随着容器技术的发展,越来越多的企业选择使用Kubernetes来管理容器化应用。默认情况下,Kubernetes支持多种容器运行时,其中包括Docker。然而,随着时间的推移,社区逐渐倾向于更轻量、更高效的解决方案,如Containerd。Containerd是Cloud Native Computing Foundation (CNCF) 的一个毕业项目,它提供了与Docker相似的功能,但其设计更加简化,专注于容器运行时的核心职责。本文将指导您完成从Docker到Containerd的转换过程,以实现更优的资源利用率和服务稳定性。

runtime
性能提升:Containerd通过减少抽象层提升了整体性能。
安全性增强:它提供了更直接的系统调用,减少了潜在的安全风险。
简化架构:Containerd拥有更简洁的设计,使得维护和故障排除更为容易。
官方支持趋势:Kubernetes官方团队逐步转向对Containerd的支持。
cadvisor采集不到container级别的资源使用情况。
Kubernetes版本至少为1.20+,因为较新版本已经弃用了Docker作为默认容器运行时。
备份现有配置和数据,以防迁移过程中出现问题。
确认所有节点上的操作系统兼容Containerd。
0、前置步骤
# 腾空节点
$ kubectl drain --ignore-daemonsets k8s-node02
node/master03 cordoned
WARNING: ignoring DaemonSet-managed Pods: kube-system/calico-node-fbzqw, kube-system/kube-proxy-95hst
node/master03 drained
# 停止相关服务
$ systemctl stop kubelet
$ systemctl stop containerd
$ systemctl disable docker --now
1、部署containerd服务
请看往期文章 生产环境下的Containerd安装与优化指南
2、拷贝其他节点的镜像配置
$ scp -r etc/containerd/certs.d 172.139.20.75:/tmp
$ sudo mv tmp/certs.d etc/containerd/
$ sudo crictl pull 172.139.20.170:5000/library/pause:3.9
3、修改kubelet参数
$ vim var/lib/kubelet/kubeadm-flags.env
KUBELET_KUBEADM_ARGS="--container-runtime-endpoint=unix:///run/containerd/containerd.sock --pod-infra-container-image=172.139.20.170:5000/library/pause:3.9"
Tip:修改container-runtime-endpoint参数
4、重启kubelet服务
$ systemctl start kubelet
5、恢复可调度
$ kubectl uncordon k8s-node02
1、查看节点runtime
$ kubectl get nodes k8s-node02 -owide
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
k8s-node02 Ready <none> 152d v1.27.16 172.139.20.75 <none> CentOS Linux 7 (Core) 5.4.278-1.el7.elrepo.x86_64 containerd://1.6.34
2、确保节点能正常启动pod
$ kubectl get pod -owide -A| grep k8s-node02
gitlab gitlab-gitaly-0 0/1 Init:CrashLoopBackOff 8 (15s ago) 2d5h 10.244.58.246 k8s-node02 <none> <none>
gitlab gitlab-gitlab-shell-66c9f95c84-zz5ld 0/1 Init:CrashLoopBackOff 8 (48s ago) 2d5h 10.244.58.242 k8s-node02 <none> <none>
gitlab gitlab-kas-7b987c7c4c-2qcvh 1/1 Running 2 2d5h 10.244.58.245 k8s-node02 <none> <none>
harbor harbor-core-58cff667b8-275gc 1/1 Running 1 6h19m 10.244.58.237 k8s-node02 <none> <none>
harbor harbor-exporter-8bf987cb7-t5rbs 1/1 Running 10 2d3h 10.244.58.232 k8s-node02 <none> <none>
harbor harbor-jobservice-847b864c7f-hgr4b 1/1 Running 2 (6m37s ago) 6h19m 10.244.58.233 k8s-node02 <none> <none>
harbor harbor-registry-656468fdb4-ck5cn 2/2 Running 2 6h20m 10.244.58.234 k8s-node02 <none> <none>
kube-system calico-node-ns7s9 1/1 Running 2 2d 172.139.20.75 k8s-node02 <none> <none>
kube-system calicoctl-5976bd6ff7-jjsxh 1/1 Running 2 2d6h 172.139.20.75 k8s-node02 <none> <none>
kube-system cert-manager-bb9c6b9ff-6jqc9 0/1 ImagePullBackOff 1 (24h ago) 2d6h 10.244.58.236 k8s-node02 <none> <none>
kube-system cert-manager-cainjector-bbf9dcf9b-cwtg9 1/1 Running 3 2d6h 10.244.58.239 k8s-node02 <none> <none>
kube-system coredns-68d697fb69-lc7sc 1/1 Running 2 2d6h 10.244.58.235 k8s-node02 <none> <none>
kube-system csi-cephfsplugin-m6b66 3/3 Running 6 2d6h 172.139.20.75 k8s-node02 <none> <none>
kube-system csi-rbdplugin-provisioner-867ccf48d7-85z5k 7/7 Running 25 2d6h 10.244.58.244 k8s-node02 <none> <none>
kube-system csi-rbdplugin-sq5q8 3/3 Running 6 2d6h 172.139.20.75 k8s-node02 <none> <none>
kube-system grafana-cdn-8c6cddddc-ft745 1/1 Running 2 2d6h 10.244.58.249 k8s-node02 <none> <none>
kube-system ingress-nginx-controller-7bfc8b7797-gktxv 1/1 Running 3 2d6h 10.244.58.240 k8s-node02 <none> <none>
kube-system kube-proxy-tl7cw 1/1 Running 2 2d1h 172.139.20.75 k8s-node02 <none> <none>
kube-system kube-state-metrics-76f85d6777-pl5t8 1/1 Running 4 2d6h 10.244.58.243 k8s-node02 <none> <none>
kube-system minio-1 1/1 Running 1 6h25m 10.244.58.248 k8s-node02 <none> <none>
kube-system nfs-dynamic-provisioner-7d7ccf88fb-hg779 1/1 Running 4 2d6h 10.244.58.241 k8s-node02 <none> <none>
kube-system node-exporter-n8jbl 1/1 Running 2 2d6h 172.139.20.75 k8s-node02 <none> <none>
kube-system prometheus-dd5446b59-cdrfg 2/2 Running 0 2m29s 10.244.58.250 k8s-node02 <none> <none>
kube-system smtp-proxy-network-7f97749595-bmcw2 1/1 Running 2 2d6h 10.244.58.238 k8s-node02 <none> <none>
完成从Docker到Containerd的切换后,您的Kubernetes集群将受益于改进的性能和安全特性。尽管初始设置可能需要一些时间和努力,但从长远来看,这种转变对于追求高效、现代化基础设施的组织来说是非常值得的。希望本指南能帮助您顺利过渡到Containerd,并享受它带来的诸多优势。请记住,技术不断进步,保持学习和适应新技术的能力至关重要。
别忘了,关注我们的公众号,获取更多关于容器技术和云原生领域的深度洞察和技术实战,让我们携手在技术的海洋中乘风破浪!





