Merge to master
commit
72e786f73e
|
@ -331,7 +331,9 @@ func generateClusterConfig(cmd *cobra.Command, existing *config.ClusterConfig, k
|
|||
},
|
||||
}
|
||||
cc.VerifyComponents = interpretWaitFlag(*cmd)
|
||||
|
||||
if viper.GetBool(createMount) && driver.IsKIC(drvName) {
|
||||
cc.ContainerVolumeMounts = []string{viper.GetString(mountString)}
|
||||
}
|
||||
cnm, err := cni.New(cc)
|
||||
if err != nil {
|
||||
return cc, config.Node{}, errors.Wrap(err, "cni")
|
||||
|
|
|
@ -90,7 +90,7 @@ spec:
|
|||
containers:
|
||||
- name: kubernetes-dashboard
|
||||
# WARNING: This must match pkg/minikube/bootstrapper/images/images.go
|
||||
image: kubernetesui/dashboard:v2.0.1
|
||||
image: kubernetesui/dashboard:v2.0.3
|
||||
ports:
|
||||
- containerPort: 9090
|
||||
protocol: TCP
|
||||
|
|
|
@ -48,7 +48,7 @@ spec:
|
|||
serviceAccountName: ingress-nginx
|
||||
containers:
|
||||
- name: controller
|
||||
image: quay.io/kubernetes-ingress-controller/nginx-ingress-controller:0.33.0
|
||||
image: us.gcr.io/k8s-artifacts-prod/ingress-nginx/controller:v0.34.1@sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
|
||||
imagePullPolicy: IfNotPresent
|
||||
lifecycle:
|
||||
preStop:
|
||||
|
|
|
@ -353,7 +353,6 @@ func verifyAddonStatusInternal(cc *config.ClusterConfig, name string, val string
|
|||
|
||||
// Start enables the default addons for a profile, plus any additional
|
||||
func Start(wg *sync.WaitGroup, cc *config.ClusterConfig, toEnable map[string]bool, additional []string) {
|
||||
wg.Add(1)
|
||||
defer wg.Done()
|
||||
|
||||
start := time.Now()
|
||||
|
|
|
@ -26,6 +26,7 @@ import (
|
|||
"k8s.io/minikube/pkg/minikube/assets"
|
||||
"k8s.io/minikube/pkg/minikube/config"
|
||||
"k8s.io/minikube/pkg/minikube/localpath"
|
||||
"k8s.io/minikube/pkg/minikube/tests"
|
||||
)
|
||||
|
||||
func createTestProfile(t *testing.T) string {
|
||||
|
@ -35,6 +36,13 @@ func createTestProfile(t *testing.T) string {
|
|||
t.Fatalf("tempdir: %v", err)
|
||||
}
|
||||
|
||||
t.Cleanup(func() {
|
||||
err := os.RemoveAll(td)
|
||||
t.Logf("remove path %q", td)
|
||||
if err != nil {
|
||||
t.Errorf("failed to clean up temp folder %q", td)
|
||||
}
|
||||
})
|
||||
err = os.Setenv(localpath.MinikubeHome, td)
|
||||
if err != nil {
|
||||
t.Errorf("error setting up test environment. could not set %s", localpath.MinikubeHome)
|
||||
|
@ -122,6 +130,10 @@ func TestSetAndSave(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStart(t *testing.T) {
|
||||
// this test will write a config.json into MinikubeHome, create a temp dir for it
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
cc := &config.ClusterConfig{
|
||||
Name: "start",
|
||||
CPUs: 2,
|
||||
|
@ -130,7 +142,8 @@ func TestStart(t *testing.T) {
|
|||
}
|
||||
|
||||
var wg sync.WaitGroup
|
||||
Start(&wg, cc, map[string]bool{}, []string{"dashboard"})
|
||||
wg.Add(1)
|
||||
go Start(&wg, cc, map[string]bool{}, []string{"dashboard"})
|
||||
wg.Wait()
|
||||
|
||||
if !assets.Addons["dashboard"].IsEnabled(cc) {
|
||||
|
|
|
@ -68,6 +68,7 @@ func NewDriver(c Config) *Driver {
|
|||
// Create a host using the driver's config
|
||||
func (d *Driver) Create() error {
|
||||
params := oci.CreateParams{
|
||||
Mounts: d.NodeConfig.Mounts,
|
||||
Name: d.NodeConfig.MachineName,
|
||||
Image: d.NodeConfig.ImageDigest,
|
||||
ClusterLabel: oci.ProfileLabelKey + "=" + d.MachineName,
|
||||
|
|
|
@ -58,9 +58,20 @@ func digDNS(ociBin, containerName, dns string) (net.IP, error) {
|
|||
return ip, nil
|
||||
}
|
||||
|
||||
// profileInContainers checks whether the profile is within the containers list
|
||||
func profileInContainers(profile string, containers []string) bool {
|
||||
for _, container := range containers {
|
||||
if container == profile {
|
||||
return true
|
||||
}
|
||||
}
|
||||
return false
|
||||
}
|
||||
|
||||
// dockerGatewayIP gets the default gateway ip for the docker bridge on the user's host machine
|
||||
// gets the ip from user's host docker
|
||||
func dockerGatewayIP(profile string) (net.IP, error) {
|
||||
var bridgeID string
|
||||
// check if using custom network first
|
||||
if networkExists(profile) {
|
||||
ip := net.ParseIP(DefaultGateway)
|
||||
|
@ -70,8 +81,25 @@ func dockerGatewayIP(profile string) (net.IP, error) {
|
|||
if err != nil {
|
||||
return nil, errors.Wrapf(err, "get network bridge")
|
||||
}
|
||||
networksOutput := strings.TrimSpace(rr.Stdout.String())
|
||||
networksSlice := strings.Fields(networksOutput)
|
||||
// Look for the minikube container within each docker network
|
||||
for _, net := range networksSlice {
|
||||
// get all containers in the network
|
||||
rs, err := runCmd(exec.Command(Docker, "network", "inspect", net, "-f", "{{range $k, $v := .Containers}}{{$v.Name}} {{end}}"))
|
||||
if err != nil {
|
||||
return nil, errors.Wrapf(err, "get containers in network")
|
||||
}
|
||||
containersSlice := strings.Fields(rs.Stdout.String())
|
||||
if profileInContainers(profile, containersSlice) {
|
||||
bridgeID = net
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
bridgeID := strings.TrimSpace(rr.Stdout.String())
|
||||
if bridgeID == "" {
|
||||
return nil, errors.Errorf("unable to determine bridge network id from %q", networksOutput)
|
||||
}
|
||||
rr, err = runCmd(exec.Command(Docker, "network", "inspect",
|
||||
"--format", "{{(index .IPAM.Config 0).Gateway}}", bridgeID))
|
||||
if err != nil {
|
||||
|
|
|
@ -16,6 +16,13 @@ limitations under the License.
|
|||
|
||||
package oci
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"fmt"
|
||||
"path/filepath"
|
||||
"strings"
|
||||
)
|
||||
|
||||
const (
|
||||
// DefaultBindIPV4 is The default IP the container will listen on.
|
||||
DefaultBindIPV4 = "127.0.0.1"
|
||||
|
@ -102,6 +109,46 @@ type Mount struct {
|
|||
Propagation MountPropagation `protobuf:"varint,5,opt,name=propagation,proto3,enum=runtime.v1alpha2.MountPropagation" json:"propagation,omitempty"`
|
||||
}
|
||||
|
||||
// ParseMountString parses a mount string of format:
|
||||
// '[host-path:]container-path[:<options>]' The comma-delimited 'options' are
|
||||
// [rw|ro], [Z], [srhared|rslave|rprivate].
|
||||
func ParseMountString(spec string) (m Mount, err error) {
|
||||
switch fields := strings.Split(spec, ":"); len(fields) {
|
||||
case 0:
|
||||
err = errors.New("invalid empty spec")
|
||||
case 1:
|
||||
m.ContainerPath = fields[0]
|
||||
case 3:
|
||||
for _, opt := range strings.Split(fields[2], ",") {
|
||||
switch opt {
|
||||
case "Z":
|
||||
m.SelinuxRelabel = true
|
||||
case "ro":
|
||||
m.Readonly = true
|
||||
case "rw":
|
||||
m.Readonly = false
|
||||
case "rslave":
|
||||
m.Propagation = MountPropagationHostToContainer
|
||||
case "rshared":
|
||||
m.Propagation = MountPropagationBidirectional
|
||||
case "private":
|
||||
m.Propagation = MountPropagationNone
|
||||
default:
|
||||
err = fmt.Errorf("unknown mount option: '%s'", opt)
|
||||
}
|
||||
}
|
||||
fallthrough
|
||||
case 2:
|
||||
m.HostPath, m.ContainerPath = fields[0], fields[1]
|
||||
if !filepath.IsAbs(m.ContainerPath) {
|
||||
err = fmt.Errorf("'%s' container path must be absolute", m.ContainerPath)
|
||||
}
|
||||
default:
|
||||
err = errors.New("spec must be in form: <host path>:<container path>[:<options>]")
|
||||
}
|
||||
return m, err
|
||||
}
|
||||
|
||||
// PortMapping specifies a host port mapped into a container port.
|
||||
// In yaml this looks like:
|
||||
// containerPort: 80
|
||||
|
|
|
@ -65,12 +65,6 @@ etcd:
|
|||
dataDir: {{.EtcdDataDir}}
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://{{.AdvertiseAddress}}:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: {{.KubernetesVersion}}
|
||||
networking:
|
||||
dnsDomain: {{if .DNSDomain}}{{.DNSDomain}}{{else}}cluster.local{{end}}
|
||||
|
|
|
@ -68,12 +68,6 @@ etcd:
|
|||
{{- range $i, $val := printMapInOrder .EtcdExtraArgs ": " }}
|
||||
{{$val}}
|
||||
{{- end}}
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: {{.KubernetesVersion}}
|
||||
networking:
|
||||
dnsDomain: {{if .DNSDomain}}{{.DNSDomain}}{{else}}cluster.local{{end}}
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:12345
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -29,9 +29,11 @@ controllerManager:
|
|||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -43,12 +45,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: 1.1.1.1
|
||||
|
|
|
@ -24,6 +24,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -34,12 +40,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -27,8 +27,10 @@ apiServer:
|
|||
controllerManager:
|
||||
extraArgs:
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -40,12 +42,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.14.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:12345
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -29,9 +29,11 @@ controllerManager:
|
|||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -43,12 +45,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: 1.1.1.1
|
||||
|
|
|
@ -24,6 +24,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -34,12 +40,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -27,8 +27,10 @@ apiServer:
|
|||
controllerManager:
|
||||
extraArgs:
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -40,12 +42,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.15.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:12345
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -29,9 +29,11 @@ controllerManager:
|
|||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -43,12 +45,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: 1.1.1.1
|
||||
|
|
|
@ -24,6 +24,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -34,12 +40,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -27,8 +27,10 @@ apiServer:
|
|||
controllerManager:
|
||||
extraArgs:
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -40,12 +42,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
listen-metrics-urls: http://127.0.0.1:2381,http://1.1.1.1:2381
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.16.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:12345
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -29,9 +29,11 @@ controllerManager:
|
|||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -43,12 +45,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: 1.1.1.1
|
||||
|
|
|
@ -24,6 +24,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -34,12 +40,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -27,8 +27,10 @@ apiServer:
|
|||
controllerManager:
|
||||
extraArgs:
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -40,12 +42,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.17.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:12345
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -29,9 +29,11 @@ controllerManager:
|
|||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -43,12 +45,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: 1.1.1.1
|
||||
|
|
|
@ -24,6 +24,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -34,12 +40,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -27,8 +27,10 @@ apiServer:
|
|||
controllerManager:
|
||||
extraArgs:
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -40,12 +42,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.18.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:12345
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -29,9 +29,11 @@ controllerManager:
|
|||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
feature-gates: "a=b"
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -43,12 +45,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -23,6 +23,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -33,12 +39,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: 1.1.1.1
|
||||
|
|
|
@ -24,6 +24,12 @@ apiServer:
|
|||
certSANs: ["127.0.0.1", "localhost", "1.1.1.1"]
|
||||
extraArgs:
|
||||
enable-admission-plugins: "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
controlPlaneEndpoint: control-plane.minikube.internal:8443
|
||||
|
@ -34,12 +40,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -27,8 +27,10 @@ apiServer:
|
|||
controllerManager:
|
||||
extraArgs:
|
||||
kube-api-burst: "32"
|
||||
leader-elect: "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
leader-elect: "false"
|
||||
scheduler-name: "mini-scheduler"
|
||||
certificatesDir: /var/lib/minikube/certs
|
||||
clusterName: mk
|
||||
|
@ -40,12 +42,6 @@ etcd:
|
|||
dataDir: /var/lib/minikube/etcd
|
||||
extraArgs:
|
||||
proxy-refresh-interval: "70000"
|
||||
controllerManager:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
scheduler:
|
||||
extraArgs:
|
||||
"leader-elect": "false"
|
||||
kubernetesVersion: v1.19.0
|
||||
networking:
|
||||
dnsDomain: cluster.local
|
||||
|
|
|
@ -89,7 +89,6 @@ var versionSpecificOpts = []config.VersionedExtraOption{
|
|||
},
|
||||
GreaterThanOrEqual: semver.MustParse("1.14.0-alpha.0"),
|
||||
},
|
||||
|
||||
{
|
||||
Option: config.ExtraOption{
|
||||
Component: Kubelet,
|
||||
|
@ -98,4 +97,20 @@ var versionSpecificOpts = []config.VersionedExtraOption{
|
|||
},
|
||||
LessThanOrEqual: semver.MustParse("1.11.1000"),
|
||||
},
|
||||
{
|
||||
Option: config.ExtraOption{
|
||||
Component: ControllerManager,
|
||||
Key: "leader-elect",
|
||||
Value: "false",
|
||||
},
|
||||
GreaterThanOrEqual: semver.MustParse("1.14.0"),
|
||||
},
|
||||
{
|
||||
Option: config.ExtraOption{
|
||||
Component: Scheduler,
|
||||
Key: "leader-elect",
|
||||
Value: "false",
|
||||
},
|
||||
GreaterThanOrEqual: semver.MustParse("1.14.0"),
|
||||
},
|
||||
}
|
||||
|
|
|
@ -141,7 +141,7 @@ func dashboardFrontend(repo string) string {
|
|||
repo = "kubernetesui"
|
||||
}
|
||||
// See 'kubernetes-dashboard' in deploy/addons/dashboard/dashboard-dp.yaml
|
||||
return path.Join(repo, "dashboard:v2.0.1")
|
||||
return path.Join(repo, "dashboard:v2.0.3")
|
||||
}
|
||||
|
||||
// dashboardMetrics returns the image used for the dashboard metrics scraper
|
||||
|
|
|
@ -25,7 +25,7 @@ import (
|
|||
func TestAuxiliary(t *testing.T) {
|
||||
want := []string{
|
||||
"gcr.io/k8s-minikube/storage-provisioner:v3",
|
||||
"kubernetesui/dashboard:v2.0.1",
|
||||
"kubernetesui/dashboard:v2.0.3",
|
||||
"kubernetesui/metrics-scraper:v1.0.4",
|
||||
}
|
||||
got := auxiliary("")
|
||||
|
@ -37,7 +37,7 @@ func TestAuxiliary(t *testing.T) {
|
|||
func TestAuxiliaryMirror(t *testing.T) {
|
||||
want := []string{
|
||||
"test.mirror/storage-provisioner:v3",
|
||||
"test.mirror/dashboard:v2.0.1",
|
||||
"test.mirror/dashboard:v2.0.3",
|
||||
"test.mirror/metrics-scraper:v1.0.4",
|
||||
}
|
||||
got := auxiliary("test.mirror")
|
||||
|
|
|
@ -38,7 +38,7 @@ func TestKubeadmImages(t *testing.T) {
|
|||
"k8s.gcr.io/etcd:3.4.3-0",
|
||||
"k8s.gcr.io/pause:3.1",
|
||||
"gcr.io/k8s-minikube/storage-provisioner:v3",
|
||||
"kubernetesui/dashboard:v2.0.1",
|
||||
"kubernetesui/dashboard:v2.0.3",
|
||||
"kubernetesui/metrics-scraper:v1.0.4",
|
||||
}},
|
||||
{"v1.16.1", "mirror.k8s.io", []string{
|
||||
|
@ -50,7 +50,7 @@ func TestKubeadmImages(t *testing.T) {
|
|||
"mirror.k8s.io/etcd:3.3.15-0",
|
||||
"mirror.k8s.io/pause:3.1",
|
||||
"mirror.k8s.io/storage-provisioner:v3",
|
||||
"mirror.k8s.io/dashboard:v2.0.1",
|
||||
"mirror.k8s.io/dashboard:v2.0.3",
|
||||
"mirror.k8s.io/metrics-scraper:v1.0.4",
|
||||
}},
|
||||
{"v1.15.0", "", []string{
|
||||
|
@ -62,7 +62,7 @@ func TestKubeadmImages(t *testing.T) {
|
|||
"k8s.gcr.io/etcd:3.3.10",
|
||||
"k8s.gcr.io/pause:3.1",
|
||||
"gcr.io/k8s-minikube/storage-provisioner:v3",
|
||||
"kubernetesui/dashboard:v2.0.1",
|
||||
"kubernetesui/dashboard:v2.0.3",
|
||||
"kubernetesui/metrics-scraper:v1.0.4",
|
||||
}},
|
||||
{"v1.14.0", "", []string{
|
||||
|
@ -74,7 +74,7 @@ func TestKubeadmImages(t *testing.T) {
|
|||
"k8s.gcr.io/etcd:3.3.10",
|
||||
"k8s.gcr.io/pause:3.1",
|
||||
"gcr.io/k8s-minikube/storage-provisioner:v3",
|
||||
"kubernetesui/dashboard:v2.0.1",
|
||||
"kubernetesui/dashboard:v2.0.3",
|
||||
"kubernetesui/metrics-scraper:v1.0.4",
|
||||
}},
|
||||
{"v1.13.0", "", []string{
|
||||
|
@ -86,7 +86,7 @@ func TestKubeadmImages(t *testing.T) {
|
|||
"k8s.gcr.io/etcd:3.2.24",
|
||||
"k8s.gcr.io/pause:3.1",
|
||||
"gcr.io/k8s-minikube/storage-provisioner:v3",
|
||||
"kubernetesui/dashboard:v2.0.1",
|
||||
"kubernetesui/dashboard:v2.0.3",
|
||||
"kubernetesui/metrics-scraper:v1.0.4",
|
||||
}},
|
||||
{"v1.12.0", "", []string{
|
||||
|
@ -98,7 +98,7 @@ func TestKubeadmImages(t *testing.T) {
|
|||
"k8s.gcr.io/etcd:3.2.24",
|
||||
"k8s.gcr.io/pause:3.1",
|
||||
"gcr.io/k8s-minikube/storage-provisioner:v3",
|
||||
"kubernetesui/dashboard:v2.0.1",
|
||||
"kubernetesui/dashboard:v2.0.3",
|
||||
"kubernetesui/metrics-scraper:v1.0.4",
|
||||
}},
|
||||
}
|
||||
|
|
|
@ -45,6 +45,7 @@ type ClusterConfig struct {
|
|||
HyperkitVpnKitSock string // Only used by the Hyperkit driver
|
||||
HyperkitVSockPorts []string // Only used by the Hyperkit driver
|
||||
DockerEnv []string // Each entry is formatted as KEY=VALUE.
|
||||
ContainerVolumeMounts []string // Only used by container drivers: Docker, Podman
|
||||
InsecureRegistry []string
|
||||
RegistryMirror []string
|
||||
HostOnlyCIDR string // Only used by the virtualbox driver
|
||||
|
|
|
@ -25,7 +25,7 @@ func TestAddRepoTagToImageName(t *testing.T) {
|
|||
imgName string
|
||||
want string
|
||||
}{
|
||||
{"kubernetesui/dashboard:v2.0.1", "docker.io/kubernetesui/dashboard:v2.0.1"},
|
||||
{"kubernetesui/dashboard:v2.0.3", "docker.io/kubernetesui/dashboard:v2.0.3"},
|
||||
{"kubernetesui/metrics-scraper:v1.0.4", "docker.io/kubernetesui/metrics-scraper:v1.0.4"},
|
||||
{"gcr.io/k8s-minikube/storage-provisioner:v3", "gcr.io/k8s-minikube/storage-provisioner:v3"},
|
||||
}
|
||||
|
|
|
@ -33,12 +33,12 @@ func TestReplaceWinDriveLetterToVolumeName(t *testing.T) {
|
|||
if err != nil {
|
||||
t.Fatalf("Error make tmp directory: %v", err)
|
||||
}
|
||||
defer func() { //clean up tempdir
|
||||
defer func(path string) { //clean up tempdir
|
||||
err := os.RemoveAll(path)
|
||||
if err != nil {
|
||||
t.Errorf("failed to clean up temp folder %q", path)
|
||||
}
|
||||
}()
|
||||
}(path)
|
||||
|
||||
if runtime.GOOS != "windows" {
|
||||
// Replace to fake func.
|
||||
|
|
|
@ -70,6 +70,9 @@ var defaultClusterConfig = config.ClusterConfig{
|
|||
}
|
||||
|
||||
func TestCreateHost(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
download.EnableMock(true)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
|
@ -115,6 +118,9 @@ func TestCreateHost(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStartHostExists(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
download.EnableMock(true)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
|
@ -154,6 +160,9 @@ func TestStartHostExists(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStartHostErrMachineNotExist(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
download.EnableMock(true)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
|
@ -201,6 +210,9 @@ func TestStartHostErrMachineNotExist(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStartStoppedHost(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
download.EnableMock(true)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
|
@ -238,6 +250,9 @@ func TestStartStoppedHost(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStartHost(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
download.EnableMock(true)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
|
@ -268,6 +283,9 @@ func TestStartHost(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStartHostConfig(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
download.EnableMock(true)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
|
@ -310,6 +328,9 @@ func TestStopHostError(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStopHost(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
api := tests.NewMockAPI(t)
|
||||
h, err := createHost(api, &defaultClusterConfig, &config.Node{Name: "minikube"})
|
||||
|
@ -329,6 +350,9 @@ func TestStopHost(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestDeleteHost(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
api := tests.NewMockAPI(t)
|
||||
if _, err := createHost(api, &defaultClusterConfig, &config.Node{Name: "minikube"}); err != nil {
|
||||
|
@ -344,6 +368,9 @@ func TestDeleteHost(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestDeleteHostErrorDeletingVM(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
api := tests.NewMockAPI(t)
|
||||
h, err := createHost(api, &defaultClusterConfig, &config.Node{Name: "minikube"})
|
||||
|
@ -360,6 +387,9 @@ func TestDeleteHostErrorDeletingVM(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestDeleteHostErrorDeletingFiles(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
api := tests.NewMockAPI(t)
|
||||
api.RemoveError = true
|
||||
|
@ -373,6 +403,9 @@ func TestDeleteHostErrorDeletingFiles(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestDeleteHostErrMachineNotExist(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
api := tests.NewMockAPI(t)
|
||||
// Create an incomplete host with machine does not exist error(i.e. User Interrupt Cancel)
|
||||
|
@ -388,6 +421,9 @@ func TestDeleteHostErrMachineNotExist(t *testing.T) {
|
|||
}
|
||||
|
||||
func TestStatus(t *testing.T) {
|
||||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
|
||||
RegisterMockDriver(t)
|
||||
api := tests.NewMockAPI(t)
|
||||
|
||||
|
|
|
@ -136,7 +136,9 @@ func Start(starter Starter, apiServer bool) (*kubeconfig.Settings, error) {
|
|||
}
|
||||
|
||||
var wg sync.WaitGroup
|
||||
go configureMounts(&wg)
|
||||
if !driver.IsKIC(starter.Cfg.Driver) {
|
||||
go configureMounts(&wg)
|
||||
}
|
||||
|
||||
wg.Add(1)
|
||||
go func() {
|
||||
|
@ -148,6 +150,7 @@ func Start(starter Starter, apiServer bool) (*kubeconfig.Settings, error) {
|
|||
|
||||
// enable addons, both old and new!
|
||||
if starter.ExistingAddons != nil {
|
||||
wg.Add(1)
|
||||
go addons.Start(&wg, starter.Cfg, starter.ExistingAddons, config.AddonList)
|
||||
}
|
||||
|
||||
|
|
|
@ -67,8 +67,8 @@ func MaybePrintUpdateText(url string, lastUpdatePath string) bool {
|
|||
glog.Errorf("write time failed: %v", err)
|
||||
}
|
||||
url := "https://github.com/kubernetes/minikube/releases/tag/v" + latestVersion.String()
|
||||
out.ErrT(style.Celebrate, `minikube {{.version}} is available! Download it: {{.url}}`, out.V{"version": latestVersion, "url": url})
|
||||
out.ErrT(style.Tip, "To disable this notice, run: 'minikube config set WantUpdateNotification false'\n")
|
||||
out.T(style.Celebrate, `minikube {{.version}} is available! Download it: {{.url}}`, out.V{"version": latestVersion, "url": url})
|
||||
out.T(style.Tip, "To disable this notice, run: 'minikube config set WantUpdateNotification false'\n")
|
||||
return true
|
||||
}
|
||||
return false
|
||||
|
|
|
@ -154,7 +154,7 @@ func TestMaybePrintUpdateText(t *testing.T) {
|
|||
tempDir := tests.MakeTempDir()
|
||||
defer tests.RemoveTempDir(tempDir)
|
||||
outputBuffer := tests.NewFakeFile()
|
||||
out.SetErrFile(outputBuffer)
|
||||
out.SetOutFile(outputBuffer)
|
||||
|
||||
var tc = []struct {
|
||||
len int
|
||||
|
|
|
@ -58,6 +58,11 @@ func collectResults(ctx context.Context, binaries []*Binary, driver string) (*re
|
|||
return nil, errors.Wrapf(err, "timing run %d with %s", run, binary.Name())
|
||||
}
|
||||
rm.addResult(binary, r)
|
||||
r, err = timeEnableIngress(ctx, binary)
|
||||
if err != nil {
|
||||
return nil, errors.Wrapf(err, "timing run %d with %s", run, binary.Name())
|
||||
}
|
||||
rm.addResult(binary, r)
|
||||
}
|
||||
}
|
||||
return rm, nil
|
||||
|
@ -72,18 +77,10 @@ func average(nums []float64) float64 {
|
|||
}
|
||||
|
||||
// timeMinikubeStart returns the time it takes to execute `minikube start`
|
||||
// It deletes the VM after `minikube start`.
|
||||
func timeMinikubeStart(ctx context.Context, binary *Binary, driver string) (*result, error) {
|
||||
startCmd := exec.CommandContext(ctx, binary.path, "start", fmt.Sprintf("--driver=%s", driver))
|
||||
startCmd.Stderr = os.Stderr
|
||||
|
||||
deleteCmd := exec.CommandContext(ctx, binary.path, "delete")
|
||||
defer func() {
|
||||
if err := deleteCmd.Run(); err != nil {
|
||||
log.Printf("error deleting minikube: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
log.Printf("Running: %v...", startCmd.Args)
|
||||
r, err := timeCommandLogs(startCmd)
|
||||
if err != nil {
|
||||
|
@ -91,3 +88,24 @@ func timeMinikubeStart(ctx context.Context, binary *Binary, driver string) (*res
|
|||
}
|
||||
return r, nil
|
||||
}
|
||||
|
||||
// timeEnableIngress returns the time it takes to execute `minikube addons enable ingress`
|
||||
// It deletes the VM after `minikube addons enable ingress`.
|
||||
func timeEnableIngress(ctx context.Context, binary *Binary) (*result, error) {
|
||||
enableCmd := exec.CommandContext(ctx, binary.path, "addons enable ingress")
|
||||
enableCmd.Stderr = os.Stderr
|
||||
|
||||
deleteCmd := exec.CommandContext(ctx, binary.path, "delete")
|
||||
defer func() {
|
||||
if err := deleteCmd.Run(); err != nil {
|
||||
log.Printf("error deleting minikube: %v", err)
|
||||
}
|
||||
}()
|
||||
|
||||
log.Printf("Running: %v...", enableCmd.Args)
|
||||
r, err := timeCommandLogs(enableCmd)
|
||||
if err != nil {
|
||||
return nil, errors.Wrapf(err, "timing cmd: %v", enableCmd.Args)
|
||||
}
|
||||
return r, nil
|
||||
}
|
||||
|
|
|
@ -92,6 +92,17 @@ var resourceIssues = []match{
|
|||
},
|
||||
Regexp: re(`An existing connection was forcibly closed by the remote host`),
|
||||
},
|
||||
{
|
||||
// Fallback to deliver a good error message even if internal checks are not run
|
||||
Kind: Kind{
|
||||
ID: "RSRC_INSUFFICIENT_CORES",
|
||||
ExitCode: ExInsufficientCores,
|
||||
Advice: "Kubernetes requires at least 2 CPU's to start",
|
||||
Issues: []int{7905},
|
||||
URL: "https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/install-kubeadm/",
|
||||
},
|
||||
Regexp: re(`ERROR.*the number of available CPUs 1 is less than the required 2`),
|
||||
},
|
||||
}
|
||||
|
||||
// hostIssues are related to the host operating system or BIOS
|
||||
|
|
|
@ -155,7 +155,7 @@ var (
|
|||
}
|
||||
RsrcInsufficientDarwinDockerMemory = Kind{
|
||||
ID: "RSRC_DOCKER_MEMORY",
|
||||
ExitCode: ExInsufficientCores,
|
||||
ExitCode: ExInsufficientMemory,
|
||||
Advice: `1. Click on "Docker for Desktop" menu icon
|
||||
2. Click "Preferences"
|
||||
3. Click "Resources"
|
||||
|
|
|
@ -49,10 +49,20 @@ func init() {
|
|||
}
|
||||
|
||||
func configure(cc config.ClusterConfig, n config.Node) (interface{}, error) {
|
||||
mounts := make([]oci.Mount, len(cc.ContainerVolumeMounts))
|
||||
for i, spec := range cc.ContainerVolumeMounts {
|
||||
var err error
|
||||
mounts[i], err = oci.ParseMountString(spec)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
return kic.NewDriver(kic.Config{
|
||||
MachineName: driver.MachineName(cc, n),
|
||||
StorePath: localpath.MiniPath(),
|
||||
ImageDigest: cc.KicBaseImage,
|
||||
Mounts: mounts,
|
||||
CPU: cc.CPUs,
|
||||
Memory: cc.Memory,
|
||||
OCIBinary: oci.Docker,
|
||||
|
|
|
@ -63,10 +63,20 @@ func init() {
|
|||
}
|
||||
|
||||
func configure(cc config.ClusterConfig, n config.Node) (interface{}, error) {
|
||||
mounts := make([]oci.Mount, len(cc.ContainerVolumeMounts))
|
||||
for i, spec := range cc.ContainerVolumeMounts {
|
||||
var err error
|
||||
mounts[i], err = oci.ParseMountString(spec)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
|
||||
return kic.NewDriver(kic.Config{
|
||||
MachineName: driver.MachineName(cc, n),
|
||||
StorePath: localpath.MiniPath(),
|
||||
ImageDigest: strings.Split(cc.KicBaseImage, "@")[0], // for podman does not support docker images references with both a tag and digest.
|
||||
Mounts: mounts,
|
||||
CPU: cc.CPUs,
|
||||
Memory: cc.Memory,
|
||||
OCIBinary: oci.Podman,
|
||||
|
|
|
@ -2,16 +2,18 @@
|
|||
|
||||
A Linux VM with the following:
|
||||
|
||||
* Docker
|
||||
* systemd (OpenRC based systems are also supported in v1.10+)
|
||||
* systemd or OpenRC
|
||||
* a container runtime, such as Docker or CRIO
|
||||
|
||||
This VM must also meet the [kubeadm requirements.](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/install-kubeadm/)
|
||||
This VM must also meet the [kubeadm requirements](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/install-kubeadm/), such as:
|
||||
|
||||
Kubernetes v1.18+ needs conntract to be installed on debian based machines.
|
||||
|
||||
```shell
|
||||
sudo apt-get install conntrack -y
|
||||
```
|
||||
* 2 CPU's
|
||||
* 2GB RAM
|
||||
* iptables (in legacy mode)
|
||||
* conntrack
|
||||
* crictl
|
||||
* SELinux permissive
|
||||
* cgroups v1 (v2 is not yet supported by Kubernetes)
|
||||
|
||||
## Usage
|
||||
|
||||
|
|
Loading…
Reference in New Issue