diff --git a/Makefile b/Makefile index 3e4f65a76c..7ef6b990aa 100644 --- a/Makefile +++ b/Makefile @@ -104,7 +104,7 @@ INTEGRATION_TEST := integration-test INTEGRATION_TEST_DEFAULT_TARGET := $(INTEGRATION_TEST)-$(OPERATING_SYSTEM) INTEGRATION_TEST_PROVISION_DEFAULT_TARGET := integration-test-provision-$(OPERATING_SYSTEM) # renovate: datasource=github-releases depName=kubernetes/kubernetes -KUBECTL_VERSION ?= v1.32.0-alpha.2 +KUBECTL_VERSION ?= v1.32.0-alpha.3 # renovate: datasource=github-releases depName=kastenhq/kubestr KUBESTR_VERSION ?= v0.4.46 # renovate: datasource=github-releases depName=helm/helm diff --git a/go.mod b/go.mod index b03c710d0f..3a33cd97de 100644 --- a/go.mod +++ b/go.mod @@ -37,16 +37,16 @@ replace ( // Kubernetes dependencies sharing the same version. require ( - k8s.io/api v0.32.0-alpha.2 - k8s.io/apimachinery v0.32.0-alpha.2 - k8s.io/apiserver v0.32.0-alpha.2 - k8s.io/client-go v0.32.0-alpha.2 - k8s.io/component-base v0.32.0-alpha.2 - k8s.io/cri-api v0.32.0-alpha.2 - k8s.io/kube-scheduler v0.32.0-alpha.2 - k8s.io/kubectl v0.32.0-alpha.2 - k8s.io/kubelet v0.32.0-alpha.2 - k8s.io/pod-security-admission v0.32.0-alpha.2 + k8s.io/api v0.32.0-alpha.3 + k8s.io/apimachinery v0.32.0-alpha.3 + k8s.io/apiserver v0.32.0-alpha.3 + k8s.io/client-go v0.32.0-alpha.3 + k8s.io/component-base v0.32.0-alpha.3 + k8s.io/cri-api v0.32.0-alpha.3 + k8s.io/kube-scheduler v0.32.0-alpha.3 + k8s.io/kubectl v0.32.0-alpha.3 + k8s.io/kubelet v0.32.0-alpha.3 + k8s.io/pod-security-admission v0.32.0-alpha.3 ) require ( @@ -150,7 +150,7 @@ require ( github.com/siderolabs/go-debug v0.4.0 github.com/siderolabs/go-kmsg v0.1.4 github.com/siderolabs/go-kubeconfig v0.1.0 - github.com/siderolabs/go-kubernetes v0.2.13 + github.com/siderolabs/go-kubernetes v0.2.14 github.com/siderolabs/go-loadbalancer v0.3.4 github.com/siderolabs/go-pcidb v0.3.0 github.com/siderolabs/go-pointer v1.0.0 @@ -364,7 +364,7 @@ require ( gopkg.in/evanphx/json-patch.v4 v4.12.0 // indirect gopkg.in/inf.v0 v0.9.1 // indirect gopkg.in/yaml.v2 v2.4.0 // indirect - k8s.io/cli-runtime v0.32.0-alpha.2 // indirect + k8s.io/cli-runtime v0.32.0-alpha.3 // indirect k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2 // indirect k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 // indirect kernel.org/pub/linux/libs/security/libcap/psx v1.2.70 // indirect diff --git a/go.sum b/go.sum index 598dd5e1ba..9817b6e2c0 100644 --- a/go.sum +++ b/go.sum @@ -650,8 +650,8 @@ github.com/siderolabs/go-kmsg v0.1.4 h1:RLAa90O9bWuhA3pXPAYAdrI+kzcqTshZASRA5yso github.com/siderolabs/go-kmsg v0.1.4/go.mod h1:BLkt2N2DHT0wsFMz32lMw6vNEZL90c8ZnBjpIUoBb/M= github.com/siderolabs/go-kubeconfig v0.1.0 h1:t/2oMWkLSdWHXglKPMz8ySXnx6ZjHckeGY79NaDcBTo= github.com/siderolabs/go-kubeconfig v0.1.0/go.mod h1:eM3mO02Td6wYDvdi9zTbMrj1Q4WqEFN8XQ6pNjCUWkI= -github.com/siderolabs/go-kubernetes v0.2.13 h1:rgrywXOaeSBaGUKNXnk0jluMp4KxAlCRHcTfHObuzEI= -github.com/siderolabs/go-kubernetes v0.2.13/go.mod h1:AdKFBs9LowXKmHLMnbe8YFJQjfJKj6gW/sn+n1GwJyw= +github.com/siderolabs/go-kubernetes v0.2.14 h1:E0VK/vw6t9MS8Jcdd1R9tNE00EQBfJAWpl2/ex9FeSM= +github.com/siderolabs/go-kubernetes v0.2.14/go.mod h1:ElwMMmkNLrSRdAMqOouN9RZbO4G3CM5fJ0F5CBRsGRE= github.com/siderolabs/go-loadbalancer v0.3.4 h1:clxUefcY20djLdHMrh2j3rjVYDwDApXh1us/6cgrgoo= github.com/siderolabs/go-loadbalancer v0.3.4/go.mod h1:v0ziDvpArNRSF5LO0PIPQIPIYYHxX/fk+Vlg0wuSIiM= github.com/siderolabs/go-pcidb v0.3.0 h1:jR4w1YLNY8Cv1o5jnoQ2Q+pbxcosO2FVFrAAp1RURnw= @@ -1106,32 +1106,32 @@ gvisor.dev/gvisor v0.0.0-20240331093104-8c9cbf0d9090/go.mod h1:NQHVAzMwvZ+Qe3ElS honnef.co/go/tools v0.0.0-20190102054323-c2f93a96b099/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190418001031-e561f6794a2a/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= honnef.co/go/tools v0.0.0-20190523083050-ea95bdfd59fc/go.mod h1:rf3lG4BRIbNafJWhAfAdb/ePZxsR/4RtNHQocxwk9r4= -k8s.io/api v0.32.0-alpha.2 h1:kGzoa28DrhUid+yqSuTTLFq+MwIdu8Qe19J+6O+zKCw= -k8s.io/api v0.32.0-alpha.2/go.mod h1:/3IPpkid+XQTMsxP04j5A4w+NnE8Ul7b0bum8frakos= -k8s.io/apimachinery v0.32.0-alpha.2 h1:ys10y0kam0MmNCBjk9cp60CclID54ojo1VSO6ejhoVg= -k8s.io/apimachinery v0.32.0-alpha.2/go.mod h1:y/FzDt/GaPgPceo5rJcCtD4qW5l8SwtbzESSMGEY6P8= -k8s.io/apiserver v0.32.0-alpha.2 h1:AGcXfJUFq+GLryG15pAa2PH8egMBbdh8rgBjTlTD1Ls= -k8s.io/apiserver v0.32.0-alpha.2/go.mod h1:WUqEgUO0gc7U/uMaaypYOCj14Nzdb641WCK+ysEw/0M= -k8s.io/cli-runtime v0.32.0-alpha.2 h1:LhuNx0kPbkF/mYMfktnRMAOPMr3iIZwMbJcWDKLIE80= -k8s.io/cli-runtime v0.32.0-alpha.2/go.mod h1:DFx4wBap+iXd1lGF6et5SGwR5l8KOag5Doc1ULfC+Sw= -k8s.io/client-go v0.32.0-alpha.2 h1:wY8yU6Z+VmvrU8h0ugLNPTBiKk7Q1kiK9/2nsiwOb0w= -k8s.io/client-go v0.32.0-alpha.2/go.mod h1:MNu5a0Q6iCdZHZWN/raGXOf+z4YIoC1Aj6IYdvcdKSI= -k8s.io/component-base v0.32.0-alpha.2 h1:Sq8cWVmvPwrNGDYhIkhjc65sGwYFkhhIQKdVjZR4V44= -k8s.io/component-base v0.32.0-alpha.2/go.mod h1:YPyM2sUsjiC2hmV/3zR5lOLD5xvZ8fW2HOXzWQzuUXg= -k8s.io/cri-api v0.32.0-alpha.2 h1:v0oCOuahvb0xu7v7RPlspMFxNoxtKJmb+ZZ+jBYfepw= -k8s.io/cri-api v0.32.0-alpha.2/go.mod h1:ca9lKDUa9PmUGVDSSetDQqgf0dyk/NW8u+MpJo7JaYA= +k8s.io/api v0.32.0-alpha.3 h1:SCix13lbG8n/cmbYeYp1vkmlS4ccgGwaq83Y7G603GY= +k8s.io/api v0.32.0-alpha.3/go.mod h1:e5tjATGvBey/pzjehc7Od+VJCiDJp0iajdkFhxvJD4I= +k8s.io/apimachinery v0.32.0-alpha.3 h1:AmhRgOkgXFBLu2prIySmIS4KLGFiZKzeMMxnPPtEhnA= +k8s.io/apimachinery v0.32.0-alpha.3/go.mod h1:y/FzDt/GaPgPceo5rJcCtD4qW5l8SwtbzESSMGEY6P8= +k8s.io/apiserver v0.32.0-alpha.3 h1:FJ3NbaL4hsGS19WMncuRr/JcLSVf7u4V61o7DVJ5Aj4= +k8s.io/apiserver v0.32.0-alpha.3/go.mod h1:8jSFI9UaPqfAeCxjNWjGwCyTp/Iiir8gCXOXTuchMiA= +k8s.io/cli-runtime v0.32.0-alpha.3 h1:DV5Wt+7P7UxIL2Fr85J6TMHBHlLqBK1/QxHM+kdMeus= +k8s.io/cli-runtime v0.32.0-alpha.3/go.mod h1:q4TgXkgBvalJ613C9NfS2VUrUA9QowEdj6rL4qjF8xk= +k8s.io/client-go v0.32.0-alpha.3 h1:+n6BNhTFmoUe1QrIOPm2q5OUI8T5yqQuHRdXdz8x2GQ= +k8s.io/client-go v0.32.0-alpha.3/go.mod h1:dJ1NeBlMJchPGs/eH9m0R7JePiMGFpRyNqo46j1vplE= +k8s.io/component-base v0.32.0-alpha.3 h1:8V9eDGTJhSNZO3QJIVNW8lc6CEls3UeQ5Wlup6E42Oc= +k8s.io/component-base v0.32.0-alpha.3/go.mod h1:Vi4/eGNdpRRd3BRYvFK3cTOkwnYw8+Zn7qrH/9stC3Q= +k8s.io/cri-api v0.32.0-alpha.3 h1:OUAlaVOWLeEavxfSz4csuTUoh18NLL428MfErm3X8+w= +k8s.io/cri-api v0.32.0-alpha.3/go.mod h1:ca9lKDUa9PmUGVDSSetDQqgf0dyk/NW8u+MpJo7JaYA= k8s.io/klog/v2 v2.130.1 h1:n9Xl7H1Xvksem4KFG4PYbdQCQxqc/tTUyrgXaOhHSzk= k8s.io/klog/v2 v2.130.1/go.mod h1:3Jpz1GvMt720eyJH1ckRHK1EDfpxISzJ7I9OYgaDtPE= k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2 h1:GKE9U8BH16uynoxQii0auTjmmmuZ3O0LFMN6S0lPPhI= k8s.io/kube-openapi v0.0.0-20240827152857-f7e401e7b4c2/go.mod h1:coRQXBK9NxO98XUv3ZD6AK3xzHCxV6+b7lrquKwaKzA= -k8s.io/kube-scheduler v0.32.0-alpha.2 h1:3EWYqipPl/8Jgvan+ZOw4e+t8kRxm9HbpZn7sUjF+KQ= -k8s.io/kube-scheduler v0.32.0-alpha.2/go.mod h1:cTI39hJm/j57voACiVy6hvJUYWSHmU8IKHj0KXVyvnU= -k8s.io/kubectl v0.32.0-alpha.2 h1:ORj13guFN6eaGb5S0MR+XisA4feAfFkJWdD7o9bB+XA= -k8s.io/kubectl v0.32.0-alpha.2/go.mod h1:97Da6nCRG5+NpmeI65kQXln/MdeZPNN71EQfRDtlIWY= -k8s.io/kubelet v0.32.0-alpha.2 h1:CYQgjxjEoI2uuRV8thQxbhRg63YZWvmtXzLbikRXV3s= -k8s.io/kubelet v0.32.0-alpha.2/go.mod h1:MG+qkvs/5r8LJo9JIjK0VIprGl9e5Se3w/Hcxz3F6co= -k8s.io/pod-security-admission v0.32.0-alpha.2 h1:871khuHnrAdNlJYkyWgrBmZxSzCp9v0gB/elbWb/9jM= -k8s.io/pod-security-admission v0.32.0-alpha.2/go.mod h1:diZsecfzpmnmRux3vB7MdEIrlNeTAuQ3xz5395EHfrU= +k8s.io/kube-scheduler v0.32.0-alpha.3 h1:ud6Tz5u6mxvhq4C5yqKWU57R41UMFNE+Dd63ejsNf90= +k8s.io/kube-scheduler v0.32.0-alpha.3/go.mod h1:uRk+Th/ND4AJz97y7m/vVYuCMES9l/tZv1ToMd52Q9k= +k8s.io/kubectl v0.32.0-alpha.3 h1:4N/7FkNwkw2VOQRSLOm7PjpJqEMPbuzpAlhUyisxbA4= +k8s.io/kubectl v0.32.0-alpha.3/go.mod h1:alzmRd9FafXyfcdV3MWtLjemXrNgBp3O5kBX/Z1Xa/Y= +k8s.io/kubelet v0.32.0-alpha.3 h1:Ipl/u8+frS6vOcxKQKP/mRY7jYFPCat2Z/w/zzxlUwM= +k8s.io/kubelet v0.32.0-alpha.3/go.mod h1:CNko3NUxlXQFjLdvdGLHl4Fs5hxf/inb09lOCXcwDlU= +k8s.io/pod-security-admission v0.32.0-alpha.3 h1:5t6eLvBEEiLsB7XIMAGFzBQhPnA7zebO2/KWPeVB2uo= +k8s.io/pod-security-admission v0.32.0-alpha.3/go.mod h1:HOqwkmey6Z/Rc1FV5wXLUUSnZ2thBvw0MyW/gLd5Xuc= k8s.io/utils v0.0.0-20240711033017-18e509b52bc8 h1:pUdcCO1Lk/tbT5ztQWOBi5HBgbBP1J8+AsQnQCKsi8A= k8s.io/utils v0.0.0-20240711033017-18e509b52bc8/go.mod h1:OLgZIPagt7ERELqWJFomSt595RzquPNLL48iOWgYOg0= kernel.org/pub/linux/libs/security/libcap/cap v1.2.70 h1:QnLPkuDWWbD5C+3DUA2IUXai5TK6w2zff+MAGccqdsw= diff --git a/hack/release.toml b/hack/release.toml index 31b4ed4d03..6aa2eebec4 100644 --- a/hack/release.toml +++ b/hack/release.toml @@ -21,7 +21,7 @@ preface = """ Linux: 6.6.58 containerd: 2.0.0-rc.6 Flannel: 0.26.0 -Kubernetes: 1.32.0-alpha.2 +Kubernetes: 1.32.0-alpha.3 runc: 1.2.0 Talos is built with Go 1.23.2. diff --git a/hack/test/e2e.sh b/hack/test/e2e.sh index 67474e3fdf..c6bce81f8a 100755 --- a/hack/test/e2e.sh +++ b/hack/test/e2e.sh @@ -33,7 +33,7 @@ export TALOS_VERSION # Kubernetes export KUBECONFIG="${TMP}/kubeconfig" -export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-alpha.2} +export KUBERNETES_VERSION=${KUBERNETES_VERSION:-1.32.0-alpha.3} export NAME_PREFIX="talos-e2e-${SHA}-${PLATFORM}" export TIMEOUT=1200 diff --git a/pkg/machinery/constants/constants.go b/pkg/machinery/constants/constants.go index e288eb68e2..a27d9978a3 100644 --- a/pkg/machinery/constants/constants.go +++ b/pkg/machinery/constants/constants.go @@ -354,7 +354,7 @@ const ( // DefaultKubernetesVersion is the default target version of the control plane. // renovate: datasource=github-releases depName=kubernetes/kubernetes - DefaultKubernetesVersion = "1.32.0-alpha.2" + DefaultKubernetesVersion = "1.32.0-alpha.3" // SupportedKubernetesVersions is the number of Kubernetes versions supported by Talos starting from DefaultKubernesVersion going backwards. SupportedKubernetesVersions = 6 diff --git a/website/content/v1.9/_index.md b/website/content/v1.9/_index.md index e28e8326c6..661ca96627 100644 --- a/website/content/v1.9/_index.md +++ b/website/content/v1.9/_index.md @@ -6,7 +6,7 @@ images: ["images/talos-dev-banner.png"] cascade: type: docs lastRelease: v1.9.0-alpha.0 -kubernetesRelease: "1.32.0-alpha.2" +kubernetesRelease: "1.32.0-alpha.3" prevKubernetesRelease: "1.31.1" nvidiaContainerToolkitRelease: "v1.16.1" nvidiaDriverRelease: "535.183.06" diff --git a/website/content/v1.9/reference/cli.md b/website/content/v1.9/reference/cli.md index 0219108355..1ea4932df5 100644 --- a/website/content/v1.9/reference/cli.md +++ b/website/content/v1.9/reference/cli.md @@ -185,7 +185,7 @@ talosctl cluster create [flags] --ipxe-boot-script string iPXE boot script (URL) to use --iso-path string the ISO path to use for the initial boot (VM only) --kubeprism-port int KubePrism port (set to 0 to disable) (default 7445) - --kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.2") + --kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.3") --memory int the limit on memory usage in MB (each control plane/VM) (default 2048) --memory-workers int the limit on memory usage in MB (each worker/VM) (default 2048) --mtu int MTU of the cluster network (default 1500) @@ -1385,7 +1385,7 @@ talosctl gen config [flags] -h, --help help for config --install-disk string the disk to install to (default "/dev/sda") --install-image string the image used to perform an installation (default "ghcr.io/siderolabs/installer:latest") - --kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.2") + --kubernetes-version string desired kubernetes version to run (default "1.32.0-alpha.3") -o, --output string destination to output generated files. when multiple output types are specified, it must be a directory. for a single output type, it must either be a file path, or "-" for stdout -t, --output-types strings types of outputs to be generated. valid types are: ["controlplane" "worker" "talosconfig"] (default [controlplane,worker,talosconfig]) -p, --persist the desired persist value for configs (default true) @@ -2998,7 +2998,7 @@ talosctl upgrade-k8s [flags] --pre-pull-images pre-pull images before upgrade (default true) --proxy-image string kube-proxy image to use (default "registry.k8s.io/kube-proxy") --scheduler-image string kube-scheduler image to use (default "registry.k8s.io/kube-scheduler") - --to string the Kubernetes control plane version to upgrade to (default "1.32.0-alpha.2") + --to string the Kubernetes control plane version to upgrade to (default "1.32.0-alpha.3") --upgrade-kubelet upgrade kubelet service (default true) --with-docs patch all machine configs adding the documentation for each field (default true) --with-examples patch all machine configs with the commented examples (default true) diff --git a/website/content/v1.9/reference/configuration/v1alpha1/config.md b/website/content/v1.9/reference/configuration/v1alpha1/config.md index 0020d398ea..108c046526 100644 --- a/website/content/v1.9/reference/configuration/v1alpha1/config.md +++ b/website/content/v1.9/reference/configuration/v1alpha1/config.md @@ -90,7 +90,7 @@ controlPlane: {{< /highlight >}} | | |`kubelet` |KubeletConfig |Used to provide additional options to the kubelet.
Show example(s){{< highlight yaml >}} kubelet: - image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.2 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.3 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -507,7 +507,7 @@ KubeletConfig represents the kubelet config values. {{< highlight yaml >}} machine: kubelet: - image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.2 # The `image` field is an optional reference to an alternative kubelet image. + image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.3 # The `image` field is an optional reference to an alternative kubelet image. # The `extraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true @@ -560,7 +560,7 @@ machine: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The `image` field is an optional reference to an alternative kubelet image.
Show example(s){{< highlight yaml >}} -image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.2 +image: ghcr.io/siderolabs/kubelet:v1.32.0-alpha.3 {{< /highlight >}}
| | |`clusterDNS` |[]string |The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
Show example(s){{< highlight yaml >}} clusterDNS: @@ -2956,7 +2956,7 @@ serviceAccount: {{< /highlight >}}
| | |`apiServer` |APIServerConfig |API server specific configuration options.
Show example(s){{< highlight yaml >}} apiServer: - image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.2 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.3 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -2995,14 +2995,14 @@ apiServer: {{< /highlight >}}
| | |`controllerManager` |ControllerManagerConfig |Controller manager server specific configuration options.
Show example(s){{< highlight yaml >}} controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.2 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.3 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}
| | |`proxy` |ProxyConfig |Kube-proxy server-specific configuration options
Show example(s){{< highlight yaml >}} proxy: - image: registry.k8s.io/kube-proxy:v1.32.0-alpha.2 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.32.0-alpha.3 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3013,7 +3013,7 @@ proxy: {{< /highlight >}}
| | |`scheduler` |SchedulerConfig |Scheduler server specific configuration options.
Show example(s){{< highlight yaml >}} scheduler: - image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.2 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.3 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3257,7 +3257,7 @@ APIServerConfig represents the kube apiserver configuration options. {{< highlight yaml >}} cluster: apiServer: - image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.2 # The container image used in the API server manifest. + image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.3 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true @@ -3299,7 +3299,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the API server manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.2 +image: registry.k8s.io/kube-apiserver:v1.32.0-alpha.3 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the API server. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the API server static pod. | | @@ -3438,7 +3438,7 @@ ControllerManagerConfig represents the kube controller manager configuration opt {{< highlight yaml >}} cluster: controllerManager: - image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.2 # The container image used in the controller manager manifest. + image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.3 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true @@ -3448,7 +3448,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the controller manager manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.2 +image: registry.k8s.io/kube-controller-manager:v1.32.0-alpha.3 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the controller manager. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the controller manager static pod. | | @@ -3518,7 +3518,7 @@ ProxyConfig represents the kube proxy configuration options. {{< highlight yaml >}} cluster: proxy: - image: registry.k8s.io/kube-proxy:v1.32.0-alpha.2 # The container image used in the kube-proxy manifest. + image: registry.k8s.io/kube-proxy:v1.32.0-alpha.3 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: @@ -3535,7 +3535,7 @@ cluster: disabled: false {{< /highlight >}}
| | |`image` |string |The container image used in the kube-proxy manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-proxy:v1.32.0-alpha.2 +image: registry.k8s.io/kube-proxy:v1.32.0-alpha.3 {{< /highlight >}}
| | |`mode` |string |
proxy mode of kube-proxy.The default is 'iptables'.
| | |`extraArgs` |map[string]string |Extra arguments to supply to kube-proxy. | | @@ -3554,7 +3554,7 @@ SchedulerConfig represents the kube scheduler configuration options. {{< highlight yaml >}} cluster: scheduler: - image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.2 # The container image used in the scheduler manifest. + image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.3 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true @@ -3564,7 +3564,7 @@ cluster: | Field | Type | Description | Value(s) | |-------|------|-------------|----------| |`image` |string |The container image used in the scheduler manifest.
Show example(s){{< highlight yaml >}} -image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.2 +image: registry.k8s.io/kube-scheduler:v1.32.0-alpha.3 {{< /highlight >}}
| | |`extraArgs` |map[string]string |Extra arguments to supply to the scheduler. | | |`extraVolumes` |[]VolumeMountConfig |Extra volumes to mount to the scheduler static pod. | |