-
Notifications
You must be signed in to change notification settings - Fork 11
/
controlplaneinfo.json
91 lines (91 loc) · 4.22 KB
/
controlplaneinfo.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
{
"APIServerInfo": {
"specsFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/manifests/kube-apiserver.yaml",
"permissions": 384
},
"cmdLine": "kube-apiserver --advertise-address=192.168.49.2 --allow-privileged=true --authorization-mode=Node,RBAC --client-ca-file=/var/lib/minikube/certs/ca.crt --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,NodeRestriction,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota --enable-bootstrap-token-auth=true --etcd-cafile=/var/lib/minikube/certs/etcd/ca.crt --etcd-certfile=/var/lib/minikube/certs/apiserver-etcd-client.crt --etcd-keyfile=/var/lib/minikube/certs/apiserver-etcd-client.key --etcd-servers=https://127.0.0.1:2379 --kubelet-client-certificate=/var/lib/minikube/certs/apiserver-kubelet-client.crt --kubelet-client-key=/var/lib/minikube/certs/apiserver-kubelet-client.key --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname --proxy-client-cert-file=/var/lib/minikube/certs/front-proxy-client.crt --proxy-client-key-file=/var/lib/minikube/certs/front-proxy-client.key --requestheader-allowed-names=front-proxy-client --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt --requestheader-extra-headers-prefix=X-Remote-Extra- --requestheader-group-headers=X-Remote-Group --requestheader-username-headers=X-Remote-User --secure-port=8443 --service-account-issuer=https://kubernetes.default.svc.cluster.local --service-account-key-file=/var/lib/minikube/certs/sa.pub --service-account-signing-key-file=/var/lib/minikube/certs/sa.key --service-cluster-ip-range=10.96.0.0/12 --tls-cert-file=/var/lib/minikube/certs/apiserver.crt --tls-private-key-file=/var/lib/minikube/certs/apiserver.key "
},
"controllerManagerInfo": {
"specsFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/manifests/kube-controller-manager.yaml",
"permissions": 384
},
"configFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/controller-manager.conf",
"permissions": 384
},
"cmdLine": "kube-controller-manager --allocate-node-cidrs=true --authentication-kubeconfig=/etc/kubernetes/controller-manager.conf --authorization-kubeconfig=/etc/kubernetes/controller-manager.conf --bind-address=127.0.0.1 --client-ca-file=/var/lib/minikube/certs/ca.crt --cluster-cidr=10.244.0.0/16 --cluster-name=mk --cluster-signing-cert-file=/var/lib/minikube/certs/ca.crt --cluster-signing-key-file=/var/lib/minikube/certs/ca.key --controllers=*,bootstrapsigner,tokencleaner --kubeconfig=/etc/kubernetes/controller-manager.conf --leader-elect=false --requestheader-client-ca-file=/var/lib/minikube/certs/front-proxy-ca.crt --root-ca-file=/var/lib/minikube/certs/ca.crt --service-account-private-key-file=/var/lib/minikube/certs/sa.key --service-cluster-ip-range=10.96.0.0/12 --use-service-account-credentials=true "
},
"schedulerInfo": {
"specsFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/manifests/kube-scheduler.yaml",
"permissions": 384
},
"configFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/scheduler.conf",
"permissions": 384
},
"cmdLine": "kube-scheduler --authentication-kubeconfig=/etc/kubernetes/scheduler.conf --authorization-kubeconfig=/etc/kubernetes/scheduler.conf --bind-address=127.0.0.1 --kubeconfig=/etc/kubernetes/scheduler.conf --leader-elect=false "
},
"etcdConfigFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/manifests/etcd.yaml",
"permissions": 384
},
"etcdDataDir": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/var/lib/minikube/etcd",
"permissions": 448
},
"adminConfigFile": {
"ownership": {
"uid": 0,
"gid": 0,
"username": "root",
"groupname": "root"
},
"path": "/etc/kubernetes/admin.conf",
"permissions": 384
}
}