chore: bump kubernetes to v1.24.0
Bump kubernetes to v1.24.0 Ref: https://github.com/siderolabs/kubelet/pull/45 Also update coredns [manifests](https://github.com/coredns/deployment/blob/master/kubernetes/coredns.yaml.sed) Signed-off-by: Noel Georgi <git@frezbo.dev>
This commit is contained in:
parent
09d16349f4
commit
89cab200b8
2
Makefile
2
Makefile
@ -29,7 +29,7 @@ OPERATING_SYSTEM := $(shell uname -s | tr "[:upper:]" "[:lower:]")
|
||||
TALOSCTL_DEFAULT_TARGET := talosctl-$(OPERATING_SYSTEM)
|
||||
INTEGRATION_TEST_DEFAULT_TARGET := integration-test-$(OPERATING_SYSTEM)
|
||||
INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM)
|
||||
KUBECTL_URL ?= https://storage.googleapis.com/kubernetes-release/release/v1.24.0-rc.0/bin/$(OPERATING_SYSTEM)/amd64/kubectl
|
||||
KUBECTL_URL ?= https://storage.googleapis.com/kubernetes-release/release/v1.24.0/bin/$(OPERATING_SYSTEM)/amd64/kubectl
|
||||
KUBESTR_URL ?= https://github.com/kastenhq/kubestr/releases/download/v0.4.31/kubestr_0.4.31_Linux_amd64.tar.gz
|
||||
CLUSTERCTL_VERSION ?= 1.1.3
|
||||
CLUSTERCTL_URL ?= https://github.com/kubernetes-sigs/cluster-api/releases/download/v$(CLUSTERCTL_VERSION)/clusterctl-$(OPERATING_SYSTEM)-amd64
|
||||
|
18
go.mod
18
go.mod
@ -17,14 +17,14 @@ replace (
|
||||
|
||||
// Kubernetes dependencies sharing the same version.
|
||||
require (
|
||||
k8s.io/api v0.24.0-rc.0
|
||||
k8s.io/apimachinery v0.24.0-rc.0
|
||||
k8s.io/apiserver v0.24.0-rc.0
|
||||
k8s.io/client-go v0.24.0-rc.0
|
||||
k8s.io/component-base v0.24.0-rc.0
|
||||
k8s.io/cri-api v0.24.0-rc.0
|
||||
k8s.io/kubectl v0.24.0-rc.0
|
||||
k8s.io/kubelet v0.24.0-rc.0
|
||||
k8s.io/api v0.24.0
|
||||
k8s.io/apimachinery v0.24.0
|
||||
k8s.io/apiserver v0.24.0
|
||||
k8s.io/client-go v0.24.0
|
||||
k8s.io/component-base v0.24.0
|
||||
k8s.io/cri-api v0.24.0
|
||||
k8s.io/kubectl v0.24.0
|
||||
k8s.io/kubelet v0.24.0
|
||||
)
|
||||
|
||||
require (
|
||||
@ -279,7 +279,7 @@ require (
|
||||
gopkg.in/ini.v1 v1.66.2 // indirect
|
||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||
inet.af/tcpproxy v0.0.0-20200125044825-b6bb9b5b8252 // indirect
|
||||
k8s.io/cli-runtime v0.24.0-rc.0 // indirect
|
||||
k8s.io/cli-runtime v0.24.0 // indirect
|
||||
k8s.io/klog v1.0.0 // indirect
|
||||
k8s.io/kube-openapi v0.0.0-20220328201542-3ee0da9b0b42 // indirect
|
||||
k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9 // indirect
|
||||
|
42
go.sum
42
go.sum
@ -1921,41 +1921,41 @@ k8s.io/api v0.20.1/go.mod h1:KqwcCVogGxQY3nBlRpwt+wpAMF/KjaCc7RpywacvqUo=
|
||||
k8s.io/api v0.20.4/go.mod h1:++lNL1AJMkDymriNniQsWRkMDzRaX2Y/POTUi8yvqYQ=
|
||||
k8s.io/api v0.20.6/go.mod h1:X9e8Qag6JV/bL5G6bU8sdVRltWKmdHsFUGS3eVndqE8=
|
||||
k8s.io/api v0.21.3/go.mod h1:hUgeYHUbBp23Ue4qdX9tR8/ANi/g3ehylAqDn9NWVOg=
|
||||
k8s.io/api v0.24.0-rc.0 h1:0TkqsPskmRuYeIdeliMnWwd5liRAejl0otJRuCLla9Q=
|
||||
k8s.io/api v0.24.0-rc.0/go.mod h1:PcpENPRRauvrfEa9i+SJ1ai6mHIv2gD5GRvwfDsp+WM=
|
||||
k8s.io/api v0.24.0 h1:J0hann2hfxWr1hinZIDefw7Q96wmCBx6SSB8IY0MdDg=
|
||||
k8s.io/api v0.24.0/go.mod h1:5Jl90IUrJHUJYEMANRURMiVvJ0g7Ax7r3R1bqO8zx8I=
|
||||
k8s.io/apimachinery v0.20.1/go.mod h1:WlLqWAHZGg07AeltaI0MV5uk1Omp8xaN0JGLY6gkRpU=
|
||||
k8s.io/apimachinery v0.20.4/go.mod h1:WlLqWAHZGg07AeltaI0MV5uk1Omp8xaN0JGLY6gkRpU=
|
||||
k8s.io/apimachinery v0.20.6/go.mod h1:ejZXtW1Ra6V1O5H8xPBGz+T3+4gfkTCeExAHKU57MAc=
|
||||
k8s.io/apimachinery v0.21.3/go.mod h1:H/IM+5vH9kZRNJ4l3x/fXP/5bOPJaVP/guptnZPeCFI=
|
||||
k8s.io/apimachinery v0.24.0-rc.0 h1:2JM6zl8BsGy9sPsK6yeEnbT3Rv1WNEKOG5wqUu+nrpE=
|
||||
k8s.io/apimachinery v0.24.0-rc.0/go.mod h1:82Bi4sCzVBdpYjyI4jY6aHX+YCUchUIrZrXKedjd2UM=
|
||||
k8s.io/apimachinery v0.24.0 h1:ydFCyC/DjCvFCHK5OPMKBlxayQytB8pxy8YQInd5UyQ=
|
||||
k8s.io/apimachinery v0.24.0/go.mod h1:82Bi4sCzVBdpYjyI4jY6aHX+YCUchUIrZrXKedjd2UM=
|
||||
k8s.io/apiserver v0.20.1/go.mod h1:ro5QHeQkgMS7ZGpvf4tSMx6bBOgPfE+f52KwvXfScaU=
|
||||
k8s.io/apiserver v0.20.4/go.mod h1:Mc80thBKOyy7tbvFtB4kJv1kbdD0eIH8k8vianJcbFM=
|
||||
k8s.io/apiserver v0.20.6/go.mod h1:QIJXNt6i6JB+0YQRNcS0hdRHJlMhflFmsBDeSgT1r8Q=
|
||||
k8s.io/apiserver v0.24.0-rc.0 h1:WbEHFdU4BtEMlBPxylg9uZ8e8jYvYQ57yfIW6pdnWY4=
|
||||
k8s.io/apiserver v0.24.0-rc.0/go.mod h1:9iUrs4qlMOec7B5vlhUm3IzZQpNxxWPcldDAxkJdP3w=
|
||||
k8s.io/cli-runtime v0.24.0-rc.0 h1:1hPCaCibl8DaWUcCNU8iyWHOHJWSUiESHW6uYlGeLDo=
|
||||
k8s.io/cli-runtime v0.24.0-rc.0/go.mod h1:bAFKWrpO04tcE3El1PXPprLhgk8VUbA7de2jeAoMmR8=
|
||||
k8s.io/apiserver v0.24.0 h1:GR7kGsjOMfilRvlG3Stxv/3uz/ryvJ/aZXc5pqdsNV0=
|
||||
k8s.io/apiserver v0.24.0/go.mod h1:WFx2yiOMawnogNToVvUYT9nn1jaIkMKj41ZYCVycsBA=
|
||||
k8s.io/cli-runtime v0.24.0 h1:ot3Qf49T852uEyNApABO1UHHpFIckKK/NqpheZYN2gM=
|
||||
k8s.io/cli-runtime v0.24.0/go.mod h1:9XxoZDsEkRFUThnwqNviqzljtT/LdHtNWvcNFrAXl0A=
|
||||
k8s.io/client-go v0.20.1/go.mod h1:/zcHdt1TeWSd5HoUe6elJmHSQ6uLLgp4bIJHVEuy+/Y=
|
||||
k8s.io/client-go v0.20.4/go.mod h1:LiMv25ND1gLUdBeYxBIwKpkSC5IsozMMmOOeSJboP+k=
|
||||
k8s.io/client-go v0.20.6/go.mod h1:nNQMnOvEUEsOzRRFIIkdmYOjAZrC8bgq0ExboWSU1I0=
|
||||
k8s.io/client-go v0.21.3/go.mod h1:+VPhCgTsaFmGILxR/7E1N0S+ryO010QBeNCv5JwRGYU=
|
||||
k8s.io/client-go v0.24.0-rc.0 h1:PZerqDccRfhZZ19PYCfO6kJIJhuNOZpRQ9tJzPSFeE4=
|
||||
k8s.io/client-go v0.24.0-rc.0/go.mod h1:zH+SNmPKPUz09GNMCW2Bu5reKghTVx6TpYepwG2mCIM=
|
||||
k8s.io/client-go v0.24.0 h1:lbE4aB1gTHvYFSwm6eD3OF14NhFDKCejlnsGYlSJe5U=
|
||||
k8s.io/client-go v0.24.0/go.mod h1:VFPQET+cAFpYxh6Bq6f4xyMY80G6jKKktU6G0m00VDw=
|
||||
k8s.io/code-generator v0.19.7/go.mod h1:lwEq3YnLYb/7uVXLorOJfxg+cUu2oihFhHZ0n9NIla0=
|
||||
k8s.io/code-generator v0.24.0-rc.0/go.mod h1:dpVhs00hTuTdTY6jvVxvTFCk6gSMrtfRydbhZwHI15w=
|
||||
k8s.io/code-generator v0.24.0/go.mod h1:dpVhs00hTuTdTY6jvVxvTFCk6gSMrtfRydbhZwHI15w=
|
||||
k8s.io/component-base v0.20.1/go.mod h1:guxkoJnNoh8LNrbtiQOlyp2Y2XFCZQmrcg2n/DeYNLk=
|
||||
k8s.io/component-base v0.20.4/go.mod h1:t4p9EdiagbVCJKrQ1RsA5/V4rFQNDfRlevJajlGwgjI=
|
||||
k8s.io/component-base v0.20.6/go.mod h1:6f1MPBAeI+mvuts3sIdtpjljHWBQ2cIy38oBIWMYnrM=
|
||||
k8s.io/component-base v0.24.0-rc.0 h1:S2xaUcNXdZXHxMjSaVv7vtYgtwYnxqZHB0aHGm9dtVU=
|
||||
k8s.io/component-base v0.24.0-rc.0/go.mod h1:ACHgb2t5mV1LZHXVYQB8krxcTq2/dpYsjamlsiZJGXg=
|
||||
k8s.io/component-helpers v0.24.0-rc.0/go.mod h1:ZCHo6Gwap4GKV5hYkcCysLT8TW8PGtq+4qqGpNEylJE=
|
||||
k8s.io/component-base v0.24.0 h1:h5jieHZQoHrY/lHG+HyrSbJeyfuitheBvqvKwKHVC0g=
|
||||
k8s.io/component-base v0.24.0/go.mod h1:Dgazgon0i7KYUsS8krG8muGiMVtUZxG037l1MKyXgrA=
|
||||
k8s.io/component-helpers v0.24.0/go.mod h1:Q2SlLm4h6g6lPTC9GMMfzdywfLSvJT2f1hOnnjaWD8c=
|
||||
k8s.io/cri-api v0.17.3/go.mod h1:X1sbHmuXhwaHs9xxYffLqJogVsnI+f6cPRcgPel7ywM=
|
||||
k8s.io/cri-api v0.20.1/go.mod h1:2JRbKt+BFLTjtrILYVqQK5jqhI+XNdF6UiGMgczeBCI=
|
||||
k8s.io/cri-api v0.20.4/go.mod h1:2JRbKt+BFLTjtrILYVqQK5jqhI+XNdF6UiGMgczeBCI=
|
||||
k8s.io/cri-api v0.20.6/go.mod h1:ew44AjNXwyn1s0U4xCKGodU7J1HzBeZ1MpGrpa5r8Yc=
|
||||
k8s.io/cri-api v0.24.0-rc.0 h1:3rv6CvR7QBFdbhFvXUuQ7wUzGK+J6tazRGX/41+/mts=
|
||||
k8s.io/cri-api v0.24.0-rc.0/go.mod h1:t3tImFtGeStN+ES69bQUX9sFg67ek38BM9YIJhMmuig=
|
||||
k8s.io/cri-api v0.24.0 h1:PZ/MqhgYq4rxCarYe2rGNmd8G9ZuyS1NU9igolbkqlI=
|
||||
k8s.io/cri-api v0.24.0/go.mod h1:t3tImFtGeStN+ES69bQUX9sFg67ek38BM9YIJhMmuig=
|
||||
k8s.io/gengo v0.0.0-20200413195148-3a45101e95ac/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0=
|
||||
k8s.io/gengo v0.0.0-20200428234225-8167cfdcfc14/go.mod h1:ezvh/TsK7cY6rbqRK0oQQ8IAqLxYwwyPxAX1Pzy0ii0=
|
||||
k8s.io/gengo v0.0.0-20201113003025-83324d819ded/go.mod h1:FiNAH4ZV3gBg2Kwh89tzAEV2be7d5xI0vBa/VySYy3E=
|
||||
@ -1975,12 +1975,12 @@ k8s.io/kube-openapi v0.0.0-20210305001622-591a79e4bda7/go.mod h1:wXW5VT87nVfh/iL
|
||||
k8s.io/kube-openapi v0.0.0-20210421082810-95288971da7e/go.mod h1:vHXdDvt9+2spS2Rx9ql3I8tycm3H9FDfdUoIuKCefvw=
|
||||
k8s.io/kube-openapi v0.0.0-20220328201542-3ee0da9b0b42 h1:Gii5eqf+GmIEwGNKQYQClCayuJCe2/4fZUvF7VG99sU=
|
||||
k8s.io/kube-openapi v0.0.0-20220328201542-3ee0da9b0b42/go.mod h1:Z/45zLw8lUo4wdiUkI+v/ImEGAvu3WatcZl3lPMR4Rk=
|
||||
k8s.io/kubectl v0.24.0-rc.0 h1:SjAtvBp4oZ+oFMvWVzvrs2EQV2Skn48RjVexaqhBpA4=
|
||||
k8s.io/kubectl v0.24.0-rc.0/go.mod h1:PSKGtqIwErHxbej7DOZ2YeuEejQL4nUXYdO5XldVhjo=
|
||||
k8s.io/kubelet v0.24.0-rc.0 h1:UcgN2wgVoxSI6KL0dF/b1BuYbwbjPA22GvjBeTNCWDE=
|
||||
k8s.io/kubelet v0.24.0-rc.0/go.mod h1:rR4/xKBUipkmOnqAnjI6ymZBpRpY1nfKraDwGeBsmZs=
|
||||
k8s.io/kubectl v0.24.0 h1:nA+WtMLVdXUs4wLogGd1mPTAesnLdBpCVgCmz3I7dXo=
|
||||
k8s.io/kubectl v0.24.0/go.mod h1:pdXkmCyHiRTqjYfyUJiXtbVNURhv0/Q1TyRhy2d5ic0=
|
||||
k8s.io/kubelet v0.24.0 h1:fH+D6mSr4DGIeHp/O2+mCEJhkVq3Gpgv9BVOHI+GrWY=
|
||||
k8s.io/kubelet v0.24.0/go.mod h1:p3BBacmHTCMpUf+nluhlyzuGHmONKAspqCvpu9oPAyA=
|
||||
k8s.io/kubernetes v1.13.0/go.mod h1:ocZa8+6APFNC2tX1DZASIbocyYT5jHzqFVsY5aoB7Jk=
|
||||
k8s.io/metrics v0.24.0-rc.0/go.mod h1:XqqGXg39Dvzmfl+vvAZhIoU1WsvvfqGQ0idWXEhwSSo=
|
||||
k8s.io/metrics v0.24.0/go.mod h1:jrLlFGdKl3X+szubOXPG0Lf2aVxuV3QJcbsgVRAM6fI=
|
||||
k8s.io/utils v0.0.0-20201110183641-67b214c5f920/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
||||
k8s.io/utils v0.0.0-20210802155522-efc7438f0176/go.mod h1:jPW/WVKK9YHAvNhRxK0md/EJ228hCsBRufyofKtW8HA=
|
||||
k8s.io/utils v0.0.0-20220210201930-3a6ce19ff2f9 h1:HNSDgDCrr/6Ly3WEGKZftiE7IY19Vz2GdbOCyI4qqhc=
|
||||
|
@ -26,7 +26,7 @@ Talos now enables the Raspberry Pi PoE fan control by pulling in the poe overlay
|
||||
description="""\
|
||||
* Linux: 5.15.37
|
||||
* Containerd: v1.6.4
|
||||
* Kubernetes: 1.24.0-rc.0
|
||||
* Kubernetes: 1.24.0
|
||||
* Flannel: 0.17.0
|
||||
* runc: 1.1.1
|
||||
|
||||
|
@ -30,7 +30,7 @@ export TALOS_VERSION=v1.1
|
||||
# Kubernetes
|
||||
|
||||
export KUBECONFIG="${TMP}/kubeconfig"
|
||||
export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.24.0-rc.0}
|
||||
export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.24.0}
|
||||
|
||||
export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}"
|
||||
export TIMEOUT=1200
|
||||
|
@ -238,8 +238,6 @@ kind: ServiceAccount
|
||||
metadata:
|
||||
name: coredns
|
||||
namespace: kube-system
|
||||
labels:
|
||||
kubernetes.io/cluster-service: "true"
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
@ -274,11 +272,6 @@ rules:
|
||||
verbs:
|
||||
- list
|
||||
- watch
|
||||
- apiGroups: [""]
|
||||
resources:
|
||||
- nodes
|
||||
verbs:
|
||||
- get
|
||||
- apiGroups: ["discovery.k8s.io"]
|
||||
resources:
|
||||
- endpointslices
|
||||
@ -323,7 +316,6 @@ metadata:
|
||||
labels:
|
||||
k8s-app: kube-dns
|
||||
kubernetes.io/name: "CoreDNS"
|
||||
kubernetes.io/cluster-service: "true"
|
||||
spec:
|
||||
replicas: 2
|
||||
strategy:
|
||||
@ -338,6 +330,8 @@ spec:
|
||||
labels:
|
||||
k8s-app: kube-dns
|
||||
spec:
|
||||
nodeSelector:
|
||||
kubernetes.io/os: linux
|
||||
affinity:
|
||||
podAntiAffinity:
|
||||
preferredDuringSchedulingIgnoredDuringExecution:
|
||||
@ -359,6 +353,8 @@ spec:
|
||||
- key: node-role.kubernetes.io/control-plane
|
||||
operator: Exists
|
||||
effect: NoSchedule
|
||||
- key: "CriticalAddonsOnly"
|
||||
operator: "Exists"
|
||||
containers:
|
||||
- name: coredns
|
||||
image: {{ .CoreDNSImage }}
|
||||
@ -458,6 +454,9 @@ spec:
|
||||
- name: dns-tcp
|
||||
port: 53
|
||||
protocol: TCP
|
||||
- name: metrics
|
||||
port: 9153
|
||||
protocol: TCP
|
||||
`)
|
||||
|
||||
var flannelTemplate = []byte(`apiVersion: rbac.authorization.k8s.io/v1
|
||||
|
@ -253,7 +253,7 @@ const (
|
||||
KubeletShutdownGracePeriodCriticalPods = 10 * time.Second
|
||||
|
||||
// DefaultKubernetesVersion is the default target version of the control plane.
|
||||
DefaultKubernetesVersion = "1.24.0-rc.0"
|
||||
DefaultKubernetesVersion = "1.24.0"
|
||||
|
||||
// DefaultControlPlanePort is the default port to use for the control plane.
|
||||
DefaultControlPlanePort = 6443
|
||||
|
@ -6,7 +6,7 @@ cascade:
|
||||
type: docs
|
||||
preRelease: true
|
||||
lastRelease: v1.1.0-alpha.0
|
||||
kubernetesRelease: "1.24.0-rc.0"
|
||||
kubernetesRelease: "1.24.0"
|
||||
prevKubernetesRelease: "1.23.5"
|
||||
---
|
||||
|
||||
|
@ -125,7 +125,7 @@ talosctl cluster create [flags]
|
||||
--ipv4 enable IPv4 network in the cluster (default true)
|
||||
--ipv6 enable IPv6 network in the cluster (QEMU provisioner only)
|
||||
--iso-path string the ISO path to use for the initial boot (VM only)
|
||||
--kubernetes-version string desired kubernetes version to run (default "1.24.0-rc.0")
|
||||
--kubernetes-version string desired kubernetes version to run (default "1.24.0")
|
||||
--masters int the number of masters to create (default 1)
|
||||
--memory int the limit on memory usage in MB (each control plane/VM) (default 2048)
|
||||
--memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048)
|
||||
@ -1097,7 +1097,7 @@ talosctl gen config <cluster name> <cluster endpoint> [flags]
|
||||
-h, --help help for config
|
||||
--install-disk string the disk to install to (default "/dev/sda")
|
||||
--install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest")
|
||||
--kubernetes-version string desired kubernetes version to run (default "1.24.0-rc.0")
|
||||
--kubernetes-version string desired kubernetes version to run (default "1.24.0")
|
||||
-o, --output-dir string destination to output generated files
|
||||
-p, --persist the desired persist value for configs (default true)
|
||||
--registry-mirror strings list of registry mirrors to use in format: <registry host>=<mirror URL>
|
||||
@ -2005,7 +2005,7 @@ talosctl upgrade-k8s [flags]
|
||||
--endpoint string the cluster control plane endpoint
|
||||
--from string the Kubernetes control plane version to upgrade from
|
||||
-h, --help help for upgrade-k8s
|
||||
--to string the Kubernetes control plane version to upgrade to (default "1.24.0-rc.0")
|
||||
--to string the Kubernetes control plane version to upgrade to (default "1.24.0")
|
||||
--upgrade-kubelet upgrade kubelet service (default true)
|
||||
```
|
||||
|
||||
|
@ -101,7 +101,7 @@ controlPlane:
|
||||
{{< /highlight >}}</details> | |
|
||||
|`kubelet` |<a href="#kubeletconfig">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
kubelet:
|
||||
image: ghcr.io/siderolabs/kubelet:v1.24.0-rc.0 # The `image` field is an optional reference to an alternative kubelet image.
|
||||
image: ghcr.io/siderolabs/kubelet:v1.24.0 # The `image` field is an optional reference to an alternative kubelet image.
|
||||
# The `extraArgs` field is used to provide additional flags to the kubelet.
|
||||
extraArgs:
|
||||
feature-gates: ServerSideApply=true
|
||||
@ -438,7 +438,7 @@ serviceAccount:
|
||||
{{< /highlight >}}</details> | |
|
||||
|`apiServer` |<a href="#apiserverconfig">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
apiServer:
|
||||
image: k8s.gcr.io/kube-apiserver:v1.24.0-rc.0 # The container image used in the API server manifest.
|
||||
image: k8s.gcr.io/kube-apiserver:v1.24.0 # The container image used in the API server manifest.
|
||||
# Extra arguments to supply to the API server.
|
||||
extraArgs:
|
||||
feature-gates: ServerSideApply=true
|
||||
@ -470,14 +470,14 @@ apiServer:
|
||||
{{< /highlight >}}</details> | |
|
||||
|`controllerManager` |<a href="#controllermanagerconfig">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
controllerManager:
|
||||
image: k8s.gcr.io/kube-controller-manager:v1.24.0-rc.0 # The container image used in the controller manager manifest.
|
||||
image: k8s.gcr.io/kube-controller-manager:v1.24.0 # The container image used in the controller manager manifest.
|
||||
# Extra arguments to supply to the controller manager.
|
||||
extraArgs:
|
||||
feature-gates: ServerSideApply=true
|
||||
{{< /highlight >}}</details> | |
|
||||
|`proxy` |<a href="#proxyconfig">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
proxy:
|
||||
image: k8s.gcr.io/kube-proxy:v1.24.0-rc.0 # The container image used in the kube-proxy manifest.
|
||||
image: k8s.gcr.io/kube-proxy:v1.24.0 # The container image used in the kube-proxy manifest.
|
||||
mode: ipvs # proxy mode of kube-proxy.
|
||||
# Extra arguments to supply to kube-proxy.
|
||||
extraArgs:
|
||||
@ -485,7 +485,7 @@ proxy:
|
||||
{{< /highlight >}}</details> | |
|
||||
|`scheduler` |<a href="#schedulerconfig">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
scheduler:
|
||||
image: k8s.gcr.io/kube-scheduler:v1.24.0-rc.0 # The container image used in the scheduler manifest.
|
||||
image: k8s.gcr.io/kube-scheduler:v1.24.0 # The container image used in the scheduler manifest.
|
||||
# Extra arguments to supply to the scheduler.
|
||||
extraArgs:
|
||||
feature-gates: AllBeta=true
|
||||
@ -649,7 +649,7 @@ Appears in:
|
||||
|
||||
|
||||
{{< highlight yaml >}}
|
||||
image: ghcr.io/siderolabs/kubelet:v1.24.0-rc.0 # The `image` field is an optional reference to an alternative kubelet image.
|
||||
image: ghcr.io/siderolabs/kubelet:v1.24.0 # The `image` field is an optional reference to an alternative kubelet image.
|
||||
# The `extraArgs` field is used to provide additional flags to the kubelet.
|
||||
extraArgs:
|
||||
feature-gates: ServerSideApply=true
|
||||
@ -686,7 +686,7 @@ extraArgs:
|
||||
| Field | Type | Description | Value(s) |
|
||||
|-------|------|-------------|----------|
|
||||
|`image` |string |The `image` field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
image: ghcr.io/siderolabs/kubelet:v1.24.0-rc.0
|
||||
image: ghcr.io/siderolabs/kubelet:v1.24.0
|
||||
{{< /highlight >}}</details> | |
|
||||
|`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
clusterDNS:
|
||||
@ -1234,7 +1234,7 @@ Appears in:
|
||||
|
||||
|
||||
{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-apiserver:v1.24.0-rc.0 # The container image used in the API server manifest.
|
||||
image: k8s.gcr.io/kube-apiserver:v1.24.0 # The container image used in the API server manifest.
|
||||
# Extra arguments to supply to the API server.
|
||||
extraArgs:
|
||||
feature-gates: ServerSideApply=true
|
||||
@ -1269,7 +1269,7 @@ certSANs:
|
||||
| Field | Type | Description | Value(s) |
|
||||
|-------|------|-------------|----------|
|
||||
|`image` |string |The container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-apiserver:v1.24.0-rc.0
|
||||
image: k8s.gcr.io/kube-apiserver:v1.24.0
|
||||
{{< /highlight >}}</details> | |
|
||||
|`extraArgs` |map[string]string |Extra arguments to supply to the API server. | |
|
||||
|`extraVolumes` |[]<a href="#volumemountconfig">VolumeMountConfig</a> |Extra volumes to mount to the API server static pod. | |
|
||||
@ -1348,7 +1348,7 @@ Appears in:
|
||||
|
||||
|
||||
{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-controller-manager:v1.24.0-rc.0 # The container image used in the controller manager manifest.
|
||||
image: k8s.gcr.io/kube-controller-manager:v1.24.0 # The container image used in the controller manager manifest.
|
||||
# Extra arguments to supply to the controller manager.
|
||||
extraArgs:
|
||||
feature-gates: ServerSideApply=true
|
||||
@ -1358,7 +1358,7 @@ extraArgs:
|
||||
| Field | Type | Description | Value(s) |
|
||||
|-------|------|-------------|----------|
|
||||
|`image` |string |The container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-controller-manager:v1.24.0-rc.0
|
||||
image: k8s.gcr.io/kube-controller-manager:v1.24.0
|
||||
{{< /highlight >}}</details> | |
|
||||
|`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | |
|
||||
|`extraVolumes` |[]<a href="#volumemountconfig">VolumeMountConfig</a> |Extra volumes to mount to the controller manager static pod. | |
|
||||
@ -1377,7 +1377,7 @@ Appears in:
|
||||
|
||||
|
||||
{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-proxy:v1.24.0-rc.0 # The container image used in the kube-proxy manifest.
|
||||
image: k8s.gcr.io/kube-proxy:v1.24.0 # The container image used in the kube-proxy manifest.
|
||||
mode: ipvs # proxy mode of kube-proxy.
|
||||
# Extra arguments to supply to kube-proxy.
|
||||
extraArgs:
|
||||
@ -1391,7 +1391,7 @@ extraArgs:
|
||||
disabled: false
|
||||
{{< /highlight >}}</details> | |
|
||||
|`image` |string |The container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-proxy:v1.24.0-rc.0
|
||||
image: k8s.gcr.io/kube-proxy:v1.24.0
|
||||
{{< /highlight >}}</details> | |
|
||||
|`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The default is 'iptables'.</details> | |
|
||||
|`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | |
|
||||
@ -1409,7 +1409,7 @@ Appears in:
|
||||
|
||||
|
||||
{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-scheduler:v1.24.0-rc.0 # The container image used in the scheduler manifest.
|
||||
image: k8s.gcr.io/kube-scheduler:v1.24.0 # The container image used in the scheduler manifest.
|
||||
# Extra arguments to supply to the scheduler.
|
||||
extraArgs:
|
||||
feature-gates: AllBeta=true
|
||||
@ -1419,7 +1419,7 @@ extraArgs:
|
||||
| Field | Type | Description | Value(s) |
|
||||
|-------|------|-------------|----------|
|
||||
|`image` |string |The container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
|
||||
image: k8s.gcr.io/kube-scheduler:v1.24.0-rc.0
|
||||
image: k8s.gcr.io/kube-scheduler:v1.24.0
|
||||
{{< /highlight >}}</details> | |
|
||||
|`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | |
|
||||
|`extraVolumes` |[]<a href="#volumemountconfig">VolumeMountConfig</a> |Extra volumes to mount to the scheduler static pod. | |
|
||||
|
Loading…
Reference in New Issue
Block a user