2015-12-31 13:07:02 +00:00
|
|
|
---
|
2018-02-21 16:35:34 +00:00
|
|
|
local_release_dir: /tmp/releases
|
Added file and container image caching (#4828)
* File and container image downloads are now cached localy, so that repeated vagrant up/down runs do not trigger downloading of those files. This is especially useful on laptops with kubernetes runnig locally on vm's. The total size of the cache, after an ansible run, is currently around 800MB, so bandwidth (=time) savings can be quite significant.
* When download_run_once is false, the default is still not to cache, but setting download_force_cache will still enable caching.
* The local cache location can be set with download_cache_dir and defaults to /tmp/kubernetes_cache
* A local docker instance is no longer required to cache docker images; Images are cached to file. A local docker instance is still required, though, if you wish to download images on localhost.
* Fixed a FIXME, wher the argument was that delegate_to doesn't play nice with omit. That is a correct observation and the fix is to use default(inventory_host) instead of default(omit). See ansible/ansible#26009
* Removed "Register docker images info" task from download_container and set_docker_image_facts because it was faulty and unused.
* Removed redundant when:download.{container,enabled,run_once} conditions from {sync,download}_container.yml
* All features of commit d6fd0d2acaec9f53e75d82db30411f96a5bf2cc9 by Timoses <timosesu@gmail.com>, merged May 1st 2019, are included in this patch. Not all code was included verbatim, but each feature of that commit was checked to be working in this patch. One notable change: The actual downloading of the kubeadm images was moved to {download,sync)_container, to enable caching.
Note 1: I considered splitting this patch, but most changes that are not directly related to caching, are a pleasant by-product of implementing the caching code, so splitting would be impractical.
Note 2: I have my doubts about the usefulness of the upload, download and upgrade tags in the download role. Must they remain or can they be removed? If anybody knows, then please speak up.
2019-06-10 18:21:07 +00:00
|
|
|
download_cache_dir: /tmp/kubespray_cache
|
|
|
|
|
|
|
|
# do not delete remote cache files after using them
|
|
|
|
# NOTE: Setting this parameter to TRUE is only really useful when developing kubespray
|
|
|
|
download_keep_remote_cache: false
|
|
|
|
|
|
|
|
# Only useful when download_run_once is false: Localy cached files and images are
|
|
|
|
# uploaded to kubernetes nodes. Also, images downloaded on those nodes are copied
|
|
|
|
# back to the ansible runner's cache, if they are not yet preset.
|
|
|
|
download_force_cache: false
|
2015-12-31 13:07:02 +00:00
|
|
|
|
2017-10-19 08:17:11 +00:00
|
|
|
# Used to only evaluate vars from download role
|
|
|
|
skip_downloads: false
|
|
|
|
|
2019-06-04 11:35:02 +00:00
|
|
|
# Optionally skip kubeadm images download
|
|
|
|
skip_kubeadm_images: false
|
2019-07-09 19:07:30 +00:00
|
|
|
kubeadm_images: {}
|
2019-06-04 11:35:02 +00:00
|
|
|
|
2016-11-18 12:29:03 +00:00
|
|
|
# if this is set to true will only download files once. Doesn't work
|
2017-01-05 10:35:16 +00:00
|
|
|
# on Container Linux by CoreOS unless the download_localhost is true and localhost
|
2017-02-08 10:25:11 +00:00
|
|
|
# is running another OS type. Default compress level is 1 (fastest).
|
2016-05-18 04:30:01 +00:00
|
|
|
download_run_once: False
|
2017-02-08 10:25:11 +00:00
|
|
|
download_compress: 1
|
2016-11-18 12:29:03 +00:00
|
|
|
|
2018-08-04 10:01:35 +00:00
|
|
|
# if this is set to true will download container
|
|
|
|
download_container: True
|
|
|
|
|
2016-11-18 12:29:03 +00:00
|
|
|
# if this is set to true, uses the localhost for download_run_once mode
|
|
|
|
# (requires docker and sudo to access docker). You may want this option for
|
2017-01-05 10:35:16 +00:00
|
|
|
# local caching of docker images or for Container Linux by CoreOS cluster nodes.
|
2016-11-18 12:29:03 +00:00
|
|
|
# Otherwise, uses the first node in the kube-master group to store images
|
|
|
|
# in the download_run_once mode.
|
|
|
|
download_localhost: False
|
2016-05-18 04:30:01 +00:00
|
|
|
|
2016-12-19 14:50:04 +00:00
|
|
|
# Always pull images if set to True. Otherwise check by the repo's tag/digest.
|
|
|
|
download_always_pull: False
|
|
|
|
|
2018-09-21 09:51:17 +00:00
|
|
|
# Some problems may occur when downloading files over https proxy due to ansible bug
|
|
|
|
# https://github.com/ansible/ansible/issues/32750. Set this variable to False to disable
|
|
|
|
# SSL validation of get_url module. Note that kubespray will still be performing checksum validation.
|
|
|
|
download_validate_certs: True
|
|
|
|
|
2017-10-19 08:17:11 +00:00
|
|
|
# Use the first kube-master if download_localhost is not set
|
2019-05-02 21:24:21 +00:00
|
|
|
download_delegate: "{% if download_localhost %}localhost{% else %}{{ groups['kube-master'][0] }}{% endif %}"
|
2017-10-19 08:17:11 +00:00
|
|
|
|
2017-12-18 08:12:47 +00:00
|
|
|
# Arch of Docker images and needed packages
|
2018-08-20 14:07:27 +00:00
|
|
|
image_arch: "{{host_architecture | default('amd64')}}"
|
2017-12-18 08:12:47 +00:00
|
|
|
|
2016-01-19 14:23:19 +00:00
|
|
|
# Versions
|
2019-07-21 19:24:51 +00:00
|
|
|
kube_version: v1.15.1
|
2017-10-05 09:51:21 +00:00
|
|
|
kubeadm_version: "{{ kube_version }}"
|
2019-06-24 08:27:55 +00:00
|
|
|
etcd_version: v3.3.10
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-10-16 14:26:04 +00:00
|
|
|
# kubernetes image repo define
|
|
|
|
kube_image_repo: "gcr.io/google-containers"
|
|
|
|
|
2017-08-24 09:09:52 +00:00
|
|
|
# TODO(mattymo): Move calico versions to roles/network_plugins/calico/defaults
|
2016-07-04 15:16:18 +00:00
|
|
|
# after migration to container download
|
2019-07-09 19:42:28 +00:00
|
|
|
calico_version: "v3.7.3"
|
|
|
|
calico_ctl_version: "v3.7.3"
|
|
|
|
calico_cni_version: "v3.7.3"
|
|
|
|
calico_policy_version: "v3.7.3"
|
2018-08-23 14:17:18 +00:00
|
|
|
calico_rr_version: "v0.6.1"
|
2019-07-09 19:42:28 +00:00
|
|
|
calico_typha_version: "v3.7.3"
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2019-02-07 12:33:01 +00:00
|
|
|
flannel_version: "v0.11.0"
|
2017-10-26 09:18:06 +00:00
|
|
|
flannel_cni_version: "v0.3.0"
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2019-06-14 09:42:23 +00:00
|
|
|
cni_version: "v0.8.1"
|
2018-12-03 10:22:17 +00:00
|
|
|
|
2019-07-15 07:57:06 +00:00
|
|
|
weave_version: 2.5.2
|
2018-09-06 06:15:51 +00:00
|
|
|
pod_infra_version: 3.1
|
2018-09-17 14:45:05 +00:00
|
|
|
contiv_version: 1.2.1
|
2018-10-31 07:42:56 +00:00
|
|
|
cilium_version: "v1.3.0"
|
2019-04-09 10:37:04 +00:00
|
|
|
kube_router_version: "v0.2.5"
|
2019-06-29 21:09:20 +00:00
|
|
|
multus_version: "v3.1.autoconf"
|
|
|
|
|
|
|
|
crictl_version: "v1.14.0"
|
2015-12-31 15:05:25 +00:00
|
|
|
|
2017-09-13 18:00:51 +00:00
|
|
|
# Download URLs
|
2017-12-18 08:12:47 +00:00
|
|
|
kubeadm_download_url: "https://storage.googleapis.com/kubernetes-release/release/{{ kubeadm_version }}/bin/linux/{{ image_arch }}/kubeadm"
|
2019-01-04 08:40:19 +00:00
|
|
|
hyperkube_download_url: "https://storage.googleapis.com/kubernetes-release/release/{{ kube_version }}/bin/linux/{{ image_arch }}/hyperkube"
|
|
|
|
etcd_download_url: "https://github.com/coreos/etcd/releases/download/{{ etcd_version }}/etcd-{{ etcd_version }}-linux-{{ image_arch }}.tar.gz"
|
2019-06-14 09:42:23 +00:00
|
|
|
cni_download_url: "https://github.com/containernetworking/plugins/releases/download/{{ cni_version }}/cni-plugins-linux-{{ image_arch }}-{{ cni_version }}.tgz"
|
2019-04-15 11:24:04 +00:00
|
|
|
calicoctl_download_url: "https://github.com/projectcalico/calicoctl/releases/download/{{ calico_ctl_version }}/calicoctl-linux-{{ image_arch }}"
|
2019-06-29 21:09:20 +00:00
|
|
|
crictl_download_url: "https://github.com/kubernetes-sigs/cri-tools/releases/download/{{ crictl_version }}/crictl-{{ crictl_version }}-{{ ansible_system | lower }}-{{ image_arch }}.tar.gz"
|
|
|
|
|
|
|
|
crictl_checksums:
|
|
|
|
arm:
|
|
|
|
v1.14.0: 9910cecfd6558239ba015323066c7233d8371af359b9ddd0b2a35d5223bcf945
|
|
|
|
v1.13.0: 2e478ebed85f9d70d49fd8f1d1089c8fba6e37d3461aeef91813f1ab0f0df586
|
|
|
|
arm64:
|
|
|
|
v1.14.0: f76b3d00a272c8d210e9a45f77d07d3770bee310d99c4fd9a72d6f55278882e5
|
|
|
|
v1.13.0: 68949c0cb5a37e7604c145d189cf1e109c08c93d9c710ba663db026b9c6f2746
|
|
|
|
amd64:
|
|
|
|
v1.14.0: 483c90a9fe679590df4332ba807991c49232e8cd326c307c575ecef7fe22327b
|
|
|
|
v1.13.0: 9bdbea7a2b382494aff2ff014da328a042c5aba9096a7772e57fdf487e5a1d51
|
2015-12-31 15:05:25 +00:00
|
|
|
|
2016-01-19 14:23:19 +00:00
|
|
|
# Checksums
|
2018-09-17 16:02:30 +00:00
|
|
|
hyperkube_checksums:
|
2019-06-05 07:05:55 +00:00
|
|
|
arm:
|
2019-07-21 19:24:51 +00:00
|
|
|
v1.15.1: fc5af96fd9341776d84c38675be7b8045dee20af327af9331972c422a4109918
|
2019-07-02 08:51:08 +00:00
|
|
|
v1.15.0: d923c781031bfd97d0fbe50311e4d7c3616aa5b6d466b99049931f09d73d07b9
|
2019-07-12 06:19:06 +00:00
|
|
|
v1.14.4: 429a10369b2ef35a9c2d662347277339d53fa66ef55ffeabcc7d9b850e31056d
|
2019-06-09 18:49:05 +00:00
|
|
|
v1.14.3: 3fac785261bcf79f7a80b12c4a1dda893ce8c0879caf57b36d4701730671b574
|
|
|
|
v1.14.2: 6929a59850c8702c04d62cd343d1143b17456da040f32317e09f8c25a08d2346
|
|
|
|
v1.14.1: 839a4abfeafbd5f5ab057ad0e8a0b0b488b3cde14a646eba040a7f579875f565
|
2019-06-05 07:05:55 +00:00
|
|
|
v1.14.0: d090b1da23564a7e9bb8f1f4264f2116536c52611ae203fe2ca13eaad0a8003e
|
2019-02-09 10:08:57 +00:00
|
|
|
arm64:
|
2019-07-21 19:24:51 +00:00
|
|
|
v1.15.1: 80ed372c5f6c5178df88616175310057c06bdc9d0905953814a1927eb3aaa657
|
2019-07-02 08:51:08 +00:00
|
|
|
v1.15.0: 824af7d925b87a5ade63575b98b59ee81005fc76eac1dc399602308d7a60bc3c
|
2019-07-12 06:19:06 +00:00
|
|
|
v1.14.4: 9e0b4fde88a07c705e0937cd3161392684e3ca08535d14a99ae3b86bbf4c56b3
|
2019-06-09 18:49:05 +00:00
|
|
|
v1.14.3: f29211d668cbcf1aa415dfa64aad95ffc53b5410482a23cddb680caec4e907a3
|
|
|
|
v1.14.2: 959fb7d9c17fc8f7cb1a69920aaf08aefd62c0fbf6b5bdc46250f147ea6a5cd4
|
2019-04-24 09:08:01 +00:00
|
|
|
v1.14.1: d5236efc2547fd07c7cc2ed9345dfbcd1204385847ca686cf1c62d15056de399
|
2019-04-01 14:16:33 +00:00
|
|
|
v1.14.0: 708e00a41f6516d525dee00c91ebe3c3bf2feaf9b7f0af7689487e3e17e356c2
|
2019-02-09 10:08:57 +00:00
|
|
|
amd64:
|
2019-07-21 19:24:51 +00:00
|
|
|
v1.15.1: 22b7b1e7f5f2a452d62e0ca4c2cba67119c51e04219aaeaf8452825f9177069e
|
2019-07-02 08:51:08 +00:00
|
|
|
v1.15.0: 3cc72cc58517b97c608c7a59a20255675bc70f07217c9e11e58cac7746139283
|
2019-07-12 06:19:06 +00:00
|
|
|
v1.14.4: 5f31434f3a884257a7b0e3178fc869720a7526c8637af5713d23433ddf2592dd
|
2019-06-09 18:49:05 +00:00
|
|
|
v1.14.3: 6c6cb5c118b2129ba4e56697f42567be3587eb636a477cd342b69f87b3b049d1
|
|
|
|
v1.14.2: 05546057f2053e085fa8387ab82581c95fe4195cd783408ccbb4fc3487c50176
|
2019-04-24 09:08:01 +00:00
|
|
|
v1.14.1: fb34b98da9325feca8daa09bb934dbe6a533aad69c2a5599bbed81b99bb9c267
|
2019-04-01 14:16:33 +00:00
|
|
|
v1.14.0: af8b04504365dbe4ce6a1772f42eb390d4221a21149b522fc8a0c4b1cd3d97aa
|
2018-09-17 16:02:30 +00:00
|
|
|
kubeadm_checksums:
|
2019-06-05 07:05:55 +00:00
|
|
|
arm:
|
2019-07-21 19:24:51 +00:00
|
|
|
v1.15.1: 855abd520291dcef0577a1a2ef87a70f522fd2b22603a12abcd86c2f7ec9c022
|
2019-07-02 08:51:08 +00:00
|
|
|
v1.15.0: 9464030a1d4e101de5f47348f3514d5a9eb95cbce2e5e31f53ada1ca485cf75e
|
2019-07-12 06:19:06 +00:00
|
|
|
v1.14.4: 36835488d7187406690ee6aa4b3c9c54855cb5c55d786d0574a508b955fe3a46
|
2019-06-09 18:49:05 +00:00
|
|
|
v1.14.3: 270b8c346aeaa309d11d65695c4a90f6bff5b1ea14bdec3c417ca2dfb3de0db3
|
|
|
|
v1.14.2: d2a59269aa68a4bace2a80b247b6f9a82f0542ec3004185fb0ba86e181fdfb29
|
|
|
|
v1.14.1: 4bd111411208f1270ed3af8780b87d24a3c17c9fdbe4b0f8c7a9a21cd765543e
|
2019-06-05 07:05:55 +00:00
|
|
|
v1.14.0: 11f2cfa8bf7ee177dbac8073ab0f039dc265536baaa8dc0c4dea699f981f6fd1
|
2019-02-09 10:08:57 +00:00
|
|
|
arm64:
|
2019-07-21 19:24:51 +00:00
|
|
|
v1.15.1: 44fbfad0f1026d249fc4f365f1e9562cd52d75360d4d1032731122ba5a4d57dc
|
2019-07-02 08:51:08 +00:00
|
|
|
v1.15.0: fe3c79070814fe847a23209b1027672fe5c5e7e5c9611e329225058926836f96
|
2019-07-12 06:19:06 +00:00
|
|
|
v1.14.4: 60745b3ac761d3aa55ab9a24677ecf4e7f48b5abed34c725047a174456e5a79b
|
2019-06-09 18:49:05 +00:00
|
|
|
v1.14.3: 8edcc07c65f81eea3fc47cd237dd6560c6907c5e0ca52d71eab53ca1164e7d01
|
|
|
|
v1.14.2: bff0712b87796509129aa802ad3ac25b8cc83af01762b22b4dcca8dbdb26b520
|
2019-04-24 09:08:01 +00:00
|
|
|
v1.14.1: 5cf05464168e45ee4719264a267c65f9319fae1ceb9923fedab97a9d6a629e0b
|
2019-04-01 14:16:33 +00:00
|
|
|
v1.14.0: 7ed9d706e50cd6d3fc618a7af3d19b691b8a5343ddedaeccb4ea09af3ecfae2c
|
2019-02-09 10:08:57 +00:00
|
|
|
amd64:
|
2019-07-21 19:24:51 +00:00
|
|
|
v1.15.1: 3d42441ae177826f1181e559cd2a729464ca8efadef196cfa0e8053a615333b5
|
2019-07-02 08:51:08 +00:00
|
|
|
v1.15.0: fc4aa44b96dc143d7c3062124e25fed671cab884ebb8b2446edd10abb45e88c2
|
2019-07-12 06:19:06 +00:00
|
|
|
v1.14.4: 291790a1cef82c4de28cc3338a199ca8356838ca26f775f2c2acba165b633d9f
|
2019-06-09 18:49:05 +00:00
|
|
|
v1.14.3: 026700dfff3c78be1295417e96d882136e5e1f095eb843e6575e57ef9930b5d3
|
|
|
|
v1.14.2: 77510f61352bb6e537e70730b670627963f2c314fbd36a644b0c435b97e9705a
|
2019-04-24 09:08:01 +00:00
|
|
|
v1.14.1: c4fc478572b5623857f5d820e1c107ae02049ca02cf2993e512a091a0196957b
|
2019-04-01 14:16:33 +00:00
|
|
|
v1.14.0: 03678f49ee4737f8b8c4f59ace0d140a36ffbc4f6035c59561f59f45b57d0c93
|
2019-06-29 21:09:20 +00:00
|
|
|
crictl_binary_checksums:
|
|
|
|
amd64:
|
|
|
|
v1.14.0: 483c90a9fe679590df4332ba807991c49232e8cd326c307c575ecef7fe22327b
|
2019-02-09 10:08:57 +00:00
|
|
|
|
|
|
|
etcd_binary_checksums:
|
2019-06-05 07:05:55 +00:00
|
|
|
# Etcd does not have arm32 builds at the moment, having some dummy value is
|
|
|
|
# required to avoid "no attribute" error
|
|
|
|
arm: 0
|
2019-06-24 08:27:55 +00:00
|
|
|
arm64: 5ec97b0b872adce275b8130d19db314f7f2b803aeb24c4aae17a19e2d66853c4
|
|
|
|
amd64: 1620a59150ec0a0124a65540e23891243feb2d9a628092fb1edcc23974724a45
|
2019-02-09 10:08:57 +00:00
|
|
|
cni_binary_checksums:
|
2019-06-14 09:42:23 +00:00
|
|
|
arm: ae6ddbd87c05a79aceb92e1c8c32d11e302f6fc55045f87f6a3ea7e0268b2fda
|
|
|
|
arm64: acde854e3def3c776c532ae521c19d8784534918cc56449ff16945a2909bff6d
|
|
|
|
amd64: e9bfc78acd3ae71be77eb8f3e890cc9078a33cc3797703b8ff2fc3077a232252
|
2019-04-15 11:24:04 +00:00
|
|
|
calicoctl_binary_checksums:
|
2019-06-05 07:05:55 +00:00
|
|
|
arm:
|
2019-06-09 18:49:05 +00:00
|
|
|
v3.6.1: 0
|
2019-06-05 07:05:55 +00:00
|
|
|
v3.5.4: 0
|
|
|
|
v3.4.4: 0
|
2019-07-09 19:42:28 +00:00
|
|
|
v3.7.3: 0
|
2019-04-15 11:24:04 +00:00
|
|
|
amd64:
|
2019-04-19 12:45:55 +00:00
|
|
|
v3.6.1: 3b01336de37550e020343d62a38c96c4605d33a3ed7ddba2fe38bc172a5b42b5
|
2019-04-15 11:24:04 +00:00
|
|
|
v3.5.4: 197194b838cc2a9a7455c2ebd5505a5e24f8f3d994eb75c17f5dd568944100b8
|
|
|
|
v3.4.4: 93bd084e053cf1bf3b7fef369677bd6767c30fe7135e2c7e044e31693422ef61
|
2019-07-09 19:42:28 +00:00
|
|
|
v3.7.3: 932f68e893e80e95e10f064f1e7745e438d456f41a6ff12d11bb16ca0cab735c
|
2019-04-15 11:24:04 +00:00
|
|
|
arm64:
|
2019-04-19 12:45:55 +00:00
|
|
|
v3.6.1: 60fbaeb257061647bdf12b5ede7a0d4298a5ee216f6472e5a92bb14ef5c2a5d3
|
2019-04-15 11:24:04 +00:00
|
|
|
v3.5.4: a4481178665658658a73e4ceca9a1dff5cccded4179615c91d1c3e49fd96f237
|
|
|
|
v3.4.4: ff35d9e8b5c00e9fe47d05e8f5123ec98fd641370f8cd93f4fbb3d913da77ab6
|
2019-07-09 19:42:28 +00:00
|
|
|
v3.7.3: 7cfaab25c287f7ef93b2682d060b55bf39f76b668540de50376b5ed174209832
|
2019-02-09 10:08:57 +00:00
|
|
|
|
|
|
|
etcd_binary_checksum: "{{ etcd_binary_checksums[image_arch] }}"
|
|
|
|
cni_binary_checksum: "{{ cni_binary_checksums[image_arch] }}"
|
|
|
|
hyperkube_binary_checksum: "{{ hyperkube_checksums[image_arch][kube_version] }}"
|
|
|
|
kubeadm_binary_checksum: "{{ kubeadm_checksums[image_arch][kubeadm_version] }}"
|
2019-04-15 11:24:04 +00:00
|
|
|
calicoctl_binary_checksum: "{{ calicoctl_binary_checksums[image_arch][calico_ctl_version] }}"
|
2019-06-29 21:09:20 +00:00
|
|
|
crictl_binary_checksum: "{{ crictl_checksums[image_arch][crictl_version] }}"
|
2017-10-19 08:17:11 +00:00
|
|
|
|
2016-09-14 12:30:57 +00:00
|
|
|
# Containers
|
2018-09-09 02:51:35 +00:00
|
|
|
# In some cases, we need a way to set --registry-mirror or --insecure-registry for docker,
|
|
|
|
# it helps a lot for local private development or bare metal environment.
|
|
|
|
# So you need define --registry-mirror or --insecure-registry, and modify the following url address.
|
|
|
|
# example:
|
|
|
|
# You need to deploy kubernetes cluster on local private development.
|
|
|
|
# Also provide the address of your own private registry.
|
|
|
|
# And use --insecure-registry options for docker
|
2016-09-14 12:30:57 +00:00
|
|
|
etcd_image_repo: "quay.io/coreos/etcd"
|
2018-08-20 14:07:27 +00:00
|
|
|
etcd_image_tag: "{{ etcd_version }}{%- if image_arch != 'amd64' -%}-{{ image_arch }}{%- endif -%}"
|
2016-09-14 12:30:57 +00:00
|
|
|
flannel_image_repo: "quay.io/coreos/flannel"
|
|
|
|
flannel_image_tag: "{{ flannel_version }}"
|
2017-08-25 07:07:50 +00:00
|
|
|
flannel_cni_image_repo: "quay.io/coreos/flannel-cni"
|
|
|
|
flannel_cni_image_tag: "{{ flannel_cni_version }}"
|
2019-04-04 08:20:49 +00:00
|
|
|
calico_node_image_repo: "docker.io/calico/node"
|
|
|
|
calico_node_image_tag: "{{ calico_version }}"
|
|
|
|
calico_cni_image_repo: "docker.io/calico/cni"
|
|
|
|
calico_cni_image_tag: "{{ calico_cni_version }}"
|
|
|
|
calico_policy_image_repo: "docker.io/calico/kube-controllers"
|
|
|
|
calico_policy_image_tag: "{{ calico_policy_version }}"
|
|
|
|
calico_rr_image_repo: "docker.io/calico/routereflector"
|
|
|
|
calico_rr_image_tag: "{{ calico_rr_version }}"
|
2019-04-25 12:00:48 +00:00
|
|
|
calico_typha_image_repo: "docker.io/calico/typha"
|
|
|
|
calico_typha_image_tag: "{{ calico_typha_version }}"
|
2017-12-18 08:12:47 +00:00
|
|
|
pod_infra_image_repo: "gcr.io/google_containers/pause-{{ image_arch }}"
|
2016-10-14 21:46:44 +00:00
|
|
|
pod_infra_image_tag: "{{ pod_infra_version }}"
|
2019-04-25 08:34:46 +00:00
|
|
|
install_socat_image_repo: "docker.io/xueshanf/install-socat"
|
2017-09-04 08:30:18 +00:00
|
|
|
install_socat_image_tag: "latest"
|
2018-11-14 17:27:45 +00:00
|
|
|
netcheck_version: "v1.0"
|
|
|
|
netcheck_agent_image_repo: "quay.io/l23network/k8s-netchecker-agent"
|
2018-09-30 03:44:01 +00:00
|
|
|
netcheck_agent_image_tag: "{{ netcheck_version }}"
|
2018-11-14 17:27:45 +00:00
|
|
|
netcheck_server_image_repo: "quay.io/l23network/k8s-netchecker-server"
|
2018-09-30 03:44:01 +00:00
|
|
|
netcheck_server_image_tag: "{{ netcheck_version }}"
|
2018-09-17 09:09:19 +00:00
|
|
|
weave_kube_image_repo: "docker.io/weaveworks/weave-kube"
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_kube_image_tag: "{{ weave_version }}"
|
2018-09-17 09:09:19 +00:00
|
|
|
weave_npc_image_repo: "docker.io/weaveworks/weave-npc"
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_npc_image_tag: "{{ weave_version }}"
|
2019-04-25 08:34:46 +00:00
|
|
|
contiv_image_repo: "docker.io/contiv/netplugin"
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv_image_tag: "{{ contiv_version }}"
|
2019-04-25 08:34:46 +00:00
|
|
|
contiv_init_image_repo: "docker.io/contiv/netplugin-init"
|
2018-09-17 14:45:05 +00:00
|
|
|
contiv_init_image_tag: "latest"
|
2019-04-25 08:34:46 +00:00
|
|
|
contiv_auth_proxy_image_repo: "docker.io/contiv/auth_proxy"
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv_auth_proxy_image_tag: "{{ contiv_version }}"
|
2019-04-25 08:34:46 +00:00
|
|
|
contiv_etcd_init_image_repo: "docker.io/ferest/etcd-initer"
|
2018-05-29 15:05:33 +00:00
|
|
|
contiv_etcd_init_image_tag: latest
|
2019-04-25 08:34:46 +00:00
|
|
|
contiv_ovs_image_repo: "docker.io/contiv/ovs"
|
2018-09-17 14:45:05 +00:00
|
|
|
contiv_ovs_image_tag: "latest"
|
2018-02-17 03:37:47 +00:00
|
|
|
cilium_image_repo: "docker.io/cilium/cilium"
|
|
|
|
cilium_image_tag: "{{ cilium_version }}"
|
2018-12-18 08:34:19 +00:00
|
|
|
cilium_init_image_repo: "docker.io/library/busybox"
|
|
|
|
cilium_init_image_tag: "1.28.4"
|
2019-04-25 08:34:46 +00:00
|
|
|
kube_router_image_repo: "docker.io/cloudnativelabs/kube-router"
|
2018-10-16 14:15:05 +00:00
|
|
|
kube_router_image_tag: "{{ kube_router_version }}"
|
2018-11-04 09:07:38 +00:00
|
|
|
multus_image_repo: "docker.io/nfvpe/multus"
|
|
|
|
multus_image_tag: "{{ multus_version }}"
|
2019-04-25 08:34:46 +00:00
|
|
|
nginx_image_repo: docker.io/nginx
|
2019-04-08 09:02:29 +00:00
|
|
|
nginx_image_tag: 1.15
|
2018-08-21 15:53:23 +00:00
|
|
|
|
2019-04-25 08:34:46 +00:00
|
|
|
haproxy_image_repo: docker.io/haproxy
|
2019-04-10 12:56:18 +00:00
|
|
|
haproxy_image_tag: 1.9
|
|
|
|
|
2019-07-15 07:59:06 +00:00
|
|
|
coredns_version: "1.5.2"
|
2019-04-25 08:34:46 +00:00
|
|
|
coredns_image_repo: "docker.io/coredns/coredns"
|
2018-11-13 08:30:29 +00:00
|
|
|
coredns_image_tag: "{{ coredns_version }}"
|
2018-08-21 15:53:23 +00:00
|
|
|
|
2019-01-28 09:57:40 +00:00
|
|
|
nodelocaldns_version: "1.15.1"
|
2018-12-11 01:28:03 +00:00
|
|
|
nodelocaldns_image_repo: "k8s.gcr.io/k8s-dns-node-cache"
|
|
|
|
nodelocaldns_image_tag: "{{ nodelocaldns_version }}"
|
|
|
|
|
2019-07-02 08:51:08 +00:00
|
|
|
dnsautoscaler_version: 1.6.0
|
2019-04-04 07:36:51 +00:00
|
|
|
dnsautoscaler_image_repo: "k8s.gcr.io/cluster-proportional-autoscaler-{{ image_arch }}"
|
2018-11-15 09:28:03 +00:00
|
|
|
dnsautoscaler_image_tag: "{{ dnsautoscaler_version }}"
|
2019-04-25 08:34:46 +00:00
|
|
|
test_image_repo: docker.io/busybox
|
2016-11-21 10:20:44 +00:00
|
|
|
test_image_tag: latest
|
2019-04-25 08:34:46 +00:00
|
|
|
busybox_image_repo: docker.io/busybox
|
2018-10-16 14:15:05 +00:00
|
|
|
busybox_image_tag: 1.29.2
|
2019-04-07 14:04:25 +00:00
|
|
|
helm_version: "v2.13.1"
|
2019-04-25 08:34:46 +00:00
|
|
|
helm_image_repo: "docker.io/lachlanevenson/k8s-helm"
|
2017-03-17 11:56:25 +00:00
|
|
|
helm_image_tag: "{{ helm_version }}"
|
|
|
|
tiller_image_repo: "gcr.io/kubernetes-helm/tiller"
|
2017-11-28 14:52:42 +00:00
|
|
|
tiller_image_tag: "{{ helm_version }}"
|
2018-11-10 16:51:24 +00:00
|
|
|
|
2019-04-25 08:34:46 +00:00
|
|
|
registry_image_repo: "docker.io/registry"
|
2018-03-31 10:57:00 +00:00
|
|
|
registry_image_tag: "2.6"
|
|
|
|
registry_proxy_image_repo: "gcr.io/google_containers/kube-registry-proxy"
|
|
|
|
registry_proxy_image_tag: "0.4"
|
2019-07-02 08:51:08 +00:00
|
|
|
metrics_server_version: "v0.3.3"
|
2019-04-26 07:44:26 +00:00
|
|
|
metrics_server_image_repo: "gcr.io/google_containers/metrics-server-amd64"
|
2018-11-23 08:36:21 +00:00
|
|
|
metrics_server_image_tag: "{{ metrics_server_version }}"
|
2018-03-31 11:25:05 +00:00
|
|
|
local_volume_provisioner_image_repo: "quay.io/external_storage/local-volume-provisioner"
|
2019-07-16 12:27:26 +00:00
|
|
|
local_volume_provisioner_image_tag: "v2.3.2"
|
2018-07-07 16:37:08 +00:00
|
|
|
cephfs_provisioner_image_repo: "quay.io/external_storage/cephfs-provisioner"
|
2018-09-02 03:51:28 +00:00
|
|
|
cephfs_provisioner_image_tag: "v2.1.0-k8s1.11"
|
2019-04-17 06:14:02 +00:00
|
|
|
rbd_provisioner_image_repo: "quay.io/external_storage/rbd-provisioner"
|
|
|
|
rbd_provisioner_image_tag: "v2.1.1-k8s1.11"
|
2019-04-25 08:34:46 +00:00
|
|
|
local_path_provisioner_image_repo: "docker.io/rancher/local-path-provisioner"
|
2019-02-26 06:45:30 +00:00
|
|
|
local_path_provisioner_image_tag: "v0.0.2"
|
2018-03-31 08:04:24 +00:00
|
|
|
ingress_nginx_controller_image_repo: "quay.io/kubernetes-ingress-controller/nginx-ingress-controller"
|
2019-05-03 19:19:39 +00:00
|
|
|
ingress_nginx_controller_image_tag: "0.24.1"
|
2018-11-20 13:13:01 +00:00
|
|
|
cert_manager_version: "v0.5.2"
|
2018-03-28 14:30:00 +00:00
|
|
|
cert_manager_controller_image_repo: "quay.io/jetstack/cert-manager-controller"
|
|
|
|
cert_manager_controller_image_tag: "{{ cert_manager_version }}"
|
2018-11-23 08:36:21 +00:00
|
|
|
addon_resizer_version: "1.8.3"
|
|
|
|
addon_resizer_image_repo: "k8s.gcr.io/addon-resizer"
|
|
|
|
addon_resizer_image_tag: "{{ addon_resizer_version }}"
|
2017-03-17 11:56:25 +00:00
|
|
|
|
2018-12-03 18:29:42 +00:00
|
|
|
dashboard_image_repo: "gcr.io/google_containers/kubernetes-dashboard-{{ image_arch }}"
|
2019-01-08 17:46:20 +00:00
|
|
|
dashboard_image_tag: "v1.10.1"
|
2018-12-03 18:29:42 +00:00
|
|
|
|
2019-06-29 21:09:20 +00:00
|
|
|
image_pull_command: "{{ docker_bin_dir }}/docker pull"
|
|
|
|
image_info_command: "{{ docker_bin_dir }}/docker images -q | xargs {{ docker_bin_dir }}/docker inspect -f \"{{ '{{' }} if .RepoTags {{ '}}' }}{{ '{{' }} (index .RepoTags 0) {{ '}}' }}{{ '{{' }} end {{ '}}' }}{{ '{{' }} if .RepoDigests {{ '}}' }},{{ '{{' }} (index .RepoDigests 0) {{ '}}' }}{{ '{{' }} end {{ '}}' }}\" | tr '\n' ','"
|
|
|
|
|
2015-12-31 15:05:25 +00:00
|
|
|
downloads:
|
2016-09-30 15:23:47 +00:00
|
|
|
netcheck_server:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ deploy_netchecker }}"
|
2016-09-30 15:23:47 +00:00
|
|
|
container: true
|
2018-09-30 03:44:01 +00:00
|
|
|
repo: "{{ netcheck_server_image_repo }}"
|
|
|
|
tag: "{{ netcheck_server_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ netcheck_server_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-09-30 15:23:47 +00:00
|
|
|
netcheck_agent:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ deploy_netchecker }}"
|
2016-09-30 15:23:47 +00:00
|
|
|
container: true
|
2018-09-30 03:44:01 +00:00
|
|
|
repo: "{{ netcheck_agent_image_repo }}"
|
|
|
|
tag: "{{ netcheck_agent_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ netcheck_agent_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-05-22 22:25:52 +00:00
|
|
|
etcd:
|
2018-09-13 14:49:23 +00:00
|
|
|
container: "{{ etcd_deployment_type != 'host' }}"
|
2019-07-21 07:08:53 +00:00
|
|
|
file: "{{ etcd_deployment_type == 'host' or etcd_kubeadm_enabled }}"
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: true
|
2018-07-30 09:55:25 +00:00
|
|
|
version: "{{ etcd_version }}"
|
2018-10-20 11:56:55 +00:00
|
|
|
dest: "{{local_release_dir}}/etcd-{{ etcd_version }}-linux-amd64.tar.gz"
|
2018-09-13 14:49:23 +00:00
|
|
|
repo: "{{ etcd_image_repo }}"
|
|
|
|
tag: "{{ etcd_image_tag }}"
|
2019-07-21 07:08:53 +00:00
|
|
|
sha256: >-
|
|
|
|
{{ etcd_binary_checksum if (etcd_deployment_type == 'host' or etcd_kubeadm_enabled)
|
|
|
|
else etcd_digest_checksum|d(None) }}
|
2018-07-30 09:55:25 +00:00
|
|
|
url: "{{ etcd_download_url }}"
|
|
|
|
unarchive: true
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
|
|
|
groups:
|
|
|
|
- etcd
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-12-03 10:22:17 +00:00
|
|
|
cni:
|
|
|
|
enabled: true
|
|
|
|
file: true
|
|
|
|
version: "{{ cni_version }}"
|
2019-06-14 09:42:23 +00:00
|
|
|
dest: "{{local_release_dir}}/cni-plugins-linux-{{ image_arch }}-{{ cni_version }}.tgz"
|
2018-12-03 10:22:17 +00:00
|
|
|
sha256: "{{ cni_binary_checksum }}"
|
|
|
|
url: "{{ cni_download_url }}"
|
|
|
|
unarchive: false
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2017-09-13 18:00:51 +00:00
|
|
|
kubeadm:
|
2018-12-06 10:33:38 +00:00
|
|
|
enabled: true
|
2017-10-19 08:17:11 +00:00
|
|
|
file: true
|
2017-09-13 18:00:51 +00:00
|
|
|
version: "{{ kubeadm_version }}"
|
2019-05-01 08:10:56 +00:00
|
|
|
dest: "{{ local_release_dir }}/kubeadm-{{ kubeadm_version }}-{{ image_arch }}"
|
2018-09-13 14:49:23 +00:00
|
|
|
sha256: "{{ kubeadm_binary_checksum }}"
|
2017-09-13 18:00:51 +00:00
|
|
|
url: "{{ kubeadm_download_url }}"
|
|
|
|
unarchive: false
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-07-30 09:55:25 +00:00
|
|
|
hyperkube_file:
|
|
|
|
enabled: true
|
|
|
|
file: true
|
|
|
|
version: "{{ kube_version }}"
|
2019-05-01 08:10:56 +00:00
|
|
|
dest: "{{ local_release_dir }}/hyperkube-{{ kube_version }}-{{ image_arch }}"
|
2018-09-13 14:49:23 +00:00
|
|
|
sha256: "{{ hyperkube_binary_checksum }}"
|
2018-07-30 09:55:25 +00:00
|
|
|
url: "{{ hyperkube_download_url }}"
|
|
|
|
unarchive: false
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2019-06-29 21:09:20 +00:00
|
|
|
crictl:
|
|
|
|
file: true
|
|
|
|
enabled: "{{ container_manager in ['crio', 'cri', 'containerd'] }}"
|
|
|
|
version: "{{ crictl_version }}"
|
|
|
|
dest: "{{local_release_dir}}/crictl-{{ crictl_version }}-linux-{{ image_arch }}.tar.gz"
|
|
|
|
sha256: "{{ crictl_binary_checksum }}"
|
|
|
|
url: "{{ crictl_download_url }}"
|
|
|
|
unarchive: true
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2018-02-17 03:37:47 +00:00
|
|
|
cilium:
|
|
|
|
enabled: "{{ kube_network_plugin == 'cilium' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cilium_image_repo }}"
|
|
|
|
tag: "{{ cilium_image_tag }}"
|
|
|
|
sha256: "{{ cilium_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-12-18 08:34:19 +00:00
|
|
|
cilium_init:
|
|
|
|
enabled: "{{ kube_network_plugin == 'cilium' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cilium_init_image_repo }}"
|
|
|
|
tag: "{{ cilium_init_image_tag }}"
|
|
|
|
sha256: "{{ cilium_init_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2018-11-04 09:07:38 +00:00
|
|
|
multus:
|
|
|
|
enabled: "{{ kube_network_plugin_multus }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ multus_image_repo }}"
|
|
|
|
tag: "{{ multus_image_tag }}"
|
|
|
|
sha256: "{{ multus_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2016-09-14 12:30:57 +00:00
|
|
|
flannel:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'flannel' or kube_network_plugin == 'canal' }}"
|
2016-09-14 12:30:57 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ flannel_image_repo }}"
|
|
|
|
tag: "{{ flannel_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ flannel_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2017-08-25 07:07:50 +00:00
|
|
|
flannel_cni:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'flannel' }}"
|
2017-08-25 07:07:50 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ flannel_cni_image_repo }}"
|
|
|
|
tag: "{{ flannel_cni_image_tag }}"
|
|
|
|
sha256: "{{ flannel_cni_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-09-14 12:30:57 +00:00
|
|
|
calicoctl:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
|
2019-04-15 11:24:04 +00:00
|
|
|
file: true
|
|
|
|
version: "{{ calico_ctl_version }}"
|
|
|
|
dest: "{{local_release_dir}}/calicoctl"
|
|
|
|
sha256: "{{ calicoctl_binary_checksum }}"
|
|
|
|
url: "{{ calicoctl_download_url }}"
|
|
|
|
unarchive: false
|
|
|
|
owner: "root"
|
|
|
|
mode: "0755"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-09-14 12:30:57 +00:00
|
|
|
calico_node:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
|
2016-09-14 12:30:57 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_node_image_repo }}"
|
|
|
|
tag: "{{ calico_node_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_node_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-11-03 15:57:11 +00:00
|
|
|
calico_cni:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
|
2016-11-03 15:57:11 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_cni_image_repo }}"
|
|
|
|
tag: "{{ calico_cni_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_cni_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-11-21 10:20:44 +00:00
|
|
|
calico_policy:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ enable_network_policy or kube_network_plugin == 'canal' }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_policy_image_repo }}"
|
|
|
|
tag: "{{ calico_policy_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_policy_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-12-08 16:48:54 +00:00
|
|
|
calico_rr:
|
2018-03-08 09:04:16 +00:00
|
|
|
enabled: "{{ peer_with_calico_rr is defined and peer_with_calico_rr and kube_network_plugin == 'calico' }}"
|
2016-12-08 16:48:54 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ calico_rr_image_repo }}"
|
|
|
|
tag: "{{ calico_rr_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ calico_rr_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- calico-rr
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2019-04-25 12:00:48 +00:00
|
|
|
calico_typha:
|
|
|
|
enabled: "{{ typha_enabled == 'calico' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ calico_typha_image_repo }}"
|
|
|
|
tag: "{{ calico_typha_image_tag }}"
|
|
|
|
sha256: "{{ calico_typha_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_kube:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'weave' }}"
|
2017-01-10 14:47:39 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ weave_kube_image_repo }}"
|
|
|
|
tag: "{{ weave_kube_image_tag }}"
|
|
|
|
sha256: "{{ weave_kube_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2017-01-10 14:47:39 +00:00
|
|
|
weave_npc:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ kube_network_plugin == 'weave' }}"
|
2017-01-10 14:47:39 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ weave_npc_image_repo }}"
|
|
|
|
tag: "{{ weave_npc_image_tag }}"
|
|
|
|
sha256: "{{ weave_npc_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv:
|
|
|
|
enabled: "{{ kube_network_plugin == 'contiv' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ contiv_image_repo }}"
|
|
|
|
tag: "{{ contiv_image_tag }}"
|
|
|
|
sha256: "{{ contiv_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
contiv_auth_proxy:
|
|
|
|
enabled: "{{ kube_network_plugin == 'contiv' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ contiv_auth_proxy_image_repo }}"
|
|
|
|
tag: "{{ contiv_auth_proxy_image_tag }}"
|
|
|
|
sha256: "{{ contiv_auth_proxy_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-05-29 15:05:33 +00:00
|
|
|
contiv_etcd_init:
|
|
|
|
enabled: "{{ kube_network_plugin == 'contiv' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ contiv_etcd_init_image_repo }}"
|
|
|
|
tag: "{{ contiv_etcd_init_image_tag }}"
|
|
|
|
sha256: "{{ contiv_etcd_init_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-10-16 14:15:05 +00:00
|
|
|
kube_router:
|
|
|
|
enabled: "{{ kube_network_plugin == 'kube-router' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ kube_router_image_repo }}"
|
|
|
|
tag: "{{ kube_router_image_tag }}"
|
|
|
|
sha256: "{{ kube_router_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2016-10-14 21:46:44 +00:00
|
|
|
pod_infra:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: true
|
2016-10-14 21:46:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ pod_infra_image_repo }}"
|
|
|
|
tag: "{{ pod_infra_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ pod_infra_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2017-09-04 08:30:18 +00:00
|
|
|
install_socat:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ ansible_os_family in ['CoreOS', 'Container Linux by CoreOS'] }}"
|
2017-09-04 08:30:18 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ install_socat_image_repo }}"
|
|
|
|
tag: "{{ install_socat_image_tag }}"
|
|
|
|
sha256: "{{ install_socat_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2016-11-21 10:20:44 +00:00
|
|
|
nginx:
|
2019-04-10 12:56:18 +00:00
|
|
|
enabled: "{{ loadbalancer_apiserver_localhost and loadbalancer_apiserver_type == 'nginx' }}"
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ nginx_image_repo }}"
|
|
|
|
tag: "{{ nginx_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ nginx_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2019-04-10 12:56:18 +00:00
|
|
|
haproxy:
|
|
|
|
enabled: "{{ loadbalancer_apiserver_localhost and loadbalancer_apiserver_type == 'haproxy' }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ haproxy_image_repo }}"
|
|
|
|
tag: "{{ haproxy_image_tag }}"
|
|
|
|
sha256: "{{ haproxy_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
|
2018-03-13 11:00:05 +00:00
|
|
|
coredns:
|
|
|
|
enabled: "{{ dns_mode in ['coredns', 'coredns_dual'] }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ coredns_image_repo }}"
|
|
|
|
tag: "{{ coredns_image_tag }}"
|
|
|
|
sha256: "{{ coredns_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
2019-04-24 17:48:03 +00:00
|
|
|
- kube-master
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-12-11 01:28:03 +00:00
|
|
|
nodelocaldns:
|
2019-04-17 15:42:03 +00:00
|
|
|
enabled: "{{ enable_nodelocaldns }}"
|
2018-12-11 01:28:03 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ nodelocaldns_image_repo }}"
|
|
|
|
tag: "{{ nodelocaldns_image_tag }}"
|
|
|
|
sha256: "{{ nodelocaldns_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
2019-04-24 17:48:03 +00:00
|
|
|
- k8s-cluster
|
2018-12-11 01:28:03 +00:00
|
|
|
|
2018-11-15 09:28:03 +00:00
|
|
|
dnsautoscaler:
|
2019-04-01 19:32:34 +00:00
|
|
|
enabled: "{{ dns_mode in ['coredns', 'coredns_dual'] }}"
|
2017-06-16 00:37:55 +00:00
|
|
|
container: true
|
2018-11-15 09:28:03 +00:00
|
|
|
repo: "{{ dnsautoscaler_image_repo }}"
|
|
|
|
tag: "{{ dnsautoscaler_image_tag }}"
|
|
|
|
sha256: "{{ dnsautoscaler_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
2019-04-24 17:48:03 +00:00
|
|
|
- kube-master
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-10-16 14:15:05 +00:00
|
|
|
busybox:
|
|
|
|
enabled: "{{ kube_network_plugin in ['kube-router'] }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ busybox_image_repo }}"
|
|
|
|
tag: "{{ busybox_image_tag }}"
|
|
|
|
sha256: "{{ busybox_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- k8s-cluster
|
|
|
|
|
2016-11-21 10:20:44 +00:00
|
|
|
testbox:
|
2018-03-31 02:40:01 +00:00
|
|
|
enabled: false
|
2016-11-21 10:20:44 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ test_image_repo }}"
|
|
|
|
tag: "{{ test_image_tag }}"
|
2016-12-19 14:50:04 +00:00
|
|
|
sha256: "{{ testbox_digest_checksum|default(None) }}"
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2017-03-17 11:56:25 +00:00
|
|
|
helm:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ helm_enabled }}"
|
2017-03-17 11:56:25 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ helm_image_repo }}"
|
|
|
|
tag: "{{ helm_image_tag }}"
|
|
|
|
sha256: "{{ helm_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2017-03-17 11:56:25 +00:00
|
|
|
tiller:
|
2017-10-19 08:17:11 +00:00
|
|
|
enabled: "{{ helm_enabled }}"
|
2017-03-17 11:56:25 +00:00
|
|
|
container: true
|
|
|
|
repo: "{{ tiller_image_repo }}"
|
|
|
|
tag: "{{ tiller_image_tag }}"
|
|
|
|
sha256: "{{ tiller_digest_checksum|default(None) }}"
|
2018-03-31 02:40:01 +00:00
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-03-31 10:57:00 +00:00
|
|
|
registry:
|
|
|
|
enabled: "{{ registry_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ registry_image_repo }}"
|
|
|
|
tag: "{{ registry_image_tag }}"
|
|
|
|
sha256: "{{ registry_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-03-31 10:57:00 +00:00
|
|
|
registry_proxy:
|
|
|
|
enabled: "{{ registry_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ registry_proxy_image_repo }}"
|
|
|
|
tag: "{{ registry_proxy_image_tag }}"
|
|
|
|
sha256: "{{ registry_proxy_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-11-23 08:36:21 +00:00
|
|
|
metrics_server:
|
|
|
|
enabled: "{{ metrics_server_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ metrics_server_image_repo }}"
|
|
|
|
tag: "{{ metrics_server_image_tag }}"
|
|
|
|
sha256: "{{ metrics_server_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-master
|
|
|
|
|
|
|
|
addon_resizer:
|
|
|
|
# Currently addon_resizer is only used by metrics server
|
|
|
|
enabled: "{{ metrics_server_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ addon_resizer_image_repo }}"
|
|
|
|
tag: "{{ addon_resizer_image_tag }}"
|
|
|
|
sha256: "{{ addon_resizer_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-master
|
|
|
|
|
2018-03-31 11:25:05 +00:00
|
|
|
local_volume_provisioner:
|
|
|
|
enabled: "{{ local_volume_provisioner_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ local_volume_provisioner_image_repo }}"
|
|
|
|
tag: "{{ local_volume_provisioner_image_tag }}"
|
|
|
|
sha256: "{{ local_volume_provisioner_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-03-31 11:20:53 +00:00
|
|
|
cephfs_provisioner:
|
|
|
|
enabled: "{{ cephfs_provisioner_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cephfs_provisioner_image_repo }}"
|
|
|
|
tag: "{{ cephfs_provisioner_image_tag }}"
|
|
|
|
sha256: "{{ cephfs_provisioner_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2019-04-17 06:14:02 +00:00
|
|
|
rbd_provisioner:
|
|
|
|
enabled: "{{ rbd_provisioner_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ rbd_provisioner_image_repo }}"
|
|
|
|
tag: "{{ rbd_provisioner_image_tag }}"
|
|
|
|
sha256: "{{ rbd_provisioner_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
|
2019-02-26 06:45:30 +00:00
|
|
|
local_path_provisioner:
|
|
|
|
enabled: "{{ local_volume_provisioner_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ local_path_provisioner_image_repo }}"
|
|
|
|
tag: "{{ local_path_provisioner_image_tag }}"
|
|
|
|
sha256: "{{ local_path_provisioner_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
|
|
|
|
2018-03-31 08:04:24 +00:00
|
|
|
ingress_nginx_controller:
|
|
|
|
enabled: "{{ ingress_nginx_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ ingress_nginx_controller_image_repo }}"
|
|
|
|
tag: "{{ ingress_nginx_controller_image_tag }}"
|
|
|
|
sha256: "{{ ingress_nginx_controller_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
2018-06-07 09:25:25 +00:00
|
|
|
- kube-node
|
2018-09-13 14:49:23 +00:00
|
|
|
|
2018-03-28 14:30:00 +00:00
|
|
|
cert_manager_controller:
|
|
|
|
enabled: "{{ cert_manager_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ cert_manager_controller_image_repo }}"
|
|
|
|
tag: "{{ cert_manager_controller_image_tag }}"
|
|
|
|
sha256: "{{ cert_manager_controller_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-node
|
2016-05-22 22:25:52 +00:00
|
|
|
|
2018-12-03 18:29:42 +00:00
|
|
|
dashboard:
|
|
|
|
enabled: "{{ dashboard_enabled }}"
|
|
|
|
container: true
|
|
|
|
repo: "{{ dashboard_image_repo }}"
|
|
|
|
tag: "{{ dashboard_image_tag }}"
|
|
|
|
sha256: "{{ dashboard_digest_checksum|default(None) }}"
|
|
|
|
groups:
|
|
|
|
- kube-master
|
|
|
|
|
2017-10-19 08:17:11 +00:00
|
|
|
download_defaults:
|
|
|
|
container: false
|
|
|
|
file: false
|
|
|
|
repo: None
|
|
|
|
tag: None
|
|
|
|
enabled: false
|
|
|
|
dest: None
|
|
|
|
version: None
|
|
|
|
url: None
|
|
|
|
unarchive: false
|
|
|
|
owner: kube
|
|
|
|
mode: None
|