This document lists links and information about integrations of stargz-snapshotter with tools in commuinty.
You can refer to issue #258 "Tracker issue for adoption status" for the list of the latest status of these integrations.
To use stargz snapshotter on Kubernetes nodes, you need to use containerd as the CRI runtime. You also need to run stargz snapshotter on the node.
See /README.md#quick-start-with-kubernetes
.
k3s >= v1.22 supports stagz-snapshotter as an experimental feature.
--snapshotter=stargz
for k3s server and agent enables this feature.
k3s server --snapshotter=stargz
Refer to k3s docs for more details.
The following is a quick demo using k3d (k3s in Docker).
$ k3d cluster create mycluster --k3s-arg='--snapshotter=stargz@server:*;agent:*'
$ cat <<'EOF' | kubectl --context=k3d-mycluster apply -f -
apiVersion: v1
kind: Pod
metadata:
name: nodejs
spec:
containers:
- name: nodejs-stargz
image: ghcr.io/stargz-containers/node:17.8.0-esgz
command: ["node"]
args:
- -e
- var http = require('http');
http.createServer(function(req, res) {
res.writeHead(200);
res.end('Hello World!\n');
}).listen(80);
ports:
- containerPort: 80
EOF
$ kubectl --context=k3d-mycluster get po nodejs -w
$ kubectl --context=k3d-mycluster port-forward nodejs 8080:80 &
$ curl 127.0.0.1:8080
Hello World!
$ k3d cluster delete mycluster
There is no node image includes stargz snapshotter by default as of now so you need to manually customize the nodes.
A brief instrcution of enabling stargz snapshotter is the following:
- Create a Kubernetes cluster using containerd-supported Linux node images like
ubuntu_containerd
. containerd must be >= v1.4.2. - SSH into each node and install stargz snapshotter following
./INSTALL.md
. You need this installation on all worker nodes. - Optionally apply configuration to allow stargz-snapshotter to access private registries following
./overview.md
.
There is no AMI includes stargz snapshotter by default as of now so you need to manually customize the nodes.
A brief instrcution of enabling stargz snapshotter is the following:
- Create a Kubernetes cluster using containerd-supported Linux AMIs. containerd must be >= v1.4.2. e.g. Amazon EKS optimized Amazon Linux AMIs with containerd runtime bootstrap flag.
- SSH into each node and install stargz snapshotter following
./INSTALL.md
. You need this installation on all worker nodes. - Optionally apply configuration to allow stargz-snapshotter to access private registries following
./overview.md
.
See ./INSTALL.md
ℹ️ There is also a doc for integration with firecracker-containerd.
See ./INSTALL.md
.
Moby supports lazy pulling of eStargz since 5c1d6c957b97321c8577e10ddbffe6e01981617a
.
See ./INSTALL.md
for details.
Docker Desktop 4.12.0 "Containerd Image Store (Beta)" uses stargz-snapshotter. Refer to Docker documentation.
See the docs in nerdctl.
See ./INSTALL.md
.
BuildKit >= v0.10 supports creating eStargz images.
See README.md
for details.
BuildKit >= v0.8 supports stargz-snapshotter and can perform lazy pulling of eStargz-formatted base images during build.
--oci-worker-snapshotter=stargz
flag enables this feature.
You can try this feature using Docker Buildx as the following.
$ docker buildx create --use --name lazy-builder --buildkitd-flags '--oci-worker-snapshotter=stargz'
$ docker buildx inspect --bootstrap lazy-builder
The following is a sample Dockerfile that uses eStargz-formatted golang image (ghcr.io/stargz-containers/golang:1.18-esgz
) as the base image.
FROM ghcr.io/stargz-containers/golang:1.18-esgz AS dev
COPY ./hello.go /hello.go
RUN go build -o /hello /hello.go
FROM scratch
COPY --from=dev /hello /
ENTRYPOINT [ "/hello" ]
Put the following Go source code in the context directory with naming it hello.go
.
package main
import "fmt"
func main() {
fmt.Println("Hello, world!")
}
The following build performs lazy pulling of the eStargz-formatted golang base image.
$ docker buildx build --load -t hello /tmp/ctx/
$ docker run --rm hello
Hello, world!
Kaniko >= v1.5.0 creates eStargz images when GGCR_EXPERIMENT_ESTARGZ=1
is specified.
See README.md
for details.
ko >= v0.7.0 creates eStargz images when GGCR_EXPERIMENT_ESTARGZ=1
is specified.
Please see also the docs in ko.
See ./ipfs.md
Change the /etc/containerd-stargz-grpc/config.toml
configuration to make dragonfly as registry mirror.
127.0.0.1:65001
is the proxy address of dragonfly peer,
and the X-Dragonfly-Registry
header is the address of origin registry,
which is provided for dragonfly to download the images.
[[resolver.host."docker.io".mirrors]]
host = "127.0.0.1:65001"
insecure = true
[resolver.host."docker.io".mirrors.header]
X-Dragonfly-Registry = ["https://index.docker.io"]
For more details about dragonfly as registry mirror, refer to How to use Dragonfly With eStargz.
See the docs in Harbor: https://github.com/goharbor/acceleration-service