Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Spike: OCI workloads #262

Open
jordan-rash opened this issue Jun 7, 2024 · 3 comments
Open

Spike: OCI workloads #262

jordan-rash opened this issue Jun 7, 2024 · 3 comments
Assignees
Labels
enhancement Enhancement to existing functionality proposal Enhancement idea or proposal spike

Comments

@jordan-rash
Copy link
Contributor

jordan-rash commented Jun 7, 2024

Details TBD

@kthomas kthomas self-assigned this Jun 13, 2024
@autodidaddict
Copy link
Contributor

The main goal of this issue is to figure out if it's possible to support OCI-type workloads without having to add a docker daemon to the rootfs. When we experimented with that before, the addition of docker to the rootfs bloated well over 130MB.

With that in mind, the next thing to figure out is how to cache OCI artifacts (see OCI Distribution. The cache will need to be available to agents/workloads running on the nex node that likely do not have direct access to the OCI registry from which the nex node pulls.

Finally, how do we manage security of these OCI workloads while keeping the workloads useful and enforcing multi-tenant isolation.

@jordan-rash jordan-rash added enhancement Enhancement to existing functionality spike proposal Enhancement idea or proposal labels Jun 14, 2024
@kthomas
Copy link
Contributor

kthomas commented Jun 18, 2024

After some research, the following approach makes the most sense for supporting OCI:

  • On macOS and Windows OCI support is provided via the Docker daemon, which must be configured with a TCP socket — attempting to start the node without a TLS configuration for the Docker client connection will result in an error.

  • On Linux, OCI images will be pulled by the agent and unpacked into a rootfs for use with runc.

@mskarbek
Copy link

mskarbek commented Aug 16, 2024

  • On Linux, OCI images will be pulled by the agent and unpacked into a rootfs for use with runc.

crun is a lighter and faster alternative to runc and could be evaluated as well.

@autodidaddict autodidaddict changed the title Spike: OCI Spike: OCI workloads Oct 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement Enhancement to existing functionality proposal Enhancement idea or proposal spike
Projects
None yet
Development

No branches or pull requests

4 participants