File tree Expand file tree Collapse file tree 3 files changed +96
-1
lines changed
common/group_vars/k8s_cluster Expand file tree Collapse file tree 3 files changed +96
-1
lines changed Original file line number Diff line number Diff line change @@ -32,7 +32,11 @@ if [ -z "${CK8S_KUBESPRAY_NO_VENV+x}" ]; then
3232fi
3333
3434log_info " Running kubespray"
35- ansible-playbook -i " ${config[inventory_file]} " -i " ${here} /node-labels-and-taints-inventory.bash" cluster.yml -b " ${@ } "
35+ ansible-playbook \
36+ -i " ${config[inventory_file]} " \
37+ -i " ${here} /node-labels-and-taints-inventory.bash" \
38+ -i " ${here} /../config/cilium-values-inventory.yaml" \
39+ cluster.yml -b " ${@ } "
3640
3741log_info " Kubespray done"
3842
Original file line number Diff line number Diff line change 1+ all :
2+ vars :
3+ cilium_extra_values : " {{ cilium_extra_values_template | from_yaml }}"
4+ cilium_extra_values_template : |
5+ {% if ck8s_cilium | default(false) %}
6+ policyEnforcementMode: {{ ck8s_cilium.policyEnforcementMode }}
7+
8+ policyAuditMode: {{ ck8s_cilium.policyAuditMode }}
9+
10+ operator:
11+ unmanagedPodWatcher:
12+ restart: {{ ck8s_cilium.operator.unmanagedPodWatcher.restart }}
13+ prometheus:
14+ enabled: {{ ck8s_cilium.operator.monitoring.enabled }}
15+ serviceMonitor:
16+ enabled: {{ ck8s_cilium.operator.monitoring.installServiceMonitor }}
17+
18+ encryption:
19+ enabled: {{ ck8s_cilium.wireguard.enabled }}
20+ type: wireguard
21+ strictMode:
22+ enabled: {{ ck8s_cilium.wireguard.strictMode }}
23+
24+ hubble:
25+ enabled: {{ ck8s_cilium.hubble.enabled }}
26+ metrics:
27+ enabled: {{ ck8s_cilium.hubble.metrics }}
28+ serviceMonitor:
29+ enabled: {{ ck8s_cilium.hubble.monitoring.installServiceMonitor }}
30+
31+ prometheus:
32+ enabled: {{ ck8s_cilium.prometheus.enabled }}
33+ serviceMonitor:
34+ enabled: {{ ck8s_cilium.prometheus.installServiceMonitor }}
35+ trustCRDsExist: true
36+
37+ envoy:
38+ enabled: {{ ck8s_cilium.envoy.enabled }}
39+
40+ {% if ck8s_cilium.enableNodeSelectability | default(false) %}
41+ policyCIDRMatchMode: nodes
42+ {% endif %}
43+
44+ annotateK8sNode: true
45+
46+ {% else %}
47+ {}
48+ {% endif %}
Original file line number Diff line number Diff line change 1+ ck8s_cilium :
2+ # policyEnforcementMode: Determine whether an endpoint accepts traffic from a source or not
3+ #
4+ # Has three options:
5+ # - default: endpoints have unrestricted network access until selected by policy
6+ # - always: policy enforcement is enabled on all endpoints even if no rules select specific endpoints.
7+ # - never: All traffic is allowed from any source (on ingress) or destination (on egress)
8+ policyEnforcementMode : default
9+
10+ # policyAuditMode: when true, no network policy is enforced.
11+ #
12+ # This feature helps to validate the impact of host policies before enforcing them.
13+ policyAuditMode : false
14+
15+ operator :
16+ unmanagedPodWatcher :
17+ restart : true
18+ monitoring :
19+ enabled : true
20+ installServiceMonitor : false
21+
22+ wireguard :
23+ enabled : true
24+ strictMode : false
25+
26+ hubble :
27+ enabled : true
28+ monitoring :
29+ installServiceMonitor : false
30+ metrics :
31+ - dns
32+ - drop
33+ - tcp
34+ - flow
35+ - icmp
36+ - http
37+
38+ prometheus :
39+ enabled : true
40+ installServiceMonitor : false
41+
42+ envoy :
43+ enabled : false
You can’t perform that action at this time.
0 commit comments