2020-02-13 22:55:19 +00:00
{
"K8sVersionServiceOptions" : {
"v1.10" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.11" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.12" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.13" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.14" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.14.10-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.14.9-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15.10-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-03-15 16:39:41 +00:00
"v1.15.11-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15.11-rancher1-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-07-22 01:23:22 +00:00
"v1.15.12-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15.12-rancher2-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15.12-rancher2-3" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15.12-rancher2-5" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2021-01-27 21:46:24 +00:00
"v1.15.12-rancher2-8" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-02-13 22:55:19 +00:00
"v1.15.6-rancher1-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-07-22 01:23:22 +00:00
"v1.15.7-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.15.9-rancher1-1" : {
2020-02-13 22:55:19 +00:00
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-07-22 01:23:22 +00:00
"v1.16" : {
"etcd" : null ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.10-rancher2-2" : {
2020-02-13 22:55:19 +00:00
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-07-22 01:23:22 +00:00
"v1.16.13-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.13-rancher1-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
2020-02-13 22:55:19 +00:00
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-09-09 21:45:05 +00:00
"v1.16.14-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.15-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-11-12 21:38:31 +00:00
"v1.16.15-rancher1-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2021-01-27 21:46:24 +00:00
"v1.16.15-rancher1-4" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-02-13 22:55:19 +00:00
"v1.16.3-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.4-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.6-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.6-rancher1-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.7-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-03-15 16:39:41 +00:00
"v1.16.8-rancher1-1" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
"v1.16.8-rancher1-2" : {
"etcd" : {
"client-cert-auth" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-02-13 22:55:19 +00:00
"v1.17" : {
"etcd" : {
"client-cert-auth" : "true" ,
"enable-v2" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-05-11 22:19:51 +00:00
"v1.18" : {
"etcd" : {
"client-cert-auth" : "true" ,
"enable-v2" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-09-14 23:47:56 +00:00
"v1.19" : {
"etcd" : {
"client-cert-auth" : "true" ,
"enable-v2" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2021-02-01 18:06:55 +00:00
"v1.20" : {
"etcd" : {
"client-cert-auth" : "true" ,
"enable-v2" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"api-audiences" : "unknown" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"feature-gates" : "ServiceAccountIssuerDiscovery=false" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-issuer" : "rke" ,
"service-account-lookup" : "true" ,
"service-account-signing-key-file" : "/etc/kubernetes/ssl/kube-service-account-token-key.pem" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2021-05-18 01:44:04 +00:00
"v1.21" : {
"etcd" : {
"client-cert-auth" : "true" ,
"enable-v2" : "true" ,
"peer-client-cert-auth" : "true"
} ,
"kubeapi" : {
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"api-audiences" : "unknown" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction,Priority,TaintNodesByCondition,PersistentVolumeClaimResize" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-issuer" : "rke" ,
"service-account-lookup" : "true" ,
"service-account-signing-key-file" : "/etc/kubernetes/ssl/kube-service-account-token-key.pem" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
} ,
2020-02-13 22:55:19 +00:00
"v1.9" : {
"etcd" : null ,
"kubeapi" : {
"admission-control" : "ServiceAccount,NamespaceLifecycle,LimitRanger,PersistentVolumeLabel,DefaultStorageClass,ResourceQuota,DefaultTolerationSeconds,NodeRestriction" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"bind-address" : "0.0.0.0" ,
"enable-admission-plugins" : "NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota,NodeRestriction" ,
"insecure-port" : "0" ,
"kubelet-preferred-address-types" : "InternalIP,ExternalIP,Hostname" ,
"profiling" : "false" ,
"requestheader-extra-headers-prefix" : "X-Remote-Extra-" ,
"requestheader-group-headers" : "X-Remote-Group" ,
"requestheader-username-headers" : "X-Remote-User" ,
"runtime-config" : "authorization.k8s.io/v1beta1=true" ,
"secure-port" : "6443" ,
"service-account-lookup" : "true" ,
"storage-backend" : "etcd3" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305"
} ,
"kubelet" : {
"address" : "0.0.0.0" ,
"allow-privileged" : "true" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cgroups-per-qos" : "True" ,
"cni-bin-dir" : "/opt/cni/bin" ,
"cni-conf-dir" : "/etc/cni/net.d" ,
"enforce-node-allocatable" : "" ,
"event-qps" : "0" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "/etc/resolv.conf" ,
"streaming-connection-idle-timeout" : "30m" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"healthz-bind-address" : "127.0.0.1" ,
"v" : "2"
} ,
"kubeController" : {
"address" : "0.0.0.0" ,
"allocate-node-cidrs" : "true" ,
"allow-untagged-cloud" : "true" ,
"configure-cloud-routes" : "false" ,
"enable-hostpath-provisioner" : "false" ,
"leader-elect" : "true" ,
"node-monitor-grace-period" : "40s" ,
"pod-eviction-timeout" : "5m0s" ,
"profiling" : "false" ,
"terminated-pod-gc-threshold" : "1000" ,
"v" : "2"
} ,
"scheduler" : {
"address" : "0.0.0.0" ,
"leader-elect" : "true" ,
"profiling" : "false" ,
"v" : "2"
}
}
} ,
"K8sVersionRKESystemImages" : {
"v1.10.0-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.4" ,
"nginxProxy" : "rancher/rke-tools:v0.1.4" ,
"certDownloader" : "rancher/rke-tools:v0.1.4" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.4" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.0-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.10.1-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.8" ,
"nginxProxy" : "rancher/rke-tools:v0.1.8" ,
"certDownloader" : "rancher/rke-tools:v0.1.8" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.8" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.1-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.10.11-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.13" ,
"nginxProxy" : "rancher/rke-tools:v0.1.13" ,
"certDownloader" : "rancher/rke-tools:v0.1.13" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.13" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.11-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.10.12-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.13" ,
"nginxProxy" : "rancher/rke-tools:v0.1.13" ,
"certDownloader" : "rancher/rke-tools:v0.1.13" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.13" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.12-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.10.3-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.10" ,
"nginxProxy" : "rancher/rke-tools:v0.1.10" ,
"certDownloader" : "rancher/rke-tools:v0.1.10" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.10" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.3-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.10.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.10" ,
"nginxProxy" : "rancher/rke-tools:v0.1.10" ,
"certDownloader" : "rancher/rke-tools:v0.1.10" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.10" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.10.5-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.13" ,
"nginxProxy" : "rancher/rke-tools:v0.1.13" ,
"certDownloader" : "rancher/rke-tools:v0.1.13" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.13" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.8" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.8" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.8" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.10.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.1-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.13" ,
"nginxProxy" : "rancher/rke-tools:v0.1.13" ,
"certDownloader" : "rancher/rke-tools:v0.1.13" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.13" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.2-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.13" ,
"nginxProxy" : "rancher/rke-tools:v0.1.13" ,
"certDownloader" : "rancher/rke-tools:v0.1.13" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.13" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.2-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.2-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.2-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.6-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.15" ,
"nginxProxy" : "rancher/rke-tools:v0.1.15" ,
"certDownloader" : "rancher/rke-tools:v0.1.15" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.15" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.8-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.15" ,
"nginxProxy" : "rancher/rke-tools:v0.1.15" ,
"certDownloader" : "rancher/rke-tools:v0.1.15" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.15" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.8-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.15" ,
"nginxProxy" : "rancher/rke-tools:v0.1.15" ,
"certDownloader" : "rancher/rke-tools:v0.1.15" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.15" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.9-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.28" ,
"nginxProxy" : "rancher/rke-tools:v0.1.28" ,
"certDownloader" : "rancher/rke-tools:v0.1.28" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.28" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.11.9-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.2.18" ,
"alpine" : "rancher/rke-tools:v0.1.16-2" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16-2" ,
"certDownloader" : "rancher/rke-tools:v0.1.16-2" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16-2" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.11.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
} ,
"v1.12.0-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.0-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.1-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.10-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.40" ,
"nginxProxy" : "rancher/rke-tools:v0.1.40" ,
"certDownloader" : "rancher/rke-tools:v0.1.40" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.40" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.12.10-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.42" ,
"nginxProxy" : "rancher/rke-tools:v0.1.42" ,
"certDownloader" : "rancher/rke-tools:v0.1.42" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.42" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.12.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.18" ,
"nginxProxy" : "rancher/rke-tools:v0.1.18" ,
"certDownloader" : "rancher/rke-tools:v0.1.18" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.18" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.4-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.5-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.6-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.6-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.12.7-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.7-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "coredns/coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.12.7-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.28" ,
"nginxProxy" : "rancher/rke-tools:v0.1.28" ,
"certDownloader" : "rancher/rke-tools:v0.1.28" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.28" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.12.7-rancher1-4" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16-2" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16-2" ,
"certDownloader" : "rancher/rke-tools:v0.1.16-2" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16-2" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.12.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.34" ,
"nginxProxy" : "rancher/rke-tools:v0.1.34" ,
"certDownloader" : "rancher/rke-tools:v0.1.34" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.34" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.14.13" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.14.13" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.14.13" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.12.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.1.3" ,
"calicoCni" : "rancher/calico-cni:v3.1.3" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.3" ,
"canalCni" : "rancher/calico-cni:v3.1.3" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.1-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.13.1-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"coredns" : "coredns/coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.13.10-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16-2" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16-2" ,
"certDownloader" : "rancher/rke-tools:v0.1.16-2" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16-2" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.13.10-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.42" ,
"nginxProxy" : "rancher/rke-tools:v0.1.42" ,
"certDownloader" : "rancher/rke-tools:v0.1.42" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.42" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.11-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.11-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.12-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.12-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
2020-05-11 22:19:51 +00:00
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
2020-02-13 22:55:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.12-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
2020-05-11 22:19:51 +00:00
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
2020-02-13 22:55:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.4-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.13.4-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "coredns/coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.13.5-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.27" ,
"nginxProxy" : "rancher/rke-tools:v0.1.27" ,
"certDownloader" : "rancher/rke-tools:v0.1.27" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.27" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "coredns/coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.5-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.28" ,
"nginxProxy" : "rancher/rke-tools:v0.1.28" ,
"certDownloader" : "rancher/rke-tools:v0.1.28" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.28" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.7-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.34" ,
"nginxProxy" : "rancher/rke-tools:v0.1.34" ,
"certDownloader" : "rancher/rke-tools:v0.1.34" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.34" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.13.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.2.24" ,
"alpine" : "rancher/rke-tools:v0.1.16" ,
"nginxProxy" : "rancher/rke-tools:v0.1.16" ,
"certDownloader" : "rancher/rke-tools:v0.1.16" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.16" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.3.0" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause-amd64:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.3.1"
} ,
"v1.13.9-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.2.24-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.40" ,
"nginxProxy" : "rancher/rke-tools:v0.1.40" ,
"certDownloader" : "rancher/rke-tools:v0.1.40" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.40" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"coredns" : "rancher/coredns-coredns:1.2.6" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.13.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.1-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.28" ,
"nginxProxy" : "rancher/rke-tools:v0.1.28" ,
"certDownloader" : "rancher/rke-tools:v0.1.28" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.28" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "coredns/coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.1-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.28" ,
"nginxProxy" : "rancher/rke-tools:v0.1.28" ,
"certDownloader" : "rancher/rke-tools:v0.1.28" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.28" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
2020-05-11 22:19:51 +00:00
"v1.14.10-rancher1-0" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
2020-02-13 22:55:19 +00:00
"v1.14.10-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.34" ,
"nginxProxy" : "rancher/rke-tools:v0.1.34" ,
"certDownloader" : "rancher/rke-tools:v0.1.34" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.34" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.40" ,
"nginxProxy" : "rancher/rke-tools:v0.1.40" ,
"certDownloader" : "rancher/rke-tools:v0.1.40" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.40" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.6-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.42" ,
"nginxProxy" : "rancher/rke-tools:v0.1.42" ,
"certDownloader" : "rancher/rke-tools:v0.1.42" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.42" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.7-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.8-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.8-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
2020-05-11 22:19:51 +00:00
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
2020-02-13 22:55:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.8-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.8-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
2020-05-11 22:19:51 +00:00
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
2020-02-13 22:55:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
2020-05-11 22:19:51 +00:00
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
2020-02-13 22:55:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.14.9-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.14.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.10.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.4.0" ,
"calicoCni" : "rancher/calico-cni:v3.4.0" ,
2020-05-11 22:19:51 +00:00
"calicoControllers" : "rancher/calico-kube-controllers:v3.4.0" ,
2020-02-13 22:55:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.4.0" ,
"canalCni" : "rancher/calico-cni:v3.4.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.10.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.0" ,
"weaveCni" : "weaveworks/weave-npc:2.5.0" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.1"
} ,
"v1.15.0-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.34" ,
"nginxProxy" : "rancher/rke-tools:v0.1.34" ,
"certDownloader" : "rancher/rke-tools:v0.1.34" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.34" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.0-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
"v1.15.10-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-03-28 03:58:44 +00:00
"v1.15.11-rancher1-0" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
2020-05-11 22:19:51 +00:00
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
2020-03-28 03:58:44 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.11-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-05-11 22:19:51 +00:00
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
2020-03-28 03:58:44 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-05-11 22:19:51 +00:00
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
2020-03-28 03:58:44 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
2020-03-14 00:06:19 +00:00
"v1.15.11-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.11-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-03-16 20:22:50 +00:00
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-03-16 20:22:50 +00:00
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-03-16 20:22:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.11-rancher1-2" : {
2020-03-03 17:09:06 +00:00
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
2020-03-27 21:37:09 +00:00
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
2020-03-25 21:44:06 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.11-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.11-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
2020-03-27 21:37:09 +00:00
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
2020-03-03 17:09:06 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-03-14 00:06:19 +00:00
"kubernetes" : "rancher/hyperkube:v1.15.11-rancher1" ,
2020-03-03 17:09:06 +00:00
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-03-10 12:25:52 +00:00
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-03-10 12:25:52 +00:00
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-12 17:28:05 +00:00
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-03-12 17:28:05 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
2020-07-22 01:23:22 +00:00
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.12-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.8.9" ,
"calicoCni" : "rancher/calico-cni:v3.8.9" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.8.9" ,
"calicoCtl" : "rancher/calico-ctl:v3.8.9" ,
"canalNode" : "rancher/calico-node:v3.8.9" ,
"canalCni" : "rancher/calico-cni:v3.8.9" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
"v1.15.12-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.12-rancher2-3" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.58" ,
"nginxProxy" : "rancher/rke-tools:v0.1.58" ,
"certDownloader" : "rancher/rke-tools:v0.1.58" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.58" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.15.12-rancher2-4" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.59" ,
"nginxProxy" : "rancher/rke-tools:v0.1.59" ,
"certDownloader" : "rancher/rke-tools:v0.1.59" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.59" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
2020-03-03 17:09:06 +00:00
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
2020-07-22 01:23:22 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
2020-03-03 17:09:06 +00:00
} ,
2020-07-22 01:23:22 +00:00
"v1.15.12-rancher2-5" : {
2020-05-21 01:13:05 +00:00
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
2020-08-28 00:07:43 +00:00
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
2020-05-21 01:13:05 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-05-28 04:36:50 +00:00
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
2020-07-22 01:23:22 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
2020-05-28 04:36:50 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
2020-07-22 01:23:22 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
2020-05-28 04:36:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
2020-07-22 01:23:22 +00:00
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
2020-05-21 01:13:05 +00:00
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
2020-07-22 01:23:22 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
2020-05-21 01:13:05 +00:00
} ,
2020-09-25 12:35:34 +00:00
"v1.15.12-rancher2-6" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-11-02 18:04:47 +00:00
"v1.15.12-rancher2-7" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-01-27 21:46:24 +00:00
"v1.15.12-rancher2-8" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.15.12-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-02-13 22:55:19 +00:00
"v1.15.2-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.40" ,
"nginxProxy" : "rancher/rke-tools:v0.1.40" ,
"certDownloader" : "rancher/rke-tools:v0.1.40" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.40" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.2-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
"v1.15.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.42" ,
"nginxProxy" : "rancher/rke-tools:v0.1.42" ,
"certDownloader" : "rancher/rke-tools:v0.1.42" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.42" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher1" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:0.21.0-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
"v1.15.4-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
"v1.15.4-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3"
} ,
"v1.15.5-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.5-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.5-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.6-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.7-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.15.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.10-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"coredns" : "rancher/coredns-coredns:1.3.1" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.3.0" ,
"kubernetes" : "rancher/hyperkube:v1.15.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.7.4" ,
"calicoCni" : "rancher/calico-cni:v3.7.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.7.4" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.7.4" ,
"canalCni" : "rancher/calico-cni:v3.7.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.3" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.1-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.1-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.8.1" ,
"calicoCni" : "rancher/calico-cni:v3.8.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.8.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"canalNode" : "rancher/calico-node:v3.8.1" ,
"canalCni" : "rancher/calico-cni:v3.8.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-05-28 04:36:50 +00:00
"v1.16.10-rancher2-1" : {
2020-05-21 01:13:05 +00:00
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-05-28 04:36:50 +00:00
"kubernetes" : "rancher/hyperkube:v1.16.10-rancher2" ,
2020-05-21 01:13:05 +00:00
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
2020-05-28 04:36:50 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
2020-05-21 01:13:05 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-05-28 04:36:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
2020-07-22 01:23:22 +00:00
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
2020-05-21 01:13:05 +00:00
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-07-22 01:23:22 +00:00
"v1.16.10-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.58" ,
"nginxProxy" : "rancher/rke-tools:v0.1.58" ,
"certDownloader" : "rancher/rke-tools:v0.1.58" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.58" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.10-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.16.13-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.59" ,
"nginxProxy" : "rancher/rke-tools:v0.1.59" ,
"certDownloader" : "rancher/rke-tools:v0.1.59" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.59" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.13-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.16.13-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
2020-08-28 00:07:43 +00:00
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
2020-07-22 01:23:22 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.13-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-09-09 21:45:05 +00:00
"v1.16.14-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.14-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.16.15-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.15-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-09-18 19:43:56 +00:00
"v1.16.15-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
2020-09-25 12:35:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
2020-09-18 19:43:56 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.15-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-11-02 18:04:47 +00:00
"v1.16.15-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.15-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-01-27 21:46:24 +00:00
"v1.16.15-rancher1-4" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.16.15-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-02-13 22:55:19 +00:00
"v1.16.2-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.50" ,
"nginxProxy" : "rancher/rke-tools:v0.1.50" ,
"certDownloader" : "rancher/rke-tools:v0.1.50" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.50" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.2-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.8.1" ,
"calicoCni" : "rancher/calico-cni:v3.8.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.8.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"canalNode" : "rancher/calico-node:v3.8.1" ,
"canalCni" : "rancher/calico-cni:v3.8.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.2-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.2-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.8.1" ,
"calicoCni" : "rancher/calico-cni:v3.8.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.8.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"canalNode" : "rancher/calico-node:v3.8.1" ,
"canalCni" : "rancher/calico-cni:v3.8.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.8.1" ,
"calicoCni" : "rancher/calico-cni:v3.8.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.8.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"canalNode" : "rancher/calico-node:v3.8.1" ,
"canalCni" : "rancher/calico-cni:v3.8.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.4-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.6-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.6-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.7-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-03-14 00:06:19 +00:00
"v1.16.8-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.8-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-03-16 20:22:50 +00:00
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-03-16 20:22:50 +00:00
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-03-16 20:22:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.16.8-rancher1-2" : {
2020-03-03 17:09:06 +00:00
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
2020-03-27 21:37:09 +00:00
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
2020-03-25 21:44:06 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.16.8-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-05-11 22:19:51 +00:00
"v1.16.9-rancher1-1" : {
2020-03-25 21:44:06 +00:00
"etcd" : "rancher/coreos-etcd:v3.3.15-rancher1" ,
2020-03-27 21:37:09 +00:00
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
2020-03-03 17:09:06 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.2" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-05-11 22:19:51 +00:00
"kubernetes" : "rancher/hyperkube:v1.16.9-rancher1" ,
2020-03-03 17:09:06 +00:00
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-03-10 12:25:52 +00:00
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-03-10 12:25:52 +00:00
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-12 17:28:05 +00:00
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-03-12 17:28:05 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.4" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-02-13 22:55:19 +00:00
"v1.17.0-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.51" ,
"nginxProxy" : "rancher/rke-tools:v0.1.51" ,
"certDownloader" : "rancher/rke-tools:v0.1.51" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.51" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.0-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.8.1" ,
"calicoCni" : "rancher/calico-cni:v3.8.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.8.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"canalNode" : "rancher/calico-node:v3.8.1" ,
"canalCni" : "rancher/calico-cni:v3.8.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.8.1" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.17.0-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.0-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-09-09 21:45:05 +00:00
"v1.17.11-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.11-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-09-18 19:43:56 +00:00
"v1.17.12-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2020-09-25 12:35:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
2020-09-18 19:43:56 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.12-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-10-22 18:57:55 +00:00
"v1.17.13-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.13-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.17.13-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2020-11-02 18:04:47 +00:00
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
2020-10-22 18:57:55 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.13-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-11-12 21:38:31 +00:00
"v1.17.14-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.14-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-01-27 21:46:24 +00:00
"v1.17.16-rancher1-1" : {
2020-11-20 17:24:29 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-01-27 21:46:24 +00:00
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
2020-11-20 17:24:29 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-01-27 21:46:24 +00:00
"kubernetes" : "rancher/hyperkube:v1.17.16-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-16 23:34:34 +00:00
"v1.17.16-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.16-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.17.16-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.16-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-01-27 21:46:24 +00:00
"v1.17.17-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.17-rancher1" ,
2020-11-20 17:24:29 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-16 23:34:34 +00:00
"v1.17.17-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.17-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.17.17-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.17-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-01-27 21:46:24 +00:00
"v1.17.17-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-05 19:17:38 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.17-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
"v1.17.17-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2021-01-27 21:46:24 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.17-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6"
} ,
"v1.17.17-rancher2-3" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.74" ,
"nginxProxy" : "rancher/rke-tools:v0.1.74" ,
"certDownloader" : "rancher/rke-tools:v0.1.74" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.74" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.17-rancher2" ,
"flannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/mirrored-pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
2021-01-27 21:46:24 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2020-02-13 22:55:19 +00:00
"v1.17.2-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.2-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.17.2-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.2-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.17.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.10.2" ,
"calicoCni" : "rancher/calico-cni:v3.10.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.10.2" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"canalNode" : "rancher/calico-node:v3.10.2" ,
"canalCni" : "rancher/calico-cni:v3.10.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.10.2" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-03-14 00:06:19 +00:00
"v1.17.4-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.52" ,
"nginxProxy" : "rancher/rke-tools:v0.1.52" ,
"certDownloader" : "rancher/rke-tools:v0.1.52" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.52" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-03-16 20:22:50 +00:00
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-03-16 20:22:50 +00:00
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-03-16 20:22:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-14 00:06:19 +00:00
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
"v1.17.4-rancher1-2" : {
2020-03-03 17:09:06 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2020-03-27 21:37:09 +00:00
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
2020-03-25 21:44:06 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"kubernetes" : "rancher/hyperkube:v1.17.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-05-11 22:19:51 +00:00
"v1.17.5-rancher1-1" : {
2020-03-25 21:44:06 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2020-03-27 21:37:09 +00:00
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
2020-03-03 17:09:06 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-05-11 22:19:51 +00:00
"kubernetes" : "rancher/hyperkube:v1.17.5-rancher1" ,
2020-03-03 17:09:06 +00:00
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher5" ,
2020-03-10 12:25:52 +00:00
"calicoNode" : "rancher/calico-node:v3.13.0" ,
"calicoCni" : "rancher/calico-cni:v3.13.0" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
2020-03-10 12:25:52 +00:00
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-12 17:28:05 +00:00
"canalNode" : "rancher/calico-node:v3.13.0" ,
"canalCni" : "rancher/calico-cni:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-03-12 17:28:05 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.0" ,
2020-03-03 17:09:06 +00:00
"weaveNode" : "weaveworks/weave-kube:2.5.2" ,
"weaveCni" : "weaveworks/weave-npc:2.5.2" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-05-28 04:36:50 +00:00
"v1.17.6-rancher2-1" : {
2020-05-21 01:13:05 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-05-28 04:36:50 +00:00
"kubernetes" : "rancher/hyperkube:v1.17.6-rancher2" ,
2020-05-21 01:13:05 +00:00
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
2020-05-28 04:36:50 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
2020-05-21 01:13:05 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-05-28 04:36:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
2020-07-22 01:23:22 +00:00
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
2020-05-21 01:13:05 +00:00
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-07-22 01:23:22 +00:00
"v1.17.6-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.58" ,
"nginxProxy" : "rancher/rke-tools:v0.1.58" ,
"certDownloader" : "rancher/rke-tools:v0.1.58" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.58" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.6-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.17.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.59" ,
"nginxProxy" : "rancher/rke-tools:v0.1.59" ,
"certDownloader" : "rancher/rke-tools:v0.1.59" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.59" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-04-16 23:34:34 +00:00
"v1.17.9-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.0" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.0" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.0" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.5" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.17.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.10-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.10-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.10-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.12-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.12-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.14-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.14-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
"v1.18.14-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.14-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.14-rancher1-3" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.14-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
"v1.18.15-rancher1-1" : {
2020-07-22 01:23:22 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
2020-07-22 01:23:22 +00:00
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
2021-04-16 23:34:34 +00:00
"coredns" : "rancher/coredns-coredns:1.6.9" ,
2020-07-22 01:23:22 +00:00
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.15-rancher1" ,
2020-07-22 01:23:22 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
2021-04-16 23:34:34 +00:00
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
2020-07-22 01:23:22 +00:00
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
2020-07-22 01:23:22 +00:00
} ,
2021-04-16 23:34:34 +00:00
"v1.18.15-rancher1-2" : {
2020-10-22 18:57:55 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
2020-10-22 18:57:55 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.15-rancher1" ,
2020-10-22 18:57:55 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
2021-04-16 23:34:34 +00:00
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
2020-10-22 18:57:55 +00:00
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-04-16 23:34:34 +00:00
"v1.18.15-rancher1-3" : {
2020-10-22 18:57:55 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
2020-10-22 18:57:55 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.15-rancher1" ,
2020-10-22 18:57:55 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
2020-10-22 18:57:55 +00:00
} ,
2021-04-16 23:34:34 +00:00
"v1.18.16-rancher1-1" : {
2020-11-12 21:38:31 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2020-11-12 21:38:31 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.16-rancher1" ,
2020-11-12 21:38:31 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
2020-11-12 21:38:31 +00:00
} ,
2021-04-16 23:34:34 +00:00
"v1.18.16-rancher1-2" : {
2020-11-20 17:24:29 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2020-11-20 17:24:29 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.16-rancher1" ,
2021-01-27 21:46:24 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6"
2021-01-27 21:46:24 +00:00
} ,
2021-04-16 23:34:34 +00:00
"v1.18.16-rancher1-3" : {
2021-01-27 21:46:24 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-16 23:34:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2021-01-27 21:46:24 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.16-rancher1" ,
2020-11-20 17:24:29 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
2020-11-20 17:24:29 +00:00
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-16 23:34:34 +00:00
"v1.18.17-rancher1-1" : {
2021-01-27 21:46:24 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2021-04-05 19:17:38 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2021-01-27 21:46:24 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.17-rancher1" ,
2021-01-27 21:46:24 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-16 23:34:34 +00:00
"v1.18.17-rancher1-2" : {
2021-04-05 19:17:38 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.17-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6"
} ,
"v1.18.17-rancher1-3" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.74" ,
"nginxProxy" : "rancher/rke-tools:v0.1.74" ,
"certDownloader" : "rancher/rke-tools:v0.1.74" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.74" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.17-rancher1" ,
"flannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/mirrored-pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
2021-04-05 19:17:38 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-16 23:34:34 +00:00
"v1.18.18-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.15-rancher1" ,
2021-04-05 19:17:38 +00:00
"alpine" : "rancher/rke-tools:v0.1.74" ,
"nginxProxy" : "rancher/rke-tools:v0.1.74" ,
"certDownloader" : "rancher/rke-tools:v0.1.74" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.74" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-04-16 23:34:34 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.18-rancher1" ,
2021-04-05 19:17:38 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
2021-04-16 23:34:34 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6"
} ,
"v1.18.18-rancher1-2" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.74" ,
"nginxProxy" : "rancher/rke-tools:v0.1.74" ,
"certDownloader" : "rancher/rke-tools:v0.1.74" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.74" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.18-rancher1" ,
"flannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/mirrored-pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
2021-04-05 19:17:38 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-07-20 20:41:00 +00:00
"v1.18.20-rancher1-1" : {
2021-06-08 17:26:48 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.75" ,
"nginxProxy" : "rancher/rke-tools:v0.1.75" ,
"certDownloader" : "rancher/rke-tools:v0.1.75" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.75" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2021-07-20 20:41:00 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.20-rancher1" ,
2021-06-08 17:26:48 +00:00
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6"
} ,
2021-07-20 20:41:00 +00:00
"v1.18.20-rancher1-2" : {
2021-06-08 17:26:48 +00:00
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.75" ,
"nginxProxy" : "rancher/rke-tools:v0.1.75" ,
"certDownloader" : "rancher/rke-tools:v0.1.75" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.75" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.7" ,
2021-07-20 20:41:00 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.20-rancher1" ,
2021-06-08 17:26:48 +00:00
"flannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/mirrored-calico-node:v3.13.4" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/mirrored-coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/mirrored-pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2020-05-28 04:36:50 +00:00
"v1.18.3-rancher2-1" : {
2020-05-11 22:19:51 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.56" ,
"nginxProxy" : "rancher/rke-tools:v0.1.56" ,
"certDownloader" : "rancher/rke-tools:v0.1.56" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.56" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
2020-05-28 04:36:50 +00:00
"kubernetes" : "rancher/hyperkube:v1.18.3-rancher2" ,
2020-05-11 22:19:51 +00:00
"flannel" : "rancher/coreos-flannel:v0.11.0-rancher1" ,
2020-05-28 04:36:50 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
2020-05-11 22:19:51 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.11.0" ,
2020-05-28 04:36:50 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
2020-07-22 01:23:22 +00:00
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
2020-05-11 22:19:51 +00:00
"podInfraContainer" : "rancher/pause:3.1" ,
2020-05-21 01:13:05 +00:00
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
2020-05-11 22:19:51 +00:00
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.3"
} ,
2020-07-22 01:23:22 +00:00
"v1.18.3-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.58" ,
"nginxProxy" : "rancher/rke-tools:v0.1.58" ,
"certDownloader" : "rancher/rke-tools:v0.1.58" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.58" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.3-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.6-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.59" ,
"nginxProxy" : "rancher/rke-tools:v0.1.59" ,
"certDownloader" : "rancher/rke-tools:v0.1.59" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.59" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.18.6-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2020-08-28 00:07:43 +00:00
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
2020-07-22 01:23:22 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.6-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-09-09 21:45:05 +00:00
"v1.18.8-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.64" ,
"nginxProxy" : "rancher/rke-tools:v0.1.64" ,
"certDownloader" : "rancher/rke-tools:v0.1.64" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.64" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.8-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.32.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-09-18 19:43:56 +00:00
"v1.18.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.3-rancher1" ,
2020-09-25 12:35:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
2020-09-18 19:43:56 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.2" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.2" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.2" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"coredns" : "rancher/coredns-coredns:1.6.9" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.7.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.7" ,
"kubernetes" : "rancher/hyperkube:v1.18.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.12.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.13.4" ,
"calicoCni" : "rancher/calico-cni:v3.13.4" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.13.4" ,
"calicoCtl" : "rancher/calico-ctl:v3.13.4" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"canalNode" : "rancher/calico-node:v3.13.4" ,
"canalCni" : "rancher/calico-cni:v3.13.4" ,
"canalFlannel" : "rancher/coreos-flannel:v0.12.0" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.13.4" ,
"weaveNode" : "weaveworks/weave-kube:2.6.4" ,
"weaveCni" : "weaveworks/weave-npc:2.6.4" ,
"podInfraContainer" : "rancher/pause:3.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-04-16 23:34:34 +00:00
"v1.19.10-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.74" ,
"nginxProxy" : "rancher/rke-tools:v0.1.74" ,
"certDownloader" : "rancher/rke-tools:v0.1.74" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.74" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.10-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-04-16 23:34:34 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
2021-08-10 18:14:03 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-04-16 23:34:34 +00:00
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-07-20 20:41:00 +00:00
"v1.19.12-rancher1-1" : {
2021-06-08 17:26:48 +00:00
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
2021-07-20 20:41:00 +00:00
"alpine" : "rancher/rke-tools:v0.1.75" ,
"nginxProxy" : "rancher/rke-tools:v0.1.75" ,
"certDownloader" : "rancher/rke-tools:v0.1.75" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.75" ,
2021-06-08 17:26:48 +00:00
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
2021-07-20 20:41:00 +00:00
"kubernetes" : "rancher/hyperkube:v1.19.12-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-06-08 17:26:48 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
2021-08-10 18:14:03 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-06-08 17:26:48 +00:00
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-07-29 08:14:06 +00:00
"v1.19.13-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.77" ,
"nginxProxy" : "rancher/rke-tools:v0.1.77" ,
"certDownloader" : "rancher/rke-tools:v0.1.77" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.77" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.13-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-07-29 08:14:06 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
2021-08-10 18:14:03 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-07-29 08:14:06 +00:00
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-08-02 20:31:44 +00:00
"v1.19.13-rancher1-2" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.78" ,
"nginxProxy" : "rancher/rke-tools:v0.1.78" ,
"certDownloader" : "rancher/rke-tools:v0.1.78" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.78" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.13-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/mirrored-coreos-flannel:v0.13.0" ,
2021-08-02 20:31:44 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.48.1-rancher1" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"ingressWebhook" : "rancher/mirrored-jettech-kube-webhook-certgen:v1.5.1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-08-18 07:59:07 +00:00
"v1.19.14-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.78" ,
"nginxProxy" : "rancher/rke-tools:v0.1.78" ,
"certDownloader" : "rancher/rke-tools:v0.1.78" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.78" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.14-rancher1" ,
"flannel" : "rancher/mirrored-coreos-flannel:v0.13.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/mirrored-calico-node:v3.16.5" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.16.5" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.16.5" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.48.1-rancher1" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"ingressWebhook" : "rancher/mirrored-jettech-kube-webhook-certgen:v1.5.1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2020-09-18 19:43:56 +00:00
"v1.19.2-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
2020-09-25 12:35:34 +00:00
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
2020-09-18 19:43:56 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.2-rancher1" ,
2020-09-21 20:49:01 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2020-09-18 19:43:56 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.1" ,
"calicoCni" : "rancher/calico-cni:v3.16.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"canalNode" : "rancher/calico-node:v3.16.1" ,
"canalCni" : "rancher/calico-cni:v3.16.1" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
2020-09-21 20:49:01 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2020-09-18 19:43:56 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
2020-09-14 23:47:56 +00:00
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-10-22 18:57:55 +00:00
"v1.19.3-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.65" ,
"nginxProxy" : "rancher/rke-tools:v0.1.65" ,
"certDownloader" : "rancher/rke-tools:v0.1.65" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.65" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.1" ,
"calicoCni" : "rancher/calico-cni:v3.16.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"canalNode" : "rancher/calico-node:v3.16.1" ,
"canalCni" : "rancher/calico-cni:v3.16.1" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
"v1.19.3-rancher1-2" : {
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
2020-11-02 18:04:47 +00:00
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
2020-10-22 18:57:55 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.3-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.1" ,
"calicoCni" : "rancher/calico-cni:v3.16.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"canalNode" : "rancher/calico-node:v3.16.1" ,
"canalCni" : "rancher/calico-cni:v3.16.1" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2020-11-12 21:38:31 +00:00
"v1.19.4-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.66" ,
"nginxProxy" : "rancher/rke-tools:v0.1.66" ,
"certDownloader" : "rancher/rke-tools:v0.1.66" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.66" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.4-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.1" ,
"calicoCni" : "rancher/calico-cni:v3.16.1" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.1" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"canalNode" : "rancher/calico-node:v3.16.1" ,
"canalCni" : "rancher/calico-cni:v3.16.1" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.1" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4"
} ,
2021-01-27 21:46:24 +00:00
"v1.19.6-rancher1-1" : {
2020-11-20 17:24:29 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
2021-01-27 21:46:24 +00:00
"alpine" : "rancher/rke-tools:v0.1.68" ,
"nginxProxy" : "rancher/rke-tools:v0.1.68" ,
"certDownloader" : "rancher/rke-tools:v0.1.68" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.68" ,
2020-11-20 17:24:29 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
2021-01-27 21:46:24 +00:00
"kubernetes" : "rancher/hyperkube:v1.19.6-rancher1" ,
2020-11-20 17:24:29 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
2021-01-27 21:46:24 +00:00
"calicoNode" : "rancher/calico-node:v3.16.5" ,
"calicoCni" : "rancher/calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/calico-node:v3.16.5" ,
"canalCni" : "rancher/calico-cni:v3.16.5" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
2020-11-20 17:24:29 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-01-27 21:46:24 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
"v1.19.7-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.69" ,
"nginxProxy" : "rancher/rke-tools:v0.1.69" ,
"certDownloader" : "rancher/rke-tools:v0.1.69" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.69" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.7-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.5" ,
"calicoCni" : "rancher/calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/calico-node:v3.16.5" ,
"canalCni" : "rancher/calico-cni:v3.16.5" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
2020-11-20 17:24:29 +00:00
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.4" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-02-18 21:14:14 +00:00
"v1.19.8-rancher1-1" : {
2021-01-27 21:46:24 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
2021-04-05 19:17:38 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2021-01-27 21:46:24 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
2021-02-18 21:14:14 +00:00
"kubernetes" : "rancher/hyperkube:v1.19.8-rancher1" ,
2021-01-27 21:46:24 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.5" ,
"calicoCni" : "rancher/calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/calico-node:v3.16.5" ,
"canalCni" : "rancher/calico-cni:v3.16.5" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-05 19:17:38 +00:00
"v1.19.9-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.13-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.7.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.19.9-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.16.5" ,
"calicoCni" : "rancher/calico-cni:v3.16.5" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"calicoCtl" : "rancher/calico-ctl:v3.16.5" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"canalNode" : "rancher/calico-node:v3.16.5" ,
"canalCni" : "rancher/calico-cni:v3.16.5" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.16.5" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.16.5" ,
"weaveNode" : "weaveworks/weave-kube:2.7.0" ,
"weaveCni" : "weaveworks/weave-npc:2.7.0" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.35.0-rancher2" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.3.6" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-08-18 07:59:07 +00:00
"v1.20.10-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.78" ,
"nginxProxy" : "rancher/rke-tools:v0.1.78" ,
"certDownloader" : "rancher/rke-tools:v0.1.78" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.78" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.20.10-rancher1" ,
"flannel" : "rancher/mirrored-coreos-flannel:v0.13.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.48.1-rancher1" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"ingressWebhook" : "rancher/mirrored-jettech-kube-webhook-certgen:v1.5.1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.4.1" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-02-18 21:14:14 +00:00
"v1.20.4-rancher1-1" : {
2021-02-01 18:06:55 +00:00
"etcd" : "rancher/coreos-etcd:v3.4.14-rancher1" ,
2021-04-05 19:17:38 +00:00
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
2021-02-01 18:06:55 +00:00
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
2021-02-18 21:14:14 +00:00
"kubernetes" : "rancher/hyperkube:v1.20.4-rancher1" ,
2021-02-01 18:06:55 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
2021-02-07 00:47:42 +00:00
"calicoNode" : "rancher/calico-node:v3.17.2" ,
"calicoCni" : "rancher/calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/calico-node:v3.17.2" ,
"canalCni" : "rancher/calico-cni:v3.17.2" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.17.2" ,
2021-02-01 18:06:55 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-02-07 00:47:42 +00:00
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.17.2" ,
2021-02-01 18:06:55 +00:00
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.43.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.4.1" ,
2021-02-18 21:14:14 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
2021-02-01 18:06:55 +00:00
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-05 19:17:38 +00:00
"v1.20.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.4.14-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.72" ,
"nginxProxy" : "rancher/rke-tools:v0.1.72" ,
"certDownloader" : "rancher/rke-tools:v0.1.72" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.72" ,
"kubedns" : "rancher/k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.20.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/calico-node:v3.17.2" ,
"calicoCni" : "rancher/calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/calico-node:v3.17.2" ,
"canalCni" : "rancher/calico-cni:v3.17.2" ,
"canalControllers" : "rancher/calico-kube-controllers:v3.17.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/calico-pod2daemon-flexvol:v3.17.2" ,
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.43.0-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/metrics-server:v0.4.1" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-04-16 23:34:34 +00:00
"v1.20.6-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
2021-04-05 19:17:38 +00:00
"alpine" : "rancher/rke-tools:v0.1.74" ,
"nginxProxy" : "rancher/rke-tools:v0.1.74" ,
"certDownloader" : "rancher/rke-tools:v0.1.74" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.74" ,
2021-04-16 23:34:34 +00:00
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.20.6-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-04-05 19:17:38 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
2021-04-16 23:34:34 +00:00
"calicoNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
2021-08-10 18:14:03 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-04-16 23:34:34 +00:00
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
2021-04-05 19:17:38 +00:00
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
2021-04-16 23:34:34 +00:00
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
2021-04-20 21:38:16 +00:00
"ingress" : "rancher/nginx-ingress-controller:nginx-0.43.0-rancher3" ,
2021-04-16 23:34:34 +00:00
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.4.1" ,
2021-04-05 19:17:38 +00:00
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-07-20 20:41:00 +00:00
"v1.20.8-rancher1-1" : {
2021-06-08 17:26:48 +00:00
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
2021-07-20 20:41:00 +00:00
"alpine" : "rancher/rke-tools:v0.1.75" ,
"nginxProxy" : "rancher/rke-tools:v0.1.75" ,
"certDownloader" : "rancher/rke-tools:v0.1.75" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.75" ,
2021-06-08 17:26:48 +00:00
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
2021-07-20 20:41:00 +00:00
"kubernetes" : "rancher/hyperkube:v1.20.8-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-06-08 17:26:48 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
2021-08-10 18:14:03 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-06-08 17:26:48 +00:00
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.43.0-rancher3" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.4.1" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-07-29 08:14:06 +00:00
"v1.20.9-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.77" ,
"nginxProxy" : "rancher/rke-tools:v0.1.77" ,
"certDownloader" : "rancher/rke-tools:v0.1.77" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.77" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.20.9-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-07-29 08:14:06 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
2021-08-10 18:14:03 +00:00
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
2021-07-29 08:14:06 +00:00
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.43.0-rancher3" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.4.1" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-08-02 20:31:44 +00:00
"v1.20.9-rancher1-2" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.15-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.78" ,
"nginxProxy" : "rancher/rke-tools:v0.1.78" ,
"certDownloader" : "rancher/rke-tools:v0.1.78" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.78" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.15.10" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.15.10" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.15.10" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.8.0" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.1" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.15.13" ,
"kubernetes" : "rancher/hyperkube:v1.20.9-rancher1" ,
2021-08-10 18:14:03 +00:00
"flannel" : "rancher/mirrored-coreos-flannel:v0.13.0" ,
2021-08-02 20:31:44 +00:00
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.17.2" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"canalNode" : "rancher/mirrored-calico-node:v3.17.2" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.17.2" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.17.2" ,
"canalFlannel" : "rancher/coreos-flannel:v0.13.0-rancher1" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.17.2" ,
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/mirrored-pause:3.2" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.48.1-rancher1" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"ingressWebhook" : "rancher/mirrored-jettech-kube-webhook-certgen:v1.5.1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.4.1" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
2021-05-18 01:44:04 +00:00
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2021-08-18 07:59:07 +00:00
"v1.21.4-rancher1-1" : {
"etcd" : "rancher/mirrored-coreos-etcd:v3.4.16-rancher1" ,
"alpine" : "rancher/rke-tools:v0.1.78" ,
"nginxProxy" : "rancher/rke-tools:v0.1.78" ,
"certDownloader" : "rancher/rke-tools:v0.1.78" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.78" ,
"kubedns" : "rancher/mirrored-k8s-dns-kube-dns:1.17.4" ,
"dnsmasq" : "rancher/mirrored-k8s-dns-dnsmasq-nanny:1.17.4" ,
"kubednsSidecar" : "rancher/mirrored-k8s-dns-sidecar:1.17.4" ,
"kubednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.3" ,
"coredns" : "rancher/mirrored-coredns-coredns:1.8.4" ,
"corednsAutoscaler" : "rancher/mirrored-cluster-proportional-autoscaler:1.8.3" ,
"nodelocal" : "rancher/mirrored-k8s-dns-node-cache:1.18.0" ,
"kubernetes" : "rancher/hyperkube:v1.21.4-rancher1" ,
"flannel" : "rancher/mirrored-coreos-flannel:v0.14.0" ,
"flannelCni" : "rancher/flannel-cni:v0.3.0-rancher6" ,
"calicoNode" : "rancher/mirrored-calico-node:v3.19.2" ,
"calicoCni" : "rancher/mirrored-calico-cni:v3.19.2" ,
"calicoControllers" : "rancher/mirrored-calico-kube-controllers:v3.19.2" ,
"calicoCtl" : "rancher/mirrored-calico-ctl:v3.19.2" ,
"calicoFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.19.2" ,
"canalNode" : "rancher/mirrored-calico-node:v3.19.2" ,
"canalCni" : "rancher/mirrored-calico-cni:v3.19.2" ,
"canalControllers" : "rancher/mirrored-calico-kube-controllers:v3.19.2" ,
"canalFlannel" : "rancher/mirrored-coreos-flannel:v0.14.0" ,
"canalFlexVol" : "rancher/mirrored-calico-pod2daemon-flexvol:v3.19.2" ,
"weaveNode" : "weaveworks/weave-kube:2.8.1" ,
"weaveCni" : "weaveworks/weave-npc:2.8.1" ,
"podInfraContainer" : "rancher/mirrored-pause:3.4.1" ,
"ingress" : "rancher/nginx-ingress-controller:nginx-0.48.1-rancher1" ,
"ingressBackend" : "rancher/mirrored-nginx-ingress-controller-defaultbackend:1.5-rancher1" ,
"ingressWebhook" : "rancher/mirrored-jettech-kube-webhook-certgen:v1.5.1" ,
"metricsServer" : "rancher/mirrored-metrics-server:v0.5.0" ,
"windowsPodInfraContainer" : "rancher/kubelet-pause:v0.1.6" ,
"aciCniDeployContainer" : "noiro/cnideploy:5.1.1.0.1ae238a" ,
"aciHostContainer" : "noiro/aci-containers-host:5.1.1.0.1ae238a" ,
"aciOpflexContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciMcastContainer" : "noiro/opflex:5.1.1.0.1ae238a" ,
"aciOvsContainer" : "noiro/openvswitch:5.1.1.0.1ae238a" ,
"aciControllerContainer" : "noiro/aci-containers-controller:5.1.1.0.1ae238a" ,
"aciGbpServerContainer" : "noiro/gbp-server:5.1.1.0.1ae238a" ,
"aciOpflexServerContainer" : "noiro/opflex-server:5.1.1.0.1ae238a"
} ,
2020-02-13 22:55:19 +00:00
"v1.8.11-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.0.17" ,
"alpine" : "rancher/rke-tools:v0.1.8" ,
"nginxProxy" : "rancher/rke-tools:v0.1.8" ,
"certDownloader" : "rancher/rke-tools:v0.1.8" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.8" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.5" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.5" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.5" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.8.11-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.0" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.9.5-rancher1-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.4" ,
"nginxProxy" : "rancher/rke-tools:v0.1.4" ,
"certDownloader" : "rancher/rke-tools:v0.1.4" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.4" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.7" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.7" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.7" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.9.5-rancher1" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.0" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.9.7-rancher2-1" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.8" ,
"nginxProxy" : "rancher/rke-tools:v0.1.8" ,
"certDownloader" : "rancher/rke-tools:v0.1.8" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.8" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.7" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.7" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.7" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.9.7-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.0" ,
"ingress" : "rancher/nginx-ingress-controller:0.10.2-rancher3" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4"
} ,
"v1.9.7-rancher2-2" : {
"etcd" : "rancher/coreos-etcd:v3.1.12" ,
"alpine" : "rancher/rke-tools:v0.1.13" ,
"nginxProxy" : "rancher/rke-tools:v0.1.13" ,
"certDownloader" : "rancher/rke-tools:v0.1.13" ,
"kubernetesServicesSidecar" : "rancher/rke-tools:v0.1.13" ,
"kubedns" : "rancher/k8s-dns-kube-dns-amd64:1.14.7" ,
"dnsmasq" : "rancher/k8s-dns-dnsmasq-nanny-amd64:1.14.7" ,
"kubednsSidecar" : "rancher/k8s-dns-sidecar-amd64:1.14.7" ,
"kubednsAutoscaler" : "rancher/cluster-proportional-autoscaler-amd64:1.0.0" ,
"kubernetes" : "rancher/hyperkube:v1.9.7-rancher2" ,
"flannel" : "rancher/coreos-flannel:v0.9.1" ,
"flannelCni" : "rancher/coreos-flannel-cni:v0.2.0" ,
"calicoNode" : "rancher/calico-node:v3.1.1" ,
"calicoCni" : "rancher/calico-cni:v3.1.1" ,
"calicoCtl" : "rancher/calico-ctl:v2.0.0" ,
"canalNode" : "rancher/calico-node:v3.1.1" ,
"canalCni" : "rancher/calico-cni:v3.1.1" ,
"canalFlannel" : "rancher/coreos-flannel:v0.9.1" ,
"weaveNode" : "weaveworks/weave-kube:2.1.2" ,
"weaveCni" : "weaveworks/weave-npc:2.1.2" ,
"podInfraContainer" : "rancher/pause-amd64:3.0" ,
"ingress" : "rancher/nginx-ingress-controller:0.16.2-rancher1" ,
"ingressBackend" : "rancher/nginx-ingress-controller-defaultbackend:1.4" ,
"metricsServer" : "rancher/metrics-server-amd64:v0.2.1"
}
} ,
"K8sVersionedTemplates" : {
2020-11-20 17:24:29 +00:00
"aci" : {
"\u003e=1.17.0-alpha" : "aci-v5.0.0"
} ,
2020-02-13 22:55:19 +00:00
"calico" : {
"\u003e=1.13.0-rancher0 \u003c1.15.0-rancher0" : "calico-v1.13" ,
2020-05-11 22:19:51 +00:00
"\u003e=1.15.0-rancher0 \u003c1.15.11-rancher1-1" : "calico-v1.15" ,
2020-07-22 01:23:22 +00:00
"\u003e=1.15.11-rancher1-1 \u003c1.15.12-rancher1-1" : "calico-v1.15-privileged" ,
"\u003e=1.15.12-rancher1-1 \u003c1.15.12-rancher2-2" : "calico-v1.15.12" ,
"\u003e=1.15.12-rancher2-2 \u003c1.16.0-alpha" : "calico-v1.15-privileged" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.16.0-alpha \u003c1.16.4-rancher1" : "calico-v1.16" ,
2020-03-16 20:22:50 +00:00
"\u003e=1.16.4-rancher1 \u003c1.16.8-rancher0" : "calico-v1.17" ,
"\u003e=1.16.8-rancher0 \u003c1.17.0-rancher0" : "calico-v1.17-privileged" ,
"\u003e=1.17.0-rancher0 \u003c1.17.4-rancher0" : "calico-v1.17" ,
2020-09-14 23:47:56 +00:00
"\u003e=1.17.4-rancher0 \u003c1.19.0-rancher0" : "calico-v1.17-privileged" ,
2021-01-27 21:46:24 +00:00
"\u003e=1.19.0-rancher0 \u003c1.19.4-rancher1-2" : "calico-v3.16.0" ,
2021-02-18 21:14:14 +00:00
"\u003e=1.19.4-rancher1-2 \u003c1.20.4-rancher1-1" : "calico-v3.16.5" ,
2021-05-18 01:44:04 +00:00
"\u003e=1.20.4-rancher1-1 \u003c1.21.0-rancher1-1" : "calico-v3.17.1" ,
"\u003e=1.21.0-rancher1-1" : "calico-v3.19.0" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.8.0-rancher0 \u003c1.13.0-rancher0" : "calico-v1.8"
} ,
"canal" : {
"\u003e=1.13.0-rancher0 \u003c1.15.0-rancher0" : "canal-v1.13" ,
2020-05-11 22:19:51 +00:00
"\u003e=1.15.0-rancher0 \u003c1.15.11-rancher1-1" : "canal-v1.15" ,
2020-07-22 01:23:22 +00:00
"\u003e=1.15.11-rancher1-1 \u003c1.15.12-rancher1-1" : "canal-v1.15-privileged" ,
"\u003e=1.15.12-rancher1-1 \u003c1.15.12-rancher2-2" : "canal-v1.15.12" ,
2020-05-29 06:47:01 +00:00
"\u003e=1.15.12-rancher2-2 \u003c1.16.0-alpha" : "canal-v1.15-privileged-calico3134" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.16.0-alpha \u003c1.16.4-rancher1" : "canal-v1.16" ,
2020-05-29 06:47:01 +00:00
"\u003e=1.16.10-rancher2-1 \u003c1.17.0-rancher0" : "canal-v1.17-privileged-calico3134" ,
2020-03-16 20:22:50 +00:00
"\u003e=1.16.4-rancher1 \u003c1.16.8-rancher0" : "canal-v1.17" ,
2020-05-29 06:47:01 +00:00
"\u003e=1.16.8-rancher0 \u003c1.16.10-rancher2-1" : "canal-v1.17-privileged" ,
2020-03-16 20:22:50 +00:00
"\u003e=1.17.0-rancher0 \u003c1.17.4-rancher0" : "canal-v1.17" ,
2020-05-29 06:47:01 +00:00
"\u003e=1.17.4-rancher0 \u003c1.17.6-rancher2-1" : "canal-v1.17-privileged" ,
2020-09-14 23:47:56 +00:00
"\u003e=1.17.6-rancher2-1 \u003c1.19.0-rancher0" : "canal-v1.17-privileged-calico3134" ,
2021-01-27 21:46:24 +00:00
"\u003e=1.19.0-rancher0 \u003c1.19.4-rancher1-2" : "canal-v3.16.0" ,
2021-02-18 21:14:14 +00:00
"\u003e=1.19.4-rancher1-2 \u003c1.20.4-rancher1-1" : "canal-v3.16.5" ,
2021-05-18 01:44:04 +00:00
"\u003e=1.20.4-rancher1-1 \u003c1.21.0-rancher1-1" : "canal-v3.17.1" ,
"\u003e=1.21.0-rancher1-1" : "canal-v3.19.0" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.8.0-rancher0 \u003c1.13.0-rancher0" : "canal-v1.8"
} ,
"coreDNS" : {
"\u003e=1.16.0-alpha \u003c1.17.0-alpha" : "coredns-v1.16" ,
2021-05-18 01:44:04 +00:00
"\u003e=1.17.0-alpha \u003c1.21.0-rancher1-1" : "coredns-v1.17" ,
"\u003e=1.21.0-rancher1-1" : "coredns-v1.8.3" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.8.0-rancher0 \u003c1.16.0-alpha" : "coredns-v1.8"
} ,
"flannel" : {
"\u003e=1.15.0-rancher0 \u003c1.16.0-alpha" : "flannel-v1.15" ,
2021-06-25 18:36:33 +00:00
"\u003e=1.16.0-alpha \u003c1.21.0-alpha" : "flannel-v1.16" ,
"\u003e=1.21.0-alpha" : "flannel-v0.14.0" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.8.0-rancher0 \u003c1.15.0-rancher0" : "flannel-v1.8"
} ,
"kubeDNS" : {
"\u003e=1.16.0-alpha" : "kubedns-v1.16" ,
"\u003e=1.8.0-rancher0 \u003c1.16.0-alpha" : "kubedns-v1.8"
} ,
"metricsServer" : {
2021-06-25 18:36:33 +00:00
"\u003e=1.20.4-rancher1-1 \u003c1.21.0-alpha" : "metricsserver-v1.20" ,
"\u003e=1.21.0-alpha" : "metricsserver-v0.5.0" ,
2021-02-18 21:14:14 +00:00
"\u003e=1.8.0-rancher0 \u003c1.20.4-rancher1-1" : "metricsserver-v1.8"
2020-02-13 22:55:19 +00:00
} ,
"nginxIngress" : {
"\u003e=1.13.10-rancher1-3 \u003c1.14.0-rancher0" : "nginxingress-v1.15" ,
"\u003e=1.14.0-rancher0 \u003c=1.14.6-rancher1-1" : "nginxingress-v1.8" ,
"\u003e=1.14.6-rancher2 \u003c1.15.0-rancher0" : "nginxingress-v1.15" ,
"\u003e=1.15.0-rancher0 \u003c=1.15.3-rancher1-1" : "nginxingress-v1.8" ,
2020-07-22 01:23:22 +00:00
"\u003e=1.15.12-rancher1-1 \u003c1.16.1-rancher1-1" : "nginxingress-v1.15.12" ,
"\u003e=1.15.3-rancher2 \u003c1.15.12-rancher1-1" : "nginxingress-v1.15" ,
2020-05-21 01:13:05 +00:00
"\u003e=1.16.1-rancher1-1 \u003c1.16.10-rancher1-1" : "nginxingress-v1.15" ,
"\u003e=1.16.10-rancher1-1 \u003c1.17.0-rancher1-1" : "nginxingress-v1.15.12" ,
"\u003e=1.17.0-rancher1-1 \u003c1.17.6-rancher1-1" : "nginxingress-v1.15" ,
2021-05-18 01:44:04 +00:00
"\u003e=1.17.6-rancher1-1 \u003c1.21.0-rancher1-1" : "nginxingress-v1.15.12" ,
2021-08-02 20:31:44 +00:00
"\u003e=1.21.0-rancher1-1" : "nginxingress-v0.48.1" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.8.0-rancher0 \u003c1.13.10-rancher1-3" : "nginxingress-v1.8"
} ,
2020-03-03 17:09:06 +00:00
"nodelocal" : {
2020-03-16 20:22:50 +00:00
"\u003e=1.15.11-rancher0 \u003c1.16.0-alpha" : "nodelocal-v1.15" ,
"\u003e=1.16.8-rancher0 \u003c1.17.0-alpha" : "nodelocal-v1.15" ,
2021-05-18 01:44:04 +00:00
"\u003e=1.17.4-rancher0 \u003c1.21.0-rancher1-1" : "nodelocal-v1.15" ,
"\u003e=1.21.0-rancher1-1" : "nodelocal-v1.21"
2020-03-03 17:09:06 +00:00
} ,
2020-02-13 22:55:19 +00:00
"templateKeys" : {
2020-11-26 16:29:51 +00:00
"aci-v5.0.0" : "\napiVersion: v1\nkind: Namespace\nmetadata:\n name: aci-containers-system\n labels:\n aci-containers-config-version: \"{{.Token}}\"\n network-plugin: aci-containers\n---\n{{- if eq .UseAciCniPriorityClass \"true\"}}\napiVersion: scheduling.k8s.io/v1beta1\nkind: PriorityClass\nmetadata:\n name: acicni-priority\nvalue: 1000000000\nglobalDefault: false\ndescription: \"This priority class is used for ACI-CNI resources\"\n---\n{{- end }}\n{{- if ne .UseAciAnywhereCRD \"false\" } } \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : e p g s . a c i . a w \ n s p e c : \ n g r o u p : a c i . a w \ n n a m e s : \ n k i n d : E p g \ n l i s t K i n d : E p g L i s t \ n p l u r a l : e p g s \ n s c o p e : N a m e s p a c e d \ n v e r s i o n : v 1 \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : c o n t r a c t s . a c i . a w \ n s p e c : \ n g r o u p : a c i . a w \ n n a m e s : \ n k i n d : C o n t r a c t \ n l i s t K i n d : C o n t r a c t L i s t \ n p l u r a l : c o n t r a c t s \ n s c o p e : N a m e s p a c e d \ n v e r s i o n : v 1 \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : p o d i f s . a c i . a w \ n s p e c : \ n g r o u p : a c i . a w \ n n a m e s : \ n k i n d : P o d I F \ n l i s t K i n d : P o d I F L i s t \ n p l u r a l : p o d i f s \ n s c o p e : N a m e s p a c e d \ n v e r s i o n : v 1 \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : g b p s s t a t e s . a c i . a w \ n s p e c : \ n g r o u p : a c i . a w \ n n a m e s : \ n k i n d : G B P S S t a t e \ n l i s t K i n d : G B P S S t a t e L i s t \ n p l u r a l : g b p s s t a t e s \ n s c o p e : N a m e s p a c e d \ n v e r s i o n : v 1 \ n s u b r e s o u r c e s : \ n s t a t u s : { } \ n - - - \ n { { - e n d } } \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : s n a t g l o b a l i n f o s . a c i . s n a t \ n s p e c : \ n g r o u p : a c i . s n a t \ n n a m e s : \ n k i n d : S n a t G l o b a l I n f o \ n l i s t K i n d : S n a t G l o b a l I n f o L i s t \ n p l u r a l : s n a t g l o b a l i n f o s \ n s i n g u l a r : s n a t g l o b a l i n f o \ n s c o p e : N a m e s p a c e d \ n v e r s i o n : v 1 \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : s n a t l o c a l i n f o s . a c i . s n a t \ n s p e c : \ n g r o u p : a c i . s n a t \ n n a m e s : \ n k i n d : S n a t L o c a l I n f o \ n l i s t K i n d : S n a t L o c a l I n f o L i s t \ n p l u r a l : s n a t l o c a l i n f o s \ n s i n g u l a r : s n a t l o c a l i n f o \ n s c o p e : N a m e s p a c e d \ n v e r s i o n : v 1 \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : s n a t p o l i c i e s . a c i . s n a t \ n s p e c : \ n g r o u p : a c i . s n a t \ n n a m e s : \ n k i n d : S n a t P o l i c y \ n l i s t K i n d : S n a t P o l i c y L i s t \ n p l u r a l : s n a t p o l i c i e s \ n s i n g u l a r : s n a t p o l i c y \ n s c o p e : C l u s t e r \ n s u b r e s o u r c e s : \ n s t a t u s : { } \ n v a l i d a t i o n : \ n o p e n A P I V 3 S c h e m a : \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n properties:\n selector:\n properties:\n labels:\n type: object\n properties:\n additionalProperties:\n type: string\n namespace:\n type: string\n type: object\n snatIp:\n type: array\n destIp:\n type: array\n type: object\n version: v1\n versions:\n - name: v1\n served: true\n storage: true\n---\napiVersion: apiextensions.k8s.io/v1beta1\nkind: CustomResourceDefinition\nmetadata:\n name: nodeinfos.aci.snat\nspec:\n group: aci.snat\n names:\n kind: NodeInfo\n listKind: NodeInfoList\n plural: nodeinfos\n singu
2020-02-13 22:55:19 +00:00
"calico-v1.13" : "\n{{if eq .RBACConfig \"rbac\"}}\n## start rbac here\n\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: calico-node\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-node\nsubjects:\n- kind: ServiceAccount\n name: calico-node\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n{{end}}\n## end rbac here\n\n---\n# This ConfigMap is used to configure a self-hosted Calico installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: calico-config\n namespace: kube-system\ndata:\n # To enable Typha, set this to \"calico-typha\" *and* set a non-zero value for Typha replicas\n # below. We recommend using Typha if you have more than 50 nodes. Above 100 nodes it is\n # essential.\n typha_service_name: \"none\"\n # Configure the Calico backend to use.\n calico_backend: \"bird\"\n\n # Configure the MTU to use\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1440\"\n{{- end}}\n\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.0\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \" h o s t - l o c a
"calico-v1.15" : "\n{{if eq .RBACConfig \"rbac\"}}\n---\n# Source: calico/templates/rbac.yaml\n# Include a clusterrole for the kube-controllers component,\n# and bind it to the calico-kube-controllers serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-kube-controllers\nrules:\n # Nodes are watched to monitor for deletions.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - watch\n - list\n - get\n # Pods are queried to check for existence.\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n # IPAM resources are manipulated when nodes are deleted.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n verbs:\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - blockaffinities\n - ipamblocks\n - ipamhandles\n verbs:\n - get\n - list\n - create\n - update\n - delete\n # Needs access to update clusterinformations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - clusterinformations\n verbs:\n - get\n - create\n - update\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-kube-controllers\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-kube-controllers\nsubjects:\n- kind: ServiceAccount\n name: calico-kube-controllers\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\" ] \ n r e s o u r c e s : \ n - b g p c o n f i g u r a t i o n s \ n - b g p p e e r s \ n v e r b s : \ n - c r e a t e \ n - u p d a t e \ n # T h e
2021-02-07 00:47:42 +00:00
"calico-v1.15-privileged" : "\n# CalicoTemplateV115Privileged\n{{if eq .RBACConfig \"rbac\"}}\n# Source: calico/templates/rbac.yaml\n# Include a clusterrole for the kube-controllers component,\n# and bind it to the calico-kube-controllers serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nrules:\n # Nodes are watched to monitor for deletions.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - watch\n - list\n - get\n # Pods are queried to check for existence.\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n # IPAM resources are manipulated when nodes are deleted.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n verbs:\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - blockaffinities\n - ipamblocks\n - ipamhandles\n verbs:\n - get\n - list\n - create\n - update\n - delete\n # Needs access to update clusterinformations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - clusterinformations\n verbs:\n - get\n - create\n - update\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-kube-controllers\nsubjects:\n- kind: ServiceAccount\n name: calico-kube-controllers\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n # Pod CIDR auto-detection on kubeadm needs access to config maps.\n - apiGroups: [\"\"]\n resources:\n - configmaps\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\" ] \ n r e s o u r c e s : \ n - n o d e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n # T h e s e p e r m i s s i o n s a r e o n l y r e q u r i e d f o r u p g r a d e f r o m v 2.6 , a n d c a n \ n # b e r e m o v
2020-07-22 01:23:22 +00:00
"calico-v1.15.12" : "\n{{if eq .RBACConfig \"rbac\"}}\n---\n# Source: calico/templates/rbac.yaml\n# Include a clusterrole for the kube-controllers component,\n# and bind it to the calico-kube-controllers serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-kube-controllers\nrules:\n # Nodes are watched to monitor for deletions.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - watch\n - list\n - get\n # Pods are queried to check for existence.\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n # IPAM resources are manipulated when nodes are deleted.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n verbs:\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - blockaffinities\n - ipamblocks\n - ipamhandles\n verbs:\n - get\n - list\n - create\n - update\n - delete\n # Needs access to update clusterinformations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - clusterinformations\n verbs:\n - get\n - create\n - update\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-kube-controllers\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-kube-controllers\nsubjects:\n- kind: ServiceAccount\n name: calico-kube-controllers\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\" ] \ n r e s o u r c e s : \ n - b g p c o n f i g u r a t i o n s \ n - b g p p e e r s \ n v e r b s : \ n - c r e a t e \ n - u p d a t e \ n #
2020-03-03 17:09:06 +00:00
"calico-v1.16" : "\n{{if eq .RBACConfig \"rbac\"}}\n# Source: calico/templates/rbac.yaml\n\n# Include a clusterrole for the kube-controllers component,\n# and bind it to the calico-kube-controllers serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nrules:\n # Nodes are watched to monitor for deletions.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - watch\n - list\n - get\n # Pods are queried to check for existence.\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n # IPAM resources are manipulated when nodes are deleted.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n verbs:\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - blockaffinities\n - ipamblocks\n - ipamhandles\n verbs:\n - get\n - list\n - create\n - update\n - delete\n # Needs access to update clusterinformations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - clusterinformations\n verbs:\n - get\n - create\n - update\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-kube-controllers\nsubjects:\n- kind: ServiceAccount\n name: calico-kube-controllers\n namespace: kube-system\n---\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n # These permissions are required for Calico CNI to perform IPAM allocations.\n - apiGroups: [\" c r d
"calico-v1.17" : "\n{{if eq .RBACConfig \"rbac\"}}\n# Source: calico/templates/rbac.yaml\n\n# Include a clusterrole for the kube-controllers component,\n# and bind it to the calico-kube-controllers serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nrules:\n # Nodes are watched to monitor for deletions.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - watch\n - list\n - get\n # Pods are queried to check for existence.\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n # IPAM resources are manipulated when nodes are deleted.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n verbs:\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - blockaffinities\n - ipamblocks\n - ipamhandles\n verbs:\n - get\n - list\n - create\n - update\n - delete\n # Needs access to update clusterinformations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - clusterinformations\n verbs:\n - get\n - create\n - update\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-kube-controllers\nsubjects:\n- kind: ServiceAccount\n name: calico-kube-controllers\n namespace: kube-system\n---\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\" ] \ n r e s o u r c e s : \ n - b g p c o n f i g u r a t i o n s \ n - b g p p e e r s \ n v e r b s : \ n - c r e a t e \ n - u p d a t e \ n # T h e s e p e r m i s s i o n s a r e r e q u i r e d f o r C a l i c o C N I t o p e r f o r m I P A M a l l o c a t i o n
2021-02-09 01:34:29 +00:00
"calico-v1.17-privileged" : "\n# CalicoTemplateV117Privileged\n{{if eq .RBACConfig \"rbac\"}}\n# Source: calico/templates/rbac.yaml\n# Include a clusterrole for the kube-controllers component,\n# and bind it to the calico-kube-controllers serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nrules:\n # Nodes are watched to monitor for deletions.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - watch\n - list\n - get\n # Pods are queried to check for existence.\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n # IPAM resources are manipulated when nodes are deleted.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n verbs:\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - blockaffinities\n - ipamblocks\n - ipamhandles\n verbs:\n - get\n - list\n - create\n - update\n - delete\n # Needs access to update clusterinformations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - clusterinformations\n verbs:\n - get\n - create\n - update\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-kube-controllers\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-kube-controllers\nsubjects:\n- kind: ServiceAccount\n name: calico-kube-controllers\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico-node\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n # Pod CIDR auto-detection on kubeadm needs access to config maps.\n - apiGroups: [\"\"]\n resources:\n - configmaps\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\" ] \ n r e s o u r c e s : \ n - n o d e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n # T h e s e p e r m i s s i o n s a r e o n l y r e q u r i e d f o r u p g r a d e f r o m v 2.6 , a n d c a n \ n # b e r e m o v
2020-02-13 22:55:19 +00:00
"calico-v1.8" : "\n{{if eq .RBACConfig \"rbac\"}}\n## start rbac here\n\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico-node\nrules:\n - apiGroups: [\"\"]\n resources:\n - namespaces\n verbs:\n - get\n - list\n - watch\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - update\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n - list\n - watch\n - patch\n - apiGroups: [\"\"]\n resources:\n - services\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - update\n - watch\n - apiGroups: [\"extensions\"]\n resources:\n - networkpolicies\n verbs:\n - get\n - list\n - watch\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - clusterinformations\n - hostendpoints\n verbs:\n - create\n - get\n - list\n - update\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: calico-node\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-node\nsubjects:\n- kind: ServiceAccount\n name: calico-node\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n{{end}}\n## end rbac here\n\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: calico-config\n namespace: kube-system\ndata:\n # To enable Typha, set this to \"calico-typha\" *and* set a non-zero value for Typha replicas\n # below. We recommend using Typha if you have more than 50 nodes. Above 100 nodes it is\n # essential.\n typha_service_name: \"none\"\n # The CNI network configuration to install on each node.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.0\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": 1500,\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\",\n \"k8s_auth_token\": \"__SERVICEACCOUNT_TOKEN__\"\n },\n \"kubernetes\": {\n \"k8s_api_root\": \"https://__KUBERNETES_SERVICE_HOST__:__KUBERNETES_SERVICE_PORT__\",\n \"kubeconfig\": \"{{.KubeCfg}}\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\" : true } \ n } \ n ] \ n } \ n \ n - - - \ n \ n # T h i s m a n i f e s t i n s t a l l s t h e c a l i c o / n o d e c o n t a i n e r , a s w e l l \ n # a s t h e C a l i c o C N I p l u g i n s a n d n e t w o r k c o n f i g o n \ n # e a c h m a s t e r a n d w o r k e r n o d e i n a K u b e r n e t e s c l u s t e r . \ n k i n d : D a e m o n S e t \ n a p i V e r s i o n : e x t e n s i o n s / v 1 b e t a 1 \ n m e t a d a t a : \ n n a m e : c a l i c o - n o d e \ n n a m e s p a c e : k u b e - s y s t e m \ n l a b e l s : \ n k 8 s - a p p : c a l i c o - n o d e \ n s p e c : \ n s e l e c t o r : \ n m a t c h L a b e l s : \ n k 8 s - a p p : c a l i c o - n o d e \ n u p d a t e S t r a t e g y : \ n { { i f . U p d a t e S t r a t e g y } } \ n { { t o Y a m l . U p d a t e S t r a t e g y | i n d e n t 4 } } \ n { { e l s e } } \ n t y p e : R o l l i n g U p d a t e \ n r o l l i n g U p d a t e : \ n m a x U n a v a i l a b l e : 1 \ n { { e n d } } \ n t e m p l a t e : \ n m e t a d a t a : \ n l a b e l s : \ n k 8 s - a p p : c a l i c o - n o d e \ n a n n o t a t i o n s : \ n # T h i s , a l o n g w i t h t h e C r i t i c a l A d d o n s O n l y t o l e r a t i o n b e l o w , \ n # m a r k s t h e p o d a s a c r i t i c a l a d d - o n , e n s u r i n g i t g e t s \ n # p r i o r i t y s c h e d u l i n g a n d t h a t i t s r e s o u r c e s a r e r e s e r v e d \ n # i f i t e v e r g e t s e v i c t e d . \ n s c h e d u l e r . a l p h a . k u b e r n e t e s . i o / c r i t i c
2021-02-07 00:47:42 +00:00
"calico-v3.16.0" : "\n# Calico Template based on Calico v3.16.0\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Calico installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: calico-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # Configure the backend to use.\n calico_backend: \"bird\"\n # Configure the MTU to use for workload interfaces and tunnels.\n # - If Wireguard is enabled, set to your network MTU - 60\n # - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50\n # - Otherwise, if IPIP is enabled, set to your network MTU - 20\n # - Otherwise, if not using any encapsulation, set to your network MTU.\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1440\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"calico-ipam\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\" : true } \ n } \ n ] \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n a n n o t a t i o n s : \ n c o n t r o l l e r - g e n . k u b e b u i l d e r . i o / v e r s i o n : ( d e v e l ) \ n c r e a t i o n T i m e s t a m p : null \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n arbitrary names for tagging routes.\n items:\n description: Community contains standard or large community value\n and its name.\n
"calico-v3.16.5" : "\n# Calico Template based on Calico v3.16.5\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Calico installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: calico-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # Configure the backend to use.\n calico_backend: \"bird\"\n # Configure the MTU to use for workload interfaces and tunnels.\n # - If Wireguard is enabled, set to your network MTU - 60\n # - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50\n # - Otherwise, if IPIP is enabled, set to your network MTU - 20\n # - Otherwise, if not using any encapsulation, set to your network MTU.\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1440\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"calico-ipam\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\" : true } \ n } \ n ] \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n a n n o t a t i o n s : \ n c o n t r o l l e r - g e n . k u b e b u i l d e r . i o / v e r s i o n : ( d e v e l ) \ n c r e a t i o n T i m e s t a m p : null \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n arbitrary names for tagging routes.\n items:\n description: Community contains standard or large community value\n and its name.\n
2021-02-12 16:14:07 +00:00
"calico-v3.17.1" : "\n# Calico Template based on Calico v3.17.1\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Calico installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: calico-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # Configure the backend to use.\n calico_backend: \"bird\"\n # Configure the MTU to use for workload interfaces and tunnels.\n # - If Wireguard is enabled, set to your network MTU - 60\n # - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50\n # - Otherwise, if IPIP is enabled, set to your network MTU - 20\n # - Otherwise, if not using any encapsulation, set to your network MTU.\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1440\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"calico-ipam\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\" : true } \ n } \ n ] \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n arbitrary names for tagging routes.\n items:\n description: Community contains standard or large community value\n and its name.\n properties:\n name:\n description: Name given to comm
2021-07-06 17:45:01 +00:00
"calico-v3.19.0" : "\n{{- $cidrs := splitList \",\" .ClusterCIDR }}\n# Calico Template based on Calico v3.19.0\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Calico installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: calico-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # Configure the backend to use.\n calico_backend: \"bird\"\n # Configure the MTU to use for workload interfaces and tunnels.\n # - If Wireguard is enabled, set to your network MTU - 60\n # - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50\n # - Otherwise, if IPIP is enabled, set to your network MTU - 20\n # - Otherwise, if not using any encapsulation, set to your network MTU.\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1440\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n # Rancher specific change: \"assign_ipv6\": \"true\" if dualstack configuration is found\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n{{- if eq (len $cidrs) 2 }}\n \"type\": \"calico-ipam\",\n \"assign_ipv4\": \"true\",\n \"assign_ipv6\": \"true\"\n{{- else }}\n \"type\": \"calico-ipam\"\n{{- end}}\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\" : true } \ n } \ n ] \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and
2020-02-13 22:55:19 +00:00
"canal-v1.13" : "\n{{if eq .RBACConfig \"rbac\"}}\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: calico-node\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-node\nsubjects:\n- kind: ServiceAccount\n name: calico-node\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nrules:\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\" \ n r e s o u r c e s : \ n - n o d e s / s t a t u s \ n v e r b s : \ n - p a t c h \ n - - - \ n # B i n d t h e f l a n n e l C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n k i n d : C l u s t e r R o l e B i n d i n g \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n m e t a d a t a : \ n n a m e : c a n a l - f l a n n e l \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : f l a n n e l \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - - - \ n # B i n d t h e C a l i c o C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : c a n a l - c a l i c o \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : c a l i c o \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : G r o u p \
"canal-v1.15" : "\n{{if eq .RBACConfig \"rbac\"}}\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: calico-node\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-node\nsubjects:\n- kind: ServiceAccount\n name: calico-node\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nrules:\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\" \ n r e s o u r c e s : \ n - n o d e s / s t a t u s \ n v e r b s : \ n - p a t c h \ n - - - \ n # B i n d t h e f l a n n e l C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n k i n d : C l u s t e r R o l e B i n d i n g \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n m e t a d a t a : \ n n a m e : c a n a l - f l a n n e l \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : f l a n n e l \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - - - \ n # B i n d t h e C a l i c o C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : c a n a l - c a l i c o \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : c a l i c o \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - a p i G r o u p :
2020-03-14 09:43:00 +00:00
"canal-v1.15-privileged" : "\n# CanalTemplateV115Privileged\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: canal\n namespace: kube-system\n---\n# Source: calico/templates/rbac.yaml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nrules:\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n - patch\n---\n# Bind the flannel ClusterRole to the canal ServiceAccount.\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: canal-flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: canal\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: canal-calico\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico\nsubjects:\n- kind: ServiceAccount\n name: canal\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n{{end}}\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\" \ n # T h e
2020-05-29 06:47:01 +00:00
"canal-v1.15-privileged-calico3134" : "\n# CanalTemplateV115PrivilegedCalico3134\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: canal\n namespace: kube-system\n---\n# Source: calico/templates/rbac.yaml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n # Pod CIDR auto-detection on kubeadm needs access to config maps.\n - apiGroups: [\"\"]\n resources:\n - configmaps\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nrules:\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups: [\"\" ] \ n r e s o u r c e s : \ n - n o d e s / s t a t u s \ n v e r b s : \ n - p a t c h \ n - - - \ n # B i n d t h e f l a n n e l C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n k i n d : C l u s t e r R o l e B i n d i n g \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n m e t a d a t a : \ n n a m e : c a n a l - f l a n n e l \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : f l a n n e l \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : c a n a l - c a l i c o \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : c a l i c o \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : G r o u p \ n n a m e : s y s t e m : n o d e s \ n { { e n d } } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / c a l i c o - c o n f i g . y a m l \ n # T h i s C o n f i g M a p i s u s e d t o c o n f i g u r e a s e l f - h o s t e d C a n a l i n s t
2020-07-22 01:23:22 +00:00
"canal-v1.15.12" : "\n{{if eq .RBACConfig \"rbac\"}}\n# Include a clusterrole for the calico-node DaemonSet,\n# and bind it to the calico-node serviceaccount.\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: calico-node\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico-node\nsubjects:\n- kind: ServiceAccount\n name: calico-node\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nrules:\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\" \ n r e s o u r c e s : \ n - n o d e s / s t a t u s \ n v e r b s : \ n - p a t c h \ n - - - \ n # B i n d t h e f l a n n e l C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n k i n d : C l u s t e r R o l e B i n d i n g \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n m e t a d a t a : \ n n a m e : c a n a l - f l a n n e l \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : f l a n n e l \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - - - \ n # B i n d t h e C a l i c o C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : c a n a l - c a l i c o \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : c a l i c o \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - a p i G r o u
2020-03-03 17:09:06 +00:00
"canal-v1.16" : "\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n \"mtu\": {{.MTU}},\n{{- end}}\n{{- end}}\n \"log_level\": \"WARNING\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\",\n \"k8s_auth_token\": \"__SERVICEACCOUNT_TOKEN__\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"{{.KubeCfg}}\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n }\n ]\n }\n\n # Flannel network configuration. Mounted into the flannel container.\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\" \ n } \ n } \ n \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : f e l i x c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : F e l i x C o n f i g u r a t i o n \ n p l u r a l : f e l i x c o n f i g u r a t i o n s \ n s i n g u l a r : f e l i x c o n f i g u r a t i o n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : i p p o o l s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : I P P o o l \ n p l u r a l : i p p o o l s \ n s i n g u l a r : i p p o o l \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : h o s t e n d p o i n t s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : H o s t E n d p o i n t \ n p l u r a l : h o s t e n d p o i n t s \ n s i n g u l a r : h o s t e n d p o i n t \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : c l u s t e r i n f o r m a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : C l u s t e r I n f o r m a t i o n \ n p l u r a l : c l u s t e r i n f o r m a t i o n s \ n s i n g u l a r : c l u s t e r i n f o r m a t i o n \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : g l o b a l n e t w o r k p o l i c i e s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : G l o b a l N e t w o r k P o l i c y \ n p l u r a l : g l o b a l n e t w o r k p o l i c i e s \ n s i n g u l a r : g l o b a l n e t w o r k p o l i c y \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : g l o b a l n e t w o r k s e t s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : G l o b a l N e t w o r k S e t \ n p l u r a l : g l o b a l n e t w o r k s e t s \ n s i n g u
"canal-v1.17" : "\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n \"mtu\": {{.MTU}},\n{{- end}}\n{{- end}}\n \"log_level\": \"WARNING\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\",\n \"k8s_auth_token\": \"__SERVICEACCOUNT_TOKEN__\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"{{.KubeCfg}}\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n }\n ]\n }\n\n # Flannel network configuration. Mounted into the flannel container.\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\" \ n } \ n } \ n \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : f e l i x c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : F e l i x C o n f i g u r a t i o n \ n p l u r a l : f e l i x c o n f i g u r a t i o n s \ n s i n g u l a r : f e l i x c o n f i g u r a t i o n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : i p p o o l s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : I P P o o l \ n p l u r a l : i p p o o l s \ n s i n g u l a r : i p p o o l \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : h o s t e n d p o i n t s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : H o s t E n d p o i n t \ n p l u r a l : h o s t e n d p o i n t s \ n s i n g u l a r : h o s t e n d p o i n t \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : c l u s t e r i n f o r m a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : C l u s t e r I n f o r m a t i o n \ n p l u r a l : c l u s t e r i n f o r m a t i o n s \ n s i n g u l a r : c l u s t e r i n f o r m a t i o n \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : g l o b a l n e t w o r k p o l i c i e s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : G l o b a l N e t w o r k P o l i c y \ n p l u r a l : g l o b a l n e t w o r k p o l i c i e s \ n s i n g u l a r : g l o b a l n e t w o r k p o l i c y \ n \ n - - - \ n \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : g l o b a l n e t w o r k s e t s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n s c o p e : C l u s t e r \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n v e r s i o n : v 1 \ n n a m e s : \ n k i n d : G l o b a l N e t w o r k S e t \ n p l u r a l : g l o b a l n e t w o r k s e t s \ n s i n g u
2020-03-14 09:43:00 +00:00
"canal-v1.17-privileged" : "\n# CanalTemplateV117Privileged\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: canal\n namespace: kube-system\n---\n# Source: calico/templates/rbac.yaml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nrules:\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n - patch\n---\n# Bind the flannel ClusterRole to the canal ServiceAccount.\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: canal-flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: canal\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: canal-calico\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico\nsubjects:\n- kind: ServiceAccount\n name: canal\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n{{end}}\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\" \ n # T h e
2021-02-07 00:47:42 +00:00
"canal-v1.17-privileged-calico3134" : "\n# CanalTemplateV117PrivilegedCalico3134\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: canal\n namespace: kube-system\n---\n# Source: calico/templates/rbac.yaml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: calico\nrules:\n # The CNI plugin needs to get pods, nodes, and namespaces.\n - apiGroups: [\"\"]\n resources:\n - pods\n - nodes\n - namespaces\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n - services\n verbs:\n # Used to discover service IPs for advertisement.\n - watch\n - list\n # Used to discover Typhas.\n - get\n # Pod CIDR auto-detection on kubeadm needs access to config maps.\n - apiGroups: [\"\"]\n resources:\n - configmaps\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes/status\n verbs:\n # Needed for clearing NodeNetworkUnavailable flag.\n - patch\n # Calico stores some configuration information in node annotations.\n - update\n # Watch for changes to Kubernetes NetworkPolicies.\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - watch\n - list\n # Used by Calico for policy information.\n - apiGroups: [\"\"]\n resources:\n - pods\n - namespaces\n - serviceaccounts\n verbs:\n - list\n - watch\n # The CNI plugin patches pods/status.\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - patch\n # Calico monitors various CRDs for config.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - ipamblocks\n - globalnetworkpolicies\n - globalnetworksets\n - networkpolicies\n - networksets\n - clusterinformations\n - hostendpoints\n - blockaffinities\n verbs:\n - get\n - list\n - watch\n # Calico must create and update some CRDs on startup.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - ippools\n - felixconfigurations\n - clusterinformations\n verbs:\n - create\n - update\n # Calico stores some configuration information on the node.\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - watch\n # These permissions are only requried for upgrade from v2.6, and can\n # be removed after upgrade or on fresh installations.\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - bgpconfigurations\n - bgppeers\n verbs:\n - create\n - update\n---\n# Flannel ClusterRole\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nrules:\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups: [\"\" ] \ n r e s o u r c e s : \ n - n o d e s / s t a t u s \ n v e r b s : \ n - p a t c h \ n - - - \ n # B i n d t h e f l a n n e l C l u s t e r R o l e t o t h e c a n a l S e r v i c e A c c o u n t . \ n k i n d : C l u s t e r R o l e B i n d i n g \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n m e t a d a t a : \ n n a m e : c a n a l - f l a n n e l \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : f l a n n e l \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : c a n a l - c a l i c o \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : c a l i c o \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : c a n a l \ n n a m e s p a c e : k u b e - s y s t e m \ n - a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : G r o u p \ n n a m e : s y s t e m : n o d e s \ n { { e n d } } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / c a l i c o - c o n f i g . y a m l \ n # T h i s C o n f i g M a p i s u s e d t o c o n f i g u r e a s e l f - h o s t e d C a n a l i n s t
2020-02-13 22:55:19 +00:00
"canal-v1.8" : "\n{{if eq .RBACConfig \"rbac\"}}\n# Calico Roles\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: calico\nrules:\n - apiGroups: [\"\"]\n resources:\n - namespaces\n verbs:\n - get\n - list\n - watch\n - apiGroups: [\"\"]\n resources:\n - pods/status\n verbs:\n - update\n - apiGroups: [\"\"]\n resources:\n - pods\n verbs:\n - get\n - list\n - watch\n - patch\n - apiGroups: [\"\"]\n resources:\n - services\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - endpoints\n verbs:\n - get\n - apiGroups: [\"\"]\n resources:\n - nodes\n verbs:\n - get\n - list\n - update\n - watch\n - apiGroups: [\"networking.k8s.io\"]\n resources:\n - networkpolicies\n verbs:\n - get\n - list\n - watch\n - apiGroups: [\"crd.projectcalico.org\"]\n resources:\n - globalfelixconfigs\n - felixconfigurations\n - bgppeers\n - globalbgpconfigs\n - bgpconfigurations\n - ippools\n - globalnetworkpolicies\n - networkpolicies\n - clusterinformations\n - hostendpoints\n - globalnetworksets\n verbs:\n - create\n - get\n - list\n - update\n - watch\n\n---\n\n# Flannel roles\n# Pulled from https://github.com/coreos/flannel/blob/master/Documentation/kube-flannel-rbac.yml\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nrules:\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes/status\n verbs:\n - patch\n---\n\n# Bind the flannel ClusterRole to the canal ServiceAccount.\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: canal-flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: canal\n namespace: kube-system\n\n---\n\n# Bind the calico ClusterRole to the canal ServiceAccount.\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: canal-calico\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: calico\nsubjects:\n- kind: ServiceAccount\n name: canal\n namespace: kube-system\n- apiGroup: rbac.authorization.k8s.io\n kind: Group\n name: system:nodes\n{{end}}\n\n# Canal Version v3.1.1\n# https://docs.projectcalico.org/v3.1/releases#v3.1.1\n# This manifest includes the following component versions:\n# calico/node:v3.1.1\n# calico/cni:v3.1.1\n# coreos/flannel:v0.9.1\n\n---\n# This ConfigMap can be used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n\n # The CNI network configuration to install on each node.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.0\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\",\n \"k8s_auth_token\": \"__SERVICEACCOUNT_TOKEN__\"\n },\n \"kubernetes\": {\n \"k8s_api_root\": \"https://__KUBERNETES_SERVICE_HOST__:__KUBERNETES_SERVICE_PORT__\",\n \" k u b
2021-02-07 00:47:42 +00:00
"canal-v3.16.0" : "\n# Canal Template based on Canal v3.16.0 \n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n # Configure the MTU to use\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1450\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\": true}\n }\n ]\n }\n # Flannel network configuration. Mounted into the flannel container.\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\" \ n } \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n a n n o t a t i o n s : \ n c o n t r o l l e r - g e n . k u b e b u i l d e r . i o / v e r s i o n : ( d e v e l ) \ n c r e a t i o n T i m e s t a m p : null \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n
"canal-v3.16.5" : "\n# Canal Template based on Canal v3.16.5\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n # Configure the MTU to use\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1450\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\": true}\n }\n ]\n }\n # Flannel network configuration. Mounted into the flannel container.\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\" \ n } \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n a n n o t a t i o n s : \ n c o n t r o l l e r - g e n . k u b e b u i l d e r . i o / v e r s i o n : ( d e v e l ) \ n c r e a t i o n T i m e s t a m p : null \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n
2021-02-12 16:14:07 +00:00
"canal-v3.17.1" : "\n# Canal Template based on Canal v3.17.1\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n # Configure the MTU to use\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1450\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\": true}\n }\n ]\n }\n # Flannel network configuration. Mounted into the flannel container.\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\" \ n } \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n arbitrary names for tagging routes.\n items:\n description: Co
2021-05-18 01:44:04 +00:00
"canal-v3.19.0" : "\n# Canal Template based on Canal v3.19.0\n---\n# Source: calico/templates/calico-config.yaml\n# This ConfigMap is used to configure a self-hosted Canal installation.\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: canal-config\n namespace: kube-system\ndata:\n # Typha is disabled.\n typha_service_name: \"none\"\n # The interface used by canal for host \u003c-\u003e host communication.\n # If left blank, then the interface is chosen using the node's\n # default route.\n canal_iface: \"{{.CanalInterface}}\"\n # Whether or not to masquerade traffic to destinations not within\n # the pod network.\n masquerade: \"true\"\n # Configure the MTU to use\n{{- if .MTU }}\n{{- if ne .MTU 0 }}\n veth_mtu: \"{{.MTU}}\"\n{{- end}}\n{{- else }}\n veth_mtu: \"1450\"\n{{- end}}\n # The CNI network configuration to install on each node. The special\n # values in this config will be automatically populated.\n cni_network_config: |-\n {\n \"name\": \"k8s-pod-network\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"calico\",\n \"log_level\": \"WARNING\",\n \"log_file_path\": \"/var/log/calico/cni/cni.log\",\n \"datastore_type\": \"kubernetes\",\n \"nodename\": \"__KUBERNETES_NODE_NAME__\",\n \"mtu\": __CNI_MTU__,\n \"ipam\": {\n \"type\": \"host-local\",\n \"subnet\": \"usePodCidr\"\n },\n \"policy\": {\n \"type\": \"k8s\"\n },\n \"kubernetes\": {\n \"kubeconfig\": \"__KUBECONFIG_FILEPATH__\"\n }\n },\n {\n \"type\": \"portmap\",\n \"snat\": true,\n \"capabilities\": {\"portMappings\": true}\n },\n {\n \"type\": \"bandwidth\",\n \"capabilities\": {\"bandwidth\": true}\n }\n ]\n }\n # Flannel network configuration. Mounted into the flannel container.\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\" \ n } \ n } \ n - - - \ n # S o u r c e : c a l i c o / t e m p l a t e s / k d d - c r d s . y a m l \ n - - - \ n a p i V e r s i o n : a p i e x t e n s i o n s . k 8 s . i o / v 1 \ n k i n d : C u s t o m R e s o u r c e D e f i n i t i o n \ n m e t a d a t a : \ n n a m e : b g p c o n f i g u r a t i o n s . c r d . p r o j e c t c a l i c o . o r g \ n s p e c : \ n g r o u p : c r d . p r o j e c t c a l i c o . o r g \ n n a m e s : \ n k i n d : B G P C o n f i g u r a t i o n \ n l i s t K i n d : B G P C o n f i g u r a t i o n L i s t \ n p l u r a l : b g p c o n f i g u r a t i o n s \ n s i n g u l a r : b g p c o n f i g u r a t i o n \ n s c o p e : C l u s t e r \ n v e r s i o n s : \ n - n a m e : v 1 \ n s c h e m a : \ n o p e n A P I V 3 S c h e m a : \ n d e s c r i p t i o n : B G P C o n f i g u r a t i o n c o n t a i n s t h e c o n f i g u r a t i o n f o r a n y B G P r o u t i n g . \ n p r o p e r t i e s : \ n a p i V e r s i o n : \ n d e s c r i p t i o n : ' A P I V e r s i o n d e f i n e s t h e v e r s i o n e d s c h e m a o f t h i s r e p r e s e n t a t i o n \ n o f a n o b j e c t . S e r v e r s s h o u l d c o n v e r t r e c o g n i z e d s c h e m a s t o t h e l a t e s t \ n i n t e r n a l v a l u e , a n d m a y r e j e c t u n r e c o g n i z e d v a l u e s . M o r e i n f o : h t t p s : //git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'\n type: string\n kind:\n description: 'Kind is a string value representing the REST resource this\n object represents. Servers may infer this from the endpoint the client\n submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'\n type: string\n metadata:\n type: object\n spec:\n description: BGPConfigurationSpec contains the values of the BGP configuration.\n properties:\n asNumber:\n description: 'ASNumber is the default AS number used by a node. [Default:\n 64512]'\n format: int32\n type: integer\n communities:\n description: Communities is a list of BGP community values and their\n arbitrary names for tagging routes.\n items:\n description: Co
2020-02-13 22:55:19 +00:00
"coredns-v1.16" : "\n---\n{{- if eq .RBACConfig \"rbac\"}}\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: coredns\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - namespaces\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n annotations:\n rbac.authorization.kubernetes.io/autoupdate: \"true\"\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:coredns\nsubjects:\n- kind: ServiceAccount\n name: coredns\n namespace: kube-system\n{{- end }}\n---\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: coredns\n namespace: kube-system\ndata:\n Corefile: |\n .:53 {\n errors\n health\n ready\n kubernetes {{.ClusterDomain}} {{ if .ReverseCIDRs }}{{ .ReverseCIDRs }}{{ else }}{{ \"in-addr.arpa ip6.arpa\" }}{{ end }} {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n }\n prometheus :9153\n\t{{- if .UpstreamNameservers }}\n forward . {{range $i, $v := .UpstreamNameservers}}{{if $i}} {{end}}{{.}}{{end}}\n\t{{- else }}\n forward . \"/etc/resolv.conf\"\n\t{{- end }}\n cache 30\n loop\n reload\n loadbalance\n }\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: coredns\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/name: \"CoreDNS\"\nspec:\n strategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n type: RollingUpdate\n rollingUpdate:\n maxUnavailable: 1\n{{end}}\n selector:\n matchLabels:\n k8s-app: kube-dns\n template:\n metadata:\n labels:\n k8s-app: kube-dns\n annotations:\n seccomp.security.alpha.kubernetes.io/pod: 'docker/default'\n spec:\n priorityClassName: system-cluster-critical\n{{- if eq .RBACConfig \"rbac\"}}\n serviceAccountName: coredns\n{{- end }}\n tolerations:\n - key: \"CriticalAddonsOnly\"\n operator: \"Exists\"\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n nodeSelector:\n beta.kubernetes.io/os: linux\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/worker\n operator: Exists\n containers:\n - name: coredns\n image: {{.CoreDNSImage}}\n imagePullPolicy: IfNotPresent\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n args: [ \"-conf\", \"/etc/coredns/Corefile\" ] \ n v o l u m e M o u n t s : \ n - n a m e : c o n f i g - v o l u m e \ n m o u n t P a t h : / e t c / c o r e d n s \ n r e a d O n l y : true \ n p o r t s : \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s \ n p r o t o c o l : U D P \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s - t c p \ n p r o t o c o l : T C P \ n - c o n t a i n e r P o r t : 9153 \ n n a m e : m e t r i c s \ n p r o t o c o l : T C P \ n l i v e n e s s P r o b e : \ n h t t p G e t : \ n p a t h : / h e a l t h \ n p o r t : 8080 \ n s c h e m e : H T T P \ n i n i t i a l D e l a y S e c o n d s : 60 \ n t i m e o u t S e c o n d s : 5 \ n s u c c e s s T h r e s h o l d : 1 \ n f a i l u r e T h r e s h o l d : 5 \ n r e a d i n e s s P r o b e : \ n h t t p G e t : \ n p a t h : / r e a d y \ n p o r t : 8181 \ n s c h e m e : H T T P \ n s e c u r i t y C o n t e x t : \ n a l l o w P r i v i l e g e E s c a l a t i o n : false \ n c a p a b i l i t i e s : \ n a d d : \ n
2021-02-07 00:47:42 +00:00
"coredns-v1.17" : "\n---\n{{- if eq .RBACConfig \"rbac\"}}\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: coredns\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - namespaces\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n annotations:\n rbac.authorization.kubernetes.io/autoupdate: \"true\"\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:coredns\nsubjects:\n- kind: ServiceAccount\n name: coredns\n namespace: kube-system\n{{- end }}\n---\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: coredns\n namespace: kube-system\ndata:\n Corefile: |\n .:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes {{.ClusterDomain}} {{ if .ReverseCIDRs }}{{ .ReverseCIDRs }}{{ else }}{{ \"in-addr.arpa ip6.arpa\" }}{{ end }} {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n }\n prometheus :9153\n\t{{- if .UpstreamNameservers }}\n forward . {{range $i, $v := .UpstreamNameservers}}{{if $i}} {{end}}{{.}}{{end}}\n\t{{- else }}\n forward . \"/etc/resolv.conf\"\n\t{{- end }}\n cache 30\n loop\n reload\n loadbalance\n }\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: coredns\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/name: \"CoreDNS\"\nspec:\n replicas: 1\n strategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n type: RollingUpdate\n rollingUpdate:\n maxUnavailable: 1\n{{end}}\n selector:\n matchLabels:\n k8s-app: kube-dns\n template:\n metadata:\n labels:\n k8s-app: kube-dns\n annotations:\n seccomp.security.alpha.kubernetes.io/pod: 'docker/default'\n spec:\n # Rancher specific change\n priorityClassName: {{ .CoreDNSPriorityClassName | default \"system-cluster-critical\" }}\n{{- if eq .RBACConfig \"rbac\"}}\n serviceAccountName: coredns\n{{- end }}\n{{- if .Tolerations}}\n tolerations:\n{{ toYaml .Tolerations | indent 6}}\n{{- else }}\n tolerations:\n - key: \"CriticalAddonsOnly\"\n operator: \"Exists\"\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n{{- end }}\n nodeSelector:\n beta.kubernetes.io/os: linux\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/worker\n operator: Exists\n podAntiAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n - labelSelector:\n matchExpressions:\n - key: k8s-app\n operator: In\n values: [\"kube-dns\"]\n topologyKey: kubernetes.io/hostname\n containers:\n - name: coredns\n image: {{.CoreDNSImage}}\n imagePullPolicy: IfNotPresent\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n args: [ \"-conf\", \"/etc/coredns/Corefile\" ] \ n v o l u m e M o u n t s : \ n - n a m e : c o n f i g - v o l u m e \ n m o u n t P a t h : / e t c / c o r e d n s \ n r e a d O n l y : true \ n p o r t s : \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s \ n p r o t o c o l : U D P \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s - t c p \ n p r o t o c o l : T C P \ n - c o n t a i n e r P o r t : 915
2020-02-13 22:55:19 +00:00
"coredns-v1.8" : "\n---\n{{- if eq .RBACConfig \"rbac\"}}\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: coredns\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n addonmanager.kubernetes.io/mode: Reconcile\n name: system:coredns\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - namespaces\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n annotations:\n rbac.authorization.kubernetes.io/autoupdate: \"true\"\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n addonmanager.kubernetes.io/mode: EnsureExists\n name: system:coredns\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:coredns\nsubjects:\n- kind: ServiceAccount\n name: coredns\n namespace: kube-system\n{{- end }}\n---\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: coredns\n namespace: kube-system\n labels:\n addonmanager.kubernetes.io/mode: EnsureExists\ndata:\n Corefile: |\n .:53 {\n errors\n health\n kubernetes {{.ClusterDomain}} {{ if .ReverseCIDRs }}{{ .ReverseCIDRs }}{{ else }}{{ \"in-addr.arpa ip6.arpa\" }}{{ end }} {\n pods insecure\n upstream\n fallthrough in-addr.arpa ip6.arpa\n ttl 30\n }\n prometheus :9153\n\t{{- if .UpstreamNameservers }}\n forward . {{range $i, $v := .UpstreamNameservers}}{{if $i}} {{end}}{{.}}{{end}}\n\t{{- else }}\n forward . \"/etc/resolv.conf\"\n\t{{- end }}\n cache 30\n loop\n reload\n loadbalance\n }\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: coredns\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n kubernetes.io/name: \"CoreDNS\"\nspec:\n strategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n type: RollingUpdate\n rollingUpdate:\n maxUnavailable: 1\n{{end}}\n selector:\n matchLabels:\n k8s-app: kube-dns\n template:\n metadata:\n labels:\n k8s-app: kube-dns\n annotations:\n seccomp.security.alpha.kubernetes.io/pod: 'docker/default'\n spec:\n priorityClassName: system-cluster-critical\n{{- if eq .RBACConfig \"rbac\"}}\n serviceAccountName: coredns\n{{- end }}\n tolerations:\n - key: \"CriticalAddonsOnly\"\n operator: \"Exists\"\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n nodeSelector:\n beta.kubernetes.io/os: linux\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/worker\n operator: Exists\n containers:\n - name: coredns\n image: {{.CoreDNSImage}}\n imagePullPolicy: IfNotPresent\n resources:\n limits:\n memory: 170Mi\n requests:\n cpu: 100m\n memory: 70Mi\n args: [ \"-conf\", \"/etc/coredns/Corefile\" ] \ n v o l u m e M o u n t s : \ n - n a m e : c o n f i g - v o l u m e \ n m o u n t P a t h : / e t c / c o r e d n s \ n r e a d O n l y : true \ n p o r t s : \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s \ n p r o t o c o l : U D P \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s - t c p \ n p r o t o c o l : T C P \ n - c o n t a i n e r P o r t : 9153 \ n n a m e : m e t r i c s \ n p r o t o c o l : T C P \ n l i v e n e s s P r o b e : \ n h t t p G e t : \ n p a t h : / h e a l t h \ n p o r t : 8080 \ n
2021-05-18 01:44:04 +00:00
"coredns-v1.8.3" : "\n# Based on coredns/deployment/kubernetes/coredns.yaml.sed v1.8.3\n---\n{{- if eq .RBACConfig \"rbac\"}}\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: coredns\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nrules:\n- apiGroups:\n - \"\"\n resources:\n - endpoints\n - services\n - pods\n - namespaces\n verbs:\n - list\n - watch\n- apiGroups:\n - discovery.k8s.io\n resources:\n - endpointslices\n verbs:\n - list\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n annotations:\n rbac.authorization.kubernetes.io/autoupdate: \"true\"\n labels:\n kubernetes.io/bootstrapping: rbac-defaults\n name: system:coredns\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:coredns\nsubjects:\n- kind: ServiceAccount\n name: coredns\n namespace: kube-system\n{{- end }}\n---\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: coredns\n namespace: kube-system\ndata:\n Corefile: |\n .:53 {\n errors\n health {\n lameduck 5s\n }\n ready\n kubernetes {{.ClusterDomain}} {{ if .ReverseCIDRs }}{{ .ReverseCIDRs }}{{ else }}{{ \"in-addr.arpa ip6.arpa\" }}{{ end }} {\n pods insecure\n fallthrough in-addr.arpa ip6.arpa\n }\n prometheus :9153\n\t{{- if .UpstreamNameservers }}\n forward . {{range $i, $v := .UpstreamNameservers}}{{if $i}} {{end}}{{.}}{{end}}\n\t{{- else }}\n forward . \"/etc/resolv.conf\"\n\t{{- end }}\n cache 30\n loop\n reload\n loadbalance\n } # STUBDOMAINS - Rancher specific change\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: coredns\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/name: \"CoreDNS\"\nspec:\n # replicas is not specified in upstream template, default is 1. \n # Will be tuned in real time if DNS horizontal auto-scaling is turned on.\n replicas: 1\n strategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n type: RollingUpdate\n rollingUpdate:\n maxUnavailable: 1\n{{end}}\n selector:\n matchLabels:\n k8s-app: kube-dns\n template:\n metadata:\n labels:\n k8s-app: kube-dns\n annotations:\n seccomp.security.alpha.kubernetes.io/pod: 'docker/default'\n spec:\n # Rancher specific change\n priorityClassName: {{ .CoreDNSPriorityClassName | default \"system-cluster-critical\" }}\n{{- if eq .RBACConfig \"rbac\"}}\n serviceAccountName: coredns\n{{- end }}\n{{- if .Tolerations}}\n tolerations:\n{{ toYaml .Tolerations | indent 6}}\n{{- else }}\n tolerations:\n - key: \"CriticalAddonsOnly\"\n operator: \"Exists\"\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n{{- end }}\n nodeSelector:\n beta.kubernetes.io/os: linux\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: node-role.kubernetes.io/worker\n operator: Exists\n podAntiAffinity:\n preferredDuringSchedulingIgnoredDuringExecution:\n - weight: 100\n podAffinityTerm:\n labelSelector:\n matchExpressions:\n - key: k8s-app\n operator: In\n values: [\"kube-dns\" ] \ n t o p o l o g y K e y : k u b e r n e t e s . i o / h o s t n a m e \ n c o n t a i n e r s : \ n - n a m e : c o r e d n s \ n i m a g e : { { . C o r e D N S I m a g e } } \ n i m a g e P u l l P o l i c y : I f N o t P r e s e n t \ n r e s o u r c e s : \ n l i m i t s : \ n m e m o r y : 170 M i \ n r e q u e s t s : \ n c p u : 100 m \ n m e m o r y : 70 M i \ n a r g s :
2021-08-02 17:49:15 +00:00
"flannel-v0.14.0" : "\n---\napiVersion: policy/v1beta1\nkind: PodSecurityPolicy\nmetadata:\n name: psp.flannel.unprivileged\n annotations:\n seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default\n seccomp.security.alpha.kubernetes.io/defaultProfileName: docker/default\n apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default\n apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default\nspec:\n privileged: false\n volumes:\n - configMap\n - secret\n - emptyDir\n - hostPath\n allowedHostPaths:\n - pathPrefix: \"/etc/cni/net.d\"\n - pathPrefix: \"/etc/kube-flannel\"\n - pathPrefix: \"/run/flannel\"\n readOnlyRootFilesystem: false\n # Users and groups\n runAsUser:\n rule: RunAsAny\n supplementalGroups:\n rule: RunAsAny\n fsGroup:\n rule: RunAsAny\n # Privilege Escalation\n allowPrivilegeEscalation: false\n defaultAllowPrivilegeEscalation: false\n # Capabilities\n allowedCapabilities: ['NET_ADMIN', 'NET_RAW']\n defaultAddCapabilities: []\n requiredDropCapabilities: []\n # Host namespaces\n hostPID: false\n hostIPC: false\n hostNetwork: true\n hostPorts:\n - min: 0\n max: 65535\n # SELinux\n seLinux:\n # SELinux is unused in CaaSP\n rule: 'RunAsAny'\n{{- if eq .RBACConfig \"rbac\"}}\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nrules:\n- apiGroups: ['extensions']\n resources: ['podsecuritypolicies']\n verbs: ['use']\n resourceNames: ['psp.flannel.unprivileged']\n- apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n- apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n- apiGroups:\n - \"\"\n resources:\n - nodes/status\n verbs:\n - patch\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: flannel\n namespace: kube-system\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: flannel\n namespace: kube-system\n{{- end}}\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: kube-flannel-cfg\n namespace: kube-system\n labels:\n tier: node\n app: flannel\ndata:\n cni-conf.json: |\n {\n \"name\": \"cbr0\",\n \"cniVersion\": \"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"flannel\",\n \"delegate\": {\n \"forceAddress\": true,\n \"hairpinMode\": true,\n \"isDefaultGateway\": true\n }\n },\n {\n \"type\": \"portmap\",\n \"capabilities\": {\n \"portMappings\": true\n }\n }\n ]\n }\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\",\n \"VNI\": {{.FlannelBackend.VNI}},\n \"Port\": {{.FlannelBackend.Port}}\n }\n }\n---\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: kube-flannel\n namespace: kube-system\n labels:\n tier: node\n k8s-app: flannel\nspec:\n selector:\n matchLabels:\n k8s-app: flannel\n template:\n metadata:\n labels:\n tier: node\n k8s-app: flannel\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: kubernetes.io/os\n operator: In\n values:\n - linux\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n hostNetwork: true\n# Rancher specific change\n{{- if .KubeFlannelPriorityClassName }}\n priorityClassName: {{ .KubeFlannelPriorityClassName }}\n{{- end }}\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\" \ n { { e n d } } \ n { { e n d } } \ n p r i o r i t y C l a s s N a m e : s y s t e m -
2020-02-13 22:55:19 +00:00
"flannel-v1.15" : "\n{{- if eq .RBACConfig \"rbac\"}}\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nrules:\n - apiGroups: ['extensions']\n resources: ['podsecuritypolicies']\n verbs: ['use']\n resourceNames: ['psp.flannel.unprivileged']\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes/status\n verbs:\n - patch\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: flannel\n namespace: kube-system\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: flannel\n namespace: kube-system\n{{end}}\n---\napiVersion: extensions/v1beta1\nkind: PodSecurityPolicy\nmetadata:\n name: psp.flannel.unprivileged\n annotations:\n seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default\n seccomp.security.alpha.kubernetes.io/defaultProfileName: docker/default\n apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default\n apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default\nspec:\n privileged: false\n volumes:\n - configMap\n - secret\n - emptyDir\n - hostPath\n allowedHostPaths:\n - pathPrefix: \"/etc/cni/net.d\"\n - pathPrefix: \"/etc/kube-flannel\"\n - pathPrefix: \"/run/flannel\"\n readOnlyRootFilesystem: false\n # Users and groups\n runAsUser:\n rule: RunAsAny\n supplementalGroups:\n rule: RunAsAny\n fsGroup:\n rule: RunAsAny\n # Privilege Escalation\n allowPrivilegeEscalation: false\n defaultAllowPrivilegeEscalation: false\n # Capabilities\n allowedCapabilities: ['NET_ADMIN']\n defaultAddCapabilities: []\n requiredDropCapabilities: []\n # Host namespaces\n hostPID: false\n hostIPC: false\n hostNetwork: true\n hostPorts:\n - min: 0\n max: 65535\n # SELinux\n seLinux:\n # SELinux is unsed in CaaSP\n rule: 'RunAsAny'\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: kube-flannel-cfg\n namespace: kube-system\n labels:\n tier: node\n app: flannel\ndata:\n cni-conf.json: |\n {\n \"name\": \"cbr0\",\n \"cniVersion\":\"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"flannel\",\n \"delegate\": {\n \"hairpinMode\": true,\n \"isDefaultGateway\": true\n }\n },\n {\n \"type\": \"portmap\",\n \"capabilities\": {\n \"portMappings\": true\n }\n }\n ]\n }\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\",\n \"VNI\": {{.FlannelBackend.VNI}},\n \"Port\": {{.FlannelBackend.Port}}\n }\n }\n---\napiVersion: extensions/v1beta1\nkind: DaemonSet\nmetadata:\n name: kube-flannel\n namespace: kube-system\n labels:\n tier: node\n k8s-app: flannel\nspec:\n template:\n metadata:\n labels:\n tier: node\n k8s-app: flannel\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n hostNetwork: true\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n tolerations:\n - operator: Exists\n {{- if eq .RBACConfig \"rbac\" } } \ n s e r v i c e A c c o u n t N a m e : f l a n n e l \ n { { e n d } } \ n c o n t a i n e r s : \ n - n a m e : k u b e - f l a n n e l \ n i m a g e : { { . I m a g e } } \ n c o m m a n d : \ n - / o p t / b i n / f l a n n e l d \ n a r g s : \ n - - - i p - m a s q \ n
2021-02-07 00:47:42 +00:00
"flannel-v1.16" : "\n{{- if eq .RBACConfig \"rbac\"}}\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nrules:\n - apiGroups: ['extensions']\n resources: ['podsecuritypolicies']\n verbs: ['use']\n resourceNames: ['psp.flannel.unprivileged']\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes/status\n verbs:\n - patch\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1beta1\nmetadata:\n name: flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: flannel\n namespace: kube-system\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: flannel\n namespace: kube-system\n{{end}}\n---\napiVersion: policy/v1beta1\nkind: PodSecurityPolicy\nmetadata:\n name: psp.flannel.unprivileged\n annotations:\n seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default\n seccomp.security.alpha.kubernetes.io/defaultProfileName: docker/default\n apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default\n apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default\nspec:\n privileged: false\n volumes:\n - configMap\n - secret\n - emptyDir\n - hostPath\n allowedHostPaths:\n - pathPrefix: \"/etc/cni/net.d\"\n - pathPrefix: \"/etc/kube-flannel\"\n - pathPrefix: \"/run/flannel\"\n readOnlyRootFilesystem: false\n # Users and groups\n runAsUser:\n rule: RunAsAny\n supplementalGroups:\n rule: RunAsAny\n fsGroup:\n rule: RunAsAny\n # Privilege Escalation\n allowPrivilegeEscalation: false\n defaultAllowPrivilegeEscalation: false\n # Capabilities\n allowedCapabilities: ['NET_ADMIN']\n defaultAddCapabilities: []\n requiredDropCapabilities: []\n # Host namespaces\n hostPID: false\n hostIPC: false\n hostNetwork: true\n hostPorts:\n - min: 0\n max: 65535\n # SELinux\n seLinux:\n # SELinux is unsed in CaaSP\n rule: 'RunAsAny'\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: kube-flannel-cfg\n namespace: kube-system\n labels:\n tier: node\n app: flannel\ndata:\n cni-conf.json: |\n {\n \"name\": \"cbr0\",\n \"cniVersion\":\"0.3.1\",\n \"plugins\": [\n {\n \"type\": \"flannel\",\n \"delegate\": {\n \"hairpinMode\": true,\n \"isDefaultGateway\": true\n }\n },\n {\n \"type\": \"portmap\",\n \"capabilities\": {\n \"portMappings\": true\n }\n }\n ]\n }\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\",\n \"VNI\": {{.FlannelBackend.VNI}},\n \"Port\": {{.FlannelBackend.Port}}\n }\n }\n---\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: kube-flannel\n namespace: kube-system\n labels:\n tier: node\n k8s-app: flannel\nspec:\n selector:\n matchLabels:\n k8s-app: flannel\n template:\n metadata:\n labels:\n tier: node\n k8s-app: flannel\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n hostNetwork: true\n# Rancher specific change\n{{- if .KubeFlannelPriorityClassName }}\n priorityClassName: {{ .KubeFlannelPriorityClassName }}\n{{- end }}\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n tolerations:\n - operator: Exists\n {{- if eq .RBACConfig \"rbac\" } } \ n s e r v i c e A c c o u n t N a m e : f l a n n e
2020-02-13 22:55:19 +00:00
"flannel-v1.8" : "\n{{- if eq .RBACConfig \"rbac\"}}\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: flannel\nsubjects:\n- kind: ServiceAccount\n name: flannel\n namespace: kube-system\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: flannel\nrules:\n - apiGroups:\n - \"\"\n resources:\n - pods\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes/status\n verbs:\n - patch\n{{- end}}\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: kube-flannel-cfg\n namespace: \"kube-system\"\n labels:\n tier: node\n app: flannel\ndata:\n cni-conf.json: |\n {\n \"name\":\"cbr0\",\n \"cniVersion\":\"0.3.1\",\n \"plugins\":[\n {\n \"type\":\"flannel\",\n \"delegate\":{\n \"forceAddress\":true,\n \"isDefaultGateway\":true\n }\n },\n {\n \"type\":\"portmap\",\n \"capabilities\":{\n \"portMappings\":true\n }\n }\n ]\n }\n net-conf.json: |\n {\n \"Network\": \"{{.ClusterCIDR}}\",\n \"Backend\": {\n \"Type\": \"{{.FlannelBackend.Type}}\",\n \"VNI\": {{.FlannelBackend.VNI}},\n \"Port\": {{.FlannelBackend.Port}}\n }\n }\n---\napiVersion: extensions/v1beta1\nkind: DaemonSet\nmetadata:\n name: kube-flannel\n namespace: \"kube-system\"\n labels:\n tier: node\n k8s-app: flannel\nspec:\n template:\n metadata:\n labels:\n tier: node\n k8s-app: flannel\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n serviceAccountName: flannel\n containers:\n - name: kube-flannel\n image: {{.Image}}\n imagePullPolicy: IfNotPresent\n resources:\n limits:\n cpu: 300m\n memory: 500M\n requests:\n cpu: 150m\n memory: 64M\n {{- if .FlannelInterface}}\n command: [\"/opt/bin/flanneld\",\"--ip-masq\",\"--kube-subnet-mgr\",\"--iface={{.FlannelInterface}}\"]\n {{- else}}\n command: [\"/opt/bin/flanneld\",\"--ip-masq\",\"--kube-subnet-mgr\"]\n {{- end}}\n securityContext:\n privileged: true\n env:\n - name: POD_NAME\n valueFrom:\n fieldRef:\n fieldPath: metadata.name\n - name: POD_NAMESPACE\n valueFrom:\n fieldRef:\n fieldPath: metadata.namespace\n volumeMounts:\n - name: run\n mountPath: /run\n - name: cni\n mountPath: /etc/cni/net.d\n - name: flannel-cfg\n mountPath: /etc/kube-flannel/\n - name: install-cni\n image: {{.CNIImage}}\n command: [\"/install-cni.sh\"]\n env:\n # The CNI network config to install on each node.\n - name: CNI_NETWORK_CONFIG\n valueFrom:\n configMapKeyRef:\n name: kube-flannel-cfg\n key: cni-conf.json\n - name: CNI_CONF_NAME\n value: \"10-flannel.conflist\"\n volumeMounts:\n - name: cni\n mountPath: /host/etc/cni/net.d\n - name: host-cni-bin\n mountPath: /host/opt/cni/bin/\n hostNetwork: true\n tolerations:\n {{- if ge .ClusterVersion \"v1.12\" } } \ n - o p e r a t o r : E x i s t s \ n e f f e c t : N o S c h e d u l e \ n - o p e r a t o r : E x i s t s \ n e f f e c t : N o E x e c u t e \ n
2021-02-07 00:47:42 +00:00
"kubedns-v1.16" : "\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: kube-dns-autoscaler\n namespace: kube-system\n labels:\n k8s-app: kube-dns-autoscaler\nspec:\n selector:\n matchLabels:\n k8s-app: kube-dns-autoscaler\n template:\n metadata:\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n - key: node-role.kubernetes.io/worker\n operator: Exists\n serviceAccountName: kube-dns-autoscaler\n# Rancher specific change\n{{- if .KubeDNSAutoscalerPriorityClassName }}\n priorityClassName: {{ .KubeDNSAutoscalerPriorityClassName }}\n{{- end }}\n{{- if .Tolerations}}\n tolerations:\n{{ toYaml .Tolerations | indent 6}}\n{{- else }}\n tolerations:\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n{{- end }}\n containers:\n - name: autoscaler\n image: {{.KubeDNSAutoScalerImage}}\n resources:\n requests:\n cpu: \"20m\"\n memory: \"10Mi\"\n command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n # When cluster is using large nodes(with more cores), \"coresPerReplica\" should dominate.\n # If using small nodes, \"nodesPerReplica\" should dominate.\n{{if .LinearAutoscalerParams}}\n - --default-params={\"linear\":{{.LinearAutoscalerParams}}}\n{{else}}\n - --default-params={\"linear\":{\"coresPerReplica\":128,\"nodesPerReplica\":4,\"min\":1,\"preventSinglePointFailure\":true}}\n{{end}}\n - --logtostderr=true\n - --v=2\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: kube-dns-autoscaler\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n{{- if eq .RBACConfig \"rbac\"}}\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: system:kube-dns-autoscaler\nrules:\n - apiGroups: [\"\"]\n resources: [\"nodes\"]\n verbs: [\"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"replicationcontrollers/scale\"]\n verbs: [\"get\", \"update\"]\n - apiGroups: [\"extensions\",\"apps\"]\n resources: [\"deployments/scale\", \"replicasets/scale\"]\n verbs: [\"get\", \"update\"]\n - apiGroups: [\"\"]\n resources: [\"configmaps\"]\n verbs: [\"get\", \"create\"]\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: system:kube-dns-autoscaler\nsubjects:\n - kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system\nroleRef:\n kind: ClusterRole\n name: system:kube-dns-autoscaler\n apiGroup: rbac.authorization.k8s.io\n{{- end }}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: kube-dns\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: kube-dns\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\" \ n a d d o n m a n a g e r . k u b e r n e t e s . i o / m o d e : R e c o n c i l e \ n s p e c : \ n # r e p l i c a s : n o t s p e c i f i e d h e r e : \ n # 1 . I n o r d e r t o m a k e A d d o n M a n a g e r d o n o t r e c o n c i l e t h i s r e p l i c a s p a r a m e t e r . \ n # 2 . D e f a u l t i s 1 . \ n # 3 . W i l l b e t u n e d i n r e a l t i m e i f D N S h o r i z o n t a l a u t o - s c a l i n g i s t u r n e d o n . \ n s t r a t e g y : \ n { { i f . U p d a t e S t r a t e g y } } \ n { { t o Y a m l . U p d a t e S t r a t e g y | i n d e n t 4 } } \ n { { e l s e } } \ n r o l l i n g U p d a t e : \ n m a x S u r g e : 10 % \ n m a x U n a v a i l a b l e : 0 \ n { { e n d } } \ n s e l e c t o r : \ n m a t c h L a b e l s : \ n k 8 s - a p p : k u b e - d n s \ n t e m p l a t e : \ n m e t a d a t a : \ n l a b e l s : \ n k 8 s - a p p :
2020-02-13 22:55:19 +00:00
"kubedns-v1.8" : "\n---\napiVersion: apps/v1beta1\nkind: Deployment\nmetadata:\n name: kube-dns-autoscaler\n namespace: kube-system\n labels:\n k8s-app: kube-dns-autoscaler\nspec:\n template:\n metadata:\n labels:\n k8s-app: kube-dns-autoscaler\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n - key: node-role.kubernetes.io/worker\n operator: Exists\n serviceAccountName: kube-dns-autoscaler\n tolerations:\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n containers:\n - name: autoscaler\n image: {{.KubeDNSAutoScalerImage}}\n resources:\n requests:\n cpu: \"20m\"\n memory: \"10Mi\"\n command:\n - /cluster-proportional-autoscaler\n - --namespace=kube-system\n - --configmap=kube-dns-autoscaler\n - --target=Deployment/kube-dns\n # When cluster is using large nodes(with more cores), \"coresPerReplica\" should dominate.\n # If using small nodes, \"nodesPerReplica\" should dominate.\n{{if .LinearAutoscalerParams}}\n - --default-params={\"linear\":{{.LinearAutoscalerParams}}}\n{{else}}\n - --default-params={\"linear\":{\"coresPerReplica\":128,\"nodesPerReplica\":4,\"min\":1}}\n{{end}}\n - --logtostderr=true\n - --v=2\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: kube-dns-autoscaler\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n{{- if eq .RBACConfig \"rbac\"}}\n---\nkind: ClusterRole\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: system:kube-dns-autoscaler\nrules:\n - apiGroups: [\"\"]\n resources: [\"nodes\"]\n verbs: [\"list\", \"watch\"]\n - apiGroups: [\"\"]\n resources: [\"replicationcontrollers/scale\"]\n verbs: [\"get\", \"update\"]\n - apiGroups: [\"extensions\"]\n resources: [\"deployments/scale\", \"replicasets/scale\"]\n verbs: [\"get\", \"update\"]\n - apiGroups: [\"\"]\n resources: [\"configmaps\"]\n verbs: [\"get\", \"create\"]\n---\nkind: ClusterRoleBinding\napiVersion: rbac.authorization.k8s.io/v1\nmetadata:\n name: system:kube-dns-autoscaler\nsubjects:\n - kind: ServiceAccount\n name: kube-dns-autoscaler\n namespace: kube-system\nroleRef:\n kind: ClusterRole\n name: system:kube-dns-autoscaler\n apiGroup: rbac.authorization.k8s.io\n{{- end }}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: kube-dns\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n---\napiVersion: extensions/v1beta1\nkind: Deployment\nmetadata:\n name: kube-dns\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\nspec:\n # replicas: not specified here:\n # 1. In order to make Addon Manager do not reconcile this replicas parameter.\n # 2. Default is 1.\n # 3. Will be tuned in real time if DNS horizontal auto-scaling is turned on.\n strategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n rollingUpdate:\n maxSurge: 10%\n maxUnavailable: 0\n{{end}}\n selector:\n matchLabels:\n k8s-app: kube-dns\n template:\n metadata:\n labels:\n k8s-app: kube-dns\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: ''\n spec:\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\" \ n { { e n d } } \ n { { e n d } } \ n a f f i n i t y : \ n p o d A n t i A f f i n i t y : \ n p r e f e r r e d D u r i n g S c h e d u l i n g I g n o r e d D u r i n g E x e c u t i o n : \ n -
2021-06-25 18:36:33 +00:00
"metricsserver-v0.5.0" : "\n{{- if eq .RBACConfig \"rbac\"}}\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-app: metrics-server\n rbac.authorization.k8s.io/aggregate-to-admin: \"true\"\n rbac.authorization.k8s.io/aggregate-to-edit: \"true\"\n rbac.authorization.k8s.io/aggregate-to-view: \"true\"\n name: system:aggregated-metrics-reader\nrules:\n- apiGroups:\n - metrics.k8s.io\n resources:\n - pods\n - nodes\n verbs:\n - get\n - list\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-app: metrics-server\n name: system:metrics-server\nrules:\n- apiGroups:\n - \"\"\n resources:\n - pods\n - nodes\n - nodes/stats\n - namespaces\n - configmaps\n verbs:\n - get\n - list\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server-auth-reader\n namespace: kube-system\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: extension-apiserver-authentication-reader\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server:system:auth-delegator\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:auth-delegator\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-app: metrics-server\n name: system:metrics-server\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:metrics-server\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n{{- end }}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server\n namespace: kube-system\n---\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server\n namespace: kube-system\nspec:\n ports:\n - name: https\n port: 443\n protocol: TCP\n targetPort: https\n selector:\n k8s-app: metrics-server\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: metrics-server\n namespace: kube-system\n labels:\n k8s-app: metrics-server\nspec:\n{{if .Replicas}}\n replicas: {{.Replicas}}\n{{end}}\n selector:\n matchLabels:\n k8s-app: metrics-server\n{{if .UpdateStrategy}}\n strategy:\n{{ toYaml .UpdateStrategy | indent 4}}\n{{end}}\n template:\n metadata:\n name: metrics-server\n labels:\n k8s-app: metrics-server\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n - key: node-role.kubernetes.io/worker\n operator: Exists\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n serviceAccountName: metrics-server\n{{- if .Tolerations}}\n tolerations:\n{{ toYaml .Tolerations | indent 6}}\n{{- else }}\n tolerations:\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n{{- end }}\n volumes:\n - emptyDir: {}\n name: tmp-dir\n # Rancher specific change\n priorityClassName: {{ .MetricsServerPriorityClassName | default \"system-cluster-critical\" } } \ n c o n t a i n e r s : \ n - n a m e : m e t r i c s - s e r v e r \ n i m a g e : { { . M e t r i c s S e r v e r I m a g e } } \ n i m a g e P u l l P o l i c y : I f N o t P r e s e n t \ n l i v e n e s s P r o b e : \ n f a i l u r e T h r e s h o l d : 3 \ n h t t p G e t : \ n p a t h : / l i v e z \ n p o r t : h t t p s \ n s c h e m e : H T T P S \ n
2021-02-07 00:47:42 +00:00
"metricsserver-v1.20" : "\n{{- if eq .RBACConfig \"rbac\"}}\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-app: metrics-server\n rbac.authorization.k8s.io/aggregate-to-admin: \"true\"\n rbac.authorization.k8s.io/aggregate-to-edit: \"true\"\n rbac.authorization.k8s.io/aggregate-to-view: \"true\"\n name: system:aggregated-metrics-reader\nrules:\n- apiGroups:\n - metrics.k8s.io\n resources:\n - pods\n - nodes\n verbs:\n - get\n - list\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n labels:\n k8s-app: metrics-server\n name: system:metrics-server\nrules:\n- apiGroups:\n - \"\"\n resources:\n - pods\n - nodes\n - nodes/stats\n - namespaces\n - configmaps\n verbs:\n - get\n - list\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: RoleBinding\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server-auth-reader\n namespace: kube-system\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: extension-apiserver-authentication-reader\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server:system:auth-delegator\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:auth-delegator\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n labels:\n k8s-app: metrics-server\n name: system:metrics-server\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:metrics-server\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n{{- end }}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server\n namespace: kube-system\n---\napiVersion: v1\nkind: Service\nmetadata:\n labels:\n k8s-app: metrics-server\n name: metrics-server\n namespace: kube-system\nspec:\n ports:\n - name: https\n port: 443\n protocol: TCP\n targetPort: https\n selector:\n k8s-app: metrics-server\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: metrics-server\n namespace: kube-system\n labels:\n k8s-app: metrics-server\nspec:\n{{if .Replicas}}\n replicas: {{.Replicas}}\n{{end}}\n selector:\n matchLabels:\n k8s-app: metrics-server\n{{if .UpdateStrategy}}\n strategy:\n{{ toYaml .UpdateStrategy | indent 4}}\n{{end}}\n template:\n metadata:\n name: metrics-server\n labels:\n k8s-app: metrics-server\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n - key: node-role.kubernetes.io/worker\n operator: Exists\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n serviceAccountName: metrics-server\n{{- if .Tolerations}}\n tolerations:\n{{ toYaml .Tolerations | indent 6}}\n{{- else }}\n tolerations:\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n{{- end }}\n volumes:\n - emptyDir: {}\n name: tmp-dir\n # Rancher specific change\n priorityClassName: {{ .MetricsServerPriorityClassName | default \"system-cluster-critical\" } } \ n c o n t a i n e r s : \ n - n a m e : m e t r i c s - s e r v e r \ n i m a g e : { { . M e t r i c s S e r v e r I m a g e } } \ n i m a g e P u l l P o l i c y : I f N o t P r e s e n t \ n l i v e n e s s P r o b e : \ n f a i l u r e T h r e s h o l d : 3 \ n h t t p G e t : \ n p a t h : / l i v e z \ n p o r t : h t t p s \ n s c h e m e : H T T P S \ n p
"metricsserver-v1.8" : "\n{{- if eq .RBACConfig \"rbac\"}}\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRoleBinding\nmetadata:\n name: metrics-server:system:auth-delegator\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:auth-delegator\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: RoleBinding\nmetadata:\n name: metrics-server-auth-reader\n namespace: kube-system\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: Role\n name: extension-apiserver-authentication-reader\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRole\nmetadata:\n name: system:metrics-server\nrules:\n- apiGroups:\n - \"\"\n resources:\n - pods\n - nodes\n - nodes/stats\n - namespaces\n verbs:\n - get\n - list\n - watch\n- apiGroups:\n - \"extensions\"\n resources:\n - deployments\n verbs:\n - get\n - list\n - watch\n---\napiVersion: rbac.authorization.k8s.io/v1\nkind: ClusterRoleBinding\nmetadata:\n name: system:metrics-server\nroleRef:\n apiGroup: rbac.authorization.k8s.io\n kind: ClusterRole\n name: system:metrics-server\nsubjects:\n- kind: ServiceAccount\n name: metrics-server\n namespace: kube-system\n{{- end }}\n---\napiVersion: apiregistration.k8s.io/v1beta1\nkind: APIService\nmetadata:\n name: v1beta1.metrics.k8s.io\nspec:\n service:\n name: metrics-server\n namespace: kube-system\n group: metrics.k8s.io\n version: v1beta1\n insecureSkipTLSVerify: true\n groupPriorityMinimum: 100\n versionPriority: 100\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: metrics-server\n namespace: kube-system\n---\napiVersion: apps/v1\nkind: Deployment\nmetadata:\n name: metrics-server\n namespace: kube-system\n labels:\n k8s-app: metrics-server\nspec:\n{{if .Replicas}}\n replicas: {{.Replicas}}\n{{end}}\n selector:\n matchLabels:\n k8s-app: metrics-server\n{{if .UpdateStrategy}}\n strategy:\n{{ toYaml .UpdateStrategy | indent 4}}\n{{end}}\n template:\n metadata:\n name: metrics-server\n labels:\n k8s-app: metrics-server\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n - key: node-role.kubernetes.io/worker\n operator: Exists\n# Rancher specific change\n{{ if .MetricsServerPriorityClassName }}\n priorityClassName: {{ .MetricsServerPriorityClassName }}\n{{ end }}\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n serviceAccountName: metrics-server\n{{- if .Tolerations}}\n tolerations:\n{{ toYaml .Tolerations | indent 6}}\n{{- else }}\n tolerations:\n - effect: NoExecute\n operator: Exists\n - effect: NoSchedule\n operator: Exists\n{{- end }}\n containers:\n - name: metrics-server\n image: {{ .MetricsServerImage }}\n imagePullPolicy: Always\n command:\n - /metrics-server\n {{- if eq .Version \"v0.3\" }}\n - --kubelet-insecure-tls\n - --kubelet-preferred-address-types=InternalIP\n - --logtostderr\n {{- else }}\n - --source=kubernetes.summary_api:https://kubernetes.default.svc?kubeletHttps=true\u0026kubeletPort=10250\u0026useServiceAccount=true\u0026insecure=true\n {{- end }}\n {{ range $k,$v := .Options }}\n - --{{ $k }}={{ $v }}\n {{ end }}\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: metrics-server\n namespace: kube-system\n labels:\n kubernetes.io/name: \"Metrics-server\" \ n s p e c : \ n s e l e c t o r : \ n k 8 s - a p p : m e t r i c s - s e r v e r \ n p o r t s : \ n - p o r t : 443 \ n p r o t o c o l : T C P
2021-08-25 08:12:18 +00:00
"nginxingress-v0.48.1" : "\n# Based on https://github.com/kubernetes/ingress-nginx/blob/controller-v0.48.1/deploy/static/provider/cloud/deploy.yaml\napiVersion: v1\nkind: Namespace\nmetadata:\n name: ingress-nginx\n labels:\n app.kubernetes.io/name: ingress-nginx\n app.kubernetes.io/instance: ingress-nginx\n\n---\n{{- if eq .RBACConfig \"rbac\" }}\n# Source: ingress-nginx/templates/controller-serviceaccount.yaml\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n labels:\n app.kubernetes.io/name: ingress-nginx\n app.kubernetes.io/instance: ingress-nginx\n app.kubernetes.io/version: 0.48.1\n app.kubernetes.io/component: controller\n name: nginx-ingress-serviceaccount\n namespace: ingress-nginx\nautomountServiceAccountToken: true\n{{- end }}\n---\n# Source: ingress-nginx/templates/controller-configmap.yaml\napiVersion: v1\nkind: ConfigMap\nmetadata:\n labels:\n app.kubernetes.io/name: ingress-nginx\n app.kubernetes.io/instance: ingress-nginx\n app.kubernetes.io/version: 0.48.1\n app.kubernetes.io/component: controller\n name: nginx-configuration\n namespace: ingress-nginx\n{{- if .Options }}\ndata:\n{{- range $k,$v := .Options }}\n {{ $k }}: \"{{ $v }}\"\n{{- end }}\n{{- end }}\n{{- if eq .RBACConfig \"rbac\" } } \ n - - - \ n # S o u r c e : i n g r e s s - n g i n x / t e m p l a t e s / c l u s t e r r o l e . y a m l \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n k i n d : C l u s t e r R o l e \ n m e t a d a t a : \ n l a b e l s : \ n a p p . k u b e r n e t e s . i o / n a m e : i n g r e s s - n g i n x \ n a p p . k u b e r n e t e s . i o / i n s t a n c e : i n g r e s s - n g i n x \ n a p p . k u b e r n e t e s . i o / v e r s i o n : 0.48 . 1 \ n n a m e : i n g r e s s - n g i n x \ n r u l e s : \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - c o n f i g m a p s \ n - e n d p o i n t s \ n - n o d e s \ n - p o d s \ n - s e c r e t s \ n v e r b s : \ n - l i s t \ n - w a t c h \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - n o d e s \ n v e r b s : \ n - g e t \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - s e r v i c e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n - a p i G r o u p s : \ n - e x t e n s i o n s \ n - n e t w o r k i n g . k 8 s . i o # k 8 s 1.14 + \ n r e s o u r c e s : \ n - i n g r e s s e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - e v e n t s \ n v e r b s : \ n - c r e a t e \ n - p a t c h \ n - a p i G r o u p s : \ n - e x t e n s i o n s \ n - n e t w o r k i n g . k 8 s . i o # k 8 s 1.14 + \ n r e s o u r c e s : \ n - i n g r e s s e s / s t a t u s \ n v e r b s : \ n - u p d a t e \ n - a p i G r o u p s : \ n - n e t w o r k i n g . k 8 s . i o # k 8 s 1.14 + \ n r e s o u r c e s : \ n - i n g r e s s c l a s s e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n - - - \ n # S o u r c e : i n g r e s s - n g i n x / t e m p l a t e s / c l u s t e r r o l e b i n d i n g . y a m l \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n l a b e l s : \ n a p p . k u b e r n e t e s . i o / n a m e : i n g r e s s - n g i n x \ n a p p . k u b e r n e t e s . i o / i n s t a n c e : i n g r e s s - n g i n x \ n a p p . k u b e r n e t e s . i o / v e r s i o n : 0.48 . 1 \ n n a m e : i n g r e s s - n g i n x \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : i n g r e s s - n g i n x \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n - - - \ n # S o u r c e : i n g r e s s - n g i n x / t e m p l a t e s / c o n t r o l l e r - r o l e . y a m l \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 \ n k i n d : R o l e \ n m e t a d a t a : \ n l a b e l s : \ n a p p . k u b e r n e t e s . i o / n a m e : i n g r e s s - n g i n x \ n a p p . k u b e r n e t e s . i o / i n s t a n c e : i n g r e s s - n g i n x \ n a p p . k u b e r n e t e s . i o / v e r s i o n : 0.48 . 1 \ n a p p . k u b e r n e t e s . i o / c o m p o n e n t : c o n t r o l l e r \ n n a m e : i n g r e s s - n g i n x \ n n a m e s p a c e : i n g r e s s - n g i n x \ n r u l e s : \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - n a m e s p a c e s \ n v e r b s : \ n - g e t \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - c o n f i g m a p s \ n - p o d s \ n - s e c r e t s \ n - e n d p o i n t s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n - a p i G r o u p s : \ n - ' ' \ n r e s o u r c e s : \ n - s e r v i c e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n - a p i G r o u p s : \ n - e x t e n s i o n s \ n - n e t w o r k i n g . k 8 s . i o # k 8 s 1.14 + \ n r e s o u r c e s : \ n - i n g r e s s e s \ n v e r b s : \ n - g e t \ n - l i s t \ n - w a t c h \ n - a p i G r o u p s : \ n - e x t e n s i o n s \ n - n e t w o r k i n g . k 8 s . i o # k 8 s 1.14 + \ n r e s o u r c e s : \ n - i n g r e s s e s / s t a t u s \ n v e r b s : \ n - u p d a t e \ n - a p i G r o u p s : \ n - n
2020-02-13 22:55:19 +00:00
"nginxingress-v1.15" : "\napiVersion: v1\nkind: Namespace\nmetadata:\n name: ingress-nginx\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: nginx-configuration\n namespace: ingress-nginx\n labels:\n app: ingress-nginx\ndata:\n{{ range $k,$v := .Options }}\n {{ $k }}: \"{{ $v }}\"\n{{ end }}\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: tcp-services\n namespace: ingress-nginx\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: udp-services\n namespace: ingress-nginx\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: nginx-ingress-serviceaccount\n namespace: ingress-nginx\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n name: nginx-ingress-clusterrole\nrules:\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n - endpoints\n - nodes\n - pods\n - secrets\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - services\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - \"extensions\"\n - \"networking.k8s.io\"\n resources:\n - ingresses\n - daemonsets\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - apiGroups:\n - \"extensions\"\n - \"networking.k8s.io\"\n resources:\n - ingresses/status\n verbs:\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: Role\nmetadata:\n name: nginx-ingress-role\n namespace: ingress-nginx\nrules:\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n - pods\n - secrets\n - namespaces\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n resourceNames:\n # Defaults to \"\u003celection-id\u003e-\u003cingress-class\u003e\"\n # Here: \"\u003cingress-controller-leader\u003e-\u003cnginx\u003e\"\n # This has to be adapted if you change either parameter\n # when launching the nginx-ingress-controller.\n - \"ingress-controller-leader-nginx\"\n verbs:\n - get\n - update\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - create\n - apiGroups:\n - \"\" \ n r e s o u r c e s : \ n - e n d p o i n t s \ n v e r b s : \ n - g e t \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - r o l e - n i s a - b i n d i n g \ n n a m e s p a c e : i n g r e s s - n g i n x \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : R o l e \ n n a m e : n g i n x - i n g r e s s - r o l e \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - c l u s t e r r o l e - n i s a - b i n d i n g \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : n g i n x - i n g r e s s - c l u s t e r r o l e \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n { { e n d } } \ n - - - \ n a p i V e r s i o n : a p p s / v 1 \ n k i n d : D a e m o n S e t \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - c o n t r o l l e r \ n n a m e s p a c e : i n g r e s s - n g i n x \ n s p e c : \ n s e l e c t o r : \ n m a t c h L a b e l s : \ n a p p : i n g r e s s - n g i n x \ n { { i f . U p d a t e S t r a t e g y } } \ n u p d a t e S t r a t e g y : \ n { { t o Y a m l . U p d a t e S t r a t e g y | i n d e n t 4 } } \ n { { e n d } } \ n t e m p l a t e : \ n m e t a d a t a : \ n l a b e l s : \ n a p p : i n g r e s s - n g i n x \ n a n n o t a t i o n s : \ n p r o m e t h e u s . i o / p o r t : ' 10254 ' \ n p r o m e t h e u s . i o / s c r a p e : ' true ' \ n s p e c : \ n a f f i n i t y : \ n n o d e A f f i n i t y : \ n r e q u i r e d D u r i n g S c h e d u l i n g I g n o r e d D u r i n g E x e c u t i o n : \ n n o d e S e l e c t o r T e r m s : \ n - m a t c h E x p r e s s i o n s : \ n - k e y : b e t a . k u b e r n e t e s . i o / o s \ n o p e r a t o r : N o t I n \ n v a l u e s : \ n - w i n d o w s \ n - k e y : n o d e - r o l e . k u b e r n e t e s . i o / w o r k e r \ n o p e r a t o r : E x i s t s \ n h o s t N e t w o r k : true \ n { { i f . D N S P o l
2021-02-07 00:47:42 +00:00
"nginxingress-v1.15.12" : "\n# this template is intended for use by \u003e= nginx-0.32.0\napiVersion: v1\nkind: Namespace\nmetadata:\n name: ingress-nginx\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: nginx-configuration\n namespace: ingress-nginx\n labels:\n app: ingress-nginx\ndata:\n{{ range $k,$v := .Options }}\n {{ $k }}: \"{{ $v }}\"\n{{ end }}\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: tcp-services\n namespace: ingress-nginx\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: udp-services\n namespace: ingress-nginx\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: nginx-ingress-serviceaccount\n namespace: ingress-nginx\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n name: nginx-ingress-clusterrole\nrules:\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n - endpoints\n - nodes\n - pods\n - secrets\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - services\n verbs:\n - get\n - list\n - update\n - watch\n - apiGroups:\n - extensions\n - \"networking.k8s.io\" # k8s 1.14+\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - apiGroups:\n - extensions\n - \"networking.k8s.io\" # k8s 1.14+\n resources:\n - ingresses/status\n verbs:\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: Role\nmetadata:\n name: nginx-ingress-role\n namespace: ingress-nginx\nrules:\n - apiGroups:\n - \"\"\n resources:\n - namespaces\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n - pods\n - secrets\n - endpoints\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - services\n verbs:\n - get\n - list\n - update\n - watch\n - apiGroups:\n - extensions\n - \"networking.k8s.io\" # k8s 1.14+\n resources:\n - ingresses\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - extensions\n - \"networking.k8s.io\" # k8s 1.14+\n resources:\n - ingresses/status\n verbs:\n - update\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n resourceNames:\n # Defaults to \"\u003celection-id\u003e-\u003cingress-class\u003e\"\n # Here: \"\u003cingress-controller-leader\u003e-\u003cnginx\u003e\"\n # This has to be adapted if you change either parameter\n # when launching the nginx-ingress-controller.\n - ingress-controller-leader-nginx\n verbs:\n - get\n - update\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - create\n - apiGroups:\n - \"\"\n resources:\n - endpoints\n verbs:\n - create\n - get\n - update\n - apiGroups:\n - \"\" \ n r e s o u r c e s : \ n - e v e n t s \ n v e r b s : \ n - c r e a t e \ n - p a t c h \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - r o l e - n i s a - b i n d i n g \ n n a m e s p a c e : i n g r e s s - n g i n x \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : R o l e \ n n a m e : n g i n x - i n g r e s s - r o l e \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - c l u s t e r r o l e - n i s a - b i n d i n g \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : n g i n x - i n g r e s s - c l u s t e r r o l e \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n { { e n d } } \ n - - - \ n a p i V e r s i o n : a p p s / v 1 \ n k i n d : D a e m o n S e t \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - c o n t r o l l e r \ n n a m e s p a c e : i n g r e s s - n g i n x \
2020-02-13 22:55:19 +00:00
"nginxingress-v1.8" : "\napiVersion: v1\nkind: Namespace\nmetadata:\n name: ingress-nginx\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: nginx-configuration\n namespace: ingress-nginx\n labels:\n app: ingress-nginx\ndata:\n{{ range $k,$v := .Options }}\n {{ $k }}: \"{{ $v }}\"\n{{ end }}\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: tcp-services\n namespace: ingress-nginx\n---\nkind: ConfigMap\napiVersion: v1\nmetadata:\n name: udp-services\n namespace: ingress-nginx\n{{if eq .RBACConfig \"rbac\"}}\n---\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: nginx-ingress-serviceaccount\n namespace: ingress-nginx\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: ClusterRole\nmetadata:\n name: nginx-ingress-clusterrole\nrules:\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n - endpoints\n - nodes\n - pods\n - secrets\n verbs:\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - nodes\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - services\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - \"extensions\"\n resources:\n - ingresses\n - daemonsets\n verbs:\n - get\n - list\n - watch\n - apiGroups:\n - \"\"\n resources:\n - events\n verbs:\n - create\n - patch\n - apiGroups:\n - \"extensions\"\n resources:\n - ingresses/status\n verbs:\n - update\n---\napiVersion: rbac.authorization.k8s.io/v1beta1\nkind: Role\nmetadata:\n name: nginx-ingress-role\n namespace: ingress-nginx\nrules:\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n - pods\n - secrets\n - namespaces\n verbs:\n - get\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n resourceNames:\n # Defaults to \"\u003celection-id\u003e-\u003cingress-class\u003e\"\n # Here: \"\u003cingress-controller-leader\u003e-\u003cnginx\u003e\"\n # This has to be adapted if you change either parameter\n # when launching the nginx-ingress-controller.\n - \"ingress-controller-leader-nginx\"\n verbs:\n - get\n - update\n - apiGroups:\n - \"\"\n resources:\n - configmaps\n verbs:\n - create\n - apiGroups:\n - \"\" \ n r e s o u r c e s : \ n - e n d p o i n t s \ n v e r b s : \ n - g e t \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - r o l e - n i s a - b i n d i n g \ n n a m e s p a c e : i n g r e s s - n g i n x \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : R o l e \ n n a m e : n g i n x - i n g r e s s - r o l e \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n - - - \ n a p i V e r s i o n : r b a c . a u t h o r i z a t i o n . k 8 s . i o / v 1 b e t a 1 \ n k i n d : C l u s t e r R o l e B i n d i n g \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - c l u s t e r r o l e - n i s a - b i n d i n g \ n r o l e R e f : \ n a p i G r o u p : r b a c . a u t h o r i z a t i o n . k 8 s . i o \ n k i n d : C l u s t e r R o l e \ n n a m e : n g i n x - i n g r e s s - c l u s t e r r o l e \ n s u b j e c t s : \ n - k i n d : S e r v i c e A c c o u n t \ n n a m e : n g i n x - i n g r e s s - s e r v i c e a c c o u n t \ n n a m e s p a c e : i n g r e s s - n g i n x \ n { { e n d } } \ n - - - \ n a p i V e r s i o n : a p p s / v 1 \ n k i n d : D a e m o n S e t \ n m e t a d a t a : \ n n a m e : n g i n x - i n g r e s s - c o n t r o l l e r \ n n a m e s p a c e : i n g r e s s - n g i n x \ n s p e c : \ n s e l e c t o r : \ n m a t c h L a b e l s : \ n a p p : i n g r e s s - n g i n x \ n { { i f . U p d a t e S t r a t e g y } } \ n u p d a t e S t r a t e g y : \ n { { t o Y a m l . U p d a t e S t r a t e g y | i n d e n t 4 } } \ n { { e n d } } \ n t e m p l a t e : \ n m e t a d a t a : \ n l a b e l s : \ n a p p : i n g r e s s - n g i n x \ n a n n o t a t i o n s : \ n p r o m e t h e u s . i o / p o r t : ' 10254 ' \ n p r o m e t h e u s . i o / s c r a p e : ' true ' \ n s p e c : \ n a f f i n i t y : \ n n o d e A f f i n i t y : \ n r e q u i r e d D u r i n g S c h e d u l i n g I g n o r e d D u r i n g E x e c u t i o n : \ n n o d e S e l e c t o r T e r m s : \ n - m a t c h E x p r e s s i o n s : \ n - k e y : b e t a . k u b e r n e t e s . i o / o s \ n o p e r a t o r : N o t I n \ n v a l u e s : \ n - w i n d o w s \ n - k e y : n o d e - r o l e . k u b e r n e t e s . i o / w o r k e r \ n o p e r a t o r : E x i s t s \ n h o s t N e t w o r k : true \ n { { i f . D N S P o l i c y } } \ n d n s P o l i c y : { { . D N S P o l i c y } } \ n { { e n d } } \ n { { i f . N o
2021-02-07 00:47:42 +00:00
"nodelocal-v1.15" : "\n{{- if eq .RBACConfig \"rbac\"}}\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: node-local-dns\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n{{- end }}\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: kube-dns-upstream\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n kubernetes.io/name: \"KubeDNSUpstream\"\nspec:\n ports:\n - name: dns\n port: 53\n protocol: UDP\n targetPort: 53\n - name: dns-tcp\n port: 53\n protocol: TCP\n targetPort: 53\n selector:\n k8s-app: kube-dns\n---\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: node-local-dns\n namespace: kube-system\n labels:\n addonmanager.kubernetes.io/mode: Reconcile\ndata:\n Corefile: |\n {{.ClusterDomain}}:53 {\n errors\n cache {\n success 9984 30\n denial 9984 5\n }\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__CLUSTER__DNS__ {\n force_tcp\n }\n prometheus :9253\n health {{.IPAddress}}:8080\n }\n in-addr.arpa:53 {\n errors\n cache 30\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__CLUSTER__DNS__ {\n force_tcp\n }\n prometheus :9253\n }\n ip6.arpa:53 {\n errors\n cache 30\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__CLUSTER__DNS__ {\n force_tcp\n }\n prometheus :9253\n }\n .:53 {\n errors\n cache 30\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__UPSTREAM__SERVERS__ {\n force_tcp\n }\n prometheus :9253\n }\n---\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: node-local-dns\n namespace: kube-system\n labels:\n k8s-app: node-local-dns\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\nspec:\n updateStrategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n rollingUpdate:\n maxUnavailable: 1\n{{end}}\n selector:\n matchLabels:\n k8s-app: node-local-dns\n template:\n metadata:\n labels:\n k8s-app: node-local-dns\n spec:\n# Rancher specific change\n priorityClassName: {{ .NodeLocalDNSPriorityClassName | default \"system-node-critical\" }}\n{{- if eq .RBACConfig \"rbac\"}}\n serviceAccountName: node-local-dns\n{{- end }}\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n hostNetwork: true\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n dnsPolicy: Default # Don't use cluster DNS.\n tolerations:\n - operator: Exists\n containers:\n - name: node-cache\n image: {{.NodelocalImage}}\n resources:\n requests:\n cpu: 25m\n memory: 5Mi\n args: [ \"-localip\", \"{{.IPAddress}},{{.ClusterDNSServer}}\", \"-conf\", \"/etc/Corefile\", \"-upstreamsvc\", \"kube-dns-upstream\" ] \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n p o r t s : \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s \ n p r o t o c o l : U D P \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s - t c p \ n p r o t o c o l : T C P \ n - c o n t a i n e r P o r t : 9253 \ n n a m e : m e t r i c s \ n p r o t o c o l : T C P \ n l i v e n e s s P r o b e : \ n h t t p G e t : \ n h o s t : { { . I P A d d r e s s } } \ n
2021-05-18 01:44:04 +00:00
"nodelocal-v1.21" : "\n# Based on kubernetes/cluster/addons/dns/nodelocaldns/nodelocaldns.yaml v1.21.1\n{{- if eq .RBACConfig \"rbac\"}}\napiVersion: v1\nkind: ServiceAccount\nmetadata:\n name: node-local-dns\n namespace: kube-system\n labels:\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n{{- end }}\n---\napiVersion: v1\nkind: Service\nmetadata:\n name: kube-dns-upstream\n namespace: kube-system\n labels:\n k8s-app: kube-dns\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\n kubernetes.io/name: \"KubeDNSUpstream\"\nspec:\n ports:\n - name: dns\n port: 53\n protocol: UDP\n targetPort: 53\n - name: dns-tcp\n port: 53\n protocol: TCP\n targetPort: 53\n selector:\n k8s-app: kube-dns\n---\napiVersion: v1\nkind: ConfigMap\nmetadata:\n name: node-local-dns\n namespace: kube-system\n labels:\n addonmanager.kubernetes.io/mode: Reconcile\ndata:\n Corefile: |\n {{.ClusterDomain}}:53 {\n errors\n cache {\n success 9984 30\n denial 9984 5\n }\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__CLUSTER__DNS__ {\n force_tcp\n }\n prometheus :9253\n health {{.IPAddress}}:8080\n }\n in-addr.arpa:53 {\n errors\n cache 30\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__CLUSTER__DNS__ {\n force_tcp\n }\n prometheus :9253\n }\n ip6.arpa:53 {\n errors\n cache 30\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__CLUSTER__DNS__ {\n force_tcp\n }\n prometheus :9253\n }\n .:53 {\n errors\n cache 30\n reload\n loop\n bind {{.IPAddress}} {{.ClusterDNSServer}}\n forward . __PILLAR__UPSTREAM__SERVERS__\n prometheus :9253\n }\n---\napiVersion: apps/v1\nkind: DaemonSet\nmetadata:\n name: node-local-dns\n namespace: kube-system\n labels:\n k8s-app: node-local-dns\n kubernetes.io/cluster-service: \"true\"\n addonmanager.kubernetes.io/mode: Reconcile\nspec:\n updateStrategy:\n{{if .UpdateStrategy}}\n{{ toYaml .UpdateStrategy | indent 4}}\n{{else}}\n rollingUpdate:\n maxUnavailable: 1\n{{end}}\n selector:\n matchLabels:\n k8s-app: node-local-dns\n template:\n metadata:\n labels:\n k8s-app: node-local-dns\n spec:\n# Rancher specific change\n priorityClassName: {{ .NodeLocalDNSPriorityClassName | default \"system-node-critical\" }}\n{{- if eq .RBACConfig \"rbac\"}}\n serviceAccountName: node-local-dns\n{{- end }}\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n hostNetwork: true\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n dnsPolicy: Default # Don't use cluster DNS.\n tolerations:\n - operator: Exists\n containers:\n - name: node-cache\n image: {{.NodelocalImage}}\n resources:\n requests:\n cpu: 25m\n memory: 5Mi\n args: [ \"-localip\", \"{{.IPAddress}},{{.ClusterDNSServer}}\", \"-conf\", \"/etc/Corefile\", \"-upstreamsvc\", \"kube-dns-upstream\" ] \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n p o r t s : \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s \ n p r o t o c o l : U D P \ n - c o n t a i n e r P o r t : 53 \ n n a m e : d n s - t c p \ n p r o t o c o l : T C P \ n - c o n t a i n e r P o r t : 9253 \ n n a m e : m e t r i c s \ n p r o t o c o l : T C P \ n l i v e n e s s P r o b e : \ n h t t p G e t : \ n
2021-02-07 00:47:42 +00:00
"weave-v1.16" : "\n---\n# This ConfigMap can be used to configure a self-hosted Weave Net installation.\napiVersion: v1\nkind: List\nitems:\n - apiVersion: v1\n kind: ServiceAccount\n metadata:\n name: weave-net\n namespace: kube-system\n - apiVersion: apps/v1\n kind: DaemonSet\n metadata:\n name: weave-net\n labels:\n name: weave-net\n namespace: kube-system\n spec:\n selector:\n matchLabels:\n name: weave-net\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: ''\n scheduler.alpha.kubernetes.io/tolerations: \u003e-\n [{\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"master\",\"effect\":\"NoSchedule\"}]\n labels:\n name: weave-net\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n# Rancher specific change\n{{- if .WeaveNetPriorityClassName }}\n priorityClassName: {{ .WeaveNetPriorityClassName }}\n{{- end }}\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n containers:\n - name: weave\n command:\n - /home/weave/launch.sh\n env:\n - name: HOSTNAME\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: spec.nodeName\n - name: IPALLOC_RANGE\n value: \"{{.ClusterCIDR}}\"\n {{- if .WeavePassword}}\n - name: WEAVE_PASSWORD\n value: \"{{.WeavePassword}}\"\n {{- end}}\n {{- if .MTU }}\n {{- if ne .MTU 0 }}\n - name: WEAVE_MTU\n value: \"{{.MTU}}\" \ n { { - e n d } } \ n { { - e n d } } \ n i m a g e : { { . I m a g e } } \ n r e a d i n e s s P r o b e : \ n h t t p G e t : \ n h o s t : 127.0 . 0.1 \ n p a t h : / s t a t u s \ n p o r t : 6784 \ n i n i t i a l D e l a y S e c o n d s : 30 \ n r e s o u r c e s : \ n r e q u e s t s : \ n c p u : 10 m \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : w e a v e d b \ n m o u n t P a t h : / w e a v e d b \ n - n a m e : c n i - b i n \ n m o u n t P a t h : / h o s t / o p t \ n - n a m e : c n i - b i n 2 \ n m o u n t P a t h : / h o s t / h o m e \ n - n a m e : c n i - c o n f \ n m o u n t P a t h : / h o s t / e t c \ n - n a m e : d b u s \ n m o u n t P a t h : / h o s t / v a r / l i b / d b u s \ n - n a m e : l i b - m o d u l e s \ n m o u n t P a t h : / l i b / m o d u l e s \ n - n a m e : x t a b l e s - l o c k \ n m o u n t P a t h : / r u n / x t a b l e s . l o c k \ n - n a m e : w e a v e - n p c \ n e n v : \ n - n a m e : H O S T N A M E \ n v a l u e F r o m : \ n f i e l d R e f : \ n a p i V e r s i o n : v 1 \ n f i e l d P a t h : s p e c . n o d e N a m e \ n i m a g e : { { . C N I I m a g e } } \ n r e s o u r c e s : \ n r e q u e s t s : \ n c p u : 10 m \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : x t a b l e s - l o c k \ n m o u n t P a t h : / r u n / x t a b l e s . l o c k \ n - n a m e : w e a v e - p l u g i n s \ n c o m m a n d : \ n - / o p t / r k e - t o o l s / w e a v e - p l u g i n s - c n i . s h \ n i m a g e : { { . W e a v e L o o p b a c k I m a g e } } \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : c n i - b i n \ n m o u n t P a t h : / o p t \ n h o s t N e t w o r k : true \ n h o s t P I D :
"weave-v1.20" : "\n---\n# This ConfigMap can be used to configure a self-hosted Weave Net installation.\napiVersion: v1\nkind: List\nitems:\n - apiVersion: v1\n kind: ServiceAccount\n metadata:\n name: weave-net\n namespace: kube-system\n - apiVersion: apps/v1\n kind: DaemonSet\n metadata:\n name: weave-net\n labels:\n name: weave-net\n namespace: kube-system\n spec:\n # Wait 5 seconds to let pod connect before rolling next pod\n selector:\n matchLabels:\n name: weave-net\n minReadySeconds: 5\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: ''\n scheduler.alpha.kubernetes.io/tolerations: \u003e-\n [{\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"master\",\"effect\":\"NoSchedule\"}]\n labels:\n name: weave-net\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n# Rancher specific change\n{{- if .WeaveNetPriorityClassName }}\n priorityClassName: {{ .WeaveNetPriorityClassName }}\n{{- end }}\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n initContainers:\n - name: weave-init\n image: {{.Image}}\n command:\n - /home/weave/init.sh\n env:\n securityContext:\n privileged: true\n volumeMounts:\n - name: cni-bin\n mountPath: /host/opt\n - name: cni-bin2\n mountPath: /host/home\n - name: cni-conf\n mountPath: /host/etc\n - name: lib-modules\n mountPath: /lib/modules\n - name: xtables-lock\n mountPath: /run/xtables.lock\n readOnly: false\n containers:\n - name: weave\n command:\n - /home/weave/launch.sh\n env:\n - name: INIT_CONTAINER\n value: \"true\"\n - name: HOSTNAME\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: spec.nodeName\n - name: IPALLOC_RANGE\n value: \"{{.ClusterCIDR}}\"\n {{- if .WeavePassword}}\n - name: WEAVE_PASSWORD\n value: \"{{.WeavePassword}}\"\n {{- end}}\n {{- if .MTU }}\n {{- if ne .MTU 0 }}\n - name: WEAVE_MTU\n value: \"{{.MTU}}\" \ n { { - e n d } } \ n { { - e n d } } \ n i m a g e : { { . I m a g e } } \ n r e a d i n e s s P r o b e : \ n h t t p G e t : \ n h o s t : 127.0 . 0.1 \ n p a t h : / s t a t u s \ n p o r t : 6784 \ n i n i t i a l D e l a y S e c o n d s : 30 \ n r e s o u r c e s : \ n r e q u e s t s : \ n c p u : 50 m \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : w e a v e d b \ n m o u n t P a t h : / w e a v e d b \ n - n a m e : d b u s \ n m o u n t P a t h : / h o s t / v a r / l i b / d b u s \ n r e a d O n l y : true \ n - m o u n t P a t h : / h o s t / e t c / m a c h i n e - i d \ n n a m e : c n i - m a c h i n e - i d \ n r e a d O n l y : true \ n - n a m e : x t a b l e s - l o c k \ n m o u n t P a t h : / r u n / x t a b l e s . l o c k \ n r e a d O n l y : false \ n - n a m e : w e a v e - n p c \ n e n v : \ n - n a m e : H O S T N A M E \ n v a l u e F r o m : \ n f i e l d R e f : \ n
2020-02-13 22:55:19 +00:00
"weave-v1.8" : "\n---\n# This ConfigMap can be used to configure a self-hosted Weave Net installation.\napiVersion: v1\nkind: List\nitems:\n - apiVersion: v1\n kind: ServiceAccount\n metadata:\n name: weave-net\n namespace: kube-system\n - apiVersion: extensions/v1beta1\n kind: DaemonSet\n metadata:\n name: weave-net\n labels:\n name: weave-net\n namespace: kube-system\n spec:\n template:\n metadata:\n annotations:\n scheduler.alpha.kubernetes.io/critical-pod: ''\n scheduler.alpha.kubernetes.io/tolerations: \u003e-\n [{\"key\":\"dedicated\",\"operator\":\"Equal\",\"value\":\"master\",\"effect\":\"NoSchedule\"}]\n labels:\n name: weave-net\n spec:\n affinity:\n nodeAffinity:\n requiredDuringSchedulingIgnoredDuringExecution:\n nodeSelectorTerms:\n - matchExpressions:\n - key: beta.kubernetes.io/os\n operator: NotIn\n values:\n - windows\n{{if .NodeSelector}}\n nodeSelector:\n {{ range $k, $v := .NodeSelector }}\n {{ $k }}: \"{{ $v }}\"\n {{ end }}\n{{end}}\n containers:\n - name: weave\n command:\n - /home/weave/launch.sh\n env:\n - name: HOSTNAME\n valueFrom:\n fieldRef:\n apiVersion: v1\n fieldPath: spec.nodeName\n - name: IPALLOC_RANGE\n value: \"{{.ClusterCIDR}}\"\n {{- if .WeavePassword}}\n - name: WEAVE_PASSWORD\n value: \"{{.WeavePassword}}\"\n {{- end}}\n {{- if .MTU }}\n {{- if ne .MTU 0 }}\n - name: WEAVE_MTU\n value: \"{{.MTU}}\" \ n { { - e n d } } \ n { { - e n d } } \ n i m a g e : { { . I m a g e } } \ n r e a d i n e s s P r o b e : \ n h t t p G e t : \ n h o s t : 127.0 . 0.1 \ n p a t h : / s t a t u s \ n p o r t : 6784 \ n i n i t i a l D e l a y S e c o n d s : 30 \ n r e s o u r c e s : \ n r e q u e s t s : \ n c p u : 10 m \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : w e a v e d b \ n m o u n t P a t h : / w e a v e d b \ n - n a m e : c n i - b i n \ n m o u n t P a t h : / h o s t / o p t \ n - n a m e : c n i - b i n 2 \ n m o u n t P a t h : / h o s t / h o m e \ n - n a m e : c n i - c o n f \ n m o u n t P a t h : / h o s t / e t c \ n - n a m e : d b u s \ n m o u n t P a t h : / h o s t / v a r / l i b / d b u s \ n - n a m e : l i b - m o d u l e s \ n m o u n t P a t h : / l i b / m o d u l e s \ n - n a m e : x t a b l e s - l o c k \ n m o u n t P a t h : / r u n / x t a b l e s . l o c k \ n - n a m e : w e a v e - n p c \ n e n v : \ n - n a m e : H O S T N A M E \ n v a l u e F r o m : \ n f i e l d R e f : \ n a p i V e r s i o n : v 1 \ n f i e l d P a t h : s p e c . n o d e N a m e \ n i m a g e : { { . C N I I m a g e } } \ n r e s o u r c e s : \ n r e q u e s t s : \ n c p u : 10 m \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : x t a b l e s - l o c k \ n m o u n t P a t h : / r u n / x t a b l e s . l o c k \ n - n a m e : w e a v e - p l u g i n s \ n c o m m a n d : \ n - / o p t / r k e - t o o l s / w e a v e - p l u g i n s - c n i . s h \ n i m a g e : { { . W e a v e L o o p b a c k I m a g e } } \ n s e c u r i t y C o n t e x t : \ n p r i v i l e g e d : true \ n v o l u m e M o u n t s : \ n - n a m e : c n i - b i n \ n m o u n t P a t h : / o p t \ n h o s t N e t w o r k : true \ n h o s t P I D : true \ n r e s t a r t P o l i c y : A l w a y s \ n s e c u r i t y C o n t e x t : \ n s e L i n u x O p t i o n s : { } \ n s e r v i c e A c c o u n t N a m e : w e a v e - n e t \ n t o l e r a t i o n s : \ n - o p e r a t o r : E x i s t s \ n
} ,
"weave" : {
2021-02-18 21:14:14 +00:00
"\u003e=1.16.0-alpha \u003c1.20.4-rancher1-1" : "weave-v1.16" ,
"\u003e=1.20.4-rancher1-1" : "weave-v1.20" ,
2020-02-13 22:55:19 +00:00
"\u003e=1.8.0-rancher0 \u003c1.16.0-alpha" : "weave-v1.8"
}
} ,
"K8sVersionInfo" : {
"v1.10" : {
"maxRKEVersion" : "0.2.2" ,
"maxRancherVersion" : "2.2"
} ,
"v1.10.1-rancher1" : {
"deprecateRKEVersion" : "0.2.2" ,
"deprecateRancherVersion" : "2.2"
} ,
"v1.11" : {
"maxRKEVersion" : "0.2.2" ,
"maxRancherVersion" : "2.2"
} ,
"v1.12" : {
"maxRKEVersion" : "0.2.2" ,
"maxRancherVersion" : "2.2"
} ,
"v1.13" : {
"maxRKEVersion" : "0.3.1" ,
"maxRancherVersion" : "2.3.1"
} ,
"v1.14" : {
"maxRKEVersion" : "1.0.0" ,
"maxRancherVersion" : "2.3.3"
} ,
2020-09-15 17:44:22 +00:00
"v1.15" : {
"maxRKEVersion" : "1.1.99" ,
"maxRancherVersion" : "2.4.99"
} ,
2020-05-11 22:19:51 +00:00
"v1.15.11-rancher1-1" : {
"minRKEVersion" : "1.0.0" ,
"minRancherVersion" : "2.3.3"
} ,
2020-03-28 18:33:45 +00:00
"v1.15.11-rancher1-2" : {
2020-05-11 22:19:51 +00:00
"minRKEVersion" : "1.0.0" ,
"minRancherVersion" : "2.3.3"
} ,
"v1.15.11-rancher1-3" : {
"minRKEVersion" : "1.0.7" ,
"minRancherVersion" : "2.3.7"
2020-03-28 18:33:45 +00:00
} ,
2020-07-22 01:23:22 +00:00
"v1.15.12-rancher1-1" : {
"maxRKEVersion" : "0.2.99" ,
"maxRancherVersion" : "2.2.99"
} ,
2020-05-28 04:36:50 +00:00
"v1.15.12-rancher2-2" : {
2020-07-22 01:23:22 +00:00
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.15.12-rancher2-3" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.15.12-rancher2-4" : {
"minRKEVersion" : "1.1.4-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
} ,
"v1.15.12-rancher2-5" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
2020-05-21 01:13:05 +00:00
} ,
2020-09-25 12:35:34 +00:00
"v1.15.12-rancher2-6" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
} ,
2020-11-02 18:04:47 +00:00
"v1.15.12-rancher2-7" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
} ,
2021-01-27 21:46:24 +00:00
"v1.15.12-rancher2-8" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
} ,
2020-02-13 22:55:19 +00:00
"v1.15.5-rancher1-1" : {
"maxRKEVersion" : "0.2.8" ,
"maxRancherVersion" : "2.2.9"
} ,
2021-04-16 23:34:34 +00:00
"v1.16" : {
"maxRKEVersion" : "1.2.7" ,
"maxRancherVersion" : "2.5.7"
} ,
2020-05-28 04:36:50 +00:00
"v1.16.10-rancher2-1" : {
2020-07-22 01:23:22 +00:00
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.16.10-rancher2-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.16.13-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.16.13-rancher1-2" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
2020-05-21 01:13:05 +00:00
} ,
2020-09-09 21:45:05 +00:00
"v1.16.14-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.16.15-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-09-18 19:43:56 +00:00
"v1.16.15-rancher1-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-11-02 18:04:47 +00:00
"v1.16.15-rancher1-3" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-01-27 21:46:24 +00:00
"v1.16.15-rancher1-4" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-05-11 22:19:51 +00:00
"v1.16.8-rancher1-1" : {
"minRKEVersion" : "1.0.0" ,
"minRancherVersion" : "2.3.3"
} ,
2020-03-28 18:33:45 +00:00
"v1.16.8-rancher1-2" : {
2020-05-11 22:19:51 +00:00
"minRKEVersion" : "1.0.0" ,
"minRancherVersion" : "2.3.3"
} ,
"v1.16.9-rancher1-1" : {
"minRKEVersion" : "1.0.7" ,
"minRancherVersion" : "2.3.7-rc0"
} ,
2021-07-16 14:38:51 +00:00
"v1.17" : {
"maxRKEVersion" : "1.2.99" ,
"maxRancherVersion" : "2.5.99"
} ,
2020-09-09 21:45:05 +00:00
"v1.17.11-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-09-18 19:43:56 +00:00
"v1.17.12-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-10-22 18:57:55 +00:00
"v1.17.13-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.17.13-rancher1-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-11-12 21:38:31 +00:00
"v1.17.14-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-01-27 21:46:24 +00:00
"v1.17.16-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-04-16 23:34:34 +00:00
"v1.17.16-rancher1-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.17.16-rancher1-3" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-01-27 21:46:24 +00:00
"v1.17.17-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-04-16 23:34:34 +00:00
"v1.17.17-rancher1-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.17.17-rancher1-3" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-01-27 21:46:24 +00:00
"v1.17.17-rancher2-1" : {
2020-11-20 17:24:29 +00:00
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-04-05 19:17:38 +00:00
"v1.17.17-rancher2-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2021-04-16 23:34:34 +00:00
"v1.17.17-rancher2-3" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
2020-05-11 22:19:51 +00:00
"v1.17.4-rancher1-1" : {
"minRKEVersion" : "1.0.0" ,
"minRancherVersion" : "2.3.3"
2020-03-28 18:33:45 +00:00
} ,
"v1.17.4-rancher1-2" : {
2020-05-11 22:19:51 +00:00
"minRKEVersion" : "1.0.0" ,
"minRancherVersion" : "2.3.3"
} ,
"v1.17.5-rancher1-1" : {
"minRKEVersion" : "1.0.7" ,
"minRancherVersion" : "2.3.7-rc0"
} ,
2020-05-28 04:36:50 +00:00
"v1.17.6-rancher2-1" : {
2020-07-22 01:23:22 +00:00
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
2020-05-21 01:13:05 +00:00
} ,
2020-07-22 01:23:22 +00:00
"v1.17.6-rancher2-2" : {
"minRKEVersion" : "1.1.2-rc0" ,
2020-05-19 21:31:55 +00:00
"minRancherVersion" : "2.4.4-rc0"
2020-03-28 18:33:45 +00:00
} ,
2020-07-22 01:23:22 +00:00
"v1.17.9-rancher1-1" : {
"minRKEVersion" : "1.1.2-rc0" ,
"minRancherVersion" : "2.4.4-rc0"
} ,
"v1.17.9-rancher1-2" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
} ,
2021-07-16 14:38:51 +00:00
"v1.18" : {
"maxRKEVersion" : "1.2.99" ,
"maxRancherVersion" : "2.5.99"
} ,
2020-10-22 18:57:55 +00:00
"v1.18.10-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.10-rancher1-2" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2020-11-12 21:38:31 +00:00
"v1.18.12-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2020-11-20 17:24:29 +00:00
"v1.18.12-rancher1-2" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2021-01-27 21:46:24 +00:00
"v1.18.14-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.15-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2021-02-18 21:14:14 +00:00
"v1.18.16-rancher1-1" : {
2021-01-27 21:46:24 +00:00
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2021-04-05 19:17:38 +00:00
"v1.18.17-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.17-rancher1-2" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2021-04-16 23:34:34 +00:00
"v1.18.18-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.18-rancher1-2" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2021-06-08 17:26:48 +00:00
"v1.18.19-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.19-rancher1-2" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2020-07-22 01:23:22 +00:00
"v1.18.3-rancher2-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.3-rancher2-2" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.6-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
"v1.18.6-rancher1-2" : {
"minRKEVersion" : "1.1.5-rc0" ,
"minRancherVersion" : "2.4.6-rc0"
} ,
2020-09-09 21:45:05 +00:00
"v1.18.8-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2020-09-18 19:43:56 +00:00
"v1.18.9-rancher1-1" : {
"minRKEVersion" : "1.1.3-rc0" ,
"minRancherVersion" : "2.4.5-rc0"
} ,
2020-09-25 12:35:34 +00:00
"v1.19" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.0-rc0"
} ,
2021-07-29 08:14:06 +00:00
"v1.19.13-rancher1-1" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.0-rc0"
} ,
2021-08-02 20:31:44 +00:00
"v1.19.13-rancher1-2" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.0-rc0"
} ,
2021-08-18 07:59:07 +00:00
"v1.19.14-rancher1-1" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.0-rc0"
} ,
2021-02-01 18:06:55 +00:00
"v1.20" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.6-rc0"
} ,
2021-08-18 07:59:07 +00:00
"v1.20.10-rancher1-1" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.6-rc0"
} ,
2021-07-29 08:14:06 +00:00
"v1.20.9-rancher1-1" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.6-rc0"
} ,
2021-08-02 20:31:44 +00:00
"v1.20.9-rancher1-2" : {
"minRKEVersion" : "1.2.0-rc0" ,
"minRancherVersion" : "2.5.6-rc0"
} ,
2020-02-13 22:55:19 +00:00
"v1.8" : {
"maxRKEVersion" : "0.2.2" ,
"maxRancherVersion" : "2.2"
} ,
"v1.8.10-rancher1-1" : {
"deprecateRKEVersion" : "0.2.2" ,
"deprecateRancherVersion" : "2.2"
} ,
"v1.8.11-rancher1" : {
"deprecateRKEVersion" : "0.2.2" ,
"deprecateRancherVersion" : "2.2"
} ,
"v1.9" : {
"maxRKEVersion" : "0.2.2" ,
"maxRancherVersion" : "2.2"
} ,
"v1.9.7-rancher1" : {
"deprecateRKEVersion" : "0.2.2" ,
"deprecateRancherVersion" : "2.2"
}
} ,
"RancherDefaultK8sVersions" : {
"2.3" : "v1.17.x" ,
"2.3.0" : "v1.15.x" ,
"2.3.1" : "v1.15.x" ,
"2.3.2" : "v1.15.x" ,
"2.3.3" : "v1.16.x" ,
2020-07-22 01:23:22 +00:00
"2.4" : "v1.17.x" ,
2020-05-21 23:47:08 +00:00
"2.4.0" : "v1.17.x" ,
"2.4.1" : "v1.17.x" ,
"2.4.2" : "v1.17.x" ,
"2.4.3" : "v1.17.x" ,
2020-07-22 01:23:22 +00:00
"2.4.4" : "v1.17.x" ,
"2.4.5" : "v1.18.x" ,
2021-02-04 18:24:31 +00:00
"2.5" : "v1.20.x" ,
"2.5.0" : "v1.19.x" ,
"2.5.1" : "v1.19.x" ,
"2.5.2" : "v1.19.x" ,
"2.5.3" : "v1.19.x" ,
"2.5.4" : "v1.19.x" ,
"2.5.5" : "v1.19.x" ,
"2.5.6" : "v1.20.x" ,
2021-07-16 14:38:51 +00:00
"2.6" : "v1.21.x" ,
2021-07-23 17:29:29 +00:00
"default" : "v1.21.x"
2020-02-13 22:55:19 +00:00
} ,
"RKEDefaultK8sVersions" : {
"0.3" : "v1.16.3-rancher1-1" ,
2021-08-18 07:59:07 +00:00
"default" : "v1.21.4-rancher1-1"
2020-02-13 22:55:19 +00:00
} ,
"K8sVersionDockerInfo" : {
"1.10" : [
"1.11.x" ,
"1.12.x" ,
"1.13.x" ,
"17.03.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.11" : [
"1.11.x" ,
"1.12.x" ,
"1.13.x" ,
"17.03.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.12" : [
"1.11.x" ,
"1.12.x" ,
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.13" : [
"1.11.x" ,
"1.12.x" ,
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.14" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.15" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.16" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
"1.17" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
] ,
2020-05-11 22:19:51 +00:00
"1.18" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-05-11 22:19:51 +00:00
] ,
2020-09-14 23:47:56 +00:00
"1.19" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
] ,
"1.20" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
"19.03.x" ,
"20.10.x"
2020-09-14 23:47:56 +00:00
] ,
2021-05-18 01:44:04 +00:00
"1.21" : [
"1.13.x" ,
"17.03.x" ,
"17.06.x" ,
"17.09.x" ,
"18.06.x" ,
"18.09.x" ,
"19.03.x" ,
"20.10.x"
] ,
2020-02-13 22:55:19 +00:00
"1.8" : [
"1.11.x" ,
"1.12.x" ,
"1.13.x" ,
"17.03.x"
] ,
"1.9" : [
"1.11.x" ,
"1.12.x" ,
"1.13.x" ,
"17.03.x" ,
"18.06.x" ,
"18.09.x" ,
2021-02-01 18:06:55 +00:00
"19.03.x" ,
"20.10.x"
2020-02-13 22:55:19 +00:00
]
} ,
"K8sVersionWindowsServiceOptions" : {
"v1.15" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"feature-gates" : "HyperVContainer=true,WindowsGMSA=true" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
"feature-gates" : "WinOverlay=true" ,
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
} ,
"v1.16" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"feature-gates" : "HyperVContainer=true,WindowsGMSA=true" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
"feature-gates" : "WinOverlay=true" ,
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
} ,
"v1.17" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"feature-gates" : "HyperVContainer=true,WindowsGMSA=true" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
2020-05-11 22:19:51 +00:00
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
"feature-gates" : "WinOverlay=true" ,
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
} ,
"v1.18" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"feature-gates" : "HyperVContainer=true,WindowsGMSA=true" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
2020-02-13 22:55:19 +00:00
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
"feature-gates" : "WinOverlay=true" ,
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
2020-09-14 23:47:56 +00:00
} ,
"v1.19" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
2021-02-01 18:06:55 +00:00
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"feature-gates" : "HyperVContainer=true,WindowsGMSA=true" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
"feature-gates" : "WinOverlay=true" ,
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
} ,
"v1.20" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
2020-09-14 23:47:56 +00:00
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"feature-gates" : "HyperVContainer=true,WindowsGMSA=true" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
2021-07-30 18:43:20 +00:00
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
"feature-gates" : "WinOverlay=true" ,
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
} ,
"v1.21" : {
"etcd" : null ,
"kubeapi" : null ,
"kubelet" : {
"address" : "0.0.0.0" ,
"anonymous-auth" : "false" ,
"authentication-token-webhook" : "true" ,
"authorization-mode" : "Webhook" ,
"cert-dir" : "[PREFIX_PATH]/var/lib/kubelet/pki" ,
"cgroups-per-qos" : "false" ,
"cni-bin-dir" : "[PREFIX_PATH]/opt/cni/bin" ,
"cni-conf-dir" : "[PREFIX_PATH]/etc/cni/net.d" ,
"enforce-node-allocatable" : "''" ,
"event-qps" : "0" ,
"image-pull-progress-deadline" : "30m" ,
"kube-reserved" : "cpu=500m,memory=500Mi,ephemeral-storage=1Gi" ,
"make-iptables-util-chains" : "true" ,
"network-plugin" : "cni" ,
"read-only-port" : "0" ,
"resolv-conf" : "''" ,
"streaming-connection-idle-timeout" : "30m" ,
"system-reserved" : "cpu=1000m,memory=2Gi,ephemeral-storage=2Gi" ,
"tls-cipher-suites" : "TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305" ,
2020-09-14 23:47:56 +00:00
"v" : "2" ,
"volume-plugin-dir" : "[PREFIX_PATH]/var/lib/kubelet/volumeplugins"
} ,
"kubeproxy" : {
"enable-dsr" : "false" ,
2021-08-10 18:14:03 +00:00
"feature-gates" : "IPv6DualStack=false" ,
2020-09-14 23:47:56 +00:00
"healthz-bind-address" : "127.0.0.1" ,
"proxy-mode" : "kernelspace" ,
"v" : "2"
} ,
"kubeController" : null ,
"scheduler" : null
2020-02-13 22:55:19 +00:00
}
} ,
"CisConfigParams" : {
"default" : {
2020-07-22 01:23:22 +00:00
"benchmarkVersion" : "rke-cis-1.5"
2020-02-13 22:55:19 +00:00
} ,
"v1.15" : {
2020-07-22 01:23:22 +00:00
"benchmarkVersion" : "rke-cis-1.5"
2020-03-03 17:09:06 +00:00
} ,
"v1.16" : {
2020-07-22 01:23:22 +00:00
"benchmarkVersion" : "rke-cis-1.5"
2020-03-03 17:09:06 +00:00
} ,
"v1.17" : {
2020-07-22 01:23:22 +00:00
"benchmarkVersion" : "rke-cis-1.5"
2020-03-03 17:09:06 +00:00
} ,
"v1.18" : {
2020-07-22 01:23:22 +00:00
"benchmarkVersion" : "rke-cis-1.5"
2020-09-14 23:47:56 +00:00
} ,
"v1.19" : {
"benchmarkVersion" : "rke-cis-1.5"
2021-02-04 18:24:31 +00:00
} ,
"v1.20" : {
2021-04-05 19:17:38 +00:00
"benchmarkVersion" : "rke-cis-1.5"
2020-02-13 22:55:19 +00:00
}
} ,
"CisBenchmarkVersionInfo" : {
"cis-1.4" : {
2020-03-03 17:09:06 +00:00
"managed" : false ,
"minKubernetesVersion" : "1.13" ,
"skippedChecks" : null ,
"notApplicableChecks" : null
2020-02-13 22:55:19 +00:00
} ,
"cis-1.5" : {
2020-03-03 17:09:06 +00:00
"managed" : false ,
"minKubernetesVersion" : "1.15" ,
"skippedChecks" : null ,
"notApplicableChecks" : null
2020-02-13 22:55:19 +00:00
} ,
"rke-cis-1.4" : {
2020-03-03 17:09:06 +00:00
"managed" : true ,
2020-03-14 00:06:19 +00:00
"minKubernetesVersion" : "1.15" ,
2020-03-10 12:25:52 +00:00
"skippedChecks" : {
2020-03-14 00:06:19 +00:00
"1.1.11" : "Enabling AlwaysPullImages can use significant bandwidth." ,
"1.1.21" : "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers." ,
2020-03-15 16:39:41 +00:00
"1.1.24" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"1.1.34" : "Enabling encryption changes how data can be recovered as data is encrypted." ,
"1.1.35" : "Enabling encryption changes how data can be recovered as data is encrypted." ,
2020-03-14 00:06:19 +00:00
"1.1.36" : "EventRateLimit needs to be tuned depending on the cluster." ,
"1.2.2" : "Adding this argument prevents Rancher's monitoring tool to collect metrics on the scheduler." ,
"1.3.7" : "Adding this argument prevents Rancher's monitoring tool to collect metrics on the controller manager." ,
"1.4.12" : "A system service account is required for etcd data directory ownership. Refer to Rancher's hardening guide for more details on how to configure this ownership." ,
2020-03-15 16:39:41 +00:00
"1.7.2" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"1.7.3" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"1.7.4" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"1.7.5" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
2020-03-14 00:06:19 +00:00
"2.1.10" : "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers." ,
2020-03-15 16:39:41 +00:00
"2.1.6" : "System level configurations are required prior to provisioning the cluster in order for this argument to be set to true."
2020-03-10 12:25:52 +00:00
} ,
"notApplicableChecks" : {
2020-03-15 16:39:41 +00:00
"1.1.9" : "The argument --repair-malformed-updates has been removed as of Kubernetes version 1.14." ,
"1.3.6" : "Clusters provisioned by RKE handles certificate rotation directly through RKE." ,
"1.4.1" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time." ,
"1.4.13" : "Clusters provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes." ,
"1.4.14" : "Clusters provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes." ,
"1.4.2" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time." ,
"1.4.3" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time." ,
"1.4.4" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time." ,
"1.4.5" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time." ,
"1.4.6" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time." ,
"1.4.7" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time." ,
"1.4.8" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time." ,
"2.1.12" : "Clusters provisioned by RKE handles certificate rotation directly through RKE." ,
"2.1.13" : "Clusters provisioned by RKE handles certificate rotation directly through RKE." ,
2020-03-14 00:06:19 +00:00
"2.1.8" : "Clusters provisioned by RKE clusters and most cloud providers require hostnames." ,
2020-03-15 16:39:41 +00:00
"2.2.10" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time." ,
"2.2.3" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time." ,
"2.2.4" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time." ,
"2.2.9" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time."
2020-03-10 12:25:52 +00:00
}
2020-02-13 22:55:19 +00:00
} ,
"rke-cis-1.5" : {
2020-03-03 17:09:06 +00:00
"managed" : true ,
"minKubernetesVersion" : "1.15" ,
"skippedChecks" : {
2020-03-14 00:06:19 +00:00
"1.1.12" : "A system service account is required for etcd data directory ownership. Refer to Rancher's hardening guide for more details on how to configure this ownership." ,
2020-03-15 16:39:41 +00:00
"1.2.16" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
2020-03-25 21:44:06 +00:00
"1.2.33" : "Enabling encryption changes how data can be recovered as data is encrypted." ,
"1.2.34" : "Enabling encryption changes how data can be recovered as data is encrypted." ,
2020-03-14 00:06:19 +00:00
"1.2.6" : "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers." ,
"4.2.10" : "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers." ,
2020-03-15 16:39:41 +00:00
"4.2.6" : "System level configurations are required prior to provisioning the cluster in order for this argument to be set to true." ,
2020-07-22 01:23:22 +00:00
"5.1.5" : "Kubernetes provides default service accounts to be used." ,
2020-03-15 16:39:41 +00:00
"5.2.2" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"5.2.3" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"5.2.4" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
"5.2.5" : "Enabling Pod Security Policy can cause applications to unexpectedly fail." ,
2020-07-22 01:23:22 +00:00
"5.3.2" : "Enabling Network Policies can prevent certain applications from communicating with each other." ,
"5.6.4" : "Kubernetes provides a default namespace."
2020-03-03 17:09:06 +00:00
} ,
"notApplicableChecks" : {
2020-03-15 16:39:41 +00:00
"1.1.1" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time." ,
"1.1.13" : "Clusters provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes." ,
"1.1.14" : "Clusters provisioned by RKE does not store the kubernetes default kubeconfig credentials file on the nodes." ,
"1.1.15" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time." ,
"1.1.16" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time." ,
"1.1.17" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time." ,
"1.1.18" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time." ,
"1.1.2" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time." ,
2020-03-25 21:44:06 +00:00
"1.1.3" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time." ,
"1.1.4" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time." ,
"1.1.5" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time." ,
"1.1.6" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time." ,
"1.1.7" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time." ,
"1.1.8" : "Clusters provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time." ,
2020-03-15 16:39:41 +00:00
"1.3.6" : "Clusters provisioned by RKE handles certificate rotation directly through RKE." ,
"4.1.1" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time." ,
"4.1.10" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time." ,
"4.1.2" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time." ,
"4.1.9" : "Clusters provisioned by RKE doesn’ t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time." ,
"4.2.12" : "Clusters provisioned by RKE handles certificate rotation directly through RKE."
2020-03-03 17:09:06 +00:00
}
2020-02-13 22:55:19 +00:00
}
2020-03-03 17:09:06 +00:00
} ,
"k3s" : {
2020-03-05 16:19:45 +00:00
"releases" : [
2020-05-21 01:13:05 +00:00
{
2021-05-18 01:44:04 +00:00
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
2021-07-23 15:24:55 +00:00
"version" : "v1.19.13+k3s1"
2020-09-23 20:06:38 +00:00
} ,
{
2021-05-18 01:44:04 +00:00
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
2021-07-23 15:24:55 +00:00
"version" : "v1.20.9+k3s1"
2021-01-27 21:46:24 +00:00
} ,
{
2021-05-18 01:44:04 +00:00
"agentArgs" : {
"docker" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"flannel-conf" : {
"type" : "string"
} ,
"flannel-iface" : {
"type" : "string"
} ,
"kube-proxy-arg" : {
"type" : "array"
} ,
"kubelet-arg" : {
"type" : "array"
} ,
"pause-image" : {
"type" : "string"
} ,
"protect-kernel-defaults" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"selinux" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"snapshotter" : {
"type" : "string"
}
} ,
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
"serverArgs" : {
"cluster-cidr" : {
"type" : "string"
} ,
"cluster-dns" : {
"type" : "string"
} ,
"cluster-domain" : {
"type" : "string"
} ,
"datastore-cafile" : {
"type" : "string"
} ,
"datastore-certfile" : {
"type" : "string"
} ,
"datastore-endpoint" : {
"type" : "string"
} ,
"datastore-keyfile" : {
"type" : "string"
} ,
"default-local-storage-path" : {
"type" : "string"
} ,
"disable" : {
"options" : [
"coredns" ,
"servicelb" ,
"traefik" ,
"local-storage" ,
"metrics-server"
] ,
"type" : "array"
} ,
2021-08-19 09:34:21 +00:00
"disable-apiserver" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"disable-cloud-controller" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"disable-controller-manager" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"disable-etcd" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"disable-kube-proxy" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"disable-network-policy" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"disable-scheduler" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
2021-06-03 00:01:03 +00:00
"etcd-expose-metrics" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-06-03 00:01:03 +00:00
"type" : "boolean"
2021-05-18 01:44:04 +00:00
} ,
2021-06-03 00:01:03 +00:00
"flannel-backend" : {
2021-05-18 01:44:04 +00:00
"options" : [
2021-06-03 00:01:03 +00:00
"none" ,
"vxlan" ,
"ipsec" ,
"host-gw" ,
"wireguard"
2021-05-18 01:44:04 +00:00
] ,
2021-06-03 00:01:03 +00:00
"type" : "enum"
2021-05-18 01:44:04 +00:00
} ,
2021-06-03 00:01:03 +00:00
"kube-apiserver-arg" : {
2021-05-18 01:44:04 +00:00
"type" : "array"
} ,
2021-06-03 00:01:03 +00:00
"kube-cloud-controller-manager-arg" : {
2021-05-18 01:44:04 +00:00
"type" : "array"
} ,
"kube-controller-manager-arg" : {
"type" : "array"
} ,
"kube-scheduler-arg" : {
"type" : "array"
} ,
2021-06-03 00:01:03 +00:00
"secrets-encryption" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-06-03 00:01:03 +00:00
"type" : "boolean"
} ,
2021-05-18 01:44:04 +00:00
"service-cidr" : {
"type" : "string"
} ,
"service-node-port-range" : {
"type" : "string"
} ,
"tls-san" : {
"type" : "array"
}
} ,
2021-07-23 15:24:55 +00:00
"version" : "v1.21.3+k3s1"
2021-06-03 00:01:03 +00:00
}
]
} ,
"rke2" : {
"releases" : [
{
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
2021-06-25 14:49:25 +00:00
"version" : "v1.18.20+rke2r1"
2021-05-18 01:44:04 +00:00
} ,
{
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
2021-08-11 16:18:06 +00:00
"version" : "v1.19.13+rke2r2"
2021-06-03 00:01:03 +00:00
} ,
{
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
2021-08-11 16:18:06 +00:00
"version" : "v1.20.9+rke2r2"
2021-05-18 01:44:04 +00:00
} ,
{
"agentArgs" : {
"audit-policy-file" : {
"type" : "string"
} ,
"cloud-provider-config" : {
"type" : "string"
} ,
"cloud-provider-name" : {
2021-08-06 14:21:29 +00:00
"default" : null ,
2021-05-18 01:44:04 +00:00
"nullable" : true ,
"options" : [
"aws" ,
"azure" ,
"gcp" ,
2021-08-18 07:59:07 +00:00
"rancher-vsphere" ,
2021-08-06 14:21:29 +00:00
"external"
2021-05-18 01:44:04 +00:00
] ,
"type" : "enum"
} ,
2021-07-23 17:29:29 +00:00
"kube-proxy-arg" : {
"type" : "array"
} ,
2021-05-18 01:44:04 +00:00
"kubelet-arg" : {
"type" : "array"
} ,
"profile" : {
"nullable" : true ,
"options" : [
"cis-1.5" ,
"cis-1.6"
] ,
"type" : "enum"
} ,
"protect-kernel-defaults" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"selinux" : {
"type" : "bool"
} ,
"system-default-registry" : {
"type" : "string"
}
} ,
"charts" : {
"rancher-vsphere-cpi" : {
"repo" : "rancher-charts" ,
"version" : "1.0.000"
} ,
"rancher-vsphere-csi" : {
"repo" : "rancher-charts" ,
"version" : "2.1.000"
} ,
"rke2-calico" : {
"repo" : "rancher-rke2-charts" ,
2021-08-25 08:12:18 +00:00
"version" : "v3.19.2-203"
2021-06-03 00:01:03 +00:00
} ,
"rke2-calico-crd" : {
"repo" : "rancher-rke2-charts" ,
2021-08-11 16:18:06 +00:00
"version" : "v1.0.101"
2021-05-18 01:44:04 +00:00
} ,
"rke2-canal" : {
"repo" : "rancher-rke2-charts" ,
"version" : "v3.13.300-build2021022306"
} ,
"rke2-cilium" : {
"repo" : "rancher-rke2-charts" ,
2021-08-11 16:18:06 +00:00
"version" : "1.9.808"
2021-05-18 01:44:04 +00:00
} ,
"rke2-coredns" : {
"repo" : "rancher-rke2-charts" ,
2021-06-03 00:01:03 +00:00
"version" : "1.10.101-build2021022304"
2021-05-18 01:44:04 +00:00
} ,
"rke2-ingress-nginx" : {
"repo" : "rancher-rke2-charts" ,
2021-08-11 16:18:06 +00:00
"version" : "3.34.002"
2021-05-18 01:44:04 +00:00
} ,
"rke2-metrics-server" : {
"repo" : "rancher-rke2-charts" ,
"version" : "2.11.100-build2021022300"
} ,
"rke2-multus" : {
2021-06-18 12:22:58 +00:00
"repo" : "rancher-rke2-charts" ,
2021-08-11 16:18:06 +00:00
"version" : "v3.7.1-build2021041603"
2021-05-18 01:44:04 +00:00
}
} ,
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
"serverArgs" : {
"audit-policy-file" : {
"type" : "string"
} ,
"cluster-cidr" : {
"type" : "string"
} ,
"cluster-dns" : {
"type" : "string"
} ,
"cluster-domain" : {
"type" : "string"
} ,
"cni" : {
"default" : "calico" ,
"options" : [
"canal" ,
"cilium" ,
"calico" ,
2021-08-02 20:31:44 +00:00
"multus,canal" ,
"multus,cilium" ,
"multus,calico"
2021-05-18 01:44:04 +00:00
] ,
"type" : "array"
} ,
"disable" : {
"options" : [
"rke2-coredns" ,
"rke2-ingress-nginx" ,
"rke2-metrics-server"
] ,
"type" : "array"
} ,
2021-08-02 17:49:15 +00:00
"disable-kube-proxy" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-08-02 17:49:15 +00:00
"type" : "boolean"
} ,
2021-05-18 01:44:04 +00:00
"etcd-expose-metrics" : {
2021-08-04 15:18:38 +00:00
"default" : false ,
2021-05-18 01:44:04 +00:00
"type" : "boolean"
} ,
"kube-apiserver-arg" : {
"type" : "array"
} ,
"kube-controller-manager-arg" : {
"type" : "array"
} ,
2021-07-23 17:29:29 +00:00
"kube-proxy-arg" : {
"type" : "array"
} ,
2021-05-18 01:44:04 +00:00
"kube-scheduler-arg" : {
"type" : "array"
} ,
"service-cidr" : {
"type" : "string"
} ,
"service-node-port-range" : {
"type" : "string"
} ,
"tls-san" : {
"type" : "array"
}
} ,
2021-08-25 08:12:18 +00:00
"version" : "v1.21.3+rke2r2"
} ,
{
"agentArgs" : {
"audit-policy-file" : {
"type" : "string"
} ,
"cloud-provider-config" : {
"type" : "string"
} ,
"cloud-provider-name" : {
"default" : null ,
"nullable" : true ,
"options" : [
"aws" ,
"azure" ,
"gcp" ,
"rancher-vsphere" ,
"external"
] ,
"type" : "enum"
} ,
"kube-proxy-arg" : {
"type" : "array"
} ,
"kubelet-arg" : {
"type" : "array"
} ,
"profile" : {
"nullable" : true ,
"options" : [
"cis-1.5" ,
"cis-1.6"
] ,
"type" : "enum"
} ,
"protect-kernel-defaults" : {
"default" : false ,
"type" : "boolean"
} ,
"selinux" : {
"type" : "bool"
} ,
"system-default-registry" : {
"type" : "string"
}
} ,
"charts" : {
"rancher-vsphere-cpi" : {
"repo" : "rancher-charts" ,
"version" : "1.0.000"
} ,
"rancher-vsphere-csi" : {
"repo" : "rancher-charts" ,
"version" : "2.1.000"
} ,
"rke2-calico" : {
"repo" : "rancher-rke2-charts" ,
"version" : "v3.19.2-203"
} ,
"rke2-calico-crd" : {
"repo" : "rancher-rke2-charts" ,
"version" : "v1.0.101"
} ,
"rke2-canal" : {
"repo" : "rancher-rke2-charts" ,
"version" : "v3.13.300-build2021022306"
} ,
"rke2-cilium" : {
"repo" : "rancher-rke2-charts" ,
"version" : "1.9.808"
} ,
"rke2-coredns" : {
"repo" : "rancher-rke2-charts" ,
"version" : "1.10.101-build2021022304"
} ,
"rke2-ingress-nginx" : {
"repo" : "rancher-rke2-charts" ,
"version" : "3.34.002"
} ,
"rke2-metrics-server" : {
"repo" : "rancher-rke2-charts" ,
"version" : "2.11.100-build2021022300"
} ,
"rke2-multus" : {
"repo" : "rancher-rke2-charts" ,
"version" : "v3.7.1-build2021041603"
}
} ,
"maxChannelServerVersion" : "v2.6.99" ,
"minChannelServerVersion" : "v2.6.0-alpha1" ,
"serverArgs" : {
"audit-policy-file" : {
"type" : "string"
} ,
"cluster-cidr" : {
"type" : "string"
} ,
"cluster-dns" : {
"type" : "string"
} ,
"cluster-domain" : {
"type" : "string"
} ,
"cni" : {
"default" : "calico" ,
"options" : [
"canal" ,
"cilium" ,
"calico" ,
"multus,canal" ,
"multus,cilium" ,
"multus,calico"
] ,
"type" : "array"
} ,
"disable" : {
"options" : [
"rke2-coredns" ,
"rke2-ingress-nginx" ,
"rke2-metrics-server"
] ,
"type" : "array"
} ,
"disable-kube-proxy" : {
"default" : false ,
"type" : "boolean"
} ,
"etcd-expose-metrics" : {
"default" : false ,
"type" : "boolean"
} ,
"kube-apiserver-arg" : {
"type" : "array"
} ,
"kube-controller-manager-arg" : {
"type" : "array"
} ,
"kube-proxy-arg" : {
"type" : "array"
} ,
"kube-scheduler-arg" : {
"type" : "array"
} ,
"service-cidr" : {
"type" : "string"
} ,
"service-node-port-range" : {
"type" : "string"
} ,
"tls-san" : {
"type" : "array"
}
} ,
"version" : "v1.21.4-rc1+rke2r1"
2020-09-09 21:28:50 +00:00
}
]
2020-02-13 22:55:19 +00:00
}
}