Last active
December 11, 2018 07:30
-
-
Save groundnuty/70051eb99b04d79fa25b0acdd647653f to your computer and use it in GitHub Desktop.
canal network with subnets changed
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This ConfigMap is used to configure a self-hosted Calico installation. | |
kind: ConfigMap | |
apiVersion: v1 | |
metadata: | |
name: calico-config | |
namespace: kube-system | |
data: | |
# The location of your etcd cluster. This uses the Service clusterIP | |
# defined below. | |
etcd_endpoints: "http://10.96.232.136:6666" | |
# True enables BGP networking, false tells Calico to enforce | |
# policy only, using native networking. | |
enable_bgp: "true" | |
# The CNI network configuration to install on each node. | |
cni_network_config: |- | |
{ | |
"name": "k8s-pod-network", | |
"type": "calico", | |
"etcd_endpoints": "__ETCD_ENDPOINTS__", | |
"log_level": "info", | |
"ipam": { | |
"type": "calico-ipam" | |
}, | |
"policy": { | |
"type": "k8s", | |
"k8s_api_root": "https://__KUBERNETES_SERVICE_HOST__:__KUBERNETES_SERVICE_PORT__", | |
"k8s_auth_token": "__SERVICEACCOUNT_TOKEN__" | |
}, | |
"kubernetes": { | |
"kubeconfig": "/etc/cni/net.d/__KUBECONFIG_FILENAME__" | |
} | |
} | |
# The default IP Pool to be created for the cluster. | |
# Pod IP addresses will be assigned from this pool. | |
ippool.yaml: | | |
apiVersion: v1 | |
kind: ipPool | |
metadata: | |
cidr: 10.32.0.0/16 | |
spec: | |
ipip: | |
enabled: true | |
nat-outgoing: true | |
--- | |
# This manifest installs the Calico etcd on the kubeadm master. This uses a DaemonSet | |
# to force it to run on the master even when the master isn't schedulable, and uses | |
# nodeSelector to ensure it only runs on the master. | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: calico-etcd | |
namespace: kube-system | |
labels: | |
k8s-app: calico-etcd | |
spec: | |
template: | |
metadata: | |
labels: | |
k8s-app: calico-etcd | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: '' | |
scheduler.alpha.kubernetes.io/tolerations: | | |
[{"key": "dedicated", "value": "master", "effect": "NoSchedule" }, | |
{"key":"CriticalAddonsOnly", "operator":"Exists"}] | |
spec: | |
# Only run this pod on the master. | |
nodeSelector: | |
kubeadm.alpha.kubernetes.io/role: master | |
hostNetwork: true | |
containers: | |
- name: calico-etcd | |
image: gcr.io/google_containers/etcd:2.2.1 | |
env: | |
- name: CALICO_ETCD_IP | |
valueFrom: | |
fieldRef: | |
fieldPath: status.podIP | |
command: ["/bin/sh","-c"] | |
args: ["/usr/local/bin/etcd --name=calico --data-dir=/var/etcd/calico-data --advertise-client-urls=http://$CALICO_ETCD_IP:6666 --listen-client-urls=http://0.0.0.0:6666 --listen-peer-urls=http://0.0.0.0:6667"] | |
volumeMounts: | |
- name: var-etcd | |
mountPath: /var/etcd | |
volumes: | |
- name: var-etcd | |
hostPath: | |
path: /var/etcd | |
--- | |
# This manfiest installs the Service which gets traffic to the Calico | |
# etcd. | |
apiVersion: v1 | |
kind: Service | |
metadata: | |
labels: | |
k8s-app: calico-etcd | |
name: calico-etcd | |
namespace: kube-system | |
spec: | |
# Select the calico-etcd pod running on the master. | |
selector: | |
k8s-app: calico-etcd | |
# This ClusterIP needs to be known in advance, since we cannot rely | |
# on DNS to get access to etcd. | |
clusterIP: 10.96.232.136 | |
ports: | |
- port: 6666 | |
--- | |
# This manifest installs the calico/node container, as well | |
# as the Calico CNI plugins and network config on | |
# each master and worker node in a Kubernetes cluster. | |
kind: DaemonSet | |
apiVersion: extensions/v1beta1 | |
metadata: | |
name: calico-node | |
namespace: kube-system | |
labels: | |
k8s-app: calico-node | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: calico-node | |
template: | |
metadata: | |
labels: | |
k8s-app: calico-node | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: '' | |
scheduler.alpha.kubernetes.io/tolerations: | | |
[{"key": "dedicated", "value": "master", "effect": "NoSchedule" }, | |
{"key":"CriticalAddonsOnly", "operator":"Exists"}] | |
spec: | |
hostNetwork: true | |
containers: | |
# Runs calico/node container on each Kubernetes node. This | |
# container programs network policy and routes on each | |
# host. | |
- name: calico-node | |
image: quay.io/calico/node:v1.0.2 | |
env: | |
# The location of the Calico etcd cluster. | |
- name: ETCD_ENDPOINTS | |
valueFrom: | |
configMapKeyRef: | |
name: calico-config | |
key: etcd_endpoints | |
# Enable BGP. Disable to enforce policy only. | |
- name: CALICO_NETWORKING | |
valueFrom: | |
configMapKeyRef: | |
name: calico-config | |
key: enable_bgp | |
# Disable file logging so `kubectl logs` works. | |
- name: CALICO_DISABLE_FILE_LOGGING | |
value: "true" | |
# Set Felix endpoint to host default action to ACCEPT. | |
- name: FELIX_DEFAULTENDPOINTTOHOSTACTION | |
value: "ACCEPT" | |
# Don't configure a default pool. This is done by the Job | |
# below. | |
- name: NO_DEFAULT_POOLS | |
value: "true" | |
# Auto-detect the BGP IP address. | |
- name: IP | |
value: "" | |
securityContext: | |
privileged: true | |
volumeMounts: | |
- mountPath: /lib/modules | |
name: lib-modules | |
readOnly: true | |
- mountPath: /var/run/calico | |
name: var-run-calico | |
readOnly: false | |
# This container installs the Calico CNI binaries | |
# and CNI network config file on each node. | |
- name: install-cni | |
image: calico/cni:v1.5.6 | |
command: ["/install-cni.sh"] | |
env: | |
# The location of the Calico etcd cluster. | |
- name: ETCD_ENDPOINTS | |
valueFrom: | |
configMapKeyRef: | |
name: calico-config | |
key: etcd_endpoints | |
# The CNI network config to install on each node. | |
- name: CNI_NETWORK_CONFIG | |
valueFrom: | |
configMapKeyRef: | |
name: calico-config | |
key: cni_network_config | |
volumeMounts: | |
- mountPath: /host/opt/cni/bin | |
name: cni-bin-dir | |
- mountPath: /host/etc/cni/net.d | |
name: cni-net-dir | |
volumes: | |
# Used by calico/node. | |
- name: lib-modules | |
hostPath: | |
path: /lib/modules | |
- name: var-run-calico | |
hostPath: | |
path: /var/run/calico | |
# Used to install CNI. | |
- name: cni-bin-dir | |
hostPath: | |
path: /opt/cni/bin | |
- name: cni-net-dir | |
hostPath: | |
path: /etc/cni/net.d | |
--- | |
# This manifest deploys the Calico policy controller on Kubernetes. | |
# See https://github.com/projectcalico/k8s-policy | |
apiVersion: extensions/v1beta1 | |
kind: Deployment | |
metadata: | |
name: calico-policy-controller | |
namespace: kube-system | |
labels: | |
k8s-app: calico-policy | |
spec: | |
# The policy controller can only have a single active instance. | |
replicas: 1 | |
strategy: | |
type: Recreate | |
template: | |
metadata: | |
name: calico-policy-controller | |
namespace: kube-system | |
labels: | |
k8s-app: calico-policy-controller | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: '' | |
scheduler.alpha.kubernetes.io/tolerations: | | |
[{"key": "dedicated", "value": "master", "effect": "NoSchedule" }, | |
{"key":"CriticalAddonsOnly", "operator":"Exists"}] | |
spec: | |
# The policy controller must run in the host network namespace so that | |
# it isn't governed by policy that would prevent it from working. | |
hostNetwork: true | |
containers: | |
- name: calico-policy-controller | |
image: calico/kube-policy-controller:v0.5.2 | |
env: | |
# The location of the Calico etcd cluster. | |
- name: ETCD_ENDPOINTS | |
valueFrom: | |
configMapKeyRef: | |
name: calico-config | |
key: etcd_endpoints | |
# The location of the Kubernetes API. Use the default Kubernetes | |
# service for API access. | |
- name: K8S_API | |
value: "https://kubernetes.default:443" | |
# Since we're running in the host namespace and might not have KubeDNS | |
# access, configure the container's /etc/hosts to resolve | |
# kubernetes.default to the correct service clusterIP. | |
- name: CONFIGURE_ETC_HOSTS | |
value: "true" | |
--- | |
## This manifest deploys a Job which performs one time | |
# configuration of Calico | |
apiVersion: batch/v1 | |
kind: Job | |
metadata: | |
name: configure-calico | |
namespace: kube-system | |
labels: | |
k8s-app: calico | |
spec: | |
template: | |
metadata: | |
name: configure-calico | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: '' | |
scheduler.alpha.kubernetes.io/tolerations: | | |
[{"key": "dedicated", "value": "master", "effect": "NoSchedule" }, | |
{"key":"CriticalAddonsOnly", "operator":"Exists"}] | |
spec: | |
hostNetwork: true | |
restartPolicy: OnFailure | |
containers: | |
# Writes basic configuration to datastore. | |
- name: configure-calico | |
image: calico/ctl:v1.0.2 | |
args: | |
- apply | |
- -f | |
- /etc/config/calico/ippool.yaml | |
volumeMounts: | |
- name: config-volume | |
mountPath: /etc/config | |
env: | |
# The location of the etcd cluster. | |
- name: ETCD_ENDPOINTS | |
valueFrom: | |
configMapKeyRef: | |
name: calico-config | |
key: etcd_endpoints | |
volumes: | |
- name: config-volume | |
configMap: | |
name: calico-config | |
items: | |
- key: ippool.yaml | |
path: calico/ippool.yaml |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# This ConfigMap can be used to configure a self-hosted Canal installation. | |
kind: ConfigMap | |
apiVersion: v1 | |
metadata: | |
name: canal-config | |
namespace: kube-system | |
data: | |
# The interface used by canal for host <-> host communication. | |
# If left blank, then the interface is chosen using the node's | |
# default route. | |
canal_iface: "" | |
# Whether or not to masquerade traffic to destinations not within | |
# the pod network. | |
masquerade: "true" | |
# The CNI network configuration to install on each node. | |
cni_network_config: |- | |
{ | |
"name": "k8s-pod-network", | |
"cniVersion": "0.3.0", | |
"plugins": [ | |
{ | |
"type": "calico", | |
"log_level": "info", | |
"datastore_type": "kubernetes", | |
"nodename": "__KUBERNETES_NODE_NAME__", | |
"ipam": { | |
"type": "host-local", | |
"subnet": "usePodCidr" | |
}, | |
"policy": { | |
"type": "k8s", | |
"k8s_auth_token": "__SERVICEACCOUNT_TOKEN__" | |
}, | |
"kubernetes": { | |
"k8s_api_root": "https://__KUBERNETES_SERVICE_HOST__:__KUBERNETES_SERVICE_PORT__", | |
"kubeconfig": "__KUBECONFIG_FILEPATH__" | |
} | |
}, | |
{ | |
"type": "portmap", | |
"capabilities": {"portMappings": true}, | |
"snat": true | |
} | |
] | |
} | |
# Flannel network configuration. Mounted into the flannel container. | |
net-conf.json: | | |
{ | |
"Network": "10.32.0.0/17", | |
"Backend": { | |
"Type": "host-gw" | |
} | |
} | |
--- | |
# This manifest installs the calico/node container, as well | |
# as the Calico CNI plugins and network config on | |
# each master and worker node in a Kubernetes cluster. | |
kind: DaemonSet | |
apiVersion: extensions/v1beta1 | |
metadata: | |
name: canal | |
namespace: kube-system | |
labels: | |
k8s-app: canal | |
spec: | |
selector: | |
matchLabels: | |
k8s-app: canal | |
template: | |
metadata: | |
labels: | |
k8s-app: canal | |
annotations: | |
scheduler.alpha.kubernetes.io/critical-pod: '' | |
spec: | |
hostNetwork: true | |
serviceAccountName: canal | |
tolerations: | |
# this taint is set by all kubelets running `--cloud-provider=external` | |
# so we should tolerate it to schedule the canal pods | |
- key: node.cloudprovider.kubernetes.io/uninitialized | |
value: "true" | |
effect: NoSchedule | |
# Allow the pod to run on the master. This is required for | |
# the master to communicate with pods. | |
- key: node-role.kubernetes.io/master | |
effect: NoSchedule | |
# Mark the pod as a critical add-on for rescheduling. | |
- key: "CriticalAddonsOnly" | |
operator: "Exists" | |
# Minimize downtime during a rolling upgrade or deletion; tell Kubernetes to do a "force | |
# deletion": https://kubernetes.io/docs/concepts/workloads/pods/pod/#termination-of-pods. | |
terminationGracePeriodSeconds: 0 | |
containers: | |
# Runs calico/node container on each Kubernetes node. This | |
# container programs network policy and routes on each | |
# host. | |
- name: calico-node | |
image: quay.io/calico/node:v2.6.2 | |
env: | |
# Use Kubernetes API as the backing datastore. | |
- name: DATASTORE_TYPE | |
value: "kubernetes" | |
# Enable felix logging. | |
- name: FELIX_LOGSEVERITYSYS | |
value: "info" | |
# Don't enable BGP. | |
- name: CALICO_NETWORKING_BACKEND | |
value: "none" | |
# Cluster type to identify the deployment type | |
- name: CLUSTER_TYPE | |
value: "k8s,canal" | |
# Disable file logging so `kubectl logs` works. | |
- name: CALICO_DISABLE_FILE_LOGGING | |
value: "true" | |
# Period, in seconds, at which felix re-applies all iptables state | |
- name: FELIX_IPTABLESREFRESHINTERVAL | |
value: "60" | |
# Disable IPV6 support in Felix. | |
- name: FELIX_IPV6SUPPORT | |
value: "false" | |
# Wait for the datastore. | |
- name: WAIT_FOR_DATASTORE | |
value: "true" | |
# No IP address needed. | |
- name: IP | |
value: "" | |
- name: NODENAME | |
valueFrom: | |
fieldRef: | |
fieldPath: spec.nodeName | |
# Set Felix endpoint to host default action to ACCEPT. | |
- name: FELIX_DEFAULTENDPOINTTOHOSTACTION | |
value: "ACCEPT" | |
- name: FELIX_HEALTHENABLED | |
value: "true" | |
securityContext: | |
privileged: true | |
resources: | |
requests: | |
cpu: 250m | |
livenessProbe: | |
httpGet: | |
path: /liveness | |
port: 9099 | |
periodSeconds: 10 | |
initialDelaySeconds: 10 | |
failureThreshold: 6 | |
readinessProbe: | |
httpGet: | |
path: /readiness | |
port: 9099 | |
periodSeconds: 10 | |
volumeMounts: | |
- mountPath: /lib/modules | |
name: lib-modules | |
readOnly: true | |
- mountPath: /var/run/calico | |
name: var-run-calico | |
readOnly: false | |
# This container installs the Calico CNI binaries | |
# and CNI network config file on each node. | |
- name: install-cni | |
image: quay.io/calico/cni:v1.11.0 | |
command: ["/install-cni.sh"] | |
env: | |
- name: CNI_CONF_NAME | |
value: "10-calico.conflist" | |
# The CNI network config to install on each node. | |
- name: CNI_NETWORK_CONFIG | |
valueFrom: | |
configMapKeyRef: | |
name: canal-config | |
key: cni_network_config | |
- name: KUBERNETES_NODE_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: spec.nodeName | |
volumeMounts: | |
- mountPath: /host/opt/cni/bin | |
name: cni-bin-dir | |
- mountPath: /host/etc/cni/net.d | |
name: cni-net-dir | |
# This container runs flannel using the kube-subnet-mgr backend | |
# for allocating subnets. | |
- name: kube-flannel | |
image: quay.io/coreos/flannel:v0.9.1 | |
command: [ "/opt/bin/flanneld", "--ip-masq", "--kube-subnet-mgr" ] | |
securityContext: | |
privileged: true | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.namespace | |
- name: FLANNELD_IFACE | |
valueFrom: | |
configMapKeyRef: | |
name: canal-config | |
key: canal_iface | |
- name: FLANNELD_IP_MASQ | |
valueFrom: | |
configMapKeyRef: | |
name: canal-config | |
key: masquerade | |
volumeMounts: | |
- name: run | |
mountPath: /run | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
volumes: | |
# Used by calico/node. | |
- name: lib-modules | |
hostPath: | |
path: /lib/modules | |
- name: var-run-calico | |
hostPath: | |
path: /var/run/calico | |
# Used to install CNI. | |
- name: cni-bin-dir | |
hostPath: | |
path: /opt/cni/bin | |
- name: cni-net-dir | |
hostPath: | |
path: /etc/cni/net.d | |
# Used by flannel. | |
- name: run | |
hostPath: | |
path: /run | |
- name: flannel-cfg | |
configMap: | |
name: canal-config | |
# Create all the CustomResourceDefinitions needed for | |
# Calico policy-only mode. | |
--- | |
apiVersion: apiextensions.k8s.io/v1beta1 | |
description: Calico Global Felix Configuration | |
kind: CustomResourceDefinition | |
metadata: | |
name: globalfelixconfigs.crd.projectcalico.org | |
spec: | |
scope: Cluster | |
group: crd.projectcalico.org | |
version: v1 | |
names: | |
kind: GlobalFelixConfig | |
plural: globalfelixconfigs | |
singular: globalfelixconfig | |
--- | |
apiVersion: apiextensions.k8s.io/v1beta1 | |
description: Calico Global BGP Configuration | |
kind: CustomResourceDefinition | |
metadata: | |
name: globalbgpconfigs.crd.projectcalico.org | |
spec: | |
scope: Cluster | |
group: crd.projectcalico.org | |
version: v1 | |
names: | |
kind: GlobalBGPConfig | |
plural: globalbgpconfigs | |
singular: globalbgpconfig | |
--- | |
apiVersion: apiextensions.k8s.io/v1beta1 | |
description: Calico IP Pools | |
kind: CustomResourceDefinition | |
metadata: | |
name: ippools.crd.projectcalico.org | |
spec: | |
scope: Cluster | |
group: crd.projectcalico.org | |
version: v1 | |
names: | |
kind: IPPool | |
plural: ippools | |
singular: ippool | |
--- | |
apiVersion: apiextensions.k8s.io/v1beta1 | |
description: Calico Global Network Policies | |
kind: CustomResourceDefinition | |
metadata: | |
name: globalnetworkpolicies.crd.projectcalico.org | |
spec: | |
scope: Cluster | |
group: crd.projectcalico.org | |
version: v1 | |
names: | |
kind: GlobalNetworkPolicy | |
plural: globalnetworkpolicies | |
singular: globalnetworkpolicy | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: canal | |
namespace: kube-system |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
kind: ClusterRole | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
metadata: | |
name: flannel | |
rules: | |
- apiGroups: | |
- "" | |
resources: | |
- pods | |
verbs: | |
- get | |
- apiGroups: | |
- "" | |
resources: | |
- nodes | |
verbs: | |
- list | |
- watch | |
- apiGroups: | |
- "" | |
resources: | |
- nodes/status | |
verbs: | |
- patch | |
--- | |
kind: ClusterRoleBinding | |
apiVersion: rbac.authorization.k8s.io/v1beta1 | |
metadata: | |
name: flannel | |
roleRef: | |
apiGroup: rbac.authorization.k8s.io | |
kind: ClusterRole | |
name: flannel | |
subjects: | |
- kind: ServiceAccount | |
name: flannel | |
namespace: kube-system | |
--- | |
apiVersion: v1 | |
kind: ServiceAccount | |
metadata: | |
name: flannel | |
namespace: kube-system | |
--- | |
kind: ConfigMap | |
apiVersion: v1 | |
metadata: | |
name: kube-flannel-cfg | |
namespace: kube-system | |
labels: | |
tier: node | |
app: flannel | |
data: | |
cni-conf.json: | | |
{ | |
"name": "cbr0", | |
"plugins": [ | |
{ | |
"type": "flannel", | |
"delegate": { | |
"hairpinMode": true, | |
"isDefaultGateway": true | |
} | |
}, | |
{ | |
"type": "portmap", | |
"capabilities": { | |
"portMappings": true | |
} | |
} | |
] | |
} | |
net-conf.json: | | |
{ | |
"Network": "10.32.0.0/17", | |
"Backend": { | |
"Type": "host-gw" | |
} | |
} | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: kube-flannel-ds-amd64 | |
namespace: kube-system | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
template: | |
metadata: | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
hostNetwork: true | |
nodeSelector: | |
beta.kubernetes.io/arch: amd64 | |
tolerations: | |
- operator: Exists | |
effect: NoSchedule | |
serviceAccountName: flannel | |
initContainers: | |
- name: install-cni | |
image: quay.io/coreos/flannel:v0.10.0-amd64 | |
command: | |
- cp | |
args: | |
- -f | |
- /etc/kube-flannel/cni-conf.json | |
- /etc/cni/net.d/10-flannel.conflist | |
volumeMounts: | |
- name: cni | |
mountPath: /etc/cni/net.d | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
containers: | |
- name: kube-flannel | |
image: quay.io/coreos/flannel:v0.10.0-amd64 | |
command: | |
- /opt/bin/flanneld | |
args: | |
- --ip-masq | |
- --kube-subnet-mgr | |
resources: | |
requests: | |
cpu: "100m" | |
memory: "50Mi" | |
limits: | |
cpu: "100m" | |
memory: "50Mi" | |
securityContext: | |
privileged: true | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.namespace | |
volumeMounts: | |
- name: run | |
mountPath: /run | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
volumes: | |
- name: run | |
hostPath: | |
path: /run | |
- name: cni | |
hostPath: | |
path: /etc/cni/net.d | |
- name: flannel-cfg | |
configMap: | |
name: kube-flannel-cfg | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: kube-flannel-ds-arm64 | |
namespace: kube-system | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
template: | |
metadata: | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
hostNetwork: true | |
nodeSelector: | |
beta.kubernetes.io/arch: arm64 | |
tolerations: | |
- operator: Exists | |
effect: NoSchedule | |
serviceAccountName: flannel | |
initContainers: | |
- name: install-cni | |
image: quay.io/coreos/flannel:v0.10.0-arm64 | |
command: | |
- cp | |
args: | |
- -f | |
- /etc/kube-flannel/cni-conf.json | |
- /etc/cni/net.d/10-flannel.conflist | |
volumeMounts: | |
- name: cni | |
mountPath: /etc/cni/net.d | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
containers: | |
- name: kube-flannel | |
image: quay.io/coreos/flannel:v0.10.0-arm64 | |
command: | |
- /opt/bin/flanneld | |
args: | |
- --ip-masq | |
- --kube-subnet-mgr | |
resources: | |
requests: | |
cpu: "100m" | |
memory: "50Mi" | |
limits: | |
cpu: "100m" | |
memory: "50Mi" | |
securityContext: | |
privileged: true | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.namespace | |
volumeMounts: | |
- name: run | |
mountPath: /run | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
volumes: | |
- name: run | |
hostPath: | |
path: /run | |
- name: cni | |
hostPath: | |
path: /etc/cni/net.d | |
- name: flannel-cfg | |
configMap: | |
name: kube-flannel-cfg | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: kube-flannel-ds-arm | |
namespace: kube-system | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
template: | |
metadata: | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
hostNetwork: true | |
nodeSelector: | |
beta.kubernetes.io/arch: arm | |
tolerations: | |
- operator: Exists | |
effect: NoSchedule | |
serviceAccountName: flannel | |
initContainers: | |
- name: install-cni | |
image: quay.io/coreos/flannel:v0.10.0-arm | |
command: | |
- cp | |
args: | |
- -f | |
- /etc/kube-flannel/cni-conf.json | |
- /etc/cni/net.d/10-flannel.conflist | |
volumeMounts: | |
- name: cni | |
mountPath: /etc/cni/net.d | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
containers: | |
- name: kube-flannel | |
image: quay.io/coreos/flannel:v0.10.0-arm | |
command: | |
- /opt/bin/flanneld | |
args: | |
- --ip-masq | |
- --kube-subnet-mgr | |
resources: | |
requests: | |
cpu: "100m" | |
memory: "50Mi" | |
limits: | |
cpu: "100m" | |
memory: "50Mi" | |
securityContext: | |
privileged: true | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.namespace | |
volumeMounts: | |
- name: run | |
mountPath: /run | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
volumes: | |
- name: run | |
hostPath: | |
path: /run | |
- name: cni | |
hostPath: | |
path: /etc/cni/net.d | |
- name: flannel-cfg | |
configMap: | |
name: kube-flannel-cfg | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: kube-flannel-ds-ppc64le | |
namespace: kube-system | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
template: | |
metadata: | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
hostNetwork: true | |
nodeSelector: | |
beta.kubernetes.io/arch: ppc64le | |
tolerations: | |
- operator: Exists | |
effect: NoSchedule | |
serviceAccountName: flannel | |
initContainers: | |
- name: install-cni | |
image: quay.io/coreos/flannel:v0.10.0-ppc64le | |
command: | |
- cp | |
args: | |
- -f | |
- /etc/kube-flannel/cni-conf.json | |
- /etc/cni/net.d/10-flannel.conflist | |
volumeMounts: | |
- name: cni | |
mountPath: /etc/cni/net.d | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
containers: | |
- name: kube-flannel | |
image: quay.io/coreos/flannel:v0.10.0-ppc64le | |
command: | |
- /opt/bin/flanneld | |
args: | |
- --ip-masq | |
- --kube-subnet-mgr | |
resources: | |
requests: | |
cpu: "100m" | |
memory: "50Mi" | |
limits: | |
cpu: "100m" | |
memory: "50Mi" | |
securityContext: | |
privileged: true | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.namespace | |
volumeMounts: | |
- name: run | |
mountPath: /run | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
volumes: | |
- name: run | |
hostPath: | |
path: /run | |
- name: cni | |
hostPath: | |
path: /etc/cni/net.d | |
- name: flannel-cfg | |
configMap: | |
name: kube-flannel-cfg | |
--- | |
apiVersion: extensions/v1beta1 | |
kind: DaemonSet | |
metadata: | |
name: kube-flannel-ds-s390x | |
namespace: kube-system | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
template: | |
metadata: | |
labels: | |
tier: node | |
app: flannel | |
spec: | |
hostNetwork: true | |
nodeSelector: | |
beta.kubernetes.io/arch: s390x | |
tolerations: | |
- operator: Exists | |
effect: NoSchedule | |
serviceAccountName: flannel | |
initContainers: | |
- name: install-cni | |
image: quay.io/coreos/flannel:v0.10.0-s390x | |
command: | |
- cp | |
args: | |
- -f | |
- /etc/kube-flannel/cni-conf.json | |
- /etc/cni/net.d/10-flannel.conflist | |
volumeMounts: | |
- name: cni | |
mountPath: /etc/cni/net.d | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
containers: | |
- name: kube-flannel | |
image: quay.io/coreos/flannel:v0.10.0-s390x | |
command: | |
- /opt/bin/flanneld | |
args: | |
- --ip-masq | |
- --kube-subnet-mgr | |
resources: | |
requests: | |
cpu: "100m" | |
memory: "50Mi" | |
limits: | |
cpu: "100m" | |
memory: "50Mi" | |
securityContext: | |
privileged: true | |
env: | |
- name: POD_NAME | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.name | |
- name: POD_NAMESPACE | |
valueFrom: | |
fieldRef: | |
fieldPath: metadata.namespace | |
volumeMounts: | |
- name: run | |
mountPath: /run | |
- name: flannel-cfg | |
mountPath: /etc/kube-flannel/ | |
volumes: | |
- name: run | |
hostPath: | |
path: /run | |
- name: cni | |
hostPath: | |
path: /etc/cni/net.d | |
- name: flannel-cfg | |
configMap: | |
name: kube-flannel-cfg |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment