Skip to content

Instantly share code, notes, and snippets.

@abhi
Created January 31, 2018 16:06
Show Gist options
  • Save abhi/f3ecfdffb7effcb0fcc3950c78b16a48 to your computer and use it in GitHub Desktop.
Save abhi/f3ecfdffb7effcb0fcc3950c78b16a48 to your computer and use it in GitHub Desktop.
# Calico Version v2.6.2
# https://docs.projectcalico.org/v2.6/releases#v2.6.2
# This manifest includes the following component versions:
# calico/node:v2.6.2
# calico/cni:v1.11.0
# calico/kube-controllers:v1.0.0
# This ConfigMap is used to configure a self-hosted Calico installation.
kind: ConfigMap
apiVersion: v1
metadata:
name: calico-config
namespace: kube-system
data:
# Configure this with the location of your etcd cluster.
etcd_endpoints: "https://proxy.local:12378"
# Configure the Calico backend to use.
calico_backend: "none"
# Configure the Calico IP address pool.
calico_pool: "172.16.11.0/24"
# The CNI network configuration to install on each node.
cni_network_config: |-
{
"cniVersion": "0.3.1",
"name": "k8s-pod-network",
"plugins": [
{
"type": "calico",
"etcd_endpoints": "https://proxy.local:12378",
"etcd_key_file": "/var/lib/docker/ucp/ucp-node-certs/key.pem",
"etcd_cert_file": "/var/lib/docker/ucp/ucp-node-certs/cert.pem",
"etcd_ca_cert_file": "/var/lib/docker/ucp/ucp-node-certs/ca.pem",
"log_level": "info",
"mtu": 1500,
"ipam": {
"type": "azure-vnet-ipam",
" "subnet": "172.16.11.0/24"
},
"kubernetes": {
"kubeconfig": "/var/lib/docker/ucp/ucp-node-certs/kubeconfig"
},
"policy": {
"type": "k8s"
}
},
{
"type": "portmap",
"snat": true,
"capabilities": {"portMappings": true}
}
]
}
# If you're using TLS enabled etcd uncomment the following.
# You must also populate the Secret below with these files.
etcd_ca: "/calico-secrets/etcd-ca"
etcd_cert: "/calico-secrets/etcd-cert"
etcd_key: "/calico-secrets/etcd-key"
---
# The following contains k8s Secrets for use with a TLS enabled etcd cluster.
# For information on populating Secrets, see http://kubernetes.io/docs/user-guide/secrets/
apiVersion: v1
kind: Secret
type: Opaque
metadata:
name: calico-etcd-secrets
namespace: kube-system
data:
# Populate the following files with etcd TLS configuration if desired, but leave blank if
# not using TLS for etcd.
# This self-hosted install expects three files with the following names. The values
# should be base64 encoded strings of the entire contents of each file.
etcd-key: "LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSU5Fd3IwMnJDS3hJT1QvaFE5S2tocTdlZXVXZGVQVE4vL3A2T2t4VXNObzBvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFL2svMys5YlRUeGlZWGw4NW12WjZvdXRJQnh5UGRwYjlJc0g0d0o5bFJNODJwTDdkRTR2aQo4VkVZNG9yZDdodUx4OGhzSy9ZdEwwMnhHQnNHOEV2d1FRPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo="
etcd-cert: "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"
etcd-ca: "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"
---
# This manifest installs the calico/node container, as well
# as the Calico CNI plugins and network config on
# each master and worker node in a Kubernetes cluster.
kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: calico-node
namespace: kube-system
labels:
k8s-app: calico-node
spec:
updateStrategy:
type: RollingUpdate
selector:
matchLabels:
k8s-app: calico-node
template:
metadata:
labels:
k8s-app: calico-node
annotations:
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
hostNetwork: true
tolerations:
# this taint is set by all kubelets running --cloud-provider=external
# so we should tolerate it to schedule the calico pods
- key: node.cloudprovider.kubernetes.io/uninitialized
value: "true"
effect: NoSchedule
- key: node-role.kubernetes.io/master
effect: NoSchedule
# Allow this pod to be rescheduled while the node is in "critical add-ons only" mode.
# This, along with the annotation above marks this pod as a critical add-on.
- key: CriticalAddonsOnly
operator: Exists
serviceAccountName: cni-plugin
# Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force
# deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods.
terminationGracePeriodSeconds: 0
containers:
# Runs calico/node container on each Kubernetes node. This
# container programs network policy and routes on each
# host.
- name: calico-node
image: docker/ucp-calico-node:3.0.0-dev
env:
# The location of the Calico etcd cluster.
- name: ETCD_ENDPOINTS
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_endpoints
# Choose the backend to use.
- name: CALICO_NETWORKING_BACKEND
valueFrom:
configMapKeyRef:
name: calico-config
key: calico_backend
# Cluster type to identify the deployment type
- name: CLUSTER_TYPE
value: "k8s,acse"
# Disable file logging so kubectl logs works.
- name: CALICO_DISABLE_FILE_LOGGING
value: "true"
- name: CALICO_IPV4POOL_IPIP
value: "off"
# Set Felix endpoint to host default action to ACCEPT.
- name: FELIX_IPINIPENABLED
value: "false"
- name: FELIX_DEFAULTENDPOINTTOHOSTACTION
value: "ACCEPT"
# Configure the IP Pool from which Pod IPs will be chosen.
- name: CALICO_IPV4POOL_CIDR
valueFrom:
configMapKeyRef:
name: calico-config
key: calico_pool
- name: CALICO_IPV4POOL_IPIP
value: "false"
# Disable IPv6 on Kubernetes.
- name: FELIX_IPV6SUPPORT
value: "false"
# Set Felix logging to "info"
- name: FELIX_LOGSEVERITYSCREEN
value: "info"
# Set MTU for tunnel device used if ipip is enabled
- name: FELIX_IPINIPMTU
value: "1440"
# Location of the CA certificate for etcd.
- name: ETCD_CA_CERT_FILE
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_ca
# Location of the client key for etcd.
- name: ETCD_KEY_FILE
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_key # Location of the client certificate for etcd.
- name: ETCD_CERT_FILE
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_cert
- name: NODENAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: IP
valueFrom:
fieldRef:
fieldPath: status.hostIP
- name: FELIX_HEALTHENABLED
value: "true"
securityContext:
privileged: true
resources:
requests:
cpu: 250m
livenessProbe:
httpGet:
path: /liveness
port: 9099
periodSeconds: 10
initialDelaySeconds: 10
failureThreshold: 6
readinessProbe:
httpGet:
path: /readiness
port: 9099
periodSeconds: 10
volumeMounts:
- mountPath: /lib/modules
name: lib-modules
readOnly: true
- mountPath: /var/run/calico
name: var-run-calico
readOnly: false
- mountPath: /calico-secrets
name: etcd-certs
# This container installs the Calico CNI binaries
# and CNI network config file on each node.
- name: install-cni
image: docker/ucp-calico-cni:3.0.0-dev
command: ["/install-cni.sh"]
securityContext:
privileged: true
env:
# Name of the CNI config file to create
- name: CNI_CONF_NAME
value: "10-calico.conflist"
# The location of the Calico etcd cluster.
- name: ETCD_ENDPOINTS
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_endpoints
# The CNI network config to install on each node.
- name: CNI_NETWORK_CONFIG
valueFrom:
configMapKeyRef:
name: calico-config
key: cni_network_config
volumeMounts:
- mountPath: /host/opt/cni/bin
name: cni-bin-dir
- mountPath: /host/etc/cni/net.d
name: cni-net-dir
- mountPath: /calico-secrets
name: etcd-certs
volumes:
# Used by calico/node.
- name: lib-modules
hostPath:
path: /lib/modules
- name: var-run-calico
hostPath:
path: /var/run/calico
# Used to install CNI.
- name: cni-bin-dir
hostPath:
path: /opt/cni/bin
- name: cni-net-dir
hostPath:
path: /etc/cni/net.d
- name: etcd-certs
secret:
secretName: calico-etcd-secrets
---
# This manifest deploys the Calico Kubernetes controllers.
# See https://github.com/projectcalico/kube-controllers
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: calico-kube-controllers
namespace: kube-system
labels:
k8s-app: calico-kube-controllers
spec:
# The controllers can only have a single active instance.
replicas: 1
strategy:
type: Recreate
template:
metadata:
name: calico-kube-controllers
namespace: kube-system
labels:
k8s-app: calico-kube-controllers
annotations:
# Mark this pod as a critical add-on; when enabled, the critical add-on scheduler
# reserves resources for critical add-on pods so that they can be rescheduled after
# a failure. This annotation works in tandem with the toleration below.
scheduler.alpha.kubernetes.io/critical-pod: ''
spec:
# The controllers must run in the host network namespace so that
# it isn't governed by policy that would prevent it from working.
hostNetwork: true
tolerations:
# this taint is set by all kubelets running --cloud-provider=external
# so we should tolerate it to schedule the calico pods
- key: node.cloudprovider.kubernetes.io/uninitialized
value: "true"
effect: NoSchedule
- key: node-role.kubernetes.io/master
effect: NoSchedule
# Allow this pod to be rescheduled while the node is in "critical add-ons only" mode.
# This, along with the annotation above marks this pod as a critical add-on.
- key: CriticalAddonsOnly
operator: Exists
# Controllers are system components so schedule on a manager
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
serviceAccountName: cni-plugin
containers:
- name: calico-kube-controllers
image: docker/ucp-calico-kube-controllers:3.0.0-dev
env:
# The location of the Calico etcd cluster.
- name: ETCD_ENDPOINTS
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_endpoints
# Location of the CA certificate for etcd.
- name: ETCD_CA_CERT_FILE
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_ca
# Location of the client key for etcd.
- name: ETCD_KEY_FILE
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_key
# Location of the client certificate for etcd.
- name: ETCD_CERT_FILE
valueFrom:
configMapKeyRef:
name: calico-config
key: etcd_cert
volumeMounts:
# Mount in the etcd TLS secrets.
- mountPath: /calico-secrets
name: etcd-certs
volumes:
# Mount in the etcd TLS secrets.
- name: etcd-certs
secret:
secretName: calico-etcd-secrets
apiVersion: apiextensions.k8s.io/v1beta1
description: Calico Global Felix Configuration
kind: CustomResourceDefinition
metadata:
name: globalfelixconfigs.crd.projectcalico.org
labels:
addonmanager.kubernetes.io/mode: "EnsureExists"
spec:
scope: Cluster
group: crd.projectcalico.org
version: v1
names:
kind: GlobalFelixConfig
plural: globalfelixconfigs
singular: globalfelixconfig
---
apiVersion: apiextensions.k8s.io/v1beta1
description: Calico Global BGP Configuration
kind: CustomResourceDefinition
metadata:
name: globalbgpconfigs.crd.projectcalico.org
labels:
addonmanager.kubernetes.io/mode: "EnsureExists"
spec:
scope: Cluster
group: crd.projectcalico.org
version: v1
names:
kind: GlobalBGPConfig
plural: globalbgpconfigs
singular: globalbgpconfig
---
apiVersion: apiextensions.k8s.io/v1beta1
description: Calico IP Pools
kind: CustomResourceDefinition
metadata:
name: ippools.crd.projectcalico.org
labels:
addonmanager.kubernetes.io/mode: "EnsureExists"
spec:
scope: Cluster
group: crd.projectcalico.org
version: v1
names:
kind: IPPool
plural: ippools
singular: ippool
---
apiVersion: apiextensions.k8s.io/v1beta1
description: Calico Global Network Policies
kind: CustomResourceDefinition
metadata:
name: globalnetworkpolicies.crd.projectcalico.org
labels:
addonmanager.kubernetes.io/mode: "EnsureExists"
spec:
scope: Cluster
group: crd.projectcalico.org
version: v1
names:
kind: GlobalNetworkPolicy
plural: globalnetworkpolicies
singular: globalnetworkpolicy
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: calico-node
namespace: kube-system
labels:
addonmanager.kubernetes.io/mode: "EnsureExists"
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment