Follow on to Ie17ef9ce1147cbaec2e42db932c7d59293b49b1b Adds seed_deploy_containers_registry_attempt_login variable to seed.yml, which acts as a redirection of deploy_containers_registry_attempt_login so that the variable is more descriptive, declared in a better location, and extensible to other groups Change-Id: I86d8f13062ff8e664919cd5d63bc17bdafb32e0c
2.1 KiB
Seed custom containers
This section covers configuration of the user-defined containers deployment functionality that runs on the seed host.
Configuration
For example, to deploy a squid container image:
seed_containers:
squid:
image: "stackhpc/squid:3.5.20-1"
pre: "{{ kayobe_env_config_path }}/containers/squid/pre.yml"
post: "{{ kayobe_env_config_path }}/containers/squid/post.yml"
Please notice the optional pre and post Ansible task files -
those need to be created in kayobe-config
path and will be
run before and after particular container deployment.
Possible options for container deployment:
seed_containers:
containerA:
capabilities:
command:
comparisons:
detach:
env:
network_mode:
image:
init:
ipc_mode:
pid_mode:
ports:
privileged:
restart_policy:
shm_size:
sysctls:
tag:
ulimits:
user:
volumes:
For a detailed explanation of each option - please see Ansible docker_container module page.
List of Kayobe applied defaults to required docker_container variables:
../../../../ansible/roles/deploy-containers/defaults/main.yml
Docker registry
Seed containers can be pulled from a docker registry deployed on the seed, since the docker registry deployment step precedes the custom container deployment step.
It is also possible to deploy a custom containerised docker registry as a custom seed container. In this case, basic authentication login attempts can be disabled by setting
seed_deploy_containers_registry_attempt_login: false
Without this setting, the login will fail because the registry has not yet been deployed.
More information on deploying a docker registry can be found here
<configuration-docker-registry>
.