-
Notifications
You must be signed in to change notification settings - Fork 14.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Remove cloud provider and move to ARM64
- Loading branch information
1 parent
79a3f79
commit a9cb5f7
Showing
37 changed files
with
1,255 additions
and
2,109 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -48,3 +48,4 @@ service-account.csr | |
service-account.pem | ||
service-account-csr.json | ||
*.swp | ||
.idea/ |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,206 @@ | ||
[req] | ||
distinguished_name = req_distinguished_name | ||
prompt = no | ||
x509_extensions = ca_x509_extensions | ||
|
||
[ca_x509_extensions] | ||
basicConstraints = CA:TRUE | ||
keyUsage = cRLSign, keyCertSign | ||
|
||
[req_distinguished_name] | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
CN = CA | ||
|
||
[admin] | ||
distinguished_name = admin_distinguished_name | ||
prompt = no | ||
req_extensions = default_req_extensions | ||
|
||
[admin_distinguished_name] | ||
CN = admin | ||
O = system:masters | ||
|
||
# Service Accounts | ||
# | ||
# The Kubernetes Controller Manager leverages a key pair to generate | ||
# and sign service account tokens as described in the | ||
# [managing service accounts](https://kubernetes.io/docs/admin/service-accounts-admin/) | ||
# documentation. | ||
|
||
[service-accounts] | ||
distinguished_name = service-accounts_distinguished_name | ||
prompt = no | ||
req_extensions = default_req_extensions | ||
|
||
[service-accounts_distinguished_name] | ||
CN = service-accounts | ||
|
||
# Worker Nodes | ||
# | ||
# Kubernetes uses a [special-purpose authorization mode](https://kubernetes.io/docs/admin/authorization/node/) | ||
# called Node Authorizer, that specifically authorizes API requests made | ||
# by [Kubelets](https://kubernetes.io/docs/concepts/overview/components/#kubelet). | ||
# In order to be authorized by the Node Authorizer, Kubelets must use a credential | ||
# that identifies them as being in the `system:nodes` group, with a username | ||
# of `system:node:<nodeName>`. | ||
|
||
[node-0] | ||
distinguished_name = node-0_distinguished_name | ||
prompt = no | ||
req_extensions = node-0_req_extensions | ||
|
||
[node-0_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth, serverAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Node-0 Certificate" | ||
subjectAltName = DNS:node-0, IP:127.0.0.1 | ||
subjectKeyIdentifier = hash | ||
|
||
[node-0_distinguished_name] | ||
CN = system:node:node-0 | ||
O = system:nodes | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
|
||
[node-1] | ||
distinguished_name = node-1_distinguished_name | ||
prompt = no | ||
req_extensions = node-1_req_extensions | ||
|
||
[node-1_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth, serverAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Node-1 Certificate" | ||
subjectAltName = DNS:node-1, IP:127.0.0.1 | ||
subjectKeyIdentifier = hash | ||
|
||
[node-1_distinguished_name] | ||
CN = system:node:node-1 | ||
O = system:nodes | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
|
||
|
||
# Kube Proxy Section | ||
[kube-proxy] | ||
distinguished_name = kube-proxy_distinguished_name | ||
prompt = no | ||
req_extensions = kube-proxy_req_extensions | ||
|
||
[kube-proxy_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth, serverAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Kube Proxy Certificate" | ||
subjectAltName = DNS:kube-proxy, IP:127.0.0.1 | ||
subjectKeyIdentifier = hash | ||
|
||
[kube-proxy_distinguished_name] | ||
CN = system:kube-proxy | ||
O = system:node-proxier | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
|
||
|
||
# Controller Manager | ||
[kube-controller-manager] | ||
distinguished_name = kube-controller-manager_distinguished_name | ||
prompt = no | ||
req_extensions = kube-controller-manager_req_extensions | ||
|
||
[kube-controller-manager_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth, serverAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Kube Controller Manager Certificate" | ||
subjectAltName = DNS:kube-proxy, IP:127.0.0.1 | ||
subjectKeyIdentifier = hash | ||
|
||
[kube-controller-manager_distinguished_name] | ||
CN = system:kube-controller-manager | ||
O = system:kube-controller-manager | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
|
||
|
||
# Scheduler | ||
[kube-scheduler] | ||
distinguished_name = kube-scheduler_distinguished_name | ||
prompt = no | ||
req_extensions = kube-scheduler_req_extensions | ||
|
||
[kube-scheduler_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth, serverAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Kube Scheduler Certificate" | ||
subjectAltName = DNS:kube-scheduler, IP:127.0.0.1 | ||
subjectKeyIdentifier = hash | ||
|
||
[kube-scheduler_distinguished_name] | ||
CN = system:kube-scheduler | ||
O = system:system:kube-scheduler | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
|
||
|
||
# API Server | ||
# | ||
# The Kubernetes API server is automatically assigned the `kubernetes` | ||
# internal dns name, which will be linked to the first IP address (`10.32.0.1`) | ||
# from the address range (`10.32.0.0/24`) reserved for internal cluster | ||
# services. | ||
|
||
[kube-api-server] | ||
distinguished_name = kube-api-server_distinguished_name | ||
prompt = no | ||
req_extensions = kube-api-server_req_extensions | ||
|
||
[kube-api-server_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth, serverAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Kube Scheduler Certificate" | ||
subjectAltName = @kube-api-server_alt_names | ||
subjectKeyIdentifier = hash | ||
|
||
[kube-api-server_alt_names] | ||
IP.0 = 127.0.0.1 | ||
IP.1 = 10.32.0.1 | ||
DNS.0 = kubernetes | ||
DNS.1 = kubernetes.default | ||
DNS.2 = kubernetes.default.svc | ||
DNS.3 = kubernetes.default.svc.cluster | ||
DNS.4 = kubernetes.svc.cluster.local | ||
DNS.5 = server.kubernetes.local | ||
DNS.6 = api-server.kubernetes.local | ||
|
||
[kube-api-server_distinguished_name] | ||
CN = kubernetes | ||
C = US | ||
ST = Washington | ||
L = Seattle | ||
|
||
|
||
[default_req_extensions] | ||
basicConstraints = CA:FALSE | ||
extendedKeyUsage = clientAuth | ||
keyUsage = critical, digitalSignature, keyEncipherment | ||
nsCertType = client | ||
nsComment = "Admin Client Certificate" | ||
subjectKeyIdentifier = hash |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,15 @@ | ||
{ | ||
"cniVersion": "1.0.0", | ||
"name": "bridge", | ||
"type": "bridge", | ||
"bridge": "cni0", | ||
"isGateway": true, | ||
"ipMasq": true, | ||
"ipam": { | ||
"type": "host-local", | ||
"ranges": [ | ||
[{"subnet": "SUBNET"}] | ||
], | ||
"routes": [{"dst": "0.0.0.0/0"}] | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,5 @@ | ||
{ | ||
"cniVersion": "1.1.0", | ||
"name": "lo", | ||
"type": "loopback" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
version = 2 | ||
|
||
[plugins."io.containerd.grpc.v1.cri"] | ||
[plugins."io.containerd.grpc.v1.cri".containerd] | ||
snapshotter = "overlayfs" | ||
default_runtime_name = "runc" | ||
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc] | ||
runtime_type = "io.containerd.runc.v2" | ||
[plugins."io.containerd.grpc.v1.cri".containerd.runtimes.runc.options] | ||
SystemdCgroup = true | ||
[plugins."io.containerd.grpc.v1.cri".cni] | ||
bin_dir = "/opt/cni/bin" | ||
conf_dir = "/etc/cni/net.d" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,33 @@ | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRole | ||
metadata: | ||
annotations: | ||
rbac.authorization.kubernetes.io/autoupdate: "true" | ||
labels: | ||
kubernetes.io/bootstrapping: rbac-defaults | ||
name: system:kube-apiserver-to-kubelet | ||
rules: | ||
- apiGroups: | ||
- "" | ||
resources: | ||
- nodes/proxy | ||
- nodes/stats | ||
- nodes/log | ||
- nodes/spec | ||
- nodes/metrics | ||
verbs: | ||
- "*" | ||
--- | ||
apiVersion: rbac.authorization.k8s.io/v1 | ||
kind: ClusterRoleBinding | ||
metadata: | ||
name: system:kube-apiserver | ||
namespace: "" | ||
roleRef: | ||
apiGroup: rbac.authorization.k8s.io | ||
kind: ClusterRole | ||
name: system:kube-apiserver-to-kubelet | ||
subjects: | ||
- apiGroup: rbac.authorization.k8s.io | ||
kind: User | ||
name: kubernetes |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
kind: KubeProxyConfiguration | ||
apiVersion: kubeproxy.config.k8s.io/v1alpha1 | ||
clientConnection: | ||
kubeconfig: "/var/lib/kube-proxy/kubeconfig" | ||
mode: "iptables" | ||
clusterCIDR: "10.200.0.0/16" |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,6 @@ | ||
apiVersion: kubescheduler.config.k8s.io/v1 | ||
kind: KubeSchedulerConfiguration | ||
clientConnection: | ||
kubeconfig: "/var/lib/kubernetes/kube-scheduler.kubeconfig" | ||
leaderElection: | ||
leaderElect: true |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
kind: KubeletConfiguration | ||
apiVersion: kubelet.config.k8s.io/v1beta1 | ||
authentication: | ||
anonymous: | ||
enabled: false | ||
webhook: | ||
enabled: true | ||
x509: | ||
clientCAFile: "/var/lib/kubelet/ca.crt" | ||
authorization: | ||
mode: Webhook | ||
clusterDomain: "cluster.local" | ||
clusterDNS: | ||
- "10.32.0.10" | ||
cgroupDriver: systemd | ||
containerRuntimeEndpoint: "unix:///var/run/containerd/containerd.sock" | ||
podCIDR: "SUBNET" | ||
resolvConf: "/etc/resolv.conf" | ||
runtimeRequestTimeout: "15m" | ||
tlsCertFile: "/var/lib/kubelet/kubelet.crt" | ||
tlsPrivateKeyFile: "/var/lib/kubelet/kubelet.key" |
Oops, something went wrong.