From e7a4ca15a6b16cc581bc5d5754aac4c3f6732f65 Mon Sep 17 00:00:00 2001 From: actions Date: Wed, 14 Jul 2021 18:19:28 +0000 Subject: [PATCH] Merge pull request #114 from manuelbuil/main-source Move kube-proxy to newer images --- ...e2-kube-proxy-v1.19.12-build2021061702.tgz | Bin 0 -> 4340 bytes ...ke2-kube-proxy-v1.20.8-build2021061702.tgz | Bin 0 -> 4338 bytes ...ke2-kube-proxy-v1.21.2-build2021061702.tgz | Bin 0 -> 4338 bytes .../v1.19.12-build2021061702/Chart.yaml | 12 ++ .../templates/NOTES.txt | 2 + .../templates/_helpers.tpl | 21 +++ .../templates/config.yaml | 69 +++++++++ .../templates/daemonset.yaml | 78 ++++++++++ .../templates/rbac.yaml | 12 ++ .../templates/serviceaccount.yaml | 5 + .../v1.19.12-build2021061702/values.yaml | 142 ++++++++++++++++++ .../v1.20.8-build2021061702/Chart.yaml | 12 ++ .../templates/NOTES.txt | 2 + .../templates/_helpers.tpl | 21 +++ .../templates/config.yaml | 69 +++++++++ .../templates/daemonset.yaml | 78 ++++++++++ .../templates/rbac.yaml | 12 ++ .../templates/serviceaccount.yaml | 5 + .../v1.20.8-build2021061702/values.yaml | 142 ++++++++++++++++++ .../v1.21.2-build2021061702/Chart.yaml | 12 ++ .../templates/NOTES.txt | 2 + .../templates/_helpers.tpl | 21 +++ .../templates/config.yaml | 69 +++++++++ .../templates/daemonset.yaml | 78 ++++++++++ .../templates/rbac.yaml | 12 ++ .../templates/serviceaccount.yaml | 5 + .../v1.21.2-build2021061702/values.yaml | 142 ++++++++++++++++++ index.yaml | 48 ++++++ 28 files changed, 1071 insertions(+) create mode 100755 assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.12-build2021061702.tgz create mode 100755 assets/rke2-kube-proxy-1.20/rke2-kube-proxy-v1.20.8-build2021061702.tgz create mode 100755 assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.2-build2021061702.tgz create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/Chart.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/NOTES.txt create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/_helpers.tpl create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/config.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/daemonset.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/rbac.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/serviceaccount.yaml create mode 100755 charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/values.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/Chart.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/NOTES.txt create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/_helpers.tpl create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/config.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/daemonset.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/rbac.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/serviceaccount.yaml create mode 100755 charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/values.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/Chart.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/NOTES.txt create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/_helpers.tpl create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/config.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/daemonset.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/rbac.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/serviceaccount.yaml create mode 100755 charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/values.yaml diff --git a/assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.12-build2021061702.tgz b/assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.12-build2021061702.tgz new file mode 100755 index 0000000000000000000000000000000000000000..d35d801f2d7e50870cd19b6d2074af9bb19cbab8 GIT binary patch literal 4340 zcmVDc zVQyr3R8em|NM&qo0PK8wbK5qyc>m_7IFsyeY|qc4DEYPJY<8~WBwbINMAuH+KRTTZ zL>`H#K!5>2*;;SD`<(-j6iG>T+T^CQdyUT25^!EPI4?XDy}oCv#HX)M#< zM4!#8Ke>OC#tQxuYQvR`VL1v|QMA5>qi@5}I7rbXnitmfUP@z`5b%9DMVOGyguwz= zH%g}_4hFEcr66ZqTE-=6H-b6iB8G%4%>0*TGRaVfiOK^2$#RV0%J;z!Y-$4E)w9pQ zs8T2B=w;RxCLRvw+-BvJ2n{QuLx<%V1$e>f-Xn73pSvUNym#YfLPrghI2>XbMa$Uv?zp(pY3^P<4?K zVi-l?@t9OQ9G%wcDVWV_QuX{9*Xes=%2> zlVKXd>(W?~eXfy_fHq?iqMG>iN+uK3T%|FLPV&eEG$5^J$%2ghDZFO4JTG&QWj;ks z>-gsU9SI?6=1MyKId~{g!^PxBNR&p{k7z(3TcVRs@SIyXq+>h3i7Bn@E~Wmg97!y3rT*o zeeBt8`MsE2#xOb>MQ39tAZf+&993zZuf4mNbhK0%{>2Y(uV23Z`TX)77|SeDcu0zO z9`QmbgFiEFV;E%-tp-uPOa*pGqajb^w7wf`+G_X0b~wCTqsA~k_Dq7O@LG`#)f87Gu385ieqXo6oh5}_6c#;13d`p1!Bxzz9ilRv|Rmz|~KkdsINF@i3 z_MwkMZiy(~8LPRR12e!=l$OtU;$uP;fM``*WJqku1Z2ussvg6j{`7WsEF5OJ4?XyKaZ?<72gYqEDzMklB)`L6ezH29v2$q|RQfDw7OuT!}#C1ubG(z~$tp zYd;4P0dEsgrg*_qU2*=@C0c&%<#8-cl3`j3Qsb&XKRaLUfH)g1Tdr8c%s_%|7+3WJFS&D5n{c?OLObjOue^M3E1nFy9S3P@l zR@zKy{?9ru&Xmsm=Y8wU-eo9PGCBa`s+s8uTB9?;=1#wB4lxXuOb-R0cFtCYY>v_n zo4sPV#&9*(MkQ@%G&L|qdxI!Js5#6;X)-i{Q1e&x@s(4lOja?Rm>{TYp}G*N(%<)M zJ)KW3>-uM3RT-Wl*b01k#${_J2Z5jECl*;bQt&XJxGSY1=lI)CEUqc&-|KKQ}>$*vPlx@jY@H%v^8$K`jf}a*^0v3 zk_n!Y(xyTs3sbr1C>)1JVKf{cA6B1_hezXs&}lfu87oCSpN?qzzx;XtIWpPsCw2HT zyb&!7q)L(2<-G2S>(x^#9~j!c3|RVGwcy?2k`hgV#)Qp8cGf|IQ4~doK>z=vh$7QIGd*eeZcSLp4*z7i?w15g_F>e^-x_Giwh>+Yr53!AcXDwtdxR#h~@6pbCQ zCF8=SR?lufDYZsv#i}Wo4%QSp#hpiRfkU{nf&R`jQ#Xe&Ev-W{D`PR=GoIFhTvm{f z4Y}%A)+bsnO-Z#i1@c2*^D}Y7Rt9EF2m@2v{8r}&jZVBot^}b?TJRLE>H`?6`<*`< z*q`E@OET&K%9Q>d0@d530&;kzp@I1SYBn>J^|+*(o-gr${J?GSDlbTsG-Zw{1sA1L z9~#yNSY+DOKEb)rHUtA%A!N!7!9HWnvAT3tdCtZlc~zZ3X)72lr%R2aPw*` zztFhks%%u~%-%crN|kWKd_FQ%)?_?QQP$DSiS(BCB(_Z_=Thm08aK`_xtz~RaR|z0 zsGBfCa#FE6b^fYuFbylIe8M5@zvb*VrT-rO&C&h)AyA-*VQ&zJsge@KKi za}#n!+7w+tDs`c`!PJ+hHp7)O$^v!Hq<0RDxmx;F_s3zLldqk~KEiVk3Y2vbG(L%PR|ky^m7A1bw^y8gX<1PSo;V*T z!*I4aAP;%gcuvqNpumwQ0VkT%#qE)y`YxpkiOyMWG`D_<>UiHhxT|c( zxi76X)hz3yREK@x5Z)-!a%nQLR zn&F$b?_OSq_SSwjkB9DmqvNP||8sJB{CNNKRoeIKaw%g}pQArjV?t1DfAqEg@V49k z-)ATa)F!mWXI=$A;Qyo1$yv|;Pft!pkN*EP+TGoN(l(a}PkhFGUuE(4y2`mvVDRx{ zK!AJ(q2Eh|K2L{RlXL@LP(?9=C;!h3pZq>d6b73wPu3EkOt*fnr$FZXK4q4@Pr1HN zZ~}b6EPKKA7I8PE-3H#3aqBtBrwiU3rMzDsS^RPN?>V3O{Zrefmj0Pri^089{f zvGv;S`0rQqOS}YnApV~m9rf$K)1#A<$N2v>+F&pUdT#(Je9{K2G64D$!@mXrfIHW2 zK-bZwf?WL7gj@}mBX{FHatNI_H+OeU0BQBZzu-fuEW*c+4rSv!Kk&!-EJ?7itz-2r z#f^}(3E$@gF!g8r_mOcRYmB6ItbZ?F3viQf`-J`O&Yw4>JJUe8Nx9i-J6u{ z&|I#;Y*I8YO_~Fbt!P^yH!i2295e@fm`b8(*N?smFeLxP1qjYG}-=)mw#xsyRkNA+T7!B zP*}eO*pRZislS?R!K#NoL7U5Mn%t@bn-s5_YwC`Jue&#i@4)KoU^~BU%Ja|oZ$sl}4Y@W_XQc@NK7Mq(E3|63-nCUwdNI6E9q!w<&K*uUQe~Xjxr!3N}SiO^g*q44wDo{x=~TUG7q& z>i6dgj~mTTY`gb=DZ^YzgP;Fvum|>k$I;oixBokf&K}SIzDjFv=vYyh;c`^@=L@&~ z*JyY8=i;ws@Hswe3QXKhpLt_clbSQeo!q{<8n( z?TeT1-<-dGdC-8OT(-sW3UA<=5%4#!ue8eJRwuxWqe!oC*6rCcc*V7;Crb|U##a~}EHcLHP85Oaki|b047nOA zLxRZiHfUB^IRg;P7+EsBF2I}ZR%B7Ul+)iZvHstmaG2Mfg!y=Ku(R#<|ElI-UWK0%2_EwQ(NWL;$I)o~`0u}bmA2Jg idKDc zVQyr3R8em|NM&qo0PK8wbK5qyc>m_7IFsyeY|qc4DEZZLHapjGl3h=mMAuH+KRTTZ zL>`H#K!5>2*;;SD`<(-j6iG>T+T^CQdyUT25^!EPI4?XDy}osLh&CuiS8qvO%>={FF4IT3cZ(paXy zi9VZGe{%mOjTQVS)P^e=!*Ud`qG){$$5HrgkfKR6FRbgll*Te4;QMllFd>r(g9WZ` zluk_?3}9_aLC(0ej7!vR1arnk3<(*S`7h06lA#V0l?MQl$e>f-Xn6{%*9pk`30)Bu-ma)~I7MIF*)e$G%rqU4Ov zOO5FvSj}cLo`6B=X35|h^^zwI8mVihRSv4OhNlQNvUNym#YfLPrghI2>XbMa$Uv?zp(pY3^P<4?K zVi-l?@t9OQ9G%wcDVWV_QuX{9*Xes=%2> zlVKXd>(W?~eXfy_fHq?iqMG>iN+uK3T%|FLPV&eEG$5^J$%1VBDZFO4JTG&QWj;ks z>-gsU9SI?6=1MyKId~{g!^PxBNR&p{k7z(3TcVRs@SIy|Kf+Y*Dv4ye17>3jAa%nIwZwA zk9Z-J!JiqoF^sZ^R)Z*CrUE;p(U2!{THg&eZMA!0I~-oFQDYb%dnUnCc&*5b6qLsO zNzr0rfpjTqw+Vdb57bBC-Y(C9RH$aKz|}LCC81zk8?rMCzDAlN%#hhqBg~maQ^lep zV?(?xQ1cw6WugW$aZr8wJ3+6*Nh?U+aGOD)v~9v=hD_KDk_?l@mZ-TUXvU*xd~*6g z==>#)f87Gu385ieqXo6oh5}_6c#;13d`p1!Bxzz9ilWIdRmPw`KkdsINF@i3 z_MwkMZiy(~8LPRR12e!=l$OtU;$uP;fM``*WJqku1Z2ussvg6j{`7WsEF5OJ4?XyKaZ?<72gYqEDzMklB)`L6ezH29v2$q|RQfDw7OuT!}#C1ubG(z~$tp zYd;4P0dEsgrg*_qU2*=@C0c&%<#8-cl3`j3Qsb&XKRaLUfH)g1Tdr8c%s_%|7+3WJFS&D5n{c?OLObjOue^M3E1nFy9S3P@l zR@zKy{?9ru&Xmsm=Y8wU-eo9PGCBa`s+s8uTB9?;=1#wB4lxXuOb-R0cFtCYY>v_n zo2_EF#&9*(MkQ@%G&L|qdxI!Js5#6;X)-i{Q1e&x@s(4lOja?Rm>{TYp}G*N(%<)M zJ)KW3>-uM3RT-Wl*b01k#${_J2Z5jECl*;bQt&XJxGSY1=lHu%EUqc&-|KKQ}>$*vPlx@jY@H%v^8$K`jf}a*^0v3 zk_n!Y(xyTs3sbr1C>)1JVKf{cA6B1_hezXs&}lfu87oCSpN?qzzx;XtIWpPsCw2HT zyb&!7q)L(2<-G2S>(x^#9~j!c3|RVGwcy?2k`hgV#)Qp8cGf|IQ4~doK>z=vh$7QIGd*eeZcSLp4*z7i?w15g_F>e^-x_Giwh>+Yr53!AcXDwtdxR#h~@6pbCQ zCF8=SR?lufDYZsv#i}Wo4%QSp#hpiRfkU{nf&R`jQ#Xe&Ev-W{D`PR=GoIFhTvm{f z4Y}%A)+bsnO-Z#i1@c2*^D}Y7Rt9EF2m@2v{8r}&jZVBot^}b?TJRLE>H`?6`<*`< z*q`E@OET&K%9Q>d0@d530&;kzp@I1SYBn>J^|+*(o-gr${J?GSDlbTsG-Zw{1sA1L z9~#yNSY+DOKEb)rHUtA%A!N!7!9HWnvAT3tdCtZlc~zZ3X)72lr%R2aPw*` zztFhks%%u~%-%crN|kWKd_FQ%)?_?QQP$DSiS(BCB(_Z_=Thm08aK`_xtz~RaR|z0 zsGBfCa#FE6b^fYuFbylIe8M5@zvk>WrT-TG)zSUiAyA-*VQ&zJsge@KKi za}#n!+7w+tDs`c`!PJ+hHp7)O$^v!Hq<0RDxmx;F_s3zLldqk~KEiVk3Y2vbG(L%PR|ky^m7A1bw^y8gX<1PSo;V*T z!*I4aAP;%gcuvqNpumwQ0VkT%#qE)y`YxpkiOyMWG`D_<>UiHhxT|c( zxi76X)hz3yREK@x5Z)-!a%nQLR zn&F$b?_OSq_SSwjkB9DmqvNP||8sKsc>nu#+V|^vDPvTiqd!(-LQrsjbhiKSw%h;T zXDABPCbY$8UIjnk|D(~#SdNil;b|IZAc{60(+2AeNW))Jshw|=gtK<4~DWtP29xxPp{t<3*MZiykDPL{Bim3IiUIdQ`@GN{-Ilo!M#)dv(5dn z_1fwKjgoUj00I?B&~D(d+}O;n|#|x?00wmz$x9C2Et7O?qc9R_8$rZA3s8+ z(bfZXvA4 zlwQ1XzutKAr1n_%vyGp4;rhHyc~g4LiXcbJ>Y`JyDT-=htSDmWyf61Z3fbs#w;ENy zKUa9%Xntbbz5h!Y=1Lm;{9l7Tu>U)b&icRqI*ZO8&;PzkYj5aSQJCR!RQcx%xBk~? zclzhzTQm3^A2kIg?yAqdC{Wr{&6!QIA6jg7F{({9uJceMBsI~Yu!{yjEkw09X@0Qg zdj|etr%cy`1~4p*9=f+G!zq`;9zhQ?82Am)v*ui|P`75=p%<_nat)@bP227$Mwn{W~K{NgKnK&DXiB;x{RUm?*)MRScK2H_A>l z8kDwy+G34WO2VYn+^*dDz^!fTqR@QF1#BKy}FC-wK9Y4V585 zWO*AjtE`*>2xg40SG>6nh}t00-13Bppca<$gso*ech8ghdmc}vvi3pK9c;HaxN9~v z{^`(pl8{2T7)Tf3&2}rYsBdK2K96 z4XsV1OH~k#(lNZe<;I!@amRpnl@2ccPRrm7R?qWN%(e=5qNSVcJtC_|5%G1_L2rlP8x}nx- z+>f$(CK!WH1D?lK8{x6S{*P$8>wi6E$(Q*Z_=Erc!?<7npGKqO$NK+kw06zsR=o2| zg7uY7y=nJ3`AP|V&SlEwyt6x42jbWz(du_jfmQ;mf|C{e?^>0`J?w(|*r~;>A?|Z@ zm%J&bzhPqiKS1FyuR96z@#J7<+wK2V&B441KPM7AE^#D!)0DlUCumAu6 literal 0 HcmV?d00001 diff --git a/assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.2-build2021061702.tgz b/assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.2-build2021061702.tgz new file mode 100755 index 0000000000000000000000000000000000000000..d9b16aade37497967b18739223559b324df830ae GIT binary patch literal 4338 zcmVDc zVQyr3R8em|NM&qo0PK8wbK5qyc>m_7IFsyeY|qc4DEYPJY<8~WBwbINMAuH+KRTTZ zL>`H#K!5>2*;;SD`<(-j6iG>T+T^CQdyUT25^!EPI4?XDy}osLh&CuiS8qvO%>={FF4IT3cZ(paXy zi9VZGe{%mOjTQVS)P^e=!*Ud`qG){$$D?o@q-YY&3+p;BrLjy1_`aMXOvq%yV1cU} zrBf3J16Z3eQ;o(rZZ<=3$Y4+}QG-?f6DSG6Q`k3Xsc$a| z-G6%yivrN)WO)o+TGTU^paCXR*o)&1z-bHMAeeHQo_pRgRP;!!%NbZ*A|wKtEDPX; zWm8d+Nv5ug-s{8&EUb(o_XW(;xz@;FYbADsZOJ zWSEBVx-^z#pKD|!pv{f;_4XJjmJYpg=wFLXsbC zAA7c2elI4MF^rBz(b?DuNLsNxM^#$qYws>59W7OcfAPcH>zD6;KEHei#xjc(9g^am zN4yZq;LnWP7)Dt{t3i}6Q-K}QXvh;et?ve#w%Wb09S$$os4J(J)myjJ8z3QFVt zq-Zg*K)MvQ+XTMz2kIkmZd*>KfPU|*4(dT9o@at zU(TR3MBF7JTDT_qI|&crn(UpF(Fv+czAaW8*mnX;Mb4JzN{SUo#1zv5=kRryJ{KZ} zPZWR#rrg$(oZaM1FTfNmaTe^p6)ahxrEvJ6T8|C!>aW)?3dv*M22k*6DRlMFVSWhUX+Y;TwaAz6;FfA#LD4I}h;LYgV zEjJq&ESP4LI0ZLu$tWrA8Mw)Kl2zJT`laQl!DOlwsk0ZW$|QpuS0Ye(L5o-xa5?$u z+RuSRz}rNWDPHhYSDZg}iI!h`c^pfVWSEwM)VM0p&(4>7ImKaa92n`g2K2LfDQWSX z<0lr*uO=|13ej2@2XyhiN~%`D$jMB7OiEQs?-i7)JodRReuvR4|2GY$7NVWvIOROI z$h`!22>k>XKClw&PV z=R!&As&ukrHFJ>`jWz4qy~YkbdWG2opsP)6h+Y?(Eoo8l*+G( z@Ok=M41;gK{kDBZfU>F0W?ayGs1m%v>3S8(MusU)%lWV%Fvyrp1;vF1DGmZBq7Mu| zyTxgxMX!+<_DX}=6?%KHuSAOa0F;Kky0+Pa{h2fBx_fE%!lta83MLnaRTYgeMPmnS z$+&Q-)wA1AO07{^v1$sYgEfUtapw_S;1KR?puh9X)XgDGOY6|g%2>?zjHk6AmlY&r zL#{fO^@)~CQ&MeBf&9?d{7l@im4O)(!oZX^zt#CcqZ2QYD?wth$qWU6wpf+SN0CC!Zh+`Jmg zFElQ>DjO9#v-b|ZQYG9lpN|ZcH5pG+lyx+7BE6+OiEY!#xm3EL#*On!F6XmS9D=eL z>L!ekoK&n%oxiFZOv6elpKu8KZ#nx->A#16b9DcH2oxw{*c*kT(>)&;ic%NKppWU? zw2*VQa3@=ac0x3rtUi`d1*xKx+=oV~EGe6NE0uU_L8CxskS0wrH%&R^IwtDr9};2B z+=N__HbobZN?mAfF!klB&2Z(6vOt|P>77Gku9kk){c)J*G~?AKGzb83M}c1J}QCMg;-+)3oIkAT2>T-C(g&o zFq~};$U~kro)feRC~)LSz=`Ixv8~OZRYFku`cQJazDub>qH~rT&8=UeI^K5=?kd}H z?n`S;HOu-a)nQ*agm)?q=0Z)Gh+Xka5#)s@d4+RstX{?N3!5+8`u9H;^FlC- zX87jqyO-CYy|tgss=#SNy5ER@Wo$Wuo?e_oo z8Hxh632pJ2SHTbX|7dh_*7N_HC%_YJUpK{+io zLeeIDpA*2;AM)Qv#(}IclGeHYy?8CaO}_0T_PaZO;FRu61K}nCcQJ4u`wxYIj~}7Z zXzPK_-5n%~2{Z}zQ$Y)^MR?uUU#N|jHEn@s~c+VXE0rS4;QWh*3);7Qno{L zxdyXI(L6P2PCT}vZGqfWx=o7KyOIY9Zo>9SZoD*Uk?M{0QT<8uq&ZSd?2eJ` zFz$yi@9td1(|k7%kTDxH>bC`MsjFN6%NJLshrcvodvw!e`!intq1o=n+L&o`k-tG< z{TN_F%Id2AYO)2Z9{L1rF1KlNs}5{ZylU>LI}X0?-Xy*QtFMFY{I)T>kJBGvvp(2e zgS8KP`)szsciAksOk;QJ>K^-Fw2yWjz_zQ&7MsoC{_5xbz~^g|jh{8-+DM(1CItBS(ebX(s^NOqR(-wU(%<4WLCNKq7uQ!Y%$P7(bxX82 zN-y5HUvE5lQhTiX*~U-2aDCpUyeYkAMUbOqbLRunOG-k19yg=}=WTaBvU zpDR3WG(WNJ-v6Zxb0rOa{;$Cv*#8|zXZ_!QokeGl=YLP`75=p%<_nat)@bP227$Mwn{W~K{NgKnK&DXiB;x{RUm?*)MRScK2H_A>l z8kDwy+G34WO2VYn+^*dDz^!fTqR@QF1#BKy}FC-wK9Y4V585 zWO*AjtE`*>2xg40SG>6nh}t00-13Bppca<$gso*ech8ghdmc}vvi3pK9c;HaxN9~v z{^`(pl8{2T7)Tf3&2}rYsB`@S6tv*ec_(!^f+zts(X2Dcd;GX==xk)q|D;A)y(32rTRaJUQ6ecKd%-b1<*M&xr&N`Tyvs=l|nqG>#tq|7*0Z?$X-` gZhH8mA3e6m_ShcVzkBi|vw0DIPd!~g&Q literal 0 HcmV?d00001 diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/Chart.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/Chart.yaml new file mode 100755 index 0000000..17a8d69 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v1.19.12 +description: Install Kube Proxy. +keywords: +- kube-proxy +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-kube-proxy +sources: +- https://github.com/rancher/rke2-charts +version: v1.19.12-build2021061702 diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/NOTES.txt b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/NOTES.txt new file mode 100755 index 0000000..2da0e24 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/NOTES.txt @@ -0,0 +1,2 @@ +Kube-proxy has been installed. + diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/_helpers.tpl b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/_helpers.tpl new file mode 100755 index 0000000..cb64d1f --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/_helpers.tpl @@ -0,0 +1,21 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} +{{- define "rke2_data_dir" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s" .Values.global.rke2DataDir -}} +{{- else -}} +{{- "/var/lib/rancher/rke2" -}} +{{- end -}} +{{- end -}} +{{- define "kubeproxy_kubeconfig" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s/agent/kubeproxy.kubeconfig" .Values.global.rke2DataDir -}} +{{- else -}} +{{- printf "%s" .Values.clientConnection.kubeconfig -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/config.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/config.yaml new file mode 100755 index 0000000..f8bb5cc --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/config.yaml @@ -0,0 +1,69 @@ +--- +apiVersion: v1 +data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: {{ .Values.bindAddress | quote }} + clientConnection: + acceptContentTypes: {{ .Values.clientConnection.acceptContentTypes | quote }} + burst: {{ .Values.clientConnection.burst }} + contentType: {{ .Values.clientConnection.contentType | quote }} + kubeconfig: {{ include "kubeproxy_kubeconfig" . | quote }} + qps: {{ .Values.clientConnection.qps }} + clusterCIDR: {{ coalesce .Values.global.clusterCIDR .Values.clusterCIDR | quote }} + configSyncPeriod: {{ .Values.configSyncPeriod }} + conntrack: + maxPerCore: {{ .Values.conntrack.maxPerCore }} + min: {{ .Values.conntrack.min }} + tcpCloseWaitTimeout: {{ .Values.conntrack.tcpCloseWaitTimeout | quote }} + tcpEstablishedTimeout: {{ .Values.conntrack.tcpEstablishedTimeout | quote }} + detectLocalMode: {{ .Values.detectLocalMode | quote }} + enableProfiling: {{ .Values.enableProfiling }} + healthzBindAddress: {{ .Values.healthzBindAddress | quote }} + hostnameOverride: {{ .Values.hostnameOverride | quote }} + iptables: + masqueradeAll: {{ .Values.iptables.masqueradeAll }} + masqueradeBit: {{ .Values.iptables.masqueradeBit }} + {{ if .Values.iptables.minSyncPeriod }} + minSyncPeriod: {{ .Values.iptables.minSyncPeriod }} + {{ end }} + syncPeriod: {{ .Values.iptables.syncPeriod }} + ipvs: + excludeCIDRs: {{ .Values.ipvs.excludeCIDRs | quote }} + {{ if .Values.ipvs.minSyncPeriod }} + minSyncPeriod: {{ .Values.ipvs.minSyncPeriod }} + {{ end }} + scheduler: {{ .Values.ipvs.scheduler | quote }} + strictARP: {{ .Values.ipvs.strictARP }} + syncPeriod: {{ .Values.ipvs.syncPeriod }} + {{ if .Values.ipvs.tcpFinTimeout }} + tcpFinTimeout: {{ .Values.ipvs.tcpFinTimeout }} + {{ end }} + {{ if .Values.ipvs.tcpTimeout }} + tcpTimeout: {{ .Values.ipvs.tcpTimeout }} + {{ end }} + {{ if .Values.ipvs.udpTimeout }} + udpTimeout: {{ .Values.ipvs.udpTimeout }} + {{ end }} + kind: KubeProxyConfiguration + metricsBindAddress: {{ .Values.metricsBindAddress | quote }} + mode: {{ .Values.proxy.mode | quote }} + nodePortAddresses: null + oomScoreAdj: {{ .Values.oomScoreAdj }} + portRange: {{ .Values.proxy.portRange | quote }} + showHiddenMetricsForVersion: {{ .Values.showHiddenMetricsForVersion | quote }} + udpIdleTimeout: {{ .Values.udpTimeout | quote }} + featureGates: + {{- range $key, $value := .Values.featureGates }} + {{ $key }}: {{ $value }} + {{- end }} + winkernel: + enableDSR: false + networkName: "" + sourceVip: "" +kind: ConfigMap +metadata: + labels: + app: kube-proxy + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/daemonset.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/daemonset.yaml new file mode 100755 index 0000000..1267df8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/daemonset.yaml @@ -0,0 +1,78 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-proxy + name: kube-proxy + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: IfNotPresent + name: kube-proxy + securityContext: + privileged: true + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: {{ template "rke2_data_dir" . }}/agent + name: rke2config + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - operator: Exists + volumes: + - hostPath: + path: {{ template "rke2_data_dir" . }}/agent + type: "" + name: rke2config + - configMap: + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/rbac.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/rbac.yaml new file mode 100755 index 0000000..d98f84c --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rke2:node-proxier +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier +subjects: +- kind: ServiceAccount + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/serviceaccount.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/serviceaccount.yaml new file mode 100755 index 0000000..59408a2 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/values.yaml b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/values.yaml new file mode 100755 index 0000000..bc69044 --- /dev/null +++ b/charts/rke2-kube-proxy-1.19/rke2-kube-proxy/v1.19.12-build2021061702/values.yaml @@ -0,0 +1,142 @@ +--- + +# image for kubeproxy +image: + repository: rancher/hardened-kube-proxy + tag: v1.19.12-build20210714 + +# The IP address for the proxy server to serve on +# (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) +bindAddress: 0.0.0.0 + +# If true cleanup iptables and ipvs rules and exit. +cleanup: + +# The CIDR range of pods in the cluster. +# When configured, traffic sent to a Service cluster IP from outside this range +# will be masqueraded and traffic sent from pods to an external +# LoadBalancer IP will be directed to the respective cluster IP instead +clusterCIDR: 10.42.0.0/16 + +# The path to the configuration file. +config: + +# How often configuration from the apiserver is refreshed. Must be greater than 0. +configSyncPeriod: 15m0s + +conntrack: + # Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). + maxPerCore: 32768 + # Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). + min: 131072 + # NAT timeout for TCP connections in the CLOSE_WAIT state + tcpTimeoutCloseWait: 1h0m0s + # Idle timeout for established TCP connections (0 to leave as-is) + tcpTimeoutEstablished: 24h0m0s + +# Mode to use to detect local traffic +detectLocalMode: + +# A set of key=value pairs that describe feature gates for alpha/experimental features: +featureGates: + +# The IP address with port for the health check server to serve on +# (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. +healthzBindAddress: 0.0.0.0:10256 + +# help for kube-proxy +help: + +# If non-empty, will use this string as identification instead of the actual hostname. +hostnameOverride: + +iptables: + # If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) + masqueradeAll: + # If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. + masqueradeBit: 14 + # The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + +ipvs: + # A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. + excludeCidrs: + # The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The ipvs scheduler type when proxy mode is ipvs + scheduler: + # Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 + strictArp: + # The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + # The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpTimeout: + # The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpfinTimeout: + # The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + udpTimeout: + + +clientConnection: + # Burst to use while talking with kubernetes apiserver + apiBurst: 10 + # Content type of requests sent to apiserver. + apiContentType: + # QPS to use while talking with kubernetes apiserver + qps: 5 + # Path to kubeconfig file with authorization information (the master location is set by the master flag). + kubeconfig: /var/lib/rancher/rke2/agent/kubeproxy.kubeconfig + +# Maximum number of seconds between log flushes +logFlushFrequency: 5s + + + +# The address of the Kubernetes API server (overrides any value in kubeconfig) +master: + +# The IP address with port for the metrics server to serve on +# (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. +metricsBindAddress: 127.0.0.1:10249 + +# A string slice of values which specify the addresses to use for NodePorts. +# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. +nodeportAddresses: + +# The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] +oomScoreAdj: -999 + +# If true enables profiling via web interface on /debug/pprof handler. +profiling: + +proxy: + # Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs'. + # If blank, use the best-available proxy (currently iptables). + # If the iptables proxy is selected, regardless of how, but the system's + # kernel or iptables versions are insufficient, this always falls back to the userspace proxy. + mode: +# Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) +# that may be consumed in order to proxy service traffic. +# If (unspecified, 0, or 0-0) then ports will be randomly chosen. + portRange: + +# The previous version for which you want to show hidden metrics. +# Only the previous minor version is meaningful, other values will not be allowed. +# The format is ., e.g.: '1.16'. The purpose of this format is make +# sure you have the opportunity to notice if the next release hides additional metrics, +# rather than being surprised when they are permanently removed in the release after that. +showHiddenMetricsForVersion: + +# How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). +# Must be greater than 0. Only applicable for proxy-mode=userspace +udpTimeout: 250ms + +# Print version information and quit +version: + +# If set, write the default configuration values to this file and exit. +writeConfigTo: +global: + systemDefaultRegistry: "" diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/Chart.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/Chart.yaml new file mode 100755 index 0000000..98431d8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v1.20.8 +description: Install Kube Proxy. +keywords: +- kube-proxy +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-kube-proxy +sources: +- https://github.com/rancher/rke2-charts +version: v1.20.8-build2021061702 diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/NOTES.txt b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/NOTES.txt new file mode 100755 index 0000000..2da0e24 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/NOTES.txt @@ -0,0 +1,2 @@ +Kube-proxy has been installed. + diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/_helpers.tpl b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/_helpers.tpl new file mode 100755 index 0000000..cb64d1f --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/_helpers.tpl @@ -0,0 +1,21 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} +{{- define "rke2_data_dir" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s" .Values.global.rke2DataDir -}} +{{- else -}} +{{- "/var/lib/rancher/rke2" -}} +{{- end -}} +{{- end -}} +{{- define "kubeproxy_kubeconfig" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s/agent/kubeproxy.kubeconfig" .Values.global.rke2DataDir -}} +{{- else -}} +{{- printf "%s" .Values.clientConnection.kubeconfig -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/config.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/config.yaml new file mode 100755 index 0000000..f8bb5cc --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/config.yaml @@ -0,0 +1,69 @@ +--- +apiVersion: v1 +data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: {{ .Values.bindAddress | quote }} + clientConnection: + acceptContentTypes: {{ .Values.clientConnection.acceptContentTypes | quote }} + burst: {{ .Values.clientConnection.burst }} + contentType: {{ .Values.clientConnection.contentType | quote }} + kubeconfig: {{ include "kubeproxy_kubeconfig" . | quote }} + qps: {{ .Values.clientConnection.qps }} + clusterCIDR: {{ coalesce .Values.global.clusterCIDR .Values.clusterCIDR | quote }} + configSyncPeriod: {{ .Values.configSyncPeriod }} + conntrack: + maxPerCore: {{ .Values.conntrack.maxPerCore }} + min: {{ .Values.conntrack.min }} + tcpCloseWaitTimeout: {{ .Values.conntrack.tcpCloseWaitTimeout | quote }} + tcpEstablishedTimeout: {{ .Values.conntrack.tcpEstablishedTimeout | quote }} + detectLocalMode: {{ .Values.detectLocalMode | quote }} + enableProfiling: {{ .Values.enableProfiling }} + healthzBindAddress: {{ .Values.healthzBindAddress | quote }} + hostnameOverride: {{ .Values.hostnameOverride | quote }} + iptables: + masqueradeAll: {{ .Values.iptables.masqueradeAll }} + masqueradeBit: {{ .Values.iptables.masqueradeBit }} + {{ if .Values.iptables.minSyncPeriod }} + minSyncPeriod: {{ .Values.iptables.minSyncPeriod }} + {{ end }} + syncPeriod: {{ .Values.iptables.syncPeriod }} + ipvs: + excludeCIDRs: {{ .Values.ipvs.excludeCIDRs | quote }} + {{ if .Values.ipvs.minSyncPeriod }} + minSyncPeriod: {{ .Values.ipvs.minSyncPeriod }} + {{ end }} + scheduler: {{ .Values.ipvs.scheduler | quote }} + strictARP: {{ .Values.ipvs.strictARP }} + syncPeriod: {{ .Values.ipvs.syncPeriod }} + {{ if .Values.ipvs.tcpFinTimeout }} + tcpFinTimeout: {{ .Values.ipvs.tcpFinTimeout }} + {{ end }} + {{ if .Values.ipvs.tcpTimeout }} + tcpTimeout: {{ .Values.ipvs.tcpTimeout }} + {{ end }} + {{ if .Values.ipvs.udpTimeout }} + udpTimeout: {{ .Values.ipvs.udpTimeout }} + {{ end }} + kind: KubeProxyConfiguration + metricsBindAddress: {{ .Values.metricsBindAddress | quote }} + mode: {{ .Values.proxy.mode | quote }} + nodePortAddresses: null + oomScoreAdj: {{ .Values.oomScoreAdj }} + portRange: {{ .Values.proxy.portRange | quote }} + showHiddenMetricsForVersion: {{ .Values.showHiddenMetricsForVersion | quote }} + udpIdleTimeout: {{ .Values.udpTimeout | quote }} + featureGates: + {{- range $key, $value := .Values.featureGates }} + {{ $key }}: {{ $value }} + {{- end }} + winkernel: + enableDSR: false + networkName: "" + sourceVip: "" +kind: ConfigMap +metadata: + labels: + app: kube-proxy + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/daemonset.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/daemonset.yaml new file mode 100755 index 0000000..1267df8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/daemonset.yaml @@ -0,0 +1,78 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-proxy + name: kube-proxy + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: IfNotPresent + name: kube-proxy + securityContext: + privileged: true + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: {{ template "rke2_data_dir" . }}/agent + name: rke2config + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - operator: Exists + volumes: + - hostPath: + path: {{ template "rke2_data_dir" . }}/agent + type: "" + name: rke2config + - configMap: + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/rbac.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/rbac.yaml new file mode 100755 index 0000000..d98f84c --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rke2:node-proxier +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier +subjects: +- kind: ServiceAccount + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/serviceaccount.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/serviceaccount.yaml new file mode 100755 index 0000000..59408a2 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/values.yaml b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/values.yaml new file mode 100755 index 0000000..b3af9f3 --- /dev/null +++ b/charts/rke2-kube-proxy-1.20/rke2-kube-proxy/v1.20.8-build2021061702/values.yaml @@ -0,0 +1,142 @@ +--- + +# image for kubeproxy +image: + repository: rancher/hardened-kube-proxy + tag: v1.20.8-build20210714 + +# The IP address for the proxy server to serve on +# (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) +bindAddress: 0.0.0.0 + +# If true cleanup iptables and ipvs rules and exit. +cleanup: + +# The CIDR range of pods in the cluster. +# When configured, traffic sent to a Service cluster IP from outside this range +# will be masqueraded and traffic sent from pods to an external +# LoadBalancer IP will be directed to the respective cluster IP instead +clusterCIDR: 10.42.0.0/16 + +# The path to the configuration file. +config: + +# How often configuration from the apiserver is refreshed. Must be greater than 0. +configSyncPeriod: 15m0s + +conntrack: + # Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). + maxPerCore: 32768 + # Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). + min: 131072 + # NAT timeout for TCP connections in the CLOSE_WAIT state + tcpTimeoutCloseWait: 1h0m0s + # Idle timeout for established TCP connections (0 to leave as-is) + tcpTimeoutEstablished: 24h0m0s + +# Mode to use to detect local traffic +detectLocalMode: + +# A set of key=value pairs that describe feature gates for alpha/experimental features: +featureGates: + +# The IP address with port for the health check server to serve on +# (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. +healthzBindAddress: 0.0.0.0:10256 + +# help for kube-proxy +help: + +# If non-empty, will use this string as identification instead of the actual hostname. +hostnameOverride: + +iptables: + # If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) + masqueradeAll: + # If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. + masqueradeBit: 14 + # The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + +ipvs: + # A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. + excludeCidrs: + # The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The ipvs scheduler type when proxy mode is ipvs + scheduler: + # Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 + strictArp: + # The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + # The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpTimeout: + # The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpfinTimeout: + # The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + udpTimeout: + + +clientConnection: + # Burst to use while talking with kubernetes apiserver + apiBurst: 10 + # Content type of requests sent to apiserver. + apiContentType: + # QPS to use while talking with kubernetes apiserver + qps: 5 + # Path to kubeconfig file with authorization information (the master location is set by the master flag). + kubeconfig: /var/lib/rancher/rke2/agent/kubeproxy.kubeconfig + +# Maximum number of seconds between log flushes +logFlushFrequency: 5s + + + +# The address of the Kubernetes API server (overrides any value in kubeconfig) +master: + +# The IP address with port for the metrics server to serve on +# (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. +metricsBindAddress: 127.0.0.1:10249 + +# A string slice of values which specify the addresses to use for NodePorts. +# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. +nodeportAddresses: + +# The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] +oomScoreAdj: -999 + +# If true enables profiling via web interface on /debug/pprof handler. +profiling: + +proxy: + # Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs'. + # If blank, use the best-available proxy (currently iptables). + # If the iptables proxy is selected, regardless of how, but the system's + # kernel or iptables versions are insufficient, this always falls back to the userspace proxy. + mode: +# Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) +# that may be consumed in order to proxy service traffic. +# If (unspecified, 0, or 0-0) then ports will be randomly chosen. + portRange: + +# The previous version for which you want to show hidden metrics. +# Only the previous minor version is meaningful, other values will not be allowed. +# The format is ., e.g.: '1.16'. The purpose of this format is make +# sure you have the opportunity to notice if the next release hides additional metrics, +# rather than being surprised when they are permanently removed in the release after that. +showHiddenMetricsForVersion: + +# How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). +# Must be greater than 0. Only applicable for proxy-mode=userspace +udpTimeout: 250ms + +# Print version information and quit +version: + +# If set, write the default configuration values to this file and exit. +writeConfigTo: +global: + systemDefaultRegistry: "" diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/Chart.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/Chart.yaml new file mode 100755 index 0000000..9661e6c --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/Chart.yaml @@ -0,0 +1,12 @@ +apiVersion: v1 +appVersion: v1.21.2 +description: Install Kube Proxy. +keywords: +- kube-proxy +maintainers: +- email: charts@rancher.com + name: Rancher Labs +name: rke2-kube-proxy +sources: +- https://github.com/rancher/rke2-charts +version: v1.21.2-build2021061702 diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/NOTES.txt b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/NOTES.txt new file mode 100755 index 0000000..2da0e24 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/NOTES.txt @@ -0,0 +1,2 @@ +Kube-proxy has been installed. + diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/_helpers.tpl b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/_helpers.tpl new file mode 100755 index 0000000..cb64d1f --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/_helpers.tpl @@ -0,0 +1,21 @@ +{{- define "system_default_registry" -}} +{{- if .Values.global.systemDefaultRegistry -}} +{{- printf "%s/" .Values.global.systemDefaultRegistry -}} +{{- else -}} +{{- "" -}} +{{- end -}} +{{- end -}} +{{- define "rke2_data_dir" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s" .Values.global.rke2DataDir -}} +{{- else -}} +{{- "/var/lib/rancher/rke2" -}} +{{- end -}} +{{- end -}} +{{- define "kubeproxy_kubeconfig" -}} +{{- if .Values.global.rke2DataDir -}} +{{- printf "%s/agent/kubeproxy.kubeconfig" .Values.global.rke2DataDir -}} +{{- else -}} +{{- printf "%s" .Values.clientConnection.kubeconfig -}} +{{- end -}} +{{- end -}} diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/config.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/config.yaml new file mode 100755 index 0000000..f8bb5cc --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/config.yaml @@ -0,0 +1,69 @@ +--- +apiVersion: v1 +data: + config.conf: |- + apiVersion: kubeproxy.config.k8s.io/v1alpha1 + bindAddress: {{ .Values.bindAddress | quote }} + clientConnection: + acceptContentTypes: {{ .Values.clientConnection.acceptContentTypes | quote }} + burst: {{ .Values.clientConnection.burst }} + contentType: {{ .Values.clientConnection.contentType | quote }} + kubeconfig: {{ include "kubeproxy_kubeconfig" . | quote }} + qps: {{ .Values.clientConnection.qps }} + clusterCIDR: {{ coalesce .Values.global.clusterCIDR .Values.clusterCIDR | quote }} + configSyncPeriod: {{ .Values.configSyncPeriod }} + conntrack: + maxPerCore: {{ .Values.conntrack.maxPerCore }} + min: {{ .Values.conntrack.min }} + tcpCloseWaitTimeout: {{ .Values.conntrack.tcpCloseWaitTimeout | quote }} + tcpEstablishedTimeout: {{ .Values.conntrack.tcpEstablishedTimeout | quote }} + detectLocalMode: {{ .Values.detectLocalMode | quote }} + enableProfiling: {{ .Values.enableProfiling }} + healthzBindAddress: {{ .Values.healthzBindAddress | quote }} + hostnameOverride: {{ .Values.hostnameOverride | quote }} + iptables: + masqueradeAll: {{ .Values.iptables.masqueradeAll }} + masqueradeBit: {{ .Values.iptables.masqueradeBit }} + {{ if .Values.iptables.minSyncPeriod }} + minSyncPeriod: {{ .Values.iptables.minSyncPeriod }} + {{ end }} + syncPeriod: {{ .Values.iptables.syncPeriod }} + ipvs: + excludeCIDRs: {{ .Values.ipvs.excludeCIDRs | quote }} + {{ if .Values.ipvs.minSyncPeriod }} + minSyncPeriod: {{ .Values.ipvs.minSyncPeriod }} + {{ end }} + scheduler: {{ .Values.ipvs.scheduler | quote }} + strictARP: {{ .Values.ipvs.strictARP }} + syncPeriod: {{ .Values.ipvs.syncPeriod }} + {{ if .Values.ipvs.tcpFinTimeout }} + tcpFinTimeout: {{ .Values.ipvs.tcpFinTimeout }} + {{ end }} + {{ if .Values.ipvs.tcpTimeout }} + tcpTimeout: {{ .Values.ipvs.tcpTimeout }} + {{ end }} + {{ if .Values.ipvs.udpTimeout }} + udpTimeout: {{ .Values.ipvs.udpTimeout }} + {{ end }} + kind: KubeProxyConfiguration + metricsBindAddress: {{ .Values.metricsBindAddress | quote }} + mode: {{ .Values.proxy.mode | quote }} + nodePortAddresses: null + oomScoreAdj: {{ .Values.oomScoreAdj }} + portRange: {{ .Values.proxy.portRange | quote }} + showHiddenMetricsForVersion: {{ .Values.showHiddenMetricsForVersion | quote }} + udpIdleTimeout: {{ .Values.udpTimeout | quote }} + featureGates: + {{- range $key, $value := .Values.featureGates }} + {{ $key }}: {{ $value }} + {{- end }} + winkernel: + enableDSR: false + networkName: "" + sourceVip: "" +kind: ConfigMap +metadata: + labels: + app: kube-proxy + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/daemonset.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/daemonset.yaml new file mode 100755 index 0000000..1267df8 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/daemonset.yaml @@ -0,0 +1,78 @@ +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-proxy + name: kube-proxy + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-proxy + template: + metadata: + labels: + k8s-app: kube-proxy + spec: + containers: + - command: + - /usr/local/bin/kube-proxy + - --config=/var/lib/kube-proxy/config.conf + - --hostname-override=$(NODE_NAME) + env: + - name: NODE_NAME + valueFrom: + fieldRef: + apiVersion: v1 + fieldPath: spec.nodeName + image: {{ template "system_default_registry" . }}{{ .Values.image.repository }}:{{ .Values.image.tag }} + imagePullPolicy: IfNotPresent + name: kube-proxy + securityContext: + privileged: true + volumeMounts: + - mountPath: /var/lib/kube-proxy + name: kube-proxy + - mountPath: {{ template "rke2_data_dir" . }}/agent + name: rke2config + readOnly: true + - mountPath: /run/xtables.lock + name: xtables-lock + - mountPath: /lib/modules + name: lib-modules + readOnly: true + dnsPolicy: ClusterFirst + hostNetwork: true + nodeSelector: + kubernetes.io/os: linux + priorityClassName: system-node-critical + restartPolicy: Always + schedulerName: default-scheduler + securityContext: {} + serviceAccount: kube-proxy + serviceAccountName: kube-proxy + terminationGracePeriodSeconds: 30 + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - operator: Exists + volumes: + - hostPath: + path: {{ template "rke2_data_dir" . }}/agent + type: "" + name: rke2config + - configMap: + name: kube-proxy + name: kube-proxy + - hostPath: + path: /run/xtables.lock + type: FileOrCreate + name: xtables-lock + - hostPath: + path: /lib/modules + type: "" + name: lib-modules + updateStrategy: + rollingUpdate: + maxUnavailable: 1 + type: RollingUpdate diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/rbac.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/rbac.yaml new file mode 100755 index 0000000..d98f84c --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/rbac.yaml @@ -0,0 +1,12 @@ +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRoleBinding +metadata: + name: rke2:node-proxier +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:node-proxier +subjects: +- kind: ServiceAccount + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/serviceaccount.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/serviceaccount.yaml new file mode 100755 index 0000000..59408a2 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/templates/serviceaccount.yaml @@ -0,0 +1,5 @@ +kind: ServiceAccount +apiVersion: v1 +metadata: + name: kube-proxy + namespace: kube-system diff --git a/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/values.yaml b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/values.yaml new file mode 100755 index 0000000..e4cb8a7 --- /dev/null +++ b/charts/rke2-kube-proxy-1.21/rke2-kube-proxy/v1.21.2-build2021061702/values.yaml @@ -0,0 +1,142 @@ +--- + +# image for kubeproxy +image: + repository: rancher/hardened-kube-proxy + tag: v1.21.2-build20210714 + +# The IP address for the proxy server to serve on +# (set to '0.0.0.0' for all IPv4 interfaces and '::' for all IPv6 interfaces) +bindAddress: 0.0.0.0 + +# If true cleanup iptables and ipvs rules and exit. +cleanup: + +# The CIDR range of pods in the cluster. +# When configured, traffic sent to a Service cluster IP from outside this range +# will be masqueraded and traffic sent from pods to an external +# LoadBalancer IP will be directed to the respective cluster IP instead +clusterCIDR: 10.42.0.0/16 + +# The path to the configuration file. +config: + +# How often configuration from the apiserver is refreshed. Must be greater than 0. +configSyncPeriod: 15m0s + +conntrack: + # Maximum number of NAT connections to track per CPU core (0 to leave the limit as-is and ignore conntrack-min). + maxPerCore: 32768 + # Minimum number of conntrack entries to allocate, regardless of conntrack-max-per-core (set conntrack-max-per-core=0 to leave the limit as-is). + min: 131072 + # NAT timeout for TCP connections in the CLOSE_WAIT state + tcpTimeoutCloseWait: 1h0m0s + # Idle timeout for established TCP connections (0 to leave as-is) + tcpTimeoutEstablished: 24h0m0s + +# Mode to use to detect local traffic +detectLocalMode: + +# A set of key=value pairs that describe feature gates for alpha/experimental features: +featureGates: + +# The IP address with port for the health check server to serve on +# (set to '0.0.0.0:10256' for all IPv4 interfaces and '[::]:10256' for all IPv6 interfaces). Set empty to disable. +healthzBindAddress: 0.0.0.0:10256 + +# help for kube-proxy +help: + +# If non-empty, will use this string as identification instead of the actual hostname. +hostnameOverride: + +iptables: + # If using the pure iptables proxy, SNAT all traffic sent via Service cluster IPs (this not commonly needed) + masqueradeAll: + # If using the pure iptables proxy, the bit of the fwmark space to mark packets requiring SNAT with. Must be within the range [0, 31]. + masqueradeBit: 14 + # The minimum interval of how often the iptables rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The maximum interval of how often iptables rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + +ipvs: + # A comma-separated list of CIDR's which the ipvs proxier should not touch when cleaning up IPVS rules. + excludeCidrs: + # The minimum interval of how often the ipvs rules can be refreshed as endpoints and services change (e.g. '5s', '1m', '2h22m'). + minSyncPeriod: + # The ipvs scheduler type when proxy mode is ipvs + scheduler: + # Enable strict ARP by setting arp_ignore to 1 and arp_announce to 2 + strictArp: + # The maximum interval of how often ipvs rules are refreshed (e.g. '5s', '1m', '2h22m'). Must be greater than 0. + syncPeriod: 30s + # The timeout for idle IPVS TCP connections, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpTimeout: + # The timeout for IPVS TCP connections after receiving a FIN packet, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + tcpfinTimeout: + # The timeout for IPVS UDP packets, 0 to leave as-is. (e.g. '5s', '1m', '2h22m'). + udpTimeout: + + +clientConnection: + # Burst to use while talking with kubernetes apiserver + apiBurst: 10 + # Content type of requests sent to apiserver. + apiContentType: + # QPS to use while talking with kubernetes apiserver + qps: 5 + # Path to kubeconfig file with authorization information (the master location is set by the master flag). + kubeconfig: /var/lib/rancher/rke2/agent/kubeproxy.kubeconfig + +# Maximum number of seconds between log flushes +logFlushFrequency: 5s + + + +# The address of the Kubernetes API server (overrides any value in kubeconfig) +master: + +# The IP address with port for the metrics server to serve on +# (set to '0.0.0.0:10249' for all IPv4 interfaces and '[::]:10249' for all IPv6 interfaces). Set empty to disable. +metricsBindAddress: 127.0.0.1:10249 + +# A string slice of values which specify the addresses to use for NodePorts. +# Values may be valid IP blocks (e.g. 1.2.3.0/24, 1.2.3.4/32). The default empty string slice ([]) means to use all local addresses. +nodeportAddresses: + +# The oom-score-adj value for kube-proxy process. Values must be within the range [-1000, 1000] +oomScoreAdj: -999 + +# If true enables profiling via web interface on /debug/pprof handler. +profiling: + +proxy: + # Which proxy mode to use: 'userspace' (older) or 'iptables' (faster) or 'ipvs'. + # If blank, use the best-available proxy (currently iptables). + # If the iptables proxy is selected, regardless of how, but the system's + # kernel or iptables versions are insufficient, this always falls back to the userspace proxy. + mode: +# Range of host ports (beginPort-endPort, single port or beginPort+offset, inclusive) +# that may be consumed in order to proxy service traffic. +# If (unspecified, 0, or 0-0) then ports will be randomly chosen. + portRange: + +# The previous version for which you want to show hidden metrics. +# Only the previous minor version is meaningful, other values will not be allowed. +# The format is ., e.g.: '1.16'. The purpose of this format is make +# sure you have the opportunity to notice if the next release hides additional metrics, +# rather than being surprised when they are permanently removed in the release after that. +showHiddenMetricsForVersion: + +# How long an idle UDP connection will be kept open (e.g. '250ms', '2s'). +# Must be greater than 0. Only applicable for proxy-mode=userspace +udpTimeout: 250ms + +# Print version information and quit +version: + +# If set, write the default configuration values to this file and exit. +writeConfigTo: +global: + systemDefaultRegistry: "" diff --git a/index.yaml b/index.yaml index 390789d..f980604 100755 --- a/index.yaml +++ b/index.yaml @@ -871,6 +871,22 @@ entries: - assets/rke2-ingress-nginx/rke2-ingress-nginx-1.36.300.tgz version: 1.36.300 rke2-kube-proxy: + - apiVersion: v1 + appVersion: v1.21.2 + created: "2021-07-14T18:19:28.755541705Z" + description: Install Kube Proxy. + digest: 578c6742a3e5753a68c3d90da821322c1370cf29f9dce0b7f05af3d092ec081e + keywords: + - kube-proxy + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-kube-proxy + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-kube-proxy-1.21/rke2-kube-proxy-v1.21.2-build2021061702.tgz + version: v1.21.2-build2021061702 - apiVersion: v1 appVersion: v1.21.2 created: "2021-06-17T21:53:53.462383755Z" @@ -967,6 +983,22 @@ entries: urls: - assets/rke2-kube-proxy/rke2-kube-proxy-v1.21.0-build2021041301.tgz version: v1.21.0-build2021041301 + - apiVersion: v1 + appVersion: v1.20.8 + created: "2021-07-14T18:19:28.753782893Z" + description: Install Kube Proxy. + digest: dae2ccc6b982171544341a0d0d7802ea274827f0e16dae536d106c4db0e48b96 + keywords: + - kube-proxy + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-kube-proxy + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-kube-proxy-1.20/rke2-kube-proxy-v1.20.8-build2021061702.tgz + version: v1.20.8-build2021061702 - apiVersion: v1 appVersion: v1.20.8 created: "2021-06-17T21:46:49.934953089Z" @@ -1127,6 +1159,22 @@ entries: urls: - assets/rke2-kube-proxy/rke2-kube-proxy-v1.19.801.tgz version: v1.19.801 + - apiVersion: v1 + appVersion: v1.19.12 + created: "2021-07-14T18:19:28.751967281Z" + description: Install Kube Proxy. + digest: f40fc32b62eaf8cbbb753396d787f1a8bb301002f4e133b524d94e7e9e317f5c + keywords: + - kube-proxy + maintainers: + - email: charts@rancher.com + name: Rancher Labs + name: rke2-kube-proxy + sources: + - https://github.com/rancher/rke2-charts + urls: + - assets/rke2-kube-proxy-1.19/rke2-kube-proxy-v1.19.12-build2021061702.tgz + version: v1.19.12-build2021061702 - apiVersion: v1 appVersion: v1.19.12 created: "2021-06-17T21:44:40.452226797Z"