尝试将不安全的注册表添加到containerd配置中,如下所示:
[plugins."io.containerd.grpc.v1.cri".cni]
bin_dir = "/opt/cni/bin"
conf_dir = "/etc/cni/net.d"
max_conf_num = 1
conf_template = ""
[plugins."io.containerd.grpc.v1.cri".registry]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors]
[plugins."io.containerd.grpc.v1.cri".registry.mirrors."docker.io"]
endpoint = ["https://registry-1.docker.io"]
[plugin."io.containerd.grpc.v1.cri".registry.mirrors."test.http-registry.io"]
endpoint = ["http://v048011.dom600.lab:5000"]
Run Code Online (Sandbox Code Playgroud)
即使将其添加到 后config.toml,当从不安全的注册表中提取映像时,它也会失败:
sudo ctr image pull v048011.dom600.lab:5000:5000/myjenkins:latest
ctr: failed to resolve reference "v048011.dom600.lab:5000/myjenkins:latest": failed to do request: Head https://v048011.dom600.lab:5000:5000/v2/myjenkins/manifests/latest: http: server gave HTTP response to HTTPS client
Run Code Online (Sandbox Code Playgroud)
docker我们可以将其添加insecure registry到文件中daemon.json,然后 docker 将从其中提取图像,我怎样才能在 中实现相同的目的containerd?替换 docker 作为 k8s 集群中的运行时。
我有一个 kubernetes 节点,即控制平面,它对于部署 pod 来说是不受污染的。我有一个泊坞窗图像sdmay23-42.ece.iastate.edu:5000/canvas-lti-frontend:v2。
我已登录 docker cli。daemon.json 设置为不安全的注册表,我可以通过以下方式进行验证docker info:
Docker Root Dir: /var/lib/docker\n Debug Mode: false\n Username: sdmay2342\n Registry: https://index.docker.io/v1/\n Labels:\n Experimental: false\n Insecure Registries:\n sdmay23-42.ece.iastate.edu:5000\n 127.0.0.0/8\n Live Restore Enabled: false\nRun Code Online (Sandbox Code Playgroud)\n我可以拉图像:
\nStatus: Image is up to date for sdmay23-42.ece.iastate.edu:5000/canvas-lti-frontend:v2\nsdmay23-42.ece.iastate.edu:5000/canvas-lti-frontend:v2\nRun Code Online (Sandbox Code Playgroud)\n我可以从图像构建一个容器:
\nCONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES\nad582a4d514b sdmay23-42.ece.iastate.edu:5000/canvas-lti-frontend:v2 "docker-entrypoint.s\xe2\x80\xa6" 6 seconds ago Up 6 seconds 3000/tcp test-frontend\nRun Code Online (Sandbox Code Playgroud)\n当我从 yaml 清单将其部署到节点时,出现错误。\n基本清单:
\napiVersion: v1\nkind: Pod\nmetadata:\n name: test-pod\nspec:\n …Run Code Online (Sandbox Code Playgroud)