Skip to content

Instantly share code, notes, and snippets.

@twecker137
Created July 14, 2020 09:13
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save twecker137/a96b190b2d9b6bcf30511dcc2ca3b22a to your computer and use it in GitHub Desktop.
Save twecker137/a96b190b2d9b6bcf30511dcc2ca3b22a to your computer and use it in GitHub Desktop.
Trying to upgrade rke cluster
cluster_name: pi-rancher
kubernetes_version: v1.17.2-rancher1-2
nodes:
- address: 10.10.1.2
hostname_override: service-rancher-2 # friendly name for Rancher
user: devadmin
role: [ "controlplane", "etcd", "worker" ]
ssh_key_path: /root/.ssh/id_rsa
- address: 10.10.1.3
hostname_override: service-rancher-3 # friendly name for Rancher
user: devadmin
role: [ "controlplane", "etcd", "worker" ]
ssh_key_path: /root/.ssh/id_rsa
- address: 10.10.1.4
hostname_override: service-rancher-4 # friendly name for Rancher
user: devadmin
role: [ "controlplane", "etcd", "worker" ]
ssh_key_path: /root/.ssh/id_rsa
private_registries:
- url: domain.de/public_docker_registry
user: <user>
password: '<password>'
is_default: true # for rancher system images
# <several non default registries>
network:
plugin: weave
weave_network_provider:
password: "<password>"
services:
etcd:
uid: 80001
gid: 80001
# backup_config:
# enabled: true # enables recurring etcd snapshots
# interval_hours: 6 # time increment between snapshots
# retention: 60 # time in days before snapshot purge
kubelet:
extra_args:
authorization-mode: "Webhook"
streaming-connection-idle-timeout: "30m"
protect-kernel-defaults: "true"
make-iptables-util-chains: "true"
event-qps: "0"
anonymous-auth: "false"
feature-gates: "RotateKubeletServerCertificate=true"
tls-cipher-suites: "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256"
kube-api:
pod_security_policy: true
extra_args:
anonymous-auth: "false"
profiling: "false"
service-account-lookup: "true"
enable-admission-plugins: "ServiceAccount,NamespaceLifecycle,LimitRanger,PersistentVolumeLabel,DefaultStorageClass,ResourceQuota,DefaultTolerationSeconds,AlwaysPullImages,DenyEscalatingExec,NodeRestriction,EventRateLimit,PodSecurityPolicy"
encryption-provider-config: /opt/kubernetes/encryption.yaml
admission-control-config-file: "/opt/kubernetes/admission.yaml"
audit-log-path: "/var/log/kube-audit/audit-log.json"
audit-log-maxage: "5"
audit-log-maxbackup: "5"
audit-log-maxsize: "100"
audit-log-format: "json"
audit-policy-file: /opt/kubernetes/audit.yaml
tls-cipher-suites: "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256"
extra_binds:
- "/vol1/custom/log/kubernetes/kube-audit:/var/log/kube-audit"
- "/vol1/k8s/kubernetes:/opt/kubernetes"
scheduler:
extra_args:
address: "127.0.0.1"
profiling: "false"
kube-controller:
extra_args:
address: "127.0.0.1"
profiling: "false"
terminated-pod-gc-threshold: "1000"
feature-gates: "RotateKubeletServerCertificate=true"
#addons_include:
# - ../../addons/psp.yaml
# - ../../addons/monitoring.yaml
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment