From 4fd722c4c12b441d0857c5bc29d1cd43df64b9b7 Mon Sep 17 00:00:00 2001 From: Christian Pointner Date: Tue, 26 May 2020 18:08:10 +0200 Subject: finalize handling of network plugins. (needs testing) --- inventory/group_vars/kubernetes-cluster/vars.yml | 2 ++ 1 file changed, 2 insertions(+) (limited to 'inventory/group_vars') diff --git a/inventory/group_vars/kubernetes-cluster/vars.yml b/inventory/group_vars/kubernetes-cluster/vars.yml index c1149988..2d7a696f 100644 --- a/inventory/group_vars/kubernetes-cluster/vars.yml +++ b/inventory/group_vars/kubernetes-cluster/vars.yml @@ -1,2 +1,4 @@ --- +kubernetes_network_plugin_replaces_kube_proxy: false + kubernetes_nodelocal_dnscache_ip: 169.254.20.10 -- cgit v1.2.3 From 75372fa6a0e84ca8f3a6d6da4a9b389da4ba0b86 Mon Sep 17 00:00:00 2001 From: Christian Pointner Date: Wed, 17 Jun 2020 11:57:05 +0200 Subject: kubernetes: add chaos-at-home test cluster and fix some bugs --- chaos-at-home/group_vars/k8s-chtest.yml | 10 +++++ chaos-at-home/k8s-chtest.yml | 37 +++++++++++++++++ dan/k8s-emc.yml | 4 +- inventory/group_vars/k8s-chtest/main.yml | 41 +++++++++++++++++++ inventory/host_vars/ch-hroottest.yml | 3 ++ inventory/host_vars/ch-k8s-m0.yml | 47 ++++++++++++++++++++++ inventory/host_vars/ch-k8s-m1.yml | 47 ++++++++++++++++++++++ inventory/host_vars/ch-k8s-m2.yml | 44 ++++++++++++++++++++ inventory/host_vars/ch-k8s-w0.yml | 44 ++++++++++++++++++++ inventory/host_vars/ch-k8s-w1.yml | 44 ++++++++++++++++++++ inventory/host_vars/sk-2019vm.yml | 4 ++ inventory/hosts.ini | 38 +++++++++++++---- .../node/templates/kubeguard-peer.service.j2 | 2 +- spreadspace/k8s-lwl.yml | 4 +- 14 files changed, 359 insertions(+), 10 deletions(-) create mode 100644 chaos-at-home/group_vars/k8s-chtest.yml create mode 100644 chaos-at-home/k8s-chtest.yml create mode 100644 inventory/group_vars/k8s-chtest/main.yml create mode 100644 inventory/host_vars/ch-k8s-m0.yml create mode 100644 inventory/host_vars/ch-k8s-m1.yml create mode 100644 inventory/host_vars/ch-k8s-m2.yml create mode 100644 inventory/host_vars/ch-k8s-w0.yml create mode 100644 inventory/host_vars/ch-k8s-w1.yml (limited to 'inventory/group_vars') diff --git a/chaos-at-home/group_vars/k8s-chtest.yml b/chaos-at-home/group_vars/k8s-chtest.yml new file mode 100644 index 00000000..b824f9dd --- /dev/null +++ b/chaos-at-home/group_vars/k8s-chtest.yml @@ -0,0 +1,10 @@ +$ANSIBLE_VAULT;1.2;AES256;chaos-at-home +64343538336637373635323961366666663233376166326663316362346135353465363432616462 +6530623534623435366466656163343436333064316434650a333232643966653634663531396138 +66643633656133396139353565313834653165353331386637316664383237393237633232393337 +3363626365306538380a333361613761343263356639656632633030626265653730393232653165 +32303034393934303538386664616366613339316265653734656562303232396234623733316532 +32313837623163633663633635396664313732323939663633613238303436656534336432363433 +32623863373239326133303932336361366164383462633730653934333830346636616630356666 +37636638666332393639353738623135313331336166333435363063373733313437613264323138 +39373564363637323034373636323430323437623636623935396237323263383362 diff --git a/chaos-at-home/k8s-chtest.yml b/chaos-at-home/k8s-chtest.yml new file mode 100644 index 00000000..e3daf681 --- /dev/null +++ b/chaos-at-home/k8s-chtest.yml @@ -0,0 +1,37 @@ +--- +- name: Basic Node Setup + hosts: k8s-chtest + roles: + - role: apt-repo/base + - role: core/base + - role: core/sshd + - role: core/zsh + +- import_playbook: ../common/kubernetes-cluster-layout.yml + vars: + kubernetes_cluster_layout: + nodes_group: k8s-chtest + masters: + - ch-k8s-m0 + - ch-k8s-m1 + - ch-k8s-m2 + primary_master: ch-k8s-m0 + +### hack hack hack... +- name: cook kubernetes secrets + hosts: _kubernetes_nodes_ + gather_facts: no + tasks: + - set_fact: + kubernetes_secrets_cooked: "{{ kubernetes_secrets }}" + - when: external_ip is defined + set_fact: + external_ip_cooked: "{{ external_ip }}" + +- import_playbook: ../common/kubernetes-cluster.yml +- import_playbook: ../common/kubernetes-cluster-cleanup.yml + +- name: install addons + hosts: _kubernetes_primary_master_ + roles: + - role: kubernetes/addons/metrics-server diff --git a/dan/k8s-emc.yml b/dan/k8s-emc.yml index 7b4e9158..d81d8358 100644 --- a/dan/k8s-emc.yml +++ b/dan/k8s-emc.yml @@ -16,11 +16,13 @@ ### hack hack hack... - name: cook kubernetes secrets - hosts: _kubernetes_masters_ + hosts: _kubernetes_nodes_ gather_facts: no tasks: - set_fact: kubernetes_secrets_cooked: "{{ kubernetes_secrets }}" + - when: external_ip is defined + set_fact: external_ip_cooked: "{{ external_ip }}" - import_playbook: ../common/kubernetes-cluster.yml diff --git a/inventory/group_vars/k8s-chtest/main.yml b/inventory/group_vars/k8s-chtest/main.yml new file mode 100644 index 00000000..2e5d56d3 --- /dev/null +++ b/inventory/group_vars/k8s-chtest/main.yml @@ -0,0 +1,41 @@ +--- +docker_pkg_provider: docker-com +docker_pkg_name: docker-ce + +kubernetes_version: 1.18.3 +kubernetes_container_runtime: docker +kubernetes_network_plugin: kubeguard + +kubernetes: + cluster_name: chtest + + dedicated_master: True + api_extra_sans: + - 178.63.180.139 + - 178.63.180.140 + + pod_ip_range: 172.18.0.0/16 + pod_ip_range_size: 24 + service_ip_range: 172.18.192.0/18 + + +kubernetes_secrets: + encryption_config_keys: "{{ vault_kubernetes_encryption_config_keys }}" + + +kubeguard: + ## node_index must be in the range between 1 and 190 -> 189 hosts possible + ## + ## hardcoded hostnames are not nice but if we do this via host_vars + ## the info is spread over multiple files and this makes it more diffcult + ## to find mistakes, so it is nicer to keep it in one place... + node_index: + ch-k8s-w0: 1 + ch-k8s-w1: 2 + ch-k8s-m0: 100 + ch-k8s-m1: 101 + ch-k8s-m2: 102 + +kubernetes_overlay_node_ip: "{{ kubernetes.pod_ip_range | ipsubnet(kubernetes.pod_ip_range_size, kubeguard.node_index[inventory_hostname]) | ipaddr(1) | ipaddr('address') }}" + +kubernetes_metrics_server_version: 0.3.6 diff --git a/inventory/host_vars/ch-hroottest.yml b/inventory/host_vars/ch-hroottest.yml index c56845fa..555791ca 100644 --- a/inventory/host_vars/ch-hroottest.yml +++ b/inventory/host_vars/ch-hroottest.yml @@ -44,6 +44,9 @@ vm_host: offsets: ch-hroottest-vm1: 100 ch-hroottest-obsd: 101 + ch-k8s-m2: 200 + ch-k8s-w0: 210 + ch-k8s-w1: 211 nat: yes zfs: default: diff --git a/inventory/host_vars/ch-k8s-m0.yml b/inventory/host_vars/ch-k8s-m0.yml new file mode 100644 index 00000000..30239ab3 --- /dev/null +++ b/inventory/host_vars/ch-k8s-m0.yml @@ -0,0 +1,47 @@ +--- +_vm_host_: sk-2019vm + +install: + vm: + host: "{{ _vm_host_ }}" + mem: 4096 + numcpu: 2 + autostart: True + disks: + primary: /dev/sda + scsi: + sda: + type: zfs + name: root + size: 20g + properties: + refreservation: none + interfaces: + - bridge: br-public + name: primary0 + +network: + nameservers: "{{ hostvars[_vm_host_].vm_host.network.dns }}" + domain: "{{ host_domain }}" + systemd_link: + interfaces: "{{ install.interfaces }}" + primary: + interface: primary0 + ip: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.offsets[inventory_hostname]) | ipaddr('address') }}" + mask: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('netmask') }}" + gateway: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('address') }}" + overlay: "{{ (hostvars[_vm_host_].vm_host.network.bridges.public.overlay.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.overlay.offsets[inventory_hostname])).split('/')[0] }}" + +external_ip: "{{ network.primary.overlay }}" + +docker_lvm: + vg: "{{ host_name }}" + lv: docker + size: 7G + fs: ext4 + +kubelet_lvm: + vg: "{{ host_name }}" + lv: kubelet + size: 5G + fs: ext4 diff --git a/inventory/host_vars/ch-k8s-m1.yml b/inventory/host_vars/ch-k8s-m1.yml new file mode 100644 index 00000000..30239ab3 --- /dev/null +++ b/inventory/host_vars/ch-k8s-m1.yml @@ -0,0 +1,47 @@ +--- +_vm_host_: sk-2019vm + +install: + vm: + host: "{{ _vm_host_ }}" + mem: 4096 + numcpu: 2 + autostart: True + disks: + primary: /dev/sda + scsi: + sda: + type: zfs + name: root + size: 20g + properties: + refreservation: none + interfaces: + - bridge: br-public + name: primary0 + +network: + nameservers: "{{ hostvars[_vm_host_].vm_host.network.dns }}" + domain: "{{ host_domain }}" + systemd_link: + interfaces: "{{ install.interfaces }}" + primary: + interface: primary0 + ip: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.offsets[inventory_hostname]) | ipaddr('address') }}" + mask: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('netmask') }}" + gateway: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('address') }}" + overlay: "{{ (hostvars[_vm_host_].vm_host.network.bridges.public.overlay.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.overlay.offsets[inventory_hostname])).split('/')[0] }}" + +external_ip: "{{ network.primary.overlay }}" + +docker_lvm: + vg: "{{ host_name }}" + lv: docker + size: 7G + fs: ext4 + +kubelet_lvm: + vg: "{{ host_name }}" + lv: kubelet + size: 5G + fs: ext4 diff --git a/inventory/host_vars/ch-k8s-m2.yml b/inventory/host_vars/ch-k8s-m2.yml new file mode 100644 index 00000000..a41c97a8 --- /dev/null +++ b/inventory/host_vars/ch-k8s-m2.yml @@ -0,0 +1,44 @@ +--- +_vm_host_: ch-hroottest + +install: + vm: + host: "{{ _vm_host_ }}" + mem: 4096 + numcpu: 2 + autostart: True + disks: + primary: /dev/sda + scsi: + sda: + type: zfs + name: root + size: 20g + properties: + refreservation: none + interfaces: + - bridge: br-public + name: primary0 + +network: + nameservers: "{{ hostvars[_vm_host_].vm_host.network.dns }}" + domain: "{{ host_domain }}" + systemd_link: + interfaces: "{{ install.interfaces }}" + primary: + interface: primary0 + ip: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.offsets[inventory_hostname]) | ipaddr('address') }}" + mask: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('netmask') }}" + gateway: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('address') }}" + +docker_lvm: + vg: "{{ host_name }}" + lv: docker + size: 7G + fs: ext4 + +kubelet_lvm: + vg: "{{ host_name }}" + lv: kubelet + size: 5G + fs: ext4 diff --git a/inventory/host_vars/ch-k8s-w0.yml b/inventory/host_vars/ch-k8s-w0.yml new file mode 100644 index 00000000..5cf6d444 --- /dev/null +++ b/inventory/host_vars/ch-k8s-w0.yml @@ -0,0 +1,44 @@ +--- +_vm_host_: ch-hroottest + +install: + vm: + host: "{{ _vm_host_ }}" + mem: 4096 + numcpu: 4 + autostart: True + disks: + primary: /dev/sda + scsi: + sda: + type: zfs + name: root + size: 100g + properties: + refreservation: none + interfaces: + - bridge: br-public + name: primary0 + +network: + nameservers: "{{ hostvars[_vm_host_].vm_host.network.dns }}" + domain: "{{ host_domain }}" + systemd_link: + interfaces: "{{ install.interfaces }}" + primary: + interface: primary0 + ip: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.offsets[inventory_hostname]) | ipaddr('address') }}" + mask: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('netmask') }}" + gateway: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('address') }}" + +docker_lvm: + vg: "{{ host_name }}" + lv: docker + size: 15G + fs: ext4 + +kubelet_lvm: + vg: "{{ host_name }}" + lv: kubelet + size: 15G + fs: ext4 diff --git a/inventory/host_vars/ch-k8s-w1.yml b/inventory/host_vars/ch-k8s-w1.yml new file mode 100644 index 00000000..5cf6d444 --- /dev/null +++ b/inventory/host_vars/ch-k8s-w1.yml @@ -0,0 +1,44 @@ +--- +_vm_host_: ch-hroottest + +install: + vm: + host: "{{ _vm_host_ }}" + mem: 4096 + numcpu: 4 + autostart: True + disks: + primary: /dev/sda + scsi: + sda: + type: zfs + name: root + size: 100g + properties: + refreservation: none + interfaces: + - bridge: br-public + name: primary0 + +network: + nameservers: "{{ hostvars[_vm_host_].vm_host.network.dns }}" + domain: "{{ host_domain }}" + systemd_link: + interfaces: "{{ install.interfaces }}" + primary: + interface: primary0 + ip: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr(hostvars[_vm_host_].vm_host.network.bridges.public.offsets[inventory_hostname]) | ipaddr('address') }}" + mask: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('netmask') }}" + gateway: "{{ hostvars[_vm_host_].vm_host.network.bridges.public.prefix | ipaddr('address') }}" + +docker_lvm: + vg: "{{ host_name }}" + lv: docker + size: 15G + fs: ext4 + +kubelet_lvm: + vg: "{{ host_name }}" + lv: kubelet + size: 15G + fs: ext4 diff --git a/inventory/host_vars/sk-2019vm.yml b/inventory/host_vars/sk-2019vm.yml index 503995ee..de162712 100644 --- a/inventory/host_vars/sk-2019vm.yml +++ b/inventory/host_vars/sk-2019vm.yml @@ -62,6 +62,8 @@ vm_host: # emc-master: 137 lw-master: 137 ele-gwhetzner: 138 + ch-k8s-m0: 139 + ch-k8s-m1: 140 ch-mimas: 142 sk-testvm: 253 nat: yes @@ -72,6 +74,8 @@ vm_host: # emc-master: 1 lw-master: 1 ele-gwhetzner: 2 + ch-k8s-m0: 3 + ch-k8s-m1: 4 ch-mimas: 6 sk-testvm: 7 zfs: diff --git a/inventory/hosts.ini b/inventory/hosts.ini index ad231374..9add78d3 100644 --- a/inventory/hosts.ini +++ b/inventory/hosts.ini @@ -32,6 +32,7 @@ ch-hroottest-obsd host_name=hroot-test-obsd mz-chaos-at-home chaos-at-home-switches chaos-at-home-ap +chaos-at-home-k8s [mz-chaos-at-home] mz-router ansible_host=chmz-router @@ -53,6 +54,13 @@ ch-ap1 host_name=ap1 ch-router ch-pan +[chaos-at-home-k8s] +ch-k8s-m0 host_name=k8s-master0 +ch-k8s-m1 host_name=k8s-master1 +ch-k8s-m2 host_name=k8s-master2 +ch-k8s-w0 host_name=k8s-worker0 +ch-k8s-w1 host_name=k8s-worker1 + [realraum:vars] host_domain=realraum.at @@ -261,6 +269,8 @@ sk-tomnext-nc sk-tomnext-hp ch-hroottest-vm1 ch-hroottest-obsd +ch-k8s-m[0:2] +ch-k8s-w[0:1] [hroot] sk-2019 @@ -313,9 +323,18 @@ ele-dolmetsch-raspi +### Elevate Festival +[elevate-festival:children] +elevate +k8s-emc + + + +## Kubernetes [kubernetes-cluster:children] k8s-emc k8s-lwl +k8s-chtest [standalone-kubelet] sk-cloudia @@ -350,13 +369,6 @@ k8s-emc-distribution k8s-emc-streamer -### Elevate Festival -[elevate-festival:children] -elevate -k8s-emc - - - ### Kubernetes Cluster: lendwirbel-live [k8s-lwl-encoder] lw-dione @@ -376,3 +388,15 @@ k8s-lwl-master k8s-lwl-encoder k8s-lwl-distribution k8s-lwl-streamer + + +### Kubernetes Cluster: ch-test +[k8s-chtest-master] +ch-k8s-m[0:2] + +[k8s-chtest-worker] +ch-k8s-w[0:1] + +[k8s-chtest:children] +k8s-chtest-master +k8s-chtest-worker diff --git a/roles/kubernetes/net/kubeguard/node/templates/kubeguard-peer.service.j2 b/roles/kubernetes/net/kubeguard/node/templates/kubeguard-peer.service.j2 index 72b39c3f..0503ca03 100644 --- a/roles/kubernetes/net/kubeguard/node/templates/kubeguard-peer.service.j2 +++ b/roles/kubernetes/net/kubeguard/node/templates/kubeguard-peer.service.j2 @@ -6,7 +6,7 @@ After=kubeguard-interfaces.service {% set pod_ip_self = kubernetes.pod_ip_range | ipsubnet(kubernetes.pod_ip_range_size, kubeguard.node_index[inventory_hostname]) | ipaddr(1) | ipaddr('address') -%} {% set pod_net_peer = kubernetes.pod_ip_range | ipsubnet(kubernetes.pod_ip_range_size, kubeguard.node_index[peer]) -%} -{% set direct_zone = kubeguard.direct_net_zones | direct_net_zone(inventory_hostname, peer) -%} +{% set direct_zone = kubeguard.direct_net_zones | default({}) | direct_net_zone(inventory_hostname, peer) -%} {% if direct_zone %} {% set direct_ip = kubeguard.direct_net_zones[direct_zone].transfer_net | ipaddr(kubeguard.node_index[inventory_hostname]) %} {% set direct_interface = kubeguard.direct_net_zones[direct_zone].node_interface[inventory_hostname] %} diff --git a/spreadspace/k8s-lwl.yml b/spreadspace/k8s-lwl.yml index 17d21601..902d833d 100644 --- a/spreadspace/k8s-lwl.yml +++ b/spreadspace/k8s-lwl.yml @@ -16,11 +16,13 @@ ### hack hack hack... - name: cook kubernetes secrets - hosts: _kubernetes_masters_ + hosts: _kubernetes_nodes_ gather_facts: no tasks: - set_fact: kubernetes_secrets_cooked: "{{ kubernetes_secrets }}" + - when: external_ip is defined + set_fact: external_ip_cooked: "{{ external_ip }}" - import_playbook: ../common/kubernetes-cluster.yml -- cgit v1.2.3 From c2d634aaba07caa564056693bc5454f1582426ea Mon Sep 17 00:00:00 2001 From: Christian Pointner Date: Sat, 20 Jun 2020 17:23:44 +0200 Subject: kubeguard: add kube-router variant --- inventory/group_vars/k8s-chtest/main.yml | 3 + inventory/group_vars/kubernetes-cluster/vars.yml | 1 + .../kubeadm/base/tasks/net_kubeguard.yml | 13 +- .../kubeadm/master/tasks/net_kubeguard.yml | 14 +- .../net_kubeguard/kube-router.0.4.0.yml.j2 | 171 +++++++++++++++++++++ 5 files changed, 199 insertions(+), 3 deletions(-) create mode 100644 roles/kubernetes/kubeadm/master/templates/net_kubeguard/kube-router.0.4.0.yml.j2 (limited to 'inventory/group_vars') diff --git a/inventory/group_vars/k8s-chtest/main.yml b/inventory/group_vars/k8s-chtest/main.yml index 2e5d56d3..a7fe0120 100644 --- a/inventory/group_vars/k8s-chtest/main.yml +++ b/inventory/group_vars/k8s-chtest/main.yml @@ -5,6 +5,9 @@ docker_pkg_name: docker-ce kubernetes_version: 1.18.3 kubernetes_container_runtime: docker kubernetes_network_plugin: kubeguard +kubernetes_network_plugin_replaces_kube_proxy: true +kubernetes_network_plugin_variant: with-kube-router +kubernetes_network_plugin_version: 0.4.0 kubernetes: cluster_name: chtest diff --git a/inventory/group_vars/kubernetes-cluster/vars.yml b/inventory/group_vars/kubernetes-cluster/vars.yml index 2d7a696f..edec4e3e 100644 --- a/inventory/group_vars/kubernetes-cluster/vars.yml +++ b/inventory/group_vars/kubernetes-cluster/vars.yml @@ -1,4 +1,5 @@ --- kubernetes_network_plugin_replaces_kube_proxy: false +kubernetes_network_plugin_variant: default kubernetes_nodelocal_dnscache_ip: 169.254.20.10 diff --git a/roles/kubernetes/kubeadm/base/tasks/net_kubeguard.yml b/roles/kubernetes/kubeadm/base/tasks/net_kubeguard.yml index 37b5030d..2d706a03 100644 --- a/roles/kubernetes/kubeadm/base/tasks/net_kubeguard.yml +++ b/roles/kubernetes/kubeadm/base/tasks/net_kubeguard.yml @@ -1,8 +1,10 @@ --- - name: make sure kubernetes_network_plugin_replaces_kube_proxy is not set + when: + - kubernetes_network_plugin_variant != 'with-kube-router' run_once: yes assert: - msg: "this network plugin can not replace kube-proxy please set kubernetes_network_plugin_replaces_kube_proxy to false." + msg: "kubeguard variant '{{ kubernetes_network_plugin_variant }}' can not replace kube-proxy please set kubernetes_network_plugin_replaces_kube_proxy to false or configure a differnt kubernetes_network_plugin_variant." that: - not kubernetes_network_plugin_replaces_kube_proxy @@ -82,3 +84,12 @@ template: src: net_kubeguard/cni.json.j2 dest: /etc/cni/net.d/kubeguard.json + +- name: install packages needed for debugging kube-router + when: kubernetes_network_plugin_variant == 'with-kube-router' + apt: + name: + - iptables + - ipvsadm + - ipset + state: present diff --git a/roles/kubernetes/kubeadm/master/tasks/net_kubeguard.yml b/roles/kubernetes/kubeadm/master/tasks/net_kubeguard.yml index 95fee7c8..f364fb5f 100644 --- a/roles/kubernetes/kubeadm/master/tasks/net_kubeguard.yml +++ b/roles/kubernetes/kubeadm/master/tasks/net_kubeguard.yml @@ -1,3 +1,13 @@ --- -### kubeguard needs to be deployed before the cluster has been initialized. -### there is nothing more todo here. +- name: install kube-router variant + when: "kubernetes_network_plugin_variant == 'with-kube-router'" + block: + - name: generate kubeguard (kube-router) configuration + template: + src: "net_kubeguard/kube-router.{{ kubernetes_network_plugin_version }}.yml.j2" + dest: /etc/kubernetes/network-plugin.yml + + - name: install kubeguard (kube-router) on to the cluster + command: kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f /etc/kubernetes/network-plugin.yml + register: kubeguard_apply_result + changed_when: (kubeguard_apply_result.stdout_lines | reject("regex", " unchanged$") | list | length) > 0 diff --git a/roles/kubernetes/kubeadm/master/templates/net_kubeguard/kube-router.0.4.0.yml.j2 b/roles/kubernetes/kubeadm/master/templates/net_kubeguard/kube-router.0.4.0.yml.j2 new file mode 100644 index 00000000..51bfdaae --- /dev/null +++ b/roles/kubernetes/kubeadm/master/templates/net_kubeguard/kube-router.0.4.0.yml.j2 @@ -0,0 +1,171 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: kube-router-kubeconfig + namespace: kube-system + labels: + tier: node + k8s-app: kube-router +data: + kubeconfig.conf: | + apiVersion: v1 + kind: Config + clusters: + - cluster: + certificate-authority: /var/run/secrets/kubernetes.io/serviceaccount/ca.crt + server: https://127.0.0.1:{{ kubernetes_api_lb_port | default('6443') }} + name: default + contexts: + - context: + cluster: default + namespace: default + user: default + name: default + current-context: default + users: + - name: default + user: + tokenFile: /var/run/secrets/kubernetes.io/serviceaccount/token +--- +apiVersion: apps/v1 +kind: DaemonSet +metadata: + labels: + k8s-app: kube-router + tier: node + name: kube-router + namespace: kube-system +spec: + selector: + matchLabels: + k8s-app: kube-router + tier: node + template: + metadata: + labels: + k8s-app: kube-router + tier: node + annotations: + prometheus.io/scrape: "true" + prometheus.io/port: "8080" + spec: + priorityClassName: system-node-critical + serviceAccountName: kube-router + serviceAccount: kube-router + containers: + - name: kube-router + image: docker.io/cloudnativelabs/kube-router:v{{ kubernetes_network_plugin_version }} + imagePullPolicy: Always + args: + - --run-router=false + - --run-firewall=true + - --run-service-proxy={{ kubernetes_network_plugin_replaces_kube_proxy | string | lower }} + - --kubeconfig=/var/lib/kube-router/kubeconfig + - --hairpin-mode + - --iptables-sync-period=10s + - --ipvs-sync-period=10s + env: + - name: NODE_NAME + valueFrom: + fieldRef: + fieldPath: spec.nodeName + livenessProbe: + httpGet: + path: /healthz + port: 20244 + initialDelaySeconds: 10 + periodSeconds: 3 + resources: + requests: + cpu: 250m + memory: 250Mi + securityContext: + privileged: true + volumeMounts: + - name: lib-modules + mountPath: /lib/modules + readOnly: true + - name: kubeconfig + mountPath: /var/lib/kube-router + readOnly: true + - name: xtables-lock + mountPath: /run/xtables.lock + readOnly: false + hostNetwork: true + tolerations: + - key: CriticalAddonsOnly + operator: Exists + - effect: NoSchedule + key: node-role.kubernetes.io/master + operator: Exists + - effect: NoSchedule + key: node.kubernetes.io/not-ready + operator: Exists + volumes: + - name: lib-modules + hostPath: + path: /lib/modules + - name: kubeconfig + configMap: + name: kube-router-kubeconfig + items: + - key: kubeconfig.conf + path: kubeconfig + - name: xtables-lock + hostPath: + path: /run/xtables.lock + type: FileOrCreate +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: kube-router + namespace: kube-system +--- +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1beta1 +metadata: + name: kube-router + namespace: kube-system +rules: + - apiGroups: + - "" + resources: + - namespaces + - pods + - services + - nodes + - endpoints + verbs: + - list + - get + - watch + - apiGroups: + - "networking.k8s.io" + resources: + - networkpolicies + verbs: + - list + - get + - watch + - apiGroups: + - extensions + resources: + - networkpolicies + verbs: + - get + - list + - watch +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1beta1 +metadata: + name: kube-router +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: kube-router +subjects: +- kind: ServiceAccount + name: kube-router + namespace: kube-system -- cgit v1.2.3