Brad Beam
7 years ago
committed by
GitHub
35 changed files with 450 additions and 105 deletions
Split View
Diff Options
-
25.gitlab-ci.yml
-
5docs/vars.md
-
4roles/kubernetes-apps/ansible/defaults/main.yml
-
31roles/kubernetes-apps/ansible/tasks/main.yml
-
8roles/kubernetes-apps/ansible/tasks/netchecker.yml
-
32roles/kubernetes-apps/ansible/templates/kubedns-autoscaler-clusterrole.yml
-
27roles/kubernetes-apps/ansible/templates/kubedns-autoscaler-clusterrolebinding.yml
-
19roles/kubernetes-apps/ansible/templates/kubedns-autoscaler-sa.yml
-
8roles/kubernetes-apps/ansible/templates/kubedns-autoscaler.yml
-
4roles/kubernetes-apps/ansible/templates/kubedns-deploy.yml
-
7roles/kubernetes-apps/ansible/templates/kubedns-sa.yml
-
43roles/kubernetes-apps/ansible/templates/netchecker-agent-hostnet-ds.j2
-
9roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrole.yml.j2
-
13roles/kubernetes-apps/ansible/templates/netchecker-server-clusterrolebinding.yml.j2
-
3roles/kubernetes-apps/ansible/templates/netchecker-server-deployment.yml.j2
-
7roles/kubernetes-apps/ansible/templates/netchecker-server-sa.yml.j2
-
26roles/kubernetes-apps/helm/tasks/main.yml
-
13roles/kubernetes-apps/helm/templates/tiller-clusterrolebinding.yml
-
7roles/kubernetes-apps/helm/templates/tiller-sa.yml
-
2roles/kubernetes/master/defaults/main.yml
-
22roles/kubernetes/master/tasks/main.yml
-
18roles/kubernetes/master/templates/kube-controller-manager-kubeconfig.yaml.j2
-
18roles/kubernetes/master/templates/kube-scheduler-kubeconfig.yaml.j2
-
3roles/kubernetes/master/templates/manifests/kube-apiserver.manifest.j2
-
35roles/kubernetes/master/templates/manifests/kube-controller-manager.manifest.j2
-
28roles/kubernetes/master/templates/manifests/kube-scheduler.manifest.j2
-
2roles/kubernetes/node/tasks/install.yml
-
7roles/kubernetes/node/tasks/main.yml
-
18roles/kubernetes/node/templates/kube-proxy-kubeconfig.yaml.j2
-
27roles/kubernetes/node/templates/manifests/kube-proxy.manifest.j2
-
2roles/kubernetes/preinstall/tasks/set_facts.yml
-
41roles/kubernetes/secrets/files/make-ssl.sh
-
23roles/kubernetes/secrets/tasks/gen_certs_script.yml
-
6roles/kubespray-defaults/defaults/main.yaml
-
12roles/reset/tasks/main.yml
@ -0,0 +1,32 @@ |
|||
# Copyright 2016 The Kubernetes Authors. All rights reserved |
|||
# |
|||
# Licensed under the Apache License, Version 2.0 (the "License"); |
|||
# you may not use this file except in compliance with the License. |
|||
# You may obtain a copy of the License at |
|||
# |
|||
# http://www.apache.org/licenses/LICENSE-2.0 |
|||
# |
|||
# Unless required by applicable law or agreed to in writing, software |
|||
# distributed under the License is distributed on an "AS IS" BASIS, |
|||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|||
# See the License for the specific language governing permissions and |
|||
# limitations under the License. |
|||
|
|||
kind: ClusterRole |
|||
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|||
metadata: |
|||
name: cluster-proportional-autoscaler |
|||
namespace: {{ system_namespace }} |
|||
rules: |
|||
- apiGroups: [""] |
|||
resources: ["nodes"] |
|||
verbs: ["list"] |
|||
- apiGroups: [""] |
|||
resources: ["replicationcontrollers/scale"] |
|||
verbs: ["get", "update"] |
|||
- apiGroups: ["extensions"] |
|||
resources: ["deployments/scale", "replicasets/scale"] |
|||
verbs: ["get", "update"] |
|||
- apiGroups: [""] |
|||
resources: ["configmaps"] |
|||
verbs: ["get", "create"] |
@ -0,0 +1,27 @@ |
|||
# Copyright 2016 The Kubernetes Authors. All rights reserved |
|||
# |
|||
# Licensed under the Apache License, Version 2.0 (the "License"); |
|||
# you may not use this file except in compliance with the License. |
|||
# You may obtain a copy of the License at |
|||
# |
|||
# http://www.apache.org/licenses/LICENSE-2.0 |
|||
# |
|||
# Unless required by applicable law or agreed to in writing, software |
|||
# distributed under the License is distributed on an "AS IS" BASIS, |
|||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|||
# See the License for the specific language governing permissions and |
|||
# limitations under the License. |
|||
|
|||
kind: ClusterRoleBinding |
|||
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|||
metadata: |
|||
name: cluster-proportional-autoscaler |
|||
namespace: {{ system_namespace }} |
|||
subjects: |
|||
- kind: ServiceAccount |
|||
name: cluster-proportional-autoscaler |
|||
namespace: {{ system_namespace }} |
|||
roleRef: |
|||
kind: ClusterRole |
|||
name: cluster-proportional-autoscaler |
|||
apiGroup: rbac.authorization.k8s.io |
@ -0,0 +1,19 @@ |
|||
# Copyright 2016 The Kubernetes Authors. All rights reserved |
|||
# |
|||
# Licensed under the Apache License, Version 2.0 (the "License"); |
|||
# you may not use this file except in compliance with the License. |
|||
# You may obtain a copy of the License at |
|||
# |
|||
# http://www.apache.org/licenses/LICENSE-2.0 |
|||
# |
|||
# Unless required by applicable law or agreed to in writing, software |
|||
# distributed under the License is distributed on an "AS IS" BASIS, |
|||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
|||
# See the License for the specific language governing permissions and |
|||
# limitations under the License. |
|||
|
|||
kind: ServiceAccount |
|||
apiVersion: v1 |
|||
metadata: |
|||
name: cluster-proportional-autoscaler |
|||
namespace: {{ system_namespace }} |
@ -0,0 +1,7 @@ |
|||
apiVersion: v1 |
|||
kind: ServiceAccount |
|||
metadata: |
|||
name: kube-dns |
|||
namespace: {{ system_namespace }} |
|||
labels: |
|||
kubernetes.io/cluster-service: "true" |
@ -1,43 +0,0 @@ |
|||
apiVersion: extensions/v1beta1 |
|||
kind: DaemonSet |
|||
metadata: |
|||
labels: |
|||
app: netchecker-agent-hostnet |
|||
name: netchecker-agent-hostnet |
|||
namespace: {{ netcheck_namespace }} |
|||
spec: |
|||
template: |
|||
metadata: |
|||
name: netchecker-agent-hostnet |
|||
labels: |
|||
app: netchecker-agent-hostnet |
|||
spec: |
|||
hostNetwork: True |
|||
{% if kube_version | version_compare('v1.6', '>=') %} |
|||
dnsPolicy: ClusterFirstWithHostNet |
|||
{% endif %} |
|||
containers: |
|||
- name: netchecker-agent |
|||
image: "{{ agent_img }}" |
|||
env: |
|||
- name: MY_POD_NAME |
|||
valueFrom: |
|||
fieldRef: |
|||
fieldPath: metadata.name |
|||
- name: MY_NODE_NAME |
|||
valueFrom: |
|||
fieldRef: |
|||
fieldPath: spec.nodeName |
|||
args: |
|||
- "-v=5" |
|||
- "-alsologtostderr=true" |
|||
- "-serverendpoint=netchecker-service:8081" |
|||
- "-reportinterval={{ agent_report_interval }}" |
|||
imagePullPolicy: {{ k8s_image_pull_policy }} |
|||
resources: |
|||
limits: |
|||
cpu: {{ netchecker_agent_cpu_limit }} |
|||
memory: {{ netchecker_agent_memory_limit }} |
|||
requests: |
|||
cpu: {{ netchecker_agent_cpu_requests }} |
|||
memory: {{ netchecker_agent_memory_requests }} |
@ -0,0 +1,9 @@ |
|||
kind: ClusterRole |
|||
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|||
metadata: |
|||
name: netchecker-server |
|||
namespace: {{ netcheck_namespace }} |
|||
rules: |
|||
- apiGroups: [""] |
|||
resources: ["pods"] |
|||
verbs: ["list"] |
@ -0,0 +1,13 @@ |
|||
kind: ClusterRoleBinding |
|||
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|||
metadata: |
|||
name: netchecker-server |
|||
namespace: {{ netcheck_namespace }} |
|||
subjects: |
|||
- kind: ServiceAccount |
|||
name: netchecker-server |
|||
namespace: {{ netcheck_namespace }} |
|||
roleRef: |
|||
kind: ClusterRole |
|||
name: netchecker-server |
|||
apiGroup: rbac.authorization.k8s.io |
@ -0,0 +1,7 @@ |
|||
apiVersion: v1 |
|||
kind: ServiceAccount |
|||
metadata: |
|||
name: netchecker-server |
|||
namespace: {{ netcheck_namespace }} |
|||
labels: |
|||
kubernetes.io/cluster-service: "true" |
@ -0,0 +1,13 @@ |
|||
kind: ClusterRoleBinding |
|||
apiVersion: rbac.authorization.k8s.io/v1beta1 |
|||
metadata: |
|||
name: tiller |
|||
namespace: {{ system_namespace }} |
|||
subjects: |
|||
- kind: ServiceAccount |
|||
name: tiller |
|||
namespace: {{ system_namespace }} |
|||
roleRef: |
|||
kind: ClusterRole |
|||
name: cluster-admin |
|||
apiGroup: rbac.authorization.k8s.io |
@ -0,0 +1,7 @@ |
|||
apiVersion: v1 |
|||
kind: ServiceAccount |
|||
metadata: |
|||
name: tiller |
|||
namespace: {{ system_namespace }} |
|||
labels: |
|||
kubernetes.io/cluster-service: "true" |
@ -0,0 +1,18 @@ |
|||
apiVersion: v1 |
|||
kind: Config |
|||
clusters: |
|||
- name: local |
|||
cluster: |
|||
certificate-authority: {{ kube_cert_dir }}/ca.pem |
|||
server: {{ kube_apiserver_endpoint }} |
|||
users: |
|||
- name: kube-controller-manager |
|||
user: |
|||
client-certificate: {{ kube_cert_dir }}/kube-controller-manager.pem |
|||
client-key: {{ kube_cert_dir }}/kube-controller-manager-key.pem |
|||
contexts: |
|||
- context: |
|||
cluster: local |
|||
user: kube-controller-manager |
|||
name: kube-controller-manager-{{ cluster_name }} |
|||
current-context: kube-controller-manager-{{ cluster_name }} |
@ -0,0 +1,18 @@ |
|||
apiVersion: v1 |
|||
kind: Config |
|||
clusters: |
|||
- name: local |
|||
cluster: |
|||
certificate-authority: {{ kube_cert_dir }}/ca.pem |
|||
server: {{ kube_apiserver_endpoint }} |
|||
users: |
|||
- name: kube-scheduler |
|||
user: |
|||
client-certificate: {{ kube_cert_dir }}/kube-scheduler.pem |
|||
client-key: {{ kube_cert_dir }}/kube-scheduler-key.pem |
|||
contexts: |
|||
- context: |
|||
cluster: local |
|||
user: kube-scheduler |
|||
name: kube-scheduler-{{ cluster_name }} |
|||
current-context: kube-scheduler-{{ cluster_name }} |
@ -0,0 +1,18 @@ |
|||
apiVersion: v1 |
|||
kind: Config |
|||
clusters: |
|||
- name: local |
|||
cluster: |
|||
certificate-authority: {{ kube_cert_dir }}/ca.pem |
|||
server: {{ kube_apiserver_endpoint }} |
|||
users: |
|||
- name: kube-proxy |
|||
user: |
|||
client-certificate: {{ kube_cert_dir }}/kube-proxy-{{ inventory_hostname }}.pem |
|||
client-key: {{ kube_cert_dir }}/kube-proxy-{{ inventory_hostname }}-key.pem |
|||
contexts: |
|||
- context: |
|||
cluster: local |
|||
user: kube-proxy |
|||
name: kube-proxy-{{ cluster_name }} |
|||
current-context: kube-proxy-{{ cluster_name }} |
Write
Preview
Loading…
Cancel
Save