mirror of
https://github.com/rancher/rke.git
synced 2025-05-11 01:45:00 +00:00
rancher1-3
This commit is contained in:
parent
4adf2c9b68
commit
d93d0be54a
File diff suppressed because one or more lines are too long
153
data/data.json
153
data/data.json
@ -3210,10 +3210,42 @@
|
||||
},
|
||||
"v1.15.11-rancher1-2": {
|
||||
"etcd": "rancher/coreos-etcd:v3.3.10-rancher1",
|
||||
"alpine": "rancher/rke-tools:v0.1.53",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.53",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.53",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.53",
|
||||
"alpine": "rancher/rke-tools:v0.1.54",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.54",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.54",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.54",
|
||||
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
|
||||
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
|
||||
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
|
||||
"kubednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.3.0",
|
||||
"coredns": "rancher/coredns-coredns:1.3.1",
|
||||
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.3.0",
|
||||
"kubernetes": "rancher/hyperkube:v1.15.11-rancher1",
|
||||
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
|
||||
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
|
||||
"calicoNode": "rancher/calico-node:v3.13.0",
|
||||
"calicoCni": "rancher/calico-cni:v3.13.0",
|
||||
"calicoControllers": "rancher/calico-kube-controllers:v3.13.0",
|
||||
"calicoCtl": "rancher/calico-ctl:v2.0.0",
|
||||
"calicoFlexVol": "rancher/calico-pod2daemon-flexvol:v3.13.0",
|
||||
"canalNode": "rancher/calico-node:v3.13.0",
|
||||
"canalCni": "rancher/calico-cni:v3.13.0",
|
||||
"canalFlannel": "rancher/coreos-flannel:v0.11.0",
|
||||
"canalFlexVol": "rancher/calico-pod2daemon-flexvol:v3.13.0",
|
||||
"weaveNode": "weaveworks/weave-kube:2.5.2",
|
||||
"weaveCni": "weaveworks/weave-npc:2.5.2",
|
||||
"podInfraContainer": "rancher/pause:3.1",
|
||||
"ingress": "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1",
|
||||
"ingressBackend": "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
|
||||
"metricsServer": "rancher/metrics-server:v0.3.3",
|
||||
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
|
||||
},
|
||||
"v1.15.11-rancher1-3": {
|
||||
"etcd": "rancher/coreos-etcd:v3.3.10-rancher1",
|
||||
"alpine": "rancher/rke-tools:v0.1.54",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.54",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.54",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.54",
|
||||
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
|
||||
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
|
||||
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
|
||||
@ -3821,10 +3853,42 @@
|
||||
},
|
||||
"v1.16.8-rancher1-2": {
|
||||
"etcd": "rancher/coreos-etcd:v3.3.15-rancher1",
|
||||
"alpine": "rancher/rke-tools:v0.1.53",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.53",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.53",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.53",
|
||||
"alpine": "rancher/rke-tools:v0.1.54",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.54",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.54",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.54",
|
||||
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
|
||||
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
|
||||
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
|
||||
"kubednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
|
||||
"coredns": "rancher/coredns-coredns:1.6.2",
|
||||
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
|
||||
"kubernetes": "rancher/hyperkube:v1.16.8-rancher1",
|
||||
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
|
||||
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
|
||||
"calicoNode": "rancher/calico-node:v3.13.0",
|
||||
"calicoCni": "rancher/calico-cni:v3.13.0",
|
||||
"calicoControllers": "rancher/calico-kube-controllers:v3.13.0",
|
||||
"calicoCtl": "rancher/calico-ctl:v2.0.0",
|
||||
"calicoFlexVol": "rancher/calico-pod2daemon-flexvol:v3.13.0",
|
||||
"canalNode": "rancher/calico-node:v3.13.0",
|
||||
"canalCni": "rancher/calico-cni:v3.13.0",
|
||||
"canalFlannel": "rancher/coreos-flannel:v0.11.0",
|
||||
"canalFlexVol": "rancher/calico-pod2daemon-flexvol:v3.13.0",
|
||||
"weaveNode": "weaveworks/weave-kube:2.5.2",
|
||||
"weaveCni": "weaveworks/weave-npc:2.5.2",
|
||||
"podInfraContainer": "rancher/pause:3.1",
|
||||
"ingress": "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1",
|
||||
"ingressBackend": "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
|
||||
"metricsServer": "rancher/metrics-server:v0.3.4",
|
||||
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
|
||||
},
|
||||
"v1.16.8-rancher1-3": {
|
||||
"etcd": "rancher/coreos-etcd:v3.3.15-rancher1",
|
||||
"alpine": "rancher/rke-tools:v0.1.54",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.54",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.54",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.54",
|
||||
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
|
||||
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
|
||||
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
|
||||
@ -4043,10 +4107,42 @@
|
||||
},
|
||||
"v1.17.4-rancher1-2": {
|
||||
"etcd": "rancher/coreos-etcd:v3.4.3-rancher1",
|
||||
"alpine": "rancher/rke-tools:v0.1.53",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.53",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.53",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.53",
|
||||
"alpine": "rancher/rke-tools:v0.1.54",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.54",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.54",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.54",
|
||||
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
|
||||
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
|
||||
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
|
||||
"kubednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
|
||||
"coredns": "rancher/coredns-coredns:1.6.5",
|
||||
"corednsAutoscaler": "rancher/cluster-proportional-autoscaler:1.7.1",
|
||||
"kubernetes": "rancher/hyperkube:v1.17.4-rancher1",
|
||||
"flannel": "rancher/coreos-flannel:v0.11.0-rancher1",
|
||||
"flannelCni": "rancher/flannel-cni:v0.3.0-rancher5",
|
||||
"calicoNode": "rancher/calico-node:v3.13.0",
|
||||
"calicoCni": "rancher/calico-cni:v3.13.0",
|
||||
"calicoControllers": "rancher/calico-kube-controllers:v3.13.0",
|
||||
"calicoCtl": "rancher/calico-ctl:v2.0.0",
|
||||
"calicoFlexVol": "rancher/calico-pod2daemon-flexvol:v3.13.0",
|
||||
"canalNode": "rancher/calico-node:v3.13.0",
|
||||
"canalCni": "rancher/calico-cni:v3.13.0",
|
||||
"canalFlannel": "rancher/coreos-flannel:v0.11.0",
|
||||
"canalFlexVol": "rancher/calico-pod2daemon-flexvol:v3.13.0",
|
||||
"weaveNode": "weaveworks/weave-kube:2.5.2",
|
||||
"weaveCni": "weaveworks/weave-npc:2.5.2",
|
||||
"podInfraContainer": "rancher/pause:3.1",
|
||||
"ingress": "rancher/nginx-ingress-controller:nginx-0.25.1-rancher1",
|
||||
"ingressBackend": "rancher/nginx-ingress-controller-defaultbackend:1.5-rancher1",
|
||||
"metricsServer": "rancher/metrics-server:v0.3.6",
|
||||
"windowsPodInfraContainer": "rancher/kubelet-pause:v0.1.3"
|
||||
},
|
||||
"v1.17.4-rancher1-3": {
|
||||
"etcd": "rancher/coreos-etcd:v3.4.3-rancher1",
|
||||
"alpine": "rancher/rke-tools:v0.1.54",
|
||||
"nginxProxy": "rancher/rke-tools:v0.1.54",
|
||||
"certDownloader": "rancher/rke-tools:v0.1.54",
|
||||
"kubernetesServicesSidecar": "rancher/rke-tools:v0.1.54",
|
||||
"kubedns": "rancher/k8s-dns-kube-dns:1.15.0",
|
||||
"dnsmasq": "rancher/k8s-dns-dnsmasq-nanny:1.15.0",
|
||||
"kubednsSidecar": "rancher/k8s-dns-sidecar:1.15.0",
|
||||
@ -4324,7 +4420,7 @@
|
||||
},
|
||||
"RKEDefaultK8sVersions": {
|
||||
"0.3": "v1.16.3-rancher1-1",
|
||||
"default": "v1.17.4-rancher1-2"
|
||||
"default": "v1.17.4-rancher1-3"
|
||||
},
|
||||
"K8sVersionDockerInfo": {
|
||||
"1.10": [
|
||||
@ -4610,16 +4706,18 @@
|
||||
"skippedChecks": {
|
||||
"1.1.12": "A system service account is required for etcd data directory ownership. Refer to Rancher's hardening guide for more details on how to configure this ownership.",
|
||||
"1.2.16": "Enabling Pod Security Policy can cause applications to unexpectedly fail.",
|
||||
"1.2.33": "Enabling encryption changes how data can be recovered as data is encrypted.",
|
||||
"1.2.34": "Enabling encryption changes how data can be recovered as data is encrypted.",
|
||||
"1.2.6": "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers.",
|
||||
"4.2.10": "When generating serving certificates, functionality could break in conjunction with hostname overrides which are required for certain cloud providers.",
|
||||
"4.2.6": "System level configurations are required prior to provisioning the cluster in order for this argument to be set to true.",
|
||||
"5.1.5": "TODO",
|
||||
"5.1.5": "Kubernetes provides default service accounts to be used.",
|
||||
"5.2.2": "Enabling Pod Security Policy can cause applications to unexpectedly fail.",
|
||||
"5.2.3": "Enabling Pod Security Policy can cause applications to unexpectedly fail.",
|
||||
"5.2.4": "Enabling Pod Security Policy can cause applications to unexpectedly fail.",
|
||||
"5.2.5": "Enabling Pod Security Policy can cause applications to unexpectedly fail.",
|
||||
"5.3.2": "Enabling Network Policies can cause lot of unintended network traffic disruptions",
|
||||
"5.6.4": "A default namespace provides a flexible workspace to try out various deployments"
|
||||
"5.3.2": "Enabling Network Policies can prevent certain applications from communicating with each other.",
|
||||
"5.6.4": "Kubernetes provides a default namespace."
|
||||
},
|
||||
"notApplicableChecks": {
|
||||
"1.1.1": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
@ -4630,12 +4728,12 @@
|
||||
"1.1.17": "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.18": "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.2": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.3": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.4": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.5": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.6": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.7": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.8": "Clusters provisioned by RKE doesn't require or maintain a configuration file for kube-apiserver.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.3": "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.4": "Clusters provisioned by RKE doesn't require or maintain a configuration file for controller-manager.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.5": "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.6": "Clusters provisioned by RKE doesn't require or maintain a configuration file for scheduler.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.7": "Clusters provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.1.8": "Clusters provisioned by RKE doesn't require or maintain a configuration file for etcd.\nAll configuration is passed in as arguments at container run time.",
|
||||
"1.3.6": "Clusters provisioned by RKE handles certificate rotation directly through RKE.",
|
||||
"4.1.1": "Clusters provisioned by RKE doesn’t require or maintain a configuration file for the kubelet service.\nAll configuration is passed in as arguments at container run time.",
|
||||
"4.1.10": "Clusters provisioned by RKE doesn’t require or maintain a configuration file for the kubelet.\nAll configuration is passed in as arguments at container run time.",
|
||||
@ -4648,14 +4746,9 @@
|
||||
"k3s": {
|
||||
"releases": [
|
||||
{
|
||||
"maxChannelServerVersion": "v2.4.0",
|
||||
"minChannelServerVersion": "v2.4.0",
|
||||
"version": "v1.17.3+k3s1"
|
||||
},
|
||||
{
|
||||
"maxChannelServerVersion": "v2.4.0",
|
||||
"minChannelServerVersion": "v2.4.0",
|
||||
"version": "v1.16.7+k3s1"
|
||||
"maxChannelServerVersion": "v2.4.99",
|
||||
"minChannelServerVersion": "v2.4.0-rc1",
|
||||
"version": "v1.17.4+k3s1"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
Loading…
Reference in New Issue
Block a user