Yandex Cloud
Search
Contact UsTry it for free
  • Customer Stories
  • Documentation
  • Blog
  • All Services
  • System Status
  • Marketplace
    • Featured
    • Infrastructure & Network
    • Data Platform
    • AI for business
    • Security
    • DevOps tools
    • Serverless
    • Monitoring & Resources
  • All Solutions
    • By industry
    • By use case
    • Economics and Pricing
    • Security
    • Technical Support
    • Start testing with double trial credits
    • Cloud credits to scale your IT product
    • Gateway to Russia
    • Cloud for Startups
    • Center for Technologies and Society
    • Yandex Cloud Partner program
    • Price calculator
    • Pricing plans
  • Customer Stories
  • Documentation
  • Blog
© 2026 Direct Cursus Technology L.L.C.
Yandex Managed Service for Kubernetes
  • Comparing with other Yandex Cloud services
  • Getting started
    • All guides
    • Connecting to a node over SSH
    • Connecting to a node via OS Login
    • Updating Kubernetes
    • Configuring autoscaling
    • Activating a Kubernetes Terraform provider
    • Installing applications from Yandex Cloud Marketplace using Terraform
    • Working with private Docker image registries
      • Getting started with Cloud Marketplace
      • Installing Bitrix
      • Installing Argo CD
      • Installing Chaos Mesh
      • Installing cert-manager with the Cloud DNS ACME webhook plugin
      • Installing Container Storage Interface for S3
      • Installing Crossplane
      • Installing External Secrets Operator
      • Installing ExternalDNS with a plugin for Cloud DNS
      • Installing Falco
      • Installing Filebeat OSS
      • Installing Fluent Bit
      • Installing Gatekeeper
      • Installing Gateway API
      • Installing the GitLab agent
      • Installing GitLab Runner
      • Installing Gwin
      • Installing HashiCorp Vault
      • Installing an Application Load Balancer ingress controller
      • Upgrading the Application Load Balancer Ingress controller
      • Installing Istio
      • Installing KEDA
      • Installing Kubernetes Node Remediation
      • Installing Kyverno & Kyverno Policies
      • Installing Loki
      • Installing Metrics Provider
      • Installing NodeLocal DNS
      • Installing node-sitter
      • Installing Prometheus Operator
      • Installing Thumbor
      • Installing Velero
  • Access management
  • Pricing policy
  • Terraform reference
  • Monitoring metrics
  • Audit Trails events
  • Release notes

In this article:

  • Getting started
  • Installation from Yandex Cloud Marketplace
  • Installation using a Helm chart
  1. Step-by-step guides
  2. Installing applications from Cloud Marketplace
  3. Installing node-sitter

Installing node-sitter

Written by
Yandex Cloud
Improved by
Dmitry A.
Updated at April 13, 2026
  • Getting started
  • Installation from Yandex Cloud Marketplace
  • Installation using a Helm chart

node-sitter is a tool for implementing application fault tolerance in a node group with preemptible VMs.

The node-sitter features include:

  • Pod eviction when cluster nodes on preemptible VMs shut down.
  • Installation of additional trusted root certificates.
  • Configuring container image downloads via a proxy.
  • Advanced kubelet launch settings.

Getting startedGetting started

  1. Create a node group with the following parameters:

    • Computing resources: Select Custom.
    • Under Additional, enable Preemptible.
    • Under Additional, add a custom taint policy for the application, e.g., node-sitter: 1.
  2. Make sure the security groups for the Managed Service for Kubernetes cluster and its node groups are configured correctly. If a rule is missing, add it.

    Warning

    The configuration of security groups determines performance and availability of the cluster and the services and applications running in it.

Installation from Yandex Cloud MarketplaceInstallation from Yandex Cloud Marketplace

  1. Navigate to the folder dashboard and select Managed Service for Kubernetes.

  2. Click the name of the Kubernetes cluster you need and select the Marketplace tab.

  3. Under Application available for installation, select node-sitter and click Go to install.

  4. Configure the application:

    • Namespace: Create a new namespace, e.g., node-sitter. If you leave the default namespace, node-sitter may work incorrectly.
    • Application name: Specify the application name.
    • Install node-drainer: Leave this option enabled so the integrated node-drainer script prevents pods in the Error or Completed state from appearing on the nodes of the preemptible VM group.
    • Tolerations key name: Specify the key name of the taint policy you set previously. node-sitter pods will configure new nodes in the preemptible VM group before user load is distributed to them. After the nodes are successfully configured, node-sitter will remove the taint policy so user applications can run on these nodes. If you skip this setting, the system will configure the nodes while starting user applications.
    • (Optional) Trusted certificates: Copy the contents of the x.509 certificate file in PEM format for installation into the trusted certificate storage on the nodes of the preemptible VM group. When recreating nodes, the certificates will be reinstalled.
    • (Optional) Parameters for kubelet: Specify additional parameters for running kubelet on the nodes of the preemptible VM group.
    • (Optional) Proxy settings: Specify proxy settings for downloading container images on the nodes of the preemptible VM group. The settings are provided via the HTTP_PROXY and HTTPS_PROXY environment variables.
  5. Click Install.

  6. Wait for the application status to change to Deployed.

Installation using a Helm chartInstallation using a Helm chart

  1. Install Helm v3.8.0 or higher.

  2. Install kubect and configure it to work with the new cluster.

  3. To install a Helm chart with node-sitter, run the following command, specifying the parameters of the resources you created earlier:

    helm pull oci://cr.yandex/yc-marketplace/yandex-cloud/node-sitter/node-sitter/chart/node-sitter \
       --version 0.1.6 \
       --untar && \
    helm install \
       --namespace <namespace_for_node_sitter> \
       --create-namespace \
       --set node_drainer_enabled='true' \
       --set toleration_name='<taint_policy_name>' \
       --set custom_certs='<PEM_trusted_certificates>' \
       --set custom_kubelet_flags='<additional_kubelet_launch_options>' \
       --set containerd_proxy='<proxy_settings_for_downloading_images>' \
      node-sitter ./node-sitter
    

    Installation parameters:

    • --namespace: Namespace where the application will be deployed.

      If you set the default namespace, node-sitter may work incorrectly. We recommend specifying a value different from all the existing namespaces, e.g., node-sitter-space.

    • node_drainer_enabled: When set to true, the integrated node-drainer script prevents pods in the Error or Completed state from appearing on the nodes of the preemptible VM group.

    • toleration_name: Key name of the taint policy key you set previously. node-sitter pods will configure new nodes in the preemptible VM group before user load is distributed to them. After the nodes are successfully configured, node-sitter will remove the taint policy so user applications can run on these nodes. If you skip this setting, the system will configure the nodes while starting user applications.

    • custom_certs: Contents of the X.509 certificate file in PEM format for installation into the trusted certificate storage on the nodes of the preemptible VM group. When recreating nodes, the certificates will be reinstalled.

    • custom_kubelet_flags: Advanced settings for running kubelet on nodes in the preemptible VM group.

    • containerd_proxy: Proxy settings for downloading container images on the nodes of the preemptible VM group. The settings are provided via the HTTP_PROXY and HTTPS_PROXY environment variables.

    Note

    If you are using a Helm version below 3.8.0, add the export HELM_EXPERIMENTAL_OCI=1 && \ string at the beginning of the command to enable Open Container Initiative (OCI) support in the Helm client.

Was the article helpful?

Previous
Installing NodeLocal DNS
Next
Installing Prometheus Operator
© 2026 Direct Cursus Technology L.L.C.