-
Notifications
You must be signed in to change notification settings - Fork 0
Sync our repo with upstream #3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
b19401b
8a1c229
1038298
da22c74
0a9432f
c2a8572
61af11a
687be3c
eb3e125
47d8297
66ce3f5
923077f
2cc0c8c
1a41ee1
176c0d6
c3c7a3a
6223905
9dd15ee
f631da5
d4d08bf
1319131
6877edf
c9689f3
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -17,7 +17,7 @@ This DaemonSet manifest will: | |
| 1. Ensure a pod with our Docker image is running indefinitely on every node. | ||
| 2. Use `hostPID`, `hostIPC`, and `hostNetwork`. | ||
| 3. Mount the entire host filesystem to `/host` in the containers. | ||
| 4. Mount `/var/run/docker.sock` from the host. | ||
| 4. Mount the `containerd` socket at `/run/containerd/containerd.sock` from the host into the container. | ||
|
|
||
| In order to make use of these workloads, you can exec into a pod of choice by name: | ||
|
|
||
|
|
@@ -47,11 +47,11 @@ Once you're in, you have access to the set of tools listed in the `Dockerfile`. | |
| - [`netcat`](https://linux.die.net/man/1/nc) - is a multi-tool for interacting with TCP and UDP; it can open TCP connections, send UDP packets, listen on arbitrary TCP and UDP ports, do port scanning, and deal with both IPv4 and IPv6. | ||
| - [`iproute2`](https://wiki.linuxfoundation.org/networking/iproute2) - is a collection of utilities for controlling TCP / IP networking and traffic control in Linux. | ||
| - [`strace`](https://github.com/strace/strace) - is a diagnostic, debugging and instructional userspace utility with a traditional command-line interface for Linux. It is used to monitor and tamper with interactions between processes and the Linux kernel, which include system calls, signal deliveries, and changes of process state. | ||
| - [`docker`](https://docs.docker.com/engine/reference/commandline/cli/) - is the CLI tool used for interacting with Docker containers on the system. | ||
| - [`dstat`](http://dag.wiee.rs/home-made/dstat/) - is a versatile replacement for vmstat, iostat, netstat and ifstat. Dstat overcomes some of their limitations and adds some extra features, more counters and flexibility. Dstat is handy for monitoring systems during performance tuning tests, benchmarks or troubleshooting. | ||
| - [`htop`](https://hisham.hm/htop/) - is interactive process viewer for Unix systems. | ||
| - [`atop`](https://www.atoptool.nl/) - is an advanced interactive monitor for Linux-systems to view the load on system-level and process-level. | ||
|
|
||
| - [`wget`](https://www.gnu.org/software/wget/) - for retrieving files using HTTP, HTTPS, FTP and FTPS. | ||
| - [`crictl`](https://github.com/kubernetes-sigs/cri-tools/blob/master/docs/crictl.md) - A CLI for CRI endpoints. Configured to use `/run/containerd/containerd.sock` as a default endpoint. | ||
|
||
| # Tips and Tricks | ||
|
|
||
| ## chroot + systemctl | ||
|
|
||
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
|
|
@@ -16,7 +16,9 @@ spec: | |||||
| name: doks-debug | ||||||
| annotations: | ||||||
| clusterlint.digitalocean.com/disabled-checks: "hostpath-volume" | ||||||
| cluster-autoscaler.kubernetes.io/safe-to-evict: "true" | ||||||
| spec: | ||||||
| dnsPolicy: ClusterFirstWithHostNet | ||||||
| hostPID: true | ||||||
| hostIPC: true | ||||||
| hostNetwork: true | ||||||
|
|
@@ -26,7 +28,7 @@ spec: | |||||
| - name: doks-debug | ||||||
| securityContext: | ||||||
| privileged: true | ||||||
| image: digitalocean/doks-debug:latest | ||||||
| image: ghcr.io/digitalocean-packages/doks-debug:latest | ||||||
|
||||||
| image: ghcr.io/digitalocean-packages/doks-debug:latest | |
| image: ghcr.io/digitalocean-packages/doks-debug:1.0.0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Installing
crictlvia a direct download without integrity verification introduces supply-chain risk. Consider verifying the tarball with a pinned SHA256 (or signature, if available) before extracting, and fail the build if validation doesn’t match.