You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

105 lines
5.2 KiB

9 years ago
9 years ago
7 years ago
9 years ago
  1. ### Upstream source https://github.com/kubernetes/release/blob/master/debian/xenial/kubeadm/channel/stable/etc/systemd/system/kubelet.service.d/
  2. ### All upstream values should be present in this file
  3. # logging to stderr means we get it in the systemd journal
  4. KUBE_LOGTOSTDERR="--logtostderr=true"
  5. KUBE_LOG_LEVEL="--v={{ kube_log_level }}"
  6. # The address for the info server to serve on (set to 0.0.0.0 or "" for all interfaces)
  7. KUBELET_ADDRESS="--address={{ kubelet_bind_address }} --node-ip={{ kubelet_address }}"
  8. # The port for the info server to serve on
  9. # KUBELET_PORT="--port=10250"
  10. {% if kube_override_hostname|default('') %}
  11. # You may leave this blank to use the actual hostname
  12. KUBELET_HOSTNAME="--hostname-override={{ kube_override_hostname }}"
  13. {% endif %}
  14. {# Base kubelet args #}
  15. {% set kubelet_args_base -%}
  16. {# start kubeadm specific settings #}
  17. --bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf \
  18. --kubeconfig={{ kube_config_dir }}/kubelet.conf \
  19. {% if kube_version | version_compare('v1.8', '<') %}
  20. --require-kubeconfig \
  21. {% endif %}
  22. {% if kubelet_authentication_token_webhook %}
  23. --authentication-token-webhook \
  24. {% endif %}
  25. {% if kubelet_authorization_mode_webhook %}
  26. --authorization-mode=Webhook \
  27. {% endif %}
  28. --client-ca-file={{ kube_cert_dir }}/ca.crt \
  29. --pod-manifest-path={{ kube_manifest_dir }} \
  30. --cadvisor-port={{ kube_cadvisor_port }} \
  31. {# end kubeadm specific settings #}
  32. --pod-infra-container-image={{ pod_infra_image_repo }}:{{ pod_infra_image_tag }} \
  33. --node-status-update-frequency={{ kubelet_status_update_frequency }} \
  34. --cgroup-driver={{ kubelet_cgroup_driver|default(kubelet_cgroup_driver_detected) }} \
  35. --max-pods={{ kubelet_max_pods }} \
  36. --docker-disable-shared-pid={{ kubelet_disable_shared_pid }} \
  37. --anonymous-auth=false \
  38. --read-only-port={{ kube_read_only_port }} \
  39. {% if kube_version | version_compare('v1.8', '<') %}
  40. --experimental-fail-swap-on={{ kubelet_fail_swap_on|default(true)}} \
  41. {% else %}
  42. --fail-swap-on={{ kubelet_fail_swap_on|default(true)}} \
  43. {% endif %}
  44. {% endset %}
  45. {# Node reserved CPU/memory #}
  46. {% if is_kube_master|bool %}
  47. {% set kube_reserved %}--kube-reserved cpu={{ kube_master_cpu_reserved }},memory={{ kube_master_memory_reserved|regex_replace('Mi', 'M') }}{% endset %}
  48. {% else %}
  49. {% set kube_reserved %}--kube-reserved cpu={{ kube_cpu_reserved }},memory={{ kube_memory_reserved|regex_replace('Mi', 'M') }}{% endset %}
  50. {% endif %}
  51. {# DNS settings for kubelet #}
  52. {% if dns_mode in ['kubedns', 'coredns'] %}
  53. {% set kubelet_args_cluster_dns %}--cluster-dns={{ skydns_server }}{% endset %}
  54. {% elif dns_mode == 'coredns_dual' %}
  55. {% set kubelet_args_cluster_dns %}--cluster-dns={{ skydns_server }},{{ skydns_server_secondary }}{% endset %}
  56. {% elif dns_mode == 'dnsmasq_kubedns' %}
  57. {% set kubelet_args_cluster_dns %}--cluster-dns={{ dnsmasq_dns_server }}{% endset %}
  58. {% elif dns_mode == 'manual' %}
  59. {% set kubelet_args_cluster_dns %}--cluster-dns={{ manual_dns_server }}{% endset %}
  60. {% else %}
  61. {% set kubelet_args_cluster_dns %}{% endset %}
  62. {% endif %}
  63. {% set kubelet_args_dns %}{{ kubelet_args_cluster_dns }} --cluster-domain={{ dns_domain }} --resolv-conf={{ kube_resolv_conf }}{% endset %}
  64. {# Kubelet node labels #}
  65. {% set role_node_labels = [] %}
  66. {% if inventory_hostname in groups['kube-master'] %}
  67. {% set dummy = role_node_labels.append('node-role.kubernetes.io/master=true') %}
  68. {% if not standalone_kubelet|bool %}
  69. {% set dummy = role_node_labels.append('node-role.kubernetes.io/node=true') %}
  70. {% endif %}
  71. {% else %}
  72. {% set dummy = role_node_labels.append('node-role.kubernetes.io/node=true') %}
  73. {% endif %}
  74. {% if inventory_hostname in groups['kube-ingress']|default([]) %}
  75. {% set dummy = role_node_labels.append('node-role.kubernetes.io/ingress=true') %}
  76. {% endif %}
  77. {% set inventory_node_labels = [] %}
  78. {% if node_labels is defined %}
  79. {% for labelname, labelvalue in node_labels.iteritems() %}
  80. {% set dummy = inventory_node_labels.append('%s=%s'|format(labelname, labelvalue)) %}
  81. {% endfor %}
  82. {% endif %}
  83. {% set all_node_labels = role_node_labels + inventory_node_labels %}
  84. KUBELET_ARGS="{{ kubelet_args_base }} {{ kubelet_args_dns }} {{ kube_reserved }} --node-labels={{ all_node_labels | join(',') }} {% if kubelet_custom_flags is string %} {{kubelet_custom_flags}} {% else %}{% for flag in kubelet_custom_flags %} {{flag}} {% endfor %}{% endif %}"
  85. {% if kube_network_plugin is defined and kube_network_plugin in ["calico", "canal", "flannel", "weave", "contiv", "cilium"] %}
  86. KUBELET_NETWORK_PLUGIN="--network-plugin=cni --cni-conf-dir=/etc/cni/net.d --cni-bin-dir=/opt/cni/bin"
  87. {% elif kube_network_plugin is defined and kube_network_plugin == "cloud" %}
  88. KUBELET_NETWORK_PLUGIN="--hairpin-mode=promiscuous-bridge --network-plugin=kubenet"
  89. {% endif %}
  90. # Should this cluster be allowed to run privileged docker containers
  91. KUBE_ALLOW_PRIV="--allow-privileged=true"
  92. {% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere"] %}
  93. KUBELET_CLOUDPROVIDER="--cloud-provider={{ cloud_provider }} --cloud-config={{ kube_config_dir }}/cloud_config"
  94. {% elif cloud_provider is defined and cloud_provider == "aws" %}
  95. KUBELET_CLOUDPROVIDER="--cloud-provider={{ cloud_provider }}"
  96. {% else %}
  97. KUBELET_CLOUDPROVIDER=""
  98. {% endif %}
  99. PATH={{ bin_dir }}:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin