calico.yml.j2 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400
  1. ---
  2. kind: ClusterRole
  3. apiVersion: v1
  4. metadata:
  5. name: calico-kube-controllers
  6. namespace: kube-system
  7. rules:
  8. - apiGroups:
  9. - ""
  10. - extensions
  11. resources:
  12. - pods
  13. - namespaces
  14. - networkpolicies
  15. - nodes
  16. verbs:
  17. - watch
  18. - list
  19. ---
  20. kind: ClusterRoleBinding
  21. apiVersion: v1
  22. metadata:
  23. name: calico-kube-controllers
  24. roleRef:
  25. apiGroup: rbac.authorization.k8s.io
  26. kind: ClusterRole
  27. name: calico-kube-controllers
  28. subjects:
  29. - kind: ServiceAccount
  30. name: calico-kube-controllers
  31. namespace: kube-system
  32. ---
  33. kind: ClusterRole
  34. apiVersion: v1
  35. metadata:
  36. name: calico-node
  37. namespace: kube-system
  38. rules:
  39. - apiGroups: [""]
  40. resources:
  41. - pods
  42. - nodes
  43. verbs:
  44. - get
  45. ---
  46. apiVersion: v1
  47. kind: ClusterRoleBinding
  48. metadata:
  49. name: calico-node
  50. roleRef:
  51. apiGroup: rbac.authorization.k8s.io
  52. kind: ClusterRole
  53. name: calico-node
  54. subjects:
  55. - kind: ServiceAccount
  56. name: calico-node
  57. namespace: kube-system
  58. ---
  59. # This ConfigMap is used to configure a self-hosted Calico installation.
  60. kind: ConfigMap
  61. apiVersion: v1
  62. metadata:
  63. name: calico-config
  64. namespace: kube-system
  65. data:
  66. # Configure this with the location of your etcd cluster.
  67. etcd_endpoints: "{{ calico_etcd_endpoints }}"
  68. # Configure the Calico backend to use.
  69. calico_backend: "bird"
  70. # The CNI network configuration to install on each node.
  71. cni_network_config: |-
  72. {
  73. "name": "k8s-pod-network",
  74. "cniVersion": "0.1.0",
  75. "type": "calico",
  76. "etcd_endpoints": "__ETCD_ENDPOINTS__",
  77. "etcd_key_file": "__ETCD_KEY_FILE__",
  78. "etcd_cert_file": "__ETCD_CERT_FILE__",
  79. "etcd_ca_cert_file": "__ETCD_CA_CERT_FILE__",
  80. "log_level": "info",
  81. "mtu": 1500,
  82. "ipam": {
  83. "type": "calico-ipam"
  84. },
  85. "policy": {
  86. "type": "k8s",
  87. "k8s_api_root": "https://__KUBERNETES_SERVICE_HOST__:__KUBERNETES_SERVICE_PORT__",
  88. "k8s_auth_token": "__SERVICEACCOUNT_TOKEN__"
  89. },
  90. "kubernetes": {
  91. "kubeconfig": "__KUBECONFIG_FILEPATH__"
  92. }
  93. }
  94. etcd_ca: "/calico-secrets/etcd-ca"
  95. etcd_cert: "/calico-secrets/etcd-cert"
  96. etcd_key: "/calico-secrets/etcd-key"
  97. ---
  98. # This manifest installs the calico/node container, as well
  99. # as the Calico CNI plugins and network config on
  100. # each master and worker node in a Kubernetes cluster.
  101. kind: DaemonSet
  102. apiVersion: extensions/v1beta1
  103. metadata:
  104. name: calico-node
  105. namespace: kube-system
  106. labels:
  107. k8s-app: calico-node
  108. spec:
  109. updateStrategy:
  110. type: RollingUpdate
  111. rollingUpdate:
  112. maxUnavailable: 1
  113. selector:
  114. matchLabels:
  115. k8s-app: calico-node
  116. template:
  117. metadata:
  118. labels:
  119. k8s-app: calico-node
  120. annotations:
  121. scheduler.alpha.kubernetes.io/critical-pod: ''
  122. spec:
  123. nodeSelector:
  124. projectcalico.org/ds-ready: "true"
  125. hostNetwork: true
  126. tolerations:
  127. # Make sure calico/node gets scheduled on all nodes.
  128. - effect: NoSchedule
  129. operator: Exists
  130. # Mark the pod as a critical add-on for rescheduling.
  131. - key: CriticalAddonsOnly
  132. operator: Exists
  133. - effect: NoExecute
  134. operator: Exists
  135. serviceAccountName: calico-node
  136. # Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force
  137. # deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods.
  138. terminationGracePeriodSeconds: 0
  139. containers:
  140. # Runs calico/node container on each Kubernetes node. This
  141. # container programs network policy and routes on each
  142. # host.
  143. - name: calico-node
  144. image: {{ calico_node_image }}
  145. env:
  146. # The location of the Calico etcd cluster.
  147. - name: ETCD_ENDPOINTS
  148. valueFrom:
  149. configMapKeyRef:
  150. name: calico-config
  151. key: etcd_endpoints
  152. # Choose the backend to use.
  153. - name: CALICO_NETWORKING_BACKEND
  154. valueFrom:
  155. configMapKeyRef:
  156. name: calico-config
  157. key: calico_backend
  158. # Cluster type to identify the deployment type
  159. - name: CLUSTER_TYPE
  160. value: "origin,bgp"
  161. # Disable file logging so `kubectl logs` works.
  162. - name: CALICO_DISABLE_FILE_LOGGING
  163. value: "true"
  164. # Set noderef for node controller.
  165. - name: CALICO_K8S_NODE_REF
  166. valueFrom:
  167. fieldRef:
  168. fieldPath: spec.nodeName
  169. # Set Felix endpoint to host default action to ACCEPT.
  170. - name: FELIX_DEFAULTENDPOINTTOHOSTACTION
  171. value: "ACCEPT"
  172. # Configure the IP Pool from which Pod IPs will be chosen.
  173. - name: CALICO_IPV4POOL_CIDR
  174. value: "{{ openshift_cluster_network_cidr }}"
  175. - name: CALICO_IPV4POOL_IPIP
  176. value: "{{ calico_ipv4pool_ipip }}"
  177. # Disable IPv6 on Kubernetes.
  178. - name: FELIX_IPV6SUPPORT
  179. value: "false"
  180. # Set Felix logging to "info"
  181. - name: FELIX_LOGSEVERITYSCREEN
  182. value: "info"
  183. # Set MTU for tunnel device used if ipip is enabled
  184. - name: FELIX_IPINIPMTU
  185. value: "1440"
  186. - name: ETCD_ENDPOINTS
  187. valueFrom:
  188. configMapKeyRef:
  189. name: calico-config
  190. key: etcd_endpoints
  191. # Location of the CA certificate for etcd.
  192. - name: ETCD_CA_CERT_FILE
  193. valueFrom:
  194. configMapKeyRef:
  195. name: calico-config
  196. key: etcd_ca
  197. # Location of the client key for etcd.
  198. - name: ETCD_KEY_FILE
  199. valueFrom:
  200. configMapKeyRef:
  201. name: calico-config
  202. key: etcd_key
  203. # Location of the client certificate for etcd.
  204. - name: ETCD_CERT_FILE
  205. valueFrom:
  206. configMapKeyRef:
  207. name: calico-config
  208. key: etcd_cert
  209. # Auto-detect the BGP IP address.
  210. - name: IP
  211. value: ""
  212. - name: FELIX_HEALTHENABLED
  213. value: "true"
  214. securityContext:
  215. privileged: true
  216. livenessProbe:
  217. httpGet:
  218. path: /liveness
  219. port: 9099
  220. periodSeconds: 10
  221. initialDelaySeconds: 10
  222. failureThreshold: 6
  223. readinessProbe:
  224. httpGet:
  225. path: /readiness
  226. port: 9099
  227. periodSeconds: 10
  228. volumeMounts:
  229. - mountPath: /lib/modules
  230. name: lib-modules
  231. readOnly: true
  232. - mountPath: /var/run/calico
  233. name: var-run-calico
  234. readOnly: false
  235. - mountPath: /calico-secrets
  236. name: etcd-certs
  237. # This container installs the Calico CNI binaries
  238. # and CNI network config file on each node.
  239. - name: install-cni
  240. securityContext:
  241. privileged: true
  242. image: {{ calico_cni_image }}
  243. command: ["/install-cni.sh"]
  244. env:
  245. # The location of the Calico etcd cluster.
  246. - name: ETCD_ENDPOINTS
  247. valueFrom:
  248. configMapKeyRef:
  249. name: calico-config
  250. key: etcd_endpoints
  251. # The CNI network config to install on each node.
  252. - name: CNI_NETWORK_CONFIG
  253. valueFrom:
  254. configMapKeyRef:
  255. name: calico-config
  256. key: cni_network_config
  257. # Location of the CA certificate for etcd.
  258. - name: CNI_CONF_ETCD_CA
  259. valueFrom:
  260. configMapKeyRef:
  261. name: calico-config
  262. key: etcd_ca
  263. # Location of the client key for etcd.
  264. - name: CNI_CONF_ETCD_KEY
  265. valueFrom:
  266. configMapKeyRef:
  267. name: calico-config
  268. key: etcd_key
  269. # Location of the client certificate for etcd.
  270. - name: CNI_CONF_ETCD_CERT
  271. valueFrom:
  272. configMapKeyRef:
  273. name: calico-config
  274. key: etcd_cert
  275. volumeMounts:
  276. - mountPath: /host/opt/cni/bin
  277. name: cni-bin-dir
  278. - mountPath: /host/etc/cni/net.d
  279. name: cni-net-dir
  280. - mountPath: /calico-secrets
  281. name: etcd-certs
  282. volumes:
  283. # Used by calico/node.
  284. - name: lib-modules
  285. hostPath:
  286. path: /lib/modules
  287. - name: var-run-calico
  288. hostPath:
  289. path: /var/run/calico
  290. # Used to install CNI.
  291. - name: cni-bin-dir
  292. hostPath:
  293. path: {{ cni_bin_dir }}
  294. - name: cni-net-dir
  295. hostPath:
  296. path: {{ cni_conf_dir }}
  297. # Mount in the etcd TLS secrets.
  298. - name: etcd-certs
  299. secret:
  300. secretName: calico-etcd-secrets
  301. ---
  302. # This manifest deploys the Calico Kubernetes controllers.
  303. # See https://github.com/projectcalico/kube-controllers
  304. apiVersion: extensions/v1beta1
  305. kind: Deployment
  306. metadata:
  307. name: calico-kube-controllers
  308. namespace: kube-system
  309. labels:
  310. k8s-app: calico-kube-controllers
  311. annotations:
  312. scheduler.alpha.kubernetes.io/critical-pod: ''
  313. spec:
  314. # The controllers can only have a single active instance.
  315. replicas: 1
  316. strategy:
  317. type: Recreate
  318. template:
  319. metadata:
  320. name: calico-kube-controllers
  321. namespace: kube-system
  322. labels:
  323. k8s-app: calico-kube-controllers
  324. spec:
  325. # The controllers must run in the host network namespace so that
  326. # it isn't governed by policy that would prevent it from working.
  327. hostNetwork: true
  328. tolerations:
  329. # Mark the pod as a critical add-on for rescheduling.
  330. - key: CriticalAddonsOnly
  331. operator: Exists
  332. - key: node-role.kubernetes.io/master
  333. effect: NoSchedule
  334. serviceAccountName: calico-kube-controllers
  335. containers:
  336. - name: calico-kube-controllers
  337. securityContext:
  338. privileged: true
  339. image: {{ calico_url_policy_controller }}
  340. env:
  341. # The location of the Calico etcd cluster.
  342. - name: ETCD_ENDPOINTS
  343. valueFrom:
  344. configMapKeyRef:
  345. name: calico-config
  346. key: etcd_endpoints
  347. # Location of the CA certificate for etcd.
  348. - name: ETCD_CA_CERT_FILE
  349. valueFrom:
  350. configMapKeyRef:
  351. name: calico-config
  352. key: etcd_ca
  353. # Location of the client key for etcd.
  354. - name: ETCD_KEY_FILE
  355. valueFrom:
  356. configMapKeyRef:
  357. name: calico-config
  358. key: etcd_key
  359. # Location of the client certificate for etcd.
  360. - name: ETCD_CERT_FILE
  361. valueFrom:
  362. configMapKeyRef:
  363. name: calico-config
  364. key: etcd_cert
  365. # Choose which controllers to run.
  366. - name: ENABLED_CONTROLLERS
  367. value: policy,profile,workloadendpoint,node
  368. volumeMounts:
  369. # Mount in the etcd TLS secrets.
  370. - mountPath: /calico-secrets
  371. name: etcd-certs
  372. volumes:
  373. # Mount in the etcd TLS secrets.
  374. - name: etcd-certs
  375. secret:
  376. secretName: calico-etcd-secrets
  377. ---
  378. apiVersion: v1
  379. kind: ServiceAccount
  380. metadata:
  381. name: calico-kube-controllers
  382. namespace: kube-system
  383. ---
  384. apiVersion: v1
  385. kind: ServiceAccount
  386. metadata:
  387. name: calico-node
  388. namespace: kube-system