3a39904011
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
14 lines
436 B
YAML
14 lines
436 B
YAML
dependencies:
|
|
- role: download
|
|
file: "{{ downloads.netcheck_server }}"
|
|
when: deploy_netchecker
|
|
tags: [download, netchecker]
|
|
- role: download
|
|
file: "{{ downloads.netcheck_agent }}"
|
|
when: deploy_netchecker
|
|
tags: [download, netchecker]
|
|
- {role: kubernetes-apps/ansible, tags: apps}
|
|
- {role: kubernetes-apps/kpm, tags: [apps, kpm]}
|
|
- role: kubernetes-apps/efk
|
|
when: efk_enabled
|
|
tags: [ apps, efk ]
|