committed by
GitHub
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
7 changed files with 268 additions and 195 deletions
Split View
Diff Options
-
2README.md
-
2roles/download/defaults/main.yml
-
4roles/network_plugin/cilium/defaults/main.yml
-
42roles/network_plugin/cilium/templates/cilium-config.yml.j2
-
120roles/network_plugin/cilium/templates/cilium-cr.yml.j2
-
12roles/network_plugin/cilium/templates/cilium-crb.yml.j2
-
281roles/network_plugin/cilium/templates/cilium-ds.yml.j2
@ -1,29 +1,49 @@ |
|||
kind: ConfigMap |
|||
--- |
|||
apiVersion: v1 |
|||
kind: ConfigMap |
|||
metadata: |
|||
name: cilium-config |
|||
namespace: kube-system |
|||
data: |
|||
# This etcd-config contains the etcd endpoints of your cluster. If you use |
|||
# TLS please make sure you uncomment the ca-file line and add the respective |
|||
# certificate has a k8s secret, see explanation bellow in the comment labeled |
|||
# "ETCD-CERT" |
|||
# TLS please make sure you follow the tutorial in https://cilium.link/etcd-config |
|||
etcd-config: |- |
|||
--- |
|||
endpoints: |
|||
endpoints: |
|||
{% for ip_addr in etcd_access_addresses.split(',') %} |
|||
- {{ ip_addr }} |
|||
- {{ ip_addr }} |
|||
{% endfor %} |
|||
# |
|||
# In case you want to use TLS in etcd, uncomment the following line |
|||
# and add the certificate as explained in the comment labeled "ETCD-CERT" |
|||
|
|||
# In case you want to use TLS in etcd, uncomment the 'ca-file' line |
|||
# and create a kubernetes secret by following the tutorial in |
|||
# https://cilium.link/etcd-config |
|||
ca-file: "{{ cilium_cert_dir }}/ca_cert.crt" |
|||
# |
|||
|
|||
# In case you want client to server authentication, uncomment the following |
|||
# lines and add the certificate and key in cilium-etcd-secrets bellow |
|||
# lines and create a kubernetes secret by following the tutorial in |
|||
# https://cilium.link/etcd-config |
|||
key-file: "{{ cilium_cert_dir }}/key.pem" |
|||
cert-file: "{{ cilium_cert_dir }}/cert.crt" |
|||
|
|||
# If you want to run cilium in debug mode change this value to true |
|||
debug: "{{ cilium_debug }}" |
|||
disable-ipv4: "{{ cilium_disable_ipv4 }}" |
|||
# If you want to clean cilium state; change this value to true |
|||
clean-cilium-state: "false" |
|||
legacy-host-allows-world: "false" |
|||
|
|||
# If you want cilium monitor to aggregate tracing for packets, set this level |
|||
# to "low", "medium", or "maximum". The higher the level, the less packets |
|||
# that will be seen in monitor output. |
|||
monitor-aggregation-level: "none" |
|||
|
|||
# Regular expression matching compatible Istio sidecar istio-proxy |
|||
# container image names |
|||
sidecar-istio-proxy-image: "cilium/istio_proxy" |
|||
|
|||
# Encapsulation mode for communication between nodes |
|||
# Possible values: |
|||
# - disabled |
|||
# - vxlan (default) |
|||
# - geneve |
|||
tunnel: "vxlan" |
@ -1,64 +1,66 @@ |
|||
--- |
|||
apiVersion: rbac.authorization.k8s.io/v1 |
|||
kind: ClusterRole |
|||
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|||
metadata: |
|||
name: cilium |
|||
rules: |
|||
- apiGroups: |
|||
- "networking.k8s.io" |
|||
resources: |
|||
- networkpolicies |
|||
verbs: |
|||
- get |
|||
- list |
|||
- watch |
|||
- apiGroups: |
|||
- "" |
|||
resources: |
|||
- namespaces |
|||
- services |
|||
- nodes |
|||
- endpoints |
|||
- componentstatuses |
|||
verbs: |
|||
- get |
|||
- list |
|||
- watch |
|||
- apiGroups: |
|||
- "" |
|||
resources: |
|||
- pods |
|||
- nodes |
|||
verbs: |
|||
- get |
|||
- list |
|||
- watch |
|||
- update |
|||
- apiGroups: |
|||
- extensions |
|||
resources: |
|||
- networkpolicies #FIXME remove this when we drop support for k8s NP-beta GH-1202 |
|||
- thirdpartyresources |
|||
- ingresses |
|||
verbs: |
|||
- create |
|||
- get |
|||
- list |
|||
- watch |
|||
- apiGroups: |
|||
- "apiextensions.k8s.io" |
|||
resources: |
|||
- customresourcedefinitions |
|||
verbs: |
|||
- create |
|||
- get |
|||
- list |
|||
- watch |
|||
- update |
|||
- apiGroups: |
|||
- cilium.io |
|||
resources: |
|||
- ciliumnetworkpolicies |
|||
- ciliumendpoints |
|||
verbs: |
|||
- "*" |
|||
- apiGroups: |
|||
- "networking.k8s.io" |
|||
resources: |
|||
- networkpolicies |
|||
verbs: |
|||
- get |
|||
- list |
|||
- watch |
|||
- apiGroups: |
|||
- "" |
|||
resources: |
|||
- namespaces |
|||
- services |
|||
- nodes |
|||
- endpoints |
|||
- componentstatuses |
|||
verbs: |
|||
- get |
|||
- list |
|||
- watch |
|||
- apiGroups: |
|||
- "" |
|||
resources: |
|||
- pods |
|||
- nodes |
|||
verbs: |
|||
- get |
|||
- list |
|||
- watch |
|||
- update |
|||
- apiGroups: |
|||
- extensions |
|||
resources: |
|||
- networkpolicies # FIXME remove this when we drop support for k8s NP-beta GH-1202 |
|||
- thirdpartyresources |
|||
- ingresses |
|||
verbs: |
|||
- create |
|||
- get |
|||
- list |
|||
- watch |
|||
- apiGroups: |
|||
- "apiextensions.k8s.io" |
|||
resources: |
|||
- customresourcedefinitions |
|||
verbs: |
|||
- create |
|||
- get |
|||
- list |
|||
- watch |
|||
- update |
|||
- apiGroups: |
|||
- cilium.io |
|||
resources: |
|||
- ciliumnetworkpolicies |
|||
- ciliumnetworkpolicies/status |
|||
- ciliumendpoints |
|||
- ciliumendpoints/status |
|||
verbs: |
|||
- "*" |
Write
Preview
Loading…
Cancel
Save