3a39904011
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132 |
||
---|---|---|
.. | ||
kubedns-autoscaler.yml | ||
kubedns-deploy.yml | ||
kubedns-svc.yml | ||
netchecker-agent-ds.yml | ||
netchecker-agent-hostnet-ds.yml | ||
netchecker-server-pod.yml | ||
netchecker-server-svc.yml |