Private gke fixes (#1746)
* private gke: nodeLocations, enablePrivateEndpoint, masterCidr, masterGlobalAcccess, remove invalid ipAllocationPolicy attributes, networkingMode VPC_NATIVE * update firewalls with master IP cidr to use the master-ip-cidr-block kpt setter * result of running `make generate-changed-only`
This commit is contained in:
parent
81e5fb6fbc
commit
0bf33140d8
|
|
@ -850,3 +850,27 @@ openAPI:
|
||||||
values:
|
values:
|
||||||
- marker: ${mgmt-project}
|
- marker: ${mgmt-project}
|
||||||
ref: '#/definitions/io.k8s.cli.setters.mgmt-project'
|
ref: '#/definitions/io.k8s.cli.setters.mgmt-project'
|
||||||
|
io.k8s.cli.setters.node-locations:
|
||||||
|
type: array
|
||||||
|
x-k8s-cli:
|
||||||
|
setter:
|
||||||
|
name: node-locations
|
||||||
|
listValues: ["ZONE"]
|
||||||
|
io.k8s.cli.setters.enable-private-endpoint:
|
||||||
|
type: string
|
||||||
|
x-k8s-cli:
|
||||||
|
setter:
|
||||||
|
name: enable-private-endpoint
|
||||||
|
value: "false"
|
||||||
|
io.k8s.cli.setters.master-ip-cidr-block:
|
||||||
|
type: string
|
||||||
|
x-k8s-cli:
|
||||||
|
setter:
|
||||||
|
name: master-ip-cidr-block
|
||||||
|
value: 172.16.0.32/28
|
||||||
|
io.k8s.cli.setters.master-global-access-enabled:
|
||||||
|
type: string
|
||||||
|
x-k8s-cli:
|
||||||
|
setter:
|
||||||
|
name: master-global-access-enabled
|
||||||
|
value: "true"
|
||||||
|
|
|
||||||
|
|
@ -5,22 +5,24 @@ metadata:
|
||||||
clusterName: "project-id/location/name" # {"$kpt-set":"asm-cluster-name"}
|
clusterName: "project-id/location/name" # {"$kpt-set":"asm-cluster-name"}
|
||||||
name: name # {"$kpt-set":"name"}
|
name: name # {"$kpt-set":"name"}
|
||||||
spec:
|
spec:
|
||||||
|
nodeLocations: # {"$kpt-set":"node-locations"}
|
||||||
|
- "ZONE"
|
||||||
# https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1/projects.locations.clusters#Cluster.PrivateClusterConfig
|
# https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1/projects.locations.clusters#Cluster.PrivateClusterConfig
|
||||||
# This is the least secure config because it allows access to master from all public IPs.
|
# This is the least secure config because it allows access to master from all public IPs.
|
||||||
# For alternative options see the above link.
|
# For alternative options see the above link.
|
||||||
privateClusterConfig:
|
privateClusterConfig:
|
||||||
enablePrivateNodes: true
|
enablePrivateNodes: true
|
||||||
# We set enablePrivateEndpoint to false because we want a publicly accessible endpoint.
|
# We set enablePrivateEndpoint to false because we want a publicly accessible endpoint.
|
||||||
enablePrivateEndpoint: false
|
enablePrivateEndpoint: false # {"$kpt-set":"enable-private-endpoint"}
|
||||||
# Keep this in sync with the range specified in the allow-egress to master firewall rule.
|
# Keep this in sync with the range specified in the allow-egress to master firewall rule.
|
||||||
masterIpv4CidrBlock: 172.16.0.32/28
|
masterIpv4CidrBlock: 172.16.0.32/28 # {"$kpt-set":"master-ip-cidr-block"}
|
||||||
|
# private cluster master global accessiblity https://cloud.google.com/kubernetes-engine/docs/how-to/private-clusters#cp-global-access
|
||||||
|
masterGlobalAccessConfig:
|
||||||
|
enabled: true # {"$kpt-set":"master-global-access-enabled"}
|
||||||
#
|
#
|
||||||
# TODO(https://github.com/kubeflow/gcp-blueprints/issues/32): Following options don't appear to be supported in CNRM; will private GKE work
|
# TODO(https://github.com/kubeflow/gcp-blueprints/issues/32): Following options don't appear to be supported in CNRM; will private GKE work
|
||||||
# without them?
|
# without them?
|
||||||
ipAllocationPolicy:
|
ipAllocationPolicy:
|
||||||
# Make the cluster VPC Native
|
|
||||||
useIpAliases: true
|
|
||||||
createSubnetwork: false
|
|
||||||
# TODO(jlewi): https://github.com/kubeflow/gcp-blueprints/issues/32 the following fields
|
# TODO(jlewi): https://github.com/kubeflow/gcp-blueprints/issues/32 the following fields
|
||||||
# Automatic creation of the subnetwork and its secondary ranges doesn't seem to be possible
|
# Automatic creation of the subnetwork and its secondary ranges doesn't seem to be possible
|
||||||
# with CNRM. We have an explicit CNRM resource for the subnetwork which we reference
|
# with CNRM. We have an explicit CNRM resource for the subnetwork which we reference
|
||||||
|
|
@ -30,8 +32,10 @@ spec:
|
||||||
servicesSecondaryRangeName: services
|
servicesSecondaryRangeName: services
|
||||||
# TODO(jlewi): https://github.com/kubeflow/gcp-blueprints/issues/32 the following fields
|
# TODO(jlewi): https://github.com/kubeflow/gcp-blueprints/issues/32 the following fields
|
||||||
# don't seem to be included in CNRM 1.9.1
|
# don't seem to be included in CNRM 1.9.1
|
||||||
#createSubnetwork: true
|
# createSubnetwork: true
|
||||||
# Create the clsuter in the private network we created.
|
# Make the cluster VPC Native
|
||||||
|
networkingMode: VPC_NATIVE
|
||||||
|
# Create the cluster in the private network we created.
|
||||||
networkRef:
|
networkRef:
|
||||||
name: name # {"$kpt-set":"name"}
|
name: name # {"$kpt-set":"name"}
|
||||||
subnetworkRef:
|
subnetworkRef:
|
||||||
|
|
|
||||||
|
|
@ -92,7 +92,7 @@ spec:
|
||||||
- "10250"
|
- "10250"
|
||||||
destinationRanges:
|
destinationRanges:
|
||||||
# Keep this in sync with the masterCidrBlock specified in cluster-private-patch.yaml
|
# Keep this in sync with the masterCidrBlock specified in cluster-private-patch.yaml
|
||||||
- 172.16.0.32/28
|
- 172.16.0.32/28 # {"$kpt-set":"master-ip-cidr-block"}
|
||||||
# TODO(jlewi): This was a bit of a hack to try to fix failing health checks during cluster
|
# TODO(jlewi): This was a bit of a hack to try to fix failing health checks during cluster
|
||||||
# provisioning. I was seeing packets get blocket.
|
# provisioning. I was seeing packets get blocket.
|
||||||
#- 172.217.0.0/28
|
#- 172.217.0.0/28
|
||||||
|
|
@ -139,7 +139,7 @@ spec:
|
||||||
- "15017"
|
- "15017"
|
||||||
- "9443"
|
- "9443"
|
||||||
sourceRanges:
|
sourceRanges:
|
||||||
- 172.16.0.32/28
|
- 172.16.0.32/28 # {"$kpt-set":"master-ip-cidr-block"}
|
||||||
direction: INGRESS
|
direction: INGRESS
|
||||||
networkRef:
|
networkRef:
|
||||||
name: name # {"$kpt-set":"name"}
|
name: name # {"$kpt-set":"name"}
|
||||||
|
|
@ -160,7 +160,7 @@ spec:
|
||||||
- "443"
|
- "443"
|
||||||
- "6443"
|
- "6443"
|
||||||
sourceRanges:
|
sourceRanges:
|
||||||
- 172.16.0.32/28
|
- 172.16.0.32/28 # {"$kpt-set":"master-ip-cidr-block"}
|
||||||
direction: INGRESS
|
direction: INGRESS
|
||||||
networkRef:
|
networkRef:
|
||||||
name: name # {"$kpt-set":"name"}
|
name: name # {"$kpt-set":"name"}
|
||||||
|
|
|
||||||
1
go.sum
1
go.sum
|
|
@ -97,6 +97,7 @@ github.com/spf13/jwalterweatherman v1.0.0/go.mod h1:cQK4TGJAtQXfYWX+Ddv3mKDzgVb6
|
||||||
github.com/spf13/pflag v0.0.0-20170130214245-9ff6c6923cff/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
|
github.com/spf13/pflag v0.0.0-20170130214245-9ff6c6923cff/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
|
||||||
github.com/spf13/pflag v1.0.3 h1:zPAT6CGy6wXeQ7NtTnaTerfKOsV6V6F8agHXFiazDkg=
|
github.com/spf13/pflag v1.0.3 h1:zPAT6CGy6wXeQ7NtTnaTerfKOsV6V6F8agHXFiazDkg=
|
||||||
github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
|
github.com/spf13/pflag v1.0.3/go.mod h1:DYY7MBk1bdzusC3SYhjObp+wFpr4gzcvqqNjLnInEg4=
|
||||||
|
github.com/spf13/pflag v1.0.5 h1:iy+VFUOCP1a+8yFto/drg2CJ5u0yRoB7fZw3DKv/JXA=
|
||||||
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
github.com/spf13/pflag v1.0.5/go.mod h1:McXfInJRrz4CZXVZOBLb0bTZqETkiAhM9Iw0y3An2Bg=
|
||||||
github.com/spf13/viper v1.3.2/go.mod h1:ZiWeW+zYFKm7srdB9IoDzzZXaJaI5eL9QjNiN/DMA2s=
|
github.com/spf13/viper v1.3.2/go.mod h1:ZiWeW+zYFKm7srdB9IoDzzZXaJaI5eL9QjNiN/DMA2s=
|
||||||
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
github.com/stretchr/objx v0.1.0/go.mod h1:HFkY916IF+rwdDfMAkV7OtwuqBVzrE8GR6GFx+wExME=
|
||||||
|
|
|
||||||
|
|
@ -3,6 +3,7 @@ module github.com/kubeflow/manifests/tests
|
||||||
go 1.13
|
go 1.13
|
||||||
|
|
||||||
require (
|
require (
|
||||||
|
github.com/PuerkitoBio/purell v1.1.1 // indirect
|
||||||
github.com/emicklei/go-restful v2.15.0+incompatible // indirect
|
github.com/emicklei/go-restful v2.15.0+incompatible // indirect
|
||||||
github.com/evanphx/json-patch v4.9.0+incompatible // indirect
|
github.com/evanphx/json-patch v4.9.0+incompatible // indirect
|
||||||
github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32
|
github.com/ghodss/yaml v1.0.1-0.20190212211648-25d852aebe32
|
||||||
|
|
@ -20,7 +21,7 @@ require (
|
||||||
github.com/mailru/easyjson v0.7.6 // indirect
|
github.com/mailru/easyjson v0.7.6 // indirect
|
||||||
github.com/pkg/errors v0.9.1
|
github.com/pkg/errors v0.9.1
|
||||||
github.com/spf13/cobra v1.1.1 // indirect
|
github.com/spf13/cobra v1.1.1 // indirect
|
||||||
github.com/spf13/pflag v1.0.5 // indirect
|
golang.org/x/crypto v0.0.0-20200622213623-75b288015ac9 // indirect
|
||||||
golang.org/x/net v0.0.0-20201224014010-6772e930b67b // indirect
|
golang.org/x/net v0.0.0-20201224014010-6772e930b67b // indirect
|
||||||
golang.org/x/text v0.3.5 // indirect
|
golang.org/x/text v0.3.5 // indirect
|
||||||
google.golang.org/protobuf v1.25.0 // indirect
|
google.golang.org/protobuf v1.25.0 // indirect
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue