mirror of https://github.com/kubernetes/kops.git
Merge pull request #10310 from hakman/calico-3.17.0
Update Calico to v3.17.0
This commit is contained in:
commit
bafa96220e
|
@ -6685,7 +6685,7 @@ func cloudupResourcesAddonsNetworkingProjectcalicoOrgK8s112YamlTemplate() (*asse
|
||||||
return a, nil
|
return a, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
var _cloudupResourcesAddonsNetworkingProjectcalicoOrgK8s116YamlTemplate = []byte(`# Pulled and modified from: https://docs.projectcalico.org/v3.16/manifests/calico-typha.yaml
|
var _cloudupResourcesAddonsNetworkingProjectcalicoOrgK8s116YamlTemplate = []byte(`# Pulled and modified from: https://docs.projectcalico.org/v3.17/manifests/calico-typha.yaml
|
||||||
|
|
||||||
{{- if .Networking.Calico.BPFEnabled }}
|
{{- if .Networking.Calico.BPFEnabled }}
|
||||||
---
|
---
|
||||||
|
@ -6716,15 +6716,14 @@ data:
|
||||||
typha_service_name: "{{- if .Networking.Calico.TyphaReplicas -}}calico-typha{{- else -}}none{{- end -}}"
|
typha_service_name: "{{- if .Networking.Calico.TyphaReplicas -}}calico-typha{{- else -}}none{{- end -}}"
|
||||||
# Configure the backend to use.
|
# Configure the backend to use.
|
||||||
calico_backend: "bird"
|
calico_backend: "bird"
|
||||||
|
|
||||||
# Configure the MTU to use for workload interfaces and tunnels.
|
# Configure the MTU to use for workload interfaces and tunnels.
|
||||||
# - If Wireguard is enabled, set to your network MTU - 60
|
# By default, MTU is auto-detected, and explicitly setting this field should not be required.
|
||||||
# - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50
|
# You can override auto-detection by providing a non-zero value.
|
||||||
# - Otherwise, if IPIP is enabled, set to your network MTU - 20
|
|
||||||
# - Otherwise, if not using any encapsulation, set to your network MTU.
|
|
||||||
{{- if .Networking.Calico.MTU }}
|
{{- if .Networking.Calico.MTU }}
|
||||||
veth_mtu: "{{ .Networking.Calico.MTU }}"
|
veth_mtu: "{{ .Networking.Calico.MTU }}"
|
||||||
{{- else }}
|
{{- else }}
|
||||||
veth_mtu: "{{- if eq .CloudProvider "openstack" -}}1430{{- else -}}1440{{- end -}}"
|
veth_mtu: "0"
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
# The CNI network configuration to install on each node. The special
|
# The CNI network configuration to install on each node. The special
|
||||||
|
@ -6771,8 +6770,6 @@ data:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: bgpconfigurations.crd.projectcalico.org
|
name: bgpconfigurations.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -6908,8 +6905,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: bgppeers.crd.projectcalico.org
|
name: bgppeers.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -6946,6 +6941,7 @@ spec:
|
||||||
format: int32
|
format: int32
|
||||||
type: integer
|
type: integer
|
||||||
keepOriginalNextHop:
|
keepOriginalNextHop:
|
||||||
|
default: false
|
||||||
description: Option to keep the original nexthop field when routes
|
description: Option to keep the original nexthop field when routes
|
||||||
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
||||||
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
||||||
|
@ -6953,8 +6949,8 @@ spec:
|
||||||
type: boolean
|
type: boolean
|
||||||
node:
|
node:
|
||||||
description: The node name identifying the Calico node instance that
|
description: The node name identifying the Calico node instance that
|
||||||
is peering with this peer. If this is not set, this represents a
|
is targeted by this peer. If this is not set, and no nodeSelector
|
||||||
global peer, i.e. a peer that peers with every node in the deployment.
|
is specified, then this BGP peer selects all nodes in the cluster.
|
||||||
type: string
|
type: string
|
||||||
nodeSelector:
|
nodeSelector:
|
||||||
description: Selector for the nodes that should have this peering. When
|
description: Selector for the nodes that should have this peering. When
|
||||||
|
@ -6996,12 +6992,9 @@ spec:
|
||||||
peering between the local node and selected remote nodes, we configure
|
peering between the local node and selected remote nodes, we configure
|
||||||
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
||||||
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
||||||
remote AS number comes from the remote node’s NodeBGPSpec.ASNumber,
|
remote AS number comes from the remote node's NodeBGPSpec.ASNumber,
|
||||||
or the global default if that is not set.
|
or the global default if that is not set.
|
||||||
type: string
|
type: string
|
||||||
required:
|
|
||||||
- asNumber
|
|
||||||
- peerIP
|
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
served: true
|
served: true
|
||||||
|
@ -7019,8 +7012,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: blockaffinities.crd.projectcalico.org
|
name: blockaffinities.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -7086,8 +7077,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: clusterinformations.crd.projectcalico.org
|
name: clusterinformations.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -7156,8 +7145,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: felixconfigurations.crd.projectcalico.org
|
name: felixconfigurations.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -7218,13 +7205,13 @@ spec:
|
||||||
true]'
|
true]'
|
||||||
type: boolean
|
type: boolean
|
||||||
bpfDataIfacePattern:
|
bpfDataIfacePattern:
|
||||||
description: 'BPFDataIfacePattern is a regular expression that controls
|
description: BPFDataIfacePattern is a regular expression that controls
|
||||||
which interfaces Felix should attach BPF programs to in order to
|
which interfaces Felix should attach BPF programs to in order to
|
||||||
catch traffic to/from the network. This needs to match the interfaces
|
catch traffic to/from the network. This needs to match the interfaces
|
||||||
that Calico workload traffic flows over as well as any interfaces
|
that Calico workload traffic flows over as well as any interfaces
|
||||||
that handle incoming traffic to nodeports and services from outside
|
that handle incoming traffic to nodeports and services from outside
|
||||||
the cluster. It should not match the workload interfaces (usually
|
the cluster. It should not match the workload interfaces (usually
|
||||||
named cali...). [Default: ^(en.*|eth.*|tunl0$)]'
|
named cali...).
|
||||||
type: string
|
type: string
|
||||||
bpfDisableUnprivileged:
|
bpfDisableUnprivileged:
|
||||||
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
||||||
|
@ -7269,10 +7256,10 @@ spec:
|
||||||
` + "`" + `tc exec bpf debug` + "`" + `. [Default: Off].'
|
` + "`" + `tc exec bpf debug` + "`" + `. [Default: Off].'
|
||||||
type: string
|
type: string
|
||||||
chainInsertMode:
|
chainInsertMode:
|
||||||
description: 'ChainInsertMode controls whether Felix hooks the kernel’s
|
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
|
||||||
top-level iptables chains by inserting a rule at the top of the
|
top-level iptables chains by inserting a rule at the top of the
|
||||||
chain or by appending a rule at the bottom. insert is the safe default
|
chain or by appending a rule at the bottom. insert is the safe default
|
||||||
since it prevents Calico’s rules from being bypassed. If you switch
|
since it prevents Calico''s rules from being bypassed. If you switch
|
||||||
to append mode, be sure that the other rules in the chains signal
|
to append mode, be sure that the other rules in the chains signal
|
||||||
acceptance by falling through to the Calico rules, otherwise the
|
acceptance by falling through to the Calico rules, otherwise the
|
||||||
Calico policy will be bypassed. [Default: insert]'
|
Calico policy will be bypassed. [Default: insert]'
|
||||||
|
@ -7354,7 +7341,7 @@ spec:
|
||||||
Each port should be specified as tcp:<port-number> or udp:<port-number>.
|
Each port should be specified as tcp:<port-number> or udp:<port-number>.
|
||||||
For back-compatibility, if the protocol is not specified, it defaults
|
For back-compatibility, if the protocol is not specified, it defaults
|
||||||
to “tcp”. To disable all outbound host ports, use the value none.
|
to “tcp”. To disable all outbound host ports, use the value none.
|
||||||
The default value opens etcd’s standard ports to ensure that Felix
|
The default value opens etcd''s standard ports to ensure that Felix
|
||||||
does not get cut off from etcd as well as allowing DHCP and DNS.
|
does not get cut off from etcd as well as allowing DHCP and DNS.
|
||||||
[Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667,
|
[Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667,
|
||||||
udp:53, udp:67]'
|
udp:53, udp:67]'
|
||||||
|
@ -7406,8 +7393,8 @@ spec:
|
||||||
workload endpoints and so distinguishes them from host endpoint
|
workload endpoints and so distinguishes them from host endpoint
|
||||||
interfaces. Note: in environments other than bare metal, the orchestrators
|
interfaces. Note: in environments other than bare metal, the orchestrators
|
||||||
configure this appropriately. For example our Kubernetes and Docker
|
configure this appropriately. For example our Kubernetes and Docker
|
||||||
integrations set the ‘cali’ value, and our OpenStack integration
|
integrations set the ''cali'' value, and our OpenStack integration
|
||||||
sets the ‘tap’ value. [Default: cali]'
|
sets the ''tap'' value. [Default: cali]'
|
||||||
type: string
|
type: string
|
||||||
interfaceRefreshInterval:
|
interfaceRefreshInterval:
|
||||||
description: InterfaceRefreshInterval is the period at which Felix
|
description: InterfaceRefreshInterval is the period at which Felix
|
||||||
|
@ -7423,7 +7410,7 @@ spec:
|
||||||
ipsetsRefreshInterval:
|
ipsetsRefreshInterval:
|
||||||
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
||||||
all iptables state to ensure that no other process has accidentally
|
all iptables state to ensure that no other process has accidentally
|
||||||
broken Calico’s rules. Set to 0 to disable iptables refresh. [Default:
|
broken Calico''s rules. Set to 0 to disable iptables refresh. [Default:
|
||||||
90s]'
|
90s]'
|
||||||
type: string
|
type: string
|
||||||
iptablesBackend:
|
iptablesBackend:
|
||||||
|
@ -7435,7 +7422,7 @@ spec:
|
||||||
iptablesLockFilePath:
|
iptablesLockFilePath:
|
||||||
description: 'IptablesLockFilePath is the location of the iptables
|
description: 'IptablesLockFilePath is the location of the iptables
|
||||||
lock file. You may need to change this if the lock file is not in
|
lock file. You may need to change this if the lock file is not in
|
||||||
its standard location (for example if you have mapped it into Felix’s
|
its standard location (for example if you have mapped it into Felix''s
|
||||||
container at a different path). [Default: /run/xtables.lock]'
|
container at a different path). [Default: /run/xtables.lock]'
|
||||||
type: string
|
type: string
|
||||||
iptablesLockProbeInterval:
|
iptablesLockProbeInterval:
|
||||||
|
@ -7467,16 +7454,16 @@ spec:
|
||||||
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
||||||
has done a write to the dataplane that it schedules an extra read
|
has done a write to the dataplane that it schedules an extra read
|
||||||
back in order to check the write was not clobbered by another process.
|
back in order to check the write was not clobbered by another process.
|
||||||
This should only occur if another application on the system doesn’t
|
This should only occur if another application on the system doesn''t
|
||||||
respect the iptables lock. [Default: 1s]'
|
respect the iptables lock. [Default: 1s]'
|
||||||
type: string
|
type: string
|
||||||
iptablesRefreshInterval:
|
iptablesRefreshInterval:
|
||||||
description: 'IptablesRefreshInterval is the period at which Felix
|
description: 'IptablesRefreshInterval is the period at which Felix
|
||||||
re-checks the IP sets in the dataplane to ensure that no other process
|
re-checks the IP sets in the dataplane to ensure that no other process
|
||||||
has accidentally broken Calico’s rules. Set to 0 to disable IP sets
|
has accidentally broken Calico''s rules. Set to 0 to disable IP
|
||||||
refresh. Note: the default for this value is lower than the other
|
sets refresh. Note: the default for this value is lower than the
|
||||||
refresh intervals as a workaround for a Linux kernel bug that was
|
other refresh intervals as a workaround for a Linux kernel bug that
|
||||||
fixed in kernel version 4.11. If you are using v4.11 or greater
|
was fixed in kernel version 4.11. If you are using v4.11 or greater
|
||||||
you may want to set this to, a higher value to reduce Felix CPU
|
you may want to set this to, a higher value to reduce Felix CPU
|
||||||
usage. [Default: 10s]'
|
usage. [Default: 10s]'
|
||||||
type: string
|
type: string
|
||||||
|
@ -7527,10 +7514,15 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
metadataPort:
|
metadataPort:
|
||||||
description: 'MetadataPort is the port of the metadata server. This,
|
description: 'MetadataPort is the port of the metadata server. This,
|
||||||
combined with global.MetadataAddr (if not ‘None’), is used to set
|
combined with global.MetadataAddr (if not ''None''), is used to
|
||||||
up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
set up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
||||||
In most cases this should not need to be changed [Default: 8775].'
|
In most cases this should not need to be changed [Default: 8775].'
|
||||||
type: integer
|
type: integer
|
||||||
|
mtuIfacePattern:
|
||||||
|
description: MTUIfacePattern is a regular expression that controls
|
||||||
|
which interfaces Felix should scan in order to calculate the host's
|
||||||
|
MTU. This should not match workload interfaces (usually named cali...).
|
||||||
|
type: string
|
||||||
natOutgoingAddress:
|
natOutgoingAddress:
|
||||||
description: NATOutgoingAddress specifies an address to use when performing
|
description: NATOutgoingAddress specifies an address to use when performing
|
||||||
source NAT for traffic in a natOutgoing pool that is leaving the
|
source NAT for traffic in a natOutgoing pool that is leaving the
|
||||||
|
@ -7601,9 +7593,9 @@ spec:
|
||||||
status reports. [Default: 90s]'
|
status reports. [Default: 90s]'
|
||||||
type: string
|
type: string
|
||||||
routeRefreshInterval:
|
routeRefreshInterval:
|
||||||
description: 'RouterefreshInterval is the period at which Felix re-checks
|
description: 'RouteRefreshInterval is the period at which Felix re-checks
|
||||||
the routes in the dataplane to ensure that no other process has
|
the routes in the dataplane to ensure that no other process has
|
||||||
accidentally broken Calico’s rules. Set to 0 to disable route refresh.
|
accidentally broken Calico''s rules. Set to 0 to disable route refresh.
|
||||||
[Default: 90s]'
|
[Default: 90s]'
|
||||||
type: string
|
type: string
|
||||||
routeSource:
|
routeSource:
|
||||||
|
@ -7624,6 +7616,13 @@ spec:
|
||||||
- max
|
- max
|
||||||
- min
|
- min
|
||||||
type: object
|
type: object
|
||||||
|
serviceLoopPrevention:
|
||||||
|
description: 'When service IP advertisement is enabled, prevent routing
|
||||||
|
loops to service IPs that are not in use, by dropping or rejecting
|
||||||
|
packets that do not get DNAT''d by kube-proxy. Unless set to "Disabled",
|
||||||
|
in which case such routing loops continue to be allowed. [Default:
|
||||||
|
Drop]'
|
||||||
|
type: string
|
||||||
sidecarAccelerationEnabled:
|
sidecarAccelerationEnabled:
|
||||||
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
||||||
acceleration [Default: false]'
|
acceleration [Default: false]'
|
||||||
|
@ -7702,8 +7701,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: globalnetworkpolicies.crd.projectcalico.org
|
name: globalnetworkpolicies.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -7908,7 +7905,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -7937,7 +7934,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -8239,7 +8236,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -8268,7 +8265,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -8479,8 +8476,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: globalnetworksets.crd.projectcalico.org
|
name: globalnetworksets.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -8538,8 +8533,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: hostendpoints.crd.projectcalico.org
|
name: hostendpoints.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -8652,8 +8645,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ipamblocks.crd.projectcalico.org
|
name: ipamblocks.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -8720,7 +8711,6 @@ spec:
|
||||||
- allocations
|
- allocations
|
||||||
- attributes
|
- attributes
|
||||||
- cidr
|
- cidr
|
||||||
- deleted
|
|
||||||
- strictAffinity
|
- strictAffinity
|
||||||
- unallocated
|
- unallocated
|
||||||
type: object
|
type: object
|
||||||
|
@ -8740,8 +8730,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ipamconfigs.crd.projectcalico.org
|
name: ipamconfigs.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -8776,6 +8764,10 @@ spec:
|
||||||
properties:
|
properties:
|
||||||
autoAllocateBlocks:
|
autoAllocateBlocks:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
maxBlocksPerHost:
|
||||||
|
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
|
||||||
|
that can be affine to each host.
|
||||||
|
type: integer
|
||||||
strictAffinity:
|
strictAffinity:
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
required:
|
||||||
|
@ -8798,8 +8790,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ipamhandles.crd.projectcalico.org
|
name: ipamhandles.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -8836,6 +8826,8 @@ spec:
|
||||||
additionalProperties:
|
additionalProperties:
|
||||||
type: integer
|
type: integer
|
||||||
type: object
|
type: object
|
||||||
|
deleted:
|
||||||
|
type: boolean
|
||||||
handleID:
|
handleID:
|
||||||
type: string
|
type: string
|
||||||
required:
|
required:
|
||||||
|
@ -8858,8 +8850,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ippools.crd.projectcalico.org
|
name: ippools.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -9190,8 +9180,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: networkpolicies.crd.projectcalico.org
|
name: networkpolicies.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -9385,7 +9373,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -9414,7 +9402,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -9716,7 +9704,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -9745,7 +9733,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -9948,8 +9936,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: networksets.crd.projectcalico.org
|
name: networksets.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -10326,7 +10312,7 @@ spec:
|
||||||
securityContext:
|
securityContext:
|
||||||
fsGroup: 65534
|
fsGroup: 65534
|
||||||
containers:
|
containers:
|
||||||
- image: calico/typha:v3.16.4
|
- image: docker.io/calico/typha:v3.17.0
|
||||||
name: calico-typha
|
name: calico-typha
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 5473
|
- containerPort: 5473
|
||||||
|
@ -10443,7 +10429,7 @@ spec:
|
||||||
# It can be deleted if this is a fresh installation, or if you have already
|
# It can be deleted if this is a fresh installation, or if you have already
|
||||||
# upgraded to use calico-ipam.
|
# upgraded to use calico-ipam.
|
||||||
- name: upgrade-ipam
|
- name: upgrade-ipam
|
||||||
image: calico/cni:v3.16.4
|
image: docker.io/calico/cni:v3.17.0
|
||||||
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
@ -10470,7 +10456,7 @@ spec:
|
||||||
# This container installs the CNI binaries
|
# This container installs the CNI binaries
|
||||||
# and CNI network config file on each node.
|
# and CNI network config file on each node.
|
||||||
- name: install-cni
|
- name: install-cni
|
||||||
image: calico/cni:v3.16.4
|
image: docker.io/calico/cni:v3.17.0
|
||||||
command: ["/opt/cni/bin/install"]
|
command: ["/opt/cni/bin/install"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
@ -10511,7 +10497,7 @@ spec:
|
||||||
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
|
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
|
||||||
# to communicate with Felix over the Policy Sync API.
|
# to communicate with Felix over the Policy Sync API.
|
||||||
- name: flexvol-driver
|
- name: flexvol-driver
|
||||||
image: calico/pod2daemon-flexvol:v3.16.4
|
image: docker.io/calico/pod2daemon-flexvol:v3.17.0
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: flexvol-driver-host
|
- name: flexvol-driver-host
|
||||||
mountPath: /host/driver
|
mountPath: /host/driver
|
||||||
|
@ -10522,7 +10508,7 @@ spec:
|
||||||
# container programs network policy and routes on each
|
# container programs network policy and routes on each
|
||||||
# host.
|
# host.
|
||||||
- name: calico-node
|
- name: calico-node
|
||||||
image: calico/node:v3.16.4
|
image: docker.io/calico/node:v3.17.0
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
||||||
|
@ -10688,6 +10674,9 @@ spec:
|
||||||
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
|
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
|
||||||
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
|
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
|
- name: cni-log-dir
|
||||||
|
mountPath: /var/log/calico/cni
|
||||||
|
readOnly: true
|
||||||
volumes:
|
volumes:
|
||||||
# Used by calico-node.
|
# Used by calico-node.
|
||||||
- name: lib-modules
|
- name: lib-modules
|
||||||
|
@ -10714,6 +10703,10 @@ spec:
|
||||||
- name: cni-net-dir
|
- name: cni-net-dir
|
||||||
hostPath:
|
hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
|
# Used to access CNI logs.
|
||||||
|
- name: cni-log-dir
|
||||||
|
hostPath:
|
||||||
|
path: /var/log/calico/cni
|
||||||
# Mount in the directory for host-local IPAM allocations. This is
|
# Mount in the directory for host-local IPAM allocations. This is
|
||||||
# used when upgrading from host-local to calico-ipam, and can be removed
|
# used when upgrading from host-local to calico-ipam, and can be removed
|
||||||
# if not using the upgrade-ipam init container.
|
# if not using the upgrade-ipam init container.
|
||||||
|
@ -10779,7 +10772,7 @@ spec:
|
||||||
priorityClassName: system-cluster-critical
|
priorityClassName: system-cluster-critical
|
||||||
containers:
|
containers:
|
||||||
- name: calico-kube-controllers
|
- name: calico-kube-controllers
|
||||||
image: calico/kube-controllers:v3.16.4
|
image: docker.io/calico/kube-controllers:v3.17.0
|
||||||
env:
|
env:
|
||||||
# Choose which controllers to run.
|
# Choose which controllers to run.
|
||||||
- name: ENABLED_CONTROLLERS
|
- name: ENABLED_CONTROLLERS
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
# Pulled and modified from: https://docs.projectcalico.org/v3.16/manifests/calico-typha.yaml
|
# Pulled and modified from: https://docs.projectcalico.org/v3.17/manifests/calico-typha.yaml
|
||||||
|
|
||||||
{{- if .Networking.Calico.BPFEnabled }}
|
{{- if .Networking.Calico.BPFEnabled }}
|
||||||
---
|
---
|
||||||
|
@ -29,15 +29,14 @@ data:
|
||||||
typha_service_name: "{{- if .Networking.Calico.TyphaReplicas -}}calico-typha{{- else -}}none{{- end -}}"
|
typha_service_name: "{{- if .Networking.Calico.TyphaReplicas -}}calico-typha{{- else -}}none{{- end -}}"
|
||||||
# Configure the backend to use.
|
# Configure the backend to use.
|
||||||
calico_backend: "bird"
|
calico_backend: "bird"
|
||||||
|
|
||||||
# Configure the MTU to use for workload interfaces and tunnels.
|
# Configure the MTU to use for workload interfaces and tunnels.
|
||||||
# - If Wireguard is enabled, set to your network MTU - 60
|
# By default, MTU is auto-detected, and explicitly setting this field should not be required.
|
||||||
# - Otherwise, if VXLAN or BPF mode is enabled, set to your network MTU - 50
|
# You can override auto-detection by providing a non-zero value.
|
||||||
# - Otherwise, if IPIP is enabled, set to your network MTU - 20
|
|
||||||
# - Otherwise, if not using any encapsulation, set to your network MTU.
|
|
||||||
{{- if .Networking.Calico.MTU }}
|
{{- if .Networking.Calico.MTU }}
|
||||||
veth_mtu: "{{ .Networking.Calico.MTU }}"
|
veth_mtu: "{{ .Networking.Calico.MTU }}"
|
||||||
{{- else }}
|
{{- else }}
|
||||||
veth_mtu: "{{- if eq .CloudProvider "openstack" -}}1430{{- else -}}1440{{- end -}}"
|
veth_mtu: "0"
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
# The CNI network configuration to install on each node. The special
|
# The CNI network configuration to install on each node. The special
|
||||||
|
@ -84,8 +83,6 @@ data:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: bgpconfigurations.crd.projectcalico.org
|
name: bgpconfigurations.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -221,8 +218,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: bgppeers.crd.projectcalico.org
|
name: bgppeers.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -259,6 +254,7 @@ spec:
|
||||||
format: int32
|
format: int32
|
||||||
type: integer
|
type: integer
|
||||||
keepOriginalNextHop:
|
keepOriginalNextHop:
|
||||||
|
default: false
|
||||||
description: Option to keep the original nexthop field when routes
|
description: Option to keep the original nexthop field when routes
|
||||||
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
||||||
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
||||||
|
@ -266,8 +262,8 @@ spec:
|
||||||
type: boolean
|
type: boolean
|
||||||
node:
|
node:
|
||||||
description: The node name identifying the Calico node instance that
|
description: The node name identifying the Calico node instance that
|
||||||
is peering with this peer. If this is not set, this represents a
|
is targeted by this peer. If this is not set, and no nodeSelector
|
||||||
global peer, i.e. a peer that peers with every node in the deployment.
|
is specified, then this BGP peer selects all nodes in the cluster.
|
||||||
type: string
|
type: string
|
||||||
nodeSelector:
|
nodeSelector:
|
||||||
description: Selector for the nodes that should have this peering. When
|
description: Selector for the nodes that should have this peering. When
|
||||||
|
@ -309,12 +305,9 @@ spec:
|
||||||
peering between the local node and selected remote nodes, we configure
|
peering between the local node and selected remote nodes, we configure
|
||||||
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
||||||
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
||||||
remote AS number comes from the remote node’s NodeBGPSpec.ASNumber,
|
remote AS number comes from the remote node's NodeBGPSpec.ASNumber,
|
||||||
or the global default if that is not set.
|
or the global default if that is not set.
|
||||||
type: string
|
type: string
|
||||||
required:
|
|
||||||
- asNumber
|
|
||||||
- peerIP
|
|
||||||
type: object
|
type: object
|
||||||
type: object
|
type: object
|
||||||
served: true
|
served: true
|
||||||
|
@ -332,8 +325,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: blockaffinities.crd.projectcalico.org
|
name: blockaffinities.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -399,8 +390,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: clusterinformations.crd.projectcalico.org
|
name: clusterinformations.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -469,8 +458,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: felixconfigurations.crd.projectcalico.org
|
name: felixconfigurations.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -531,13 +518,13 @@ spec:
|
||||||
true]'
|
true]'
|
||||||
type: boolean
|
type: boolean
|
||||||
bpfDataIfacePattern:
|
bpfDataIfacePattern:
|
||||||
description: 'BPFDataIfacePattern is a regular expression that controls
|
description: BPFDataIfacePattern is a regular expression that controls
|
||||||
which interfaces Felix should attach BPF programs to in order to
|
which interfaces Felix should attach BPF programs to in order to
|
||||||
catch traffic to/from the network. This needs to match the interfaces
|
catch traffic to/from the network. This needs to match the interfaces
|
||||||
that Calico workload traffic flows over as well as any interfaces
|
that Calico workload traffic flows over as well as any interfaces
|
||||||
that handle incoming traffic to nodeports and services from outside
|
that handle incoming traffic to nodeports and services from outside
|
||||||
the cluster. It should not match the workload interfaces (usually
|
the cluster. It should not match the workload interfaces (usually
|
||||||
named cali...). [Default: ^(en.*|eth.*|tunl0$)]'
|
named cali...).
|
||||||
type: string
|
type: string
|
||||||
bpfDisableUnprivileged:
|
bpfDisableUnprivileged:
|
||||||
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
||||||
|
@ -582,10 +569,10 @@ spec:
|
||||||
`tc exec bpf debug`. [Default: Off].'
|
`tc exec bpf debug`. [Default: Off].'
|
||||||
type: string
|
type: string
|
||||||
chainInsertMode:
|
chainInsertMode:
|
||||||
description: 'ChainInsertMode controls whether Felix hooks the kernel’s
|
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
|
||||||
top-level iptables chains by inserting a rule at the top of the
|
top-level iptables chains by inserting a rule at the top of the
|
||||||
chain or by appending a rule at the bottom. insert is the safe default
|
chain or by appending a rule at the bottom. insert is the safe default
|
||||||
since it prevents Calico’s rules from being bypassed. If you switch
|
since it prevents Calico''s rules from being bypassed. If you switch
|
||||||
to append mode, be sure that the other rules in the chains signal
|
to append mode, be sure that the other rules in the chains signal
|
||||||
acceptance by falling through to the Calico rules, otherwise the
|
acceptance by falling through to the Calico rules, otherwise the
|
||||||
Calico policy will be bypassed. [Default: insert]'
|
Calico policy will be bypassed. [Default: insert]'
|
||||||
|
@ -667,7 +654,7 @@ spec:
|
||||||
Each port should be specified as tcp:<port-number> or udp:<port-number>.
|
Each port should be specified as tcp:<port-number> or udp:<port-number>.
|
||||||
For back-compatibility, if the protocol is not specified, it defaults
|
For back-compatibility, if the protocol is not specified, it defaults
|
||||||
to “tcp”. To disable all outbound host ports, use the value none.
|
to “tcp”. To disable all outbound host ports, use the value none.
|
||||||
The default value opens etcd’s standard ports to ensure that Felix
|
The default value opens etcd''s standard ports to ensure that Felix
|
||||||
does not get cut off from etcd as well as allowing DHCP and DNS.
|
does not get cut off from etcd as well as allowing DHCP and DNS.
|
||||||
[Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667,
|
[Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667,
|
||||||
udp:53, udp:67]'
|
udp:53, udp:67]'
|
||||||
|
@ -719,8 +706,8 @@ spec:
|
||||||
workload endpoints and so distinguishes them from host endpoint
|
workload endpoints and so distinguishes them from host endpoint
|
||||||
interfaces. Note: in environments other than bare metal, the orchestrators
|
interfaces. Note: in environments other than bare metal, the orchestrators
|
||||||
configure this appropriately. For example our Kubernetes and Docker
|
configure this appropriately. For example our Kubernetes and Docker
|
||||||
integrations set the ‘cali’ value, and our OpenStack integration
|
integrations set the ''cali'' value, and our OpenStack integration
|
||||||
sets the ‘tap’ value. [Default: cali]'
|
sets the ''tap'' value. [Default: cali]'
|
||||||
type: string
|
type: string
|
||||||
interfaceRefreshInterval:
|
interfaceRefreshInterval:
|
||||||
description: InterfaceRefreshInterval is the period at which Felix
|
description: InterfaceRefreshInterval is the period at which Felix
|
||||||
|
@ -736,7 +723,7 @@ spec:
|
||||||
ipsetsRefreshInterval:
|
ipsetsRefreshInterval:
|
||||||
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
||||||
all iptables state to ensure that no other process has accidentally
|
all iptables state to ensure that no other process has accidentally
|
||||||
broken Calico’s rules. Set to 0 to disable iptables refresh. [Default:
|
broken Calico''s rules. Set to 0 to disable iptables refresh. [Default:
|
||||||
90s]'
|
90s]'
|
||||||
type: string
|
type: string
|
||||||
iptablesBackend:
|
iptablesBackend:
|
||||||
|
@ -748,7 +735,7 @@ spec:
|
||||||
iptablesLockFilePath:
|
iptablesLockFilePath:
|
||||||
description: 'IptablesLockFilePath is the location of the iptables
|
description: 'IptablesLockFilePath is the location of the iptables
|
||||||
lock file. You may need to change this if the lock file is not in
|
lock file. You may need to change this if the lock file is not in
|
||||||
its standard location (for example if you have mapped it into Felix’s
|
its standard location (for example if you have mapped it into Felix''s
|
||||||
container at a different path). [Default: /run/xtables.lock]'
|
container at a different path). [Default: /run/xtables.lock]'
|
||||||
type: string
|
type: string
|
||||||
iptablesLockProbeInterval:
|
iptablesLockProbeInterval:
|
||||||
|
@ -780,16 +767,16 @@ spec:
|
||||||
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
||||||
has done a write to the dataplane that it schedules an extra read
|
has done a write to the dataplane that it schedules an extra read
|
||||||
back in order to check the write was not clobbered by another process.
|
back in order to check the write was not clobbered by another process.
|
||||||
This should only occur if another application on the system doesn’t
|
This should only occur if another application on the system doesn''t
|
||||||
respect the iptables lock. [Default: 1s]'
|
respect the iptables lock. [Default: 1s]'
|
||||||
type: string
|
type: string
|
||||||
iptablesRefreshInterval:
|
iptablesRefreshInterval:
|
||||||
description: 'IptablesRefreshInterval is the period at which Felix
|
description: 'IptablesRefreshInterval is the period at which Felix
|
||||||
re-checks the IP sets in the dataplane to ensure that no other process
|
re-checks the IP sets in the dataplane to ensure that no other process
|
||||||
has accidentally broken Calico’s rules. Set to 0 to disable IP sets
|
has accidentally broken Calico''s rules. Set to 0 to disable IP
|
||||||
refresh. Note: the default for this value is lower than the other
|
sets refresh. Note: the default for this value is lower than the
|
||||||
refresh intervals as a workaround for a Linux kernel bug that was
|
other refresh intervals as a workaround for a Linux kernel bug that
|
||||||
fixed in kernel version 4.11. If you are using v4.11 or greater
|
was fixed in kernel version 4.11. If you are using v4.11 or greater
|
||||||
you may want to set this to, a higher value to reduce Felix CPU
|
you may want to set this to, a higher value to reduce Felix CPU
|
||||||
usage. [Default: 10s]'
|
usage. [Default: 10s]'
|
||||||
type: string
|
type: string
|
||||||
|
@ -840,10 +827,15 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
metadataPort:
|
metadataPort:
|
||||||
description: 'MetadataPort is the port of the metadata server. This,
|
description: 'MetadataPort is the port of the metadata server. This,
|
||||||
combined with global.MetadataAddr (if not ‘None’), is used to set
|
combined with global.MetadataAddr (if not ''None''), is used to
|
||||||
up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
set up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
||||||
In most cases this should not need to be changed [Default: 8775].'
|
In most cases this should not need to be changed [Default: 8775].'
|
||||||
type: integer
|
type: integer
|
||||||
|
mtuIfacePattern:
|
||||||
|
description: MTUIfacePattern is a regular expression that controls
|
||||||
|
which interfaces Felix should scan in order to calculate the host's
|
||||||
|
MTU. This should not match workload interfaces (usually named cali...).
|
||||||
|
type: string
|
||||||
natOutgoingAddress:
|
natOutgoingAddress:
|
||||||
description: NATOutgoingAddress specifies an address to use when performing
|
description: NATOutgoingAddress specifies an address to use when performing
|
||||||
source NAT for traffic in a natOutgoing pool that is leaving the
|
source NAT for traffic in a natOutgoing pool that is leaving the
|
||||||
|
@ -914,9 +906,9 @@ spec:
|
||||||
status reports. [Default: 90s]'
|
status reports. [Default: 90s]'
|
||||||
type: string
|
type: string
|
||||||
routeRefreshInterval:
|
routeRefreshInterval:
|
||||||
description: 'RouterefreshInterval is the period at which Felix re-checks
|
description: 'RouteRefreshInterval is the period at which Felix re-checks
|
||||||
the routes in the dataplane to ensure that no other process has
|
the routes in the dataplane to ensure that no other process has
|
||||||
accidentally broken Calico’s rules. Set to 0 to disable route refresh.
|
accidentally broken Calico''s rules. Set to 0 to disable route refresh.
|
||||||
[Default: 90s]'
|
[Default: 90s]'
|
||||||
type: string
|
type: string
|
||||||
routeSource:
|
routeSource:
|
||||||
|
@ -937,6 +929,13 @@ spec:
|
||||||
- max
|
- max
|
||||||
- min
|
- min
|
||||||
type: object
|
type: object
|
||||||
|
serviceLoopPrevention:
|
||||||
|
description: 'When service IP advertisement is enabled, prevent routing
|
||||||
|
loops to service IPs that are not in use, by dropping or rejecting
|
||||||
|
packets that do not get DNAT''d by kube-proxy. Unless set to "Disabled",
|
||||||
|
in which case such routing loops continue to be allowed. [Default:
|
||||||
|
Drop]'
|
||||||
|
type: string
|
||||||
sidecarAccelerationEnabled:
|
sidecarAccelerationEnabled:
|
||||||
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
||||||
acceleration [Default: false]'
|
acceleration [Default: false]'
|
||||||
|
@ -1015,8 +1014,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: globalnetworkpolicies.crd.projectcalico.org
|
name: globalnetworkpolicies.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -1221,7 +1218,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -1250,7 +1247,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -1552,7 +1549,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -1581,7 +1578,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -1792,8 +1789,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: globalnetworksets.crd.projectcalico.org
|
name: globalnetworksets.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -1851,8 +1846,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: hostendpoints.crd.projectcalico.org
|
name: hostendpoints.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -1965,8 +1958,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ipamblocks.crd.projectcalico.org
|
name: ipamblocks.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -2033,7 +2024,6 @@ spec:
|
||||||
- allocations
|
- allocations
|
||||||
- attributes
|
- attributes
|
||||||
- cidr
|
- cidr
|
||||||
- deleted
|
|
||||||
- strictAffinity
|
- strictAffinity
|
||||||
- unallocated
|
- unallocated
|
||||||
type: object
|
type: object
|
||||||
|
@ -2053,8 +2043,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ipamconfigs.crd.projectcalico.org
|
name: ipamconfigs.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -2089,6 +2077,10 @@ spec:
|
||||||
properties:
|
properties:
|
||||||
autoAllocateBlocks:
|
autoAllocateBlocks:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
maxBlocksPerHost:
|
||||||
|
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
|
||||||
|
that can be affine to each host.
|
||||||
|
type: integer
|
||||||
strictAffinity:
|
strictAffinity:
|
||||||
type: boolean
|
type: boolean
|
||||||
required:
|
required:
|
||||||
|
@ -2111,8 +2103,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ipamhandles.crd.projectcalico.org
|
name: ipamhandles.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -2149,6 +2139,8 @@ spec:
|
||||||
additionalProperties:
|
additionalProperties:
|
||||||
type: integer
|
type: integer
|
||||||
type: object
|
type: object
|
||||||
|
deleted:
|
||||||
|
type: boolean
|
||||||
handleID:
|
handleID:
|
||||||
type: string
|
type: string
|
||||||
required:
|
required:
|
||||||
|
@ -2171,8 +2163,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: ippools.crd.projectcalico.org
|
name: ippools.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -2503,8 +2493,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: networkpolicies.crd.projectcalico.org
|
name: networkpolicies.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -2698,7 +2686,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -2727,7 +2715,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -3029,7 +3017,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -3058,7 +3046,7 @@ spec:
|
||||||
code:
|
code:
|
||||||
description: Match on a specific ICMP code. If specified,
|
description: Match on a specific ICMP code. If specified,
|
||||||
the Type value must also be specified. This is a technical
|
the Type value must also be specified. This is a technical
|
||||||
limitation imposed by the kernel’s iptables firewall,
|
limitation imposed by the kernel's iptables firewall,
|
||||||
which Calico uses to enforce the rule.
|
which Calico uses to enforce the rule.
|
||||||
type: integer
|
type: integer
|
||||||
type:
|
type:
|
||||||
|
@ -3261,8 +3249,6 @@ status:
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
annotations:
|
|
||||||
controller-gen.kubebuilder.io/version: (devel)
|
|
||||||
name: networksets.crd.projectcalico.org
|
name: networksets.crd.projectcalico.org
|
||||||
labels:
|
labels:
|
||||||
role.kubernetes.io/networking: "1"
|
role.kubernetes.io/networking: "1"
|
||||||
|
@ -3639,7 +3625,7 @@ spec:
|
||||||
securityContext:
|
securityContext:
|
||||||
fsGroup: 65534
|
fsGroup: 65534
|
||||||
containers:
|
containers:
|
||||||
- image: calico/typha:v3.16.4
|
- image: docker.io/calico/typha:v3.17.0
|
||||||
name: calico-typha
|
name: calico-typha
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 5473
|
- containerPort: 5473
|
||||||
|
@ -3756,7 +3742,7 @@ spec:
|
||||||
# It can be deleted if this is a fresh installation, or if you have already
|
# It can be deleted if this is a fresh installation, or if you have already
|
||||||
# upgraded to use calico-ipam.
|
# upgraded to use calico-ipam.
|
||||||
- name: upgrade-ipam
|
- name: upgrade-ipam
|
||||||
image: calico/cni:v3.16.4
|
image: docker.io/calico/cni:v3.17.0
|
||||||
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
@ -3783,7 +3769,7 @@ spec:
|
||||||
# This container installs the CNI binaries
|
# This container installs the CNI binaries
|
||||||
# and CNI network config file on each node.
|
# and CNI network config file on each node.
|
||||||
- name: install-cni
|
- name: install-cni
|
||||||
image: calico/cni:v3.16.4
|
image: docker.io/calico/cni:v3.17.0
|
||||||
command: ["/opt/cni/bin/install"]
|
command: ["/opt/cni/bin/install"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
@ -3824,7 +3810,7 @@ spec:
|
||||||
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
|
# Adds a Flex Volume Driver that creates a per-pod Unix Domain Socket to allow Dikastes
|
||||||
# to communicate with Felix over the Policy Sync API.
|
# to communicate with Felix over the Policy Sync API.
|
||||||
- name: flexvol-driver
|
- name: flexvol-driver
|
||||||
image: calico/pod2daemon-flexvol:v3.16.4
|
image: docker.io/calico/pod2daemon-flexvol:v3.17.0
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: flexvol-driver-host
|
- name: flexvol-driver-host
|
||||||
mountPath: /host/driver
|
mountPath: /host/driver
|
||||||
|
@ -3835,7 +3821,7 @@ spec:
|
||||||
# container programs network policy and routes on each
|
# container programs network policy and routes on each
|
||||||
# host.
|
# host.
|
||||||
- name: calico-node
|
- name: calico-node
|
||||||
image: calico/node:v3.16.4
|
image: docker.io/calico/node:v3.17.0
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
||||||
|
@ -4001,6 +3987,9 @@ spec:
|
||||||
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
|
# Bidirectional means that, if we mount the BPF filesystem at /sys/fs/bpf it will propagate to the host.
|
||||||
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
|
# If the host is known to mount that filesystem already then Bidirectional can be omitted.
|
||||||
mountPropagation: Bidirectional
|
mountPropagation: Bidirectional
|
||||||
|
- name: cni-log-dir
|
||||||
|
mountPath: /var/log/calico/cni
|
||||||
|
readOnly: true
|
||||||
volumes:
|
volumes:
|
||||||
# Used by calico-node.
|
# Used by calico-node.
|
||||||
- name: lib-modules
|
- name: lib-modules
|
||||||
|
@ -4027,6 +4016,10 @@ spec:
|
||||||
- name: cni-net-dir
|
- name: cni-net-dir
|
||||||
hostPath:
|
hostPath:
|
||||||
path: /etc/cni/net.d
|
path: /etc/cni/net.d
|
||||||
|
# Used to access CNI logs.
|
||||||
|
- name: cni-log-dir
|
||||||
|
hostPath:
|
||||||
|
path: /var/log/calico/cni
|
||||||
# Mount in the directory for host-local IPAM allocations. This is
|
# Mount in the directory for host-local IPAM allocations. This is
|
||||||
# used when upgrading from host-local to calico-ipam, and can be removed
|
# used when upgrading from host-local to calico-ipam, and can be removed
|
||||||
# if not using the upgrade-ipam init container.
|
# if not using the upgrade-ipam init container.
|
||||||
|
@ -4092,7 +4085,7 @@ spec:
|
||||||
priorityClassName: system-cluster-critical
|
priorityClassName: system-cluster-critical
|
||||||
containers:
|
containers:
|
||||||
- name: calico-kube-controllers
|
- name: calico-kube-controllers
|
||||||
image: calico/kube-controllers:v3.16.4
|
image: docker.io/calico/kube-controllers:v3.17.0
|
||||||
env:
|
env:
|
||||||
# Choose which controllers to run.
|
# Choose which controllers to run.
|
||||||
- name: ENABLED_CONTROLLERS
|
- name: ENABLED_CONTROLLERS
|
||||||
|
|
|
@ -711,7 +711,7 @@ func (b *BootstrapChannelBuilder) buildAddons(c *fi.ModelBuilderContext) (*chann
|
||||||
key := "networking.projectcalico.org"
|
key := "networking.projectcalico.org"
|
||||||
versions := map[string]string{
|
versions := map[string]string{
|
||||||
"k8s-1.12": "3.9.6-kops.1",
|
"k8s-1.12": "3.9.6-kops.1",
|
||||||
"k8s-1.16": "3.16.3-kops.2",
|
"k8s-1.16": "3.17.0-kops.1",
|
||||||
}
|
}
|
||||||
|
|
||||||
{
|
{
|
||||||
|
|
Loading…
Reference in New Issue