|
|
# The "crio" table contains all of the server options. [crio]
# CRI-O reads its storage defaults from the containers/storage configuration # file, /etc/containers/storage.conf. Modify storage.conf if you want to # change default storage for all tools that use containers/storage. If you # want to modify just crio, you can change the storage configuration in this # file.
# root is a path to the "root directory". CRIO stores all of its data, # including container images, in this directory. #root = "/var/lib/containers/storage"
# run is a path to the "run directory". CRIO stores all of its state # in this directory. #runroot = "/var/run/containers/storage"
# storage_driver select which storage driver is used to manage storage # of images and containers. storage_driver = "overlay2"
# storage_option is used to pass an option to the storage driver. #storage_option = [ #]
# The "crio.api" table contains settings for the kubelet/gRPC interface. [crio.api]
# listen is the path to the AF_LOCAL socket on which crio will listen. listen = "/var/run/crio/crio.sock"
# stream_address is the IP address on which the stream server will listen stream_address = ""
# stream_port is the port on which the stream server will listen stream_port = "10010"
# stream_enable_tls enables encrypted tls transport of the stream server stream_enable_tls = false
# stream_tls_cert is the x509 certificate file path used to serve the encrypted stream. # This file can change, and CRIO will automatically pick up the changes within 5 minutes. stream_tls_cert = ""
# stream_tls_key is the key file path used to serve the encrypted stream. # This file can change, and CRIO will automatically pick up the changes within 5 minutes. stream_tls_key = ""
# stream_tls_ca is the x509 CA(s) file used to verify and authenticate client # communication with the tls encrypted stream. # This file can change, and CRIO will automatically pick up the changes within 5 minutes. stream_tls_ca = ""
# file_locking is whether file-based locking will be used instead of # in-memory locking file_locking = true
# The "crio.runtime" table contains settings pertaining to the OCI # runtime used and options for how to set up and manage the OCI runtime. [crio.runtime]
# runtime is the OCI compatible runtime used for trusted container workloads. # This is a mandatory setting as this runtime will be the default one # and will also be used for untrusted container workloads if # runtime_untrusted_workload is not set. {% if ansible_os_family == "ClearLinux" or ansible_os_family == "RedHat" or ansible_distribution == "Ubuntu" %} runtime = "/usr/bin/runc" {% else %} runtime = "/usr/sbin/runc" {% endif %}
# runtime_untrusted_workload is the OCI compatible runtime used for untrusted # container workloads. This is an optional setting, except if # default_container_trust is set to "untrusted". runtime_untrusted_workload = ""
# default_workload_trust is the default level of trust crio puts in container # workloads. It can either be "trusted" or "untrusted", and the default # is "trusted". # Containers can be run through different container runtimes, depending on # the trust hints we receive from kubelet: # - If kubelet tags a container workload as untrusted, crio will try first to # run it through the untrusted container workload runtime. If it is not set, # crio will use the trusted runtime. # - If kubelet does not provide any information about the container workload trust # level, the selected runtime will depend on the default_container_trust setting. # If it is set to "untrusted", then all containers except for the host privileged # ones, will be run by the runtime_untrusted_workload runtime. Host privileged # containers are by definition trusted and will always use the trusted container # runtime. If default_container_trust is set to "trusted", crio will use the trusted # container runtime for all containers. default_workload_trust = "trusted"
# no_pivot instructs the runtime to not use pivot_root, but instead use MS_MOVE no_pivot = false
# conmon is the path to conmon binary, used for managing the runtime. conmon = "{{ crio_conmon }}"
# conmon_env is the environment variable list for conmon process, # used for passing necessary environment variable to conmon or runtime. conmon_env = [ "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", ]
# selinux indicates whether or not SELinux will be used for pod # separation on the host. If you enable this flag, SELinux must be running # on the host. selinux = {{ (preinstall_selinux_state == 'enforcing')|lower }}
# seccomp_profile is the seccomp json profile path which is used as the # default for the runtime. {% if ansible_os_family == "ClearLinux" %} seccomp_profile = "/usr/share/defaults/crio/seccomp.json" {% else %} seccomp_profile = "/etc/crio/seccomp.json" {% endif %}
# apparmor_profile is the apparmor profile name which is used as the # default for the runtime. apparmor_profile = "crio-default"
# cgroup_manager is the cgroup management implementation to be used # for the runtime. cgroup_manager = "cgroupfs"
# default_capabilities is the list of capabilities to add and can be modified here. # If capabilities below is commented out, the default list of capabilities defined in the # spec will be added. # If capabilities is empty below, only the capabilities defined in the container json # file by the user/kube will be added. default_capabilities = [ "CHOWN", "DAC_OVERRIDE", "FSETID", "FOWNER", "NET_RAW", "SETGID", "SETUID", "SETPCAP", "NET_BIND_SERVICE", "SYS_CHROOT", "KILL", ]
# hooks_dir_path is the oci hooks directory for automatically executed hooks hooks_dir_path = "/usr/share/containers/oci/hooks.d"
# default_mounts is the mounts list to be mounted for the container when created # deprecated, will be taken out in future versions, add default mounts to either # /usr/share/containers/mounts.conf or /etc/containers/mounts.conf default_mounts = [ ]
# CRI-O reads its default mounts from the following two files: # 1) /etc/containers/mounts.conf - this is the override file, where users can # either add in their own default mounts, or override the default mounts shipped # with the package. # 2) /usr/share/containers/mounts.conf - this is the default file read for mounts. # If you want CRI-O to read from a different, specific mounts file, you can change # the default_mounts_file path right below. Note, if this is done, CRI-O will only add # mounts it finds in this file.
# default_mounts_file is the file path holding the default mounts to be mounted for the # container when created. # default_mounts_file = ""
# pids_limit is the number of processes allowed in a container pids_limit = 1024
# log_size_max is the max limit for the container log size in bytes. # Negative values indicate that no limit is imposed. log_size_max = -1
# read-only indicates whether all containers will run in read-only mode read_only = false
# The "crio.image" table contains settings pertaining to the # management of OCI images.
# uid_mappings specifies the UID mappings to have in the user namespace. # A range is specified in the form containerUID:HostUID:Size. Multiple # ranges are separed by comma. uid_mappings = ""
# gid_mappings specifies the GID mappings to have in the user namespace. # A range is specified in the form containerGID:HostGID:Size. Multiple # ranges are separed by comma. gid_mappings = ""
[crio.image]
# default_transport is the prefix we try prepending to an image name if the # image name as we receive it can't be parsed as a valid source reference default_transport = "docker://"
# pause_image is the image which we use to instantiate infra containers. pause_image = "docker://k8s.gcr.io/pause:3.1"
# pause_command is the command to run in a pause_image to have a container just # sit there. If the image contains the necessary information, this value need # not be specified. pause_command = "/pause"
# signature_policy is the name of the file which decides what sort of policy we # use when deciding whether or not to trust an image that we've pulled. # Outside of testing situations, it is strongly advised that this be left # unspecified so that the default system-wide policy will be used. {% if ansible_os_family == "ClearLinux" %} signature_policy = "/usr/share/defaults/crio/policy.json" {% else %} signature_policy = "" {% endif %}
# image_volumes controls how image volumes are handled. # The valid values are mkdir and ignore. image_volumes = "mkdir"
# CRI-O reads its configured registries defaults from the containers/image configuration # file, /etc/containers/registries.conf. Modify registries.conf if you want to # change default registries for all tools that use containers/image. If you # want to modify just crio, you can change the registies configuration in this # file.
# insecure_registries is used to skip TLS verification when pulling images. insecure_registries = [ "{{ kube_service_addresses }}" ]
# registries is used to specify a comma separated list of registries to be used # when pulling an unqualified image (e.g. fedora:rawhide). registries = [ "docker.io" ]
# The "crio.network" table contains settings pertaining to the # management of CNI plugins. [crio.network]
# network_dir is where CNI network configuration # files are stored. network_dir = "/etc/cni/net.d/"
# plugin_dir is where CNI plugin binaries are stored. plugin_dir = "/opt/cni/bin/"
|