diff --git a/Makefile b/Makefile index 2ca0e6d9d..245043ca1 100644 --- a/Makefile +++ b/Makefile @@ -88,7 +88,7 @@ INTEGRATION_TEST_DEFAULT_TARGET := integration-test-$(OPERATING_SYSTEM) MODULE_SIG_VERIFY_DEFAULT_TARGET := module-sig-verify-$(OPERATING_SYSTEM) INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM) # renovate: datasource=github-releases depName=kubernetes/kubernetes -KUBECTL_VERSION ?= v1.30.0-alpha.2 +KUBECTL_VERSION ?= v1.30.0-alpha.3 # renovate: datasource=github-releases depName=kastenhq/kubestr KUBESTR_VERSION ?= v0.4.41 # renovate: datasource=github-releases depName=helm/helm diff --git a/go.mod b/go.mod index 8ac330669..a041acc15 100644 --- a/go.mod +++ b/go.mod @@ -15,16 +15,16 @@ replace ( // Kubernetes dependencies sharing the same version. require ( - k8s.io/api v0.30.0-alpha.2 - k8s.io/apimachinery v0.30.0-alpha.2 - k8s.io/apiserver v0.30.0-alpha.2 - k8s.io/client-go v0.30.0-alpha.2 - k8s.io/component-base v0.30.0-alpha.2 - k8s.io/cri-api v0.30.0-alpha.2 - k8s.io/kube-scheduler v0.30.0-alpha.2 - k8s.io/kubectl v0.30.0-alpha.2 - k8s.io/kubelet v0.30.0-alpha.2 - k8s.io/pod-security-admission v0.30.0-alpha.2 + k8s.io/api v0.30.0-alpha.3 + k8s.io/apimachinery v0.30.0-alpha.3 + k8s.io/apiserver v0.30.0-alpha.3 + k8s.io/client-go v0.30.0-alpha.3 + k8s.io/component-base v0.30.0-alpha.3 + k8s.io/cri-api v0.30.0-alpha.3 + k8s.io/kube-scheduler v0.30.0-alpha.3 + k8s.io/kubectl v0.30.0-alpha.3 + k8s.io/kubelet v0.30.0-alpha.3 + k8s.io/pod-security-admission v0.30.0-alpha.3 ) require ( @@ -336,7 +336,7 @@ require ( gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/ini.v1 v1.67.0 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect - k8s.io/cli-runtime v0.30.0-alpha.2 // indirect + k8s.io/cli-runtime v0.30.0-alpha.3 // indirect k8s.io/klog v1.0.0 // indirect k8s.io/kube-openapi v0.0.0-20231113174909-778a5567bc1e // indirect k8s.io/utils v0.0.0-20230726121419-3b25d923346b // indirect diff --git a/go.sum b/go.sum index a2fa2b6de..73f9cfdd0 100644 --- a/go.sum +++ b/go.sum @@ -1247,34 +1247,34 @@ honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWh honnef.co/go/tools v0.0.1-2019.2.3/go.mod h1:a3bituU0lyd329TUQxRnasdCoJDkEUEAqEt0JzvZhAg= honnef.co/go/tools v0.0.1-2020.1.3/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= honnef.co/go/tools v0.0.1-2020.1.4/go.mod h1:X/FiERA/W4tHapMX5mGpAtMSVEeEUOyHaw9vFzvIQ3k= -k8s.io/api v0.30.0-alpha.2 h1:Pk7rCBK4z2wzfHQGWFvpNYagfeQAlyy87MnkjngRDEI= -k8s.io/api v0.30.0-alpha.2/go.mod h1:xyrt5SWiJP/5Lj6VkeIQd7e9rLQ/FRU5SaZE5D3YenM= -k8s.io/apimachinery v0.30.0-alpha.2 h1:614MJReChyjEH03Il2Z10u/LTNmvzEVvg7d7VpxJwHI= -k8s.io/apimachinery v0.30.0-alpha.2/go.mod h1:akBo0Z+IFaOazGhD1RG6NG75rWj9oAhmz7UHqmfygmw= -k8s.io/apiserver v0.30.0-alpha.2 h1:dOoEijSMgTfpy+rm3W/p7h1KuSLgT20kM6v3NDMGxx8= -k8s.io/apiserver v0.30.0-alpha.2/go.mod h1:KcPItgbscof3zv7LuE8XhJCuxF6wCcU1ZfeAjzKvI0E= -k8s.io/cli-runtime v0.30.0-alpha.2 h1:3sRkhnkYkuzrga3WNfnyKgDAOHgXrkBcWQecmIFrw2w= -k8s.io/cli-runtime v0.30.0-alpha.2/go.mod h1:Enk+w7IFQkiMSiJMoesw7Lazi7UwbeUZqrf2D8eNJUY= -k8s.io/client-go v0.30.0-alpha.2 h1:tHzSny3eX0Qg1YWC+CE77+wnuWm3NHtAoVD6iQz56Zs= -k8s.io/client-go v0.30.0-alpha.2/go.mod h1:ggOVaLmJOEjl9vmdoAnxL+pBfrLP4+h6dP4L9QNTpcU= -k8s.io/component-base v0.30.0-alpha.2 h1:hdBSlB+OcBRTntNYio4YTKJRxb0rA59q42qf3qXDWIE= -k8s.io/component-base v0.30.0-alpha.2/go.mod h1:YYb+ohTXvPYL290zXMWrQwd1A+xIqbSuAMrcQJ7h5uw= -k8s.io/cri-api v0.30.0-alpha.2 h1:MHE8kSl2zeJw+0DWYDc4yfnzxE7OF095Hz4RVOG3/Gc= -k8s.io/cri-api v0.30.0-alpha.2/go.mod h1:9fQTFm+wi4FLyqrkVUoMJiUB3mE74XrVvHz8uFY/sSw= +k8s.io/api v0.30.0-alpha.3 h1:EcbaDi8WjoR8QdQS6LKd8oP0qjODWxfKdVj5U8WM1P0= +k8s.io/api v0.30.0-alpha.3/go.mod h1:gUziZ7QreMQgwigIm0O6q1xN4w2DPIs6PwP9Ha3c9dQ= +k8s.io/apimachinery v0.30.0-alpha.3 h1:9FoqT1Wc+48DJ+mYkbmZd3n4351u9YbGnQSPnVWUwWM= +k8s.io/apimachinery v0.30.0-alpha.3/go.mod h1:/862Kkwje5hhHGJWPKiaHuov2c6mw6uCXWikV9kOIP4= +k8s.io/apiserver v0.30.0-alpha.3 h1:Z73kgqfxr9XQmV11LCwWhHe7HXDArWLFkH8M2aOL+sI= +k8s.io/apiserver v0.30.0-alpha.3/go.mod h1:BNpQK5agUh2i5pfv6SeBSLMPdpGBc+cba6ct3MofK+s= +k8s.io/cli-runtime v0.30.0-alpha.3 h1:cOP+BcCXYfOzu89mqBIcjsQfIm4pyxLcbaUv2Sy1Ypg= +k8s.io/cli-runtime v0.30.0-alpha.3/go.mod h1:sxkGJnbgXoSQfQRbETKDzPvGkgxpTDGiHht7ztIIm4c= +k8s.io/client-go v0.30.0-alpha.3 h1:0dj5DVlvaRI44HhHHI6cJxJ+n3F6GA1TwUV6U+L26No= +k8s.io/client-go v0.30.0-alpha.3/go.mod h1:waezUYZSoIV2fUNG2+pwia+wTwPb8HTRVHKd5v5rDg0= +k8s.io/component-base v0.30.0-alpha.3 h1:krf6aBCCJHv4ga0wc4v3pNLEZ1gmBtxAUey5L9n2xlI= +k8s.io/component-base v0.30.0-alpha.3/go.mod h1:cvuAeLTeh91ELy3wPWFtJ+J4d08ws9zk/+mek4aLdHM= +k8s.io/cri-api v0.30.0-alpha.3 h1:oDH5Wt3Rkxh4hqfAtFaeOfFSY0z2qnzTbt5QHcVhnsc= +k8s.io/cri-api v0.30.0-alpha.3/go.mod h1:ccyGaZDcNRI40/m8vcr9gqkOI/iPI+ZSdpViZsNWhDA= k8s.io/klog v1.0.0 h1:Pt+yjF5aB1xDSVbau4VsWe+dQNzA0qv1LlXdC2dF6Q8= k8s.io/klog v1.0.0/go.mod h1:4Bi6QPql/J/LkTDqv7R/cd3hPo4k2DG6Ptcz060Ez5I= k8s.io/klog/v2 v2.120.1 h1:QXU6cPEOIslTGvZaXvFWiP9VKyeet3sawzTOvdXb4Vw= k8s.io/klog/v2 v2.120.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= k8s.io/kube-openapi v0.0.0-20231113174909-778a5567bc1e h1:snPmy96t93RredGRjKfMFt+gvxuVAncqSAyBveJtr4Q= k8s.io/kube-openapi v0.0.0-20231113174909-778a5567bc1e/go.mod h1:AsvuZPBlUDVuCdzJ87iajxtXuR9oktsTctW/R9wwouA= -k8s.io/kube-scheduler v0.30.0-alpha.2 h1:YNrPwMg87VMdUnHo+OAMesYpk7rxATNVcICnxzULTCs= -k8s.io/kube-scheduler v0.30.0-alpha.2/go.mod h1:MsTYeYZDwv64XTdd5y8gCW8YPLCgr8IKCUOl7CWPEl8= -k8s.io/kubectl v0.30.0-alpha.2 h1:fw+2Ijv4gqQdFgzYK1nJJR3MFopCdBAZEjnETcM+y4Y= -k8s.io/kubectl v0.30.0-alpha.2/go.mod h1:74X1grqoxhb93ZLxjQo8FurqpWdSAgnNYiUhyYYiWoA= -k8s.io/kubelet v0.30.0-alpha.2 h1:35RaAFKiBA3iBGg8fxFefDdKrBhcakTpbPxZdHMRml8= -k8s.io/kubelet v0.30.0-alpha.2/go.mod h1:wP9oBhAREIMKYXiV7xK92P9OfeMi7TFHGm+EbYtn5ZQ= -k8s.io/pod-security-admission v0.30.0-alpha.2 h1:q2gKZJxHk4Uf0SBxnFLu34ZbbwW7Peml903Tw8jC7tA= -k8s.io/pod-security-admission v0.30.0-alpha.2/go.mod h1:v+SIoDPBLpZRM4yG0+rZRvbNXHYfPmpN1PcdZaOzZe8= +k8s.io/kube-scheduler v0.30.0-alpha.3 h1:EGhdnbMq8p7dp0nB3ZOOvdvTh9+c2dNeo+U0x8C6rRs= +k8s.io/kube-scheduler v0.30.0-alpha.3/go.mod h1:+VXkvl9Cnbz3KRoeJLhVgllTtzbc8/Xo3vX6Z5ysYPo= +k8s.io/kubectl v0.30.0-alpha.3 h1:Cq4evzMw2q5rcHfwJQS7HZGlH0axArxccLseM47J1c8= +k8s.io/kubectl v0.30.0-alpha.3/go.mod h1:7uWFP+swHfWEPfrTNu9OYSCqd1u87ntH6vA/u9vCdMQ= +k8s.io/kubelet v0.30.0-alpha.3 h1:nrmox2gdhnohIBoxKNUtEcK8VxoqVvRZ0zxzzr4RtA8= +k8s.io/kubelet v0.30.0-alpha.3/go.mod h1:TRGTE7NP4eW6ejZTTJhki9sKKplQ2FmRcdWCvsH3u3o= +k8s.io/pod-security-admission v0.30.0-alpha.3 h1:sGwKMgqmCi03/HCoHsKMkIW3GMueFf8Eumcl+My9Jx8= +k8s.io/pod-security-admission v0.30.0-alpha.3/go.mod h1:+2yTyJRSOkC/IXg+WIskXPOGJV7AKBzlkRfIXmDS2sg= k8s.io/utils v0.0.0-20230726121419-3b25d923346b h1:sgn3ZU783SCgtaSJjpcVVlRqd6GSnlTLKgpAAttJvpI= k8s.io/utils v0.0.0-20230726121419-3b25d923346b/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= kernel.org/pub/linux/libs/security/libcap/cap v1.2.69 h1:N0m3tKYbkRMmDobh/47ngz+AWeV7PcfXMDi8xu3Vrag= diff --git a/hack/release.toml b/hack/release.toml index 7bbbcfb4b..5535e963e 100644 --- a/hack/release.toml +++ b/hack/release.toml @@ -19,7 +19,7 @@ preface = """\ description = """\ Linux: 6.6.16 etcd: 3.5.11 -Kubernetes: 1.30.0-alpha.2 +Kubernetes: 1.30.0-alpha.3 containerd: 1.7.13 runc: 1.1.12 Flannel: 0.24.1 diff --git a/hack/test/e2e.sh b/hack/test/e2e.sh index e0c61fced..46bbb8a0a 100755 --- a/hack/test/e2e.sh +++ b/hack/test/e2e.sh @@ -41,7 +41,7 @@ export TALOS_VERSION # Kubernetes export KUBECONFIG="${TMP}/kubeconfig" -export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.30.0-alpha.2} +export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.30.0-alpha.3} export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}" export TIMEOUT=1200 diff --git a/internal/integration/base/run.go b/internal/integration/base/run.go index 596aa0a26..be1ca52f2 100644 --- a/internal/integration/base/run.go +++ b/internal/integration/base/run.go @@ -155,7 +155,7 @@ func retryRunAndWait(suite *suite.Suite, cmdFunc func() *exec.Cmd, retryer retry stdoutBuf, stderrBuf, err = runAndWait(suite, cmdFunc()) if _, ok := err.(*exec.ExitError); ok { - return retry.ExpectedError(err) + return retry.ExpectedErrorf("command failed, stderr %v: %w", stderrBuf.String(), err) } return err diff --git a/pkg/machinery/constants/constants.go b/pkg/machinery/constants/constants.go index d2185476e..4108a63f8 100644 --- a/pkg/machinery/constants/constants.go +++ b/pkg/machinery/constants/constants.go @@ -344,7 +344,7 @@ const ( // DefaultKubernetesVersion is the default target version of the control plane. // renovate: datasource=github-releases depName=kubernetes/kubernetes - DefaultKubernetesVersion = "1.30.0-alpha.2" + DefaultKubernetesVersion = "1.30.0-alpha.3" // SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards. SupportedKubernetesVersions = 6 diff --git a/website/content/v1.7/_index.md b/website/content/v1.7/_index.md index 3a13ea2e1..92429286c 100644 --- a/website/content/v1.7/_index.md +++ b/website/content/v1.7/_index.md @@ -5,7 +5,7 @@ linkTitle: "Documentation" cascade: type: docs lastRelease: v1.7.0-alpha.0 -kubernetesRelease: "1.30.0-alpha.2" +kubernetesRelease: "1.30.0-alpha.3" prevKubernetesRelease: "1.28.3" nvidiaContainerToolkitRelease: "v1.13.5" nvidiaDriverRelease: "535.129.03" diff --git a/website/content/v1.7/reference/cli.md b/website/content/v1.7/reference/cli.md index e218084ba..e663d0b10 100644 --- a/website/content/v1.7/reference/cli.md +++ b/website/content/v1.7/reference/cli.md @@ -135,7 +135,7 @@ talosctl cluster create [flags] --ipxe-boot-script string iPXE boot script (URL) to use --iso-path string the ISO path to use for the initial boot (VM only) --kubeprism-port int KubePrism port (set to 0 to disable) (default 7445) - --kubernetes-version string desired kubernetes version to run (default "1.30.0-alpha.2") + --kubernetes-version string desired kubernetes version to run (default "1.30.0-alpha.3") --memory int the limit on memory usage in MB (each control plane/VM) (default 2048) --memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048) --mtu int MTU of the cluster network (default 1500) @@ -1332,7 +1332,7 @@ talosctl gen config [flags] -h, --help help for config --install-disk string the disk to install to (default "/dev/sda") --install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest") - --kubernetes-version string desired kubernetes version to run (default "1.30.0-alpha.2") + --kubernetes-version string desired kubernetes version to run (default "1.30.0-alpha.3") -o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout -t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig]) -p, --persist the desired persist value for configs (default true) @@ -2898,7 +2898,7 @@ talosctl upgrade-k8s [flags] --pre-pull-images pre-pull images before upgrade (default true) --proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy") --scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler") - --to string the Kubernetes control plane version to upgrade to (default "1.30.0-alpha.2") + --to string the Kubernetes control plane version to upgrade to (default "1.30.0-alpha.3") --upgrade-kubelet upgrade kubelet service (default true) --with-docs patch all machine configs adding the documentation for each field (default true) --with-examples patch all machine configs with the commented examples (default true) diff --git a/website/content/v1.7/reference/configuration/v1alpha1/config.md b/website/content/v1.7/reference/configuration/v1alpha1/config.md index 3f7384235..c7273412c 100644 --- a/website/content/v1.7/reference/configuration/v1alpha1/config.md +++ b/website/content/v1.7/reference/configuration/v1alpha1/config.md @@ -89,7 +89,7 @@ controlPlane: {{< /highlight >}} | | |`kubelet` |KubeletConfig |Used to provide additional options to the kubelet.
Show example(s){{< highlight yaml >}} kubelet: - image: ghcr.io/siderolabs/kubelet:v1.30.0-alpha.2 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.30.0-alpha.3 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -498,7 +498,7 @@ KubeletConfig represents the kubelet config values. {{< highlight yaml >}} machine: kubelet: - image: ghcr.io/siderolabs/kubelet:v1.30.0-alpha.2 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.30.0-alpha.3 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -551,7 +551,7 @@ machine: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The `image` field is an optional reference to an alternative kubelet image.
Show example(s){{< highlight yaml >}} -image: ghcr.io/siderolabs/kubelet:v1.30.0-alpha.2 +image: ghcr.io/siderolabs/kubelet:v1.30.0-alpha.3 {{< /highlight >}}
| | |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
Show example(s){{< highlight yaml >}} clusterDNS: @@ -2862,7 +2862,7 @@ serviceAccount: {{< /highlight >}}
| | |`apiServer` |APIServerConfig |API server specific configuration options.
Show example(s){{< highlight yaml >}} apiServer: - image: registry.k8s.io/kube-apiserver:v1.30.0-alpha.2 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.30.0-alpha.3 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -2901,14 +2901,14 @@ apiServer: {{< /highlight >}}
| | |`controllerManager` |ControllerManagerConfig |Controller manager server specific configuration options.
Show example(s){{< highlight yaml >}} controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.30.0-alpha.2 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.30.0-alpha.3 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}
| | |`proxy` |ProxyConfig |Kube-proxy server-specific configuration options
Show example(s){{< highlight yaml >}} proxy: - image: registry.k8s.io/kube-proxy:v1.30.0-alpha.2 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.30.0-alpha.3 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -2919,7 +2919,7 @@ proxy: {{< /highlight >}}
| | |`scheduler` |SchedulerConfig |Scheduler server specific configuration options.
Show example(s){{< highlight yaml >}} scheduler: - image: registry.k8s.io/kube-scheduler:v1.30.0-alpha.2 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.30.0-alpha.3 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3163,7 +3163,7 @@ APIServerConfig represents the kube apiserver configuration options. {{< highlight yaml >}} cluster: apiServer: - image: registry.k8s.io/kube-apiserver:v1.30.0-alpha.2 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.30.0-alpha.3 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -3205,7 +3205,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the API server manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-apiserver:v1.30.0-alpha.2 +image: registry.k8s.io/kube-apiserver:v1.30.0-alpha.3 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the API server. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the API server static pod. | | @@ -3344,7 +3344,7 @@ ControllerManagerConfig represents the kube controller manager configuration opt {{< highlight yaml >}} cluster: controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.30.0-alpha.2 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.30.0-alpha.3 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true @@ -3354,7 +3354,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the controller manager manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-controller-manager:v1.30.0-alpha.2 +image: registry.k8s.io/kube-controller-manager:v1.30.0-alpha.3 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the controller manager static pod. | | @@ -3424,7 +3424,7 @@ ProxyConfig represents the kube proxy configuration options. {{< highlight yaml >}} cluster: proxy: - image: registry.k8s.io/kube-proxy:v1.30.0-alpha.2 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.30.0-alpha.3 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3441,7 +3441,7 @@ cluster: disabled: false {{< /highlight >}}
| | |`image` |string |The container image used in the kube-proxy manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-proxy:v1.30.0-alpha.2 +image: registry.k8s.io/kube-proxy:v1.30.0-alpha.3 {{< /highlight >}}
| | |`mode` |string |
proxy mode of kube-proxy.The default is 'iptables'.
| | |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | | @@ -3460,7 +3460,7 @@ SchedulerConfig represents the kube scheduler configuration options. {{< highlight yaml >}} cluster: scheduler: - image: registry.k8s.io/kube-scheduler:v1.30.0-alpha.2 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.30.0-alpha.3 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3470,7 +3470,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the scheduler manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-scheduler:v1.30.0-alpha.2 +image: registry.k8s.io/kube-scheduler:v1.30.0-alpha.3 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the scheduler static pod. | |