You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/architecture-machine-roles.adoc
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -50,11 +50,11 @@ In a Kubernetes cluster, worker nodes run and manage the actual workloads reques
50
50
* CRI-O, which is the container engine.
51
51
* kubelet, which is the service that accepts and fulfills requests for running and stopping container workloads.
52
52
* A service proxy, which manages communication for pods across workers.
53
-
* The runC or crun low-level container runtime, which creates and runs containers.
53
+
* The crun or runC low-level container runtime, which creates and runs containers.
54
54
55
55
[NOTE]
56
56
====
57
-
For information about how to enable crun instead of the default runC, see the documentation for creating a `ContainerRuntimeConfig` CR.
57
+
For information about how to enable runC instead of the default crun, see the documentation for creating a `ContainerRuntimeConfig` CR.
58
58
====
59
59
60
60
In {product-title}, compute machine sets control the compute machines, which are assigned the `worker` machine role. Machines with the `worker` role drive compute workloads that are governed by a specific machine pool that autoscales them. Because {product-title} has the capacity to support multiple machine types, the machines with the `worker` role are classed as _compute_ machines. In this release, the terms _worker machine_ and _compute machine_ are used interchangeably because the only default type of compute machine is the worker machine. In future versions of {product-title}, different types of compute machines, such as infrastructure machines, might be used by default.
Copy file name to clipboardExpand all lines: modules/create-a-containerruntimeconfig-crd.adoc
+22-6Lines changed: 22 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ The CRI-O flag is applied on the cgroup of the container, while the Kubelet flag
25
25
* **Log level**: The `logLevel` parameter sets the CRI-O `log_level` parameter, which is the level of verbosity for log messages. The default is `info` (`log_level = info`). Other options include `fatal`, `panic`, `error`, `warn`, `debug`, and `trace`.
26
26
* **Overlay size**: The `overlaySize` parameter sets the CRI-O Overlay storage driver `size` parameter, which is the maximum size of a container image.
27
27
* **Maximum log size**: Setting the maximum log size in the `ContainerRuntimeConfig` is expected to be deprecated. If a maximum log size is required, it is recommended to use the `containerLogMaxSize` field in the `KubeletConfig` CR instead.
28
-
* **Container runtime**: The `defaultRuntime` parameter sets the container runtime to either `runc` or `crun`. The default is `runc`.
28
+
* **Container runtime**: The `defaultRuntime` parameter sets the container runtime to either `crun` or `runc`. The default is `crun`.
29
29
30
30
You should have one `ContainerRuntimeConfig` CR for each machine config pool with all the config changes you want for that pool. If you are applying the same content to all the pools, you only need one `ContainerRuntimeConfig` CR for all the pools.
31
31
@@ -74,7 +74,7 @@ $ oc get mc | grep container
74
74
...
75
75
----
76
76
77
-
The following example sets the `log_level` field to `debug` and sets the overlay size to 8 GB:
77
+
The following example sets the `log_level` field to `debug`, sets the overlay size to 8 GB, and configures runC as the container runtime:
78
78
79
79
.Example `ContainerRuntimeConfig` CR
80
80
[source,yaml]
@@ -90,12 +90,12 @@ spec:
90
90
containerRuntimeConfig:
91
91
logLevel: debug <2>
92
92
overlaySize: 8G <3>
93
-
defaultRuntime: "crun" <4>
93
+
defaultRuntime: "runc" <4>
94
94
----
95
95
<1> Specifies the machine config pool label. For a container runtime config, the role must match the name of the associated machine config pool.
96
96
<2> Optional: Specifies the level of verbosity for log messages.
97
97
<3> Optional: Specifies the maximum size of a container image.
98
-
<4> Optional: Specifies the container runtime to deploy to new containers. The default value is `runc`.
98
+
<4> Optional: Specifies the container runtime to deploy to new containers, either `crun` or `runc`. The default value is `crun`.
99
99
100
100
.Procedure
101
101
@@ -116,6 +116,7 @@ spec:
116
116
containerRuntimeConfig: <2>
117
117
logLevel: debug
118
118
overlaySize: 8G
119
+
defaultRuntime: "runc"
119
120
----
120
121
<1> Specify a label for the machine config pool that you want you want to modify.
Copy file name to clipboardExpand all lines: modules/nodes-pods-user-namespaces-configuring.adoc
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -35,7 +35,7 @@ Enabling the `TechPreviewNoUpgrade` feature set on your cluster cannot be undone
35
35
+
36
36
After you save the changes, new machine configs are created, the machine config pools are updated, and scheduling on each node is disabled while the change is being applied.
37
37
38
-
* You enabled the crun container runtime on the worker nodes. crun is currently the only released OCI runtime with support for user namespaces.
38
+
* The crun container runtime is present on the worker nodes. crun is currently the only OCI runtime packaged with {product-title} that supports user namespaces. crun is active by default.
Copy file name to clipboardExpand all lines: modules/rhcos-about.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ The following list describes key features of the {op-system} operating system:
25
25
26
26
* **CRI-O container runtime**: Although {op-system} contains features for running the OCI- and libcontainer-formatted containers that Docker requires, it incorporates the CRI-O container engine instead of the Docker container engine. By focusing on features needed by Kubernetes platforms, such as {product-title}, CRI-O can offer specific compatibility with different Kubernetes versions. CRI-O also offers a smaller footprint and reduced attack surface than is possible with container engines that offer a larger feature set. At the moment, CRI-O is the only engine available within {product-title} clusters.
27
27
+
28
-
CRI-O can use either the runC or crun container runtime to start and manage containers. For information about how to enable crun, see the documentation for creating a `ContainerRuntimeConfig` CR.
28
+
CRI-O can use either the crun or runC container runtime to start and manage containers. crun is the default. For information about how to enable runC, see the documentation for creating a `ContainerRuntimeConfig` CR.
29
29
30
30
* **Set of container tools**: For tasks such as building, copying, and otherwise managing containers, {op-system} replaces the Docker CLI tool with a compatible set of container tools. The podman CLI tool supports many container runtime features, such as running, starting, stopping, listing, and removing containers and container images. The skopeo CLI tool can copy, authenticate, and sign images. You can use the `crictl` CLI tool to work with containers and pods from the CRI-O container engine. While direct use of these tools in {op-system} is discouraged, you can use them for debugging purposes.
{product-title} uses CRI-O as the container engine and runC or crun as the container runtime. The default container runtime is runC. Both container runtimes adhere to the link:https://www.opencontainers.org/[Open Container Initiative (OCI)] runtime specifications.
53
+
{product-title} uses CRI-O as the container engine and runC or crun as the container runtime. The default container runtime is crun. Both container runtimes adhere to the link:https://www.opencontainers.org/[Open Container Initiative (OCI)] runtime specifications.
54
54
55
55
include::snippets/about-crio-snippet.adoc[]
56
56
57
-
runC, developed by Docker and maintained by the Open Container Project, is a lightweight, portable container runtime written in Go. crun, developed by Red Hat, is a fast and low-memory container runtime fully written in C. As of {product-title} {product-version}, you can select between the two.
57
+
crun, developed by Red Hat, is a fast and low-memory container runtime fully written in C. runC, developed by Docker and maintained by the Open Container Project, is a lightweight, portable container runtime written in Go.
58
58
59
59
crun has several improvements over runC, including:
60
60
@@ -74,5 +74,5 @@ For information on setting which container runtime to use, see xref:../../machin
0 commit comments