When you attach a cluster to Containership Cloud, a new namespace  called containership-core is created. Workloads are launched in this namespace, that allow you to control your cluster, in the Containership Cloud UI. New Custom Resource Definitions are also created, in order to synchronize the state of your cluster.  
The following is an overview of each resource. Generally, you should not update any of these resources. There are safeguards in place on some of these resources, that will overwrite modifications, if they would result in cluster instability (for example, deleting a secret that a core service requires, in order to connect to your API server). 


The following workloads are launched on clusters, when attached to Containership Cloud:

  • cloud-coordinator : This deployment is required for synchronizing Hitachi Kubernetes Service resources with attached Kubernetes clusters. Some examples of resources synchronized and managed by the Coordinator include plugins and secrets added through the UI.
  • eventrouter : This deployment is used to forward Kubernetes events, relating only to service-managed resources, back to Containership Cloud for health monitoring purposes.
  • cloud-agent : This DaemonSet enables some features that require node-level interaction such as synchronizing SSH keys, and registries.
  • prometheus-operator , prom-exporter-cadvisor , prom-exporter-node , prometheus-prometheus : If you choose to enable the Metrics Collection plugin, these workloads run Pods to support the Prometheus Operator . They are used to collect, and aggregate node  & pod metrics, and populate graphs in the Cloud UI.

Custom Resource Definitions (CRDs)

  • plugins.containership.io : This is used to support syncing the state of plugins installed on your nodes , such as Metrics Collection, and Log Collection.
  • registries.containership.io : This is used to support syncing registry credentials added in the Cloud UI, to your nodes
  • users.containership.io : This is used to support syncing user data (such as SSH keys) on your Containership Cloud account, to each node in your cluster.

Did this answer your question?