Skip to content

Commit c43957b

Browse files
committed
images: describe enabling KubeletEnsureSecretPulledImages for the first time
Signed-off-by: Stanislav Láznička <slznika@microsoft.com>
1 parent 5dd39c9 commit c43957b

File tree

1 file changed

+16
-0
lines changed

1 file changed

+16
-0
lines changed

content/en/docs/concepts/containers/images.md

Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -446,6 +446,22 @@ will continue to verify without the need to access the registry. New or rotated
446446
will require the image to be re-pulled from the registry.
447447
{{< /note >}}
448448

449+
#### Enabling `KubeletEnsureSecretPulledImages` for the first time
450+
451+
When the `KubeletEnsureSecretPulledImages` gets enabled for the first time, either
452+
by a kubelet upgrade or by explicitly enabling the feature, if a kubelet is able to
453+
access any images at that time, these will all be considered pre-pulled. This happens
454+
because in this case the kubelet has no records about the images being pulled.
455+
The kubelet will only be able to start making image pull records as any image gets
456+
pulled for the first time.
457+
458+
If this is a concern, it is advised to clean up nodes of all images that should not
459+
be considered pre-pulled before enabling the feature.
460+
461+
Note that removing the directory holding the image pulled records will have the same
462+
effect on kubelet restart, particularly the images currently cached in the nodes by
463+
the container runtime will all be considered pre-pulled.
464+
449465
### Creating a Secret with a Docker config
450466

451467
You need to know the username, registry password and client email address for authenticating

0 commit comments

Comments
 (0)