K8s kubeadm configuration file reference for v1.15.0

@[TOC]K8s kubeadm v1.15.0

all the extraArgs for etcd in ClusterConfiguration (local etcd)

advertise-client-urls=https://10.187.14.177:2379
cert-file=/etc/kubernetes/pki/etcd/server.crt
client-cert-auth=true
data-dir=/var/lib/etcd
initial-advertise-peer-urls=https://10.187.14.177:2380
initial-cluster=dpydalpd0101.sl.bluecloud.xxx.com=https://10.187.14.177:2380
key-file=/etc/kubernetes/pki/etcd/server.key
listen-client-urls=https://10.187.14.177:2379
listen-peer-urls=https://10.187.14.177:2380
name=dpydalpd0101.sl.bluecloud.xxx.com
peer-cert-file=/etc/kubernetes/pki/etcd/peer.crt
peer-client-cert-auth=true
peer-key-file=/etc/kubernetes/pki/etcd/peer.key
peer-trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt
snapshot-count=10000
trusted-ca-file=/etc/kubernetes/pki/etcd/ca.crt

all the extraArgs for apiServer in ClusterConfiguration

advertise-address=10.187.14.177
allow-privileged=true
apiserver-count=3
authorization-mode=Node,RBAC
client-ca-file=/etc/kubernetes/pki/ca.crt
enable-admission-plugins=NodeRestriction
enable-bootstrap-token-auth=true
etcd-cafile=/etc/kubernetes/pki/etcd/ca.crt
etcd-certfile=/etc/kubernetes/pki/apiserver-etcd-client.crt
etcd-keyfile=/etc/kubernetes/pki/apiserver-etcd-client.key
etcd-servers=https://127.0.0.1:2379
insecure-port=0
kubelet-client-certificate=/etc/kubernetes/pki/apiserver-kubelet-client.crt
kubelet-client-key=/etc/kubernetes/pki/apiserver-kubelet-client.key
kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname
proxy-client-cert-file=/etc/kubernetes/pki/front-proxy-client.crt
proxy-client-key-file=/etc/kubernetes/pki/front-proxy-client.key
requestheader-allowed-names=front-proxy-client
requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt
requestheader-extra-headers-prefix=X-Remote-Extra-
requestheader-group-headers=X-Remote-Group
requestheader-username-headers=X-Remote-User
secure-port=6443
service-account-key-file=/etc/kubernetes/pki/sa.pub
service-cluster-ip-range=172.17.0.0/16
tls-cert-file=/etc/kubernetes/pki/apiserver.crt
tls-private-key-file=/etc/kubernetes/pki/apiserver.key

all the extraArgs for controllerManager in ClusterConfiguration

allocate-node-cidrs=true
authentication-kubeconfig=/etc/kubernetes/controller-manager.conf
authorization-kubeconfig=/etc/kubernetes/controller-manager.conf
bind-address=127.0.0.1
client-ca-file=/etc/kubernetes/pki/ca.crt
cluster-cidr=10.244.0.0/16
cluster-signing-cert-file=/etc/kubernetes/pki/ca.crt
cluster-signing-key-file=/etc/kubernetes/pki/ca.key
controllers=*,bootstrapsigner,tokencleaner
kubeconfig=/etc/kubernetes/controller-manager.conf
leader-elect=true
node-cidr-mask-size=20
requestheader-client-ca-file=/etc/kubernetes/pki/front-proxy-ca.crt
root-ca-file=/etc/kubernetes/pki/ca.crt
service-account-private-key-file=/etc/kubernetes/pki/sa.key
use-service-account-credentials=true

all the extraArgs for scheduler in ClusterConfiguration

address=10.187.14.177
bind-address=127.0.0.1
kubeconfig=/etc/kubernetes/scheduler.conf
leader-elect=true

你可能感兴趣的:(Kubernetes,Kubernetes,Kubeadm,v1.15.0)