Skip to content

Commit

Permalink
feat: update Kubernetes to 1.32.0-rc.1
Browse files Browse the repository at this point in the history
  • Loading branch information
smira committed Dec 4, 2024
1 parent d99bcc9 commit 5a4bdf6
Show file tree
Hide file tree
Showing 8 changed files with 56 additions and 56 deletions.
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ INTEGRATION_TEST := integration-test
INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM)
INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM)
# renovate: datasource=github-releases depName=kubernetes/kubernetes
KUBECTL_VERSION ?= v1.32.0-rc.0
KUBECTL_VERSION ?= v1.32.0-rc.1
# renovate: datasource=github-releases depName=kastenhq/kubestr
KUBESTR_VERSION ?= v0.4.46
# renovate: datasource=github-releases depName=helm/helm
Expand Down
22 changes: 11 additions & 11 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -32,16 +32,16 @@ replace github.com/insomniacslk/dhcp => github.com/smira/dhcp v0.0.0-20241001122

// Kubernetes dependencies sharing the same version.
require (
k8s.io/api v0.32.0-rc.0
k8s.io/apimachinery v0.32.0-rc.0
k8s.io/apiserver v0.32.0-rc.0
k8s.io/client-go v0.32.0-rc.0
k8s.io/component-base v0.32.0-rc.0
k8s.io/cri-api v0.32.0-rc.0
k8s.io/kube-scheduler v0.32.0-rc.0
k8s.io/kubectl v0.32.0-rc.0
k8s.io/kubelet v0.32.0-rc.0
k8s.io/pod-security-admission v0.32.0-rc.0
k8s.io/api v0.32.0-rc.1
k8s.io/apimachinery v0.32.0-rc.1
k8s.io/apiserver v0.32.0-rc.1
k8s.io/client-go v0.32.0-rc.1
k8s.io/component-base v0.32.0-rc.1
k8s.io/cri-api v0.32.0-rc.1
k8s.io/kube-scheduler v0.32.0-rc.1
k8s.io/kubectl v0.32.0-rc.1
k8s.io/kubelet v0.32.0-rc.1
k8s.io/pod-security-admission v0.32.0-rc.1
)

require (
Expand Down Expand Up @@ -362,7 +362,7 @@ require (
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
k8s.io/cli-runtime v0.32.0-rc.0 // indirect
k8s.io/cli-runtime v0.32.0-rc.1 // indirect
k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f // indirect
k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 // indirect
kernel.org/pub/linux/libs/security/libcap/psx v1.2.72 // indirect
Expand Down
44 changes: 22 additions & 22 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -1097,32 +1097,32 @@ gvisor.dev/gvisor v0.0.0-20240331093104-8c9cbf0d9090/go.mod h1:NQHVAzMwvZ+Qe3ElS
honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
k8s.io/api v0.32.0-rc.0 h1:/JeK0EoDPuDmV4YhcojORdB38o3tfSJlEXx6zBIFVBE=
k8s.io/api v0.32.0-rc.0/go.mod h1:cWKDBZRmf22qbGbFb7nTF1Bgyft9Y8/2Ems4nfonwsU=
k8s.io/apimachinery v0.32.0-rc.0 h1:u+1irgylqNowg1vQFJJqw0UASsb07LhSpFvIX+EnI5A=
k8s.io/apimachinery v0.32.0-rc.0/go.mod h1:HqhdaJUgQqky29T1V0o2yFkt/pZqLFIDyn9Zi/8rxoY=
k8s.io/apiserver v0.32.0-rc.0 h1:Djr9zFBIgWctxuO9pOYPFG3VSraachj9QU2V6uUdgBw=
k8s.io/apiserver v0.32.0-rc.0/go.mod h1:S1L6AHxdnAMUR1oq0srAq15veddvijAYP1hcMiPkM6I=
k8s.io/cli-runtime v0.32.0-rc.0 h1:POoxV3AK6+WnHIN0tjMQRh74jSZZ3n8u5FYFnqrKp9s=
k8s.io/cli-runtime v0.32.0-rc.0/go.mod h1:KCLZk3bkknEmF2xBM/poDEU25IatAUfPsA0JvjwBjH0=
k8s.io/client-go v0.32.0-rc.0 h1:8QFsKiUSQsERKRnfEyfw2TV37f/mdR8BEEzFqJqg6y0=
k8s.io/client-go v0.32.0-rc.0/go.mod h1:ke1QuLYLBZ/4oUqsb2emcPoDcdSGE1jYL9IQnD8wByU=
k8s.io/component-base v0.32.0-rc.0 h1:x/z6A18GeEsTQjfIuoeauFoWL7IDKCJNxE6yQuqQ12g=
k8s.io/component-base v0.32.0-rc.0/go.mod h1:L8fl5Xqwi2XF3gkj8+Z92h2Hg8O9gGiV2rCCYYSDj6Q=
k8s.io/cri-api v0.32.0-rc.0 h1:tqVelzAGCb/2t9yFKEsYI6Om3IOrwDEzIe6rmdzu33Q=
k8s.io/cri-api v0.32.0-rc.0/go.mod h1:5WOp91NVV2mzTQRp732avavhFFItsWsQy8jO7DPv8d8=
k8s.io/api v0.32.0-rc.1 h1:dxXiVjLYq4JmlXFgctsK9zJaXhPA1hJLO772lHk4wKw=
k8s.io/api v0.32.0-rc.1/go.mod h1:3TNYUV1WB3ZF2yOeY4qlr9FDb1GVzO+OucsXW2BOi5o=
k8s.io/apimachinery v0.32.0-rc.1 h1:jeLQr/Dqcq0kGU/yjEmievDMHTJzzwQctlysW0Kb70U=
k8s.io/apimachinery v0.32.0-rc.1/go.mod h1:HqhdaJUgQqky29T1V0o2yFkt/pZqLFIDyn9Zi/8rxoY=
k8s.io/apiserver v0.32.0-rc.1 h1:zlrmW4wO1JYXlu4mHzQ/bQajC7OP/sgCRFF8abOWhEQ=
k8s.io/apiserver v0.32.0-rc.1/go.mod h1:kzVgA1c3Ig7wDnDF99bOz/dY4iEY/OWzayCY1gZPzDI=
k8s.io/cli-runtime v0.32.0-rc.1 h1:rQDtu2ihnv/ItkawGIewwqhgb6C6skVwNFWCxBx7loI=
k8s.io/cli-runtime v0.32.0-rc.1/go.mod h1:ifV1UrGAvsFhohEfFLkxoAAZPAXnp92ROioZvFG4be4=
k8s.io/client-go v0.32.0-rc.1 h1:ZW27sbQZ06FnkFTNqlfa9HTIW01RGoLoiOmdiLbWYK0=
k8s.io/client-go v0.32.0-rc.1/go.mod h1:Nlv9GR11bKYSlCcxY3B1RpVbcsfasSAwminv42knDHk=
k8s.io/component-base v0.32.0-rc.1 h1:c3EG8QuyozbalRmbsUxXW/ZmF2bev3Zq9PbpU3oIHT4=
k8s.io/component-base v0.32.0-rc.1/go.mod h1:xIvfPkeLsQbd2fkDNWezG20WQwrabBetTUxp67eycbI=
k8s.io/cri-api v0.32.0-rc.1 h1:e7+u84qR9Nychp2imSIIDeQSNBZut/1alF7vcskZbik=
k8s.io/cri-api v0.32.0-rc.1/go.mod h1:5WOp91NVV2mzTQRp732avavhFFItsWsQy8jO7DPv8d8=
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f h1:GA7//TjRY9yWGy1poLzYYJJ4JRdzg3+O6e8I+e+8T5Y=
k8s.io/kube-openapi v0.0.0-20241105132330-32ad38e42d3f/go.mod h1:R/HEjbvWI0qdfb8viZUeVZm0X6IZnxAydC7YU42CMw4=
k8s.io/kube-scheduler v0.32.0-rc.0 h1:ZkdCF11CmxAxXsSU/DtT+cr7N+5V/B6Oqc+i3tvTGmg=
k8s.io/kube-scheduler v0.32.0-rc.0/go.mod h1:E+sESpgNo21ffzrRlrFk5MaWGr7BFha1q98cNTmfcWE=
k8s.io/kubectl v0.32.0-rc.0 h1:xlP1o8Y9YLQG2mBS1snB4ruI62TNKxpYUugfbkqlnhI=
k8s.io/kubectl v0.32.0-rc.0/go.mod h1:OyY/YZRSU3urKX376mgSS1qCHFuz9jDNTeY1LytgWuU=
k8s.io/kubelet v0.32.0-rc.0 h1:hXpLanUvHYnfUvbajgBWOh2a0eX4T4bXwSLvfXVeXFI=
k8s.io/kubelet v0.32.0-rc.0/go.mod h1:rU3iw03AeaAoNTkbEIdlh4feBS3i7heKMrsIYONjwdQ=
k8s.io/pod-security-admission v0.32.0-rc.0 h1:ufhIe+HjC1+lA/CjJtp8dT3UShzXVcgzvE/2SF3Bbcw=
k8s.io/pod-security-admission v0.32.0-rc.0/go.mod h1:MD7IMDTajPEzRADmg1bO8PSzLVkanv9KSS0/ESxFU3Y=
k8s.io/kube-scheduler v0.32.0-rc.1 h1:TrCQMuOZthP7POY+wQgPZoXQ9+wJeHZNsCbeqO26jGw=
k8s.io/kube-scheduler v0.32.0-rc.1/go.mod h1:SjsaRjg/7iyItYvxkKaSaTvSQNnIbXwBMYSjrp+8ZhY=
k8s.io/kubectl v0.32.0-rc.1 h1:hkZ9bqMyOySj8Ky8d6/Yjxa7WQBJKijaMTcGkYmYYKE=
k8s.io/kubectl v0.32.0-rc.1/go.mod h1:+N+xgO48ssPu8eJMm2rymUuMIDy2UgqY67Xj/p5eO0Y=
k8s.io/kubelet v0.32.0-rc.1 h1:vgQavYPMnDlOAECm3ApeKWrU3m7Oo2lQuGtviJ00jSA=
k8s.io/kubelet v0.32.0-rc.1/go.mod h1:lkKQv20UU5m23z4DKYOUbe+j3BMnhRpALR2rqDtduBo=
k8s.io/pod-security-admission v0.32.0-rc.1 h1:hinSdeNwLTmuyQpUaZjAPgQjSzIKfu8vo4MFPwV2uKE=
k8s.io/pod-security-admission v0.32.0-rc.1/go.mod h1:kMQk2qV2sdGCXMRITdPNy4dAZ9qqcbLgdkzgj/C+niM=
k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738 h1:M3sRQVHv7vB20Xc2ybTt7ODCeFj6JSWYFzOFnYeS6Ro=
k8s.io/utils v0.0.0-20241104100929-3ea5e8cea738/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
kernel.org/pub/linux/libs/security/libcap/cap v1.2.72 h1:SqLZbTqwcNxctcdM5yb6OcO3lFJNtRgDJoFeca+5hP0=
Expand Down
2 changes: 1 addition & 1 deletion hack/release.toml
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ preface = """
* Linux: 6.12.1
* containerd: 2.0.0
* Flannel: 0.26.1
* Kubernetes: 1.32.0-rc.0
* Kubernetes: 1.32.0-rc.1
* runc: 1.2.1
* CoreDNS: 1.12.0
Expand Down
2 changes: 1 addition & 1 deletion hack/test/e2e.sh
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ export TALOS_VERSION
# Kubernetes

export KUBECONFIG="${TMP}/kubeconfig"
export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-rc.0}
export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-rc.1}

export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}"
export TIMEOUT=1200
Expand Down
2 changes: 1 addition & 1 deletion pkg/machinery/constants/constants.go
Original file line number Diff line number Diff line change
Expand Up @@ -390,7 +390,7 @@ const (

// DefaultKubernetesVersion is the default target version of the control plane.
// renovate: datasource=github-releases depName=kubernetes/kubernetes
DefaultKubernetesVersion = "1.32.0-rc.0"
DefaultKubernetesVersion = "1.32.0-rc.1"

// SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards.
SupportedKubernetesVersions = 6
Expand Down
8 changes: 4 additions & 4 deletions website/content/v1.9/reference/cli.md
Original file line number Diff line number Diff line change
Expand Up @@ -184,7 +184,7 @@ talosctl cluster create [flags]
--ipxe-boot-script string iPXE boot script (URL) to use
--iso-path string the ISO path to use for the initial boot (VM only)
--kubeprism-port int KubePrism port (set to 0 to disable) (default 7445)
--kubernetes-version string desired kubernetes version to run (default "1.32.0-rc.0")
--kubernetes-version string desired kubernetes version to run (default "1.32.0-rc.1")
--memory int the limit on memory usage in MB (each control plane/VM) (default 2048)
--memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048)
--mount mount attach a mount to the container (Docker only)
Expand Down Expand Up @@ -1358,7 +1358,7 @@ talosctl gen config <cluster name> <cluster endpoint> [flags]
-h, --help help for config
--install-disk string the disk to install to (default "/dev/sda")
--install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest")
--kubernetes-version string desired kubernetes version to run (default "1.32.0-rc.0")
--kubernetes-version string desired kubernetes version to run (default "1.32.0-rc.1")
-o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout
-t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig])
-p, --persist the desired persist value for configs (default true)
Expand Down Expand Up @@ -1791,7 +1791,7 @@ talosctl image cache-create [flags]
### Examples

```
talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:1.32.0-rc.0 --image-cache-path=/tmp/talos-image-cache
talosctl images cache-create --images=ghcr.io/siderolabs/kubelet:1.32.0-rc.1 --image-cache-path=/tmp/talos-image-cache
Alternatively, stdin can be piped to the command:
talosctl images default | talosctl images cache-create --image-cache-path=/tmp/talos-image-cache --images=-
Expand Down Expand Up @@ -3021,7 +3021,7 @@ talosctl upgrade-k8s [flags]
--pre-pull-images pre-pull images before upgrade (default true)
--proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy")
--scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler")
--to string the Kubernetes control plane version to upgrade to (default "1.32.0-rc.0")
--to string the Kubernetes control plane version to upgrade to (default "1.32.0-rc.1")
--upgrade-kubelet upgrade kubelet service (default true)
--with-docs patch all machine configs adding the documentation for each field (default true)
--with-examples patch all machine configs with the commented examples (default true)
Expand Down
30 changes: 15 additions & 15 deletions website/content/v1.9/reference/configuration/v1alpha1/config.md
Original file line number Diff line number Diff line change
Expand Up @@ -90,7 +90,7 @@ controlPlane:
{{< /highlight >}}</details> | |
|`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
kubelet:
image: ghcr.io/siderolabs/kubelet:v1.32.0-rc.0 # The `image` field is an optional reference to an alternative kubelet image.
image: ghcr.io/siderolabs/kubelet:v1.32.0-rc.1 # The `image` field is an optional reference to an alternative kubelet image.
# The `extraArgs` field is used to provide additional flags to the kubelet.
extraArgs:
feature-gates: ServerSideApply=true
Expand Down Expand Up @@ -519,7 +519,7 @@ KubeletConfig represents the kubelet config values.
{{< highlight yaml >}}
machine:
kubelet:
image: ghcr.io/siderolabs/kubelet:v1.32.0-rc.0 # The `image` field is an optional reference to an alternative kubelet image.
image: ghcr.io/siderolabs/kubelet:v1.32.0-rc.1 # The `image` field is an optional reference to an alternative kubelet image.
# The `extraArgs` field is used to provide additional flags to the kubelet.
extraArgs:
feature-gates: ServerSideApply=true
Expand Down Expand Up @@ -572,7 +572,7 @@ machine:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The `image` field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: ghcr.io/siderolabs/kubelet:v1.32.0-rc.0
image: ghcr.io/siderolabs/kubelet:v1.32.0-rc.1
{{< /highlight >}}</details> | |
|`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
clusterDNS:
Expand Down Expand Up @@ -2997,7 +2997,7 @@ serviceAccount:
{{< /highlight >}}</details> | |
|`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
apiServer:
image: registry.k8s.io/kube-apiserver:v1.32.0-rc.0 # The container image used in the API server manifest.
image: registry.k8s.io/kube-apiserver:v1.32.0-rc.1 # The container image used in the API server manifest.
# Extra arguments to supply to the API server.
extraArgs:
feature-gates: ServerSideApply=true
Expand Down Expand Up @@ -3062,14 +3062,14 @@ apiServer:
{{< /highlight >}}</details> | |
|`controllerManager` |<a href="#Config.cluster.controllerManager">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
controllerManager:
image: registry.k8s.io/kube-controller-manager:v1.32.0-rc.0 # The container image used in the controller manager manifest.
image: registry.k8s.io/kube-controller-manager:v1.32.0-rc.1 # The container image used in the controller manager manifest.
# Extra arguments to supply to the controller manager.
extraArgs:
feature-gates: ServerSideApply=true
{{< /highlight >}}</details> | |
|`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}}
proxy:
image: registry.k8s.io/kube-proxy:v1.32.0-rc.0 # The container image used in the kube-proxy manifest.
image: registry.k8s.io/kube-proxy:v1.32.0-rc.1 # The container image used in the kube-proxy manifest.
mode: ipvs # proxy mode of kube-proxy.
# Extra arguments to supply to kube-proxy.
extraArgs:
Expand All @@ -3080,7 +3080,7 @@ proxy:
{{< /highlight >}}</details> | |
|`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
scheduler:
image: registry.k8s.io/kube-scheduler:v1.32.0-rc.0 # The container image used in the scheduler manifest.
image: registry.k8s.io/kube-scheduler:v1.32.0-rc.1 # The container image used in the scheduler manifest.
# Extra arguments to supply to the scheduler.
extraArgs:
feature-gates: AllBeta=true
Expand Down Expand Up @@ -3324,7 +3324,7 @@ APIServerConfig represents the kube apiserver configuration options.
{{< highlight yaml >}}
cluster:
apiServer:
image: registry.k8s.io/kube-apiserver:v1.32.0-rc.0 # The container image used in the API server manifest.
image: registry.k8s.io/kube-apiserver:v1.32.0-rc.1 # The container image used in the API server manifest.
# Extra arguments to supply to the API server.
extraArgs:
feature-gates: ServerSideApply=true
Expand Down Expand Up @@ -3392,7 +3392,7 @@ cluster:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-apiserver:v1.32.0-rc.0
image: registry.k8s.io/kube-apiserver:v1.32.0-rc.1
{{< /highlight >}}</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to the API server. | |
|`extraVolumes` |<a href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the API server static pod. | |
Expand Down Expand Up @@ -3604,7 +3604,7 @@ ControllerManagerConfig represents the kube controller manager configuration opt
{{< highlight yaml >}}
cluster:
controllerManager:
image: registry.k8s.io/kube-controller-manager:v1.32.0-rc.0 # The container image used in the controller manager manifest.
image: registry.k8s.io/kube-controller-manager:v1.32.0-rc.1 # The container image used in the controller manager manifest.
# Extra arguments to supply to the controller manager.
extraArgs:
feature-gates: ServerSideApply=true
Expand All @@ -3614,7 +3614,7 @@ cluster:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-controller-manager:v1.32.0-rc.0
image: registry.k8s.io/kube-controller-manager:v1.32.0-rc.1
{{< /highlight >}}</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | |
|`extraVolumes` |<a href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the controller manager static pod. | |
Expand Down Expand Up @@ -3684,7 +3684,7 @@ ProxyConfig represents the kube proxy configuration options.
{{< highlight yaml >}}
cluster:
proxy:
image: registry.k8s.io/kube-proxy:v1.32.0-rc.0 # The container image used in the kube-proxy manifest.
image: registry.k8s.io/kube-proxy:v1.32.0-rc.1 # The container image used in the kube-proxy manifest.
mode: ipvs # proxy mode of kube-proxy.
# Extra arguments to supply to kube-proxy.
extraArgs:
Expand All @@ -3701,7 +3701,7 @@ cluster:
disabled: false
{{< /highlight >}}</details> | |
|`image` |string |The container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-proxy:v1.32.0-rc.0
image: registry.k8s.io/kube-proxy:v1.32.0-rc.1
{{< /highlight >}}</details> | |
|`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The default is 'iptables'.</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | |
Expand All @@ -3720,7 +3720,7 @@ SchedulerConfig represents the kube scheduler configuration options.
{{< highlight yaml >}}
cluster:
scheduler:
image: registry.k8s.io/kube-scheduler:v1.32.0-rc.0 # The container image used in the scheduler manifest.
image: registry.k8s.io/kube-scheduler:v1.32.0-rc.1 # The container image used in the scheduler manifest.
# Extra arguments to supply to the scheduler.
extraArgs:
feature-gates: AllBeta=true
Expand All @@ -3730,7 +3730,7 @@ cluster:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-scheduler:v1.32.0-rc.0
image: registry.k8s.io/kube-scheduler:v1.32.0-rc.1
{{< /highlight >}}</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | |
|`extraVolumes` |<a href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the scheduler static pod. | |
Expand Down

0 comments on commit 5a4bdf6

Please sign in to comment.