How to Install and Uninstall rke2-1.28 Package on openSuSE Tumbleweed
Last updated: November 15,2024
1. Install "rke2-1.28" package
Learn how to install rke2-1.28 on openSuSE Tumbleweed
$
sudo zypper refresh
Copied
$
sudo zypper install
rke2-1.28
Copied
2. Uninstall "rke2-1.28" package
Please follow the instructions below to uninstall rke2-1.28 on openSuSE Tumbleweed:
$
sudo zypper remove
rke2-1.28
Copied
3. Information about the rke2-1.28 package on openSuSE Tumbleweed
Information for package rke2-1.28:
----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : rke2-1.28
Version : 1.28.6+rke2r1-1.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 254.2 MiB
Installed : No
Status : not installed
Source package : rke2-1.28-1.28.6+rke2r1-1.1.src
Upstream URL : https://github.com/rancher/rke2
Summary : Rancher Kubernetes Engine
Description :
RKE2, also known as RKE Government, is Rancher's next-generation Kubernetes distribution.
It is a fully conformant Kubernetes distribution that focuses on security and compliance within the U.S. Federal Government sector.
To meet these goals, RKE2 does the following:
Provides defaults and configuration options that allow clusters to pass the CIS Kubernetes Benchmark with minimal operator intervention
Enables FIPS 140-2 compliance
Supports SELinux policy and Multi-Category Security (MCS) label enforcement
Regularly scans components for CVEs using trivy in our build pipeline
----------------------------------
Repository : openSUSE-Tumbleweed-Oss
Name : rke2-1.28
Version : 1.28.6+rke2r1-1.1
Arch : x86_64
Vendor : openSUSE
Installed Size : 254.2 MiB
Installed : No
Status : not installed
Source package : rke2-1.28-1.28.6+rke2r1-1.1.src
Upstream URL : https://github.com/rancher/rke2
Summary : Rancher Kubernetes Engine
Description :
RKE2, also known as RKE Government, is Rancher's next-generation Kubernetes distribution.
It is a fully conformant Kubernetes distribution that focuses on security and compliance within the U.S. Federal Government sector.
To meet these goals, RKE2 does the following:
Provides defaults and configuration options that allow clusters to pass the CIS Kubernetes Benchmark with minimal operator intervention
Enables FIPS 140-2 compliance
Supports SELinux policy and Multi-Category Security (MCS) label enforcement
Regularly scans components for CVEs using trivy in our build pipeline