5
5
#
6
6
# Please refer to crio.conf(5) for details of all configuration options.
7
7
8
+ # CRI-O supports partial configuration reload during runtime, which can be
9
+ # done by sending SIGHUP to the running process. Currently supported options
10
+ # are explicitly mentioned with: 'This option supports live configuration
11
+ # reload'.
12
+
8
13
# CRI-O reads its storage defaults from the containers-storage.conf(5) file
9
14
# located at /etc/containers/storage.conf. Modify this storage configuration if
10
15
# you want to change the system's defaults. If you want to modify storage just
20
25
21
26
# Storage driver used to manage the storage of images and containers. Please
22
27
# refer to containers-storage.conf(5) to see all available storage drivers.
23
- #storage_driver = "overlay "
28
+ #storage_driver = ""
24
29
25
30
# List to pass options to the storage driver. Please refer to
26
31
# containers-storage.conf(5) to see all available storage options.
27
32
#storage_option = [
28
33
#]
29
34
30
35
# If set to false, in-memory locking will be used instead of file-based locking.
31
- file_locking = true
36
+ # **Deprecated** this option will be removed in the future.
37
+ file_locking = false
32
38
33
39
# Path to the lock file.
40
+ # **Deprecated** this option will be removed in the future.
34
41
file_locking_path = "/run/crio.lock"
35
42
36
43
@@ -90,6 +97,9 @@ no_pivot = false
90
97
# Path to the conmon binary, used for monitoring the OCI runtime.
91
98
conmon = "/usr/local/libexec/crio/conmon"
92
99
100
+ # Cgroup setting for conmon
101
+ conmon_cgroup = "pod"
102
+
93
103
# Environment variable list for the conmon process, used for passing necessary
94
104
# environment variables to conmon or the runtime.
95
105
conmon_env = [
@@ -100,8 +110,9 @@ conmon_env = [
100
110
selinux = false
101
111
102
112
# Path to the seccomp.json profile which is used as the default seccomp profile
103
- # for the runtime.
104
- seccomp_profile = "/etc/crio/seccomp.json"
113
+ # for the runtime. If not specified, then the internal default seccomp profile
114
+ # will be used.
115
+ seccomp_profile = ""
105
116
106
117
# Used to change the name of the default AppArmor profile of CRI-O. The default
107
118
# profile name is "crio-default-" followed by the version string of CRI-O.
@@ -185,9 +196,13 @@ container_attach_socket_dir = "/var/run/crio"
185
196
read_only = false
186
197
187
198
# Changes the verbosity of the logs based on the level it is set to. Options
188
- # are fatal, panic, error, warn, info, and debug.
199
+ # are fatal, panic, error, warn, info, and debug. This option supports live
200
+ # configuration reload.
189
201
log_level = "error"
190
202
203
+ # The default log directory where all logs will go unless directly specified by the kubelet
204
+ log_dir = "/var/log/crio/pods"
205
+
191
206
# The UID mappings for the user namespace of each container. A range is
192
207
# specified in the form containerUID:HostUID:Size. Multiple ranges must be
193
208
# separated by comma.
@@ -202,15 +217,19 @@ gid_mappings = ""
202
217
# regarding the proper termination of the container.
203
218
ctr_stop_timeout = 0
204
219
205
- # The "crio.runtime.runtimes" table defines a list of OCI compatible runtimes.
206
- # The runtime to use is picked based on the runtime_handler provided by the CRI.
207
- # If no runtime_handler is provided, the runtime will be picked based on the level
208
- # of trust of the workload.
209
-
210
- [crio.runtime.runtimes.runc]
211
- runtime_path = "/usr/bin/runc"
212
- runtime_type = "oci"
213
-
220
+ # ManageNetworkNSLifecycle determines whether we pin and remove network namespace
221
+ # and manage its lifecycle.
222
+ manage_network_ns_lifecycle = false
223
+
224
+ # The "crio.runtime.runtimes" table defines a list of OCI compatible runtimes.
225
+ # The runtime to use is picked based on the runtime_handler provided by the CRI.
226
+ # If no runtime_handler is provided, the runtime will be picked based on the level
227
+ # of trust of the workload.
228
+
229
+ [crio.runtime.runtimes.runc]
230
+ runtime_path = ""
231
+ runtime_type = "oci"
232
+ runtime_root = "/run/runc"
214
233
215
234
216
235
# The crio.image table contains settings pertaining to the management of OCI images.
@@ -225,14 +244,21 @@ ctr_stop_timeout = 0
225
244
# Default transport for pulling images from a remote container storage.
226
245
default_transport = "docker://"
227
246
247
+ # The path to a file containing credentials necessary for pulling images from
248
+ # secure registries. The file is similar to that of /var/lib/kubelet/config.json
249
+ global_auth_file = ""
250
+
228
251
# The image used to instantiate infra containers.
252
+ # This option supports live configuration reload.
229
253
pause_image = "k8s.gcr.io/pause:3.1"
230
254
231
- # If not empty, the path to a docker/config.json-like file containing credentials
232
- # necessary for pulling the image specified by pause_image above.
255
+ # The path to a file containing credentials specific for pulling the pause_image from
256
+ # above. The file is similar to that of /var/lib/kubelet/config.json
257
+ # This option supports live configuration reload.
233
258
pause_image_auth_file = ""
234
259
235
260
# The command to run to have a container stay in the paused state.
261
+ # This option supports live configuration reload.
236
262
pause_command = "/pause"
237
263
238
264
# Path to the file which decides what sort of policy we use when deciding
@@ -263,6 +289,6 @@ image_volumes = "mkdir"
263
289
network_dir = "/etc/cni/net.d/"
264
290
265
291
# Paths to directories where CNI plugin binaries are located.
266
- plugin_dir = [
292
+ plugin_dirs = [
267
293
"/opt/cni/bin/",
268
294
]
0 commit comments