Product Name | Alternative Names | GitHub Repository | Description |
---|---|---|---|
Rancher | SUSE Rancher Prime, Rancher Manager | rancher/rancher | Enterprise Kubernetes management platform that enables organizations to run and manage Kubernetes clusters across any infrastructure. |
RKE | Rancher Kubernetes Engine | rancher/rke | An extremely simple, lightning fast Kubernetes distribution that runs entirely within containers. |
RKE2 | RKE Government | rancher/rke2 | A Kubernetes distribution focused on security and compliance for government agencies. |
K3s | Lightweight Kubernetes, k3OS | k3s-io/k3s | Purpose-built, lightweight Kubernetes distribution for edge and IoT use cases, fully managed by Kubernetes. |
Longhorn | SUSE Storage | longhorn/longhorn | Cloud-nativ |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
apiVersion: helm.cattle.io/v1 | |
kind: HelmChartConfig | |
metadata: | |
name: rke2-ingress-nginx | |
namespace: kube-system | |
spec: | |
valuesContent: |- | |
controller: | |
admissionWebhooks: |
kubectl get cluster.fleet.cattle.io/cluster-xxx765123 -n clusters -o jsonpath='{.metadata.labels}' | jq
{
"env": "opm-lab",
"fleet.cattle.io/cluster": "cluster-xxx765123",
"fleet.cattle.io/created-by-agent-pod": "fleet-agent-0",
"management.cattle.io/cluster-display-name": "r12700.F"
}
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
curl -sfL https://get.k3s.io |\ | |
INSTALL_K3S_VERSION="v1.30.6+k3s1" | |
INSTALL_K3S_EXEC="server --write-kubeconfig-mode=644 --cluster-cidr=10.78.0.0/16 --service-cidr=10.78.0.0/16 --cluster-init=true --kube-controller-manager-arg=node-cidr-mask=23 --kubelet-arg=max-pods=240" \ | |
sh -s - |
TS=`date -u +"%Y-%m-%d_%H%M"`
pprofs=( goroutine heap threadcreate block mutex )
for pod in $(kubectl -n cattle-system get pods --no-headers -l app=rancher -o custom-columns=":.metadata.name"); do
echo "getting profile for $pod..."
for pp in ${pprofs[@]}; do
echo "--> generating $pp..."
kubectl -n cattle-system exec $pod -c rancher -- curl -s http://localhost:6060/debug/pprof/$pp -o $pp
Using just a Calico CRD felixconfiguration
, instead of vxlan tunnel.
calicoctl patch felixconfiguration default --type='merge' -p '{"spec":{"wireguardEnabled":true}}'
This should only be enabled by direction from your professional services consultant on an as-needed basis after a thorough examination of the specific environmental factors.
This took a bit of digging to figure out. As it turns out, my lab ingress has evolved a little. This env may have had several ingress classes in the past.
- alpha env behind a LB with Let's Encrypt enabled
- the error is misleading, the api-resources are OK & pathType IS specified
- helm install works OK but won't touch ingress, keeps status as
failed
- even backing up ingress to make it net-new fails
NewerOlder