Search Criteria
Package Details: k3s-bin 1.30.3+k3s1-1
Package Actions
Git Clone URL: | https://aur.archlinux.org/k3s-bin.git (read-only, click to copy) |
---|---|
Package Base: | k3s-bin |
Description: | Lightweight Kubernetes |
Upstream URL: | https://k3s.io |
Keywords: | kubernetes |
Licenses: | Apache |
Conflicts: | k3s, k3s-git |
Submitter: | duxet |
Maintainer: | galdor |
Last Packager: | galdor |
Votes: | 26 |
Popularity: | 0.20 |
First Submitted: | 2019-02-28 07:14 (UTC) |
Last Updated: | 2024-08-21 07:51 (UTC) |
Latest Comments
« First ‹ Previous 1 2 3 4 5 6 Next › Last »
Vanilla commented on 2021-02-18 13:11 (UTC) (edited on 2021-02-18 13:44 (UTC) by Vanilla)
@satcom886
<del>I notice the k3s.service.env installed inside /etc/systemd/system. According to the Getting Started section of the K3S docs, by specifying K3S_URL and K3S_TOKEN, the K3S can be instructed to run in agent mode. (Not tried yet.)</del>
I was wrong. That trick is only for its installation script instead of the K3S binary. In order to run a K3S agent, now I have to partially overwrite the shipped service file with systemctl edit k3s.service .
galdor commented on 2021-01-05 06:21 (UTC)
Would it be possible to add a k3s group and use it for /etc/rancher/k3s/k3s.yaml ? In the current state, the file is owned by root and is 0600, but this file must be readable by any kubernetes tool such as kubectl.
k8ie commented on 2020-12-06 09:46 (UTC)
I have a possibly dumb question, but how do you "oficially" choose between server and agent mode?
I edited
/usr/lib/systemd/system/k3s.service
and replacedk3s server
withk3s agent
. I'm guessing that this is not the right way...i.further commented on 2020-11-16 15:33 (UTC)
The some files is not removed when it removed.
amiga23 commented on 2020-06-02 07:04 (UTC)
Please do not override the config file during update.
backup=("etc/systemd/system/k3s.service.env")
mercutio commented on 2020-02-04 10:29 (UTC)
I updated the package to 1.17.2, in case someone else might find it useful: https://gist.github.com/mercutiodesign/e871496deca3002fbe7086355772d974
tbrock commented on 2020-01-03 22:27 (UTC)
It looks like that commit did update them, the shas must have changed since the initial publish. Anyway, they are correct now. Enjoy!
tbrock commented on 2020-01-03 19:26 (UTC)
Ah I'm sorry I use a script that runs updpkgsums and it must not have updated all of them for some reason, I just published a pkgrel 2 verson that should do the trick.
isra17 commented on 2020-01-03 14:55 (UTC)
valid sha (From my result and as advertisied in the
sha256sum-amd64.txt
) isc7c5d39a60fa0665913f83cee78eb0c440cbd7c9e2e85783f10a2bba09d977ee
isra17 commented on 2020-01-03 14:50 (UTC)
Source
k3s-1.0.1-x86_64
does not pass validity test anymore.« First ‹ Previous 1 2 3 4 5 6 Next › Last »