2015-12-31 13:07:02 +00:00
|
|
|
---
|
2018-02-21 16:35:34 +00:00
|
|
|
local_release_dir: /tmp/releases
|
2015-12-31 13:07:02 +00:00
|
|
|
|
2017-10-19 08:17:11 +00:00
|
|
|
# Used to only evaluate vars from download role
|
|
|
|
skip_downloads: false
|
|
|
|
|
2016-11-18 12:29:03 +00:00
|
|
|
# if this is set to true will only download files once. Doesn't work
|
2017-01-05 10:35:16 +00:00
|
|
|
# on Container Linux by CoreOS unless the download_localhost is true and localhost
|
2017-02-08 10:25:11 +00:00
|
|
|
# is running another OS type. Default compress level is 1 (fastest).
|
2016-05-18 04:30:01 +00:00
|
|
|
download_run_once: False
|
2017-02-08 10:25:11 +00:00
|
|
|
download_compress: 1
|
2016-11-18 12:29:03 +00:00
|
|
|
|
|
|
|
# if this is set to true, uses the localhost for download_run_once mode
|
|
|
|
# (requires docker and sudo to access docker). You may want this option for
|
2017-01-05 10:35:16 +00:00
|
|
|
# local caching of docker images or for Container Linux by CoreOS cluster nodes.
|
2016-11-18 12:29:03 +00:00
|
|
|
# Otherwise, uses the first node in the kube-master group to store images
|
|
|
|
# in the download_run_once mode.
|
|
|
|
download_localhost: False
|
2016-05-18 04:30:01 +00:00
|
|
|
|
2016-12-19 14:50:04 +00:00
|
|
|
# Always pull images if set to True. Otherwise check by the repo's tag/digest.
|
|
|
|
download_always_pull: False
|
|
|
|
|
2017-10-19 08:17:11 +00:00
|
|
|
# Use the first kube-master if download_localhost is not set
|
|
|
|
download_delegate: "{% if download_localhost %}localhost{% else %}{{groups['kube-master'][0]}}{% endif %}"
|
|
|
|
|
2016-01-19 14:23:19 +00:00
|
|
|
# Versions
|
2018-06-07 08:05:48 +00:00
|
|
|
kube_version: v1.10.4
|
2017-10-05 09:51:21 +00:00
|
|
|
kubeadm_version: "{{ kube_version }}"
|
2018-06-07 08:05:48 +00:00
|
|
|
etcd_version: v3.2.18
|
2017-08-24 09:09:52 +00:00
|
|
|
# TODO(mattymo): Move calico versions to roles/network_plugins/calico/defaults
|
2016-07-04 15:16:18 +00:00
|
|
|
# after migration to container download
|
2018-03-04 13:24:20 +00:00
|
|
|
calico_version: "v2.6.8"
|
|
|
|
calico_ctl_version: "v1.6.3"
|
|
|
|
calico_cni_version: "v1.11.4"
|
|
|
|
calico_policy_version: "v1.0.3"
|
|
|
|
calico_rr_version: "v0.4.2"
|
2018-03-21 00:59:51 +00:00
|
|
|
flannel_version: "v0.10.0"
|
2017-10-26 09:18:06 +00:00
|
|
|
flannel_cni_version: "v0.3.0"
|
2017-12-25 08:57:45 +00:00
|
|
|
istio_version: "0.2.6"
|
2018-05-11 16:11:38 +00:00
|
|
|
vault_version: 0.10.1
|
2018-04-17 00:51:24 +00:00
|
|
|
weave_version: 2.3.0
|
2016-10-14 21:46:44 +00:00
|
|
|
pod_infra_version: 3.0
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv_version: 1.1.7
|
2018-03-20 21:18:56 +00:00
|
|
|
cilium_version: "v1.0.0-rc8"
|
2015-12-31 15:05:25 +00:00
|
|
|
|
2017-09-13 18:00:51 +00:00
|
|
|
# Download URLs
|
2017-12-25 08:57:45 +00:00
|
|
|
istioctl_download_url: "https://storage.googleapis.com/istio-release/releases/{{ istio_version }}/istioctl/istioctl-linux"
|
2017-09-13 18:00:51 +00:00
|
|
|
kubeadm_download_url: "https://storage.googleapis.com/kubernetes-release/release/{{ kubeadm_version }}/bin/linux/amd64/kubeadm"
|
2017-12-25 08:57:45 +00:00
|
|
|
vault_download_url: "https://releases.hashicorp.com/vault/{{ vault_version }}/vault_{{ vault_version }}_linux_amd64.zip"
|
2015-12-31 15:05:25 +00:00
|
|
|
|
2016-01-19 14:23:19 +00:00
|
|
|
# Checksums
|
2017-10-13 14:42:54 +00:00
|
|
|
istioctl_checksum: fd703063c540b8c0ab943f478c05ab257d88ae27224c746a27d0526ddbf7c370
|
2018-06-07 08:05:48 +00:00
|
|
|
kubeadm_checksum: 7e1169bbbeed973ab402941672dec957638dea5952a1e8bc89a37d5e709cc4b4
|
2017-10-19 08:17:11 +00:00
|
|
|
vault_binary_checksum: 3c4d70ba71619a43229e65c67830e30e050eab7a81ac6b28325ff707e5914188
|
|
|
|
|
2016-09-14 12:30:57 +00:00
|
|
|
# Containers
|
|
|
|
etcd_image_repo: "quay.io/coreos/etcd"
|
|
|
|
etcd_image_tag: "{{ etcd_version }}"
|
|
|
|
flannel_image_repo: "quay.io/coreos/flannel"
|
|
|
|
flannel_image_tag: "{{ flannel_version }}"
|
2017-08-25 07:07:50 +00:00
|
|
|
flannel_cni_image_repo: "quay.io/coreos/flannel-cni"
|
|
|
|
flannel_cni_image_tag: "{{ flannel_cni_version }}"
|
2017-08-07 15:33:37 +00:00
|
|
|
calicoctl_image_repo: "quay.io/calico/ctl"
|
|
|
|
calicoctl_image_tag: "{{ calico_ctl_version }}"
|
|
|
|
calico_node_image_repo: "quay.io/calico/node"
|
2016-09-14 12:30:57 +00:00
|
|
|
calico_node_image_tag: "{{ calico_version }}"
|
2017-08-07 15:33:37 +00:00
|
|
|
calico_cni_image_repo: "quay.io/calico/cni"
|
2016-11-03 15:57:11 +00:00
|
|
|
calico_cni_image_tag: "{{ calico_cni_version }}"
|
2017-11-28 12:01:30 +00:00
|
|
|
calico_policy_image_repo: "quay.io/calico/kube-controllers"
|
2017-02-10 15:06:31 +00:00
|
|
|
calico_policy_image_tag: "{{ calico_policy_version }}"
|
2017-04-12 01:52:04 +00:00
|
|
|
calico_rr_image_repo: "quay.io/calico/routereflector"
|
2017-10-14 08:51:48 +00:00
|
|
|
calico_rr_image_tag: "{{ calico_rr_version }}"
|
2018-04-03 06:29:50 +00:00
|
|
|
istio_proxy_image_repo: docker.io/istio/proxy
|
|
|
|
istio_proxy_image_tag: "{{ istio_version }}"
|
|
|
|
istio_proxy_init_image_repo: docker.io/istio/proxy_init
|
|
|
|
istio_proxy_init_image_tag: "{{ istio_version }}"
|
|
|
|
istio_ca_image_repo: docker.io/istio/istio-ca
|
|
|
|
istio_ca_image_tag: "{{ istio_version }}"
|
|
|
|
istio_mixer_image_repo: docker.io/istio/mixer
|
|
|
|
istio_mixer_image_tag: "{{ istio_version }}"
|
|
|
|
istio_pilot_image_repo: docker.io/istio/pilot
|
|
|
|
istio_pilot_image_tag: "{{ istio_version }}"
|
|
|
|
istio_proxy_debug_image_repo: docker.io/istio/proxy_debug
|
|
|
|
istio_proxy_debug_image_tag: "{{ istio_version }}"
|
|
|
|
istio_sidecar_initializer_image_repo: docker.io/istio/sidecar_initializer
|
|
|
|
istio_sidecar_initializer_image_tag: "{{ istio_version }}"
|
|
|
|
istio_statsd_image_repo: prom/statsd-exporter
|
|
|
|
istio_statsd_image_tag: latest
|
2018-03-21 22:27:13 +00:00
|
|
|
hyperkube_image_repo: "gcr.io/google-containers/hyperkube"
|
2018-03-22 08:07:28 +00:00
|
|
|
hyperkube_image_tag: "{{ kube_version }}"
|
2016-10-14 21:46:44 +00:00
|
|
|
pod_infra_image_repo: "gcr.io/google_containers/pause-amd64"
|
|
|
|
pod_infra_image_tag: "{{ pod_infra_version }}"
|
2017-09-04 08:30:18 +00:00
|
|
|
install_socat_image_repo: "xueshanf/install-socat"
|
|
|
|
install_socat_image_tag: "latest"
|
2018-04-24 07:03:36 +00:00
|
|
|
netcheck_version: "v1.2.2"
|
|
|
|
netcheck_agent_img_repo: "mirantis/k8s-netchecker-agent"
|
2017-04-21 11:00:00 +00:00
|
|
|
netcheck_agent_tag: "{{ netcheck_version }}"
|
2018-04-24 07:03:36 +00:00
|
|
|
netcheck_server_img_repo: "mirantis/k8s-netchecker-server"
|
2017-04-21 11:00:00 +00:00
|
|
|
netcheck_server_tag: "{{ netcheck_version }}"
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_kube_image_repo: "weaveworks/weave-kube"
|
|
|
|
weave_kube_image_tag: "{{ weave_version }}"
|
|
|
|
weave_npc_image_repo: "weaveworks/weave-npc"
|
|
|
|
weave_npc_image_tag: "{{ weave_version }}"
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv_image_repo: "contiv/netplugin"
|
|
|
|
contiv_image_tag: "{{ contiv_version }}"
|
|
|
|
contiv_auth_proxy_image_repo: "contiv/auth_proxy"
|
|
|
|
contiv_auth_proxy_image_tag: "{{ contiv_version }}"
|
2018-05-29 15:05:33 +00:00
|
|
|
contiv_etcd_init_image_repo: "ferest/etcd-initer"
|
|
|
|
contiv_etcd_init_image_tag: latest
|
2018-02-17 03:37:47 +00:00
|
|
|
cilium_image_repo: "docker.io/cilium/cilium"
|
|
|
|
cilium_image_tag: "{{ cilium_version }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
nginx_image_repo: nginx
|
2017-11-29 10:39:52 +00:00
|
|
|
nginx_image_tag: 1.13
|
2017-10-05 16:31:04 +00:00
|
|
|
dnsmasq_version: 2.78
|
2016-11-21 10:20:44 +00:00
|
|
|
dnsmasq_image_repo: "andyshinn/dnsmasq"
|
|
|
|
dnsmasq_image_tag: "{{ dnsmasq_version }}"
|
2018-05-15 03:29:10 +00:00
|
|
|
kubedns_version: 1.14.10
|
2017-06-16 00:37:55 +00:00
|
|
|
kubedns_image_repo: "gcr.io/google_containers/k8s-dns-kube-dns-amd64"
|
2016-11-21 10:20:44 +00:00
|
|
|
kubedns_image_tag: "{{ kubedns_version }}"
|
2018-05-08 07:13:58 +00:00
|
|
|
coredns_version: 1.1.2
|
2018-03-13 11:00:05 +00:00
|
|
|
coredns_image_repo: "docker.io/coredns/coredns"
|
|
|
|
coredns_image_tag: "{{ coredns_version }}"
|
2017-06-16 00:37:55 +00:00
|
|
|
dnsmasq_nanny_image_repo: "gcr.io/google_containers/k8s-dns-dnsmasq-nanny-amd64"
|
|
|
|
dnsmasq_nanny_image_tag: "{{ kubedns_version }}"
|
|
|
|
dnsmasq_sidecar_image_repo: "gcr.io/google_containers/k8s-dns-sidecar-amd64"
|
|
|
|
dnsmasq_sidecar_image_tag: "{{ kubedns_version }}"
|
2018-01-30 16:23:37 +00:00
|
|
|
dnsmasqautoscaler_version: 1.1.2
|
2018-01-16 08:11:59 +00:00
|
|
|
dnsmasqautoscaler_image_repo: "gcr.io/google_containers/cluster-proportional-autoscaler-amd64"
|
|
|
|
dnsmasqautoscaler_image_tag: "{{ dnsmasqautoscaler_version }}"
|
2018-01-30 16:23:37 +00:00
|
|
|
kubednsautoscaler_version: 1.1.2
|
2017-06-16 00:37:55 +00:00
|
|
|
kubednsautoscaler_image_repo: "gcr.io/google_containers/cluster-proportional-autoscaler-amd64"
|
|
|
|
kubednsautoscaler_image_tag: "{{ kubednsautoscaler_version }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
test_image_repo: busybox
|
|
|
|
test_image_tag: latest
|
2018-05-11 16:22:44 +00:00
|
|
|
elasticsearch_version: "v5.6.4"
|
|
|
|
elasticsearch_image_repo: "k8s.gcr.io/elasticsearch"
|
2017-01-26 23:33:01 +00:00
|
|
|
elasticsearch_image_tag: "{{ elasticsearch_version }}"
|
2018-05-11 16:56:14 +00:00
|
|
|
fluentd_version: "v2.0.4"
|
|
|
|
fluentd_image_repo: "k8s.gcr.io/fluentd-elasticsearch"
|
2017-01-26 23:33:01 +00:00
|
|
|
fluentd_image_tag: "{{ fluentd_version }}"
|
2018-05-11 16:36:50 +00:00
|
|
|
kibana_version: "5.6.4"
|
|
|
|
kibana_image_repo: "docker.elastic.co/kibana/kibana"
|
2017-01-26 23:33:01 +00:00
|
|
|
kibana_image_tag: "{{ kibana_version }}"
|
2018-05-21 14:36:51 +00:00
|
|
|
helm_version: "v2.9.1"
|
2017-03-17 11:56:25 +00:00
|
|
|
helm_image_repo: "lachlanevenson/k8s-helm"
|
|
|
|
helm_image_tag: "{{ helm_version }}"
|
|
|
|
tiller_image_repo: "gcr.io/kubernetes-helm/tiller"
|
2017-11-28 14:52:42 +00:00
|
|
|
tiller_image_tag: "{{ helm_version }}"
|
2017-12-25 08:57:45 +00:00
|
|
|
vault_image_repo: "vault"
|
|
|
|
vault_image_tag: "{{ vault_version }}"
|
2018-03-31 10:57:00 +00:00
|
|
|
registry_image_repo: "registry"
|
|
|
|
registry_image_tag: "2.6"
|
|
|
|
registry_proxy_image_repo: "gcr.io/google_containers/kube-registry-proxy"
|
|
|
|
registry_proxy_image_tag: "0.4"
|
2018-03-31 11:25:05 +00:00
|
|
|
local_volume_provisioner_image_repo: "quay.io/external_storage/local-volume-provisioner"
|
|
|
|
local_volume_provisioner_image_tag: "v2.0.0"
|
2018-07-07 16:37:08 +00:00
|
|
|
cephfs_provisioner_image_repo: "quay.io/external_storage/cephfs-provisioner"
|
|
|
|
cephfs_provisioner_image_tag: "v1.1.0-k8s1.10"
|
2018-03-31 08:04:24 +00:00
|
|
|
ingress_nginx_controller_image_repo: "quay.io/kubernetes-ingress-controller/nginx-ingress-controller"
|
2018-06-07 09:25:25 +00:00
|
|
|
ingress_nginx_controller_image_tag: "0.16.2"
|
2018-03-31 08:04:24 +00:00
|
|
|
ingress_nginx_default_backend_image_repo: "gcr.io/google_containers/defaultbackend"
|
|
|
|
ingress_nginx_default_backend_image_tag: "1.4"
|
2018-06-26 06:42:05 +00:00
|
|
|
cert_manager_version: "v0.3.2"
|
2018-03-28 14:30:00 +00:00
|
|
|
cert_manager_controller_image_repo: "quay.io/jetstack/cert-manager-controller"
|
|
|
|
cert_manager_controller_image_tag: "{{ cert_manager_version }}"
|
2017-03-17 11:56:25 +00:00
|
|
|
|
2015-12-31 15:05:25 +00:00
|
|
|
downloads:
|
2016-09-30 15:23:47 +00:00
|
|
|
netcheck_server:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ deploy_netchecker }}"
|
2016-09-30 15:23:47 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ netcheck_server_img_repo }}"
|
2017-04-21 11:00:00 +00:00
|
|
|
tag: "{{ netcheck_server_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ netcheck_server_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-09-30 15:23:47 +00:00
|
|
|
netcheck_agent:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ deploy_netchecker }}"
|
2016-09-30 15:23:47 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ netcheck_agent_img_repo }}"
|
2017-04-21 11:00:00 +00:00
|
|
|
tag: "{{ netcheck_agent_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ netcheck_agent_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-05-22 22:25:52 +00:00
|
|
|
etcd:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: true
|
2017-09-25 06:52:36 +00:00
|
|
|
container: true
|
2016-09-14 12:30:57 +00:00
|
|
|
repo: "{{ etcd_image_repo }}"
|
|
|
|
tag: "{{ etcd_image_tag }}"
|
2017-09-26 09:38:58 +00:00
|
|
|
sha256: "{{ etcd_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- etcd
|
2017-09-13 18:00:51 +00:00
|
|
|
kubeadm:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kubeadm_enabled }}"
|
|
|
|
file: true
|
2017-09-13 18:00:51 +00:00
|
|
|
version: "{{ kubeadm_version }}"
|
|
|
|
dest: "kubeadm"
|
|
|
|
sha256: "{{ kubeadm_checksum }}"
|
|
|
|
source_url: "{{ kubeadm_download_url }}"
|
|
|
|
url: "{{ kubeadm_download_url }}"
|
|
|
|
unarchive: false
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2017-10-13 14:42:54 +00:00
|
|
|
istioctl:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
file: true
|
2017-10-13 14:42:54 +00:00
|
|
|
version: "{{ istio_version }}"
|
|
|
|
dest: "istio/istioctl"
|
|
|
|
sha256: "{{ istioctl_checksum }}"
|
|
|
|
source_url: "{{ istioctl_download_url }}"
|
|
|
|
url: "{{ istioctl_download_url }}"
|
|
|
|
unarchive: false
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-master
|
2018-04-03 06:29:50 +00:00
|
|
|
istio_proxy:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_proxy_image_repo }}"
|
|
|
|
tag: "{{ istio_proxy_image_tag }}"
|
|
|
|
sha256: "{{ istio_proxy_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_proxy_init:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_proxy_init_image_repo }}"
|
|
|
|
tag: "{{ istio_proxy_init_image_tag }}"
|
|
|
|
sha256: "{{ istio_proxy_init_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_ca:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_ca_image_repo }}"
|
|
|
|
tag: "{{ istio_ca_image_tag }}"
|
|
|
|
sha256: "{{ istio_ca_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_mixer:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_mixer_image_repo }}"
|
|
|
|
tag: "{{ istio_mixer_image_tag }}"
|
|
|
|
sha256: "{{ istio_mixer_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_pilot:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_pilot_image_repo }}"
|
|
|
|
tag: "{{ istio_pilot_image_tag }}"
|
|
|
|
sha256: "{{ istio_pilot_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_proxy_debug:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_proxy_debug_image_repo }}"
|
|
|
|
tag: "{{ istio_proxy_debug_image_tag }}"
|
|
|
|
sha256: "{{ istio_proxy_debug_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_sidecar_initializer:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_sidecar_initializer_image_repo }}"
|
|
|
|
tag: "{{ istio_sidecar_initializer_image_tag }}"
|
|
|
|
sha256: "{{ istio_sidecar_initializer_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
istio_statsd:
|
|
|
|
enabled: "{{ istio_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ istio_statsd_image_repo }}"
|
|
|
|
tag: "{{ istio_statsd_image_tag }}"
|
|
|
|
sha256: "{{ istio_statsd_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2016-09-14 12:30:57 +00:00
|
|
|
hyperkube:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: true
|
2016-09-14 12:30:57 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ hyperkube_image_repo }}"
|
|
|
|
tag: "{{ hyperkube_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ hyperkube_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-02-17 03:37:47 +00:00
|
|
|
cilium:
|
|
|
|
enabled: "{{ kube_network_plugin == 'cilium' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cilium_image_repo }}"
|
|
|
|
tag: "{{ cilium_image_tag }}"
|
|
|
|
sha256: "{{ cilium_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-09-14 12:30:57 +00:00
|
|
|
flannel:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'flannel' or kube_network_plugin == 'canal' }}"
|
2016-09-14 12:30:57 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ flannel_image_repo }}"
|
|
|
|
tag: "{{ flannel_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ flannel_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2017-08-25 07:07:50 +00:00
|
|
|
flannel_cni:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'flannel' }}"
|
2017-08-25 07:07:50 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ flannel_cni_image_repo }}"
|
|
|
|
tag: "{{ flannel_cni_image_tag }}"
|
|
|
|
sha256: "{{ flannel_cni_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-09-14 12:30:57 +00:00
|
|
|
calicoctl:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
|
2016-09-14 12:30:57 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calicoctl_image_repo }}"
|
|
|
|
tag: "{{ calicoctl_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calicoctl_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-09-14 12:30:57 +00:00
|
|
|
calico_node:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
|
2016-09-14 12:30:57 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_node_image_repo }}"
|
|
|
|
tag: "{{ calico_node_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_node_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-11-03 15:57:11 +00:00
|
|
|
calico_cni:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
|
2016-11-03 15:57:11 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_cni_image_repo }}"
|
|
|
|
tag: "{{ calico_cni_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_cni_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-11-21 10:20:44 +00:00
|
|
|
calico_policy:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ enable_network_policy or kube_network_plugin == 'canal' }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_policy_image_repo }}"
|
|
|
|
tag: "{{ calico_policy_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_policy_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-12-08 16:48:54 +00:00
|
|
|
calico_rr:
|
2018-03-08 09:04:16 +00:00
|
|
|
enabled: "{{ peer_with_calico_rr is defined and peer_with_calico_rr and kube_network_plugin == 'calico' }}"
|
2016-12-08 16:48:54 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_rr_image_repo }}"
|
|
|
|
tag: "{{ calico_rr_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_rr_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- calico-rr
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_kube:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'weave' }}"
|
2017-01-10 14:47:39 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ weave_kube_image_repo }}"
|
|
|
|
tag: "{{ weave_kube_image_tag }}"
|
|
|
|
sha256: "{{ weave_kube_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_npc:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'weave' }}"
|
2017-01-10 14:47:39 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ weave_npc_image_repo }}"
|
|
|
|
tag: "{{ weave_npc_image_tag }}"
|
|
|
|
sha256: "{{ weave_npc_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv:
|
|
|
|
enabled: "{{ kube_network_plugin == 'contiv' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ contiv_image_repo }}"
|
|
|
|
tag: "{{ contiv_image_tag }}"
|
|
|
|
sha256: "{{ contiv_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv_auth_proxy:
|
|
|
|
enabled: "{{ kube_network_plugin == 'contiv' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ contiv_auth_proxy_image_repo }}"
|
|
|
|
tag: "{{ contiv_auth_proxy_image_tag }}"
|
|
|
|
sha256: "{{ contiv_auth_proxy_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-05-29 15:05:33 +00:00
|
|
|
contiv_etcd_init:
|
|
|
|
enabled: "{{ kube_network_plugin == 'contiv' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ contiv_etcd_init_image_repo }}"
|
|
|
|
tag: "{{ contiv_etcd_init_image_tag }}"
|
|
|
|
sha256: "{{ contiv_etcd_init_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-10-14 21:46:44 +00:00
|
|
|
pod_infra:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: true
|
2016-10-14 21:46:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ pod_infra_image_repo }}"
|
|
|
|
tag: "{{ pod_infra_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ pod_infra_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2017-09-04 08:30:18 +00:00
|
|
|
install_socat:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ ansible_os_family in ['CoreOS', 'Container Linux by CoreOS'] }}"
|
2017-09-04 08:30:18 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ install_socat_image_repo }}"
|
|
|
|
tag: "{{ install_socat_image_tag }}"
|
|
|
|
sha256: "{{ install_socat_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2016-11-21 10:20:44 +00:00
|
|
|
nginx:
|
2018-03-31 02:40:01 +00:00
|
|
|
enabled: "{{ loadbalancer_apiserver_localhost }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ nginx_image_repo }}"
|
|
|
|
tag: "{{ nginx_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ nginx_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2016-11-21 10:20:44 +00:00
|
|
|
dnsmasq:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ dns_mode == 'dnsmasq_kubedns' }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ dnsmasq_image_repo }}"
|
|
|
|
tag: "{{ dnsmasq_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ dnsmasq_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2016-11-21 10:20:44 +00:00
|
|
|
kubedns:
|
2018-03-13 11:00:05 +00:00
|
|
|
enabled: "{{ dns_mode in ['kubedns', 'dnsmasq_kubedns'] }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ kubedns_image_repo }}"
|
|
|
|
tag: "{{ kubedns_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ kubedns_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-03-13 11:00:05 +00:00
|
|
|
coredns:
|
|
|
|
enabled: "{{ dns_mode in ['coredns', 'coredns_dual'] }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ coredns_image_repo }}"
|
|
|
|
tag: "{{ coredns_image_tag }}"
|
|
|
|
sha256: "{{ coredns_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-06-16 00:37:55 +00:00
|
|
|
dnsmasq_nanny:
|
2018-03-13 11:00:05 +00:00
|
|
|
enabled: "{{ dns_mode in ['kubedns', 'dnsmasq_kubedns'] }}"
|
2017-06-16 00:37:55 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ dnsmasq_nanny_image_repo }}"
|
|
|
|
tag: "{{ dnsmasq_nanny_image_tag }}"
|
|
|
|
sha256: "{{ dnsmasq_nanny_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-06-16 00:37:55 +00:00
|
|
|
dnsmasq_sidecar:
|
2018-03-13 11:00:05 +00:00
|
|
|
enabled: "{{ dns_mode in ['kubedns', 'dnsmasq_kubedns'] }}"
|
2017-06-16 00:37:55 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ dnsmasq_sidecar_image_repo }}"
|
|
|
|
tag: "{{ dnsmasq_sidecar_image_tag }}"
|
|
|
|
sha256: "{{ dnsmasq_sidecar_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-06-16 00:37:55 +00:00
|
|
|
kubednsautoscaler:
|
2018-03-13 11:00:05 +00:00
|
|
|
enabled: "{{ dns_mode in ['kubedns', 'dnsmasq_kubedns'] }}"
|
2017-06-16 00:37:55 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ kubednsautoscaler_image_repo }}"
|
|
|
|
tag: "{{ kubednsautoscaler_image_tag }}"
|
|
|
|
sha256: "{{ kubednsautoscaler_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2016-11-21 10:20:44 +00:00
|
|
|
testbox:
|
2018-03-31 02:40:01 +00:00
|
|
|
enabled: false
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ test_image_repo }}"
|
|
|
|
tag: "{{ test_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ testbox_digest_checksum|default(None) }}"
|
2017-01-26 23:33:01 +00:00
|
|
|
elasticsearch:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ efk_enabled }}"
|
2017-01-26 23:33:01 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ elasticsearch_image_repo }}"
|
|
|
|
tag: "{{ elasticsearch_image_tag }}"
|
|
|
|
sha256: "{{ elasticsearch_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-01-26 23:33:01 +00:00
|
|
|
fluentd:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ efk_enabled }}"
|
2017-01-26 23:33:01 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ fluentd_image_repo }}"
|
|
|
|
tag: "{{ fluentd_image_tag }}"
|
|
|
|
sha256: "{{ fluentd_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-01-26 23:33:01 +00:00
|
|
|
kibana:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ efk_enabled }}"
|
2017-01-26 23:33:01 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ kibana_image_repo }}"
|
|
|
|
tag: "{{ kibana_image_tag }}"
|
|
|
|
sha256: "{{ kibana_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-03-17 11:56:25 +00:00
|
|
|
helm:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ helm_enabled }}"
|
2017-03-17 11:56:25 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ helm_image_repo }}"
|
|
|
|
tag: "{{ helm_image_tag }}"
|
|
|
|
sha256: "{{ helm_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-03-17 11:56:25 +00:00
|
|
|
tiller:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ helm_enabled }}"
|
2017-03-17 11:56:25 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ tiller_image_repo }}"
|
|
|
|
tag: "{{ tiller_image_tag }}"
|
|
|
|
sha256: "{{ tiller_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2017-10-19 08:17:11 +00:00
|
|
|
vault:
|
|
|
|
enabled: "{{ cert_management == 'vault' }}"
|
|
|
|
container: "{{ vault_deployment_type != 'host' }}"
|
|
|
|
file: "{{ vault_deployment_type == 'host' }}"
|
|
|
|
dest: "vault/vault_{{ vault_version }}_linux_amd64.zip"
|
|
|
|
mode: "0755"
|
|
|
|
owner: "vault"
|
|
|
|
repo: "{{ vault_image_repo }}"
|
|
|
|
sha256: "{{ vault_binary_checksum if vault_deployment_type == 'host' else vault_digest_checksum|d(none) }}"
|
|
|
|
source_url: "{{ vault_download_url }}"
|
|
|
|
tag: "{{ vault_image_tag }}"
|
|
|
|
unarchive: true
|
|
|
|
url: "{{ vault_download_url }}"
|
|
|
|
version: "{{ vault_version }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- vault
|
2018-03-31 10:57:00 +00:00
|
|
|
registry:
|
|
|
|
enabled: "{{ registry_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ registry_image_repo }}"
|
|
|
|
tag: "{{ registry_image_tag }}"
|
|
|
|
sha256: "{{ registry_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
registry_proxy:
|
|
|
|
enabled: "{{ registry_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ registry_proxy_image_repo }}"
|
|
|
|
tag: "{{ registry_proxy_image_tag }}"
|
|
|
|
sha256: "{{ registry_proxy_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-03-31 11:25:05 +00:00
|
|
|
local_volume_provisioner:
|
|
|
|
enabled: "{{ local_volume_provisioner_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ local_volume_provisioner_image_repo }}"
|
|
|
|
tag: "{{ local_volume_provisioner_image_tag }}"
|
|
|
|
sha256: "{{ local_volume_provisioner_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-03-31 11:20:53 +00:00
|
|
|
cephfs_provisioner:
|
|
|
|
enabled: "{{ cephfs_provisioner_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cephfs_provisioner_image_repo }}"
|
|
|
|
tag: "{{ cephfs_provisioner_image_tag }}"
|
|
|
|
sha256: "{{ cephfs_provisioner_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-03-31 08:04:24 +00:00
|
|
|
ingress_nginx_controller:
|
|
|
|
enabled: "{{ ingress_nginx_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ ingress_nginx_controller_image_repo }}"
|
|
|
|
tag: "{{ ingress_nginx_controller_image_tag }}"
|
|
|
|
sha256: "{{ ingress_nginx_controller_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
2018-06-07 09:25:25 +00:00
|
|
|
- kube-node
|
2018-03-31 08:04:24 +00:00
|
|
|
ingress_nginx_default_backend:
|
|
|
|
enabled: "{{ ingress_nginx_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ ingress_nginx_default_backend_image_repo }}"
|
|
|
|
tag: "{{ ingress_nginx_default_backend_image_tag }}"
|
|
|
|
sha256: "{{ ingress_nginx_default_backend_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
2018-06-07 09:25:25 +00:00
|
|
|
- kube-node
|
2018-03-28 14:30:00 +00:00
|
|
|
cert_manager_controller:
|
|
|
|
enabled: "{{ cert_manager_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cert_manager_controller_image_repo }}"
|
|
|
|
tag: "{{ cert_manager_controller_image_tag }}"
|
|
|
|
sha256: "{{ cert_manager_controller_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2016-05-22 22:25:52 +00:00
|
|
|
|
2017-10-19 08:17:11 +00:00
|
|
|
download_defaults:
|
|
|
|
container: false
|
|
|
|
file: false
|
|
|
|
repo: None
|
|
|
|
tag: None
|
|
|
|
enabled: false
|
|
|
|
dest: None
|
|
|
|
version: None
|
|
|
|
url: None
|
|
|
|
unarchive: false
|
|
|
|
owner: kube
|
|
|
|
mode: None
|