7
7
"infraprovidertype" : " intel" ,
8
8
"clusterconfiguration" : {
9
9
"kind" : " KThreesControlPlaneTemplate" ,
10
- "apiVersion" : " controlplane.cluster.x-k8s.io/v1beta1 " ,
10
+ "apiVersion" : " controlplane.cluster.x-k8s.io/v1beta2 " ,
11
11
"metadata" : {
12
12
"labels" : {
13
13
"cpumanager" : " true"
16
16
"spec" : {
17
17
"template" : {
18
18
"spec" : {
19
- "files" : [
20
- {
21
- "path" : " /var/lib/rancher/k3s/agent/etc/containerd/config.toml.tmpl" ,
22
- "content": "version = 2\n\n[plugins.\\\"io.containerd.internal.v1.opt\\\"]\n path = \\\"/var/lib/rancher/k3s/agent/containerd\\\"\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\"]\n stream_server_address = \\\"127.0.0.1\\\"\n stream_server_port = \\\"10010\\\"\n enable_selinux = false\n enable_unprivileged_ports = true\n enable_unprivileged_icmp = true\n sandbox_image = \\\"index.docker.io/rancher/mirrored-pause:3.6\\\"\n disable_apparmor = true\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd]\n snapshotter = \\\"overlayfs\\\"\n disable_snapshot_annotations = true\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.runc]\n runtime_type = \\\"io.containerd.runc.v2\\\"\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.runc.options]\n SystemdCgroup = true\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".registry]\n config_path = \\\"/var/lib/rancher/k3s/agent/etc/containerd/certs.d\\\"\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.kata-qemu]\n runtime_type = \\\"io.containerd.kata-qemu.v2\\\"\n runtime_path = \\\"/opt/kata/bin/containerd-shim-kata-v2\\\"\n privileged_without_host_devices = true\n pod_annotations = [\\\"io.katacontainers.*\\\"]\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.kata-qemu.options]\n ConfigPath = \\\"/opt/kata/share/defaults/kata-containers/configuration-qemu.toml\\\""
23
- }
24
- ],
25
- "agentConfig" : {
26
- "kubelet" : {
27
- "extraArgs" : [
19
+ "kthreesConfigSpec" : {
20
+ "files" : [
21
+ {}
22
+ ],
23
+ "agentConfig" : {
24
+ "kubeletArgs" : [
28
25
" --topology-manager-policy=best-effort" ,
29
26
" --cpu-manager-policy=static" ,
30
27
" --reserved-cpus=1" ,
31
28
" --max-pods=250" ,
32
29
" --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"
33
30
]
34
- }
35
- },
36
- "preK3sCommands" : [
37
- " mkdir -p /etc/systemd/system/k3s-server.service.d" ,
38
- " echo '[Service]\n EnvironmentFile=/etc/environment' > /etc/systemd/system/k3s-server.service.d/override.conf" ,
39
- " make -p /var/lib/kubelet/static-pods" ,
40
- " sed -i '/kubelet-arg:/a\\ - pod-manifest-path=/var/lib/kubelet/static-pods' /etc/rancher/k3s/config.yaml"
41
- ],
42
- "postK3sCommands" : [
43
- " kubectl apply -f https://raw.githubusercontent.com/projectcalico/calico/v3.29.3/manifests/calico.yaml"
44
- ],
45
- "privateRegistriesConfig" : {},
46
- "serverConfig" : {
47
- "cni" : " calico" ,
48
- "cniMultusEnable" : true ,
49
- "disableComponents" : {
50
- "kubernetesComponents" : [
51
- " cloudController"
52
- ]
53
31
},
54
- "kubeApiServer" : {
55
- "extraArgs" : [
32
+ "preK3sCommands" : [
33
+ " mkdir -p /etc/systemd/system/k3s-server.service.d" ,
34
+ " echo '[Service]\n EnvironmentFile=/etc/environment' > /etc/systemd/system/k3s-server.service.d/override.conf" ,
35
+ " mkdir -p /var/lib/kubelet/static-pods" ,
36
+ " sed -i '/kubelet-arg:/a\\ - pod-manifest-path=/var/lib/kubelet/static-pods' /etc/rancher/k3s/config.yaml" ,
37
+ " sudo cp /var/lib/rancher/k3s/agent/pod-manifests/connect-agent.yaml /var/lib/kubelet/static-pods/connect-agent.yaml"
38
+ ],
39
+ "postK3sCommands" : [
40
+ " kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.30.0/manifests/operator-crds.yaml" ,
41
+ " kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.30.0/manifests/tigera-operator.yaml" ,
42
+ " kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.30.0/manifests/custom-resources.yaml"
43
+ ],
44
+ "serverConfig" : {
45
+ "kubeApiServerArg" : [
56
46
" --feature-gates=PortForwardWebsockets=true" ,
57
47
" --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"
58
- ]
59
- },
60
- "kubeControllerManager" : {
61
- "extraArgs" : null
62
- },
63
- "kubeScheduler" : {
64
- "extraArgs" : null
48
+ ],
49
+ "kubeControllerManagerArgs" : [],
50
+ "kubeSchedulerArgs" : [],
51
+ "clusterDomain" : " cluster.edge" ,
52
+ "disableCloudController" : false
65
53
},
66
- "etcd" : {
67
- "exposeMetrics" : false ,
68
- "backupConfig" : {
69
- "retention" : " 5" ,
70
- "scheduleCron" : " 0 */5 * * *"
71
- },
72
- "customConfig" : {
73
- "extraArgs" : [
74
- " cipher-suites=[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384]"
75
- ]
76
- }
77
- }
78
- },
79
- "nodeDrainTimeout" : " 2m" ,
80
- "rolloutStrategy" : {
81
- "type" : " RollingUpdate" ,
82
- "rollingUpdate" : {
83
- "maxSurge" : 1
84
- }
54
+ "version" : " v1.32.4+k3s1"
85
55
}
86
56
}
87
57
}
102
72
"cluster-labels" : {
103
73
"default-extension" : " baseline"
104
74
}
105
- }
75
+ }
0 commit comments