3a39904011
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
62 lines
2.2 KiB
Django/Jinja
62 lines
2.2 KiB
Django/Jinja
apiVersion: extensions/v1beta1
|
|
kind: ReplicaSet
|
|
metadata:
|
|
name: calico-policy-controller
|
|
namespace: {{ system_namespace }}
|
|
labels:
|
|
k8s-app: calico-policy
|
|
kubernetes.io/cluster-service: "true"
|
|
spec:
|
|
replicas: 1
|
|
selector:
|
|
matchLabels:
|
|
kubernetes.io/cluster-service: "true"
|
|
k8s-app: calico-policy
|
|
template:
|
|
metadata:
|
|
name: calico-policy-controller
|
|
namespace: {{system_namespace}}
|
|
labels:
|
|
kubernetes.io/cluster-service: "true"
|
|
k8s-app: calico-policy
|
|
spec:
|
|
hostNetwork: true
|
|
containers:
|
|
- name: calico-policy-controller
|
|
image: {{ calico_policy_image_repo }}:{{ calico_policy_image_tag }}
|
|
imagePullPolicy: {{ k8s_image_pull_policy }}
|
|
resources:
|
|
limits:
|
|
cpu: {{ calico_policy_controller_cpu_limit }}
|
|
memory: {{ calico_policy_controller_memory_limit }}
|
|
requests:
|
|
cpu: {{ calico_policy_controller_cpu_requests }}
|
|
memory: {{ calico_policy_controller_memory_requests }}
|
|
env:
|
|
- name: ETCD_ENDPOINTS
|
|
value: "{{ etcd_access_endpoint }}"
|
|
- name: ETCD_CA_CERT_FILE
|
|
value: "{{ calico_cert_dir }}/ca_cert.crt"
|
|
- name: ETCD_CERT_FILE
|
|
value: "{{ calico_cert_dir }}/cert.crt"
|
|
- name: ETCD_KEY_FILE
|
|
value: "{{ calico_cert_dir }}/key.pem"
|
|
# Location of the Kubernetes API - this shouldn't need to be
|
|
# changed so long as it is used in conjunction with
|
|
# CONFIGURE_ETC_HOSTS="true".
|
|
- name: K8S_API
|
|
value: "https://kubernetes.default"
|
|
# Configure /etc/hosts within the container to resolve
|
|
# the kubernetes.default Service to the correct clusterIP
|
|
# using the environment provided by the kubelet.
|
|
# This removes the need for KubeDNS to resolve the Service.
|
|
- name: CONFIGURE_ETC_HOSTS
|
|
value: "true"
|
|
volumeMounts:
|
|
- mountPath: {{ calico_cert_dir }}
|
|
name: etcd-certs
|
|
readOnly: true
|
|
volumes:
|
|
- hostPath:
|
|
path: {{ calico_cert_dir }}
|
|
name: etcd-certs
|