mirror of https://github.com/kubernetes/kops.git
215 lines
6.1 KiB
YAML
215 lines
6.1 KiB
YAML
contents: |
|
|
apiVersion: v1
|
|
kind: Pod
|
|
metadata:
|
|
annotations:
|
|
dns.alpha.kubernetes.io/external: api.minimal.example.com
|
|
dns.alpha.kubernetes.io/internal: api.internal.minimal.example.com
|
|
scheduler.alpha.kubernetes.io/critical-pod: ""
|
|
creationTimestamp: null
|
|
labels:
|
|
k8s-app: kube-apiserver
|
|
name: kube-apiserver
|
|
namespace: kube-system
|
|
spec:
|
|
containers:
|
|
- args:
|
|
- --allow-privileged=true
|
|
- --anonymous-auth=false
|
|
- --apiserver-count=1
|
|
- --authorization-mode=AlwaysAllow
|
|
- --bind-address=0.0.0.0
|
|
- --client-ca-file=/srv/kubernetes/ca.crt
|
|
- --cloud-config=/etc/kubernetes/cloud.config
|
|
- --cloud-provider=aws
|
|
- --enable-admission-plugins=NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,NodeRestriction,ResourceQuota
|
|
- --etcd-cafile=/etc/kubernetes/pki/kube-apiserver/etcd-ca.crt
|
|
- --etcd-certfile=/etc/kubernetes/pki/kube-apiserver/etcd-client.crt
|
|
- --etcd-keyfile=/etc/kubernetes/pki/kube-apiserver/etcd-client.key
|
|
- --etcd-servers-overrides=/events#https://127.0.0.1:4002
|
|
- --etcd-servers=https://127.0.0.1:4001
|
|
- --insecure-port=0
|
|
- --kubelet-client-certificate=/srv/kubernetes/kubelet-api.crt
|
|
- --kubelet-client-key=/srv/kubernetes/kubelet-api.key
|
|
- --kubelet-preferred-address-types=InternalIP,Hostname,ExternalIP
|
|
- --proxy-client-cert-file=/srv/kubernetes/apiserver-aggregator.crt
|
|
- --proxy-client-key-file=/srv/kubernetes/apiserver-aggregator.key
|
|
- --requestheader-allowed-names=aggregator
|
|
- --requestheader-client-ca-file=/srv/kubernetes/apiserver-aggregator-ca.crt
|
|
- --requestheader-extra-headers-prefix=X-Remote-Extra-
|
|
- --requestheader-group-headers=X-Remote-Group
|
|
- --requestheader-username-headers=X-Remote-User
|
|
- --secure-port=443
|
|
- --service-account-key-file=/srv/kubernetes/kube-apiserver/service-account.pub
|
|
- --service-cluster-ip-range=100.64.0.0/13
|
|
- --storage-backend=etcd3
|
|
- --tls-cert-file=/srv/kubernetes/server.crt
|
|
- --tls-private-key-file=/srv/kubernetes/server.key
|
|
- --v=2
|
|
- --logtostderr=false
|
|
- --alsologtostderr
|
|
- --log-file=/var/log/kube-apiserver.log
|
|
command:
|
|
- /usr/local/bin/kube-apiserver
|
|
image: k8s.gcr.io/kube-apiserver:v1.18.0
|
|
livenessProbe:
|
|
httpGet:
|
|
host: 127.0.0.1
|
|
path: /healthz
|
|
port: 443
|
|
scheme: HTTPS
|
|
initialDelaySeconds: 45
|
|
timeoutSeconds: 15
|
|
name: kube-apiserver
|
|
ports:
|
|
- containerPort: 443
|
|
hostPort: 443
|
|
name: https
|
|
resources:
|
|
requests:
|
|
cpu: 150m
|
|
volumeMounts:
|
|
- mountPath: /var/log/kube-apiserver.log
|
|
name: logfile
|
|
- mountPath: /etc/ssl
|
|
name: etcssl
|
|
readOnly: true
|
|
- mountPath: /etc/pki/tls
|
|
name: etcpkitls
|
|
readOnly: true
|
|
- mountPath: /etc/pki/ca-trust
|
|
name: etcpkica-trust
|
|
readOnly: true
|
|
- mountPath: /usr/share/ssl
|
|
name: usrsharessl
|
|
readOnly: true
|
|
- mountPath: /usr/ssl
|
|
name: usrssl
|
|
readOnly: true
|
|
- mountPath: /usr/lib/ssl
|
|
name: usrlibssl
|
|
readOnly: true
|
|
- mountPath: /usr/local/openssl
|
|
name: usrlocalopenssl
|
|
readOnly: true
|
|
- mountPath: /var/ssl
|
|
name: varssl
|
|
readOnly: true
|
|
- mountPath: /etc/openssl
|
|
name: etcopenssl
|
|
readOnly: true
|
|
- mountPath: /etc/kubernetes/pki/kube-apiserver
|
|
name: pki
|
|
- mountPath: /etc/kubernetes/cloud.config
|
|
name: cloudconfig
|
|
readOnly: true
|
|
- mountPath: /srv/kubernetes
|
|
name: srvkube
|
|
readOnly: true
|
|
- mountPath: /srv/sshproxy
|
|
name: srvsshproxy
|
|
readOnly: true
|
|
hostNetwork: true
|
|
priorityClassName: system-cluster-critical
|
|
tolerations:
|
|
- key: CriticalAddonsOnly
|
|
operator: Exists
|
|
volumes:
|
|
- hostPath:
|
|
path: /var/log/kube-apiserver.log
|
|
name: logfile
|
|
- hostPath:
|
|
path: /etc/ssl
|
|
name: etcssl
|
|
- hostPath:
|
|
path: /etc/pki/tls
|
|
name: etcpkitls
|
|
- hostPath:
|
|
path: /etc/pki/ca-trust
|
|
name: etcpkica-trust
|
|
- hostPath:
|
|
path: /usr/share/ssl
|
|
name: usrsharessl
|
|
- hostPath:
|
|
path: /usr/ssl
|
|
name: usrssl
|
|
- hostPath:
|
|
path: /usr/lib/ssl
|
|
name: usrlibssl
|
|
- hostPath:
|
|
path: /usr/local/openssl
|
|
name: usrlocalopenssl
|
|
- hostPath:
|
|
path: /var/ssl
|
|
name: varssl
|
|
- hostPath:
|
|
path: /etc/openssl
|
|
name: etcopenssl
|
|
- hostPath:
|
|
path: /etc/kubernetes/pki/kube-apiserver
|
|
type: DirectoryOrCreate
|
|
name: pki
|
|
- hostPath:
|
|
path: /etc/kubernetes/cloud.config
|
|
name: cloudconfig
|
|
- hostPath:
|
|
path: /srv/kubernetes
|
|
name: srvkube
|
|
- hostPath:
|
|
path: /srv/sshproxy
|
|
name: srvsshproxy
|
|
status: {}
|
|
path: /etc/kubernetes/manifests/kube-apiserver.manifest
|
|
type: file
|
|
---
|
|
mode: "0755"
|
|
path: /srv/kubernetes
|
|
type: directory
|
|
---
|
|
contents: |
|
|
-----BEGIN RSA PUBLIC KEY-----
|
|
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBANiW3hfHTcKnxCig+uWhpVbOfH1pANKm
|
|
XVSysPKgE80QSU4tZ6m49pAEeIMsvwvDMaLsb2v6JvXe0qvCmueU+/sCAwEAAQ==
|
|
-----END RSA PUBLIC KEY-----
|
|
-----BEGIN RSA PUBLIC KEY-----
|
|
MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAKOE64nZbH+GM91AIrqf7HEk4hvzqsZF
|
|
Ftxc+8xir1XC3mI/RhCCrs6AdVRZNZ26A6uHArhi33c2kHQkCjyLA7sCAwEAAQ==
|
|
-----END RSA PUBLIC KEY-----
|
|
mode: "0600"
|
|
path: /srv/kubernetes/kube-apiserver/service-account.pub
|
|
type: file
|
|
---
|
|
contents:
|
|
task:
|
|
Name: kubelet-api
|
|
signer: ca
|
|
subject:
|
|
CommonName: kubelet-api
|
|
type: client
|
|
mode: "0644"
|
|
path: /srv/kubernetes/kubelet-api.crt
|
|
type: file
|
|
---
|
|
contents:
|
|
task:
|
|
Name: kubelet-api
|
|
signer: ca
|
|
subject:
|
|
CommonName: kubelet-api
|
|
type: client
|
|
mode: "0600"
|
|
path: /srv/kubernetes/kubelet-api.key
|
|
type: file
|
|
---
|
|
contents: ""
|
|
ifNotExists: true
|
|
mode: "0400"
|
|
path: /var/log/kube-apiserver.log
|
|
type: file
|
|
---
|
|
Name: kubelet-api
|
|
signer: ca
|
|
subject:
|
|
CommonName: kubelet-api
|
|
type: client
|