Always create service account even rbac_enabled = false
This commit is contained in:
parent
7398858572
commit
c3b3572025
34 changed files with 3 additions and 78 deletions
|
@ -59,7 +59,6 @@
|
||||||
with_items:
|
with_items:
|
||||||
- "dnsmasq-clusterrolebinding.yml"
|
- "dnsmasq-clusterrolebinding.yml"
|
||||||
- "dnsmasq-serviceaccount.yml"
|
- "dnsmasq-serviceaccount.yml"
|
||||||
when: rbac_enabled
|
|
||||||
delegate_to: "{{ groups['kube-master'][0] }}"
|
delegate_to: "{{ groups['kube-master'][0] }}"
|
||||||
run_once: true
|
run_once: true
|
||||||
|
|
||||||
|
@ -68,7 +67,6 @@
|
||||||
with_items:
|
with_items:
|
||||||
- "dnsmasq-clusterrolebinding.yml"
|
- "dnsmasq-clusterrolebinding.yml"
|
||||||
- "dnsmasq-serviceaccount.yml"
|
- "dnsmasq-serviceaccount.yml"
|
||||||
when: rbac_enabled
|
|
||||||
delegate_to: "{{ groups['kube-master'][0] }}"
|
delegate_to: "{{ groups['kube-master'][0] }}"
|
||||||
run_once: true
|
run_once: true
|
||||||
|
|
||||||
|
|
|
@ -31,9 +31,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", "operator":"Exists"}]'
|
scheduler.alpha.kubernetes.io/tolerations: '[{"key":"CriticalAddonsOnly", "operator":"Exists"}]'
|
||||||
spec:
|
spec:
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: dnsmasq
|
serviceAccountName: dnsmasq
|
||||||
{% endif %}
|
|
||||||
tolerations:
|
tolerations:
|
||||||
- effect: NoSchedule
|
- effect: NoSchedule
|
||||||
operator: Exists
|
operator: Exists
|
||||||
|
|
|
@ -66,8 +66,3 @@ dashboard_token_ttl: 900
|
||||||
# SSL
|
# SSL
|
||||||
etcd_cert_dir: "/etc/ssl/etcd/ssl"
|
etcd_cert_dir: "/etc/ssl/etcd/ssl"
|
||||||
canal_cert_dir: "/etc/canal/certs"
|
canal_cert_dir: "/etc/canal/certs"
|
||||||
|
|
||||||
rbac_resources:
|
|
||||||
- sa
|
|
||||||
- clusterrole
|
|
||||||
- clusterrolebinding
|
|
||||||
|
|
|
@ -16,7 +16,6 @@
|
||||||
when:
|
when:
|
||||||
- dns_mode in ['coredns', 'coredns_dual']
|
- dns_mode in ['coredns', 'coredns_dual']
|
||||||
- inventory_hostname == groups['kube-master'][0]
|
- inventory_hostname == groups['kube-master'][0]
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
tags:
|
tags:
|
||||||
- coredns
|
- coredns
|
||||||
|
|
||||||
|
@ -34,6 +33,5 @@
|
||||||
when:
|
when:
|
||||||
- dns_mode == 'coredns_dual'
|
- dns_mode == 'coredns_dual'
|
||||||
- inventory_hostname == groups['kube-master'][0]
|
- inventory_hostname == groups['kube-master'][0]
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
tags:
|
tags:
|
||||||
- coredns
|
- coredns
|
||||||
|
|
|
@ -16,7 +16,6 @@
|
||||||
when:
|
when:
|
||||||
- dns_mode in ['kubedns','dnsmasq_kubedns']
|
- dns_mode in ['kubedns','dnsmasq_kubedns']
|
||||||
- inventory_hostname == groups['kube-master'][0]
|
- inventory_hostname == groups['kube-master'][0]
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
tags:
|
tags:
|
||||||
- dnsmasq
|
- dnsmasq
|
||||||
- kubedns
|
- kubedns
|
||||||
|
|
|
@ -35,7 +35,6 @@
|
||||||
register: manifests
|
register: manifests
|
||||||
when:
|
when:
|
||||||
- inventory_hostname == groups['kube-master'][0]
|
- inventory_hostname == groups['kube-master'][0]
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
|
|
||||||
- name: Kubernetes Apps | Purge old Netchecker server
|
- name: Kubernetes Apps | Purge old Netchecker server
|
||||||
kube:
|
kube:
|
||||||
|
|
|
@ -26,9 +26,7 @@ spec:
|
||||||
annotations:
|
annotations:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: coredns
|
serviceAccountName: coredns
|
||||||
{% endif %}
|
|
||||||
tolerations:
|
tolerations:
|
||||||
- key: node-role.kubernetes.io/master
|
- key: node-role.kubernetes.io/master
|
||||||
effect: NoSchedule
|
effect: NoSchedule
|
||||||
|
|
|
@ -64,6 +64,4 @@ spec:
|
||||||
- --default-params={"linear":{"nodesPerReplica":{{ kubedns_nodes_per_replica }},"min":{{ kubedns_min_replicas }}}}
|
- --default-params={"linear":{"nodesPerReplica":{{ kubedns_nodes_per_replica }},"min":{{ kubedns_min_replicas }}}}
|
||||||
- --logtostderr=true
|
- --logtostderr=true
|
||||||
- --v=2
|
- --v=2
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: cluster-proportional-autoscaler
|
serviceAccountName: cluster-proportional-autoscaler
|
||||||
{% endif %}
|
|
||||||
|
|
|
@ -172,6 +172,4 @@ spec:
|
||||||
memory: 20Mi
|
memory: 20Mi
|
||||||
cpu: 10m
|
cpu: 10m
|
||||||
dnsPolicy: Default # Don't use cluster DNS.
|
dnsPolicy: Default # Don't use cluster DNS.
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: kube-dns
|
serviceAccountName: kube-dns
|
||||||
{% endif %}
|
|
||||||
|
|
|
@ -33,6 +33,4 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- effect: NoSchedule
|
- effect: NoSchedule
|
||||||
operator: Exists
|
operator: Exists
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: netchecker-server
|
serviceAccountName: netchecker-server
|
||||||
{% endif %}
|
|
||||||
|
|
|
@ -7,7 +7,6 @@
|
||||||
- "efk-sa.yml"
|
- "efk-sa.yml"
|
||||||
- "efk-clusterrolebinding.yml"
|
- "efk-clusterrolebinding.yml"
|
||||||
run_once: true
|
run_once: true
|
||||||
when: rbac_enabled
|
|
||||||
|
|
||||||
- name: "ElasticSearch | Create Serviceaccount and Clusterrolebinding (RBAC)"
|
- name: "ElasticSearch | Create Serviceaccount and Clusterrolebinding (RBAC)"
|
||||||
command: "{{ bin_dir }}/kubectl apply -f {{ kube_config_dir }}/{{ item }} -n kube-system"
|
command: "{{ bin_dir }}/kubectl apply -f {{ kube_config_dir }}/{{ item }} -n kube-system"
|
||||||
|
@ -15,7 +14,6 @@
|
||||||
- "efk-sa.yml"
|
- "efk-sa.yml"
|
||||||
- "efk-clusterrolebinding.yml"
|
- "efk-clusterrolebinding.yml"
|
||||||
run_once: true
|
run_once: true
|
||||||
when: rbac_enabled
|
|
||||||
|
|
||||||
- name: "ElasticSearch | Write ES deployment"
|
- name: "ElasticSearch | Write ES deployment"
|
||||||
template:
|
template:
|
||||||
|
|
|
@ -52,9 +52,7 @@ spec:
|
||||||
volumes:
|
volumes:
|
||||||
- name: es-persistent-storage
|
- name: es-persistent-storage
|
||||||
emptyDir: {}
|
emptyDir: {}
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: efk
|
serviceAccountName: efk
|
||||||
{% endif %}
|
|
||||||
initContainers:
|
initContainers:
|
||||||
- image: alpine:3.6
|
- image: alpine:3.6
|
||||||
command: ["/sbin/sysctl", "-w", "vm.max_map_count=262144"]
|
command: ["/sbin/sysctl", "-w", "vm.max_map_count=262144"]
|
||||||
|
|
|
@ -28,9 +28,7 @@ spec:
|
||||||
scheduler.alpha.kubernetes.io/critical-pod: ''
|
scheduler.alpha.kubernetes.io/critical-pod: ''
|
||||||
spec:
|
spec:
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: efk
|
serviceAccountName: efk
|
||||||
{% endif %}
|
|
||||||
containers:
|
containers:
|
||||||
- name: fluentd-es
|
- name: fluentd-es
|
||||||
image: "{{ fluentd_image_repo }}:{{ fluentd_image_tag }}"
|
image: "{{ fluentd_image_repo }}:{{ fluentd_image_tag }}"
|
||||||
|
|
|
@ -46,7 +46,4 @@ spec:
|
||||||
- containerPort: 5601
|
- containerPort: 5601
|
||||||
name: ui
|
name: ui
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: efk
|
serviceAccountName: efk
|
||||||
{% endif %}
|
|
||||||
|
|
||||||
|
|
|
@ -19,9 +19,7 @@ spec:
|
||||||
app: cephfs-provisioner
|
app: cephfs-provisioner
|
||||||
version: {{ cephfs_provisioner_image_tag }}
|
version: {{ cephfs_provisioner_image_tag }}
|
||||||
spec:
|
spec:
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccount: cephfs-provisioner
|
serviceAccount: cephfs-provisioner
|
||||||
{% endif %}
|
|
||||||
containers:
|
containers:
|
||||||
- name: cephfs-provisioner
|
- name: cephfs-provisioner
|
||||||
image: {{ cephfs_provisioner_image_repo }}:{{ cephfs_provisioner_image_tag }}
|
image: {{ cephfs_provisioner_image_repo }}:{{ cephfs_provisioner_image_tag }}
|
||||||
|
|
|
@ -13,7 +13,7 @@
|
||||||
- {name: tiller, file: tiller-sa.yml, type: sa}
|
- {name: tiller, file: tiller-sa.yml, type: sa}
|
||||||
- {name: tiller, file: tiller-clusterrolebinding.yml, type: clusterrolebinding}
|
- {name: tiller, file: tiller-clusterrolebinding.yml, type: clusterrolebinding}
|
||||||
register: manifests
|
register: manifests
|
||||||
when: dns_mode != 'none' and inventory_hostname == groups['kube-master'][0] and rbac_enabled
|
when: dns_mode != 'none' and inventory_hostname == groups['kube-master'][0]
|
||||||
|
|
||||||
- name: Helm | Apply Helm Manifests (RBAC)
|
- name: Helm | Apply Helm Manifests (RBAC)
|
||||||
kube:
|
kube:
|
||||||
|
@ -24,7 +24,7 @@
|
||||||
filename: "{{kube_config_dir}}/{{item.item.file}}"
|
filename: "{{kube_config_dir}}/{{item.item.file}}"
|
||||||
state: "latest"
|
state: "latest"
|
||||||
with_items: "{{ manifests.results }}"
|
with_items: "{{ manifests.results }}"
|
||||||
when: dns_mode != 'none' and inventory_hostname == groups['kube-master'][0] and rbac_enabled
|
when: dns_mode != 'none' and inventory_hostname == groups['kube-master'][0]
|
||||||
|
|
||||||
- name: Helm | Install/upgrade helm
|
- name: Helm | Install/upgrade helm
|
||||||
command: >
|
command: >
|
||||||
|
|
|
@ -21,9 +21,7 @@ spec:
|
||||||
prometheus.io/port: '10254'
|
prometheus.io/port: '10254'
|
||||||
prometheus.io/scrape: 'true'
|
prometheus.io/scrape: 'true'
|
||||||
spec:
|
spec:
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: ingress-nginx
|
serviceAccountName: ingress-nginx
|
||||||
{% endif %}
|
|
||||||
{% if ingress_nginx_host_network %}
|
{% if ingress_nginx_host_network %}
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
|
@ -8,8 +8,3 @@ calico_policy_controller_memory_requests: 64M
|
||||||
# SSL
|
# SSL
|
||||||
calico_cert_dir: "/etc/calico/certs"
|
calico_cert_dir: "/etc/calico/certs"
|
||||||
canal_cert_dir: "/etc/canal/certs"
|
canal_cert_dir: "/etc/canal/certs"
|
||||||
|
|
||||||
rbac_resources:
|
|
||||||
- sa
|
|
||||||
- clusterrole
|
|
||||||
- clusterrolebinding
|
|
||||||
|
|
|
@ -26,8 +26,7 @@
|
||||||
- {name: calico-kube-controllers, file: calico-kube-cr.yml, type: clusterrole}
|
- {name: calico-kube-controllers, file: calico-kube-cr.yml, type: clusterrole}
|
||||||
- {name: calico-kube-controllers, file: calico-kube-crb.yml, type: clusterrolebinding}
|
- {name: calico-kube-controllers, file: calico-kube-crb.yml, type: clusterrolebinding}
|
||||||
register: calico_kube_manifests
|
register: calico_kube_manifests
|
||||||
when:
|
when: inventory_hostname == groups['kube-master'][0] and not item|skipped
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
|
|
||||||
- name: Start of Calico kube controllers
|
- name: Start of Calico kube controllers
|
||||||
kube:
|
kube:
|
||||||
|
|
|
@ -21,9 +21,7 @@ spec:
|
||||||
k8s-app: calico-kube-controllers
|
k8s-app: calico-kube-controllers
|
||||||
spec:
|
spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: calico-kube-controllers
|
serviceAccountName: calico-kube-controllers
|
||||||
{% endif %}
|
|
||||||
tolerations:
|
tolerations:
|
||||||
- effect: NoSchedule
|
- effect: NoSchedule
|
||||||
operator: Exists
|
operator: Exists
|
||||||
|
|
|
@ -41,11 +41,6 @@ calico_felix_prometheusprocessmetricsenabled: "true"
|
||||||
# see https://github.com/projectcalico/felix/blob/ab8799eaea66627e5db7717e62fca61fd9c08646/python/calico/felix/config.py#L198
|
# see https://github.com/projectcalico/felix/blob/ab8799eaea66627e5db7717e62fca61fd9c08646/python/calico/felix/config.py#L198
|
||||||
calico_node_ignorelooserpf: false
|
calico_node_ignorelooserpf: false
|
||||||
|
|
||||||
rbac_resources:
|
|
||||||
- sa
|
|
||||||
- clusterrole
|
|
||||||
- clusterrolebinding
|
|
||||||
|
|
||||||
# If you want to use non default IP_AUTODETECTION_METHOD for calico node set this option to one of:
|
# If you want to use non default IP_AUTODETECTION_METHOD for calico node set this option to one of:
|
||||||
# * can-reach=DESTINATION
|
# * can-reach=DESTINATION
|
||||||
# * interface=INTERFACE-REGEX
|
# * interface=INTERFACE-REGEX
|
||||||
|
|
|
@ -191,4 +191,3 @@
|
||||||
register: calico_node_manifests
|
register: calico_node_manifests
|
||||||
when:
|
when:
|
||||||
- inventory_hostname in groups['kube-master']
|
- inventory_hostname in groups['kube-master']
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
|
|
|
@ -22,9 +22,7 @@ spec:
|
||||||
kubespray.etcd-cert/serial: "{{ etcd_client_cert_serial }}"
|
kubespray.etcd-cert/serial: "{{ etcd_client_cert_serial }}"
|
||||||
spec:
|
spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: calico-node
|
serviceAccountName: calico-node
|
||||||
{% endif %}
|
|
||||||
tolerations:
|
tolerations:
|
||||||
- effect: NoSchedule
|
- effect: NoSchedule
|
||||||
operator: Exists
|
operator: Exists
|
||||||
|
|
|
@ -31,8 +31,3 @@ calicoctl_memory_limit: 170M
|
||||||
calicoctl_cpu_limit: 100m
|
calicoctl_cpu_limit: 100m
|
||||||
calicoctl_memory_requests: 32M
|
calicoctl_memory_requests: 32M
|
||||||
calicoctl_cpu_requests: 25m
|
calicoctl_cpu_requests: 25m
|
||||||
|
|
||||||
rbac_resources:
|
|
||||||
- sa
|
|
||||||
- clusterrole
|
|
||||||
- clusterrolebinding
|
|
||||||
|
|
|
@ -53,7 +53,6 @@
|
||||||
register: canal_manifests
|
register: canal_manifests
|
||||||
when:
|
when:
|
||||||
- inventory_hostname in groups['kube-master']
|
- inventory_hostname in groups['kube-master']
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
|
|
||||||
- name: Canal | Copy cni plugins from hyperkube
|
- name: Canal | Copy cni plugins from hyperkube
|
||||||
command: "{{ docker_bin_dir }}/docker run --rm -v /opt/cni/bin:/cnibindir {{ hyperkube_image_repo }}:{{ hyperkube_image_tag }} /bin/cp -rf /opt/cni/bin/. /cnibindir/"
|
command: "{{ docker_bin_dir }}/docker run --rm -v /opt/cni/bin:/cnibindir {{ hyperkube_image_repo }}:{{ hyperkube_image_tag }} /bin/cp -rf /opt/cni/bin/. /cnibindir/"
|
||||||
|
|
|
@ -19,9 +19,7 @@ spec:
|
||||||
k8s-app: canal-node
|
k8s-app: canal-node
|
||||||
spec:
|
spec:
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: canal
|
serviceAccountName: canal
|
||||||
{% endif %}
|
|
||||||
tolerations:
|
tolerations:
|
||||||
- effect: NoSchedule
|
- effect: NoSchedule
|
||||||
operator: Exists
|
operator: Exists
|
||||||
|
|
|
@ -18,8 +18,3 @@ cilium_cpu_requests: 100m
|
||||||
|
|
||||||
# Optional features
|
# Optional features
|
||||||
cilium_enable_prometheus: false
|
cilium_enable_prometheus: false
|
||||||
|
|
||||||
rbac_resources:
|
|
||||||
- sa
|
|
||||||
- clusterrole
|
|
||||||
- clusterrolebinding
|
|
||||||
|
|
|
@ -38,7 +38,6 @@
|
||||||
register: cilium_node_manifests
|
register: cilium_node_manifests
|
||||||
when:
|
when:
|
||||||
- inventory_hostname in groups['kube-master']
|
- inventory_hostname in groups['kube-master']
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
|
|
||||||
- name: Cilium | Set CNI directory permissions
|
- name: Cilium | Set CNI directory permissions
|
||||||
file:
|
file:
|
||||||
|
|
|
@ -34,9 +34,7 @@ spec:
|
||||||
prometheus.io/port: "9090"
|
prometheus.io/port: "9090"
|
||||||
{% endif %}
|
{% endif %}
|
||||||
spec:
|
spec:
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: cilium
|
serviceAccountName: cilium
|
||||||
{% endif %}
|
|
||||||
initContainers:
|
initContainers:
|
||||||
- name: clean-cilium-state
|
- name: clean-cilium-state
|
||||||
image: docker.io/library/busybox:1.28.4
|
image: docker.io/library/busybox:1.28.4
|
||||||
|
|
|
@ -27,9 +27,7 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- key: node-role.kubernetes.io/master
|
- key: node-role.kubernetes.io/master
|
||||||
effect: NoSchedule
|
effect: NoSchedule
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: contiv-netmaster
|
serviceAccountName: contiv-netmaster
|
||||||
{% endif %}
|
|
||||||
containers:
|
containers:
|
||||||
- name: contiv-api-proxy
|
- name: contiv-api-proxy
|
||||||
image: {{ contiv_auth_proxy_image_repo }}:{{ contiv_auth_proxy_image_tag }}
|
image: {{ contiv_auth_proxy_image_repo }}:{{ contiv_auth_proxy_image_tag }}
|
||||||
|
|
|
@ -27,9 +27,7 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- key: node-role.kubernetes.io/master
|
- key: node-role.kubernetes.io/master
|
||||||
effect: NoSchedule
|
effect: NoSchedule
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: contiv-netmaster
|
serviceAccountName: contiv-netmaster
|
||||||
{% endif %}
|
|
||||||
containers:
|
containers:
|
||||||
- name: contiv-netmaster
|
- name: contiv-netmaster
|
||||||
image: {{ contiv_image_repo }}:{{ contiv_image_tag }}
|
image: {{ contiv_image_repo }}:{{ contiv_image_tag }}
|
||||||
|
|
|
@ -26,9 +26,7 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- key: node-role.kubernetes.io/master
|
- key: node-role.kubernetes.io/master
|
||||||
effect: NoSchedule
|
effect: NoSchedule
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: contiv-netplugin
|
serviceAccountName: contiv-netplugin
|
||||||
{% endif %}
|
|
||||||
containers:
|
containers:
|
||||||
# Runs netplugin container on each Kubernetes node. This
|
# Runs netplugin container on each Kubernetes node. This
|
||||||
# container programs network policy and routes on each
|
# container programs network policy and routes on each
|
||||||
|
|
|
@ -11,4 +11,3 @@
|
||||||
register: flannel_node_manifests
|
register: flannel_node_manifests
|
||||||
when:
|
when:
|
||||||
- inventory_hostname in groups['kube-master']
|
- inventory_hostname in groups['kube-master']
|
||||||
- rbac_enabled or item.type not in rbac_resources
|
|
||||||
|
|
|
@ -52,9 +52,7 @@ spec:
|
||||||
tier: node
|
tier: node
|
||||||
k8s-app: flannel
|
k8s-app: flannel
|
||||||
spec:
|
spec:
|
||||||
{% if rbac_enabled %}
|
|
||||||
serviceAccountName: flannel
|
serviceAccountName: flannel
|
||||||
{% endif %}
|
|
||||||
containers:
|
containers:
|
||||||
- name: kube-flannel
|
- name: kube-flannel
|
||||||
image: {{ flannel_image_repo }}:{{ flannel_image_tag }}
|
image: {{ flannel_image_repo }}:{{ flannel_image_tag }}
|
||||||
|
|
Loading…
Reference in a new issue