calicov3.yml.j2 20 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673
  1. ---
  2. kind: ClusterRole
  3. apiVersion: v1
  4. metadata:
  5. name: calico-kube-controllers
  6. namespace: kube-system
  7. rules:
  8. - apiGroups:
  9. - ""
  10. - extensions
  11. resources:
  12. - pods
  13. - namespaces
  14. - networkpolicies
  15. - nodes
  16. verbs:
  17. - watch
  18. - list
  19. - apiGroups:
  20. - networking.k8s.io
  21. resources:
  22. - networkpolicies
  23. verbs:
  24. - watch
  25. - list
  26. ---
  27. kind: ClusterRoleBinding
  28. apiVersion: v1
  29. metadata:
  30. name: calico-kube-controllers
  31. roleRef:
  32. apiGroup: rbac.authorization.k8s.io
  33. kind: ClusterRole
  34. name: calico-kube-controllers
  35. subjects:
  36. - kind: ServiceAccount
  37. name: calico-kube-controllers
  38. namespace: kube-system
  39. ---
  40. kind: ClusterRole
  41. apiVersion: v1
  42. metadata:
  43. name: calico-node
  44. namespace: kube-system
  45. rules:
  46. - apiGroups: [""]
  47. resources:
  48. - pods
  49. - nodes
  50. verbs:
  51. - get
  52. ---
  53. apiVersion: v1
  54. kind: ClusterRoleBinding
  55. metadata:
  56. name: calico-node
  57. roleRef:
  58. apiGroup: rbac.authorization.k8s.io
  59. kind: ClusterRole
  60. name: calico-node
  61. subjects:
  62. - kind: ServiceAccount
  63. name: calico-node
  64. namespace: kube-system
  65. ---
  66. kind: ClusterRole
  67. apiVersion: v1
  68. metadata:
  69. name: calico-upgrade-job
  70. namespace: kube-system
  71. rules:
  72. - apiGroups:
  73. - extensions
  74. resources:
  75. - daemonsets
  76. verbs:
  77. - get
  78. - list
  79. - watch
  80. ---
  81. apiVersion: v1
  82. kind: ClusterRoleBinding
  83. metadata:
  84. name: calico-upgrade-job
  85. roleRef:
  86. apiGroup: rbac.authorization.k8s.io
  87. kind: ClusterRole
  88. name: calico-upgrade-job
  89. subjects:
  90. - kind: ServiceAccount
  91. name: calico-upgrade-job
  92. namespace: kube-system
  93. ---
  94. # This ConfigMap is used to configure a self-hosted Calico installation.
  95. kind: ConfigMap
  96. apiVersion: v1
  97. metadata:
  98. name: calico-config
  99. namespace: kube-system
  100. data:
  101. # Configure this with the location of your etcd cluster.
  102. etcd_endpoints: "{{ calico_etcd_endpoints }}"
  103. node_image: "{{ calico_node_image }}"
  104. # Configure the Calico backend to use.
  105. calico_backend: "bird"
  106. # The CNI network configuration to install on each node.
  107. cni_network_config: |-
  108. {
  109. "name": "k8s-pod-network",
  110. "cniVersion": "0.3.0",
  111. "plugins": [
  112. {
  113. "type": "calico",
  114. "etcd_endpoints": "__ETCD_ENDPOINTS__",
  115. "etcd_key_file": "__ETCD_KEY_FILE__",
  116. "etcd_cert_file": "__ETCD_CERT_FILE__",
  117. "etcd_ca_cert_file": "__ETCD_CA_CERT_FILE__",
  118. "log_level": "info",
  119. "mtu": 1500,
  120. "ipam": {
  121. "type": "calico-ipam"
  122. },
  123. "policy": {
  124. "type": "k8s"
  125. },
  126. "kubernetes": {
  127. "kubeconfig": "__KUBECONFIG_FILEPATH__"
  128. }
  129. },
  130. {
  131. "type": "portmap",
  132. "snat": true,
  133. "capabilities": {"portMappings": true}
  134. }
  135. ]
  136. }
  137. # If you're using TLS enabled etcd uncomment the following.
  138. # You must also populate the Secret below with these files.
  139. etcd_ca: "/calico-secrets/etcd-ca"
  140. etcd_cert: "/calico-secrets/etcd-cert"
  141. etcd_key: "/calico-secrets/etcd-key"
  142. ---
  143. # This manifest installs the calico/node container, as well
  144. # as the Calico CNI plugins and network config on
  145. # each master and worker node in a Kubernetes cluster.
  146. kind: DaemonSet
  147. apiVersion: extensions/v1beta1
  148. metadata:
  149. name: calico-node
  150. namespace: kube-system
  151. labels:
  152. k8s-app: calico-node
  153. spec:
  154. selector:
  155. matchLabels:
  156. k8s-app: calico-node
  157. updateStrategy:
  158. type: RollingUpdate
  159. rollingUpdate:
  160. maxUnavailable: 1
  161. template:
  162. metadata:
  163. labels:
  164. k8s-app: calico-node
  165. annotations:
  166. scheduler.alpha.kubernetes.io/critical-pod: ''
  167. spec:
  168. nodeSelector:
  169. projectcalico.org/ds-ready: "true"
  170. hostNetwork: true
  171. tolerations:
  172. # Make sure calico/node gets scheduled on all nodes.
  173. - effect: NoSchedule
  174. operator: Exists
  175. # Mark the pod as a critical add-on for rescheduling.
  176. - key: CriticalAddonsOnly
  177. operator: Exists
  178. - effect: NoExecute
  179. operator: Exists
  180. serviceAccountName: calico-node
  181. # Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force
  182. # deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods.
  183. terminationGracePeriodSeconds: 0
  184. initContainers:
  185. - name: migrate
  186. image: {{ calico_upgrade_image }}
  187. command: ['/bin/sh', '-c', '/node-init-container.sh']
  188. env:
  189. # The location of the Calico etcd cluster.
  190. - name: CALICO_ETCD_ENDPOINTS
  191. valueFrom:
  192. configMapKeyRef:
  193. name: calico-config
  194. key: etcd_endpoints
  195. - name: CALICO_ETCD_CA_CERT_FILE
  196. valueFrom:
  197. configMapKeyRef:
  198. name: calico-config
  199. key: etcd_ca
  200. # Location of the client key for etcd.
  201. - name: CALICO_ETCD_KEY_FILE
  202. valueFrom:
  203. configMapKeyRef:
  204. name: calico-config
  205. key: etcd_key
  206. # Location of the client certificate for etcd.
  207. - name: CALICO_ETCD_CERT_FILE
  208. valueFrom:
  209. configMapKeyRef:
  210. name: calico-config
  211. key: etcd_cert
  212. # The location of the Calico etcd cluster.
  213. - name: CALICO_APIV1_ETCD_ENDPOINTS
  214. valueFrom:
  215. configMapKeyRef:
  216. name: calico-config
  217. key: etcd_endpoints
  218. - name: CALICO_APIV1_ETCD_CA_CERT_FILE
  219. valueFrom:
  220. configMapKeyRef:
  221. name: calico-config
  222. key: etcd_ca
  223. # Location of the client key for etcd.
  224. - name: CALICO_APIV1_ETCD_KEY_FILE
  225. valueFrom:
  226. configMapKeyRef:
  227. name: calico-config
  228. key: etcd_key
  229. # Location of the client certificate for etcd.
  230. - name: CALICO_APIV1_ETCD_CERT_FILE
  231. valueFrom:
  232. configMapKeyRef:
  233. name: calico-config
  234. key: etcd_cert
  235. - name: CALICO_APIV1_DATASTORE_TYPE
  236. value: "etcdv2"
  237. volumeMounts:
  238. - mountPath: /calico-secrets
  239. name: etcd-certs
  240. containers:
  241. # Runs calico/node container on each Kubernetes node. This
  242. # container programs network policy and routes on each
  243. # host.
  244. - name: calico-node
  245. image: {{ calico_node_image }}
  246. env:
  247. # The location of the Calico etcd cluster.
  248. - name: ETCD_ENDPOINTS
  249. valueFrom:
  250. configMapKeyRef:
  251. name: calico-config
  252. key: etcd_endpoints
  253. # Choose the backend to use.
  254. - name: CALICO_NETWORKING_BACKEND
  255. valueFrom:
  256. configMapKeyRef:
  257. name: calico-config
  258. key: calico_backend
  259. # Cluster type to identify the deployment type
  260. - name: CLUSTER_TYPE
  261. value: "origin,bgp"
  262. # Disable file logging so 'kubectl logs' works.
  263. - name: CALICO_DISABLE_FILE_LOGGING
  264. value: "true"
  265. # Set noderef for node controller.
  266. - name: CALICO_K8S_NODE_REF
  267. valueFrom:
  268. fieldRef:
  269. fieldPath: spec.nodeName
  270. # Set Felix endpoint to host default action to ACCEPT.
  271. - name: FELIX_DEFAULTENDPOINTTOHOSTACTION
  272. value: "ACCEPT"
  273. # The default IPv4 pool to create on startup if none exists. Pod IPs will be
  274. # chosen from this range. Changing this value after installation will have
  275. # no effect. This should fall within '--cluster-cidr'.
  276. - name: CALICO_IPV4POOL_CIDR
  277. value: "{{ openshift.master.sdn_cluster_network_cidr }}"
  278. - name: CALICO_IPV4POOL_IPIP
  279. value: "{{ calico_ipv4pool_ipip }}"
  280. # Disable IPv6 on Kubernetes.
  281. - name: FELIX_IPV6SUPPORT
  282. value: "false"
  283. # Set Felix logging to "info"
  284. - name: FELIX_LOGSEVERITYSCREEN
  285. value: "info"
  286. # Set MTU for tunnel device used if ipip is enabled
  287. - name: FELIX_IPINIPMTU
  288. value: "1440"
  289. - name: ETCD_ENDPOINTS
  290. valueFrom:
  291. configMapKeyRef:
  292. name: calico-config
  293. key: etcd_endpoints
  294. # Location of the CA certificate for etcd.
  295. - name: ETCD_CA_CERT_FILE
  296. valueFrom:
  297. configMapKeyRef:
  298. name: calico-config
  299. key: etcd_ca
  300. # Location of the client key for etcd.
  301. - name: ETCD_KEY_FILE
  302. valueFrom:
  303. configMapKeyRef:
  304. name: calico-config
  305. key: etcd_key
  306. # Location of the client certificate for etcd.
  307. - name: ETCD_CERT_FILE
  308. valueFrom:
  309. configMapKeyRef:
  310. name: calico-config
  311. key: etcd_cert
  312. # Auto-detect the BGP IP address.
  313. - name: IP
  314. value: "autodetect"
  315. - name: FELIX_HEALTHENABLED
  316. value: "true"
  317. securityContext:
  318. privileged: true
  319. resources:
  320. requests:
  321. cpu: 250m
  322. livenessProbe:
  323. httpGet:
  324. path: /liveness
  325. port: 9099
  326. periodSeconds: 10
  327. initialDelaySeconds: 10
  328. failureThreshold: 6
  329. readinessProbe:
  330. httpGet:
  331. path: /readiness
  332. port: 9099
  333. periodSeconds: 10
  334. volumeMounts:
  335. - mountPath: /lib/modules
  336. name: lib-modules
  337. readOnly: true
  338. - mountPath: /var/run/calico
  339. name: var-run-calico
  340. readOnly: false
  341. - mountPath: /var/lib/calico
  342. name: var-lib-calico
  343. readOnly: false
  344. - mountPath: /calico-secrets
  345. name: etcd-certs
  346. # This container installs the Calico CNI binaries
  347. # and CNI network config file on each node.
  348. - name: install-cni
  349. securityContext:
  350. privileged: true
  351. image: {{ calico_cni_image }}
  352. command: ["/install-cni.sh"]
  353. env:
  354. # Name of the CNI config file to create.
  355. - name: CNI_CONF_NAME
  356. value: "10-calico.conflist"
  357. # The location of the Calico etcd cluster.
  358. - name: ETCD_ENDPOINTS
  359. valueFrom:
  360. configMapKeyRef:
  361. name: calico-config
  362. key: etcd_endpoints
  363. # The CNI network config to install on each node.
  364. - name: CNI_NETWORK_CONFIG
  365. valueFrom:
  366. configMapKeyRef:
  367. name: calico-config
  368. key: cni_network_config
  369. # Location of the CA certificate for etcd.
  370. - name: CNI_CONF_ETCD_CA
  371. valueFrom:
  372. configMapKeyRef:
  373. name: calico-config
  374. key: etcd_ca
  375. # Location of the client key for etcd.
  376. - name: CNI_CONF_ETCD_KEY
  377. valueFrom:
  378. configMapKeyRef:
  379. name: calico-config
  380. key: etcd_key
  381. # Location of the client certificate for etcd.
  382. - name: CNI_CONF_ETCD_CERT
  383. valueFrom:
  384. configMapKeyRef:
  385. name: calico-config
  386. key: etcd_cert
  387. volumeMounts:
  388. - mountPath: /host/opt/cni/bin
  389. name: cni-bin-dir
  390. - mountPath: /host/etc/cni/net.d
  391. name: cni-net-dir
  392. - mountPath: /calico-secrets
  393. name: etcd-certs
  394. volumes:
  395. # Used by calico/node.
  396. - name: lib-modules
  397. hostPath:
  398. path: /lib/modules
  399. - name: var-run-calico
  400. hostPath:
  401. path: /var/run/calico
  402. - name: var-lib-calico
  403. hostPath:
  404. path: /var/lib/calico
  405. # Used to install CNI.
  406. - name: cni-bin-dir
  407. hostPath:
  408. path: {{ cni_bin_dir }}
  409. - name: cni-net-dir
  410. hostPath:
  411. path: {{ cni_conf_dir }}
  412. # Mount in the etcd TLS secrets with mode 400.
  413. # See https://kubernetes.io/docs/concepts/configuration/secret/
  414. - name: etcd-certs
  415. secret:
  416. secretName: calico-etcd-secrets
  417. defaultMode: 0400
  418. ---
  419. # This manifest deploys the Calico Kubernetes controllers.
  420. # See https://github.com/projectcalico/kube-controllers
  421. apiVersion: extensions/v1beta1
  422. kind: Deployment
  423. metadata:
  424. name: calico-kube-controllers
  425. namespace: kube-system
  426. labels:
  427. k8s-app: calico-kube-controllers
  428. annotations:
  429. scheduler.alpha.kubernetes.io/critical-pod: ''
  430. spec:
  431. # The controllers can only have a single active instance.
  432. replicas: 1
  433. strategy:
  434. type: Recreate
  435. template:
  436. metadata:
  437. name: calico-kube-controllers
  438. namespace: kube-system
  439. labels:
  440. k8s-app: calico-kube-controllers
  441. spec:
  442. # The controllers must run in the host network namespace so that
  443. # it isn't governed by policy that would prevent it from working.
  444. hostNetwork: true
  445. tolerations:
  446. # Mark the pod as a critical add-on for rescheduling.
  447. - key: CriticalAddonsOnly
  448. operator: Exists
  449. - key: node-role.kubernetes.io/master
  450. effect: NoSchedule
  451. serviceAccountName: calico-kube-controllers
  452. initContainers:
  453. - name: migrate
  454. image: {{ calico_upgrade_image }}
  455. command: ['/bin/sh', '-c', '/controller-init.sh']
  456. env:
  457. # The location of the Calico etcd cluster.
  458. - name: CALICO_ETCD_ENDPOINTS
  459. valueFrom:
  460. configMapKeyRef:
  461. name: calico-config
  462. key: etcd_endpoints
  463. - name: CALICO_ETCD_CA_CERT_FILE
  464. valueFrom:
  465. configMapKeyRef:
  466. name: calico-config
  467. key: etcd_ca
  468. # Location of the client key for etcd.
  469. - name: CALICO_ETCD_KEY_FILE
  470. valueFrom:
  471. configMapKeyRef:
  472. name: calico-config
  473. key: etcd_key
  474. # Location of the client certificate for etcd.
  475. - name: CALICO_ETCD_CERT_FILE
  476. valueFrom:
  477. configMapKeyRef:
  478. name: calico-config
  479. key: etcd_cert
  480. # The location of the Calico etcd cluster.
  481. - name: CALICO_APIV1_ETCD_ENDPOINTS
  482. valueFrom:
  483. configMapKeyRef:
  484. name: calico-config
  485. key: etcd_endpoints
  486. - name: CALICO_APIV1_ETCD_CA_CERT_FILE
  487. valueFrom:
  488. configMapKeyRef:
  489. name: calico-config
  490. key: etcd_ca
  491. # Location of the client key for etcd.
  492. - name: CALICO_APIV1_ETCD_KEY_FILE
  493. valueFrom:
  494. configMapKeyRef:
  495. name: calico-config
  496. key: etcd_key
  497. # Location of the client certificate for etcd.
  498. - name: CALICO_APIV1_ETCD_CERT_FILE
  499. valueFrom:
  500. configMapKeyRef:
  501. name: calico-config
  502. key: etcd_cert
  503. - name: CALICO_APIV1_DATASTORE_TYPE
  504. value: "etcdv2"
  505. volumeMounts:
  506. - mountPath: /calico-secrets
  507. name: etcd-certs
  508. containers:
  509. - name: calico-kube-controllers
  510. image: {{ calico_url_policy_controller }}
  511. securityContext:
  512. privileged: true
  513. env:
  514. # The location of the Calico etcd cluster.
  515. - name: ETCD_ENDPOINTS
  516. valueFrom:
  517. configMapKeyRef:
  518. name: calico-config
  519. key: etcd_endpoints
  520. # Location of the CA certificate for etcd.
  521. - name: ETCD_CA_CERT_FILE
  522. valueFrom:
  523. configMapKeyRef:
  524. name: calico-config
  525. key: etcd_ca
  526. # Location of the client key for etcd.
  527. - name: ETCD_KEY_FILE
  528. valueFrom:
  529. configMapKeyRef:
  530. name: calico-config
  531. key: etcd_key
  532. # Location of the client certificate for etcd.
  533. - name: ETCD_CERT_FILE
  534. valueFrom:
  535. configMapKeyRef:
  536. name: calico-config
  537. key: etcd_cert
  538. # Choose which controllers to run.
  539. - name: ENABLED_CONTROLLERS
  540. value: policy,profile,workloadendpoint,node
  541. volumeMounts:
  542. # Mount in the etcd TLS secrets.
  543. - mountPath: /calico-secrets
  544. name: etcd-certs
  545. volumes:
  546. # Mount in the etcd TLS secrets with mode 400.
  547. # See https://kubernetes.io/docs/concepts/configuration/secret/
  548. - name: etcd-certs
  549. secret:
  550. secretName: calico-etcd-secrets
  551. defaultMode: 0400
  552. ---
  553. apiVersion: batch/v1
  554. kind: Job
  555. metadata:
  556. name: complete-upgrade
  557. namespace: kube-system
  558. spec:
  559. template:
  560. spec:
  561. hostNetwork: true
  562. serviceAccountName: calico-upgrade-job
  563. restartPolicy: OnFailure
  564. containers:
  565. - name: migrate-completion
  566. image: {{ calico_upgrade_image }}
  567. command: ['/bin/sh', '-c', '/completion-job.sh']
  568. env:
  569. - name: EXPECTED_NODE_IMAGE
  570. valueFrom:
  571. configMapKeyRef:
  572. name: calico-config
  573. key: node_image
  574. # The location of the Calico etcd cluster.
  575. - name: CALICO_ETCD_ENDPOINTS
  576. valueFrom:
  577. configMapKeyRef:
  578. name: calico-config
  579. key: etcd_endpoints
  580. - name: CALICO_ETCD_CA_CERT_FILE
  581. valueFrom:
  582. configMapKeyRef:
  583. name: calico-config
  584. key: etcd_ca
  585. # Location of the client key for etcd.
  586. - name: CALICO_ETCD_KEY_FILE
  587. valueFrom:
  588. configMapKeyRef:
  589. name: calico-config
  590. key: etcd_key
  591. # Location of the client certificate for etcd.
  592. - name: CALICO_ETCD_CERT_FILE
  593. valueFrom:
  594. configMapKeyRef:
  595. name: calico-config
  596. key: etcd_cert
  597. # The location of the Calico etcd cluster.
  598. - name: CALICO_APIV1_ETCD_ENDPOINTS
  599. valueFrom:
  600. configMapKeyRef:
  601. name: calico-config
  602. key: etcd_endpoints
  603. - name: CALICO_APIV1_ETCD_CA_CERT_FILE
  604. valueFrom:
  605. configMapKeyRef:
  606. name: calico-config
  607. key: etcd_ca
  608. # Location of the client key for etcd.
  609. - name: CALICO_APIV1_ETCD_KEY_FILE
  610. valueFrom:
  611. configMapKeyRef:
  612. name: calico-config
  613. key: etcd_key
  614. # Location of the client certificate for etcd.
  615. - name: CALICO_APIV1_ETCD_CERT_FILE
  616. valueFrom:
  617. configMapKeyRef:
  618. name: calico-config
  619. key: etcd_cert
  620. - name: CALICO_APIV1_DATASTORE_TYPE
  621. value: "etcdv2"
  622. volumeMounts:
  623. - mountPath: /calico-secrets
  624. name: etcd-certs
  625. volumes:
  626. # Mount in the etcd TLS secrets with mode 400.
  627. # See https://kubernetes.io/docs/concepts/configuration/secret/
  628. - name: etcd-certs
  629. secret:
  630. secretName: calico-etcd-secrets
  631. defaultMode: 0400
  632. ---
  633. apiVersion: v1
  634. kind: ServiceAccount
  635. metadata:
  636. name: calico-upgrade-job
  637. namespace: kube-system
  638. ---
  639. apiVersion: v1
  640. kind: ServiceAccount
  641. metadata:
  642. name: calico-kube-controllers
  643. namespace: kube-system
  644. ---
  645. apiVersion: v1
  646. kind: ServiceAccount
  647. metadata:
  648. name: calico-node
  649. namespace: kube-system