77 "infraprovidertype" : " intel" ,
88 "clusterconfiguration" : {
99 "kind" : " KThreesControlPlaneTemplate" ,
10- "apiVersion" : " controlplane.cluster.x-k8s.io/v1beta1 " ,
10+ "apiVersion" : " controlplane.cluster.x-k8s.io/v1beta2 " ,
1111 "metadata" : {
1212 "labels" : {
1313 "cpumanager" : " true"
1616 "spec" : {
1717 "template" : {
1818 "spec" : {
19- "files" : [
20- {
21- "path" : " /var/lib/rancher/k3s/agent/etc/containerd/config.toml.tmpl" ,
22- "content": "version = 2\n\n[plugins.\\\"io.containerd.internal.v1.opt\\\"]\n path = \\\"/var/lib/rancher/k3s/agent/containerd\\\"\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\"]\n stream_server_address = \\\"127.0.0.1\\\"\n stream_server_port = \\\"10010\\\"\n enable_selinux = false\n enable_unprivileged_ports = true\n enable_unprivileged_icmp = true\n sandbox_image = \\\"index.docker.io/rancher/mirrored-pause:3.6\\\"\n disable_apparmor = true\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd]\n snapshotter = \\\"overlayfs\\\"\n disable_snapshot_annotations = true\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.runc]\n runtime_type = \\\"io.containerd.runc.v2\\\"\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.runc.options]\n SystemdCgroup = true\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".registry]\n config_path = \\\"/var/lib/rancher/k3s/agent/etc/containerd/certs.d\\\"\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.kata-qemu]\n runtime_type = \\\"io.containerd.kata-qemu.v2\\\"\n runtime_path = \\\"/opt/kata/bin/containerd-shim-kata-v2\\\"\n privileged_without_host_devices = true\n pod_annotations = [\\\"io.katacontainers.*\\\"]\n\n[plugins.\\\"io.containerd.grpc.v1.cri\\\".containerd.runtimes.kata-qemu.options]\n ConfigPath = \\\"/opt/kata/share/defaults/kata-containers/configuration-qemu.toml\\\""
23- }
24- ],
25- "agentConfig" : {
26- "kubelet" : {
27- "extraArgs" : [
19+ "kthreesConfigSpec" : {
20+ "files" : [
21+ {}
22+ ],
23+ "agentConfig" : {
24+ "kubeletArgs" : [
2825 " --topology-manager-policy=best-effort" ,
2926 " --cpu-manager-policy=static" ,
3027 " --reserved-cpus=1" ,
3128 " --max-pods=250" ,
3229 " --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"
3330 ]
34- }
35- },
36- "preK3sCommands" : [
37- " mkdir -p /etc/systemd/system/k3s-server.service.d" ,
38- " echo '[Service]\n EnvironmentFile=/etc/environment' > /etc/systemd/system/k3s-server.service.d/override.conf" ,
39- " make -p /var/lib/kubelet/static-pods" ,
40- " sed -i '/kubelet-arg:/a\\ - pod-manifest-path=/var/lib/kubelet/static-pods' /etc/rancher/k3s/config.yaml"
41- ],
42- "postK3sCommands" : [
43- " kubectl apply -f https://raw.githubusercontent.com/projectcalico/calico/v3.29.3/manifests/calico.yaml"
44- ],
45- "privateRegistriesConfig" : {},
46- "serverConfig" : {
47- "cni" : " calico" ,
48- "cniMultusEnable" : true ,
49- "disableComponents" : {
50- "kubernetesComponents" : [
51- " cloudController"
52- ]
5331 },
54- "kubeApiServer" : {
55- "extraArgs" : [
32+ "preK3sCommands" : [
33+ " mkdir -p /etc/systemd/system/k3s-server.service.d" ,
34+ " echo '[Service]\n EnvironmentFile=/etc/environment' > /etc/systemd/system/k3s-server.service.d/override.conf" ,
35+ " mkdir -p /var/lib/kubelet/static-pods" ,
36+ " sed -i '/kubelet-arg:/a\\ - pod-manifest-path=/var/lib/kubelet/static-pods' /etc/rancher/k3s/config.yaml" ,
37+ " sudo cp /var/lib/rancher/k3s/agent/pod-manifests/connect-agent.yaml /var/lib/kubelet/static-pods/connect-agent.yaml"
38+ ],
39+ "postK3sCommands" : [
40+ " kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.30.0/manifests/operator-crds.yaml" ,
41+ " kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.30.0/manifests/tigera-operator.yaml" ,
42+ " kubectl create -f https://raw.githubusercontent.com/projectcalico/calico/v3.30.0/manifests/custom-resources.yaml"
43+ ],
44+ "serverConfig" : {
45+ "kubeApiServerArg" : [
5646 " --feature-gates=PortForwardWebsockets=true" ,
5747 " --tls-cipher-suites=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384"
58- ]
59- },
60- "kubeControllerManager" : {
61- "extraArgs" : null
62- },
63- "kubeScheduler" : {
64- "extraArgs" : null
48+ ],
49+ "kubeControllerManagerArgs" : [],
50+ "kubeSchedulerArgs" : [],
51+ "clusterDomain" : " cluster.edge" ,
52+ "disableCloudController" : false
6553 },
66- "etcd" : {
67- "exposeMetrics" : false ,
68- "backupConfig" : {
69- "retention" : " 5" ,
70- "scheduleCron" : " 0 */5 * * *"
71- },
72- "customConfig" : {
73- "extraArgs" : [
74- " cipher-suites=[TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384]"
75- ]
76- }
77- }
78- },
79- "nodeDrainTimeout" : " 2m" ,
80- "rolloutStrategy" : {
81- "type" : " RollingUpdate" ,
82- "rollingUpdate" : {
83- "maxSurge" : 1
84- }
54+ "version" : " v1.32.4+k3s1"
8555 }
8656 }
8757 }
10272 "cluster-labels" : {
10373 "default-extension" : " baseline"
10474 }
105- }
75+ }
0 commit comments