-
Notifications
You must be signed in to change notification settings - Fork 1.1k
support checkpointing to oci image #6181
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
support checkpointing to oci image #6181
Conversation
|
Hi @adrianreber. Thanks for your PR. I'm waiting for a cri-o member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. DetailsInstructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
9b8abcf to
bc29615
Compare
|
/ok-to-test |
bdc3899 to
67f373c
Compare
Codecov Report
Additional details and impacted files@@ Coverage Diff @@
## main #6181 +/- ##
==========================================
+ Coverage 43.68% 43.87% +0.18%
==========================================
Files 122 122
Lines 13666 13730 +64
==========================================
+ Hits 5970 6024 +54
- Misses 7049 7051 +2
- Partials 647 655 +8 |
d0f1923 to
e2de1b1
Compare
|
Ready for review. The three CI failures seem to happen everywhere right now and unrelated to this PR. |
e2de1b1 to
f32ba74
Compare
|
Besides the three failing CI runs which seems to be expected right now, this is ready for review. PTAL. |
39c0ff6 to
c7355a0
Compare
Hmm. Okay. There is no immediate plan from my side to add this to a KEP as the image specification would be independent of Kubernetes from my point of view. If a standardization happens it would happen at https://github.com/opencontainers/image-spec , but that is a step we did not plan in the next couple of months. Currently is is an image format used by Podman and specific to Podman and the goal was to bring this to CRI-O. Not having it in CRI-O is not something we really planed for. Not really sure what to do now. Happy for any additional input. |
|
@haircommander What about just loading checkpoint images as created by Podman and not creating them by CRI-O? Just the changes in the restore code path? |
|
I see both of your points @haircommander @adrianreber. The question is if we value the separation of concerns over usability. Since we just wrap a bunch of buildah APIs in an isolated fashion I'm leaning towards having the feature completely in CRI-O. If there is no upstream KEP planned for the next couple of months to standardize it via the CRI, then this would be probably a good follow-up in the long term. |
I think this is a good compromise and works for me. How does that sound @saschagrunert ? |
Sounds good to me! |
|
Okay, let me rework this PR and ping you again. Thanks. |
c2e4d7b to
e7f6487
Compare
|
Okay, let's see if CI like the changes. |
e7f6487 to
b0b07ee
Compare
Co-authored-by: Sascha Grunert <[email protected]> Signed-off-by: Adrian Reber <[email protected]>
b0b07ee to
0244fee
Compare
|
/retest-required |
|
/test ci-rhel-e2e |
|
Most tests are happy. So it seems to work. I hope this is what we agreed on. I removed the OCI checkpoint image creation from CRI-O but I am able to test the restore path by creating an OCI checkpoint image with CLI |
|
Is this good to go? |
|
/approve LGTM, thanks @adrianreber |
saschagrunert
left a comment
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/retest
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: adrianreber, haircommander, saschagrunert The full list of commands accepted by this bot can be found here. The pull request process is described here DetailsNeeds approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
/retest-required |
2 similar comments
|
/retest-required |
|
/retest-required |
|
/override ci/kata-jenkins |
|
@saschagrunert: Overrode contexts on behalf of saschagrunert: ci/kata-jenkins DetailsIn response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/kind feature
What this PR does / why we need it:
This adds the Podman support to export checkpoints to OCI images which can be pushed to registry to CRI-O.
With this change it is possible to do something like this:
The image
quay.io/adrianreber/checkpoint-image:tag1can then be used on the same or another system to restore the container usingcrictl createandcrictl start.The image
quay.io/adrianreber/checkpoint-image:tag1can also be used in Kubernetes to start a container from a checkpoint image without Kubernetes knowing that it is restore.This PR is not targeting the 1.25.0 CRI-O release.
A side effect from this PR is that
crictl inspectiwill containspec.annotations.Which issue(s) this PR fixes:
None
Does this PR introduce a user-facing change?