feat: update Kubernetes to v1.32.0-alpha.3

See https://github.com/kubernetes/kubernetes/releases/tag/v1.32.0-alpha.3

Signed-off-by: Andrey Smirnov <andrey.smirnov@siderolabs.com>
This commit is contained in:
Andrey Smirnov
2024-10-30 18:45:27 +04:00
parent 0b8b356777
commit 3e16ab135e
9 changed files with 59 additions and 59 deletions

View File

@@ -104,7 +104,7 @@ INTEGRATION_TEST := integration-test
INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM)
INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM)
# renovate: datasource=github-releases depName=kubernetes/kubernetes
KUBECTL_VERSION ?= v1.32.0-alpha.2
KUBECTL_VERSION ?= v1.32.0-alpha.3
# renovate: datasource=github-releases depName=kastenhq/kubestr
KUBESTR_VERSION ?= v0.4.46
# renovate: datasource=github-releases depName=helm/helm

24
go.mod
View File

@@ -37,16 +37,16 @@ replace (
// Kubernetes dependencies sharing the same version.
require (
k8s.io/api v0.32.0-alpha.2
k8s.io/apimachinery v0.32.0-alpha.2
k8s.io/apiserver v0.32.0-alpha.2
k8s.io/client-go v0.32.0-alpha.2
k8s.io/component-base v0.32.0-alpha.2
k8s.io/cri-api v0.32.0-alpha.2
k8s.io/kube-scheduler v0.32.0-alpha.2
k8s.io/kubectl v0.32.0-alpha.2
k8s.io/kubelet v0.32.0-alpha.2
k8s.io/pod-security-admission v0.32.0-alpha.2
k8s.io/api v0.32.0-alpha.3
k8s.io/apimachinery v0.32.0-alpha.3
k8s.io/apiserver v0.32.0-alpha.3
k8s.io/client-go v0.32.0-alpha.3
k8s.io/component-base v0.32.0-alpha.3
k8s.io/cri-api v0.32.0-alpha.3
k8s.io/kube-scheduler v0.32.0-alpha.3
k8s.io/kubectl v0.32.0-alpha.3
k8s.io/kubelet v0.32.0-alpha.3
k8s.io/pod-security-admission v0.32.0-alpha.3
)
require (
@@ -150,7 +150,7 @@ require (
github.com/siderolabs/go-debug v0.4.0
github.com/siderolabs/go-kmsg v0.1.4
github.com/siderolabs/go-kubeconfig v0.1.0
github.com/siderolabs/go-kubernetes v0.2.13
github.com/siderolabs/go-kubernetes v0.2.14
github.com/siderolabs/go-loadbalancer v0.3.4
github.com/siderolabs/go-pcidb v0.3.0
github.com/siderolabs/go-pointer v1.0.0
@@ -364,7 +364,7 @@ require (
gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect
gopkg.in/inf.v0 v0.9.1 // indirect
gopkg.in/yaml.v2 v2.4.0 // indirect
k8s.io/cli-runtime v0.32.0-alpha.2 // indirect
k8s.io/cli-runtime v0.32.0-alpha.3 // indirect
k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2 // indirect
k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 // indirect
kernel.org/pub/linux/libs/security/libcap/psx v1.2.70 // indirect

48
go.sum
View File

@@ -650,8 +650,8 @@ github.com/siderolabs/go-kmsg v0.1.4 h1:RLAa90O9bWuhA3pXPAYAdrI+kzcqTshZASRA5yso
github.com/siderolabs/go-kmsg v0.1.4/go.mod h1:BLkt2N2DHT0wsFMz32lMw6vNEZL90c8ZnBjpIUoBb/M=
github.com/siderolabs/go-kubeconfig v0.1.0 h1:t/2oMWkLSdWHXglKPMz8ySXnx6ZjHckeGY79NaDcBTo=
github.com/siderolabs/go-kubeconfig v0.1.0/go.mod h1:eM3mO02Td6wYDvdi9zTbMrj1Q4WqEFN8XQ6pNjCUWkI=
github.com/siderolabs/go-kubernetes v0.2.13 h1:rgrywXOaeSBaGUKNXnk0jluMp4KxAlCRHcTfHObuzEI=
github.com/siderolabs/go-kubernetes v0.2.13/go.mod h1:AdKFBs9LowXKmHLMnbe8YFJQjfJKj6gW/sn+n1GwJyw=
github.com/siderolabs/go-kubernetes v0.2.14 h1:E0VK/vw6t9MS8Jcdd1R9tNE00EQBfJAWpl2/ex9FeSM=
github.com/siderolabs/go-kubernetes v0.2.14/go.mod h1:ElwMMmkNLrSRdAMqOouN9RZbO4G3CM5fJ0F5CBRsGRE=
github.com/siderolabs/go-loadbalancer v0.3.4 h1:clxUefcY20djLdHMrh2j3rjVYDwDApXh1us/6cgrgoo=
github.com/siderolabs/go-loadbalancer v0.3.4/go.mod h1:v0ziDvpArNRSF5LO0PIPQIPIYYHxX/fk+Vlg0wuSIiM=
github.com/siderolabs/go-pcidb v0.3.0 h1:jR4w1YLNY8Cv1o5jnoQ2Q+pbxcosO2FVFrAAp1RURnw=
@@ -1106,32 +1106,32 @@ gvisor.dev/gvisor v0.0.0-20240331093104-8c9cbf0d9090/go.mod h1:NQHVAzMwvZ+Qe3ElS
honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4=
k8s.io/api v0.32.0-alpha.2 h1:kGzoa28DrhUid+yqSuTTLFq+MwIdu8Qe19J+6O+zKCw=
k8s.io/api v0.32.0-alpha.2/go.mod h1:/3IPpkid+XQTMsxP04j5A4w+NnE8Ul7b0bum8frakos=
k8s.io/apimachinery v0.32.0-alpha.2 h1:ys10y0kam0MmNCBjk9cp60CclID54ojo1VSO6ejhoVg=
k8s.io/apimachinery v0.32.0-alpha.2/go.mod h1:y/FzDt/GaPgPceo5rJcCtD4qW5l8SwtbzESSMGEY6P8=
k8s.io/apiserver v0.32.0-alpha.2 h1:AGcXfJUFq+GLryG15pAa2PH8egMBbdh8rgBjTlTD1Ls=
k8s.io/apiserver v0.32.0-alpha.2/go.mod h1:WUqEgUO0gc7U/uMaaypYOCj14Nzdb641WCK+ysEw/0M=
k8s.io/cli-runtime v0.32.0-alpha.2 h1:LhuNx0kPbkF/mYMfktnRMAOPMr3iIZwMbJcWDKLIE80=
k8s.io/cli-runtime v0.32.0-alpha.2/go.mod h1:DFx4wBap+iXd1lGF6et5SGwR5l8KOag5Doc1ULfC+Sw=
k8s.io/client-go v0.32.0-alpha.2 h1:wY8yU6Z+VmvrU8h0ugLNPTBiKk7Q1kiK9/2nsiwOb0w=
k8s.io/client-go v0.32.0-alpha.2/go.mod h1:MNu5a0Q6iCdZHZWN/raGXOf+z4YIoC1Aj6IYdvcdKSI=
k8s.io/component-base v0.32.0-alpha.2 h1:Sq8cWVmvPwrNGDYhIkhjc65sGwYFkhhIQKdVjZR4V44=
k8s.io/component-base v0.32.0-alpha.2/go.mod h1:YPyM2sUsjiC2hmV/3zR5lOLD5xvZ8fW2HOXzWQzuUXg=
k8s.io/cri-api v0.32.0-alpha.2 h1:v0oCOuahvb0xu7v7RPlspMFxNoxtKJmb+ZZ+jBYfepw=
k8s.io/cri-api v0.32.0-alpha.2/go.mod h1:ca9lKDUa9PmUGVDSSetDQqgf0dyk/NW8u+MpJo7JaYA=
k8s.io/api v0.32.0-alpha.3 h1:SCix13lbG8n/cmbYeYp1vkmlS4ccgGwaq83Y7G603GY=
k8s.io/api v0.32.0-alpha.3/go.mod h1:e5tjATGvBey/pzjehc7Od+VJCiDJp0iajdkFhxvJD4I=
k8s.io/apimachinery v0.32.0-alpha.3 h1:AmhRgOkgXFBLu2prIySmIS4KLGFiZKzeMMxnPPtEhnA=
k8s.io/apimachinery v0.32.0-alpha.3/go.mod h1:y/FzDt/GaPgPceo5rJcCtD4qW5l8SwtbzESSMGEY6P8=
k8s.io/apiserver v0.32.0-alpha.3 h1:FJ3NbaL4hsGS19WMncuRr/JcLSVf7u4V61o7DVJ5Aj4=
k8s.io/apiserver v0.32.0-alpha.3/go.mod h1:8jSFI9UaPqfAeCxjNWjGwCyTp/Iiir8gCXOXTuchMiA=
k8s.io/cli-runtime v0.32.0-alpha.3 h1:DV5Wt+7P7UxIL2Fr85J6TMHBHlLqBK1/QxHM+kdMeus=
k8s.io/cli-runtime v0.32.0-alpha.3/go.mod h1:q4TgXkgBvalJ613C9NfS2VUrUA9QowEdj6rL4qjF8xk=
k8s.io/client-go v0.32.0-alpha.3 h1:+n6BNhTFmoUe1QrIOPm2q5OUI8T5yqQuHRdXdz8x2GQ=
k8s.io/client-go v0.32.0-alpha.3/go.mod h1:dJ1NeBlMJchPGs/eH9m0R7JePiMGFpRyNqo46j1vplE=
k8s.io/component-base v0.32.0-alpha.3 h1:8V9eDGTJhSNZO3QJIVNW8lc6CEls3UeQ5Wlup6E42Oc=
k8s.io/component-base v0.32.0-alpha.3/go.mod h1:Vi4/eGNdpRRd3BRYvFK3cTOkwnYw8+Zn7qrH/9stC3Q=
k8s.io/cri-api v0.32.0-alpha.3 h1:OUAlaVOWLeEavxfSz4csuTUoh18NLL428MfErm3X8+w=
k8s.io/cri-api v0.32.0-alpha.3/go.mod h1:ca9lKDUa9PmUGVDSSetDQqgf0dyk/NW8u+MpJo7JaYA=
k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk=
k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE=
k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2 h1:GKE9U8BH16uynoxQii0auTjmmmuZ3O0LFMN6S0lPPhI=
k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2/go.mod h1:coRQXBK9NxO98XUv3ZD6AK3xzHCxV6+b7lrquKwaKzA=
k8s.io/kube-scheduler v0.32.0-alpha.2 h1:3EWYqipPl/8Jgvan+ZOw4e+t8kRxm9HbpZn7sUjF+KQ=
k8s.io/kube-scheduler v0.32.0-alpha.2/go.mod h1:cTI39hJm/j57voACiVy6hvJUYWSHmU8IKHj0KXVyvnU=
k8s.io/kubectl v0.32.0-alpha.2 h1:ORj13guFN6eaGb5S0MR+XisA4feAfFkJWdD7o9bB+XA=
k8s.io/kubectl v0.32.0-alpha.2/go.mod h1:97Da6nCRG5+NpmeI65kQXln/MdeZPNN71EQfRDtlIWY=
k8s.io/kubelet v0.32.0-alpha.2 h1:CYQgjxjEoI2uuRV8thQxbhRg63YZWvmtXzLbikRXV3s=
k8s.io/kubelet v0.32.0-alpha.2/go.mod h1:MG+qkvs/5r8LJo9JIjK0VIprGl9e5Se3w/Hcxz3F6co=
k8s.io/pod-security-admission v0.32.0-alpha.2 h1:871khuHnrAdNlJYkyWgrBmZxSzCp9v0gB/elbWb/9jM=
k8s.io/pod-security-admission v0.32.0-alpha.2/go.mod h1:diZsecfzpmnmRux3vB7MdEIrlNeTAuQ3xz5395EHfrU=
k8s.io/kube-scheduler v0.32.0-alpha.3 h1:ud6Tz5u6mxvhq4C5yqKWU57R41UMFNE+Dd63ejsNf90=
k8s.io/kube-scheduler v0.32.0-alpha.3/go.mod h1:uRk+Th/ND4AJz97y7m/vVYuCMES9l/tZv1ToMd52Q9k=
k8s.io/kubectl v0.32.0-alpha.3 h1:4N/7FkNwkw2VOQRSLOm7PjpJqEMPbuzpAlhUyisxbA4=
k8s.io/kubectl v0.32.0-alpha.3/go.mod h1:alzmRd9FafXyfcdV3MWtLjemXrNgBp3O5kBX/Z1Xa/Y=
k8s.io/kubelet v0.32.0-alpha.3 h1:Ipl/u8+frS6vOcxKQKP/mRY7jYFPCat2Z/w/zzxlUwM=
k8s.io/kubelet v0.32.0-alpha.3/go.mod h1:CNko3NUxlXQFjLdvdGLHl4Fs5hxf/inb09lOCXcwDlU=
k8s.io/pod-security-admission v0.32.0-alpha.3 h1:5t6eLvBEEiLsB7XIMAGFzBQhPnA7zebO2/KWPeVB2uo=
k8s.io/pod-security-admission v0.32.0-alpha.3/go.mod h1:HOqwkmey6Z/Rc1FV5wXLUUSnZ2thBvw0MyW/gLd5Xuc=
k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 h1:pUdcCO1Lk/tbT5ztQWOBi5HBgbBP1J8+AsQnQCKsi8A=
k8s.io/utils v0.0.0-20240711033017-18e509b52bc8/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0=
kernel.org/pub/linux/libs/security/libcap/cap v1.2.70 h1:QnLPkuDWWbD5C+3DUA2IUXai5TK6w2zff+MAGccqdsw=

View File

@@ -21,7 +21,7 @@ preface = """
Linux: 6.6.58
containerd: 2.0.0-rc.6
Flannel: 0.26.0
Kubernetes: 1.32.0-alpha.2
Kubernetes: 1.32.0-alpha.3
runc: 1.2.0
Talos is built with Go 1.23.2.

View File

@@ -33,7 +33,7 @@ export TALOS_VERSION
# Kubernetes
export KUBECONFIG="${TMP}/kubeconfig"
export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-alpha.2}
export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-alpha.3}
export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}"
export TIMEOUT=1200

View File

@@ -354,7 +354,7 @@ const (
// DefaultKubernetesVersion is the default target version of the control plane.
// renovate: datasource=github-releases depName=kubernetes/kubernetes
DefaultKubernetesVersion = "1.32.0-alpha.2"
DefaultKubernetesVersion = "1.32.0-alpha.3"
// SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards.
SupportedKubernetesVersions = 6

View File

@@ -6,7 +6,7 @@ images: ["images/talos-dev-banner.png"]
cascade:
type: docs
lastRelease: v1.9.0-alpha.0
kubernetesRelease: "1.32.0-alpha.2"
kubernetesRelease: "1.32.0-alpha.3"
prevKubernetesRelease: "1.31.1"
nvidiaContainerToolkitRelease: "v1.16.1"
nvidiaDriverRelease: "535.183.06"

View File

@@ -185,7 +185,7 @@ talosctl cluster create [flags]
--ipxe-boot-script string iPXE boot script (URL) to use
--iso-path string the ISO path to use for the initial boot (VM only)
--kubeprism-port int KubePrism port (set to 0 to disable) (default 7445)
--kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.2")
--kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.3")
--memory int the limit on memory usage in MB (each control plane/VM) (default 2048)
--memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048)
--mtu int MTU of the cluster network (default 1500)
@@ -1385,7 +1385,7 @@ talosctl gen config <cluster name> <cluster endpoint> [flags]
-h, --help help for config
--install-disk string the disk to install to (default "/dev/sda")
--install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest")
--kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.2")
--kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.3")
-o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout
-t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig])
-p, --persist the desired persist value for configs (default true)
@@ -2998,7 +2998,7 @@ talosctl upgrade-k8s [flags]
--pre-pull-images pre-pull images before upgrade (default true)
--proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy")
--scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler")
--to string the Kubernetes control plane version to upgrade to (default "1.32.0-alpha.2")
--to string the Kubernetes control plane version to upgrade to (default "1.32.0-alpha.3")
--upgrade-kubelet upgrade kubelet service (default true)
--with-docs patch all machine configs adding the documentation for each field (default true)
--with-examples patch all machine configs with the commented examples (default true)

View File

@@ -90,7 +90,7 @@ controlPlane:
{{< /highlight >}}</details> | |
|`kubelet` |<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
kubelet:
image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.2 # The `image` field is an optional reference to an alternative kubelet image.
image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.3 # The `image` field is an optional reference to an alternative kubelet image.
# The `extraArgs` field is used to provide additional flags to the kubelet.
extraArgs:
feature-gates: ServerSideApply=true
@@ -507,7 +507,7 @@ KubeletConfig represents the kubelet config values.
{{< highlight yaml >}}
machine:
kubelet:
image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.2 # The `image` field is an optional reference to an alternative kubelet image.
image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.3 # The `image` field is an optional reference to an alternative kubelet image.
# The `extraArgs` field is used to provide additional flags to the kubelet.
extraArgs:
feature-gates: ServerSideApply=true
@@ -560,7 +560,7 @@ machine:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The `image` field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.2
image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.3
{{< /highlight >}}</details> | |
|`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
clusterDNS:
@@ -2956,7 +2956,7 @@ serviceAccount:
{{< /highlight >}}</details> | |
|`apiServer` |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
apiServer:
image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.2 # The container image used in the API server manifest.
image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.3 # The container image used in the API server manifest.
# Extra arguments to supply to the API server.
extraArgs:
feature-gates: ServerSideApply=true
@@ -2995,14 +2995,14 @@ apiServer:
{{< /highlight >}}</details> | |
|`controllerManager` |<a href="#Config.cluster.controllerManager">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
controllerManager:
image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.2 # The container image used in the controller manager manifest.
image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.3 # The container image used in the controller manager manifest.
# Extra arguments to supply to the controller manager.
extraArgs:
feature-gates: ServerSideApply=true
{{< /highlight >}}</details> | |
|`proxy` |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}}
proxy:
image: registry.k8s.io/kube-proxy:v1.32.0-alpha.2 # The container image used in the kube-proxy manifest.
image: registry.k8s.io/kube-proxy:v1.32.0-alpha.3 # The container image used in the kube-proxy manifest.
mode: ipvs # proxy mode of kube-proxy.
# Extra arguments to supply to kube-proxy.
extraArgs:
@@ -3013,7 +3013,7 @@ proxy:
{{< /highlight >}}</details> | |
|`scheduler` |<a href="#Config.cluster.scheduler">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
scheduler:
image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.2 # The container image used in the scheduler manifest.
image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.3 # The container image used in the scheduler manifest.
# Extra arguments to supply to the scheduler.
extraArgs:
feature-gates: AllBeta=true
@@ -3257,7 +3257,7 @@ APIServerConfig represents the kube apiserver configuration options.
{{< highlight yaml >}}
cluster:
apiServer:
image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.2 # The container image used in the API server manifest.
image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.3 # The container image used in the API server manifest.
# Extra arguments to supply to the API server.
extraArgs:
feature-gates: ServerSideApply=true
@@ -3299,7 +3299,7 @@ cluster:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.2
image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.3
{{< /highlight >}}</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to the API server. | |
|`extraVolumes` |<a href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the API server static pod. | |
@@ -3438,7 +3438,7 @@ ControllerManagerConfig represents the kube controller manager configuration opt
{{< highlight yaml >}}
cluster:
controllerManager:
image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.2 # The container image used in the controller manager manifest.
image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.3 # The container image used in the controller manager manifest.
# Extra arguments to supply to the controller manager.
extraArgs:
feature-gates: ServerSideApply=true
@@ -3448,7 +3448,7 @@ cluster:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.2
image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.3
{{< /highlight >}}</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | |
|`extraVolumes` |<a href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the controller manager static pod. | |
@@ -3518,7 +3518,7 @@ ProxyConfig represents the kube proxy configuration options.
{{< highlight yaml >}}
cluster:
proxy:
image: registry.k8s.io/kube-proxy:v1.32.0-alpha.2 # The container image used in the kube-proxy manifest.
image: registry.k8s.io/kube-proxy:v1.32.0-alpha.3 # The container image used in the kube-proxy manifest.
mode: ipvs # proxy mode of kube-proxy.
# Extra arguments to supply to kube-proxy.
extraArgs:
@@ -3535,7 +3535,7 @@ cluster:
disabled: false
{{< /highlight >}}</details> | |
|`image` |string |The container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-proxy:v1.32.0-alpha.2
image: registry.k8s.io/kube-proxy:v1.32.0-alpha.3
{{< /highlight >}}</details> | |
|`mode` |string |<details><summary>proxy mode of kube-proxy.</summary>The default is 'iptables'.</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | |
@@ -3554,7 +3554,7 @@ SchedulerConfig represents the kube scheduler configuration options.
{{< highlight yaml >}}
cluster:
scheduler:
image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.2 # The container image used in the scheduler manifest.
image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.3 # The container image used in the scheduler manifest.
# Extra arguments to supply to the scheduler.
extraArgs:
feature-gates: AllBeta=true
@@ -3564,7 +3564,7 @@ cluster:
| Field | Type | Description | Value(s) |
|-------|------|-------------|----------|
|`image` |string |The container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.2
image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.3
{{< /highlight >}}</details> | |
|`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | |
|`extraVolumes` |<a href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a> |Extra volumes to mount to the scheduler static pod. | |