Kubernetes/Containers Tips and Tricks
=====================================
Quickly spin up a Pod with a running shell to test stuff
--------------------------------------------------------
```
kubectl run my-shell --rm -i --tty --image ubuntu -- bash
```
Create docker pull secret
-------------------------
```
kubectl create secret docker-registry regcred --docker-server=https://ghcr.io --docker-username=udder-machine --docker-password=password --docker-email=email
# inspect
kubectl get secret regcred --output=yaml
```
Strimzi Operator
----------------
Always use at least 3 replicas of Kafka and ZooKeeper otherwise it will probably not work.
###### tags: `k8s` `ops`
Find container with high memory consumption on node
---------------------------------------------------
```
ps aux --sort -rss
```
example output
```
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
root 4601 12.0 22.4 3630904 885752 ? Ssl Sep07 2771:07 /usr/bin/java -jar spigot.jar --nogui
root 16242 11.9 21.0 3621644 828592 ? Ssl Sep03 3421:56 /usr/bin/java -jar spigot.jar --nogui
root 16144 11.8 18.0 3610596 711864 ? Ssl 19:51 5:42 /usr/bin/java -jar spigot.jar --nogui
1001 16197 0.5 4.6 3038844 184776 ? Sl 19:51 0:16 java -Xms389236653 -Xmx389236653 -server -XX:+UseG1GC -XX:MaxGCPauseMillis=20 -XX:InitiatingHeapOccupancyPercent=35 -XX:+ExplicitGCInvokesConcurrent
root 19214 0.7 4.4 3524268 175500 ? Ssl Sep03 224:10 /usr/bin/java -jar proxy.jar
root 3582 0.8 2.5 1355604 99712 ? Ssl May27 1488:09 /usr/bin/containerd
root 15952 0.6 2.1 770888 85072 ? Ssl 19:51 0:18 cilium-agent --config-dir=/tmp/cilium/config-map
root 6809 2.9 1.6 2073172 66480 ? Ssl May27 5110:48 /usr/bin/kubelet --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf --kubeconfig=/etc/kubernetes/kubelet.conf --config=/var/lib/kubelet/c
root 315 0.0 1.0 78052 42952 ? Ss May27 130:37 /lib/systemd/systemd-journald
9987 21335 0.6 0.4 40168 19176 ? Ssl Jun21 885:44 ts3server inifile=/var/run/ts3server/ts3server.ini
root 16081 0.0 0.4 715076 16552 ? Ssl 19:51 0:01 /bin/hcloud-csi-driver
root 8054 0.1 0.2 113376 9404 ? Sl May27 299:19 /usr/bin/containerd-shim-runc-v2 -namespace k8s.io -id ccd25c1d250f214cfae9433cd8b709c5243e82c3670aaeff4c79cdd45fc440db -address /run/containerd/cont
root 17600 0.0 0.2 720384 7944 ? Ssl Sep03 3:08 ./app
```
**note**: the pid from the process running inside the container.
retrieve container id
```
cat /proc/$PID/cgroup
```
example output
```
11:devices:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
10:memory:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
9:perf_event:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
8:rdma:/
7:pids:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
6:blkio:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
5:cpu,cpuacct:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
4:net_cls,net_prio:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
3:freezer:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
2:cpuset:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
1:name=systemd:/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
0::/system.slice/containerd.service
```
the container id is the hex string after the last `/`. In this case it's `159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f`
then ask `containerd` for container info
```
ctr --namespace k8s.io c info $CONTAINER_ID
```
example output
```
ctr --namespace k8s.io c info 159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f
{
"ID": "159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f",
"Labels": {
"io.cri-containerd.kind": "container",
"io.kubernetes.container.name": "service",
"io.kubernetes.pod.name": "lobby-646484d448-ww2h2",
"io.kubernetes.pod.namespace": "minecraft",
"io.kubernetes.pod.uid": "5eef3865-1dbc-4fdb-8cf1-464bcb8b3059"
},
"Image": "ghcr.io/cownetwork/lobby:v0.25.3",
"Runtime": {
"Name": "io.containerd.runc.v2",
"Options": {
"type_url": "containerd.runc.v1.Options"
}
},
"SnapshotKey": "159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f",
"Snapshotter": "overlayfs",
"CreatedAt": "2021-09-23T17:51:33.788469651Z",
"UpdatedAt": "2021-09-23T17:51:33.788469651Z",
"Extensions": {
"io.cri-containerd.container.metadata": {
"type_url": "github.com/containerd/cri/pkg/store/container/Metadata",
"value": "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"
}
},
"Spec": {
"ociVersion": "1.0.2-dev",
"process": {
"user": {
"uid": 0,
"gid": 0
},
"args": [
"/usr/bin/java",
"-jar",
"spigot.jar",
"--nogui"
],
"env": [
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
"HOSTNAME=lobby-646484d448-ww2h2",
"JAVA_VERSION=11.0.11",
"LANG=C.UTF-8",
"SSL_CERT_FILE=/etc/ssl/certs/ca-certificates.crt",
"JAVA_TOOL_OPTIONS=-Dcom.mojang.eula.agree=true",
"LOBBY_PORT_25565_TCP_PROTO=tcp",
"LOBBY_PORT_25565_TCP_PORT=25565",
"KUBERNETES_SERVICE_HOST=10.96.0.1",
"VELOCITY_SERVICE_PORT=25577",
"VELOCITY_PORT_25577_TCP_PROTO=tcp",
"LOBBY_PORT_25565_TCP_ADDR=10.96.7.113",
"PIXLERS_PORT_25565_TCP_ADDR=10.107.34.191",
"KUBERNETES_PORT_443_TCP_PROTO=tcp",
"VELOCITY_SERVICE_HOST=10.104.193.238",
"VELOCITY_PORT_25577_TCP=tcp://10.104.193.238:25577",
"PIXLERS_SERVICE_PORT=25565",
"PIXLERS_PORT_25565_TCP_PORT=25565",
"KUBERNETES_PORT_443_TCP_PORT=443",
"LOBBY_SERVICE_HOST=10.96.7.113",
"LOBBY_PORT=tcp://10.96.7.113:25565",
"PIXLERS_PORT_25565_TCP=tcp://10.107.34.191:25565",
"KUBERNETES_PORT=tcp://10.96.0.1:443",
"VELOCITY_PORT=tcp://10.104.193.238:25577",
"PIXLERS_SERVICE_HOST=10.107.34.191",
"PIXLERS_PORT_25565_TCP_PROTO=tcp",
"KUBERNETES_SERVICE_PORT=443",
"LOBBY_SERVICE_PORT=25565",
"PIXLERS_PORT=tcp://10.107.34.191:25565",
"KUBERNETES_PORT_443_TCP=tcp://10.96.0.1:443",
"VELOCITY_PORT_25577_TCP_ADDR=10.104.193.238",
"LOBBY_PORT_25565_TCP=tcp://10.96.7.113:25565",
"KUBERNETES_SERVICE_PORT_HTTPS=443",
"KUBERNETES_PORT_443_TCP_ADDR=10.96.0.1",
"VELOCITY_PORT_25577_TCP_PORT=25577"
],
"cwd": "/opt/spigot",
"capabilities": {
"bounding": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
],
"effective": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
],
"inheritable": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
],
"permitted": [
"CAP_CHOWN",
"CAP_DAC_OVERRIDE",
"CAP_FSETID",
"CAP_FOWNER",
"CAP_MKNOD",
"CAP_NET_RAW",
"CAP_SETGID",
"CAP_SETUID",
"CAP_SETFCAP",
"CAP_SETPCAP",
"CAP_NET_BIND_SERVICE",
"CAP_SYS_CHROOT",
"CAP_KILL",
"CAP_AUDIT_WRITE"
]
},
"oomScoreAdj": 1000
},
"root": {
"path": "rootfs"
},
"mounts": [
{
"destination": "/proc",
"type": "proc",
"source": "proc",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/dev",
"type": "tmpfs",
"source": "tmpfs",
"options": [
"nosuid",
"strictatime",
"mode=755",
"size=65536k"
]
},
{
"destination": "/dev/pts",
"type": "devpts",
"source": "devpts",
"options": [
"nosuid",
"noexec",
"newinstance",
"ptmxmode=0666",
"mode=0620",
"gid=5"
]
},
{
"destination": "/dev/mqueue",
"type": "mqueue",
"source": "mqueue",
"options": [
"nosuid",
"noexec",
"nodev"
]
},
{
"destination": "/sys",
"type": "sysfs",
"source": "sysfs",
"options": [
"nosuid",
"noexec",
"nodev",
"ro"
]
},
{
"destination": "/sys/fs/cgroup",
"type": "cgroup",
"source": "cgroup",
"options": [
"nosuid",
"noexec",
"nodev",
"relatime",
"ro"
]
},
{
"destination": "/etc/hosts",
"type": "bind",
"source": "/var/lib/kubelet/pods/5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/etc-hosts",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/dev/termination-log",
"type": "bind",
"source": "/var/lib/kubelet/pods/5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/containers/service/1af309ce",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/etc/hostname",
"type": "bind",
"source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/72a46ed6e6206ecfb6c614209ba587c6176cc098b98b58f040342e8e3549a7eb/hostname",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/etc/resolv.conf",
"type": "bind",
"source": "/var/lib/containerd/io.containerd.grpc.v1.cri/sandboxes/72a46ed6e6206ecfb6c614209ba587c6176cc098b98b58f040342e8e3549a7eb/resolv.conf",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/dev/shm",
"type": "bind",
"source": "/run/containerd/io.containerd.grpc.v1.cri/sandboxes/72a46ed6e6206ecfb6c614209ba587c6176cc098b98b58f040342e8e3549a7eb/shm",
"options": [
"rbind",
"rprivate",
"rw"
]
},
{
"destination": "/var/run/secrets/kubernetes.io/serviceaccount",
"type": "bind",
"source": "/var/lib/kubelet/pods/5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/volumes/kubernetes.io~secret/default-token-sz6kk",
"options": [
"rbind",
"rprivate",
"ro"
]
}
],
"annotations": {
"io.kubernetes.cri.container-name": "service",
"io.kubernetes.cri.container-type": "container",
"io.kubernetes.cri.sandbox-id": "72a46ed6e6206ecfb6c614209ba587c6176cc098b98b58f040342e8e3549a7eb"
},
"linux": {
"resources": {
"devices": [
{
"allow": false,
"access": "rwm"
}
],
"memory": {},
"cpu": {
"shares": 2,
"period": 100000
}
},
"cgroupsPath": "/kubepods/besteffort/pod5eef3865-1dbc-4fdb-8cf1-464bcb8b3059/159f39ecfcddcc4815cde768a68b6e5db6209b19ab97f3eb9ff33fe25e2de68f",
"namespaces": [
{
"type": "pid"
},
{
"type": "ipc",
"path": "/proc/17954/ns/ipc"
},
{
"type": "uts",
"path": "/proc/17954/ns/uts"
},
{
"type": "mount"
},
{
"type": "network",
"path": "/proc/17954/ns/net"
}
],
"maskedPaths": [
"/proc/acpi",
"/proc/kcore",
"/proc/keys",
"/proc/latency_stats",
"/proc/timer_list",
"/proc/timer_stats",
"/proc/sched_debug",
"/proc/scsi",
"/sys/firmware"
],
"readonlyPaths": [
"/proc/asound",
"/proc/bus",
"/proc/fs",
"/proc/irq",
"/proc/sys",
"/proc/sysrq-trigger"
]
}
}
}
```