Kubernetes Configuration Options
When setting up your cluster.yml
for RKE, there are a lot of different options that can be configured to control the behavior of how RKE launches Kubernetes.
There are several options that can be configured in cluster configuration option. There are several example yamls that contain all the options.
Configuring Nodes
- Nodes
- Ignoring unsupported Docker versions
- Private Registries
- Cluster Level SSH Key Path
- SSH Agent
- Bastion Host
Configuring Kubernetes Cluster
- Cluster Name
- Kubernetes Version
- Prefix Path
- System Images
- Services
- Extra Args and Binds and Environment Variables
- External Etcd
- Authentication
- Authorization
- Rate Limiting
- Cloud Providers
- Audit Log
- Add-ons
Cluster Level Options
Cluster Name
By default, the name of your cluster will be local
. If you want a different name, you would use the cluster_name
directive to change the name of your cluster. The name will be set in your cluster's generated kubeconfig file.
cluster_name: mycluster
Supported Docker Versions
By default, RKE will check the installed Docker version on all hosts and fail with an error if the version is not supported by Kubernetes. The list of supported Docker versions is set specifically for each Kubernetes version in kontainer-driver-metadata depending on the RKE version used, as shown below. To override this behavior, set this option to true
. Refer to the following:
The default value is false
.
ignore_docker_version: true
Kubernetes Version
For information on upgrading Kubernetes, refer to the upgrade section.
Rolling back to previous Kubernetes versions is not supported.
Prefix Path
For some operating systems including ROS, and CoreOS, RKE stores its resources to a different prefix path, this prefix path is by default for these operating systems is:
/opt/rke
So /etc/kubernetes
will be stored in /opt/rke/etc/kubernetes
and /var/lib/etcd
will be stored in /opt/rke/var/lib/etcd
etc.
To change the default prefix path for any cluster, you can use the following option in the cluster configuration file cluster.yml
:
prefix_path: /opt/custom_path
Cluster Level SSH Key Path
RKE connects to host(s) using ssh
. Typically, each node will have an independent path for each ssh key, i.e. ssh_key_path
, in the nodes
section, but if you have a SSH key that is able to access all hosts in your cluster configuration file, you can set the path to that ssh key at the top level. Otherwise, you would set the ssh key path in the nodes.
If ssh key paths are defined at the cluster level and at the node level, the node-level key will take precedence.
ssh_key_path: ~/.ssh/test
SSH Agent
RKE supports using ssh connection configuration from a local ssh agent. The default value for this option is false
. If you want to set using a local ssh agent, you would set this to true
.
ssh_agent_auth: true
If you want to use an SSH private key with a passphrase, you will need to add your key to ssh-agent
and have the environment variable SSH_AUTH_SOCK
configured.
$ eval "$(ssh-agent -s)"
Agent pid 3975
$ ssh-add /home/user/.ssh/id_rsa
Enter passphrase for /home/user/.ssh/id_rsa:
Identity added: /home/user/.ssh/id_rsa (/home/user/.ssh/id_rsa)
$ echo $SSH_AUTH_SOCK
/tmp/ssh-118TMqxrXsEx/agent.3974
Add-ons Job Timeout
You can define add-ons to be deployed after the Kubernetes cluster comes up, which uses Kubernetes jobs. RKE will stop attempting to retrieve the job status after the timeout, which is in seconds. The default timeout value is 30
seconds.
cri-dockerd
Kubernetes will remove code in the kubelet that interacts with Docker (dockershim) in a future Kubernetes release. For more information, see Dockershim Deprecation FAQ: When will dockershim be removed?. The component that replaces this code is called cri-dockerd
and can be enabled using the following configuration:
enable_cri_dockerd: true