- --system-log-monitors=/etc/npd/kernel-monitor.json,/etc/npd/docker-monitor.json <3>
139+
- --system-log-monitors=/etc/npd/kernel-monitor.json <3>
165140
----
166141
+
167142
<1> Sends the output to standard output (stdout).

modules/nodes-nodes-problem-detector-verifying.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,6 @@ I0416 23:22:00.641354 1 log_monitor.go:63] Finish parsing log monitor conf
5353
+
5454
[source,bash]
5555
----
56-
# echo "kernel: task docker:7 blocked for more than 300 seconds." >> /dev/kmsg
56+
# echo "kernel: task blocked for more than 300 seconds." >> /dev/kmsg
5757
----
5858

modules/nodes-nodes-rebooting-affinity.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ spec:
3333
podAffinityTerm:
3434
labelSelector:
3535
matchExpressions:
36-
- key: docker-registry <4>
36+
- key: registry <4>
3737
operator: In <5>
3838
values:
3939
- default
@@ -46,7 +46,7 @@ spec:
4646
<5> The operator represents the relationship between the label on the existing pod and the set of values in the `matchExpression` parameters in the specification for the new pod. Can be `In`, `NotIn`, `Exists`, or `DoesNotExist`.
4747
+
4848
This example assumes the container image registry pod has a label of
49-
`*docker-registry=default*`. Pod anti-affinity can use any Kubernetes match
49+
`*registry=default*`. Pod anti-affinity can use any Kubernetes match
5050
expression.
5151

5252
. Enable the `*MatchInterPodAffinity*` scheduler predicate in *_/etc/origin/master/scheduler.json_*. See _Default Scheduling_.

modules/nodes-nodes-viewing-listing.adoc

Lines changed: 3 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -18,15 +18,11 @@ node1.example.com Ready compute 7h v1.9.1+a0ce1bc657
1818
node2.example.com Ready compute 7h v1.9.1+a0ce1bc657
1919
----
2020

21-
* The `-wide` option provides provides additional information on all nodes:
21+
* The `-wide` option provides provides additional information on all nodes.
2222
+
2323
[source,bash]
2424
----
2525
$ oc get nodes -o wide
26-
NAME STATUS ROLES AGE VERSION EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
27-
ip-172-18-0-39.ec2.internal Ready infra 1d v1.10.0+b81c8f8 54.172.185.130 Red Hat Enterprise Linux Server 7.5 (Maipo) 3.10.0-862.el7.x86_64 docker://1.13.1
28-
ip-172-18-10-95.ec2.internal Ready master 1d v1.10.0+b81c8f8 54.88.22.81 Red Hat Enterprise Linux Server 7.5 (Maipo) 3.10.0-862.el7.x86_64 docker://1.13.1
29-
ip-172-18-8-35.ec2.internal Ready compute 1d v1.10.0+b81c8f8 34.230.50.57 Red Hat Enterprise Linux Server 7.5 (Maipo) 3.10.0-862.el7.x86_64 docker://1.13.1
3026
----
3127

3228
* The following command lists information about a single node:
@@ -112,14 +108,14 @@ System Info: <9>
112108
OS Image: OpenShift Enterprise
113109
Operating System: linux
114110
Architecture: amd64
115-
Container Runtime Version: docker://1.13.1
111+
Container Runtime Version: 1.13.1
116112
Kubelet Version: v1.10.0+b81c8f8
117113
Kube-Proxy Version: v1.10.0+b81c8f8
118114
ExternalID: node1.example.com
119115
Non-terminated Pods: (14 in total) <10>
120116
Namespace Name CPU Requests CPU Limits Memory Requests Memory Limits
121117
--------- ---- ------------ ---------- --------------- -------------
122-
default docker-registry-2-w252l 100m (5%) 0 (0%) 256Mi (3%) 0 (0%)
118+
default registry-2-w252l 100m (5%) 0 (0%) 256Mi (3%) 0 (0%)
123119
default registry-console-2-dpnc9 0 (0%) 0 (0%) 0 (0%) 0 (0%)
124120
default router-2-5snb2 100m (5%) 0 (0%) 256Mi (3%) 0 (0%)
125121
kube-service-catalog apiserver-jh6gt 0 (0%) 0 (0%) 0 (0%) 0 (0%)

modules/nodes-pods-disabling-features-list.adoc

Lines changed: 0 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -11,9 +11,6 @@ Use the following list to determine the name of the feature you want to disable:
1111
|===
1212
| Feature gate| Description
1313

14-
| *Accelerators*
15-
| Enables link:https://kubernetes.io/docs/tasks/manage-gpus/scheduling-gpus/[Nvidia GPU] support when using Docker.
16-
1714
| *AdvancedAuditing*
1815
| Enables Advanced Audit].
1916

@@ -23,9 +20,6 @@ Use the following list to determine the name of the feature you want to disable:
2320
| *APIResponseCompression*
2421
| Enables the compression of API responses for LIST or GET requests.
2522

26-
| *AppArmor*
27-
| Enables AppArmor-based mandatory access control on Linux nodes when using Docker. For more information, see the link:https://kubernetes.io/docs/tutorials/clusters/apparmor/[Kubernetes AppArmor documentation].
28-
2923
| *BlockVolume*
3024
| Enables the definition and consumption of raw block devices in pods. For more information, see
3125
the link:https://kubernetes.io/docs/concepts/storage/persistent-volumes/#raw-block-volume-support[Kubernetes Raw Block Volume Support].
@@ -69,9 +63,6 @@ For more information, see Extending the Kubernetes API with Custom Resources.
6963
| *ExperimentalCriticalPodAnnotation*
7064
| Enables annotating specific pods as critical so that their scheduling is guaranteed.
7165

72-
| *ExperimentalHostUserNamespaceDefaultingGate*
73-
| Enables the disabling of user namespaces. This is for Containers that are using other host projects, host mounts, or Containers that are privileged or using specific non-project capabilities, such as MKNODE, SYS_MODULE, and so forth. This should only be enabled if user project remapping is enabled in the Docker daemon.
74-
7566
| *GCERegionalPersistentDisk*
7667
| Enables the GCE Persistent Disk feature.
7768

0 commit comments

Comments
 (0)