357 lines
11 KiB
YAML
357 lines
11 KiB
YAML
---
|
|
- name: Calico | Copy calicoctl binary from download dir
|
|
copy:
|
|
src: "{{ local_release_dir }}/calicoctl"
|
|
dest: "{{ bin_dir }}/calicoctl"
|
|
mode: 0755
|
|
remote_src: yes
|
|
|
|
- name: Calico | Check if host has NetworkManager
|
|
command: systemctl show NetworkManager
|
|
register: nm_check
|
|
failed_when: false
|
|
changed_when: false
|
|
|
|
- name: Calico | Ensure NetworkManager conf.d dir
|
|
file:
|
|
path: "/etc/NetworkManager/conf.d"
|
|
state: directory
|
|
recurse: yes
|
|
when: nm_check.rc == 0
|
|
|
|
- name: Calico | Prevent NetworkManager from managing Calico interfaces
|
|
copy:
|
|
content: |
|
|
[keyfile]
|
|
unmanaged-devices=interface-name:cali*;interface-name:tunl*
|
|
dest: /etc/NetworkManager/conf.d/calico.conf
|
|
when: nm_check.rc == 0
|
|
notify: Calico | Reload NetworkManager
|
|
|
|
- name: Calico | Write Calico cni config
|
|
template:
|
|
src: "cni-calico.conflist.j2"
|
|
dest: "/etc/cni/net.d/{% if calico_version is version('v3.3.0', '>=') %}calico.conflist.template{% else %}10-calico.conflist{% endif %}"
|
|
owner: kube
|
|
register: calico_conflist
|
|
notify: reset_calico_cni
|
|
|
|
- name: Calico | Create calico certs directory
|
|
file:
|
|
dest: "{{ calico_cert_dir }}"
|
|
state: directory
|
|
mode: 0750
|
|
owner: root
|
|
group: root
|
|
when: calico_datastore == "etcd"
|
|
|
|
- name: Calico | Link etcd certificates for calico-node
|
|
file:
|
|
src: "{{ etcd_cert_dir }}/{{ item.s }}"
|
|
dest: "{{ calico_cert_dir }}/{{ item.d }}"
|
|
state: hard
|
|
force: yes
|
|
with_items:
|
|
- {s: "{{ kube_etcd_cacert_file }}", d: "ca_cert.crt"}
|
|
- {s: "{{ kube_etcd_cert_file }}", d: "cert.crt"}
|
|
- {s: "{{ kube_etcd_key_file }}", d: "key.pem"}
|
|
when: calico_datastore == "etcd"
|
|
|
|
- name: Calico | Generate typha certs
|
|
include_tasks: typha_certs.yml
|
|
when:
|
|
- typha_secure
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
|
|
- name: Calico | Install calicoctl wrapper script
|
|
template:
|
|
src: "calicoctl.{{ calico_datastore }}.sh.j2"
|
|
dest: "{{ bin_dir }}/calicoctl.sh"
|
|
mode: 0755
|
|
owner: root
|
|
group: root
|
|
|
|
- name: Calico | wait for etcd
|
|
uri:
|
|
url: "{{ etcd_access_addresses.split(',') | first }}/health"
|
|
validate_certs: no
|
|
client_cert: "{{ calico_cert_dir }}/cert.crt"
|
|
client_key: "{{ calico_cert_dir }}/key.pem"
|
|
register: result
|
|
until: result.status == 200 or result.status == 401
|
|
retries: 10
|
|
delay: 5
|
|
run_once: true
|
|
when: calico_datastore == "etcd"
|
|
|
|
- name: Calico | Check if calico network pool has already been configured
|
|
shell: >
|
|
{{ bin_dir }}/calicoctl.sh get ippool | grep -w "{{ calico_pool_cidr | default(kube_pods_subnet) }}" | wc -l
|
|
register: calico_conf
|
|
retries: 4
|
|
until: calico_conf.rc == 0
|
|
delay: "{{ retry_stagger | random + 3 }}"
|
|
changed_when: false
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
|
|
- name: Calico | Ensure that calico_pool_cidr is within kube_pods_subnet when defined
|
|
assert:
|
|
that: "[calico_pool_cidr] | ipaddr(kube_pods_subnet) | length == 1"
|
|
msg: "{{ calico_pool_cidr }} is not within or equal to {{ kube_pods_subnet }}"
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- 'calico_conf.stdout == "0"'
|
|
- calico_pool_cidr is defined
|
|
|
|
- name: Calico | Create calico manifests for kdd
|
|
template:
|
|
src: "{{ item.file }}.j2"
|
|
dest: "{{ kube_config_dir }}/{{ item.file }}"
|
|
with_items:
|
|
- {name: calico, file: kdd-crds.yml, type: kdd}
|
|
register: calico_node_kdd_manifest
|
|
when:
|
|
- inventory_hostname in groups['kube-master']
|
|
- calico_datastore == "kdd"
|
|
|
|
- name: Calico | Create Calico Kubernetes datastore resources
|
|
kube:
|
|
name: "{{ item.item.name }}"
|
|
namespace: "kube-system"
|
|
kubectl: "{{ bin_dir }}/kubectl"
|
|
resource: "{{ item.item.type }}"
|
|
filename: "{{ kube_config_dir }}/{{ item.item.file }}"
|
|
state: "latest"
|
|
with_items:
|
|
- "{{ calico_node_kdd_manifest.results }}"
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- not item is skipped
|
|
loop_control:
|
|
label: "{{ item.item.file }}"
|
|
|
|
- name: Calico | Configure calico network pool (version < v3.3.0)
|
|
shell: >
|
|
echo "
|
|
{ "kind": "IPPool",
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"metadata": {
|
|
"name": "{{ calico_pool_name }}",
|
|
},
|
|
"spec": {
|
|
"cidr": "{{ calico_pool_cidr | default(kube_pods_subnet) }}",
|
|
"ipipMode": "{{ calico_ipip_mode }}",
|
|
"vxlanMode": "{{ calico_vxlan_mode }}",
|
|
"natOutgoing": {{ nat_outgoing|default(false) and not peer_with_router|default(false) }} }} " | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- 'calico_conf.stdout == "0"'
|
|
- calico_version is version("v3.3.0", "<")
|
|
|
|
- name: Calico | Configure calico network pool (version >= v3.3.0)
|
|
shell: >
|
|
echo "
|
|
{ "kind": "IPPool",
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"metadata": {
|
|
"name": "{{ calico_pool_name }}",
|
|
},
|
|
"spec": {
|
|
"blockSize": "{{ calico_pool_blocksize | default(kube_network_node_prefix) }}",
|
|
"cidr": "{{ calico_pool_cidr | default(kube_pods_subnet) }}",
|
|
"ipipMode": "{{ calico_ipip_mode }}",
|
|
"vxlanMode": "{{ calico_vxlan_mode }}",
|
|
"natOutgoing": {{ nat_outgoing|default(false) and not peer_with_router|default(false) }} }} " | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- 'calico_conf.stdout == "0"'
|
|
- calico_version is version("v3.3.0", ">=")
|
|
|
|
- name: "Determine nodeToNodeMesh needed state"
|
|
set_fact:
|
|
nodeToNodeMeshEnabled: "false"
|
|
when:
|
|
- peer_with_router|default(false) or peer_with_calico_rr|default(false)
|
|
- inventory_hostname in groups['k8s-cluster']
|
|
run_once: yes
|
|
|
|
- name: Calico | Set global as_num
|
|
shell: >
|
|
echo '
|
|
{ "kind": "BGPConfiguration",
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"metadata": {
|
|
"name": "default",
|
|
},
|
|
"spec": {
|
|
"logSeverityScreen": "Info",
|
|
"nodeToNodeMeshEnabled": {{ nodeToNodeMeshEnabled|default('true') }} ,
|
|
"asNumber": {{ global_as_num }} }} ' | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
changed_when: false
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
|
|
- name: Calico | Configure peering with router(s) at global scope
|
|
shell: >
|
|
echo '{
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"kind": "BGPPeer",
|
|
"metadata": {
|
|
"name": "global-{{ item.router_id }}"
|
|
},
|
|
"spec": {
|
|
"asNumber": "{{ item.as }}",
|
|
"peerIP": "{{ item.router_id }}"
|
|
}}' | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
register: output
|
|
retries: 4
|
|
until: output.rc == 0
|
|
delay: "{{ retry_stagger | random + 3 }}"
|
|
with_items:
|
|
- "{{ peers|selectattr('scope','defined')|selectattr('scope','equalto', 'global')|list|default([]) }}"
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- peer_with_router|default(false)
|
|
|
|
- name: Calico | Configure peering with route reflectors at global scope
|
|
shell: |
|
|
echo '{
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"kind": "BGPPeer",
|
|
"metadata": {
|
|
"name": "peer-to-rrs"
|
|
},
|
|
"spec": {
|
|
"nodeSelector": "!has(i-am-a-route-reflector)",
|
|
"peerSelector": "has(i-am-a-route-reflector)"
|
|
}}' | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
register: output
|
|
retries: 4
|
|
until: output.rc == 0
|
|
delay: "{{ retry_stagger | random + 3 }}"
|
|
with_items:
|
|
- "{{ groups['calico-rr'] | default([]) }}"
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- peer_with_calico_rr|default(false)
|
|
|
|
- name: Calico | Configure route reflectors to peer with each other
|
|
shell: >
|
|
echo '{
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"kind": "BGPPeer",
|
|
"metadata": {
|
|
"name": "rr-mesh"
|
|
},
|
|
"spec": {
|
|
"nodeSelector": "has(i-am-a-route-reflector)",
|
|
"peerSelector": "has(i-am-a-route-reflector)"
|
|
}}' | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
register: output
|
|
retries: 4
|
|
until: output.rc == 0
|
|
delay: "{{ retry_stagger | random + 3 }}"
|
|
with_items:
|
|
- "{{ groups['calico-rr'] | default([]) }}"
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- peer_with_calico_rr|default(false)
|
|
|
|
- name: Calico | Create calico manifests
|
|
template:
|
|
src: "{{ item.file }}.j2"
|
|
dest: "{{ kube_config_dir }}/{{ item.file }}"
|
|
with_items:
|
|
- {name: calico-config, file: calico-config.yml, type: cm}
|
|
- {name: calico-node, file: calico-node.yml, type: ds}
|
|
- {name: calico, file: calico-node-sa.yml, type: sa}
|
|
- {name: calico, file: calico-cr.yml, type: clusterrole}
|
|
- {name: calico, file: calico-crb.yml, type: clusterrolebinding}
|
|
register: calico_node_manifests
|
|
when:
|
|
- inventory_hostname in groups['kube-master']
|
|
- rbac_enabled or item.type not in rbac_resources
|
|
|
|
- name: Calico | Create calico manifests for typha
|
|
template:
|
|
src: "{{ item.file }}.j2"
|
|
dest: "{{ kube_config_dir }}/{{ item.file }}"
|
|
with_items:
|
|
- {name: calico, file: calico-typha.yml, type: typha}
|
|
register: calico_node_typha_manifest
|
|
when:
|
|
- inventory_hostname in groups['kube-master']
|
|
- typha_enabled and calico_datastore == "kdd"
|
|
|
|
- name: Start Calico resources
|
|
kube:
|
|
name: "{{ item.item.name }}"
|
|
namespace: "kube-system"
|
|
kubectl: "{{ bin_dir }}/kubectl"
|
|
resource: "{{ item.item.type }}"
|
|
filename: "{{ kube_config_dir }}/{{ item.item.file }}"
|
|
state: "latest"
|
|
with_items:
|
|
- "{{ calico_node_manifests.results }}"
|
|
- "{{ calico_node_kdd_manifest.results }}"
|
|
- "{{ calico_node_typha_manifest.results }}"
|
|
when:
|
|
- inventory_hostname == groups['kube-master'][0]
|
|
- not item is skipped
|
|
loop_control:
|
|
label: "{{ item.item.file }}"
|
|
|
|
- name: Wait for calico kubeconfig to be created
|
|
wait_for:
|
|
path: /etc/cni/net.d/calico-kubeconfig
|
|
when:
|
|
- inventory_hostname not in groups['kube-master']
|
|
- calico_datastore == "kdd"
|
|
|
|
- name: Calico | Configure node asNumber for per node peering
|
|
shell: >
|
|
echo '{
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"kind": "Node",
|
|
"metadata": {
|
|
"name": "{{ inventory_hostname }}"
|
|
},
|
|
"spec": {
|
|
"bgp": {
|
|
"asNumber": "{{ local_as }}"
|
|
},
|
|
"orchRefs":[{"nodeName":"{{ inventory_hostname }}","orchestrator":"k8s"}]
|
|
}}' | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
register: output
|
|
retries: 4
|
|
until: output.rc == 0
|
|
delay: "{{ retry_stagger | random + 3 }}"
|
|
when:
|
|
- peer_with_router|default(false)
|
|
- inventory_hostname in groups['k8s-cluster']
|
|
- local_as is defined
|
|
- groups['calico-rr'] | default([]) | length == 0
|
|
|
|
- name: Calico | Configure peering with router(s) at node scope
|
|
shell: >
|
|
echo '{
|
|
"apiVersion": "projectcalico.org/v3",
|
|
"kind": "BGPPeer",
|
|
"metadata": {
|
|
"name": "{{ inventory_hostname }}-{{ item.router_id }}"
|
|
},
|
|
"spec": {
|
|
"asNumber": "{{ item.as }}",
|
|
"node": "{{ inventory_hostname }}",
|
|
"peerIP": "{{ item.router_id }}"
|
|
}}' | {{ bin_dir }}/calicoctl.sh apply -f -
|
|
register: output
|
|
retries: 4
|
|
until: output.rc == 0
|
|
delay: "{{ retry_stagger | random + 3 }}"
|
|
with_items:
|
|
- "{{ peers|selectattr('scope','undefined')|list|default([]) | union(peers|selectattr('scope','defined')|selectattr('scope','equalto', 'node')|list|default([])) }}"
|
|
when:
|
|
- peer_with_router|default(false)
|
|
- inventory_hostname in groups['k8s-cluster']
|