2017-09-13 18:00:51 +00:00
|
|
|
### Upstream source https://github.com/kubernetes/release/blob/master/debian/xenial/kubeadm/channel/stable/etc/systemd/system/kubelet.service.d/10-kubeadm.conf
|
|
|
|
### All upstream values should be present in this file
|
|
|
|
|
2016-01-22 13:25:33 +00:00
|
|
|
# logging to stderr means we get it in the systemd journal
|
2017-10-30 11:33:02 +00:00
|
|
|
KUBE_LOGTOSTDERR="--logtostderr=true"
|
2016-11-25 10:33:39 +00:00
|
|
|
KUBE_LOG_LEVEL="--v={{ kube_log_level }}"
|
2015-10-03 20:19:50 +00:00
|
|
|
# The address for the info server to serve on (set to 0.0.0.0 or "" for all interfaces)
|
2017-11-03 10:19:37 +00:00
|
|
|
KUBELET_ADDRESS="--address={{ kubelet_bind_address }} --node-ip={{ kubelet_address }}"
|
2015-10-03 20:19:50 +00:00
|
|
|
# The port for the info server to serve on
|
2015-12-16 22:49:01 +00:00
|
|
|
# KUBELET_PORT="--port=10250"
|
2015-10-03 20:19:50 +00:00
|
|
|
# You may leave this blank to use the actual hostname
|
2017-12-22 22:09:59 +00:00
|
|
|
{% if kube_override_hostname|default('') %}
|
2017-07-13 14:04:39 +00:00
|
|
|
KUBELET_HOSTNAME="--hostname-override={{ kube_override_hostname }}"
|
|
|
|
{% endif %}
|
2016-12-15 09:37:14 +00:00
|
|
|
{# Base kubelet args #}
|
2017-09-13 18:00:51 +00:00
|
|
|
{% set kubelet_args_base -%}
|
|
|
|
{# start kubeadm specific settings #}
|
2017-09-15 21:28:15 +00:00
|
|
|
--bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf \
|
2017-09-13 18:00:51 +00:00
|
|
|
--kubeconfig={{ kube_config_dir }}/kubelet.conf \
|
2018-01-09 19:33:05 +00:00
|
|
|
{% if kube_version | version_compare('v1.8', '<') %}
|
2017-09-15 21:28:15 +00:00
|
|
|
--require-kubeconfig \
|
2018-01-09 19:33:05 +00:00
|
|
|
{% endif %}
|
2017-09-13 18:00:51 +00:00
|
|
|
--authorization-mode=Webhook \
|
|
|
|
--client-ca-file={{ kube_cert_dir }}/ca.crt \
|
|
|
|
--pod-manifest-path={{ kube_manifest_dir }} \
|
2017-11-06 13:50:28 +00:00
|
|
|
--cadvisor-port={{ kube_cadvisor_port }} \
|
2017-09-13 18:00:51 +00:00
|
|
|
{# end kubeadm specific settings #}
|
2017-02-07 14:01:02 +00:00
|
|
|
--pod-infra-container-image={{ pod_infra_image_repo }}:{{ pod_infra_image_tag }} \
|
|
|
|
--kube-reserved cpu={{ kubelet_cpu_limit }},memory={{ kubelet_memory_limit|regex_replace('Mi', 'M') }} \
|
2017-04-05 10:47:03 +00:00
|
|
|
--node-status-update-frequency={{ kubelet_status_update_frequency }} \
|
2017-09-22 11:19:04 +00:00
|
|
|
--cgroup-driver={{ kubelet_cgroup_driver|default(kubelet_cgroup_driver_detected) }} \
|
2017-10-11 13:55:51 +00:00
|
|
|
--docker-disable-shared-pid={{ kubelet_disable_shared_pid }} \
|
2017-10-30 19:06:54 +00:00
|
|
|
--anonymous-auth=false \
|
2017-10-18 15:32:38 +00:00
|
|
|
{% if kube_version | version_compare('v1.8', '<') %}
|
|
|
|
--experimental-fail-swap-on={{ kubelet_fail_swap_on|default(true)}} \
|
|
|
|
{% else %}
|
2017-10-11 18:49:31 +00:00
|
|
|
--fail-swap-on={{ kubelet_fail_swap_on|default(true)}} \
|
2017-10-18 15:32:38 +00:00
|
|
|
{% endif %}
|
2017-09-13 18:00:51 +00:00
|
|
|
{% endset %}
|
2016-12-15 09:37:14 +00:00
|
|
|
|
2017-10-11 18:47:42 +00:00
|
|
|
{# Node reserved CPU/memory #}
|
|
|
|
{% if is_kube_master|bool %}
|
|
|
|
{% set kubelet_reserve %}--kube-reserved cpu={{ kubelet_master_cpu_limit }},memory={{ kubelet_master_memory_limit|regex_replace('Mi', 'M') }}{% endset %}
|
|
|
|
{% else %}
|
|
|
|
{% set kubelet_reserve %}--kube-reserved cpu={{ kubelet_cpu_limit }},memory={{ kubelet_memory_limit|regex_replace('Mi', 'M') }}{% endset %}
|
|
|
|
{% endif %}
|
|
|
|
|
2016-12-15 09:37:14 +00:00
|
|
|
{# DNS settings for kubelet #}
|
2016-12-21 16:18:11 +00:00
|
|
|
{% if dns_mode == 'kubedns' %}
|
2017-05-16 20:43:29 +00:00
|
|
|
{% set kubelet_args_cluster_dns %}--cluster-dns={{ skydns_server }}{% endset %}
|
2016-12-21 16:18:11 +00:00
|
|
|
{% elif dns_mode == 'dnsmasq_kubedns' %}
|
2017-10-30 11:23:24 +00:00
|
|
|
{% set kubelet_args_cluster_dns %}--cluster-dns={{ dnsmasq_dns_server }}{% endset %}
|
2016-12-13 10:43:06 +00:00
|
|
|
{% else %}
|
2016-12-15 09:37:14 +00:00
|
|
|
{% set kubelet_args_cluster_dns %}{% endset %}
|
2016-12-13 10:43:06 +00:00
|
|
|
{% endif %}
|
2017-05-16 20:43:29 +00:00
|
|
|
{% set kubelet_args_dns %}{{ kubelet_args_cluster_dns }} --cluster-domain={{ dns_domain }} --resolv-conf={{ kube_resolv_conf }}{% endset %}
|
2016-12-15 09:37:14 +00:00
|
|
|
|
2017-03-06 12:51:32 +00:00
|
|
|
|
2018-01-09 13:04:36 +00:00
|
|
|
KUBELET_ARGS="{{ kubelet_args_base }} {{ kubelet_args_dns }} {{ kubelet_reserve }} {% if kubelet_custom_flags is string %} {{kubelet_custom_flags}} {% else %}{% for flag in kubelet_custom_flags %} {{flag}} {% endfor %}{% endif %}"
|
contiv network support (#1914)
* Add Contiv support
Contiv is a network plugin for Kubernetes and Docker. It supports
vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
multiple networks and bridging pods onto physical networks.
* Update contiv version to 1.1.4
Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
* Load openvswitch module to workaround on CentOS7.4
* Set contiv cni version to 0.1.0
Correct contiv CNI version to 0.1.0.
* Use kube_apiserver_endpoint for K8S_API_SERVER
Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
to a available endpoint no matter if there's a loadbalancer or not.
* Make contiv use its own etcd
Before this commit, contiv is using a etcd proxy mode to k8s etcd,
this work fine when the etcd hosts are co-located with contiv etcd
proxy, however the k8s peering certs are only in etcd group, as a
result the etcd-proxy is not able to peering with the k8s etcd on
etcd group, plus the netplugin is always trying to find the etcd
endpoint on localhost, this will cause problem for all netplugins
not runnign on etcd group nodes.
This commit make contiv uses its own etcd, separate from k8s one.
on kube-master nodes (where net-master runs), it will run as leader
mode and on all rest nodes it will run as proxy mode.
* Use cp instead of rsync to copy cni binaries
Since rsync has been removed from hyperkube, this commit changes it
to use cp instead.
* Make contiv-etcd able to run on master nodes
* Add rbac_enabled flag for contiv pods
* Add contiv into CNI network plugin lists
* migrate contiv test to tests/files
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
* Add required rules for contiv netplugin
* Better handling json return of fwdMode
* Make contiv etcd port configurable
* Use default var instead of templating
* roles/download/defaults/main.yml: use contiv 1.1.7
Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
2017-11-29 14:24:16 +00:00
|
|
|
{% if kube_network_plugin is defined and kube_network_plugin in ["calico", "canal", "flannel", "weave", "contiv"] %}
|
2017-12-20 10:48:09 +00:00
|
|
|
KUBELET_NETWORK_PLUGIN="--network-plugin=cni --cni-conf-dir=/etc/cni/net.d --cni-bin-dir=/opt/cni/bin"
|
2016-12-07 16:41:53 +00:00
|
|
|
{% elif kube_network_plugin is defined and kube_network_plugin == "cloud" %}
|
2017-08-24 14:01:30 +00:00
|
|
|
KUBELET_NETWORK_PLUGIN="--hairpin-mode=promiscuous-bridge --network-plugin=kubenet"
|
2015-10-03 20:19:50 +00:00
|
|
|
{% endif %}
|
2015-12-16 22:49:01 +00:00
|
|
|
# Should this cluster be allowed to run privileged docker containers
|
2016-07-08 09:59:21 +00:00
|
|
|
KUBE_ALLOW_PRIV="--allow-privileged=true"
|
2017-02-17 03:59:40 +00:00
|
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere"] %}
|
2016-03-29 12:50:22 +00:00
|
|
|
KUBELET_CLOUDPROVIDER="--cloud-provider={{ cloud_provider }} --cloud-config={{ kube_config_dir }}/cloud_config"
|
2016-08-24 13:48:32 +00:00
|
|
|
{% elif cloud_provider is defined and cloud_provider == "aws" %}
|
2016-08-23 16:42:22 +00:00
|
|
|
KUBELET_CLOUDPROVIDER="--cloud-provider={{ cloud_provider }}"
|
2016-03-29 12:50:22 +00:00
|
|
|
{% else %}
|
|
|
|
KUBELET_CLOUDPROVIDER=""
|
|
|
|
{% endif %}
|
2017-08-30 13:50:33 +00:00
|
|
|
|
|
|
|
PATH={{ bin_dir }}:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|