2020-06-09 12:37:17 +00:00
|
|
|
---
|
2020-07-04 09:02:48 +00:00
|
|
|
- name: Lookup node IP in kubernetes
|
2022-01-05 10:26:32 +00:00
|
|
|
command: >
|
|
|
|
{{ kubectl }} get nodes {{ node }}
|
2022-05-03 11:56:07 +00:00
|
|
|
-o jsonpath='{range .status.addresses[?(@.type=="InternalIP")]}{@.address}{"\n"}{end}'
|
2020-07-04 09:02:48 +00:00
|
|
|
register: remove_node_ip
|
|
|
|
when:
|
|
|
|
- inventory_hostname in groups['etcd']
|
|
|
|
- ip is not defined
|
|
|
|
- access_ip is not defined
|
|
|
|
delegate_to: "{{ groups['etcd']|first }}"
|
|
|
|
failed_when: false
|
|
|
|
|
2020-06-09 12:37:17 +00:00
|
|
|
- name: Set node IP
|
|
|
|
set_fact:
|
|
|
|
node_ip: "{{ ip | default(access_ip | default(remove_node_ip.stdout)) | trim }}"
|
|
|
|
when:
|
|
|
|
- inventory_hostname in groups['etcd']
|
|
|
|
|
2020-09-01 08:05:58 +00:00
|
|
|
- name: Make sure node_ip is set
|
|
|
|
assert:
|
|
|
|
that: node_ip is defined and node_ip | length > 0
|
|
|
|
msg: "Etcd node ip is not set !"
|
2020-09-19 00:14:27 +00:00
|
|
|
when:
|
|
|
|
- inventory_hostname in groups['etcd']
|
2020-09-01 08:05:58 +00:00
|
|
|
|
2020-06-09 12:37:17 +00:00
|
|
|
- name: Lookup etcd member id
|
2020-07-27 06:32:29 +00:00
|
|
|
shell: "{{ bin_dir }}/etcdctl member list | grep {{ node_ip }} | cut -d, -f1"
|
2020-06-09 12:37:17 +00:00
|
|
|
register: etcd_member_id
|
2021-07-12 07:00:47 +00:00
|
|
|
ignore_errors: true # noqa ignore-errors
|
2020-06-09 12:37:17 +00:00
|
|
|
changed_when: false
|
|
|
|
check_mode: no
|
|
|
|
tags:
|
|
|
|
- facts
|
|
|
|
environment:
|
2020-07-20 14:26:51 +00:00
|
|
|
ETCDCTL_API: 3
|
2022-02-23 14:46:18 +00:00
|
|
|
ETCDCTL_CERT: "{{ kube_cert_dir + '/etcd/server.crt' if etcd_deployment_type == 'kubeadm' else etcd_cert_dir + '/admin-' + groups['etcd']|first + '.pem' }}"
|
|
|
|
ETCDCTL_KEY: "{{ kube_cert_dir + '/etcd/server.key' if etcd_deployment_type == 'kubeadm' else etcd_cert_dir + '/admin-' + groups['etcd']|first + '-key.pem' }}"
|
|
|
|
ETCDCTL_CACERT: "{{ kube_cert_dir + '/etcd/ca.crt' if etcd_deployment_type == 'kubeadm' else etcd_cert_dir + '/ca.pem' }}"
|
2022-02-18 15:20:23 +00:00
|
|
|
ETCDCTL_ENDPOINTS: "https://127.0.0.1:2379"
|
2020-06-09 12:37:17 +00:00
|
|
|
delegate_to: "{{ groups['etcd']|first }}"
|
2020-07-20 14:26:51 +00:00
|
|
|
when: inventory_hostname in groups['etcd']
|
2020-06-09 12:37:17 +00:00
|
|
|
|
2020-07-28 08:39:08 +00:00
|
|
|
- name: Remove etcd member from cluster
|
|
|
|
command: "{{ bin_dir }}/etcdctl member remove {{ etcd_member_id.stdout }}"
|
2020-06-09 12:37:17 +00:00
|
|
|
environment:
|
2020-07-20 14:26:51 +00:00
|
|
|
ETCDCTL_API: 3
|
2022-02-23 14:46:18 +00:00
|
|
|
ETCDCTL_CERT: "{{ kube_cert_dir + '/etcd/server.crt' if etcd_deployment_type == 'kubeadm' else etcd_cert_dir + '/admin-' + groups['etcd']|first + '.pem' }}"
|
|
|
|
ETCDCTL_KEY: "{{ kube_cert_dir + '/etcd/server.key' if etcd_deployment_type == 'kubeadm' else etcd_cert_dir + '/admin-' + groups['etcd']|first + '-key.pem' }}"
|
|
|
|
ETCDCTL_CACERT: "{{ kube_cert_dir + '/etcd/ca.crt' if etcd_deployment_type == 'kubeadm' else etcd_cert_dir + '/ca.pem' }}"
|
2022-02-18 15:20:23 +00:00
|
|
|
ETCDCTL_ENDPOINTS: "https://127.0.0.1:2379"
|
2020-06-09 12:37:17 +00:00
|
|
|
delegate_to: "{{ groups['etcd']|first }}"
|
|
|
|
when:
|
|
|
|
- inventory_hostname in groups['etcd']
|
|
|
|
- etcd_member_id.stdout | length > 0
|