main.yml 2.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. ---
  2. - name: Install flannel
  3. become: yes
  4. package:
  5. name: flannel
  6. state: present
  7. when: not openshift_is_atomic | bool
  8. register: result
  9. until: result is succeeded
  10. - name: Set flannel etcd options
  11. become: yes
  12. lineinfile:
  13. dest: /etc/sysconfig/flanneld
  14. backrefs: yes
  15. regexp: "{{ item.regexp }}"
  16. line: "{{ item.line }}"
  17. with_items:
  18. - { regexp: "^(FLANNEL_ETCD=)", line: '\1{{ etcd_hosts|join(",") }}' }
  19. - { regexp: "^(FLANNEL_ETCD_ENDPOINTS=)", line: '\1{{ etcd_hosts|join(",") }}' }
  20. - { regexp: "^(FLANNEL_ETCD_KEY=)", line: '\1{{ flannel_etcd_key }}' }
  21. - { regexp: "^(FLANNEL_ETCD_PREFIX=)", line: '\1{{ flannel_etcd_key }}' }
  22. - name: Set flannel options
  23. become: yes
  24. lineinfile:
  25. dest: /etc/sysconfig/flanneld
  26. backrefs: yes
  27. regexp: "^#?(FLANNEL_OPTIONS=)"
  28. line: '\1--iface {{ flannel_interface }} --etcd-cafile={{ etcd_peer_ca_file }} --etcd-keyfile={{ etcd_peer_key_file }} --etcd-certfile={{ etcd_peer_cert_file }}'
  29. - name: Enable flanneld
  30. become: yes
  31. systemd:
  32. name: flanneld
  33. state: started
  34. enabled: yes
  35. register: start_result
  36. - name: Remove docker bridge ip
  37. become: yes
  38. shell: ip a del `ip a show docker0 | grep "inet[[:space:]]" | awk '{print $2}'` dev docker0
  39. notify:
  40. - restart docker
  41. - restart node
  42. - name: Enable Pod to Pod communication
  43. command: /sbin/iptables --wait -I FORWARD -d {{ openshift_cluster_network_cidr }} -i {{ flannel_interface }} -j ACCEPT -m comment --comment "Pod to Pod communication"
  44. notify:
  45. - save iptable rules
  46. - name: Allow external network access
  47. command: /sbin/iptables -t nat -A POSTROUTING -o {{ flannel_interface }} -j MASQUERADE -m comment --comment "Allow external network access"
  48. notify:
  49. - save iptable rules
  50. - name: Allow DNS access
  51. command: /sbin/iptables -A OS_FIREWALL_ALLOW -p {{ item }} -m {{ item }} --dport 53 -j ACCEPT -m comment --comment "Allow DNS {{ item }} access"
  52. with_items:
  53. - "tcp"
  54. - "udp"
  55. notify:
  56. - save iptable rules