# Calico Version v2.3.0 # http://docs.projectcalico.org/v2.3/releases#v2.3.0 # This manifest includes the following component versions: # calico/node:v1.3.0 # calico/cni:v1.9.1 # calico/kube-policy-controller:v0.6.0
# This ConfigMap is used to configure a self-hosted Calico installation. kind:ConfigMap apiVersion:v1 metadata: name:calico-config namespace:kube-system data: # Configure this with the location of your etcd cluster. etcd_endpoints:"https://192.168.1.11:2379,https://192.168.1.12:2379,https://192.168.1.13:2379"
# Configure the Calico backend to use. calico_backend:"bird"
# If you're using TLS enabled etcd uncomment the following. # You must also populate the Secret below with these files. etcd_ca:"/calico-secrets/etcd-ca" etcd_cert:"/calico-secrets/etcd-cert" etcd_key:"/calico-secrets/etcd-key"
---
# The following contains k8s Secrets for use with a TLS enabled etcd cluster. # For information on populating Secrets, see http://kubernetes.io/docs/user-guide/secrets/ apiVersion:v1 kind:Secret type:Opaque metadata: name:calico-etcd-secrets namespace:kube-system data: # Populate the following files with etcd TLS configuration if desired, but leave blank if # not using TLS for etcd. # This self-hosted install expects three files with the following names. The values # should be base64 encoded strings of the entire contents of each file. etcd-key:这块自己对etcd相关证书做base64 etcd-cert:这块自己对etcd相关证书做base64 etcd-ca:这块自己对etcd相关证书做base64
---
# This manifest installs the calico/node container, as well # as the Calico CNI plugins and network config on # each master and worker node in a Kubernetes cluster. kind:DaemonSet apiVersion:extensions/v1beta1 metadata: name:calico-node namespace:kube-system labels: k8s-app:calico-node spec: selector: matchLabels: k8s-app:calico-node template: metadata: labels: k8s-app:calico-node annotations: scheduler.alpha.kubernetes.io/critical-pod:'' scheduler.alpha.kubernetes.io/tolerations:| [{"key": "dedicated", "value": "master", "effect": "NoSchedule" }, {"key":"CriticalAddonsOnly", "operator":"Exists"}] spec: hostNetwork:true serviceAccountName:calico-node containers: # Runs calico/node container on each Kubernetes node. This # container programs network policy and routes on each # host. # calico-node 注释掉,移动到 Systemd 中 # - name: calico-node # image: quay.io/calico/node:v1.3.0 # env: # # The location of the Calico etcd cluster. # - name: ETCD_ENDPOINTS # valueFrom: # configMapKeyRef: # name: calico-config # key: etcd_endpoints # # Choose the backend to use. # - name: CALICO_NETWORKING_BACKEND # valueFrom: # configMapKeyRef: # name: calico-config # key: calico_backend # # Disable file logging so `kubectl logs` works. # - name: CALICO_DISABLE_FILE_LOGGING # value: "true" # # Set Felix endpoint to host default action to ACCEPT. # - name: FELIX_DEFAULTENDPOINTTOHOSTACTION # value: "ACCEPT" # # Configure the IP Pool from which Pod IPs will be chosen. # - name: CALICO_IPV4POOL_CIDR # value: "10.254.64.0/18" # - name: CALICO_IPV4POOL_IPIP # value: "always" # # Disable IPv6 on Kubernetes. # - name: FELIX_IPV6SUPPORT # value: "false" # # Set Felix logging to "info" # - name: FELIX_LOGSEVERITYSCREEN # value: "info" # # Location of the CA certificate for etcd. # - name: ETCD_CA_CERT_FILE # valueFrom: # configMapKeyRef: # name: calico-config # key: etcd_ca # # Location of the client key for etcd. # - name: ETCD_KEY_FILE # valueFrom: # configMapKeyRef: # name: calico-config # key: etcd_key # # Location of the client certificate for etcd. # - name: ETCD_CERT_FILE # valueFrom: # configMapKeyRef: # name: calico-config # key: etcd_cert # # Auto-detect the BGP IP address. # - name: IP # value: "" # securityContext: # privileged: true # resources: # requests: # cpu: 250m # volumeMounts: # - mountPath: /lib/modules # name: lib-modules # readOnly: true # - mountPath: /var/run/calico # name: var-run-calico # readOnly: false # - mountPath: /calico-secrets # name: etcd-certs # # This container installs the Calico CNI binaries # # and CNI network config file on each node. -name:install-cni image:quay.io/calico/cni:v1.9.1 command: ["/install-cni.sh"] env: # The location of the Calico etcd cluster. -name:ETCD_ENDPOINTS valueFrom: configMapKeyRef: name:calico-config key:etcd_endpoints # The CNI network config to install on each node. -name:CNI_NETWORK_CONFIG valueFrom: configMapKeyRef: name:calico-config key:cni_network_config volumeMounts: -mountPath:/host/opt/cni/bin name:cni-bin-dir -mountPath:/host/etc/cni/net.d name:cni-net-dir -mountPath:/calico-secrets name:etcd-certs volumes: # Used by calico/node. -name:lib-modules hostPath: path:/lib/modules -name:var-run-calico hostPath: path:/var/run/calico # Used to install CNI. -name:cni-bin-dir hostPath: path:/opt/cni/bin -name:cni-net-dir hostPath: path:/etc/cni/net.d # Mount in the etcd TLS secrets. -name:etcd-certs secret: secretName:calico-etcd-secrets
---
# This manifest deploys the Calico policy controller on Kubernetes. # See https://github.com/projectcalico/k8s-policy apiVersion:extensions/v1beta1 kind:Deployment metadata: name:calico-policy-controller namespace:kube-system labels: k8s-app:calico-policy annotations: scheduler.alpha.kubernetes.io/critical-pod:'' scheduler.alpha.kubernetes.io/tolerations:| [{"key": "dedicated", "value": "master", "effect": "NoSchedule" }, {"key":"CriticalAddonsOnly", "operator":"Exists"}] spec: # The policy controller can only have a single active instance. replicas:1 strategy: type:Recreate template: metadata: name:calico-policy-controller namespace:kube-system labels: k8s-app:calico-policy spec: # The policy controller must run in the host network namespace so that # it isn't governed by policy that would prevent it from working. hostNetwork:true serviceAccountName:calico-policy-controller containers: -name:calico-policy-controller image:quay.io/calico/kube-policy-controller:v0.6.0 env: # The location of the Calico etcd cluster. -name:ETCD_ENDPOINTS valueFrom: configMapKeyRef: name:calico-config key:etcd_endpoints # Location of the CA certificate for etcd. -name:ETCD_CA_CERT_FILE valueFrom: configMapKeyRef: name:calico-config key:etcd_ca # Location of the client key for etcd. -name:ETCD_KEY_FILE valueFrom: configMapKeyRef: name:calico-config key:etcd_key # Location of the client certificate for etcd. -name:ETCD_CERT_FILE valueFrom: configMapKeyRef: name:calico-config key:etcd_cert # The location of the Kubernetes API. Use the default Kubernetes # service for API access. -name:K8S_API value:"https://kubernetes.default:443" # Since we're running in the host namespace and might not have KubeDNS # access, configure the container's /etc/hosts to resolve # kubernetes.default to the correct service clusterIP. -name:CONFIGURE_ETC_HOSTS value:"true" volumeMounts: # Mount in the etcd TLS secrets. -mountPath:/calico-secrets name:etcd-certs volumes: # Mount in the etcd TLS secrets. -name:etcd-certs secret: secretName:calico-etcd-secrets