We don't want to pull public container images that already exist. This creates prevents pods from starting if there is any connectivity issue with the upstream registry.
57 lines
1.8 KiB
YAML
57 lines
1.8 KiB
YAML
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
kind: Kustomization
|
|
|
|
resources:
|
|
- https://github.com/kubernetes/autoscaler/raw/cluster-autoscaler-release-1.26/cluster-autoscaler/cloudprovider/aws/examples/cluster-autoscaler-autodiscover.yaml
|
|
- secrets.yaml
|
|
|
|
images:
|
|
- name: k8s.gcr.io/autoscaling/cluster-autoscaler
|
|
newName: registry.k8s.io/autoscaling/cluster-autoscaler
|
|
newTag: v1.26.6
|
|
|
|
patches:
|
|
- patch: |-
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: cluster-autoscaler
|
|
namespace: kube-system
|
|
spec:
|
|
template:
|
|
spec:
|
|
containers:
|
|
- name: cluster-autoscaler
|
|
imagePullPolicy: IfNotPresent
|
|
command:
|
|
- ./cluster-autoscaler
|
|
- --v=4
|
|
- --stderrthreshold=info
|
|
- --cloud-provider=aws
|
|
- --skip-nodes-with-local-storage=false
|
|
- --expander=least-waste
|
|
- --node-group-auto-discovery=asg:tag=k8s.io/cluster-autoscaler/enabled,k8s.io/cluster-autoscaler/kubernetes
|
|
env:
|
|
- name: AWS_ACCESS_KEY_ID
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: access_key_id
|
|
name: autoscaler-aws-keys
|
|
- name: AWS_SECRET_ACCESS_KEY
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: secret_access_key
|
|
name: autoscaler-aws-keys
|
|
- name: AWS_REGION
|
|
value: us-east-2
|
|
volumeMounts:
|
|
nodeSelector:
|
|
node-role.kubernetes.io/control-plane: ''
|
|
tolerations:
|
|
- effect: NoSchedule
|
|
key: node-role.kubernetes.io/control-plane
|
|
operator: Exists
|
|
- effect: NoSchedule
|
|
key: node-role.kubernetes.io/master
|
|
operator: Exists
|