* Changes stern to point to stern/stern * ♻️ Update Stern to use stern/stern; get it from the GHCR image; update curl commands * Update README to mention Bret's fork which supports ARM * ♻️ Bump up versions and fix krew missing from PATH Fixes #12 * Add alias k=kubectl + completion Closes #11 * Update shpod.yaml Remove `imagePullPolicy`; it will default to `Always` since we're using the `:latest` tag. * ✏️ Change default editor (for kubectl edit) to vim * ⏫ Update krew install URL * ⚙️ Add GHA workflow to build+push to GHCR and Docker Hub * 🏭️ Refactor Dockerfile to log as non-root Multiple improvements here: - start a shell with the k8s user instead of root - when running without a tty, start an SSH server instead of a login shell - move shell setup to bash_profile instead of Dockerfile - add a helper script to set up tailhist - add motd support * ➕ Add 'tree' and 'kustomize' * ⏫ Upgrade to Compose v2 and add completion for a bunch of tools * 🔧 Minor fixes and tweaks * ➕ Add regclient tools (regbot, regctl, regsync) * 📃 Generate kubeconfig + update docs * ➕ Add kube-linter * ♻️ Refactor Dockerfile to leverage BuildKit parallelism * 🧹 Build httping instead of using a sketchy binary * 🧹 Move jid version to an env var * 🏭️ Rewrite Dockerfile to support multi-arch and cross-compilation * ➕ Add Docker CLI * ♻️ Move version numbers to their individual build stage for better caching * 🐞 Fix multi-arch support for krew * 📃 Update documentation * ➕ Add crane, ngrok, and skopeo * ➕ Add yq and switch versions to ARG instead of ENV Thanks @soulshake for the suggestion! * ⏫ Update kubeseal * 🐞 Fix kubeconfig download logic * ➖ Remove fftw (it's huge and doesn't bring much benefit to httping) * 🐞 Tiny typo fix in motd * ➕ Add k9s; rollback kubeseal version * 📃 Add info to install packages in motd * ✂️ Remove skopeo (it's rarely used and it's juse one 'apk add' away) * ➕ Add iputils so that ping runs without sudo * 🔑 Increase MaxAuthTries in SSH for folks with many keys * push on pr * auth on pr's * only latest if on default branch Co-authored-by: onlinejudge95 <onlinejudge95@gmail.com> Co-authored-by: Jérôme Petazzoni <jerome.petazzoni@gmail.com>
shpod
TL,DR: curl https://k8smastery.com/shpod.sh | sh
If you are looking for an image that works on the ARM architecture (like the Raspberry Pi or the Apple M1), have a look at BretFisher/shpod instead. Bret's fork is also a state-of-the-art example of a multi-arch Dockerfile!
What's this?
shpod is a container image based on the Alpine distribution
and embarking a bunch of tools useful when working with containers,
Docker, and Kubernetes.
It includes:
- ab (ApacheBench)
- bash
- crane
- curl
- Docker CLI
- Docker Compose
- git
- Helm
- jid
- jq
- kubectl
- kubectx + kubens
- kube-linter
- kube-ps1
- kubeseal
- kustomize
- ngrok
- popeye
- regctl
- ship
- skaffold
- skopeo
- SSH
- stern
- tilt
- tmux
- yq
It also includes completion for most of these tools.
Its goal is to provide a normalized environment, to go with the training materials at kubernetesmastery.com, so that you can get all the tools you need regardless of your exact Kubernetes setup.
To use it, you need a Kubernetes cluster. You can use Minikube, microk8s, Docker Desktop, AKS, EKS, GKE, anything you like, really.
If it runs with a pseudo-terminal, it will spawn a shell, and you can attach to that shell. If it runs without a pseudo-terminal, it will start an SSH server, and you can connect to that SSH server to obtain the shell.
Using with a pseudo-terminal
Run it in a Pod and attach directly to it:
kubectl run shpod --restart=Never --rm -it --image=bretfisher/shpod
This should give you a shell in a pod, with all the tools installed. Most Kubernetes commands won't work (you will get permission errors) until you create an appropriate RoleBinding or ClusterRoleBinding (see below for details).
Using without a pseudo-terminal
Run as a Pod (or Deployment), then expose (or port-forward) to port 22 in that Pod, and connect with an SSH client:
kubectl run shpod --image=bretfisher/shpod
kubectl wait pod shpod --for=condition=ready
kubectl port-forward pod/shpod 2222:22
ssh -l k8s -p 2222 localhost # the default password is "k8s"
Note: you can change the password by setting the PASSWORD
environment variable.
Granting permissions
By default, shpod uses the ServiceAccount of the Pod that it's running in; and by default (on most clusters) that ServiceAccount won't have much permissions, meaning that you will get errors like the following one:
$ kubectl get pods
Error from server (Forbidden): pods is forbidden: User "system:serviceaccount:default:default" cannot list resource "pods" in API group "" in the namespace "default"
If you want to use Kubernetes commands within shpod, you need to give permissions to that ServiceAccount.
Assuming that you are running shpod in the default namespace
and with the default ServiceAccount, you can run the following
command to give cluster-admin privileges (=all privileges) to
the commands running in shpod:
kubectl create clusterrolebinding shpod \
--clusterrole=shpod \
--serviceaccount=default:default
You can also use the one-liner below.
One-liner usage
The shpod.sh script will:
- apply the shpod.yaml manifest to your cluster,
- wait for the pod
shpodto be ready, - attach to that pod,
- delete resources created by the manifest when you exit the pod.
The manifest will:
- create the
shpodNamespace, - create the
shpodServiceAccount in that Namespace, - create the
shpodClusterRoleBinding givingcluster-adminprivileges to that ServiceAccount, - create a Pod named
shpod, using that ServiceAccount, with a terminal (so that you can attach to that Pod and get a shell).
To execute it:
curl https://k8smastery.com/shpod.sh | sh
If you don't like curl|sh, and/or if you want to execute things
step by step, check the next section.
Step-by-step usage
-
Deploy the shpod pod:
kubectl apply -f https://k8smastery.com/shpod.yaml -
Attach to the shpod pod:
kubectl attach --namespace=shpod -ti shpod -
Enjoy!
Clean up
If you are using the shell script above, when you exit shpod, the script will delete the resources that were created.
If you want to delete the resources manually, you can use
kubectl delete -f shpod.yaml, or delete the namespace shpod
and the ClusterRoleBinding with the same name:
kubectl delete clusterrolebinding,ns shpod
Internal details
The YAML file is a Kubernetes manifest for a Pod, a ServiceAccount, a ClusterRoleBinding, and a Namespace to hold the Pod and ServiceAccount.
The Pod uses image bretfisher/shpod on the Docker Hub, built from this repository github.com/bretfisher/shpod.
Opening multiple sessions
Shpod tries to detect if it is already running; and if it's the case,
it will try to start another process using kubectl exec. Note that
if the first shpod process exits, Kubernetes will terminate all the
other processes.
Thanks to @jpetazzo for this great open source
Special handling of kubeconfig
If you have a ConfigMap named kubeconfig in the Namespace
where shpod is running, it will extract the first file from
that ConfigMap and use it to populate ~/.kube/config.
This lets you inject a custom kubeconfig file into shpod.
Support for other architectures
As of November 2021, the Dockerfile in this repository should be able to build images for other architectures. However, when trying to install a compiled binary that is not available for another architecture, a dummy placeholder will be installed instead.