forked from kubebn/talos-proxmox-kaas
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathworker.yaml.tpl
102 lines (102 loc) · 2.87 KB
/
worker.yaml.tpl
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
machine:
nodeLabels:
node.cloudprovider.kubernetes.io/platform: proxmox
topology.kubernetes.io/region: ${px_region}
topology.kubernetes.io/zone: ${px_node}
kubelet:
defaultRuntimeSeccompProfileEnabled: true # Enable container runtime default Seccomp profile.
disableManifestsDirectory: true # The `disableManifestsDirectory` field configures the kubelet to get static pod manifests from the /etc/kubernetes/manifests directory.
extraArgs:
cloud-provider: external
rotate-server-certificates: true
node-labels: "project.io/node-pool=worker"
clusterDNS:
- 169.254.2.53
- ${cidrhost(split(",",serviceSubnets)[0], 10)}
network:
hostname: "${hostname}"
interfaces:
- interface: eth0
addresses:
- ${ipv4_local}/24
- interface: dummy0
addresses:
- 169.254.2.53/32
extraHostEntries:
- ip: ${ipv4_vip}
aliases:
- ${apiDomain}
nameservers:
- 1.1.1.1
- 8.8.8.8
kubespan:
enabled: false
install:
disk: /dev/sda
image: ghcr.io/siderolabs/installer:${talos-version}
bootloader: true
wipe: false
sysctls:
net.core.somaxconn: 65535
net.core.netdev_max_backlog: 4096
systemDiskEncryption:
state:
provider: luks2
options:
- no_read_workqueue
- no_write_workqueue
keys:
- nodeID: {}
slot: 0
ephemeral:
provider: luks2
options:
- no_read_workqueue
- no_write_workqueue
keys:
- nodeID: {}
slot: 0
time:
servers:
- time.cloudflare.com
# Features describe individual Talos features that can be switched on or off.
features:
rbac: true # Enable role-based access control (RBAC).
stableHostname: true # Enable stable default hostname.
apidCheckExtKeyUsage: true # Enable checks for extended key usage of client certificates in apid.
kernel:
modules:
- name: br_netfilter
parameters:
- nf_conntrack_max=131072
registries:
mirrors:
docker.io:
endpoints:
- http://${registry-endpoint}/v2/proxy-docker.io
overridePath: true
ghcr.io:
endpoints:
- http://${registry-endpoint}/v2/proxy-ghcr.io
overridePath: true
gcr.io:
endpoints:
- http://${registry-endpoint}/v2/proxy-gcr.io
overridePath: true
registry.k8s.io:
endpoints:
- http://${registry-endpoint}/v2/proxy-registry.k8s.io
overridePath: true
quay.io:
endpoints:
- http://${registry-endpoint}/v2/proxy-quay.io
overridePath: true
cluster:
controlPlane:
endpoint: https://${apiDomain}:6443
network:
dnsDomain: ${domain}
podSubnets: ${format("%#v",split(",",podSubnets))}
serviceSubnets: ${format("%#v",split(",",serviceSubnets))}
proxy:
disabled: true