Search Options

Results per page
Sort
Preferred Languages
Advance

Results 1 - 6 of 6 for RootlessControlPlane (0.37 sec)

  1. cmd/kubeadm/app/features/features.go

    	"k8s.io/component-base/featuregate"
    	"k8s.io/klog/v2"
    )
    
    const (
    	// PublicKeysECDSA is expected to be alpha in v1.19
    	PublicKeysECDSA = "PublicKeysECDSA"
    	// RootlessControlPlane is expected to be in alpha in v1.22
    	RootlessControlPlane = "RootlessControlPlane"
    	// EtcdLearnerMode is expected to be in alpha in v1.27, beta in v1.29
    	EtcdLearnerMode = "EtcdLearnerMode"
    	// WaitForAllControlPlaneComponents is expected to be alpha in v1.30
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Mon May 20 13:55:11 UTC 2024
    - 6.1K bytes
    - Viewed (0)
  2. cmd/kubeadm/app/cmd/phases/reset/cleanupnode.go

    		dirsToClean = append(dirsToClean, tempDir)
    	}
    	resetConfigDir(kubeadmconstants.KubernetesDir, dirsToClean, r.DryRun())
    
    	if r.Cfg() != nil && features.Enabled(r.Cfg().FeatureGates, features.RootlessControlPlane) {
    		if !r.DryRun() {
    			klog.V(1).Infoln("[reset] Removing users and groups created for rootless control-plane")
    			if err := users.RemoveUsersAndGroups(); err != nil {
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed May 29 06:58:01 UTC 2024
    - 7.1K bytes
    - Viewed (0)
  3. cmd/kubeadm/app/phases/controlplane/manifests.go

    	klog.V(1).Infoln("[control-plane] getting StaticPodSpecs")
    	specs := GetStaticPodSpecs(cfg, endpoint, nil)
    
    	var usersAndGroups *users.UsersAndGroups
    	var err error
    	if features.Enabled(cfg.FeatureGates, features.RootlessControlPlane) {
    		if isDryRun {
    			fmt.Printf("[control-plane] Would create users and groups for %+v to run as non-root\n", componentNames)
    		} else {
    			usersAndGroups, err = staticpodutil.GetUsersAndGroups()
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Sun Mar 03 14:43:47 UTC 2024
    - 17.8K bytes
    - Viewed (0)
  4. cmd/kubeadm/app/phases/etcd/local.go

    	spec := GetEtcdPodSpec(cfg, endpoint, nodeName, initialCluster)
    
    	var usersAndGroups *users.UsersAndGroups
    	var err error
    	if features.Enabled(cfg.FeatureGates, features.RootlessControlPlane) {
    		if isDryRun {
    			fmt.Printf("[etcd] Would create users and groups for %q to run as non-root\n", kubeadmconstants.Etcd)
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Apr 23 14:07:27 UTC 2024
    - 13.8K bytes
    - Viewed (1)
  5. CHANGELOG/CHANGELOG-1.31.md

    - Kubeadm: deprecated the kubeadm `RootlessControlPlane` feature gate (previously alpha), given that the core K8s `UserNamespacesSupport` feature gate graduated to Beta in 1.30.
      Once core Kubernetes support for user namespaces is generally available and kubeadm has started to support running the control plane in userns pods, the kubeadm `RootlessControlPlane` feature gate will be removed entirely.
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Wed Jun 12 20:34:14 UTC 2024
    - 60.3K bytes
    - Viewed (0)
  6. CHANGELOG/CHANGELOG-1.22.md

    A new alpha feature allows running the kubeadm control plane components as non-root users. This is a long requested security measure in kubeadm. To try it you must enable the kubeadm-specific `RootlessControlPlane` feature gate. When you deploy a cluster using this alpha feature, your control plane runs with lower privileges.
    
    Registered: Sat Jun 15 01:39:40 UTC 2024
    - Last Modified: Tue Dec 13 12:43:45 UTC 2022
    - 454.1K bytes
    - Viewed (0)
Back to top