Skip to content

Instantly share code, notes, and snippets.

@jon
Created May 22, 2018 17:37
Show Gist options
  • Save jon/fd018b220921a8f1b48743b0ba2d33c7 to your computer and use it in GitHub Desktop.
Save jon/fd018b220921a8f1b48743b0ba2d33c7 to your computer and use it in GitHub Desktop.
Kubernetes running a Kata Container on GCE with Nested Virtualization
Name: nginx-untrusted
Namespace: default
Node: kata/10.138.0.2
Start Time: Tue, 22 May 2018 17:29:25 +0000
Labels: <none>
Annotations: io.kubernetes.cri-o.TrustedSandbox=false
io.kubernetes.cri.untrusted-workload=true
kubectl.kubernetes.io/last-applied-configuration={"apiVersion":"v1","kind":"Pod","metadata":{"annotations":{"io.kubernetes.cri-o.TrustedSandbox":"false","io.kubernetes.cri.untrusted-workload":"true"},...
Status: Running
IP: 192.168.86.196
Containers:
nginx:
Container ID: containerd://d78f9a82893b5144913b0758814bff60ab8015c66846f6d88d48495355d5ceff
Image: nginx
Image ID: docker.io/library/nginx@sha256:0fb320e2a1b1620b4905facb3447e3d84ad36da0b2c8aa8fe3a5a81d1187b884
Port: <none>
Host Port: <none>
State: Running
Started: Tue, 22 May 2018 17:29:35 +0000
Ready: True
Restart Count: 0
Environment: <none>
Mounts:
/var/run/secrets/kubernetes.io/serviceaccount from default-token-pgdmp (ro)
Conditions:
Type Status
Initialized True
Ready True
PodScheduled True
Volumes:
default-token-pgdmp:
Type: Secret (a volume populated by a Secret)
SecretName: default-token-pgdmp
Optional: false
QoS Class: BestEffort
Node-Selectors: kata-runtime=true
Tolerations: node.kubernetes.io/not-ready:NoExecute for 300s
node.kubernetes.io/unreachable:NoExecute for 300s
Events:
Type Reason Age From Message
---- ------ ---- ---- -------
Normal Scheduled 34s default-scheduler Successfully assigned nginx-untrusted to kata
Normal SuccessfulMountVolume 33s kubelet, kata MountVolume.SetUp succeeded for volume "default-token-pgdmp"
Normal Pulling 30s kubelet, kata pulling image "nginx"
Normal Pulled 23s kubelet, kata Successfully pulled image "nginx"
Normal Created 23s kubelet, kata Created container
Normal Started 23s kubelet, kata Started container
6755 ? Ssl 0:09 /usr/local/bin/containerd
7108 ? Sl 0:00 \_ containerd-shim -namespace k8s.io -workdir /var/lib/containerd/io.containerd.runtime.v1.linux/k8s.io/b6a71ffd920a331f60fc3406b47d645f5a9e2542a9c07da0354a050675ac4591 -address /run/containerd/containerd.sock -containerd-binary /usr/local/bin/containerd
7126 ? Ssl 0:00 | \_ /sidecar --v=2 --logtostderr --probe=kubedns,127.0.0.1:10053,kubernetes.default.svc.cluster.local,5,SRV --probe=dnsmasq,127.0.0.1:53,kubernetes.default.svc.cluster.local,5,SRV
10529 ? Sl 0:00 \_ containerd-shim -namespace k8s.io -workdir /var/lib/containerd/io.containerd.runtime.v1.linux/k8s.io/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca -address /run/containerd/containerd.sock -containerd-binary /usr/local/bin/containerd
10563 ? Sl 0:02 | \_ /opt/kata/bin/qemu-system-x86_64 -name sandbox-9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca -uuid 10a64a56-50eb-4996-8c14-f0478ca87629 -machine pc,accel=kvm,kernel_irqchip,nvdimm -cpu host,pmu=off -qmp unix:/run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/mon-10a64a56-50eb-4996-8c14-f0,server,nowait -qmp unix:/run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/ctl-10a64a56-50eb-4996-8c14-f0,server,nowait -m 2048M,slots=2,maxmem=16056M -device pci-bridge,bus=pci.0,id=pci-bridge-0,chassis_nr=1,shpc=on,addr=2 -device virtio-serial-pci,disable-modern=true,id=serial0 -device virtconsole,chardev=charconsole0,id=console0 -chardev socket,id=charconsole0,path=/run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/console.sock,server,nowait -device nvdimm,id=nv0,memdev=mem0 -object memory-backend-file,id=mem0,mem-path=/opt/kata/kata-containers.img,size=536870912 -device virtio-scsi-pci,id=scsi0,disable-modern=true -device virtserialport,chardev=charch0,id=channel0,name=agent.channel.0 -chardev socket,id=charch0,path=/run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/kata.sock,server,nowait -device virtio-9p-pci,disable-modern=true,fsdev=extra-9p-kataShared,mount_tag=kataShared -fsdev local,id=extra-9p-kataShared,path=/run/kata-containers/shared/sandboxes/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca,security_model=none -netdev tap,id=network-0,vhost=on,vhostfds=3:4:5:6:7:8:9:10,fds=11:12:13:14:15:16:17:18 -device driver=virtio-net-pci,netdev=network-0,mac=b6:2d:8f:c8:e1:e6,disable-modern=true,mq=on,vectors=18 -rtc base=utc,driftfix=slew -global kvm-pit.lost_tick_policy=discard -vga none -no-user-config -nodefaults -nographic -daemonize -kernel /opt/kata/vmlinuz.container -append tsc=reliable no_timer_check rcupdate.rcu_expedited=1 i8042.direct=1 i8042.dumbkbd=1 i8042.nopnp=1 i8042.noaux=1 noreplace-smp reboot=k console=hvc0 console=hvc1 iommu=off cryptomgr.notests net.ifnames=0 pci=lastbus=0 root=/dev/pmem0p1 rootflags=dax,data=ordered,errors=remount-ro rw rootfstype=ext4 quiet systemd.show_status=false panic=1 initcall_debug ip=::::::9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca::off:: init=/usr/lib/systemd/systemd systemd.unit=kata-containers.target systemd.mask=systemd-networkd.service systemd.mask=systemd-networkd.socket -smp 1,cores=1,threads=1,sockets=1,maxcpus=240
10579 ? Sl 0:00 | \_ /opt/kata/bin/kata-proxy -listen-socket unix:///run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/proxy.sock -mux-socket /run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/kata.sock
10670 ? Sl 0:00 | \_ /opt/kata/bin/kata-shim -agent unix:///run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/proxy.sock -container 9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca -exec-id 9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca
10792 ? Sl 0:00 \_ containerd-shim -namespace k8s.io -workdir /var/lib/containerd/io.containerd.runtime.v1.linux/k8s.io/d78f9a82893b5144913b0758814bff60ab8015c66846f6d88d48495355d5ceff -address /run/containerd/containerd.sock -containerd-binary /usr/local/bin/containerd
10812 ? Sl 0:00 \_ /opt/kata/bin/kata-shim -agent unix:///run/vc/sbs/9e5a234c748d2495ce04dde77a0be9f4fef38365738f05045d51d4b51809faca/proxy.sock -container d78f9a82893b5144913b0758814bff60ab8015c66846f6d88d48495355d5ceff -exec-id d78f9a82893b5144913b0758814bff60ab8015c66846f6d88d48495355d5ceff
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment