-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ability to include additional images in the kindest/node image #2160
Comments
It won't work for the same reason that Another approach might be trying to build a tool / command for this instead of doing it while building the rest of the node image (so users could start from a standard node image).
Did you know that you can have multiple images into a single tarball?
This one also persists image loading across clusters though. And is something we've already been tracking / documenting. #2159 (comment) has some more questions for consideration |
+1 to this desire of loading additional images to create a custom node image. I've been working off a fork that has very similar modifications to @dkoshkin's work in #2159 (comment). The only difference is I input my images from a preload:
images:
- "custom-repo/repo/cert-manager-controller:v0.16.1_customerver.1"
- "custom-repo/repo/cluster-api/cluster-api-aws-controller:v0.6.4_customerver.1"
- "custom-repo/repo/cluster-api/kubeadm-bootstrap-controller:v0.3.14_vmware.2"
- "custom-repo/repo/cluster-api/kubeadm-control-plane-controller:v0.3.14_vmware.2"
- "custom-repo/repo/cluster-api/kube-rbac-proxy:v0.4.1_vmware.2"
- "custom-repo/repo/cert-manager-cainjector:v0.16.1_customerver.1"
- "custom-repo/repo/cert-manager-webhook:v0.16.1_customerver.1" Based on this issue and the open PR, it seems like the current open questions are:
|
Here are my initial thoughts on the above 😃 :
Yeah, I think you're right that this makes the most sense for 2 reasons.
Yes, directly into containerd seems sensible.
If we are loading directly into containerd, does this matter?
Yes, this should be supported too. I'm not convinced you'd need it immediately, but an API could look roughly like type AdditionalImages struct {
Images []struct {
imageName string
imageTag string
// when pulling from a local image archive (.tar)
imageLocation string
}
}
Personally, I don't think doing anything special for image eviction is warranted. |
What would you like to be added:
Currently the kind node images comes with the core kubernetes images and a few other images that it needs to start.
It would be great if it was possible to include additional images into the kind node image that it can have ready to be used.
Why is this needed:
In an air-gapped cluster where you may only need to have a few additional images at bootstrap, having pre-baked images in a
kind
image could be a simple way to get access to a Kubernetes API.Some options here could be:
kindest/node
image as a base image (I tried for a little bit but didn't find anything online andcrictl pull
wasn't working, but would love feedback if it is possible).kind build node-image
CLI command to add additional images.kind load
command. More complicated since you would need to ship around multiple images, but an option that already works.The text was updated successfully, but these errors were encountered: