Kubernetes Init Containers: Difference between revisions
Line 66: | Line 66: | ||
{{External|https://github.com/NovaOrdis/playground/tree/master/openshift/applications/service-dependency}} | {{External|https://github.com/NovaOrdis/playground/tree/master/openshift/applications/service-dependency}} | ||
=Troubleshooting= | |||
The stdout/stderr of an init container can be displayed with: | |||
kubectl logs [-f] -c <''init-container-name''> <''pod-name''> |
Revision as of 22:50, 19 September 2019
External
Internal
Overview
An init container is a specialized container that runs before the application containers, and can contain utilities or setup scripts not present in the application image. If a pod declares init containers, the application containers are only run after all init container complete successfully.
An init container always runs to completion, and if more than one init containers are declared, each one is executed sequentially and must complete successfully before the next one is started. This is the reason init containers do not support readiness probes: they must succeed. If an init container fails, Kubernetes will restart the Pod repeatedly until the init container succeeds, unless the pod has a "restartPolicy" of "Never".
While an init container is executed, it shows as "Init:*/*", alongside the deployment container.
kubectl get pods NAME READY STATUS RESTARTS AGE a-1-7k94g 0/1 Init:0/1 0 3m a-1-deploy 1/1 Running 0 3m
Init containers support all the fields and the features of the application containers including resource limits, volumes and security settings. However, the resource requests and limits for an init container are handled slightly differently, as described in Resources below.
Init containers can be used to run utilities that do not belong in application application container images for security reasons. They can also contain utilities for setup or dependency wait loops: they run to completion before any application containers start, whereas application containers run in parallel, so init containers provide an easy way to block or delay the startup of application containers until some set of preconditions are met. The application image builder and deployer roles can work independently without the need to jointly build a single application image. Because they use Linux namespaces so that they have different filesystem views from application containers, they can be given access to Secrets that application containers should not be able to access.
Lifecycle and Behavior
Timeout
An init container must finish initializing within TODO: how much? otherwise it puts the deployment into an error state:
NAME READY STATUS RESTARTS AGE a-1-deploy 0/1 Error 0 13m
Resources
Examples
Service Dependency with nslookup
An init container can be used to ensure that a service the pod depends on is up and endpoints have been associated with it. A service can be looked up in DNS after it reaches that state, so we can use nslookup from the init container. A typical init container checking on the availability of a service with nslookup is configured as follows:
apiVersion: apps/v1
kind: Deployment
spec:
...
template:
spec:
initContainers:
- name: wait-on-cassandra
image: busybox:1.28
command: ['sh', '-c', 'until nslookup cassandra; do echo waiting for cassandra to start ...; sleep 2; done']
...
"cassandra" is the name of the service that gives access to Cassandra pods.
We found that some busybox images introduced nslookup problems - nslookup did not work as expected. 1.28 is one of those images that works well.
Application Dependency with curl
Troubleshooting
The stdout/stderr of an init container can be displayed with:
kubectl logs [-f] -c <init-container-name> <pod-name>