mirror of https://github.com/kubernetes/kops.git
Merge pull request #15705 from zadjadr/feature/cilium-14
Bump to Cilium 1.14
This commit is contained in:
commit
165cbd5333
|
|
@ -1262,8 +1262,8 @@ func validateNetworkingCilium(cluster *kops.Cluster, v *kops.CiliumNetworkingSpe
|
||||||
allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Could not parse as semantic version"))
|
allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Could not parse as semantic version"))
|
||||||
}
|
}
|
||||||
|
|
||||||
if version.Minor != 13 {
|
if version.Minor != 14 {
|
||||||
allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Only version 1.13 is supported"))
|
allErrs = append(allErrs, field.Invalid(versionFld, v.Version, "Only version 1.14 is supported"))
|
||||||
}
|
}
|
||||||
|
|
||||||
if v.Hubble != nil && fi.ValueOf(v.Hubble.Enabled) {
|
if v.Hubble != nil && fi.ValueOf(v.Hubble.Enabled) {
|
||||||
|
|
@ -1311,15 +1311,6 @@ func validateNetworkingCilium(cluster *kops.Cluster, v *kops.CiliumNetworkingSpe
|
||||||
}
|
}
|
||||||
|
|
||||||
allErrs = append(allErrs, IsValidValue(fldPath.Child("encryptionType"), &v.EncryptionType, []kops.CiliumEncryptionType{kops.CiliumEncryptionTypeIPSec, kops.CiliumEncryptionTypeWireguard})...)
|
allErrs = append(allErrs, IsValidValue(fldPath.Child("encryptionType"), &v.EncryptionType, []kops.CiliumEncryptionType{kops.CiliumEncryptionTypeIPSec, kops.CiliumEncryptionTypeWireguard})...)
|
||||||
|
|
||||||
if v.EncryptionType == "wireguard" {
|
|
||||||
// Cilium with Wireguard integration follow-up --> https://github.com/cilium/cilium/issues/15462.
|
|
||||||
// The following rule of validation should be deleted as this combination
|
|
||||||
// will be supported on future releases of Cilium (>= v1.11.0).
|
|
||||||
if fi.ValueOf(v.EnableL7Proxy) {
|
|
||||||
allErrs = append(allErrs, field.Forbidden(fldPath.Child("enableL7Proxy"), "L7 proxy cannot be enabled if wireguard is enabled."))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
if fi.ValueOf(v.EnableL7Proxy) && v.InstallIptablesRules != nil && !*v.InstallIptablesRules {
|
if fi.ValueOf(v.EnableL7Proxy) && v.InstallIptablesRules != nil && !*v.InstallIptablesRules {
|
||||||
|
|
|
||||||
|
|
@ -1023,7 +1023,7 @@ func Test_Validate_Cilium(t *testing.T) {
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Cilium: kops.CiliumNetworkingSpec{
|
Cilium: kops.CiliumNetworkingSpec{
|
||||||
Version: "v1.13.5",
|
Version: "v1.14.3",
|
||||||
Ingress: &kops.CiliumIngressSpec{
|
Ingress: &kops.CiliumIngressSpec{
|
||||||
Enabled: fi.PtrTo(true),
|
Enabled: fi.PtrTo(true),
|
||||||
DefaultLoadBalancerMode: "bad-value",
|
DefaultLoadBalancerMode: "bad-value",
|
||||||
|
|
@ -1033,7 +1033,7 @@ func Test_Validate_Cilium(t *testing.T) {
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Cilium: kops.CiliumNetworkingSpec{
|
Cilium: kops.CiliumNetworkingSpec{
|
||||||
Version: "v1.13.5",
|
Version: "v1.14.3",
|
||||||
Ingress: &kops.CiliumIngressSpec{
|
Ingress: &kops.CiliumIngressSpec{
|
||||||
Enabled: fi.PtrTo(true),
|
Enabled: fi.PtrTo(true),
|
||||||
DefaultLoadBalancerMode: "dedicated",
|
DefaultLoadBalancerMode: "dedicated",
|
||||||
|
|
@ -1042,7 +1042,7 @@ func Test_Validate_Cilium(t *testing.T) {
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
Cilium: kops.CiliumNetworkingSpec{
|
Cilium: kops.CiliumNetworkingSpec{
|
||||||
Version: "v1.13.5",
|
Version: "v1.14.3",
|
||||||
Hubble: &kops.HubbleSpec{
|
Hubble: &kops.HubbleSpec{
|
||||||
Enabled: fi.PtrTo(true),
|
Enabled: fi.PtrTo(true),
|
||||||
},
|
},
|
||||||
|
|
|
||||||
|
|
@ -40,7 +40,7 @@ func (b *CiliumOptionsBuilder) BuildOptions(o interface{}) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
if c.Version == "" {
|
if c.Version == "" {
|
||||||
c.Version = "v1.13.5"
|
c.Version = "v1.14.3"
|
||||||
}
|
}
|
||||||
|
|
||||||
if c.EnableEndpointHealthChecking == nil {
|
if c.EnableEndpointHealthChecking == nil {
|
||||||
|
|
|
||||||
|
|
@ -226,7 +226,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: disabled
|
tunnel: disabled
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nodeTerminationHandler:
|
nodeTerminationHandler:
|
||||||
cpuRequest: 50m
|
cpuRequest: 50m
|
||||||
enableRebalanceDraining: false
|
enableRebalanceDraining: false
|
||||||
|
|
|
||||||
|
|
@ -105,8 +105,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 33440a8acbacd86a9b5cd6c44eabf93e591e6cdfd0245feae791b75ddc579a3c
|
manifestHash: 5e9537b8396c3b141b62b590b619883148d224463969f32eddd9af9601e7b79e
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -39,6 +39,8 @@ data:
|
||||||
bpf-policy-map-max: "16384"
|
bpf-policy-map-max: "16384"
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-name: default
|
cluster-name: default
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -57,14 +59,18 @@ data:
|
||||||
identity-change-grace-period: 5s
|
identity-change-grace-period: 5s
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: kubernetes
|
ipam: kubernetes
|
||||||
kube-proxy-replacement: partial
|
kube-proxy-replacement: "false"
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: native
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: disabled
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -84,6 +90,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -131,7 +138,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -139,6 +145,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -178,6 +188,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -190,6 +201,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -201,6 +213,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -212,8 +239,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -221,7 +256,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -309,7 +343,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -318,6 +351,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -326,10 +363,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -354,6 +398,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -374,6 +419,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -387,6 +433,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -394,6 +485,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -408,6 +501,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -455,14 +550,9 @@ spec:
|
||||||
value: api.internal.minimal-ipv6.example.com
|
value: api.internal.minimal-ipv6.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
|
||||||
exec:
|
|
||||||
command:
|
|
||||||
- /cni-install.sh
|
|
||||||
- --cni-exclusive=true
|
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -481,6 +571,7 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports: null
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -491,7 +582,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -512,12 +602,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -533,25 +625,78 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.minimal-ipv6.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -568,26 +713,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.minimal-ipv6.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -596,6 +758,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -604,14 +768,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -624,10 +792,22 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
|
|
@ -643,6 +823,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -663,6 +845,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -705,11 +889,11 @@ spec:
|
||||||
value: api.internal.minimal-ipv6.example.com
|
value: api.internal.minimal-ipv6.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
host: 127.0.0.1
|
host: ::1
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9234
|
port: 9234
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
|
|
|
||||||
|
|
@ -944,7 +944,7 @@ resource "aws_s3_object" "minimal-ipv6-example-com-addons-limit-range-addons-k8s
|
||||||
resource "aws_s3_object" "minimal-ipv6-example-com-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "minimal-ipv6-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_minimal-ipv6.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "clusters.example.com/minimal-ipv6.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -151,7 +151,7 @@ ConfigServer:
|
||||||
- https://kops-controller.internal.minimal-warmpool.example.com:3988/
|
- https://kops-controller.internal.minimal-warmpool.example.com:3988/
|
||||||
InstanceGroupName: nodes
|
InstanceGroupName: nodes
|
||||||
InstanceGroupRole: Node
|
InstanceGroupRole: Node
|
||||||
NodeupConfigHash: ixr/jHtjzunYpmsBwkCwqeEL1lBBh7cpOWEMPi1HAvA=
|
NodeupConfigHash: Ic8Yx6WnZ6jJljDBQI2bf2kvkOboul3gKc16oTpHlDI=
|
||||||
|
|
||||||
__EOF_KUBE_ENV
|
__EOF_KUBE_ENV
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -218,7 +218,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: vxlan
|
tunnel: vxlan
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nodeTerminationHandler:
|
nodeTerminationHandler:
|
||||||
cpuRequest: 50m
|
cpuRequest: 50m
|
||||||
enableRebalanceDraining: false
|
enableRebalanceDraining: false
|
||||||
|
|
|
||||||
|
|
@ -98,8 +98,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 3ce725cc07a4344fb82f4666145c6dd4070d10217a9bf43939bada12094cce95
|
manifestHash: d939c9dc17f34da1cf748f890373d6c0d474f5a08e022306c2feaa9f116f2781
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -39,6 +39,8 @@ data:
|
||||||
bpf-policy-map-max: "16384"
|
bpf-policy-map-max: "16384"
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-name: default
|
cluster-name: default
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -57,14 +59,19 @@ data:
|
||||||
identity-change-grace-period: 5s
|
identity-change-grace-period: 5s
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: kubernetes
|
ipam: kubernetes
|
||||||
kube-proxy-replacement: partial
|
kube-proxy-replacement: "false"
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: tunnel
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: vxlan
|
tunnel-protocol: vxlan
|
||||||
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -84,6 +91,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -131,7 +139,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -139,6 +146,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -178,6 +189,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -190,6 +202,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -201,6 +214,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -212,8 +240,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -221,7 +257,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -309,7 +344,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -318,6 +352,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -326,10 +364,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -354,6 +399,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -374,6 +420,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -387,6 +434,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -394,6 +486,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -408,6 +502,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -455,14 +551,9 @@ spec:
|
||||||
value: api.internal.minimal-warmpool.example.com
|
value: api.internal.minimal-warmpool.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
|
||||||
exec:
|
|
||||||
command:
|
|
||||||
- /cni-install.sh
|
|
||||||
- --cni-exclusive=true
|
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -481,6 +572,7 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports: null
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -491,7 +583,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -512,12 +603,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -533,25 +626,78 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.minimal-warmpool.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -568,26 +714,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.minimal-warmpool.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -596,6 +759,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -604,14 +769,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -624,10 +793,22 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
|
|
@ -643,6 +824,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -663,6 +846,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -705,7 +890,7 @@ spec:
|
||||||
value: api.internal.minimal-warmpool.example.com
|
value: api.internal.minimal-warmpool.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
|
||||||
|
|
@ -60,8 +60,8 @@ containerdConfig:
|
||||||
usesLegacyGossip: false
|
usesLegacyGossip: false
|
||||||
usesNoneDNS: false
|
usesNoneDNS: false
|
||||||
warmPoolImages:
|
warmPoolImages:
|
||||||
- quay.io/cilium/cilium:v1.13.5
|
- quay.io/cilium/cilium:v1.14.3
|
||||||
- quay.io/cilium/operator:v1.13.5
|
- quay.io/cilium/operator:v1.14.3
|
||||||
- registry.k8s.io/kube-proxy:v1.26.0
|
- registry.k8s.io/kube-proxy:v1.26.0
|
||||||
- registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1
|
- registry.k8s.io/provider-aws/aws-ebs-csi-driver:v1.14.1
|
||||||
- registry.k8s.io/provider-aws/cloud-controller-manager:v1.26.6
|
- registry.k8s.io/provider-aws/cloud-controller-manager:v1.26.6
|
||||||
|
|
|
||||||
|
|
@ -712,7 +712,7 @@ resource "aws_s3_object" "minimal-warmpool-example-com-addons-limit-range-addons
|
||||||
resource "aws_s3_object" "minimal-warmpool-example-com-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "minimal-warmpool-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_minimal-warmpool.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "clusters.example.com/minimal-warmpool.example.com/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "clusters.example.com/minimal-warmpool.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -199,7 +199,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: vxlan
|
tunnel: vxlan
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nonMasqueradeCIDR: 100.64.0.0/10
|
nonMasqueradeCIDR: 100.64.0.0/10
|
||||||
podCIDR: 100.96.0.0/11
|
podCIDR: 100.96.0.0/11
|
||||||
secretStore: memfs://tests/scw-minimal.k8s.local/secrets
|
secretStore: memfs://tests/scw-minimal.k8s.local/secrets
|
||||||
|
|
|
||||||
|
|
@ -54,8 +54,8 @@ spec:
|
||||||
k8s-addon: scaleway-csi-driver.addons.k8s.io
|
k8s-addon: scaleway-csi-driver.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 0965eae063f29669172d217374bc812d27eab79b5e2daeeda759de9ba7fdfeb6
|
manifestHash: 5ecc7aca559459d06d6474991ec3b6e034f75834c971213fec620aeafe31eb71
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -39,6 +39,8 @@ data:
|
||||||
bpf-policy-map-max: "16384"
|
bpf-policy-map-max: "16384"
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-name: default
|
cluster-name: default
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -57,14 +59,19 @@ data:
|
||||||
identity-change-grace-period: 5s
|
identity-change-grace-period: 5s
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: kubernetes
|
ipam: kubernetes
|
||||||
kube-proxy-replacement: strict
|
kube-proxy-replacement: "true"
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: tunnel
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: vxlan
|
tunnel-protocol: vxlan
|
||||||
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -84,6 +91,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -131,7 +139,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -139,6 +146,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -178,6 +189,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -190,6 +202,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -201,6 +214,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -212,8 +240,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -221,7 +257,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -309,7 +344,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -318,6 +352,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -326,10 +364,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -354,6 +399,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -374,6 +420,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -387,6 +434,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -394,6 +486,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -408,6 +502,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -455,14 +551,9 @@ spec:
|
||||||
value: api.internal.scw-minimal.k8s.local
|
value: api.internal.scw-minimal.k8s.local
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
|
||||||
exec:
|
|
||||||
command:
|
|
||||||
- /cni-install.sh
|
|
||||||
- --cni-exclusive=true
|
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -481,6 +572,7 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports: null
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -491,7 +583,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -512,12 +603,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -533,25 +626,78 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.scw-minimal.k8s.local
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -568,26 +714,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.scw-minimal.k8s.local
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -596,6 +759,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -604,14 +769,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -624,10 +793,22 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
|
|
@ -643,6 +824,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -663,6 +846,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -705,7 +890,7 @@ spec:
|
||||||
value: api.internal.scw-minimal.k8s.local
|
value: api.internal.scw-minimal.k8s.local
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
|
||||||
|
|
@ -149,7 +149,7 @@ resource "aws_s3_object" "scw-minimal-k8s-local-addons-limit-range-addons-k8s-io
|
||||||
resource "aws_s3_object" "scw-minimal-k8s-local-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "scw-minimal-k8s-local-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_scw-minimal.k8s.local-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "tests/scw-minimal.k8s.local/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "tests/scw-minimal.k8s.local/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -220,7 +220,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: disabled
|
tunnel: disabled
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nodeTerminationHandler:
|
nodeTerminationHandler:
|
||||||
cpuRequest: 50m
|
cpuRequest: 50m
|
||||||
enableRebalanceDraining: false
|
enableRebalanceDraining: false
|
||||||
|
|
|
||||||
|
|
@ -98,8 +98,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: f477be8a0899c266e8a71d80fc70ddd61b6564455ce75560b877d92c6f12a762
|
manifestHash: dc0ffacc5b54ff7ce6d48ad648b291624ae47bbd80cbdd5268f48bc866a6cf3e
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -29,7 +29,6 @@ data:
|
||||||
agent-health-port: "9879"
|
agent-health-port: "9879"
|
||||||
auto-create-cilium-node-resource: "true"
|
auto-create-cilium-node-resource: "true"
|
||||||
auto-direct-node-routes: "false"
|
auto-direct-node-routes: "false"
|
||||||
blacklist-conflicting-routes: "false"
|
|
||||||
bpf-ct-global-any-max: "262144"
|
bpf-ct-global-any-max: "262144"
|
||||||
bpf-ct-global-tcp-max: "524288"
|
bpf-ct-global-tcp-max: "524288"
|
||||||
bpf-lb-algorithm: random
|
bpf-lb-algorithm: random
|
||||||
|
|
@ -41,6 +40,8 @@ data:
|
||||||
bpf-policy-map-max: "16384"
|
bpf-policy-map-max: "16384"
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-name: default
|
cluster-name: default
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -56,18 +57,23 @@ data:
|
||||||
enable-remote-node-identity: "true"
|
enable-remote-node-identity: "true"
|
||||||
enable-service-topology: "false"
|
enable-service-topology: "false"
|
||||||
enable-unreachable-routes: "false"
|
enable-unreachable-routes: "false"
|
||||||
|
eni-tags: KubernetesCluster=privatecilium.example.com
|
||||||
identity-allocation-mode: crd
|
identity-allocation-mode: crd
|
||||||
identity-change-grace-period: 5s
|
identity-change-grace-period: 5s
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: eni
|
ipam: eni
|
||||||
kube-proxy-replacement: partial
|
kube-proxy-replacement: "false"
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: native
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: disabled
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -87,6 +93,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -134,7 +141,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -142,6 +148,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -181,6 +191,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -193,6 +204,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -204,6 +216,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -215,8 +242,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -224,7 +259,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -312,7 +346,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -321,6 +354,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -329,10 +366,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -357,6 +401,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -377,6 +422,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -390,6 +436,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -397,6 +488,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -411,6 +504,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -458,14 +553,34 @@ spec:
|
||||||
value: api.internal.privatecilium.example.com
|
value: api.internal.privatecilium.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
postStart:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
- /cni-install.sh
|
- bash
|
||||||
- --cni-exclusive=true
|
- -c
|
||||||
|
- |
|
||||||
|
set -o errexit
|
||||||
|
set -o pipefail
|
||||||
|
set -o nounset
|
||||||
|
|
||||||
|
# When running in AWS ENI mode, it's likely that 'aws-node' has
|
||||||
|
# had a chance to install SNAT iptables rules. These can result
|
||||||
|
# in dropped traffic, so we should attempt to remove them.
|
||||||
|
# We do it using a 'postStart' hook since this may need to run
|
||||||
|
# for nodes which might have already been init'ed but may still
|
||||||
|
# have dangling rules. This is safe because there are no
|
||||||
|
# dependencies on anything that is part of the startup script
|
||||||
|
# itself, and can be safely run multiple times per node (e.g. in
|
||||||
|
# case of a restart).
|
||||||
|
if [[ "$(iptables-save | grep -c AWS-SNAT-CHAIN)" != "0" ]];
|
||||||
|
then
|
||||||
|
echo 'Deleting iptables rules created by the AWS CNI VPC plugin'
|
||||||
|
iptables-save | grep -v AWS-SNAT-CHAIN | iptables-restore
|
||||||
|
fi
|
||||||
|
echo 'Done!'
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -484,6 +599,7 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports: null
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -494,7 +610,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -515,12 +630,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -536,25 +653,78 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privatecilium.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -571,26 +741,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privatecilium.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -599,6 +786,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -607,14 +796,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -627,10 +820,22 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
|
|
@ -646,6 +851,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -666,6 +873,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -708,7 +917,7 @@ spec:
|
||||||
value: api.internal.privatecilium.example.com
|
value: api.internal.privatecilium.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
|
||||||
|
|
@ -1032,7 +1032,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
|
||||||
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -228,7 +228,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: vxlan
|
tunnel: vxlan
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nodeTerminationHandler:
|
nodeTerminationHandler:
|
||||||
cpuRequest: 50m
|
cpuRequest: 50m
|
||||||
enableRebalanceDraining: false
|
enableRebalanceDraining: false
|
||||||
|
|
|
||||||
|
|
@ -98,8 +98,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 1bcf01aca5730c31ac7b86d72831968485235c479566cf6a26da17ede4f0c351
|
manifestHash: 0d92f3aaa5fcfde3239fba0d07f4d264580c460d4a5e9c2463f8e2b20434c479
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -39,6 +39,8 @@ data:
|
||||||
bpf-policy-map-max: "16384"
|
bpf-policy-map-max: "16384"
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-name: default
|
cluster-name: default
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -57,14 +59,19 @@ data:
|
||||||
identity-change-grace-period: 5s
|
identity-change-grace-period: 5s
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: kubernetes
|
ipam: kubernetes
|
||||||
kube-proxy-replacement: partial
|
kube-proxy-replacement: "false"
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: tunnel
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: vxlan
|
tunnel-protocol: vxlan
|
||||||
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -84,6 +91,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -131,7 +139,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -139,6 +146,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -178,6 +189,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -190,6 +202,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -201,6 +214,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -212,8 +240,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -221,7 +257,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -309,7 +344,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -318,6 +352,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -326,10 +364,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -354,6 +399,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -374,6 +420,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -387,6 +434,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -394,6 +486,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -412,6 +506,8 @@ spec:
|
||||||
test3: awesome
|
test3: awesome
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -459,14 +555,9 @@ spec:
|
||||||
value: api.internal.privatecilium.example.com
|
value: api.internal.privatecilium.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
|
||||||
exec:
|
|
||||||
command:
|
|
||||||
- /cni-install.sh
|
|
||||||
- --cni-exclusive=true
|
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -485,6 +576,7 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports: null
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -495,7 +587,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -516,12 +607,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -537,25 +630,78 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privatecilium.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -572,26 +718,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privatecilium.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -600,6 +763,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -608,14 +773,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -628,10 +797,22 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
|
|
@ -647,6 +828,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -671,6 +854,8 @@ spec:
|
||||||
test3: cilium-operator
|
test3: cilium-operator
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -713,7 +898,7 @@ spec:
|
||||||
value: api.internal.privatecilium.example.com
|
value: api.internal.privatecilium.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
|
||||||
|
|
@ -1032,7 +1032,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
|
||||||
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -229,7 +229,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: vxlan
|
tunnel: vxlan
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nodeTerminationHandler:
|
nodeTerminationHandler:
|
||||||
cpuRequest: 50m
|
cpuRequest: 50m
|
||||||
enableRebalanceDraining: false
|
enableRebalanceDraining: false
|
||||||
|
|
|
||||||
|
|
@ -161,8 +161,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: ba5c764f4ddeb058c0dc7fd9287d445a6a3e8f186dbac9d63daf56770d81c24c
|
manifestHash: 3d77641c2e3c89adfb55bf74f41d865e0af29ff859eb75b2795cbe915d73b827
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsPKI: true
|
needsPKI: true
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
|
|
|
||||||
|
|
@ -53,6 +53,8 @@ data:
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-id: "253"
|
cluster-id: "253"
|
||||||
cluster-name: privatecilium.example.com
|
cluster-name: privatecilium.example.com
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -87,14 +89,19 @@ data:
|
||||||
ingress-shared-lb-service-name: private-ingress
|
ingress-shared-lb-service-name: private-ingress
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: kubernetes
|
ipam: kubernetes
|
||||||
kube-proxy-replacement: partial
|
kube-proxy-replacement: "false"
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: tunnel
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: vxlan
|
tunnel-protocol: vxlan
|
||||||
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -109,8 +116,9 @@ metadata:
|
||||||
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
data:
|
data:
|
||||||
config.yaml: |
|
config.yaml: |-
|
||||||
peer-service: unix:///var/run/cilium/hubble.sock
|
cluster-name: "privatecilium.example.com"
|
||||||
|
peer-service: "hubble-peer.kube-system.svc.cluster.local:443"
|
||||||
listen-address: :4245
|
listen-address: :4245
|
||||||
|
|
||||||
disable-server-tls: true
|
disable-server-tls: true
|
||||||
|
|
@ -130,6 +138,31 @@ metadata:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: hubble-peer
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
k8s-app: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: hubble-peer
|
||||||
|
namespace: kube-system
|
||||||
|
spec:
|
||||||
|
internalTrafficPolicy: Local
|
||||||
|
ports:
|
||||||
|
- name: peer-service
|
||||||
|
port: 443
|
||||||
|
protocol: TCP
|
||||||
|
targetPort: 4244
|
||||||
|
selector:
|
||||||
|
k8s-app: cilium
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -137,6 +170,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -184,7 +218,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -192,6 +225,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -231,6 +268,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -243,6 +281,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -254,6 +293,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -265,8 +319,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -274,7 +336,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -362,7 +423,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -371,6 +431,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -379,10 +443,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -422,6 +493,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -442,6 +514,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -455,6 +528,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: Role
|
kind: Role
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -567,6 +685,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: hubble-relay
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: hubble-relay
|
k8s-app: hubble-relay
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: hubble-relay
|
name: hubble-relay
|
||||||
|
|
@ -589,6 +709,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -603,6 +725,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -650,14 +774,9 @@ spec:
|
||||||
value: api.internal.privatecilium.example.com
|
value: api.internal.privatecilium.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
|
||||||
exec:
|
|
||||||
command:
|
|
||||||
- /cni-install.sh
|
|
||||||
- --cni-exclusive=true
|
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -676,6 +795,11 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports:
|
||||||
|
- containerPort: 4244
|
||||||
|
hostPort: 4244
|
||||||
|
name: peer-service
|
||||||
|
protocol: TCP
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -686,7 +810,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -707,12 +830,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -728,28 +853,81 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
- mountPath: /var/lib/cilium/tls/hubble
|
- mountPath: /var/lib/cilium/tls/hubble
|
||||||
name: hubble-tls
|
name: hubble-tls
|
||||||
readOnly: true
|
readOnly: true
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privatecilium.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -766,26 +944,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privatecilium.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -794,6 +989,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -802,14 +999,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -822,17 +1023,32 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
- name: hubble-tls
|
- name: hubble-tls
|
||||||
secret:
|
projected:
|
||||||
optional: true
|
defaultMode: 256
|
||||||
secretName: hubble-server-certs
|
sources:
|
||||||
|
- secret:
|
||||||
|
name: hubble-server-certs
|
||||||
|
optional: true
|
||||||
updateStrategy:
|
updateStrategy:
|
||||||
type: OnDelete
|
type: OnDelete
|
||||||
|
|
||||||
|
|
@ -845,6 +1061,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -865,6 +1083,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -907,7 +1127,7 @@ spec:
|
||||||
value: api.internal.privatecilium.example.com
|
value: api.internal.privatecilium.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -965,6 +1185,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: hubble-relay
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: hubble-relay
|
k8s-app: hubble-relay
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: hubble-relay
|
name: hubble-relay
|
||||||
|
|
@ -982,20 +1204,24 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: hubble-relay
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: hubble-relay
|
k8s-app: hubble-relay
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
spec:
|
spec:
|
||||||
|
affinity:
|
||||||
|
podAffinity:
|
||||||
|
requiredDuringSchedulingIgnoredDuringExecution:
|
||||||
|
- labelSelector:
|
||||||
|
matchLabels:
|
||||||
|
k8s-app: cilium
|
||||||
|
topologyKey: kubernetes.io/hostname
|
||||||
containers:
|
containers:
|
||||||
- args:
|
- args:
|
||||||
- serve
|
- serve
|
||||||
- --peer-service=unix:///var/run/cilium/hubble.sock
|
|
||||||
- --listen-address=:4245
|
|
||||||
command:
|
command:
|
||||||
- hubble-relay
|
- hubble-relay
|
||||||
env:
|
image: quay.io/cilium/hubble-relay:v1.14.3
|
||||||
- name: GODEBUG
|
|
||||||
value: x509ignoreCN=0
|
|
||||||
image: quay.io/cilium/hubble-relay:v1.13.5
|
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
tcpSocket:
|
tcpSocket:
|
||||||
|
|
@ -1007,11 +1233,15 @@ spec:
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
tcpSocket:
|
tcpSocket:
|
||||||
port: grpc
|
port: grpc
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
runAsGroup: 65532
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 65532
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /var/run/cilium
|
|
||||||
name: hubble-sock-dir
|
|
||||||
readOnly: true
|
|
||||||
- mountPath: /etc/hubble-relay
|
- mountPath: /etc/hubble-relay
|
||||||
name: config
|
name: config
|
||||||
readOnly: true
|
readOnly: true
|
||||||
|
|
@ -1019,6 +1249,8 @@ spec:
|
||||||
name: tls
|
name: tls
|
||||||
readOnly: true
|
readOnly: true
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
|
securityContext:
|
||||||
|
fsGroup: 65532
|
||||||
serviceAccount: hubble-relay
|
serviceAccount: hubble-relay
|
||||||
serviceAccountName: hubble-relay
|
serviceAccountName: hubble-relay
|
||||||
terminationGracePeriodSeconds: 0
|
terminationGracePeriodSeconds: 0
|
||||||
|
|
@ -1036,10 +1268,6 @@ spec:
|
||||||
topologyKey: kubernetes.io/hostname
|
topologyKey: kubernetes.io/hostname
|
||||||
whenUnsatisfiable: DoNotSchedule
|
whenUnsatisfiable: DoNotSchedule
|
||||||
volumes:
|
volumes:
|
||||||
- hostPath:
|
|
||||||
path: /var/run/cilium
|
|
||||||
type: Directory
|
|
||||||
name: hubble-sock-dir
|
|
||||||
- configMap:
|
- configMap:
|
||||||
items:
|
items:
|
||||||
- key: config.yaml
|
- key: config.yaml
|
||||||
|
|
@ -1048,6 +1276,7 @@ spec:
|
||||||
name: config
|
name: config
|
||||||
- name: tls
|
- name: tls
|
||||||
projected:
|
projected:
|
||||||
|
defaultMode: 256
|
||||||
sources:
|
sources:
|
||||||
- secret:
|
- secret:
|
||||||
items:
|
items:
|
||||||
|
|
@ -1089,6 +1318,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: hubble-relay-client-certs
|
name: hubble-relay-client-certs
|
||||||
|
|
|
||||||
|
|
@ -1048,7 +1048,7 @@ resource "aws_s3_object" "privatecilium-example-com-addons-limit-range-addons-k8
|
||||||
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "privatecilium-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_privatecilium.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "clusters.example.com/privatecilium.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
|
|
@ -232,7 +232,7 @@ spec:
|
||||||
sidecarIstioProxyImage: cilium/istio_proxy
|
sidecarIstioProxyImage: cilium/istio_proxy
|
||||||
toFqdnsDnsRejectResponseCode: refused
|
toFqdnsDnsRejectResponseCode: refused
|
||||||
tunnel: disabled
|
tunnel: disabled
|
||||||
version: v1.13.5
|
version: v1.14.3
|
||||||
nodeTerminationHandler:
|
nodeTerminationHandler:
|
||||||
cpuRequest: 50m
|
cpuRequest: 50m
|
||||||
enableRebalanceDraining: false
|
enableRebalanceDraining: false
|
||||||
|
|
|
||||||
|
|
@ -98,8 +98,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: c6b553b26348b9bda91297615c885dfeb20ec41a56cdeedcf433255bd62d4d58
|
manifestHash: 1dc85a0c4d6148f60695875f169977272f69564eb1ee8a5cf6c4c7687376449d
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -29,7 +29,6 @@ data:
|
||||||
agent-health-port: "9879"
|
agent-health-port: "9879"
|
||||||
auto-create-cilium-node-resource: "true"
|
auto-create-cilium-node-resource: "true"
|
||||||
auto-direct-node-routes: "false"
|
auto-direct-node-routes: "false"
|
||||||
blacklist-conflicting-routes: "false"
|
|
||||||
bpf-ct-global-any-max: "262144"
|
bpf-ct-global-any-max: "262144"
|
||||||
bpf-ct-global-tcp-max: "524288"
|
bpf-ct-global-tcp-max: "524288"
|
||||||
bpf-lb-algorithm: random
|
bpf-lb-algorithm: random
|
||||||
|
|
@ -41,6 +40,8 @@ data:
|
||||||
bpf-policy-map-max: "16384"
|
bpf-policy-map-max: "16384"
|
||||||
cgroup-root: /run/cilium/cgroupv2
|
cgroup-root: /run/cilium/cgroupv2
|
||||||
cluster-name: default
|
cluster-name: default
|
||||||
|
cni-exclusive: "true"
|
||||||
|
cni-log-file: /var/run/cilium/cilium-cni.log
|
||||||
debug: "false"
|
debug: "false"
|
||||||
disable-cnp-status-updates: "true"
|
disable-cnp-status-updates: "true"
|
||||||
disable-endpoint-crd: "false"
|
disable-endpoint-crd: "false"
|
||||||
|
|
@ -57,6 +58,7 @@ data:
|
||||||
enable-remote-node-identity: "true"
|
enable-remote-node-identity: "true"
|
||||||
enable-service-topology: "false"
|
enable-service-topology: "false"
|
||||||
enable-unreachable-routes: "false"
|
enable-unreachable-routes: "false"
|
||||||
|
eni-tags: KubernetesCluster=privateciliumadvanced.example.com
|
||||||
etcd-config: |-
|
etcd-config: |-
|
||||||
---
|
---
|
||||||
endpoints:
|
endpoints:
|
||||||
|
|
@ -69,16 +71,20 @@ data:
|
||||||
identity-change-grace-period: 5s
|
identity-change-grace-period: 5s
|
||||||
install-iptables-rules: "true"
|
install-iptables-rules: "true"
|
||||||
ipam: eni
|
ipam: eni
|
||||||
kube-proxy-replacement: strict
|
kube-proxy-replacement: "true"
|
||||||
kvstore: etcd
|
kvstore: etcd
|
||||||
kvstore-opt: '{"etcd.config": "/var/lib/etcd-config/etcd.config"}'
|
kvstore-opt: '{"etcd.config": "/var/lib/etcd-config/etcd.config"}'
|
||||||
monitor-aggregation: medium
|
monitor-aggregation: medium
|
||||||
nodes-gc-interval: 5m0s
|
nodes-gc-interval: 5m0s
|
||||||
preallocate-bpf-maps: "false"
|
preallocate-bpf-maps: "false"
|
||||||
|
remove-cilium-node-taints: "true"
|
||||||
|
routing-mode: native
|
||||||
|
set-cilium-is-up-condition: "true"
|
||||||
|
set-cilium-node-taints: "true"
|
||||||
sidecar-istio-proxy-image: cilium/istio_proxy
|
sidecar-istio-proxy-image: cilium/istio_proxy
|
||||||
tofqdns-dns-reject-response-code: refused
|
tofqdns-dns-reject-response-code: refused
|
||||||
tofqdns-enable-poller: "false"
|
tofqdns-enable-poller: "false"
|
||||||
tunnel: disabled
|
write-cni-conf-when-ready: /host/etc/cni/net.d/05-cilium.conflist
|
||||||
kind: ConfigMap
|
kind: ConfigMap
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
|
|
@ -98,6 +104,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -145,7 +152,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs
|
- ciliumclusterwideenvoyconfigs
|
||||||
- ciliumclusterwidenetworkpolicies
|
- ciliumclusterwidenetworkpolicies
|
||||||
- ciliumegressgatewaypolicies
|
- ciliumegressgatewaypolicies
|
||||||
- ciliumegressnatpolicies
|
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
- ciliumendpointslices
|
- ciliumendpointslices
|
||||||
- ciliumenvoyconfigs
|
- ciliumenvoyconfigs
|
||||||
|
|
@ -153,6 +159,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies
|
- ciliumlocalredirectpolicies
|
||||||
- ciliumnetworkpolicies
|
- ciliumnetworkpolicies
|
||||||
- ciliumnodes
|
- ciliumnodes
|
||||||
|
- ciliumnodeconfigs
|
||||||
|
- ciliumcidrgroups
|
||||||
|
- ciliuml2announcementpolicies
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
|
@ -192,6 +202,7 @@ rules:
|
||||||
- ciliumclusterwidenetworkpolicies/status
|
- ciliumclusterwidenetworkpolicies/status
|
||||||
- ciliumendpoints/status
|
- ciliumendpoints/status
|
||||||
- ciliumendpoints
|
- ciliumendpoints
|
||||||
|
- ciliuml2announcementpolicies/status
|
||||||
verbs:
|
verbs:
|
||||||
- patch
|
- patch
|
||||||
|
|
||||||
|
|
@ -204,6 +215,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
rules:
|
rules:
|
||||||
|
|
@ -215,6 +227,21 @@ rules:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
verbs:
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- nodes
|
||||||
|
- nodes/status
|
||||||
|
verbs:
|
||||||
|
- patch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- discovery.k8s.io
|
- discovery.k8s.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -226,8 +253,16 @@ rules:
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- ""
|
- ""
|
||||||
resources:
|
resources:
|
||||||
- nodes
|
- services/status
|
||||||
verbs:
|
verbs:
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- namespaces
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
|
|
@ -235,7 +270,6 @@ rules:
|
||||||
resources:
|
resources:
|
||||||
- services
|
- services
|
||||||
- endpoints
|
- endpoints
|
||||||
- namespaces
|
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
|
|
@ -323,7 +357,6 @@ rules:
|
||||||
- ciliumclusterwideenvoyconfigs.cilium.io
|
- ciliumclusterwideenvoyconfigs.cilium.io
|
||||||
- ciliumclusterwidenetworkpolicies.cilium.io
|
- ciliumclusterwidenetworkpolicies.cilium.io
|
||||||
- ciliumegressgatewaypolicies.cilium.io
|
- ciliumegressgatewaypolicies.cilium.io
|
||||||
- ciliumegressnatpolicies.cilium.io
|
|
||||||
- ciliumendpoints.cilium.io
|
- ciliumendpoints.cilium.io
|
||||||
- ciliumendpointslices.cilium.io
|
- ciliumendpointslices.cilium.io
|
||||||
- ciliumenvoyconfigs.cilium.io
|
- ciliumenvoyconfigs.cilium.io
|
||||||
|
|
@ -332,6 +365,10 @@ rules:
|
||||||
- ciliumlocalredirectpolicies.cilium.io
|
- ciliumlocalredirectpolicies.cilium.io
|
||||||
- ciliumnetworkpolicies.cilium.io
|
- ciliumnetworkpolicies.cilium.io
|
||||||
- ciliumnodes.cilium.io
|
- ciliumnodes.cilium.io
|
||||||
|
- ciliumnodeconfigs.cilium.io
|
||||||
|
- ciliumcidrgroups.cilium.io
|
||||||
|
- ciliuml2announcementpolicies.cilium.io
|
||||||
|
- ciliumpodippools.cilium.io
|
||||||
resources:
|
resources:
|
||||||
- customresourcedefinitions
|
- customresourcedefinitions
|
||||||
verbs:
|
verbs:
|
||||||
|
|
@ -340,10 +377,17 @@ rules:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
- ciliumloadbalancerippools
|
- ciliumloadbalancerippools
|
||||||
|
- ciliumpodippools
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
- list
|
- list
|
||||||
- watch
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cilium.io
|
||||||
|
resources:
|
||||||
|
- ciliumpodippools
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
- apiGroups:
|
- apiGroups:
|
||||||
- cilium.io
|
- cilium.io
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -368,6 +412,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium
|
name: cilium
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -388,6 +433,7 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
roleRef:
|
roleRef:
|
||||||
|
|
@ -401,6 +447,51 @@ subjects:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
labels:
|
||||||
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
|
role.kubernetes.io/networking: "1"
|
||||||
|
name: cilium-config-agent
|
||||||
|
namespace: kube-system
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: cilium-config-agent
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: cilium
|
||||||
|
namespace: kube-system
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
apiVersion: apps/v1
|
apiVersion: apps/v1
|
||||||
kind: DaemonSet
|
kind: DaemonSet
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -408,6 +499,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -422,6 +515,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-agent
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
k8s-app: cilium
|
k8s-app: cilium
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
kubernetes.io/cluster-service: "true"
|
kubernetes.io/cluster-service: "true"
|
||||||
|
|
@ -469,14 +564,34 @@ spec:
|
||||||
value: api.internal.privateciliumadvanced.example.com
|
value: api.internal.privateciliumadvanced.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
lifecycle:
|
lifecycle:
|
||||||
postStart:
|
postStart:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
- /cni-install.sh
|
- bash
|
||||||
- --cni-exclusive=true
|
- -c
|
||||||
|
- |
|
||||||
|
set -o errexit
|
||||||
|
set -o pipefail
|
||||||
|
set -o nounset
|
||||||
|
|
||||||
|
# When running in AWS ENI mode, it's likely that 'aws-node' has
|
||||||
|
# had a chance to install SNAT iptables rules. These can result
|
||||||
|
# in dropped traffic, so we should attempt to remove them.
|
||||||
|
# We do it using a 'postStart' hook since this may need to run
|
||||||
|
# for nodes which might have already been init'ed but may still
|
||||||
|
# have dangling rules. This is safe because there are no
|
||||||
|
# dependencies on anything that is part of the startup script
|
||||||
|
# itself, and can be safely run multiple times per node (e.g. in
|
||||||
|
# case of a restart).
|
||||||
|
if [[ "$(iptables-save | grep -c AWS-SNAT-CHAIN)" != "0" ]];
|
||||||
|
then
|
||||||
|
echo 'Deleting iptables rules created by the AWS CNI VPC plugin'
|
||||||
|
iptables-save | grep -v AWS-SNAT-CHAIN | iptables-restore
|
||||||
|
fi
|
||||||
|
echo 'Done!'
|
||||||
preStop:
|
preStop:
|
||||||
exec:
|
exec:
|
||||||
command:
|
command:
|
||||||
|
|
@ -495,6 +610,7 @@ spec:
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
name: cilium-agent
|
name: cilium-agent
|
||||||
|
ports: null
|
||||||
readinessProbe:
|
readinessProbe:
|
||||||
failureThreshold: 3
|
failureThreshold: 3
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
@ -505,7 +621,6 @@ spec:
|
||||||
path: /healthz
|
path: /healthz
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
initialDelaySeconds: 5
|
|
||||||
periodSeconds: 30
|
periodSeconds: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
timeoutSeconds: 5
|
timeoutSeconds: 5
|
||||||
|
|
@ -526,12 +641,14 @@ spec:
|
||||||
port: 9879
|
port: 9879
|
||||||
scheme: HTTP
|
scheme: HTTP
|
||||||
periodSeconds: 2
|
periodSeconds: 2
|
||||||
successThreshold: null
|
successThreshold: 1
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- mountPath: /run/cilium/cgroupv2
|
||||||
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
- mountPath: /host/etc/cni/net.d
|
- mountPath: /host/etc/cni/net.d
|
||||||
|
|
@ -553,25 +670,78 @@ spec:
|
||||||
readOnly: true
|
readOnly: true
|
||||||
- mountPath: /run/xtables.lock
|
- mountPath: /run/xtables.lock
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
hostNetwork: true
|
hostNetwork: true
|
||||||
initContainers:
|
initContainers:
|
||||||
- command:
|
- command:
|
||||||
- /install-plugin.sh
|
- cilium
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- build-config
|
||||||
|
env:
|
||||||
|
- name: K8S_NODE_NAME
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: spec.nodeName
|
||||||
|
- name: CILIUM_K8S_NAMESPACE
|
||||||
|
valueFrom:
|
||||||
|
fieldRef:
|
||||||
|
apiVersion: v1
|
||||||
|
fieldPath: metadata.namespace
|
||||||
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privateciliumadvanced.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: install-cni-binaries
|
name: config
|
||||||
resources:
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 10Mi
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- ALL
|
|
||||||
terminationMessagePath: /dev/termination-log
|
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /host/opt/cni/bin
|
- mountPath: /tmp
|
||||||
|
name: tmp
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-mount /hostbin/cilium-mount;
|
||||||
|
nsenter --cgroup=/hostproc/1/ns/cgroup --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-mount" $CGROUP_ROOT;
|
||||||
|
rm /hostbin/cilium-mount
|
||||||
|
env:
|
||||||
|
- name: CGROUP_ROOT
|
||||||
|
value: /run/cilium/cgroupv2
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: mount-cgroup
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
|
name: cni-path
|
||||||
|
- command:
|
||||||
|
- sh
|
||||||
|
- -ec
|
||||||
|
- |
|
||||||
|
cp /usr/bin/cilium-sysctlfix /hostbin/cilium-sysctlfix;
|
||||||
|
nsenter --mount=/hostproc/1/ns/mnt "${BIN_PATH}/cilium-sysctlfix";
|
||||||
|
rm /hostbin/cilium-sysctlfix
|
||||||
|
env:
|
||||||
|
- name: BIN_PATH
|
||||||
|
value: /opt/cni/bin
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: apply-sysctl-overwrites
|
||||||
|
securityContext:
|
||||||
|
privileged: true
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /hostproc
|
||||||
|
name: hostproc
|
||||||
|
- mountPath: /hostbin
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- command:
|
- command:
|
||||||
- /init-container.sh
|
- /init-container.sh
|
||||||
|
|
@ -588,26 +758,43 @@ spec:
|
||||||
key: clean-cilium-bpf-state
|
key: clean-cilium-bpf-state
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
optional: true
|
optional: true
|
||||||
image: quay.io/cilium/cilium:v1.13.5
|
- name: KUBERNETES_SERVICE_HOST
|
||||||
|
value: api.internal.privateciliumadvanced.example.com
|
||||||
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
|
value: "443"
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
name: clean-cilium-state
|
name: clean-cilium-state
|
||||||
resources:
|
|
||||||
limits:
|
|
||||||
memory: 100Mi
|
|
||||||
requests:
|
|
||||||
cpu: 100m
|
|
||||||
memory: 100Mi
|
|
||||||
securityContext:
|
securityContext:
|
||||||
privileged: true
|
privileged: true
|
||||||
terminationMessagePolicy: FallbackToLogsOnError
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs/bpf
|
- mountPath: /sys/fs/bpf
|
||||||
|
mountPropagation: HostToContainer
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
- mountPath: /run/cilium/cgroupv2
|
- mountPath: /run/cilium/cgroupv2
|
||||||
mountPropagation: HostToContainer
|
mountPropagation: HostToContainer
|
||||||
name: cilium-cgroup
|
name: cilium-cgroup
|
||||||
- mountPath: /var/run/cilium
|
- mountPath: /var/run/cilium
|
||||||
name: cilium-run
|
name: cilium-run
|
||||||
|
- command:
|
||||||
|
- /install-plugin.sh
|
||||||
|
image: quay.io/cilium/cilium:v1.14.3
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: install-cni-binaries
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 10Mi
|
||||||
|
securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
terminationMessagePath: /dev/termination-log
|
||||||
|
terminationMessagePolicy: FallbackToLogsOnError
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /host/opt/cni/bin
|
||||||
|
name: cni-path
|
||||||
priorityClassName: system-node-critical
|
priorityClassName: system-node-critical
|
||||||
restartPolicy: Always
|
restartPolicy: Always
|
||||||
serviceAccount: cilium
|
serviceAccount: cilium
|
||||||
|
|
@ -616,6 +803,8 @@ spec:
|
||||||
tolerations:
|
tolerations:
|
||||||
- operator: Exists
|
- operator: Exists
|
||||||
volumes:
|
volumes:
|
||||||
|
- emptyDir: {}
|
||||||
|
name: tmp
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /var/run/cilium
|
path: /var/run/cilium
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -624,14 +813,18 @@ spec:
|
||||||
path: /sys/fs/bpf
|
path: /sys/fs/bpf
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: bpf-maps
|
name: bpf-maps
|
||||||
|
- hostPath:
|
||||||
|
path: /proc
|
||||||
|
type: Directory
|
||||||
|
name: hostproc
|
||||||
|
- hostPath:
|
||||||
|
path: /run/cilium/cgroupv2
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
name: cilium-cgroup
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /opt/cni/bin
|
path: /opt/cni/bin
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
name: cni-path
|
name: cni-path
|
||||||
- hostPath:
|
|
||||||
path: /run/cilium/cgroupv2
|
|
||||||
type: Directory
|
|
||||||
name: cilium-cgroup
|
|
||||||
- hostPath:
|
- hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
type: DirectoryOrCreate
|
type: DirectoryOrCreate
|
||||||
|
|
@ -644,7 +837,7 @@ spec:
|
||||||
type: FileOrCreate
|
type: FileOrCreate
|
||||||
name: xtables-lock
|
name: xtables-lock
|
||||||
- configMap:
|
- configMap:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
items:
|
items:
|
||||||
- key: etcd-config
|
- key: etcd-config
|
||||||
path: etcd.config
|
path: etcd.config
|
||||||
|
|
@ -655,10 +848,22 @@ spec:
|
||||||
type: Directory
|
type: Directory
|
||||||
name: etcd-secrets
|
name: etcd-secrets
|
||||||
- name: clustermesh-secrets
|
- name: clustermesh-secrets
|
||||||
secret:
|
projected:
|
||||||
defaultMode: 420
|
defaultMode: 256
|
||||||
optional: true
|
sources:
|
||||||
secretName: cilium-clustermesh
|
- secret:
|
||||||
|
name: cilium-clustermesh
|
||||||
|
optional: true
|
||||||
|
- secret:
|
||||||
|
items:
|
||||||
|
- key: tls.key
|
||||||
|
path: common-etcd-client.key
|
||||||
|
- key: tls.crt
|
||||||
|
path: common-etcd-client.crt
|
||||||
|
- key: ca.crt
|
||||||
|
path: common-etcd-client-ca.crt
|
||||||
|
name: clustermesh-apiserver-remote-cert
|
||||||
|
optional: true
|
||||||
- configMap:
|
- configMap:
|
||||||
name: cilium-config
|
name: cilium-config
|
||||||
name: cilium-config-path
|
name: cilium-config-path
|
||||||
|
|
@ -674,6 +879,8 @@ metadata:
|
||||||
labels:
|
labels:
|
||||||
addon.kops.k8s.io/name: networking.cilium.io
|
addon.kops.k8s.io/name: networking.cilium.io
|
||||||
app.kubernetes.io/managed-by: kops
|
app.kubernetes.io/managed-by: kops
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
|
@ -694,6 +901,8 @@ spec:
|
||||||
metadata:
|
metadata:
|
||||||
creationTimestamp: null
|
creationTimestamp: null
|
||||||
labels:
|
labels:
|
||||||
|
app.kubernetes.io/name: cilium-operator
|
||||||
|
app.kubernetes.io/part-of: cilium
|
||||||
io.cilium/app: operator
|
io.cilium/app: operator
|
||||||
kops.k8s.io/managed-by: kops
|
kops.k8s.io/managed-by: kops
|
||||||
name: cilium-operator
|
name: cilium-operator
|
||||||
|
|
@ -736,7 +945,7 @@ spec:
|
||||||
value: api.internal.privateciliumadvanced.example.com
|
value: api.internal.privateciliumadvanced.example.com
|
||||||
- name: KUBERNETES_SERVICE_PORT
|
- name: KUBERNETES_SERVICE_PORT
|
||||||
value: "443"
|
value: "443"
|
||||||
image: quay.io/cilium/operator:v1.13.5
|
image: quay.io/cilium/operator:v1.14.3
|
||||||
imagePullPolicy: IfNotPresent
|
imagePullPolicy: IfNotPresent
|
||||||
livenessProbe:
|
livenessProbe:
|
||||||
httpGet:
|
httpGet:
|
||||||
|
|
|
||||||
|
|
@ -1065,7 +1065,7 @@ resource "aws_s3_object" "privateciliumadvanced-example-com-addons-limit-range-a
|
||||||
resource "aws_s3_object" "privateciliumadvanced-example-com-addons-networking-cilium-io-k8s-1-16" {
|
resource "aws_s3_object" "privateciliumadvanced-example-com-addons-networking-cilium-io-k8s-1-16" {
|
||||||
bucket = "testingBucket"
|
bucket = "testingBucket"
|
||||||
content = file("${path.module}/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
content = file("${path.module}/data/aws_s3_object_privateciliumadvanced.example.com-addons-networking.cilium.io-k8s-1.16_content")
|
||||||
key = "clusters.example.com/privateciliumadvanced.example.com/addons/networking.cilium.io/k8s-1.16-v1.13.yaml"
|
key = "clusters.example.com/privateciliumadvanced.example.com/addons/networking.cilium.io/k8s-1.16-v1.14.yaml"
|
||||||
provider = aws.files
|
provider = aws.files
|
||||||
server_side_encryption = "AES256"
|
server_side_encryption = "AES256"
|
||||||
}
|
}
|
||||||
|
|
|
||||||
File diff suppressed because it is too large
Load Diff
|
|
@ -35,7 +35,7 @@ func addCiliumAddon(b *BootstrapChannelBuilder, addons *AddonList) error {
|
||||||
klog.Infof("found cilium (%q) in addons; won't use builtin", key)
|
klog.Infof("found cilium (%q) in addons; won't use builtin", key)
|
||||||
} else {
|
} else {
|
||||||
id := "k8s-1.16"
|
id := "k8s-1.16"
|
||||||
location := key + "/" + id + "-v1.13.yaml"
|
location := key + "/" + id + "-v1.14.yaml"
|
||||||
|
|
||||||
addon := &api.AddonSpec{
|
addon := &api.AddonSpec{
|
||||||
Name: fi.PtrTo(key),
|
Name: fi.PtrTo(key),
|
||||||
|
|
|
||||||
|
|
@ -98,8 +98,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 166325a914768c7916145fb5569a8673c50e90e74661391e63854fcf6a28daab
|
manifestHash: 2f32492b13ce87032e506c9b7977b78214ee645513c92b6fa7668df8022fd183
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -112,8 +112,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 166325a914768c7916145fb5569a8673c50e90e74661391e63854fcf6a28daab
|
manifestHash: 2f32492b13ce87032e506c9b7977b78214ee645513c92b6fa7668df8022fd183
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
|
|
@ -169,8 +169,8 @@ spec:
|
||||||
k8s-addon: storage-aws.addons.k8s.io
|
k8s-addon: storage-aws.addons.k8s.io
|
||||||
version: 9.99.0
|
version: 9.99.0
|
||||||
- id: k8s-1.16
|
- id: k8s-1.16
|
||||||
manifest: networking.cilium.io/k8s-1.16-v1.13.yaml
|
manifest: networking.cilium.io/k8s-1.16-v1.14.yaml
|
||||||
manifestHash: 166325a914768c7916145fb5569a8673c50e90e74661391e63854fcf6a28daab
|
manifestHash: 2f32492b13ce87032e506c9b7977b78214ee645513c92b6fa7668df8022fd183
|
||||||
name: networking.cilium.io
|
name: networking.cilium.io
|
||||||
needsRollingUpdate: all
|
needsRollingUpdate: all
|
||||||
selector:
|
selector:
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue