mirror of https://github.com/easzlab/kubeasz.git
add support for k8s v1.16
parent
f273f4f6fb
commit
347b554c8a
|
@ -90,7 +90,7 @@ subjects:
|
||||||
# ------------------- Dashboard Deployment ------------------- #
|
# ------------------- Dashboard Deployment ------------------- #
|
||||||
|
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
apiVersion: apps/v1beta2
|
apiVersion: apps/v1
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
k8s-app: kubernetes-dashboard
|
k8s-app: kubernetes-dashboard
|
||||||
|
|
|
@ -20,7 +20,7 @@ roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1beta1
|
apiVersion: apps/v1
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
metadata:
|
metadata:
|
||||||
name: heapster
|
name: heapster
|
||||||
|
|
|
@ -45,7 +45,7 @@ metadata:
|
||||||
app.kubernetes.io/part-of: ingress-nginx
|
app.kubernetes.io/part-of: ingress-nginx
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
name: nginx-ingress-clusterrole
|
name: nginx-ingress-clusterrole
|
||||||
|
@ -101,7 +101,7 @@ rules:
|
||||||
- update
|
- update
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: Role
|
kind: Role
|
||||||
metadata:
|
metadata:
|
||||||
name: nginx-ingress-role
|
name: nginx-ingress-role
|
||||||
|
@ -146,7 +146,7 @@ rules:
|
||||||
- get
|
- get
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: RoleBinding
|
kind: RoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: nginx-ingress-role-nisa-binding
|
name: nginx-ingress-role-nisa-binding
|
||||||
|
@ -164,7 +164,7 @@ subjects:
|
||||||
namespace: ingress-nginx
|
namespace: ingress-nginx
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: nginx-ingress-clusterrole-nisa-binding
|
name: nginx-ingress-clusterrole-nisa-binding
|
||||||
|
@ -182,7 +182,7 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: apps/v1
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
metadata:
|
metadata:
|
||||||
name: nginx-ingress-controller
|
name: nginx-ingress-controller
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
# kubectl run test-hello --image=nginx --expose --port=80
|
# kubectl run test-hello --image=nginx --expose --port=80
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: networking.k8s.io/v1beta1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: test-hello
|
name: test-hello
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: networking.k8s.io/v1beta1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: hello-tls-ingress
|
name: hello-tls-ingress
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: networking.k8s.io/v1beta1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: kubernetes-dashboard
|
name: kubernetes-dashboard
|
||||||
|
|
|
@ -25,7 +25,7 @@ data:
|
||||||
KeyFile = "/ssl/tls.key"
|
KeyFile = "/ssl/tls.key"
|
||||||
---
|
---
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
apiVersion: apps/v1beta1
|
apiVersion: apps/v1
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-ingress-controller
|
name: traefik-ingress-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
|
|
|
@ -44,7 +44,7 @@ metadata:
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
---
|
---
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
apiVersion: apps/v1beta1
|
apiVersion: apps/v1
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-ingress-controller
|
name: traefik-ingress-controller
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
---
|
---
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: networking.k8s.io/v1beta1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: traefik-web-ui
|
name: traefik-web-ui
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
# kubectl run whoami --image=emilevauge/whoami --port=80 --expose
|
# kubectl run whoami --image=emilevauge/whoami --port=80 --expose
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: networking.k8s.io/v1beta1
|
||||||
kind: Ingress
|
kind: Ingress
|
||||||
metadata:
|
metadata:
|
||||||
name: test-whoami
|
name: test-whoami
|
||||||
|
|
|
@ -1,8 +1,10 @@
|
||||||
---
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: metrics-server:system:auth-delegator
|
name: metrics-server:system:auth-delegator
|
||||||
|
labels:
|
||||||
|
kubernetes.io/cluster-service: "true"
|
||||||
|
addonmanager.kubernetes.io/mode: Reconcile
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
|
|
|
@ -1,9 +1,11 @@
|
||||||
---
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
|
||||||
kind: RoleBinding
|
kind: RoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: metrics-server-auth-reader
|
name: metrics-server-auth-reader
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
|
labels:
|
||||||
|
kubernetes.io/cluster-service: "true"
|
||||||
|
addonmanager.kubernetes.io/mode: Reconcile
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: Role
|
kind: Role
|
||||||
|
|
|
@ -1,8 +1,10 @@
|
||||||
---
|
apiVersion: apiregistration.k8s.io/v1
|
||||||
apiVersion: apiregistration.k8s.io/v1beta1
|
|
||||||
kind: APIService
|
kind: APIService
|
||||||
metadata:
|
metadata:
|
||||||
name: v1beta1.metrics.k8s.io
|
name: v1beta1.metrics.k8s.io
|
||||||
|
labels:
|
||||||
|
kubernetes.io/cluster-service: "true"
|
||||||
|
addonmanager.kubernetes.io/mode: Reconcile
|
||||||
spec:
|
spec:
|
||||||
service:
|
service:
|
||||||
name: metrics-server
|
name: metrics-server
|
||||||
|
|
|
@ -1,16 +1,16 @@
|
||||||
---
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Service
|
kind: Service
|
||||||
metadata:
|
metadata:
|
||||||
name: metrics-server
|
name: metrics-server
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
labels:
|
labels:
|
||||||
kubernetes.io/name: "Metrics-server"
|
addonmanager.kubernetes.io/mode: Reconcile
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
kubernetes.io/name: "Metrics-server"
|
||||||
spec:
|
spec:
|
||||||
selector:
|
selector:
|
||||||
k8s-app: metrics-server
|
k8s-app: metrics-server
|
||||||
ports:
|
ports:
|
||||||
- port: 443
|
- port: 443
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
targetPort: 443
|
targetPort: https
|
||||||
|
|
|
@ -1,15 +1,16 @@
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
name: system:metrics-server
|
name: system:metrics-server
|
||||||
|
labels:
|
||||||
|
kubernetes.io/cluster-service: "true"
|
||||||
|
addonmanager.kubernetes.io/mode: Reconcile
|
||||||
rules:
|
rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- pods
|
- pods
|
||||||
- nodes
|
- nodes
|
||||||
- nodes/stats
|
|
||||||
- namespaces
|
- namespaces
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
|
@ -22,12 +23,16 @@ rules:
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
- update
|
||||||
- watch
|
- watch
|
||||||
---
|
---
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
name: system:metrics-server
|
name: system:metrics-server
|
||||||
|
labels:
|
||||||
|
kubernetes.io/cluster-service: "true"
|
||||||
|
addonmanager.kubernetes.io/mode: Reconcile
|
||||||
roleRef:
|
roleRef:
|
||||||
apiGroup: rbac.authorization.k8s.io
|
apiGroup: rbac.authorization.k8s.io
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
|
|
|
@ -41,7 +41,7 @@ spec:
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: apps/v1beta1
|
apiVersion: apps/v1
|
||||||
kind: Deployment
|
kind: Deployment
|
||||||
metadata:
|
metadata:
|
||||||
name: kube-dns
|
name: kube-dns
|
||||||
|
|
|
@ -1,9 +1,60 @@
|
||||||
---
|
---
|
||||||
|
apiVersion: policy/v1beta1
|
||||||
|
kind: PodSecurityPolicy
|
||||||
|
metadata:
|
||||||
|
name: psp.flannel.unprivileged
|
||||||
|
annotations:
|
||||||
|
seccomp.security.alpha.kubernetes.io/allowedProfileNames: docker/default
|
||||||
|
seccomp.security.alpha.kubernetes.io/defaultProfileName: docker/default
|
||||||
|
apparmor.security.beta.kubernetes.io/allowedProfileNames: runtime/default
|
||||||
|
apparmor.security.beta.kubernetes.io/defaultProfileName: runtime/default
|
||||||
|
spec:
|
||||||
|
privileged: false
|
||||||
|
volumes:
|
||||||
|
- configMap
|
||||||
|
- secret
|
||||||
|
- emptyDir
|
||||||
|
- hostPath
|
||||||
|
allowedHostPaths:
|
||||||
|
- pathPrefix: "/etc/cni/net.d"
|
||||||
|
- pathPrefix: "/etc/kube-flannel"
|
||||||
|
- pathPrefix: "/run/flannel"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
# Users and groups
|
||||||
|
runAsUser:
|
||||||
|
rule: RunAsAny
|
||||||
|
supplementalGroups:
|
||||||
|
rule: RunAsAny
|
||||||
|
fsGroup:
|
||||||
|
rule: RunAsAny
|
||||||
|
# Privilege Escalation
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
defaultAllowPrivilegeEscalation: false
|
||||||
|
# Capabilities
|
||||||
|
allowedCapabilities: ['NET_ADMIN']
|
||||||
|
defaultAddCapabilities: []
|
||||||
|
requiredDropCapabilities: []
|
||||||
|
# Host namespaces
|
||||||
|
hostPID: false
|
||||||
|
hostIPC: false
|
||||||
|
hostNetwork: true
|
||||||
|
hostPorts:
|
||||||
|
- min: 0
|
||||||
|
max: 65535
|
||||||
|
# SELinux
|
||||||
|
seLinux:
|
||||||
|
# SELinux is unsed in CaaSP
|
||||||
|
rule: 'RunAsAny'
|
||||||
|
---
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
metadata:
|
metadata:
|
||||||
name: flannel
|
name: flannel
|
||||||
rules:
|
rules:
|
||||||
|
- apiGroups: ['extensions']
|
||||||
|
resources: ['podsecuritypolicies']
|
||||||
|
verbs: ['use']
|
||||||
|
resourceNames: ['psp.flannel.unprivileged']
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
|
@ -25,7 +76,7 @@ rules:
|
||||||
- patch
|
- patch
|
||||||
---
|
---
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1beta1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
metadata:
|
metadata:
|
||||||
name: flannel
|
name: flannel
|
||||||
roleRef:
|
roleRef:
|
||||||
|
@ -55,6 +106,7 @@ data:
|
||||||
cni-conf.json: |
|
cni-conf.json: |
|
||||||
{
|
{
|
||||||
"name": "cbr0",
|
"name": "cbr0",
|
||||||
|
"cniVersion": "0.3.1",
|
||||||
"plugins": [
|
"plugins": [
|
||||||
{
|
{
|
||||||
"type": "flannel",
|
"type": "flannel",
|
||||||
|
@ -82,7 +134,7 @@ data:
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
---
|
---
|
||||||
apiVersion: extensions/v1beta1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
name: kube-flannel-ds-amd64
|
name: kube-flannel-ds-amd64
|
||||||
|
@ -91,15 +143,29 @@ metadata:
|
||||||
tier: node
|
tier: node
|
||||||
app: flannel
|
app: flannel
|
||||||
spec:
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: flannel
|
||||||
template:
|
template:
|
||||||
metadata:
|
metadata:
|
||||||
labels:
|
labels:
|
||||||
tier: node
|
tier: node
|
||||||
app: flannel
|
app: flannel
|
||||||
spec:
|
spec:
|
||||||
|
affinity:
|
||||||
|
nodeAffinity:
|
||||||
|
requiredDuringSchedulingIgnoredDuringExecution:
|
||||||
|
nodeSelectorTerms:
|
||||||
|
- matchExpressions:
|
||||||
|
- key: beta.kubernetes.io/os
|
||||||
|
operator: In
|
||||||
|
values:
|
||||||
|
- linux
|
||||||
|
- key: beta.kubernetes.io/arch
|
||||||
|
operator: In
|
||||||
|
values:
|
||||||
|
- amd64
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
nodeSelector:
|
|
||||||
beta.kubernetes.io/arch: amd64
|
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
effect: NoSchedule
|
effect: NoSchedule
|
||||||
|
@ -134,7 +200,9 @@ spec:
|
||||||
cpu: "100m"
|
cpu: "100m"
|
||||||
memory: "50Mi"
|
memory: "50Mi"
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: false
|
||||||
|
capabilities:
|
||||||
|
add: ["NET_ADMIN"]
|
||||||
env:
|
env:
|
||||||
- name: POD_NAME
|
- name: POD_NAME
|
||||||
valueFrom:
|
valueFrom:
|
||||||
|
@ -146,13 +214,13 @@ spec:
|
||||||
fieldPath: metadata.namespace
|
fieldPath: metadata.namespace
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: run
|
- name: run
|
||||||
mountPath: /run
|
mountPath: /run/flannel
|
||||||
- name: flannel-cfg
|
- name: flannel-cfg
|
||||||
mountPath: /etc/kube-flannel/
|
mountPath: /etc/kube-flannel/
|
||||||
volumes:
|
volumes:
|
||||||
- name: run
|
- name: run
|
||||||
hostPath:
|
hostPath:
|
||||||
path: /run
|
path: /run/flannel
|
||||||
- name: cni
|
- name: cni
|
||||||
hostPath:
|
hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
|
|
|
@ -57,17 +57,6 @@
|
||||||
- kube-scheduler.service
|
- kube-scheduler.service
|
||||||
tags: restart_master, upgrade_k8s
|
tags: restart_master, upgrade_k8s
|
||||||
|
|
||||||
# 为兼容v1.8版本,配置不同 kube-apiserver的systemd unit文件
|
|
||||||
- name: 获取 k8s 版本信息
|
|
||||||
shell: "{{ bin_dir }}/kube-apiserver --version"
|
|
||||||
register: k8s_ver
|
|
||||||
tags: restart_master, upgrade_k8s
|
|
||||||
|
|
||||||
- name: 创建kube-apiserver v1.8的systemd unit文件
|
|
||||||
template: src=kube-apiserver-v1.8.service.j2 dest=/etc/systemd/system/kube-apiserver.service
|
|
||||||
tags: restart_master, upgrade_k8s
|
|
||||||
when: "'v1.8' in k8s_ver.stdout"
|
|
||||||
|
|
||||||
- name: enable master 服务
|
- name: enable master 服务
|
||||||
shell: systemctl enable kube-apiserver kube-controller-manager kube-scheduler
|
shell: systemctl enable kube-apiserver kube-controller-manager kube-scheduler
|
||||||
ignore_errors: true
|
ignore_errors: true
|
||||||
|
|
|
@ -1,54 +0,0 @@
|
||||||
[Unit]
|
|
||||||
Description=Kubernetes API Server
|
|
||||||
Documentation=https://github.com/GoogleCloudPlatform/kubernetes
|
|
||||||
After=network.target
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart={{ bin_dir }}/kube-apiserver \
|
|
||||||
--admission-control=NamespaceLifecycle,LimitRanger,ServiceAccount,DefaultStorageClass,ResourceQuota,NodeRestriction \
|
|
||||||
--advertise-address={{ inventory_hostname }} \
|
|
||||||
--bind-address={{ inventory_hostname }} \
|
|
||||||
--insecure-bind-address=127.0.0.1 \
|
|
||||||
--authorization-mode=Node,RBAC \
|
|
||||||
--kubelet-https=true \
|
|
||||||
--kubelet-client-certificate={{ ca_dir }}/admin.pem \
|
|
||||||
--kubelet-client-key={{ ca_dir }}/admin-key.pem \
|
|
||||||
--anonymous-auth=false \
|
|
||||||
{% if BASIC_AUTH_ENABLE == "yes" %}
|
|
||||||
--basic-auth-file={{ ca_dir }}/basic-auth.csv \
|
|
||||||
{% endif %}
|
|
||||||
--service-cluster-ip-range={{ SERVICE_CIDR }} \
|
|
||||||
--service-node-port-range={{ NODE_PORT_RANGE }} \
|
|
||||||
--tls-cert-file={{ ca_dir }}/kubernetes.pem \
|
|
||||||
--tls-private-key-file={{ ca_dir }}/kubernetes-key.pem \
|
|
||||||
--client-ca-file={{ ca_dir }}/ca.pem \
|
|
||||||
--service-account-key-file={{ ca_dir }}/ca-key.pem \
|
|
||||||
--etcd-cafile={{ ca_dir }}/ca.pem \
|
|
||||||
--etcd-certfile={{ ca_dir }}/kubernetes.pem \
|
|
||||||
--etcd-keyfile={{ ca_dir }}/kubernetes-key.pem \
|
|
||||||
--etcd-servers={{ ETCD_ENDPOINTS }} \
|
|
||||||
--enable-swagger-ui=true \
|
|
||||||
--apiserver-count={% if DEPLOY_MODE == "multi-master" %}{{ groups['kube-master']|length }}{% else %}1{% endif %} \
|
|
||||||
--allow-privileged=true \
|
|
||||||
--audit-log-maxage=30 \
|
|
||||||
--audit-log-maxbackup=3 \
|
|
||||||
--audit-log-maxsize=100 \
|
|
||||||
--audit-log-path=/var/lib/audit.log \
|
|
||||||
--event-ttl=1h \
|
|
||||||
--requestheader-client-ca-file={{ ca_dir }}/ca.pem \
|
|
||||||
--requestheader-allowed-names= \
|
|
||||||
--requestheader-extra-headers-prefix=X-Remote-Extra- \
|
|
||||||
--requestheader-group-headers=X-Remote-Group \
|
|
||||||
--requestheader-username-headers=X-Remote-User \
|
|
||||||
--proxy-client-cert-file={{ ca_dir }}/aggregator-proxy.pem \
|
|
||||||
--proxy-client-key-file={{ ca_dir }}/aggregator-proxy-key.pem \
|
|
||||||
--enable-aggregator-routing=true \
|
|
||||||
--runtime-config=batch/v2alpha1=true \
|
|
||||||
--v=2
|
|
||||||
Restart=always
|
|
||||||
RestartSec=5
|
|
||||||
Type=notify
|
|
||||||
LimitNOFILE=65536
|
|
||||||
|
|
||||||
[Install]
|
|
||||||
WantedBy=multi-user.target
|
|
|
@ -1,5 +1,6 @@
|
||||||
{
|
{
|
||||||
"name": "mynet",
|
"name": "mynet",
|
||||||
|
"cniVersion": "0.3.1",
|
||||||
"type": "bridge",
|
"type": "bridge",
|
||||||
"bridge": "mynet0",
|
"bridge": "mynet0",
|
||||||
"isDefaultGateway": true,
|
"isDefaultGateway": true,
|
||||||
|
|
Loading…
Reference in New Issue