You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

243 lines
8.5 KiB

  1. # Kubernetes configuration dirs and system namespace.
  2. # Those are where all the additional config stuff goes
  3. # the kubernetes normally puts in /srv/kubernetes.
  4. # This puts them in a sane location and namespace.
  5. # Editing those values will almost surely break something.
  6. kube_config_dir: /etc/kubernetes
  7. kube_script_dir: "{{ bin_dir }}/kubernetes-scripts"
  8. kube_manifest_dir: "{{ kube_config_dir }}/manifests"
  9. # This is where all the cert scripts and certs will be located
  10. kube_cert_dir: "{{ kube_config_dir }}/ssl"
  11. # This is where all of the bearer tokens will be stored
  12. kube_token_dir: "{{ kube_config_dir }}/tokens"
  13. # This is where to save basic auth file
  14. kube_users_dir: "{{ kube_config_dir }}/users"
  15. kube_api_anonymous_auth: true
  16. ## Change this to use another Kubernetes version, e.g. a current beta release
  17. kube_version: v1.9.5
  18. # Where the binaries will be downloaded.
  19. # Note: ensure that you've enough disk space (about 1G)
  20. local_release_dir: "/tmp/releases"
  21. # Random shifts for retrying failed ops like pushing/downloading
  22. retry_stagger: 5
  23. # This is the group that the cert creation scripts chgrp the
  24. # cert files to. Not really changeable...
  25. kube_cert_group: kube-cert
  26. # Cluster Loglevel configuration
  27. kube_log_level: 2
  28. # Users to create for basic auth in Kubernetes API via HTTP
  29. # Optionally add groups for user
  30. kube_api_pwd: "{{ lookup('password', inventory_dir + '/credentials/kube_user.creds length=15 chars=ascii_letters,digits') }}"
  31. kube_users:
  32. kube:
  33. pass: "{{kube_api_pwd}}"
  34. role: admin
  35. groups:
  36. - system:masters
  37. ## It is possible to activate / deactivate selected authentication methods (basic auth, static token auth)
  38. #kube_oidc_auth: false
  39. #kube_basic_auth: false
  40. #kube_token_auth: false
  41. ## Variables for OpenID Connect Configuration https://kubernetes.io/docs/admin/authentication/
  42. ## To use OpenID you have to deploy additional an OpenID Provider (e.g Dex, Keycloak, ...)
  43. # kube_oidc_url: https:// ...
  44. # kube_oidc_client_id: kubernetes
  45. ## Optional settings for OIDC
  46. # kube_oidc_ca_file: {{ kube_cert_dir }}/ca.pem
  47. # kube_oidc_username_claim: sub
  48. # kube_oidc_username_prefix: oidc:
  49. # kube_oidc_groups_claim: groups
  50. # kube_oidc_groups_prefix: oidc:
  51. # Choose network plugin (cilium, calico, contiv, weave or flannel)
  52. # Can also be set to 'cloud', which lets the cloud provider setup appropriate routing
  53. kube_network_plugin: calico
  54. # weave's network password for encryption
  55. # if null then no network encryption
  56. # you can use --extra-vars to pass the password in command line
  57. weave_password: EnterPasswordHere
  58. # Weave uses consensus mode by default
  59. # Enabling seed mode allow to dynamically add or remove hosts
  60. # https://www.weave.works/docs/net/latest/ipam/
  61. weave_mode_seed: false
  62. # This two variable are automatically changed by the weave's role, do not manually change these values
  63. # To reset values :
  64. # weave_seed: uninitialized
  65. # weave_peers: uninitialized
  66. weave_seed: uninitialized
  67. weave_peers: uninitialized
  68. # Set the MTU of Weave (default 1376, Jumbo Frames: 8916)
  69. weave_mtu: 1376
  70. # Enable kubernetes network policies
  71. enable_network_policy: false
  72. # Kubernetes internal network for services, unused block of space.
  73. kube_service_addresses: 10.233.0.0/18
  74. # internal network. When used, it will assign IP
  75. # addresses from this range to individual pods.
  76. # This network must be unused in your network infrastructure!
  77. kube_pods_subnet: 10.233.64.0/18
  78. # internal network node size allocation (optional). This is the size allocated
  79. # to each node on your network. With these defaults you should have
  80. # room for 4096 nodes with 254 pods per node.
  81. kube_network_node_prefix: 24
  82. # The port the API Server will be listening on.
  83. kube_apiserver_ip: "{{ kube_service_addresses|ipaddr('net')|ipaddr(1)|ipaddr('address') }}"
  84. kube_apiserver_port: 6443 # (https)
  85. kube_apiserver_insecure_port: 8080 # (http)
  86. # Set to 0 to disable insecure port - Requires RBAC in authorization_modes and kube_api_anonymous_auth: true
  87. #kube_apiserver_insecure_port: 0 # (disabled)
  88. # Kube-proxy proxyMode configuration.
  89. # Can be ipvs, iptables
  90. kube_proxy_mode: iptables
  91. ## Encrypting Secret Data at Rest (experimental)
  92. kube_encrypt_secret_data: false
  93. # DNS configuration.
  94. # Kubernetes cluster name, also will be used as DNS domain
  95. cluster_name: cluster.local
  96. # Subdomains of DNS domain to be resolved via /etc/resolv.conf for hostnet pods
  97. ndots: 2
  98. # Can be dnsmasq_kubedns, kubedns, coredns, coredns_dual, manual or none
  99. dns_mode: kubedns
  100. # Set manual server if using a custom cluster DNS server
  101. #manual_dns_server: 10.x.x.x
  102. # Can be docker_dns, host_resolvconf or none
  103. resolvconf_mode: docker_dns
  104. # Deploy netchecker app to verify DNS resolve as an HTTP service
  105. deploy_netchecker: false
  106. # Ip address of the kubernetes skydns service
  107. skydns_server: "{{ kube_service_addresses|ipaddr('net')|ipaddr(3)|ipaddr('address') }}"
  108. skydns_server_secondary: "{{ kube_service_addresses|ipaddr('net')|ipaddr(4)|ipaddr('address') }}"
  109. dnsmasq_dns_server: "{{ kube_service_addresses|ipaddr('net')|ipaddr(2)|ipaddr('address') }}"
  110. dns_domain: "{{ cluster_name }}"
  111. # Path used to store Docker data
  112. docker_daemon_graph: "/var/lib/docker"
  113. ## A string of extra options to pass to the docker daemon.
  114. ## This string should be exactly as you wish it to appear.
  115. ## An obvious use case is allowing insecure-registry access
  116. ## to self hosted registries like so:
  117. docker_options: "--insecure-registry={{ kube_service_addresses }} --graph={{ docker_daemon_graph }} {{ docker_log_opts }}"
  118. docker_bin_dir: "/usr/bin"
  119. # Settings for containerized control plane (etcd/kubelet/secrets)
  120. etcd_deployment_type: docker
  121. kubelet_deployment_type: host
  122. vault_deployment_type: docker
  123. helm_deployment_type: host
  124. # K8s image pull policy (imagePullPolicy)
  125. k8s_image_pull_policy: IfNotPresent
  126. # Kubernetes dashboard
  127. # RBAC required. see docs/getting-started.md for access details.
  128. dashboard_enabled: true
  129. # Monitoring apps for k8s
  130. efk_enabled: false
  131. # Helm deployment
  132. helm_enabled: false
  133. # Istio deployment
  134. istio_enabled: false
  135. # Registry deployment
  136. registry_enabled: false
  137. # registry_namespace: "{{ system_namespace }}"
  138. # registry_storage_class: ""
  139. # registry_disk_size: "10Gi"
  140. # Local volume provisioner deployment
  141. local_volume_provisioner_enabled: false
  142. # local_volume_provisioner_namespace: "{{ system_namespace }}"
  143. # local_volume_provisioner_base_dir: /mnt/disks
  144. # local_volume_provisioner_mount_dir: /mnt/disks
  145. # local_volume_provisioner_storage_class: local-storage
  146. # CephFS provisioner deployment
  147. cephfs_provisioner_enabled: false
  148. # cephfs_provisioner_namespace: "{{ system_namespace }}"
  149. # cephfs_provisioner_cluster: ceph
  150. # cephfs_provisioner_monitors:
  151. # - 172.24.0.1:6789
  152. # - 172.24.0.2:6789
  153. # - 172.24.0.3:6789
  154. # cephfs_provisioner_admin_id: admin
  155. # cephfs_provisioner_secret: secret
  156. # cephfs_provisioner_storage_class: cephfs
  157. # Nginx ingress controller deployment
  158. ingress_nginx_enabled: false
  159. # ingress_nginx_host_network: false
  160. # ingress_nginx_namespace: "ingress-nginx"
  161. # ingress_nginx_insecure_port: 80
  162. # ingress_nginx_secure_port: 443
  163. # ingress_nginx_configmap:
  164. # map-hash-bucket-size: "128"
  165. # ssl-protocols: "SSLv2"
  166. # ingress_nginx_configmap_tcp_services:
  167. # 9000: "default/example-go:8080"
  168. # ingress_nginx_configmap_udp_services:
  169. # 53: "kube-system/kube-dns:53"
  170. # Cert manager deployment
  171. cert_manager_enabled: false
  172. # cert_manager_namespace: "cert-manager"
  173. # Add Persistent Volumes Storage Class for corresponding cloud provider ( OpenStack is only supported now )
  174. persistent_volumes_enabled: false
  175. # Make a copy of kubeconfig on the host that runs Ansible in {{ inventory_dir }}/artifacts
  176. # kubeconfig_localhost: false
  177. # Download kubectl onto the host that runs Ansible in {{ bin_dir }}
  178. # kubectl_localhost: false
  179. # dnsmasq
  180. # dnsmasq_upstream_dns_servers:
  181. # - /resolvethiszone.with/10.0.4.250
  182. # - 8.8.8.8
  183. # Enable creation of QoS cgroup hierarchy, if true top level QoS and pod cgroups are created. (default true)
  184. # kubelet_cgroups_per_qos: true
  185. # A comma separated list of levels of node allocatable enforcement to be enforced by kubelet.
  186. # Acceptable options are 'pods', 'system-reserved', 'kube-reserved' and ''. Default is "".
  187. # kubelet_enforce_node_allocatable: pods
  188. ## Supplementary addresses that can be added in kubernetes ssl keys.
  189. ## That can be useful for example to setup a keepalived virtual IP
  190. # supplementary_addresses_in_ssl_keys: [10.0.0.1, 10.0.0.2, 10.0.0.3]
  191. ## Running on top of openstack vms with cinder enabled may lead to unschedulable pods due to NoVolumeZoneConflict restriction in kube-scheduler.
  192. ## See https://github.com/kubernetes-incubator/kubespray/issues/2141
  193. ## Set this variable to true to get rid of this issue
  194. volume_cross_zone_attachment: false