crio.conf.j2 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. # {{ ansible_managed }}
  2. # The "crio" table contains all of the server options.
  3. [crio]
  4. # root is a path to the "root directory". CRIO stores all of its data,
  5. # including container images, in this directory.
  6. root = "/var/lib/containers/storage"
  7. # run is a path to the "run directory". CRIO stores all of its state
  8. # in this directory.
  9. runroot = "/var/run/containers/storage"
  10. # storage_driver select which storage driver is used to manage storage
  11. # of images and containers.
  12. storage_driver = "overlay2"
  13. # storage_option is used to pass an option to the storage driver.
  14. storage_option = [
  15. {% if ansible_distribution in ['RedHat', 'CentOS'] %}
  16. "overlay2.override_kernel_check=1"
  17. {% endif %}
  18. ]
  19. # The "crio.api" table contains settings for the kubelet/gRPC
  20. # interface (which is also used by crioctl).
  21. [crio.api]
  22. # listen is the path to the AF_LOCAL socket on which crio will listen.
  23. listen = "/var/run/crio.sock"
  24. # stream_address is the IP address on which the stream server will listen
  25. stream_address = ""
  26. # stream_port is the port on which the stream server will listen
  27. stream_port = "10010"
  28. # The "crio.runtime" table contains settings pertaining to the OCI
  29. # runtime used and options for how to set up and manage the OCI runtime.
  30. [crio.runtime]
  31. # runtime is the OCI compatible runtime used for trusted container workloads.
  32. # This is a mandatory setting as this runtime will be the default one
  33. # and will also be used for untrusted container workloads if
  34. # runtime_untrusted_workload is not set.
  35. runtime = "/usr/bin/runc"
  36. # runtime_untrusted_workload is the OCI compatible runtime used for untrusted
  37. # container workloads. This is an optional setting, except if
  38. # default_container_trust is set to "untrusted".
  39. runtime_untrusted_workload = ""
  40. # default_workload_trust is the default level of trust crio puts in container
  41. # workloads. It can either be "trusted" or "untrusted", and the default
  42. # is "trusted".
  43. # Containers can be run through different container runtimes, depending on
  44. # the trust hints we receive from kubelet:
  45. # - If kubelet tags a container workload as untrusted, crio will try first to
  46. # run it through the untrusted container workload runtime. If it is not set,
  47. # crio will use the trusted runtime.
  48. # - If kubelet does not provide any information about the container workload trust
  49. # level, the selected runtime will depend on the default_container_trust setting.
  50. # If it is set to "untrusted", then all containers except for the host privileged
  51. # ones, will be run by the runtime_untrusted_workload runtime. Host privileged
  52. # containers are by definition trusted and will always use the trusted container
  53. # runtime. If default_container_trust is set to "trusted", crio will use the trusted
  54. # container runtime for all containers.
  55. default_workload_trust = "trusted"
  56. # conmon is the path to conmon binary, used for managing the runtime.
  57. conmon = "/usr/libexec/crio/conmon"
  58. # conmon_env is the environment variable list for conmon process,
  59. # used for passing necessary environment variable to conmon or runtime.
  60. conmon_env = [
  61. "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
  62. ]
  63. # selinux indicates whether or not SELinux will be used for pod
  64. # separation on the host. If you enable this flag, SELinux must be running
  65. # on the host.
  66. selinux = true
  67. # seccomp_profile is the seccomp json profile path which is used as the
  68. # default for the runtime.
  69. seccomp_profile = "/etc/crio/seccomp.json"
  70. # apparmor_profile is the apparmor profile name which is used as the
  71. # default for the runtime.
  72. apparmor_profile = "crio-default"
  73. # cgroup_manager is the cgroup management implementation to be used
  74. # for the runtime.
  75. cgroup_manager = "systemd"
  76. # The "crio.image" table contains settings pertaining to the
  77. # management of OCI images.
  78. [crio.image]
  79. # default_transport is the prefix we try prepending to an image name if the
  80. # image name as we receive it can't be parsed as a valid source reference
  81. default_transport = "docker://"
  82. # pause_image is the image which we use to instantiate infra containers.
  83. pause_image = "kubernetes/pause"
  84. # pause_command is the command to run in a pause_image to have a container just
  85. # sit there. If the image contains the necessary information, this value need
  86. # not be specified.
  87. pause_command = "/pause"
  88. # signature_policy is the name of the file which decides what sort of policy we
  89. # use when deciding whether or not to trust an image that we've pulled.
  90. # Outside of testing situations, it is strongly advised that this be left
  91. # unspecified so that the default system-wide policy will be used.
  92. signature_policy = ""
  93. # insecure_registries is used to skip TLS verification when pulling images.
  94. insecure_registries = [
  95. {{ l_insecure_crio_registries|default("") }}
  96. ]
  97. # The "crio.network" table contains settings pertaining to the
  98. # management of CNI plugins.
  99. [crio.network]
  100. # network_dir is is where CNI network configuration
  101. # files are stored.
  102. network_dir = "/etc/cni/net.d/"
  103. # plugin_dir is is where CNI plugin binaries are stored.
  104. plugin_dir = "/opt/cni/bin/"