-
Notifications
You must be signed in to change notification settings - Fork 296
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch to cri container log format #213
Comments
As far as I can tell, it was deleted and not deprecated. Not sure what it being removed from Parser still exists in pkg/kubelet/kuberuntime/logs/logs.go for 1.28, so it is not completely removed from CRI just yet. |
|
Unfortunately upstream removed all tests for docker in 1.26, blaming dockershim |
My thoughts on this are that
|
Currently they are testing with "both" container runtimes, but only look at containerd... I don't think there is a standard interface, most of CRI is just ad-hoc and implementation? But I don't know, still trying to remove dockershim.sock - which will still be there in 1.28* * It hasn't worked since 1.24, but it will still look for it! At least it will continue looking now. |
It seems to be failing in the Summarizing 24 Failures: [FAIL] [k8s.io] Container Mount Propagation runtime should support mount propagation [It] mount with 'rprivate' should not support propagation /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:413 [FAIL] [k8s.io] Container Mount Propagation runtime should support mount propagation [It] mount with 'rshared' should support propagation from host to container and vice versa /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:269 [FAIL] [k8s.io] Container Mount Propagation runtime should support mount propagation [It] mount with 'rslave' should support propagation from host to container /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container_linux.go:269 [FAIL] [k8s.io] Security Context NamespaceOption [It] runtime should support PodPID /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:476 [FAIL] [k8s.io] Security Context NamespaceOption [It] runtime should support HostNetwork is true /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:584 [FAIL] [k8s.io] Security Context NamespaceOption [It] runtime should support HostNetwork is false /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:584 [FAIL] [k8s.io] Security Context bucket [It] if the container's primary UID belongs to some groups in the image, runtime should add SupplementalGroups to them /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Security Context bucket [It] runtime should support RunAsGroup /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Security Context bucket [It] runtime should support that ReadOnlyRootfs is false /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Security Context bucket [It] runtime should support that ReadOnlyRootfs is true /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Security Context SeccompProfilePath [It] should support seccomp localhost profile on the container /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:1196 [FAIL] [k8s.io] Security Context SeccompProfilePath [It] should support seccomp default on the container /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:1200 [FAIL] [k8s.io] Security Context SeccompProfilePath [It] runtime should support an seccomp profile that blocks setting hostname with SYS_ADMIN /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/security_context_linux.go:1278 [FAIL] [k8s.io] Security Context NoNewPrivs [BeforeEach] should not allow privilege escalation when true /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Security Context NoNewPrivs [BeforeEach] should allow privilege escalation when false /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Container runtime should support basic operations on container [It] runtime should support execSync with timeout [Conformance] /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:176 [FAIL] [k8s.io] Container runtime should support log [BeforeEach] runtime should support starting container with log [Conformance] /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Container runtime should support log [BeforeEach] runtime should support reopening container log [Conformance] /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support exec with tty=false and stdin=false [Conformance] /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:413 [FAIL] [k8s.io] Streaming runtime should support streaming interfaces [It] runtime should support portforward in host network /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/validate/container.go:413 [FAIL] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [BeforeEach] should support network /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [BeforeEach] should support container log /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Multiple Containers [Conformance] when running multiple containers in a pod [BeforeEach] should support container exec /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217 [FAIL] [k8s.io] Networking runtime should support networking [It] runtime should support set hostname [Conformance] /home/sascha/go/src/github.com/kubernetes-sigs/cri-tools/pkg/framework/util.go:217
"Container runtime should support log" (which does not include JSON, since kubernetes-sigs/cri-tools@cf42ba9) |
cri-dockerd
currently writes container logs using the docker json formatThis format is being deprecated in other projects
kubernetes-sigs/cri-tools#1216
As
cri-dockerd
is intended to be a cri interface, it should default to container logs being in the cri format.The text was updated successfully, but these errors were encountered: