当前位置: 代码网 > 服务器>服务器>云虚拟主机 > K8s中的临时容器Ephemeral Containers使用

K8s中的临时容器Ephemeral Containers使用

2024年09月07日 云虚拟主机 我要评论
临时容器 ephemeral containers当由于容器崩溃或容器镜像不包含调试工具而导致 kubectl exec 无用时, 临时容器对于交互式故障排查很有用。尤其是,distroless 镜像

临时容器 ephemeral containers

  • 当由于容器崩溃或容器镜像不包含调试工具而导致 kubectl exec 无用时, 临时容器对于交互式故障排查很有用。
  • 尤其是,distroless 镜像 允许用户部署最小的容器镜像,从而减少攻击面并减少故障和漏洞的暴露。 
  • 由于distroless镜像不包含 shell 或任何的调试工具,因此很难单独使用 kubectl exec 命令进行故障排查。
  • 使用临时容器时,启用 进程名字空间共享 很有帮助,可以查看其他容器中的进程。

开启临时容器功能

开启特性

1. master 节点配置 apiserver 组件
[root@vms120 ~]# cat /etc/kubernetes/manifests/kube-apiserver.yaml
- --feature-gates=ephemeralcontainers=true
...

2. master 节点配置 controller-manager
[root@vms120 ~]# vim /etc/kubernetes/manifests/kube-controller-manager.yaml
spec:
  containers:
  - command:
    - --feature-gates=ephemeralcontainers=true            # 增加
...

3. master 节点配置 kube-scheduler
[root@vms120 ~]# vim /etc/kubernetes/manifests/kube-scheduler.yaml
spec:
  containers:
  - command:
    - --feature-gates=ephemeralcontainers=true            # 增加
# 重启服务 
[root@vms120 ~]# systemctl restart kubelet.service

4. 所有 node 节点配置 kubelet 参数
添加 --feature-gates=ephemeralcontainers=true
[root@vms121 kubernetes]# cat /var/lib/kubelet/kubeadm-flags.env
kubelet_kubeadm_args="--network-plugin=cni --pod-infra-container-image=registry.aliyuncs.com/google_containers/pause:3.6 --feature-gates=ephemeralcontainers=true"
# 重启 node kubelet 服务
[root@vms121 kubernetes]# systemctl daemon-reload
[root@vms121 kubernetes]# systemctl restart kubelet

测试

1. 创建 pod
[root@vms120 ~]# kubectl run ephemeral-demo --image=registry.aliyuncs.com/google_containers/pause:3.2 --restart=never
pod/ephemeral-demo created

[root@vms120 ~]# kubectl  exec -it ephemeral-demo  -- sh
oci runtime exec failed: exec failed: unable to start container process: exec: "sh": executable file not found in $path: unknown
command terminated with exit code 126
# 无法 kubectl exec

解决无法exec,我们创建一个临时容器添加到这个pod里

加上-i参数将直接进入添加的临时容器的控制台界面,因为是使用kubectl run 创建的pod,所以需要-target 参数指定另一个容器的进程命名空间。

因为 kubectl run 不能在它创建的pod中启用 共享进程命名空间

[root@vms120 ~]# kubectl debug -it ephemeral-demo --image=busybox --target=ephemeral-demo
targeting container "ephemeral-demo". if you don't see processes from this container it may be because the container runtime doesn't support this feature.
defaulting debug container name to debugger-bljnj.
if you don't see a command prompt, try pressing enter.
/ # ls
bin   dev   etc   home  proc  root  sys   tmp   usr   var
/ # 

此时再去看pod 的信息会发现已经被添加了一个类型为ephemeralcontainers的容器

[root@vms120 ~]# kubectl  get pod ephemeral-demo   -o json|jq .spec
{
  "containers": [
    {
      "image": "registry.aliyuncs.com/google_containers/pause:3.2",
      "imagepullpolicy": "ifnotpresent",
      "name": "ephemeral-demo",
      "resources": {},
      "terminationmessagepath": "/dev/termination-log",
      "terminationmessagepolicy": "file",
      "volumemounts": [
        {
          "mountpath": "/var/run/secrets/kubernetes.io/serviceaccount",
          "name": "kube-api-access-sqmzl",
          "readonly": true
        }
      ]
    }
  ],
  "dnspolicy": "clusterfirst",
  "enableservicelinks": true,
  "ephemeralcontainers": [
    {
      "image": "busbox",
      "imagepullpolicy": "always",
      "name": "debugger-9l8mw",
      "resources": {},
      "stdin": true,
      "targetcontainername": "ephemeral-demo",
      "terminationmessagepath": "/dev/termination-log",
      "terminationmessagepolicy": "file",
      "tty": true
    },
    {
      "image": "busybox",
      "imagepullpolicy": "always",
      "name": "debugger-slx6g",
      "resources": {},
      "stdin": true,
      "targetcontainername": "ephemeral-demo",
      "terminationmessagepath": "/dev/termination-log",
      "terminationmessagepolicy": "file",
      "tty": true
    },
    {
      "image": "busybox",
      "imagepullpolicy": "always",
      "name": "debugger-gw6zt",
      "resources": {},
      "stdin": true,
      "terminationmessagepath": "/dev/termination-log",
      "terminationmessagepolicy": "file"
    },
    {
      "image": "busybox",
      "imagepullpolicy": "always",
      "name": "debugger-cxc8b",
      "resources": {},
      "stdin": true,
      "targetcontainername": "ephemeral-demo",
      "terminationmessagepath": "/dev/termination-log",
      "terminationmessagepolicy": "file",
      "tty": true
    },
    {
      "image": "busybox",
      "imagepullpolicy": "always",
      "name": "debugger-bljnj",
      "resources": {},
      "stdin": true,
      "targetcontainername": "ephemeral-demo",
      "terminationmessagepath": "/dev/termination-log",
      "terminationmessagepolicy": "file",
      "tty": true
    }
  ],
  "nodename": "vms121.rhce.cc",
  "preemptionpolicy": "preemptlowerpriority",
  "priority": 0,
  "restartpolicy": "never",
  "schedulername": "default-scheduler",
  "securitycontext": {},
  "serviceaccount": "default",
  "serviceaccountname": "default",
  "terminationgraceperiodseconds": 30,
  "tolerations": [
    {
      "effect": "noexecute",
      "key": "node.kubernetes.io/not-ready",
      "operator": "exists",
      "tolerationseconds": 300
    },
    {
      "effect": "noexecute",
      "key": "node.kubernetes.io/unreachable",
      "operator": "exists",
      "tolerationseconds": 300
    }
  ],
  "volumes": [
    {
      "name": "kube-api-access-sqmzl",
      "projected": {
        "defaultmode": 420,
        "sources": [
          {
            "serviceaccounttoken": {
              "expirationseconds": 3607,
              "path": "token"
            }
          },
          {
            "configmap": {
              "items": [
                {
                  "key": "ca.crt",
                  "path": "ca.crt"
                }
              ],
              "name": "kube-root-ca.crt"
            }
          },
          {
            "downwardapi": {
              "items": [
                {
                  "fieldref": {
                    "apiversion": "v1",
                    "fieldpath": "metadata.namespace"
                  },
                  "path": "namespace"
                }
              ]
            }
          }
        ]
      }
    }
  ]
}

有些时候 pod 的配置参数使得在某些情况下很难执行故障排查。

例如,在容器镜像中不包含 shell 或者你的应用程序在启动时崩溃的情况下, 就不能通过运行 kubectl exec 来排查容器故障。

在这些情况下,你可以使用 kubectl debug 来创建 pod 的副本,通过更改配置帮助调试。

报错

error: ephemeral containers are disabled for this cluster (error from server: "the server could not find the requested resource").

未成功开启ephemeralcontainers特性

总结

以上为个人经验,希望能给大家一个参考,也希望大家多多支持代码网。

(0)

相关文章:

版权声明:本文内容由互联网用户贡献,该文观点仅代表作者本人。本站仅提供信息存储服务,不拥有所有权,不承担相关法律责任。 如发现本站有涉嫌抄袭侵权/违法违规的内容, 请发送邮件至 2386932994@qq.com 举报,一经查实将立刻删除。

发表评论

验证码:
Copyright © 2017-2025  代码网 保留所有权利. 粤ICP备2024248653号
站长QQ:2386932994 | 联系邮箱:2386932994@qq.com