Actions40
- Node Actions
- Namespace Actions
- Deployment Actions
- Service Actions
- Pod Actions
- StatefulSet Actions
- ConfigMap Actions
- Secret Actions
- Job Actions
- CronJob Actions
Overview
This node integrates with Rancher/Kubernetes API to manage Kubernetes nodes, specifically supporting the "Taint" operation on nodes. The "Taint" operation allows users to add or update taints on a specified Kubernetes node. Taints are key-value pairs with an effect that influence pod scheduling by marking nodes so that pods with matching tolerations can be scheduled accordingly.
Common scenarios for this node include:
- Preventing certain pods from being scheduled on specific nodes by applying taints.
- Managing node behavior in a cluster by controlling pod placement through taints.
- Automating node maintenance workflows where taints signal unschedulable or special conditions.
Practical example:
- You want to mark a node as unschedulable for general workloads but allow only critical pods to run there. You apply a taint with key
maintenance, valuetrue, and effectNoSchedule. Pods without a matching toleration will not be scheduled on this node.
Properties
| Name | Meaning |
|---|---|
| Node ID | The unique identifier of the Kubernetes node to which the taints will be applied. |
| Taints | A collection of taints to add or update on the node. Each taint includes: |
| - Key: The taint key (string). | |
| - Value: The taint value (string). | |
- Effect: The taint effect, one of: NoSchedule, PreferNoSchedule, or NoExecute. |
|
| Cluster Name or ID | Selects the target Kubernetes cluster by name or ID. |
| Project Name or ID | Selects the project within the cluster by name or ID. |
| Namespace Name or ID | Selects the namespace within the project by name or ID. |
Output
The node outputs JSON data representing the result of the taint operation on the node. This typically includes the updated node object or confirmation details returned by the Rancher/Kubernetes API after applying the taints.
If binary data were involved (not applicable here), it would represent raw files or logs, but this node focuses on JSON structured data.
Dependencies
- Requires access to a Rancher or Kubernetes cluster via the Rancher/Kubernetes API.
- Needs an API authentication token or API key credential configured in n8n to authenticate requests.
- The node depends on the Rancher API client libraries bundled internally.
- Requires proper configuration of cluster, project, and namespace selections to target the correct Kubernetes environment.
Troubleshooting
- Invalid Node ID: If the provided node ID does not exist or is incorrect, the API call will fail. Verify the node ID is correct and accessible.
- Authentication Errors: Missing or invalid API credentials will cause authentication failures. Ensure the API key or token is valid and has sufficient permissions.
- Insufficient Permissions: The user associated with the API credentials must have permission to modify node taints.
- Incorrect Taint Format: Providing taints without required fields (key, effect) or invalid effect values may cause errors. Use only supported effects (
NoSchedule,PreferNoSchedule,NoExecute). - Cluster/Project/Namespace Mismatch: Selecting incompatible or non-existent clusters, projects, or namespaces will lead to errors. Confirm these selections correspond to your Kubernetes setup.
Links and References
- Kubernetes Taints and Tolerations
- Rancher API Documentation
- n8n Expressions Documentation (for dynamic property values)