Skip to content

Commit 04a12a7

Browse files
committed
[docs] Update features doc with rke/rke2 support
Signed-off-by: Rodny Molina <[email protected]>
1 parent 5b4699c commit 04a12a7

File tree

1 file changed

+12
-2
lines changed

1 file changed

+12
-2
lines changed

docs/user-guide/features.md

+12-2
Original file line numberDiff line numberDiff line change
@@ -79,16 +79,26 @@ product offering.
7979
## K3s-in-Docker [ v0.4.0+ ]
8080

8181
- K3s clusters can be deployed within system containers to offer a lighter
82-
alternative to K8s deployments.
82+
alternative to K8s deployments without the limitations of the
83+
[rootless-k3s](https://rancher.com/docs/k3s/latest/en/advanced/#known-issues-with-rootless-mode)
84+
deployment approach.
8385

8486
- As it is the case with K8s-in-Docker solutions, K3s nodes hosted within a
8587
system container are properly isolated through the diverse security mechanisms
8688
offered by the Sysbox runtime. In other words, Sysbox is not relying on
8789
`privileged` containers as other K3s-in-Docker solutions do.
8890

91+
## RKE/RKE2-in-Docker [ v0.5.0+ Sysbox-EE ]
92+
93+
- Deploy RKE and RKE2 clusters within Sysbox-powered docker containers or
94+
K8s pods for extra security and isolation.
95+
96+
- The Canal CNI utilized by both RKE and RKE2 is currently only supported as
97+
part of the Sysbox-EE product offering.
98+
8999
## Buildx + Buildkit [ v0.5.0+ ]
90100

91-
- Run buildx and/or buildkit inside a Docker container or K8s pods for extra
101+
- Run buildx and/or buildkit inside Docker containers or K8s pods for extra
92102
security and performance.
93103

94104
- Avoid the limitations associated with running Buildkit in secure environments

0 commit comments

Comments
 (0)