2016-10-10 14:09:50 +00:00
|
|
|
apiVersion: extensions/v1beta1
|
|
|
|
kind: ReplicaSet
|
|
|
|
metadata:
|
|
|
|
name: calico-policy-controller
|
|
|
|
namespace: kube-system
|
|
|
|
labels:
|
|
|
|
k8s-app: calico-policy
|
|
|
|
kubernetes.io/cluster-service: "true"
|
|
|
|
spec:
|
|
|
|
replicas: 1
|
|
|
|
selector:
|
|
|
|
matchLabels:
|
|
|
|
kubernetes.io/cluster-service: "true"
|
|
|
|
k8s-app: calico-policy
|
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
name: calico-policy-controller
|
|
|
|
namespace: kube-system
|
|
|
|
labels:
|
|
|
|
kubernetes.io/cluster-service: "true"
|
|
|
|
k8s-app: calico-policy
|
|
|
|
spec:
|
|
|
|
hostNetwork: true
|
|
|
|
containers:
|
|
|
|
- name: calico-policy-controller
|
|
|
|
image: calico/kube-policy-controller:latest
|
|
|
|
env:
|
|
|
|
- name: ETCD_ENDPOINTS
|
2016-11-09 10:31:12 +00:00
|
|
|
value: "{{ etcd_access_endpoint }}"
|
2016-11-09 10:44:41 +00:00
|
|
|
- name: ETCD_CA_CERT_FILE
|
|
|
|
value: "{{ etcd_cert_dir }}/ca.pem"
|
|
|
|
- name: ETCD_CERT_FILE
|
|
|
|
value: "{{ etcd_cert_dir }}/node.pem"
|
|
|
|
- name: ETCD_KEY_FILE
|
|
|
|
value: "{{ etcd_cert_dir }}/node-key.pem"
|
2016-10-10 14:09:50 +00:00
|
|
|
# Location of the Kubernetes API - this shouldn't need to be
|
|
|
|
# changed so long as it is used in conjunction with
|
|
|
|
# CONFIGURE_ETC_HOSTS="true".
|
|
|
|
- name: K8S_API
|
|
|
|
value: "https://kubernetes.default:443"
|
|
|
|
# Configure /etc/hosts within the container to resolve
|
|
|
|
# the kubernetes.default Service to the correct clusterIP
|
|
|
|
# using the environment provided by the kubelet.
|
|
|
|
# This removes the need for KubeDNS to resolve the Service.
|
|
|
|
- name: CONFIGURE_ETC_HOSTS
|
|
|
|
value: "true"
|
2016-11-10 12:13:03 +00:00
|
|
|
volumeMounts:
|
|
|
|
- mountPath: {{ etcd_cert_dir }}
|
|
|
|
name: etcd-certs
|
|
|
|
readOnly: true
|
|
|
|
volumes:
|
|
|
|
- hostPath:
|
|
|
|
path: {{ etcd_cert_dir }}
|
|
|
|
name: etcd-certs
|