Control plane node | Minimum |
---|---|
CPU | 16 cores |
RAM | 64GB |
Disk space in /opt/anaconda | 500GB |
Disk space in /var/lib/rancher | 300GB |
Disk space in /tmp or $TMPDIR | 50GB |
/var/lib/rancher
is utilized as additional space to accommodate upgrades. Anaconda recommends having this available during installation./var/lib/rancher
volume must be mounted on local storage. Core components of Kubernetes run from this directory, some of which are extremely intolerant of disk latency. Therefore, Network-Attached Storage (NAS) and Storage Area Network (SAN) solutions are not supported for this volume./opt/anaconda
and /var/lib/rancher
partitions using Logical Volume Management (LVM) to provide the flexibility needed to accommodate future expansion./opt/anaconda
is utilized for project and package storage (including mirrored packages).Worker node | Minimum |
---|---|
CPU | 16 cores |
RAM | 64GB |
Disk space in /var/lib/rancher | 300GB |
Disk space in /tmp or $TMPDIR | 50GB |
/var/lib/rancher
volume from its security scans.
sudo
access.
nm-cloud-setup
.
Disabling nm-cloud-setup
nm-cloud-setup
by running the following command:disabled
or permissive
mode in the /etc/selinux/config
file.
Configuring SELinux
/etc/selinux/config
file using your preferred text editor.SELINUX=
and set it to either disabled
or permissive
.Mirroring with a firewall
repo.anaconda.com
anaconda.org
conda.anaconda.org
binstar-cio-packages-prod.s3.amazonaws.com
https://repo.anaconda.com
— For use of older versions of Navigator and condahttps://conda.anaconda.org
— For use of conda-forge and other channels on Anaconda.orggoogle-public-dns-a.google.com
(8.8.8.8:53
) — To check internet connectivity with Google Public DNS.https://uuid001.anaconda.yourdomain.com
.
This requires the use of wildcard DNS entries that apply to a set of domain names such as *.anaconda.yourdomain.com
.
For example, if you are using the domain name anaconda.yourdomain.com
with a control plane node IP address of 12.34.56.78
, the DNS entries would be as follows:
/etc/hosts
entries to the K3s environment.
dnsmasq
is installed on the control plane node or any worker nodes, you’ll need to remove it from all nodes prior to installing Workbench.Verify dnsmasq
is disabled by running the following command:dnsmasq
by running the following commands:.yaml
configuration files, services, secrets, and config maps.
For K3s, Workbench includes a values.k3s.yaml
file that overrides the default values in the top-level Helm chart. Make additions and modifications to this file with your current cluster configurations at this time.
rbac
parameters where present to scope to the namespace
only.Helm values.k3s.yaml template
K3s pre-installation checklist
sudo
access on all nodes and is not a root user.k3s\_tls\_ssl\_reqs
to be installed with Workbench have been obtained, including the private keys.A
or CNAME
domain record is fully operational and points to the IP address of the control plane node./etc/resolv.conf
file on all the nodes does not include the rotate
option.dockerd
), dnsmasq
, and lxd
have been removed from all nodes, as they will conflict with Workbench.