You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
as a part of the Kubernetes v1.20 release. For more detail
17
-
on what that means, check out the blog post
18
+
as a part of the Kubernetes v1.20 release. The Kubernetes
19
+
[v1.24 release](/releases/#release-v1-24) actually removed the dockershim
20
+
from Kubernetes.
21
+
22
+
For more on what that means, check out the blog post
18
23
[Don't Panic: Kubernetes and Docker](/blog/2020/12/02/dont-panic-kubernetes-and-docker/).
19
24
20
-
Also, you can read [check whether dockershim removal affects you](/docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-removal-affects-you/)
21
-
to determine how much impact the removal of dockershim would have for you
22
-
or for your organization.
25
+
To determine the impact that the removal of dockershim would have for you or your organization,
26
+
you can read [Check whether dockershim removal affects you](/docs/tasks/administer-cluster/migrating-from-dockershim/check-if-dockershim-removal-affects-you/).
23
27
24
-
As the Kubernetes 1.24 release has become imminent, we've been working hard to try to make this a smooth transition.
28
+
In the months and days leading up to the Kubernetes 1.24 release, Kubernetes contributors worked hard to try to make this a smooth transition.
25
29
26
-
-We've written a blog post detailing our [commitment and next steps](/blog/2022/01/07/kubernetes-is-moving-on-from-dockershim/).
27
-
-We believe there are no major blockers to migration to [other container runtimes](/docs/setup/production-environment/container-runtimes/#container-runtimes).
28
-
-There is also a [Migrating from dockershim](/docs/tasks/administer-cluster/migrating-from-dockershim/) guide available.
29
-
-We've also created a page to list
30
+
-A blog post detailing our [commitment and next steps](/blog/2022/01/07/kubernetes-is-moving-on-from-dockershim/).
31
+
-Checking if there were major blockers to migration to [other container runtimes](/docs/setup/production-environment/container-runtimes/#container-runtimes).
32
+
-Adding a [migrating from dockershim](/docs/tasks/administer-cluster/migrating-from-dockershim/) guide.
33
+
-Creating a list of
30
34
[articles on dockershim removal and on using CRI-compatible runtimes](/docs/reference/node/topics-on-dockershim-and-cri-compatible-runtimes/).
31
35
That list includes some of the already mentioned docs, and also covers selected external sources
32
36
(including vendor guides).
33
37
34
-
### Why is the dockershim being removed from Kubernetes?
38
+
### Why was the dockershim removed from Kubernetes?
35
39
36
40
Early versions of Kubernetes only worked with a specific container runtime:
37
41
Docker Engine. Later, Kubernetes added support for working with other container runtimes.
@@ -49,26 +53,52 @@ In fact, maintaining dockershim had become a heavy burden on the Kubernetes main
49
53
50
54
Additionally, features that were largely incompatible with the dockershim, such
51
55
as cgroups v2 and user namespaces are being implemented in these newer CRI
52
-
runtimes. Removing support for the dockershim will allow further development in
53
-
those areas.
56
+
runtimes. Removing the dockershim from Kubernetes allows further development in those areas.
Docker popularized the Linux containers pattern and has been instrumental in
63
+
developing the underlying technology, however containers in Linux have existed
64
+
for a long time. The container ecosystem has grown to be much broader than just
65
+
Docker. Standards like OCI and CRI have helped many tools grow and thrive in our
66
+
ecosystem, some replacing aspects of Docker while others enhance existing
67
+
functionality.
68
+
69
+
### Will my existing container images still work?
70
+
71
+
Yes, the images produced from `docker build` will work with all CRI implementations.
72
+
All your existing images will still work exactly the same.
73
+
74
+
#### What about private images?
75
+
76
+
Yes. All CRI runtimes support the same pull secrets configuration used in
77
+
Kubernetes, either via the PodSpec or ServiceAccount.
78
+
57
79
### Can I still use Docker Engine in Kubernetes 1.23?
58
80
59
81
Yes, the only thing changed in 1.20 is a single warning log printed at [kubelet]
60
-
startup if using Docker Engine as the runtime. You'll see this warning in all versions up to 1.23. The dockershim removal occurs in Kubernetes 1.24.
82
+
startup if using Docker Engine as the runtime. You'll see this warning in all versions up to 1.23. The dockershim removal occurred
83
+
in Kubernetes 1.24.
84
+
85
+
If you're running Kubernetes v1.24 or later, see [Can I still use Docker Engine as my container runtime?](#can-i-still-use-docker-engine-as-my-container-runtime).
86
+
(Remember, you can switch away from the dockershim if you're using any supported Kubernetes release; from release v1.24, you
87
+
**must** switch as Kubernetes no longer incluides the dockershim).
Yes, the images produced from `docker build` will work with all CRI implementations.
86
-
All your existing images will still work exactly the same.
87
-
88
-
#### What about private images?
111
+
You can install `cri-dockerd` and use it to connect the kubelet to Docker Engine. Read [Migrate Docker Engine nodes from dockershim to cri-dockerd](/docs/tasks/administer-cluster/migrating-from-dockershim/migrate-dockershim-dockerd/) to learn more.
89
112
90
-
Yes. All CRI runtimes support the same pull secrets configuration used in
91
-
Kubernetes, either via the PodSpec or ServiceAccount.
92
-
93
-
### Are Docker and containers the same thing?
94
-
95
-
Docker popularized the Linux containers pattern and has been instrumental in
96
-
developing the underlying technology, however containers in Linux have existed
97
-
for a long time. The container ecosystem has grown to be much broader than just
98
-
Docker. Standards like OCI and CRI have helped many tools grow and thrive in our
99
-
ecosystem, some replacing aspects of Docker while others enhance existing
### What should I look out for when changing CRI implementations?
149
152
150
153
While the underlying containerization code is the same between Docker and most
@@ -153,24 +156,25 @@ common things to consider when migrating are:
153
156
154
157
- Logging configuration
155
158
- Runtime resource limitations
156
-
- Node provisioning scripts that call docker or use docker via it's control socket
157
-
-Kubectl plugins that require docker CLI or the control socket
159
+
- Node provisioning scripts that call docker or use Docker Engine via its control socket
160
+
-Plugins for `kubectl`that require the `docker` CLI or the Docker Engine control socket
158
161
- Tools from the Kubernetes project that require direct access to Docker Engine
159
162
(for example: the deprecated `kube-imagepuller` tool)
160
-
- Configuration of functionality like `registry-mirrors` and insecure registries
163
+
- Configuration of functionality like `registry-mirrors` and insecure registries
161
164
- Other support scripts or daemons that expect Docker Engine to be available and are run
162
165
outside of Kubernetes (for example, monitoring or security agents)
163
166
- GPUs or special hardware and how they integrate with your runtime and Kubernetes
164
167
165
168
If you use Kubernetes resource requests/limits or file-based log collection
166
-
DaemonSets then they will continue to work the same, but if you’ve customized
169
+
DaemonSets then they will continue to work the same, but if you've customized
167
170
your `dockerd` configuration, you’ll need to adapt that for your new container
168
171
runtime where possible.
169
172
170
173
Another thing to look out for is anything expecting to run for system maintenance
171
174
or nested inside a container when building images will no longer work. For the
172
-
former, you can use the [`crictl`][cr] tool as a drop-in replacement (see [mapping from docker cli to crictl](https://kubernetes.io/docs/tasks/debug-application-cluster/crictl/#mapping-from-docker-cli-to-crictl)) and for the
173
-
latter you can use newer container build options like [img], [buildah],
175
+
former, you can use the [`crictl`][cr] tool as a drop-in replacement (see
176
+
[mapping from docker cli to crictl](https://kubernetes.io/docs/tasks/debug-application-cluster/crictl/#mapping-from-docker-cli-to-crictl))
177
+
and for the latter you can use newer container build options like [img], [buildah],
174
178
[kaniko], or [buildkit-cli-for-kubectl] that don’t require Docker.
0 commit comments