Merge pull request #15866 from hakman/fix_aws-vpc-cni

Default to 100.64.0.0/13 as IPv4 service cluster IP range
This commit is contained in:
Kubernetes Prow Robot 2023-09-04 12:13:48 -07:00 committed by GitHub
commit bb03f4160e
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
44 changed files with 83 additions and 90 deletions

View File

@ -128,7 +128,7 @@ ClusterName: minimal.example.com
ConfigBase: memfs://clusters.example.com/minimal.example.com ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a InstanceGroupName: master-us-test-1a
InstanceGroupRole: ControlPlane InstanceGroupRole: ControlPlane
NodeupConfigHash: Elzo/rIOjAxly0oM7DRFIJMLY2Tjr7Hmq2Cz9JUTy94= NodeupConfigHash: KcnbZLY7LCbjnvOe0vHk1c3BObT1OU0HsZlfebU6dzw=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal.example.com:3988/ - https://kops-controller.internal.minimal.example.com:3988/
InstanceGroupName: nodes InstanceGroupName: nodes
InstanceGroupRole: Node InstanceGroupRole: Node
NodeupConfigHash: 6zBnYt9ifwaf9tP3HRh2eAUUIHkTj82HfCkWcj7QOmo= NodeupConfigHash: Q/5lnobS7oex8BMOQc8DYbYmvZeeSSt7NgnB7WgKBYQ=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -123,7 +123,7 @@ spec:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
kubeControllerManager: kubeControllerManager:
allocateNodeCIDRs: true allocateNodeCIDRs: true
@ -153,7 +153,7 @@ spec:
image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20 image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20
memoryRequest: 5Mi memoryRequest: 5Mi
provider: CoreDNS provider: CoreDNS
serverIP: 172.20.0.10 serverIP: 100.64.0.10
kubeProxy: kubeProxy:
cpuRequest: 100m cpuRequest: 100m
image: registry.k8s.io/kube-proxy:v1.26.0 image: registry.k8s.io/kube-proxy:v1.26.0
@ -171,7 +171,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -194,7 +194,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -233,7 +233,7 @@ spec:
serviceAccountIssuerDiscovery: serviceAccountIssuerDiscovery:
discoveryStore: memfs://discovery.example.com/minimal.example.com discoveryStore: memfs://discovery.example.com/minimal.example.com
enableAWSOIDCProvider: true enableAWSOIDCProvider: true
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
snapshotController: snapshotController:
enabled: true enabled: true
sshAccess: sshAccess:

View File

@ -14,7 +14,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.12 - id: k8s-1.12
manifest: coredns.addons.k8s.io/k8s-1.12.yaml manifest: coredns.addons.k8s.io/k8s-1.12.yaml
manifestHash: 264a628e688f29334cbc9f3d125da5bd0f6f07ee71ac80fb16fd6b66290ff092 manifestHash: d2bbb7cbee5835c3891fe80fbacf8963508359ef9159f8480325ce9a7174f14a
name: coredns.addons.k8s.io name: coredns.addons.k8s.io
selector: selector:
k8s-addon: coredns.addons.k8s.io k8s-addon: coredns.addons.k8s.io

View File

@ -226,7 +226,7 @@ metadata:
namespace: kube-system namespace: kube-system
resourceVersion: "0" resourceVersion: "0"
spec: spec:
clusterIP: 172.20.0.10 clusterIP: 100.64.0.10
ports: ports:
- name: dns - name: dns
port: 53 port: 53

View File

@ -47,7 +47,7 @@ APIServerConfig:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
ServiceAccountPublicKeys: | ServiceAccountPublicKeys: |
-----BEGIN RSA PUBLIC KEY----- -----BEGIN RSA PUBLIC KEY-----
@ -286,7 +286,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -311,7 +311,7 @@ KubernetesVersion: 1.26.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
channels: channels:
- memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml - memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml

View File

@ -29,7 +29,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -50,7 +50,7 @@ KubernetesVersion: 1.26.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
containerdConfig: containerdConfig:
logLevel: info logLevel: info

View File

@ -128,7 +128,7 @@ ClusterName: minimal.example.com
ConfigBase: memfs://clusters.example.com/minimal.example.com ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a InstanceGroupName: master-us-test-1a
InstanceGroupRole: ControlPlane InstanceGroupRole: ControlPlane
NodeupConfigHash: XPWMy2SQ8swDsHPFiJFqahsEJSJZMic9Be5P49ROAjw= NodeupConfigHash: +AXqoT7WKiDYd7aEDQVLH4k104I/W1JqNBLhRqzYEH4=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal.example.com:3988/ - https://kops-controller.internal.minimal.example.com:3988/
InstanceGroupName: nodes InstanceGroupName: nodes
InstanceGroupRole: Node InstanceGroupRole: Node
NodeupConfigHash: L5BjPzVcKn6ItKtnRRN8FQKGP6JLVg0jao+1d+9sBbc= NodeupConfigHash: 9Kv5lCFI4fbwDje6L26P7XwurDEzYV+ZjurjhKs284U=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -124,7 +124,7 @@ spec:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
kubeControllerManager: kubeControllerManager:
allocateNodeCIDRs: true allocateNodeCIDRs: true
@ -154,7 +154,7 @@ spec:
image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20 image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20
memoryRequest: 5Mi memoryRequest: 5Mi
provider: CoreDNS provider: CoreDNS
serverIP: 172.20.0.10 serverIP: 100.64.0.10
kubeProxy: kubeProxy:
cpuRequest: 100m cpuRequest: 100m
image: registry.k8s.io/kube-proxy:v1.24.0 image: registry.k8s.io/kube-proxy:v1.24.0
@ -172,7 +172,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -195,7 +195,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -234,7 +234,7 @@ spec:
serviceAccountIssuerDiscovery: serviceAccountIssuerDiscovery:
discoveryStore: memfs://discovery.example.com/minimal.example.com discoveryStore: memfs://discovery.example.com/minimal.example.com
enableAWSOIDCProvider: true enableAWSOIDCProvider: true
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
snapshotController: snapshotController:
enabled: true enabled: true
sshAccess: sshAccess:

View File

@ -14,7 +14,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.12 - id: k8s-1.12
manifest: coredns.addons.k8s.io/k8s-1.12.yaml manifest: coredns.addons.k8s.io/k8s-1.12.yaml
manifestHash: 264a628e688f29334cbc9f3d125da5bd0f6f07ee71ac80fb16fd6b66290ff092 manifestHash: d2bbb7cbee5835c3891fe80fbacf8963508359ef9159f8480325ce9a7174f14a
name: coredns.addons.k8s.io name: coredns.addons.k8s.io
selector: selector:
k8s-addon: coredns.addons.k8s.io k8s-addon: coredns.addons.k8s.io

View File

@ -226,7 +226,7 @@ metadata:
namespace: kube-system namespace: kube-system
resourceVersion: "0" resourceVersion: "0"
spec: spec:
clusterIP: 172.20.0.10 clusterIP: 100.64.0.10
ports: ports:
- name: dns - name: dns
port: 53 port: 53

View File

@ -47,7 +47,7 @@ APIServerConfig:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
ServiceAccountPublicKeys: | ServiceAccountPublicKeys: |
-----BEGIN RSA PUBLIC KEY----- -----BEGIN RSA PUBLIC KEY-----
@ -286,7 +286,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -311,7 +311,7 @@ KubernetesVersion: 1.24.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
channels: channels:
- memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml - memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml

View File

@ -29,7 +29,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -50,7 +50,7 @@ KubernetesVersion: 1.24.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
containerdConfig: containerdConfig:
logLevel: info logLevel: info

View File

@ -128,7 +128,7 @@ ClusterName: minimal.example.com
ConfigBase: memfs://clusters.example.com/minimal.example.com ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a InstanceGroupName: master-us-test-1a
InstanceGroupRole: ControlPlane InstanceGroupRole: ControlPlane
NodeupConfigHash: mBbsPgGwaaxPpchci/m95cG5nVoPKqAXQl/wABqcKSc= NodeupConfigHash: aR7fW9UWRlw320nnyGWrFYfvkiP6fji970Xkdr5g93o=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal.example.com:3988/ - https://kops-controller.internal.minimal.example.com:3988/
InstanceGroupName: nodes InstanceGroupName: nodes
InstanceGroupRole: Node InstanceGroupRole: Node
NodeupConfigHash: 8L8jRnJMKNmWDZnBWu1MJN9cVptFH1ULcavClQS/BVI= NodeupConfigHash: oxnAjwadN2x3LXnvGxx4yNXzkm2Fpqa8RJR2GItY850=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -123,7 +123,7 @@ spec:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
kubeControllerManager: kubeControllerManager:
allocateNodeCIDRs: true allocateNodeCIDRs: true
@ -153,7 +153,7 @@ spec:
image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20 image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20
memoryRequest: 5Mi memoryRequest: 5Mi
provider: CoreDNS provider: CoreDNS
serverIP: 172.20.0.10 serverIP: 100.64.0.10
kubeProxy: kubeProxy:
cpuRequest: 100m cpuRequest: 100m
image: registry.k8s.io/kube-proxy:v1.25.0-rc.1 image: registry.k8s.io/kube-proxy:v1.25.0-rc.1
@ -171,7 +171,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -194,7 +194,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -233,7 +233,7 @@ spec:
serviceAccountIssuerDiscovery: serviceAccountIssuerDiscovery:
discoveryStore: memfs://discovery.example.com/minimal.example.com discoveryStore: memfs://discovery.example.com/minimal.example.com
enableAWSOIDCProvider: true enableAWSOIDCProvider: true
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
snapshotController: snapshotController:
enabled: true enabled: true
sshAccess: sshAccess:

View File

@ -14,7 +14,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.12 - id: k8s-1.12
manifest: coredns.addons.k8s.io/k8s-1.12.yaml manifest: coredns.addons.k8s.io/k8s-1.12.yaml
manifestHash: 264a628e688f29334cbc9f3d125da5bd0f6f07ee71ac80fb16fd6b66290ff092 manifestHash: d2bbb7cbee5835c3891fe80fbacf8963508359ef9159f8480325ce9a7174f14a
name: coredns.addons.k8s.io name: coredns.addons.k8s.io
selector: selector:
k8s-addon: coredns.addons.k8s.io k8s-addon: coredns.addons.k8s.io

View File

@ -226,7 +226,7 @@ metadata:
namespace: kube-system namespace: kube-system
resourceVersion: "0" resourceVersion: "0"
spec: spec:
clusterIP: 172.20.0.10 clusterIP: 100.64.0.10
ports: ports:
- name: dns - name: dns
port: 53 port: 53

View File

@ -47,7 +47,7 @@ APIServerConfig:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
ServiceAccountPublicKeys: | ServiceAccountPublicKeys: |
-----BEGIN RSA PUBLIC KEY----- -----BEGIN RSA PUBLIC KEY-----
@ -286,7 +286,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -311,7 +311,7 @@ KubernetesVersion: 1.25.0-rc.1
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
channels: channels:
- memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml - memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml

View File

@ -29,7 +29,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -50,7 +50,7 @@ KubernetesVersion: 1.25.0-rc.1
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
containerdConfig: containerdConfig:
logLevel: info logLevel: info

View File

@ -128,7 +128,7 @@ ClusterName: minimal.example.com
ConfigBase: memfs://clusters.example.com/minimal.example.com ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a InstanceGroupName: master-us-test-1a
InstanceGroupRole: ControlPlane InstanceGroupRole: ControlPlane
NodeupConfigHash: wq0CCrj8vsagiWzFCdzM2C4wEILLw3QZG/S9ebj3Cl0= NodeupConfigHash: 6DqpUUQ0BUCaERVVx1qWTcV9eJxQ1cJXAkgh0T4f/Do=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal.example.com:3988/ - https://kops-controller.internal.minimal.example.com:3988/
InstanceGroupName: nodes InstanceGroupName: nodes
InstanceGroupRole: Node InstanceGroupRole: Node
NodeupConfigHash: 0OeT5XSzPFfU1u5b4oE0g2FBQ34WWczblFS8supuZhY= NodeupConfigHash: IrDEdaCv/md7bGB9UX5CrEgd42bBam9udBR2iUEwlIQ=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -123,7 +123,7 @@ spec:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
kubeControllerManager: kubeControllerManager:
allocateNodeCIDRs: true allocateNodeCIDRs: true
@ -160,7 +160,7 @@ spec:
localIP: 169.254.20.10 localIP: 169.254.20.10
memoryRequest: 5Mi memoryRequest: 5Mi
provider: CoreDNS provider: CoreDNS
serverIP: 172.20.0.10 serverIP: 100.64.0.10
kubeProxy: kubeProxy:
cpuRequest: 100m cpuRequest: 100m
image: registry.k8s.io/kube-proxy:v1.26.0-alpha.0 image: registry.k8s.io/kube-proxy:v1.26.0-alpha.0
@ -240,7 +240,7 @@ spec:
serviceAccountIssuerDiscovery: serviceAccountIssuerDiscovery:
discoveryStore: memfs://discovery.example.com/minimal.example.com discoveryStore: memfs://discovery.example.com/minimal.example.com
enableAWSOIDCProvider: true enableAWSOIDCProvider: true
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
snapshotController: snapshotController:
enabled: true enabled: true
sshAccess: sshAccess:

View File

@ -14,7 +14,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.12 - id: k8s-1.12
manifest: coredns.addons.k8s.io/k8s-1.12.yaml manifest: coredns.addons.k8s.io/k8s-1.12.yaml
manifestHash: 264a628e688f29334cbc9f3d125da5bd0f6f07ee71ac80fb16fd6b66290ff092 manifestHash: d2bbb7cbee5835c3891fe80fbacf8963508359ef9159f8480325ce9a7174f14a
name: coredns.addons.k8s.io name: coredns.addons.k8s.io
selector: selector:
k8s-addon: coredns.addons.k8s.io k8s-addon: coredns.addons.k8s.io

View File

@ -226,7 +226,7 @@ metadata:
namespace: kube-system namespace: kube-system
resourceVersion: "0" resourceVersion: "0"
spec: spec:
clusterIP: 172.20.0.10 clusterIP: 100.64.0.10
ports: ports:
- name: dns - name: dns
port: 53 port: 53

View File

@ -47,7 +47,7 @@ APIServerConfig:
securePort: 443 securePort: 443
serviceAccountIssuer: https://discovery.example.com/minimal.example.com serviceAccountIssuer: https://discovery.example.com/minimal.example.com
serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://discovery.example.com/minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
ServiceAccountPublicKeys: | ServiceAccountPublicKeys: |
-----BEGIN RSA PUBLIC KEY----- -----BEGIN RSA PUBLIC KEY-----
@ -311,7 +311,7 @@ KubernetesVersion: 1.26.0-alpha.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
channels: channels:
- memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml - memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml

View File

@ -50,7 +50,7 @@ KubernetesVersion: 1.26.0-alpha.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
containerdConfig: containerdConfig:
logLevel: info logLevel: info

View File

@ -128,7 +128,7 @@ ClusterName: minimal.example.com
ConfigBase: memfs://clusters.example.com/minimal.example.com ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a InstanceGroupName: master-us-test-1a
InstanceGroupRole: ControlPlane InstanceGroupRole: ControlPlane
NodeupConfigHash: sLzi++zH+DdlGaBG+eXxqYJG3df0raToM2m8BvS66no= NodeupConfigHash: wdZGrlGt44zutqlcirdfJWHWQH+3auZZeFvWU8Ee6NA=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal.example.com:3988/ - https://kops-controller.internal.minimal.example.com:3988/
InstanceGroupName: nodes InstanceGroupName: nodes
InstanceGroupRole: Node InstanceGroupRole: Node
NodeupConfigHash: 6zBnYt9ifwaf9tP3HRh2eAUUIHkTj82HfCkWcj7QOmo= NodeupConfigHash: Q/5lnobS7oex8BMOQc8DYbYmvZeeSSt7NgnB7WgKBYQ=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -122,7 +122,7 @@ spec:
securePort: 443 securePort: 443
serviceAccountIssuer: https://api.internal.minimal.example.com serviceAccountIssuer: https://api.internal.minimal.example.com
serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
kubeControllerManager: kubeControllerManager:
allocateNodeCIDRs: true allocateNodeCIDRs: true
@ -152,7 +152,7 @@ spec:
image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20 image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20
memoryRequest: 5Mi memoryRequest: 5Mi
provider: CoreDNS provider: CoreDNS
serverIP: 172.20.0.10 serverIP: 100.64.0.10
kubeProxy: kubeProxy:
cpuRequest: 100m cpuRequest: 100m
image: registry.k8s.io/kube-proxy:v1.26.0 image: registry.k8s.io/kube-proxy:v1.26.0
@ -170,7 +170,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -193,7 +193,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -229,7 +229,7 @@ spec:
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
podCIDR: 172.20.128.0/17 podCIDR: 172.20.128.0/17
secretStore: memfs://clusters.example.com/minimal.example.com/secrets secretStore: memfs://clusters.example.com/minimal.example.com/secrets
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
snapshotController: snapshotController:
enabled: true enabled: true
sshAccess: sshAccess:

View File

@ -14,7 +14,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.12 - id: k8s-1.12
manifest: coredns.addons.k8s.io/k8s-1.12.yaml manifest: coredns.addons.k8s.io/k8s-1.12.yaml
manifestHash: 264a628e688f29334cbc9f3d125da5bd0f6f07ee71ac80fb16fd6b66290ff092 manifestHash: d2bbb7cbee5835c3891fe80fbacf8963508359ef9159f8480325ce9a7174f14a
name: coredns.addons.k8s.io name: coredns.addons.k8s.io
selector: selector:
k8s-addon: coredns.addons.k8s.io k8s-addon: coredns.addons.k8s.io

View File

@ -226,7 +226,7 @@ metadata:
namespace: kube-system namespace: kube-system
resourceVersion: "0" resourceVersion: "0"
spec: spec:
clusterIP: 172.20.0.10 clusterIP: 100.64.0.10
ports: ports:
- name: dns - name: dns
port: 53 port: 53

View File

@ -47,7 +47,7 @@ APIServerConfig:
securePort: 443 securePort: 443
serviceAccountIssuer: https://api.internal.minimal.example.com serviceAccountIssuer: https://api.internal.minimal.example.com
serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
ServiceAccountPublicKeys: | ServiceAccountPublicKeys: |
-----BEGIN RSA PUBLIC KEY----- -----BEGIN RSA PUBLIC KEY-----
@ -286,7 +286,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -311,7 +311,7 @@ KubernetesVersion: 1.26.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
channels: channels:
- memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml - memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml

View File

@ -29,7 +29,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -50,7 +50,7 @@ KubernetesVersion: 1.26.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
containerdConfig: containerdConfig:
logLevel: info logLevel: info

View File

@ -128,7 +128,7 @@ ClusterName: minimal.example.com
ConfigBase: memfs://clusters.example.com/minimal.example.com ConfigBase: memfs://clusters.example.com/minimal.example.com
InstanceGroupName: master-us-test-1a InstanceGroupName: master-us-test-1a
InstanceGroupRole: ControlPlane InstanceGroupRole: ControlPlane
NodeupConfigHash: sLzi++zH+DdlGaBG+eXxqYJG3df0raToM2m8BvS66no= NodeupConfigHash: wdZGrlGt44zutqlcirdfJWHWQH+3auZZeFvWU8Ee6NA=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -151,7 +151,7 @@ ConfigServer:
- https://kops-controller.internal.minimal.example.com:3988/ - https://kops-controller.internal.minimal.example.com:3988/
InstanceGroupName: nodes InstanceGroupName: nodes
InstanceGroupRole: Node InstanceGroupRole: Node
NodeupConfigHash: 6zBnYt9ifwaf9tP3HRh2eAUUIHkTj82HfCkWcj7QOmo= NodeupConfigHash: Q/5lnobS7oex8BMOQc8DYbYmvZeeSSt7NgnB7WgKBYQ=
__EOF_KUBE_ENV __EOF_KUBE_ENV

View File

@ -123,7 +123,7 @@ spec:
securePort: 443 securePort: 443
serviceAccountIssuer: https://api.internal.minimal.example.com serviceAccountIssuer: https://api.internal.minimal.example.com
serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
kubeControllerManager: kubeControllerManager:
allocateNodeCIDRs: true allocateNodeCIDRs: true
@ -153,7 +153,7 @@ spec:
image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20 image: registry.k8s.io/dns/k8s-dns-node-cache:1.22.20
memoryRequest: 5Mi memoryRequest: 5Mi
provider: CoreDNS provider: CoreDNS
serverIP: 172.20.0.10 serverIP: 100.64.0.10
kubeProxy: kubeProxy:
cpuRequest: 100m cpuRequest: 100m
image: registry.k8s.io/kube-proxy:v1.26.0 image: registry.k8s.io/kube-proxy:v1.26.0
@ -171,7 +171,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -194,7 +194,7 @@ spec:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -230,7 +230,7 @@ spec:
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
podCIDR: 172.20.128.0/17 podCIDR: 172.20.128.0/17
secretStore: memfs://clusters.example.com/minimal.example.com/secrets secretStore: memfs://clusters.example.com/minimal.example.com/secrets
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
snapshotController: snapshotController:
enabled: true enabled: true
sshAccess: sshAccess:

View File

@ -14,7 +14,7 @@ spec:
version: 9.99.0 version: 9.99.0
- id: k8s-1.12 - id: k8s-1.12
manifest: coredns.addons.k8s.io/k8s-1.12.yaml manifest: coredns.addons.k8s.io/k8s-1.12.yaml
manifestHash: 264a628e688f29334cbc9f3d125da5bd0f6f07ee71ac80fb16fd6b66290ff092 manifestHash: d2bbb7cbee5835c3891fe80fbacf8963508359ef9159f8480325ce9a7174f14a
name: coredns.addons.k8s.io name: coredns.addons.k8s.io
selector: selector:
k8s-addon: coredns.addons.k8s.io k8s-addon: coredns.addons.k8s.io

View File

@ -226,7 +226,7 @@ metadata:
namespace: kube-system namespace: kube-system
resourceVersion: "0" resourceVersion: "0"
spec: spec:
clusterIP: 172.20.0.10 clusterIP: 100.64.0.10
ports: ports:
- name: dns - name: dns
port: 53 port: 53

View File

@ -47,7 +47,7 @@ APIServerConfig:
securePort: 443 securePort: 443
serviceAccountIssuer: https://api.internal.minimal.example.com serviceAccountIssuer: https://api.internal.minimal.example.com
serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks serviceAccountJWKSURI: https://api.internal.minimal.example.com/openid/v1/jwks
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
storageBackend: etcd3 storageBackend: etcd3
ServiceAccountPublicKeys: | ServiceAccountPublicKeys: |
-----BEGIN RSA PUBLIC KEY----- -----BEGIN RSA PUBLIC KEY-----
@ -286,7 +286,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -311,7 +311,7 @@ KubernetesVersion: 1.26.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
channels: channels:
- memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml - memfs://clusters.example.com/minimal.example.com/addons/bootstrap-channel.yaml

View File

@ -29,7 +29,7 @@ KubeletConfig:
cgroupDriver: systemd cgroupDriver: systemd
cgroupRoot: / cgroupRoot: /
cloudProvider: external cloudProvider: external
clusterDNS: 172.20.0.10 clusterDNS: 100.64.0.10
clusterDomain: cluster.local clusterDomain: cluster.local
enableDebuggingHandlers: true enableDebuggingHandlers: true
evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5% evictionHard: memory.available<100Mi,nodefs.available<10%,nodefs.inodesFree<5%,imagefs.available<10%,imagefs.inodesFree<5%
@ -50,7 +50,7 @@ KubernetesVersion: 1.26.0
Networking: Networking:
amazonVPC: {} amazonVPC: {}
nonMasqueradeCIDR: 172.20.0.0/16 nonMasqueradeCIDR: 172.20.0.0/16
serviceClusterIPRange: 172.20.0.0/19 serviceClusterIPRange: 100.64.0.0/13
UpdatePolicy: automatic UpdatePolicy: automatic
containerdConfig: containerdConfig:
logLevel: info logLevel: info

View File

@ -394,14 +394,7 @@ func (c *populateClusterSpec) assignSubnets(cluster *kopsapi.Cluster) error {
if nmBits > 32 { if nmBits > 32 {
cluster.Spec.Networking.ServiceClusterIPRange = "fd00:5e4f:ce::/108" cluster.Spec.Networking.ServiceClusterIPRange = "fd00:5e4f:ce::/108"
} else { } else {
// Allocate from the '0' subnet; but only carve off 1/4 of that (i.e. add 1 + 2 bits to the netmask) cluster.Spec.Networking.ServiceClusterIPRange = "100.64.0.0/13"
serviceOnes := nmOnes + 3
// Max size of network is 20 bits
if nmBits-serviceOnes > 20 {
serviceOnes = nmBits - 20
}
cidr := net.IPNet{IP: nonMasqueradeCIDR.IP.Mask(nonMasqueradeCIDR.Mask), Mask: net.CIDRMask(serviceOnes, nmBits)}
cluster.Spec.Networking.ServiceClusterIPRange = cidr.String()
} }
klog.V(2).Infof("Defaulted ServiceClusterIPRange to %v", cluster.Spec.Networking.ServiceClusterIPRange) klog.V(2).Infof("Defaulted ServiceClusterIPRange to %v", cluster.Spec.Networking.ServiceClusterIPRange)
} }

View File

@ -71,12 +71,12 @@ func TestPopulateCluster_Subnets(t *testing.T) {
{ {
NonMasqueradeCIDR: "10.0.0.0/9", NonMasqueradeCIDR: "10.0.0.0/9",
ExpectedClusterCIDR: "10.64.0.0/10", ExpectedClusterCIDR: "10.64.0.0/10",
ExpectedServiceClusterIPRange: "10.0.0.0/12", ExpectedServiceClusterIPRange: "100.64.0.0/13",
}, },
{ {
NonMasqueradeCIDR: "10.0.0.0/8", NonMasqueradeCIDR: "10.0.0.0/8",
ExpectedClusterCIDR: "10.128.0.0/9", ExpectedClusterCIDR: "10.128.0.0/9",
ExpectedServiceClusterIPRange: "10.0.0.0/12", ExpectedServiceClusterIPRange: "100.64.0.0/13",
}, },
{ {
NonMasqueradeCIDR: "::/0", NonMasqueradeCIDR: "::/0",