main.yml 2.0 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061
  1. ---
  2. - name: Install flannel
  3. become: yes
  4. package: name=flannel state=present
  5. when: not openshift_is_atomic | bool
  6. register: result
  7. until: result is succeeded
  8. - name: Set flannel etcd options
  9. become: yes
  10. lineinfile:
  11. dest: /etc/sysconfig/flanneld
  12. backrefs: yes
  13. regexp: "{{ item.regexp }}"
  14. line: "{{ item.line }}"
  15. with_items:
  16. - { regexp: "^(FLANNEL_ETCD=)", line: '\1{{ etcd_hosts|join(",") }}' }
  17. - { regexp: "^(FLANNEL_ETCD_ENDPOINTS=)", line: '\1{{ etcd_hosts|join(",") }}' }
  18. - { regexp: "^(FLANNEL_ETCD_KEY=)", line: '\1{{ flannel_etcd_key }}' }
  19. - { regexp: "^(FLANNEL_ETCD_PREFIX=)", line: '\1{{ flannel_etcd_key }}' }
  20. - name: Set flannel options
  21. become: yes
  22. lineinfile:
  23. dest: /etc/sysconfig/flanneld
  24. backrefs: yes
  25. regexp: "^#?(FLANNEL_OPTIONS=)"
  26. line: '\1--iface {{ flannel_interface }} --etcd-cafile={{ etcd_peer_ca_file }} --etcd-keyfile={{ etcd_peer_key_file }} --etcd-certfile={{ etcd_peer_cert_file }}'
  27. - name: Enable flanneld
  28. become: yes
  29. systemd:
  30. name: flanneld
  31. state: started
  32. enabled: yes
  33. register: start_result
  34. - name: Remove docker bridge ip
  35. become: yes
  36. shell: ip a del `ip a show docker0 | grep "inet[[:space:]]" | awk '{print $2}'` dev docker0
  37. notify:
  38. - restart docker
  39. - restart node
  40. - name: Enable Pod to Pod communication
  41. command: /sbin/iptables --wait -I FORWARD -d {{ openshift_cluster_network_cidr }} -i {{ flannel_interface }} -j ACCEPT -m comment --comment "Pod to Pod communication"
  42. notify:
  43. - save iptable rules
  44. - name: Allow external network access
  45. command: /sbin/iptables -t nat -A POSTROUTING -o {{ flannel_interface }} -j MASQUERADE -m comment --comment "Allow external network access"
  46. notify:
  47. - save iptable rules
  48. - name: Allow DNS access
  49. command: /sbin/iptables -A OS_FIREWALL_ALLOW -p {{ item }} -m {{ item }} --dport 53 -j ACCEPT -m comment --comment "Allow DNS {{ item }} access"
  50. with_items:
  51. - "tcp"
  52. - "udp"
  53. notify:
  54. - save iptable rules