c12s-kubespray/roles/kubernetes-apps
Aleksandr Didenko 3a39904011 Move calico-policy-controller into separate role
By default Calico CNI does not create any network access policies
or profiles if 'policy' is enabled in CNI config. And without any
policies/profiles network access to/from PODs is blocked.

K8s related policies are created by calico-policy-controller in
such case. So we need to start it as soon as possible, before any
real workloads.

This patch also fixes kube-api port in calico-policy-controller
yaml template.

Closes #1132
2017-03-17 11:21:52 +01:00
..
ansible Move calico-policy-controller into separate role 2017-03-17 11:21:52 +01:00
efk fix typo in "kibana_base_url" variable name 2017-02-16 18:17:06 +03:00
helm Cleanup legacy syntax, spacing, files all to yml 2017-02-17 16:22:34 -05:00
kpm Rework inventory all by real groups' vars 2017-02-23 09:43:42 +01:00
meta Move calico-policy-controller into separate role 2017-03-17 11:21:52 +01:00
network_plugin Merge branch 'master' into pedantic-syntax-cleanup 2017-02-20 20:19:38 +03:00
policy_controller Move calico-policy-controller into separate role 2017-03-17 11:21:52 +01:00