|
|
|
@ -0,0 +1,695 @@
|
|
|
|
|
/*
|
|
|
|
|
Copyright 2020 The Kubernetes Authors All rights reserved.
|
|
|
|
|
|
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
|
you may not use this file except in compliance with the License.
|
|
|
|
|
You may obtain a copy of the License at
|
|
|
|
|
|
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
|
|
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
|
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
|
See the License for the specific language governing permissions and
|
|
|
|
|
limitations under the License.
|
|
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
package cni
|
|
|
|
|
|
|
|
|
|
import (
|
|
|
|
|
"os/exec"
|
|
|
|
|
|
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
|
"k8s.io/minikube/pkg/minikube/config"
|
|
|
|
|
)
|
|
|
|
|
|
|
|
|
|
// From https://raw.githubusercontent.com/cilium/cilium/v1.8/install/kubernetes/quick-install.yaml
|
|
|
|
|
var ciliumTmpl = `---
|
|
|
|
|
# Source: cilium/charts/agent/templates/serviceaccount.yaml
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
kind: ServiceAccount
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/operator/templates/serviceaccount.yaml
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
kind: ServiceAccount
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/config/templates/configmap.yaml
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
kind: ConfigMap
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium-config
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
data:
|
|
|
|
|
|
|
|
|
|
# Identity allocation mode selects how identities are shared between cilium
|
|
|
|
|
# nodes by setting how they are stored. The options are "crd" or "kvstore".
|
|
|
|
|
# - "crd" stores identities in kubernetes as CRDs (custom resource definition).
|
|
|
|
|
# These can be queried with:
|
|
|
|
|
# kubectl get ciliumid
|
|
|
|
|
# - "kvstore" stores identities in a kvstore, etcd or consul, that is
|
|
|
|
|
# configured below. Cilium versions before 1.6 supported only the kvstore
|
|
|
|
|
# backend. Upgrades from these older cilium versions should continue using
|
|
|
|
|
# the kvstore by commenting out the identity-allocation-mode below, or
|
|
|
|
|
# setting it to "kvstore".
|
|
|
|
|
identity-allocation-mode: crd
|
|
|
|
|
|
|
|
|
|
# If you want to run cilium in debug mode change this value to true
|
|
|
|
|
debug: "false"
|
|
|
|
|
|
|
|
|
|
# Enable IPv4 addressing. If enabled, all endpoints are allocated an IPv4
|
|
|
|
|
# address.
|
|
|
|
|
enable-ipv4: "true"
|
|
|
|
|
|
|
|
|
|
# Enable IPv6 addressing. If enabled, all endpoints are allocated an IPv6
|
|
|
|
|
# address.
|
|
|
|
|
enable-ipv6: "false"
|
|
|
|
|
enable-bpf-clock-probe: "true"
|
|
|
|
|
|
|
|
|
|
# If you want cilium monitor to aggregate tracing for packets, set this level
|
|
|
|
|
# to "low", "medium", or "maximum". The higher the level, the less packets
|
|
|
|
|
# that will be seen in monitor output.
|
|
|
|
|
monitor-aggregation: medium
|
|
|
|
|
|
|
|
|
|
# The monitor aggregation interval governs the typical time between monitor
|
|
|
|
|
# notification events for each allowed connection.
|
|
|
|
|
#
|
|
|
|
|
# Only effective when monitor aggregation is set to "medium" or higher.
|
|
|
|
|
monitor-aggregation-interval: 5s
|
|
|
|
|
|
|
|
|
|
# The monitor aggregation flags determine which TCP flags which, upon the
|
|
|
|
|
# first observation, cause monitor notifications to be generated.
|
|
|
|
|
#
|
|
|
|
|
# Only effective when monitor aggregation is set to "medium" or higher.
|
|
|
|
|
monitor-aggregation-flags: all
|
|
|
|
|
# bpf-policy-map-max specified the maximum number of entries in endpoint
|
|
|
|
|
# policy map (per endpoint)
|
|
|
|
|
bpf-policy-map-max: "16384"
|
|
|
|
|
# Specifies the ratio (0.0-1.0) of total system memory to use for dynamic
|
|
|
|
|
# sizing of the TCP CT, non-TCP CT, NAT and policy BPF maps.
|
|
|
|
|
bpf-map-dynamic-size-ratio: "0.0025"
|
|
|
|
|
|
|
|
|
|
# Pre-allocation of map entries allows per-packet latency to be reduced, at
|
|
|
|
|
# the expense of up-front memory allocation for the entries in the maps. The
|
|
|
|
|
# default value below will minimize memory usage in the default installation;
|
|
|
|
|
# users who are sensitive to latency may consider setting this to "true".
|
|
|
|
|
#
|
|
|
|
|
# This option was introduced in Cilium 1.4. Cilium 1.3 and earlier ignore
|
|
|
|
|
# this option and behave as though it is set to "true".
|
|
|
|
|
#
|
|
|
|
|
# If this value is modified, then during the next Cilium startup the restore
|
|
|
|
|
# of existing endpoints and tracking of ongoing connections may be disrupted.
|
|
|
|
|
# This may lead to policy drops or a change in loadbalancing decisions for a
|
|
|
|
|
# connection for some time. Endpoints may need to be recreated to restore
|
|
|
|
|
# connectivity.
|
|
|
|
|
#
|
|
|
|
|
# If this option is set to "false" during an upgrade from 1.3 or earlier to
|
|
|
|
|
# 1.4 or later, then it may cause one-time disruptions during the upgrade.
|
|
|
|
|
preallocate-bpf-maps: "false"
|
|
|
|
|
|
|
|
|
|
# Regular expression matching compatible Istio sidecar istio-proxy
|
|
|
|
|
# container image names
|
|
|
|
|
sidecar-istio-proxy-image: "cilium/istio_proxy"
|
|
|
|
|
|
|
|
|
|
# Encapsulation mode for communication between nodes
|
|
|
|
|
# Possible values:
|
|
|
|
|
# - disabled
|
|
|
|
|
# - vxlan (default)
|
|
|
|
|
# - geneve
|
|
|
|
|
tunnel: vxlan
|
|
|
|
|
|
|
|
|
|
# Name of the cluster. Only relevant when building a mesh of clusters.
|
|
|
|
|
cluster-name: default
|
|
|
|
|
|
|
|
|
|
# DNS Polling periodically issues a DNS lookup for each 'matchName' from
|
|
|
|
|
# cilium-agent. The result is used to regenerate endpoint policy.
|
|
|
|
|
# DNS lookups are repeated with an interval of 5 seconds, and are made for
|
|
|
|
|
# A(IPv4) and AAAA(IPv6) addresses. Should a lookup fail, the most recent IP
|
|
|
|
|
# data is used instead. An IP change will trigger a regeneration of the Cilium
|
|
|
|
|
# policy for each endpoint and increment the per cilium-agent policy
|
|
|
|
|
# repository revision.
|
|
|
|
|
#
|
|
|
|
|
# This option is disabled by default starting from version 1.4.x in favor
|
|
|
|
|
# of a more powerful DNS proxy-based implementation, see [0] for details.
|
|
|
|
|
# Enable this option if you want to use FQDN policies but do not want to use
|
|
|
|
|
# the DNS proxy.
|
|
|
|
|
#
|
|
|
|
|
# To ease upgrade, users may opt to set this option to "true".
|
|
|
|
|
# Otherwise please refer to the Upgrade Guide [1] which explains how to
|
|
|
|
|
# prepare policy rules for upgrade.
|
|
|
|
|
#
|
|
|
|
|
# [0] http://docs.cilium.io/en/stable/policy/language/#dns-based
|
|
|
|
|
# [1] http://docs.cilium.io/en/stable/install/upgrade/#changes-that-may-require-action
|
|
|
|
|
tofqdns-enable-poller: "false"
|
|
|
|
|
|
|
|
|
|
# wait-bpf-mount makes init container wait until bpf filesystem is mounted
|
|
|
|
|
wait-bpf-mount: "false"
|
|
|
|
|
|
|
|
|
|
masquerade: "true"
|
|
|
|
|
enable-bpf-masquerade: "true"
|
|
|
|
|
enable-xt-socket-fallback: "true"
|
|
|
|
|
install-iptables-rules: "true"
|
|
|
|
|
auto-direct-node-routes: "false"
|
|
|
|
|
kube-proxy-replacement: "probe"
|
|
|
|
|
node-port-bind-protection: "true"
|
|
|
|
|
enable-auto-protect-node-port-range: "true"
|
|
|
|
|
enable-session-affinity: "true"
|
|
|
|
|
k8s-require-ipv4-pod-cidr: "true"
|
|
|
|
|
k8s-require-ipv6-pod-cidr: "false"
|
|
|
|
|
enable-endpoint-health-checking: "true"
|
|
|
|
|
enable-well-known-identities: "false"
|
|
|
|
|
enable-remote-node-identity: "true"
|
|
|
|
|
operator-api-serve-addr: "127.0.0.1:9234"
|
|
|
|
|
ipam: "cluster-pool"
|
|
|
|
|
cluster-pool-ipv4-cidr: "10.0.0.0/8"
|
|
|
|
|
cluster-pool-ipv4-mask-size: "24"
|
|
|
|
|
disable-cnp-status-updates: "true"
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/agent/templates/clusterrole.yaml
|
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
|
kind: ClusterRole
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium
|
|
|
|
|
rules:
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- networking.k8s.io
|
|
|
|
|
resources:
|
|
|
|
|
- networkpolicies
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- discovery.k8s.io
|
|
|
|
|
resources:
|
|
|
|
|
- endpointslices
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- ""
|
|
|
|
|
resources:
|
|
|
|
|
- namespaces
|
|
|
|
|
- services
|
|
|
|
|
- nodes
|
|
|
|
|
- endpoints
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- ""
|
|
|
|
|
resources:
|
|
|
|
|
- pods
|
|
|
|
|
- nodes
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- update
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- ""
|
|
|
|
|
resources:
|
|
|
|
|
- nodes
|
|
|
|
|
- nodes/status
|
|
|
|
|
verbs:
|
|
|
|
|
- patch
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- apiextensions.k8s.io
|
|
|
|
|
resources:
|
|
|
|
|
- customresourcedefinitions
|
|
|
|
|
verbs:
|
|
|
|
|
- create
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- update
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- cilium.io
|
|
|
|
|
resources:
|
|
|
|
|
- ciliumnetworkpolicies
|
|
|
|
|
- ciliumnetworkpolicies/status
|
|
|
|
|
- ciliumclusterwidenetworkpolicies
|
|
|
|
|
- ciliumclusterwidenetworkpolicies/status
|
|
|
|
|
- ciliumendpoints
|
|
|
|
|
- ciliumendpoints/status
|
|
|
|
|
- ciliumnodes
|
|
|
|
|
- ciliumnodes/status
|
|
|
|
|
- ciliumidentities
|
|
|
|
|
verbs:
|
|
|
|
|
- '*'
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/operator/templates/clusterrole.yaml
|
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
|
kind: ClusterRole
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
rules:
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- ""
|
|
|
|
|
resources:
|
|
|
|
|
# to automatically delete [core|kube]dns pods so that are starting to being
|
|
|
|
|
# managed by Cilium
|
|
|
|
|
- pods
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- delete
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- discovery.k8s.io
|
|
|
|
|
resources:
|
|
|
|
|
- endpointslices
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- ""
|
|
|
|
|
resources:
|
|
|
|
|
# to perform the translation of a CNP that contains 'ToGroup' to its endpoints
|
|
|
|
|
- services
|
|
|
|
|
- endpoints
|
|
|
|
|
# to check apiserver connectivity
|
|
|
|
|
- namespaces
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- cilium.io
|
|
|
|
|
resources:
|
|
|
|
|
- ciliumnetworkpolicies
|
|
|
|
|
- ciliumnetworkpolicies/status
|
|
|
|
|
- ciliumclusterwidenetworkpolicies
|
|
|
|
|
- ciliumclusterwidenetworkpolicies/status
|
|
|
|
|
- ciliumendpoints
|
|
|
|
|
- ciliumendpoints/status
|
|
|
|
|
- ciliumnodes
|
|
|
|
|
- ciliumnodes/status
|
|
|
|
|
- ciliumidentities
|
|
|
|
|
- ciliumidentities/status
|
|
|
|
|
verbs:
|
|
|
|
|
- '*'
|
|
|
|
|
- apiGroups:
|
|
|
|
|
- apiextensions.k8s.io
|
|
|
|
|
resources:
|
|
|
|
|
- customresourcedefinitions
|
|
|
|
|
verbs:
|
|
|
|
|
- get
|
|
|
|
|
- list
|
|
|
|
|
- watch
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/agent/templates/clusterrolebinding.yaml
|
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium
|
|
|
|
|
roleRef:
|
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
|
kind: ClusterRole
|
|
|
|
|
name: cilium
|
|
|
|
|
subjects:
|
|
|
|
|
- kind: ServiceAccount
|
|
|
|
|
name: cilium
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/operator/templates/clusterrolebinding.yaml
|
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
|
metadata:
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
roleRef:
|
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
|
kind: ClusterRole
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
subjects:
|
|
|
|
|
- kind: ServiceAccount
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/agent/templates/daemonset.yaml
|
|
|
|
|
apiVersion: apps/v1
|
|
|
|
|
kind: DaemonSet
|
|
|
|
|
metadata:
|
|
|
|
|
labels:
|
|
|
|
|
k8s-app: cilium
|
|
|
|
|
name: cilium
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
spec:
|
|
|
|
|
selector:
|
|
|
|
|
matchLabels:
|
|
|
|
|
k8s-app: cilium
|
|
|
|
|
template:
|
|
|
|
|
metadata:
|
|
|
|
|
annotations:
|
|
|
|
|
# This annotation plus the CriticalAddonsOnly toleration makes
|
|
|
|
|
# cilium to be a critical pod in the cluster, which ensures cilium
|
|
|
|
|
# gets priority scheduling.
|
|
|
|
|
# https://kubernetes.io/docs/tasks/administer-cluster/guaranteed-scheduling-critical-addon-pods/
|
|
|
|
|
scheduler.alpha.kubernetes.io/critical-pod: ""
|
|
|
|
|
labels:
|
|
|
|
|
k8s-app: cilium
|
|
|
|
|
spec:
|
|
|
|
|
affinity:
|
|
|
|
|
podAntiAffinity:
|
|
|
|
|
requiredDuringSchedulingIgnoredDuringExecution:
|
|
|
|
|
- labelSelector:
|
|
|
|
|
matchExpressions:
|
|
|
|
|
- key: k8s-app
|
|
|
|
|
operator: In
|
|
|
|
|
values:
|
|
|
|
|
- cilium
|
|
|
|
|
topologyKey: kubernetes.io/hostname
|
|
|
|
|
containers:
|
|
|
|
|
- args:
|
|
|
|
|
- --config-dir=/tmp/cilium/config-map
|
|
|
|
|
command:
|
|
|
|
|
- cilium-agent
|
|
|
|
|
livenessProbe:
|
|
|
|
|
httpGet:
|
|
|
|
|
host: '127.0.0.1'
|
|
|
|
|
path: /healthz
|
|
|
|
|
port: 9876
|
|
|
|
|
scheme: HTTP
|
|
|
|
|
httpHeaders:
|
|
|
|
|
- name: "brief"
|
|
|
|
|
value: "true"
|
|
|
|
|
failureThreshold: 10
|
|
|
|
|
# The initial delay for the liveness probe is intentionally large to
|
|
|
|
|
# avoid an endless kill & restart cycle if in the event that the initial
|
|
|
|
|
# bootstrapping takes longer than expected.
|
|
|
|
|
initialDelaySeconds: 120
|
|
|
|
|
periodSeconds: 30
|
|
|
|
|
successThreshold: 1
|
|
|
|
|
timeoutSeconds: 5
|
|
|
|
|
readinessProbe:
|
|
|
|
|
httpGet:
|
|
|
|
|
host: '127.0.0.1'
|
|
|
|
|
path: /healthz
|
|
|
|
|
port: 9876
|
|
|
|
|
scheme: HTTP
|
|
|
|
|
httpHeaders:
|
|
|
|
|
- name: "brief"
|
|
|
|
|
value: "true"
|
|
|
|
|
failureThreshold: 3
|
|
|
|
|
initialDelaySeconds: 5
|
|
|
|
|
periodSeconds: 30
|
|
|
|
|
successThreshold: 1
|
|
|
|
|
timeoutSeconds: 5
|
|
|
|
|
env:
|
|
|
|
|
- name: K8S_NODE_NAME
|
|
|
|
|
valueFrom:
|
|
|
|
|
fieldRef:
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
fieldPath: spec.nodeName
|
|
|
|
|
- name: CILIUM_K8S_NAMESPACE
|
|
|
|
|
valueFrom:
|
|
|
|
|
fieldRef:
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
fieldPath: metadata.namespace
|
|
|
|
|
- name: CILIUM_Cilium_MASTER_DEVICE
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: Cilium-master-device
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
- name: CILIUM_Cilium_UNINSTALL_ON_EXIT
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: Cilium-uninstall-on-exit
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
- name: CILIUM_CLUSTERMESH_CONFIG
|
|
|
|
|
value: /var/lib/cilium/clustermesh/
|
|
|
|
|
- name: CILIUM_CNI_CHAINING_MODE
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: cni-chaining-mode
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
- name: CILIUM_CUSTOM_CNI_CONF
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: custom-cni-conf
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
image: "docker.io/cilium/cilium:v1.8.0"
|
|
|
|
|
imagePullPolicy: IfNotPresent
|
|
|
|
|
lifecycle:
|
|
|
|
|
postStart:
|
|
|
|
|
exec:
|
|
|
|
|
command:
|
|
|
|
|
- "/cni-install.sh"
|
|
|
|
|
- "--enable-debug=false"
|
|
|
|
|
preStop:
|
|
|
|
|
exec:
|
|
|
|
|
command:
|
|
|
|
|
- /cni-uninstall.sh
|
|
|
|
|
name: cilium-agent
|
|
|
|
|
securityContext:
|
|
|
|
|
capabilities:
|
|
|
|
|
add:
|
|
|
|
|
- NET_ADMIN
|
|
|
|
|
- SYS_MODULE
|
|
|
|
|
privileged: true
|
|
|
|
|
volumeMounts:
|
|
|
|
|
- mountPath: /sys/fs/bpf
|
|
|
|
|
name: bpf-maps
|
|
|
|
|
- mountPath: /var/run/cilium
|
|
|
|
|
name: cilium-run
|
|
|
|
|
- mountPath: /host/opt/cni/bin
|
|
|
|
|
name: cni-path
|
|
|
|
|
- mountPath: /host/etc/cni/net.d
|
|
|
|
|
name: etc-cni-netd
|
|
|
|
|
- mountPath: /var/lib/cilium/clustermesh
|
|
|
|
|
name: clustermesh-secrets
|
|
|
|
|
readOnly: true
|
|
|
|
|
- mountPath: /tmp/cilium/config-map
|
|
|
|
|
name: cilium-config-path
|
|
|
|
|
readOnly: true
|
|
|
|
|
# Needed to be able to load kernel modules
|
|
|
|
|
- mountPath: /lib/modules
|
|
|
|
|
name: lib-modules
|
|
|
|
|
readOnly: true
|
|
|
|
|
- mountPath: /run/xtables.lock
|
|
|
|
|
name: xtables-lock
|
|
|
|
|
hostNetwork: true
|
|
|
|
|
initContainers:
|
|
|
|
|
- command:
|
|
|
|
|
- /init-container.sh
|
|
|
|
|
env:
|
|
|
|
|
- name: CILIUM_ALL_STATE
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: clean-cilium-state
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
- name: CILIUM_BPF_STATE
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: clean-cilium-bpf-state
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
- name: CILIUM_WAIT_BPF_MOUNT
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: wait-bpf-mount
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
image: "docker.io/cilium/cilium:v1.8.0"
|
|
|
|
|
imagePullPolicy: IfNotPresent
|
|
|
|
|
name: clean-cilium-state
|
|
|
|
|
securityContext:
|
|
|
|
|
capabilities:
|
|
|
|
|
add:
|
|
|
|
|
- NET_ADMIN
|
|
|
|
|
privileged: true
|
|
|
|
|
volumeMounts:
|
|
|
|
|
- mountPath: /sys/fs/bpf
|
|
|
|
|
name: bpf-maps
|
|
|
|
|
mountPropagation: HostToContainer
|
|
|
|
|
- mountPath: /var/run/cilium
|
|
|
|
|
name: cilium-run
|
|
|
|
|
resources:
|
|
|
|
|
requests:
|
|
|
|
|
cpu: 100m
|
|
|
|
|
memory: 100Mi
|
|
|
|
|
restartPolicy: Always
|
|
|
|
|
priorityClassName: system-node-critical
|
|
|
|
|
serviceAccount: cilium
|
|
|
|
|
serviceAccountName: cilium
|
|
|
|
|
terminationGracePeriodSeconds: 1
|
|
|
|
|
tolerations:
|
|
|
|
|
- operator: Exists
|
|
|
|
|
volumes:
|
|
|
|
|
# To keep state between restarts / upgrades
|
|
|
|
|
- hostPath:
|
|
|
|
|
path: /var/run/cilium
|
|
|
|
|
type: DirectoryOrCreate
|
|
|
|
|
name: cilium-run
|
|
|
|
|
# To keep state between restarts / upgrades for bpf maps
|
|
|
|
|
- hostPath:
|
|
|
|
|
path: /sys/fs/bpf
|
|
|
|
|
type: DirectoryOrCreate
|
|
|
|
|
name: bpf-maps
|
|
|
|
|
# To install cilium cni plugin in the host
|
|
|
|
|
- hostPath:
|
|
|
|
|
path: /opt/cni/bin
|
|
|
|
|
type: DirectoryOrCreate
|
|
|
|
|
name: cni-path
|
|
|
|
|
# To install cilium cni configuration in the host
|
|
|
|
|
- hostPath:
|
|
|
|
|
path: /etc/cni/net.d
|
|
|
|
|
type: DirectoryOrCreate
|
|
|
|
|
name: etc-cni-netd
|
|
|
|
|
# To be able to load kernel modules
|
|
|
|
|
- hostPath:
|
|
|
|
|
path: /lib/modules
|
|
|
|
|
name: lib-modules
|
|
|
|
|
# To access iptables concurrently with other processes (e.g. kube-proxy)
|
|
|
|
|
- hostPath:
|
|
|
|
|
path: /run/xtables.lock
|
|
|
|
|
type: FileOrCreate
|
|
|
|
|
name: xtables-lock
|
|
|
|
|
# To read the clustermesh configuration
|
|
|
|
|
- name: clustermesh-secrets
|
|
|
|
|
secret:
|
|
|
|
|
defaultMode: 420
|
|
|
|
|
optional: true
|
|
|
|
|
secretName: cilium-clustermesh
|
|
|
|
|
# To read the configuration from the config map
|
|
|
|
|
- configMap:
|
|
|
|
|
name: cilium-config
|
|
|
|
|
name: cilium-config-path
|
|
|
|
|
updateStrategy:
|
|
|
|
|
rollingUpdate:
|
|
|
|
|
maxUnavailable: 2
|
|
|
|
|
type: RollingUpdate
|
|
|
|
|
---
|
|
|
|
|
# Source: cilium/charts/operator/templates/deployment.yaml
|
|
|
|
|
apiVersion: apps/v1
|
|
|
|
|
kind: Deployment
|
|
|
|
|
metadata:
|
|
|
|
|
labels:
|
|
|
|
|
io.cilium/app: operator
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
namespace: kube-system
|
|
|
|
|
spec:
|
|
|
|
|
replicas: 1
|
|
|
|
|
selector:
|
|
|
|
|
matchLabels:
|
|
|
|
|
io.cilium/app: operator
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
strategy:
|
|
|
|
|
rollingUpdate:
|
|
|
|
|
maxSurge: 1
|
|
|
|
|
maxUnavailable: 1
|
|
|
|
|
type: RollingUpdate
|
|
|
|
|
template:
|
|
|
|
|
metadata:
|
|
|
|
|
annotations:
|
|
|
|
|
labels:
|
|
|
|
|
io.cilium/app: operator
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
spec:
|
|
|
|
|
containers:
|
|
|
|
|
- args:
|
|
|
|
|
- --config-dir=/tmp/cilium/config-map
|
|
|
|
|
- --debug=$(CILIUM_DEBUG)
|
|
|
|
|
command:
|
|
|
|
|
- cilium-operator-generic
|
|
|
|
|
env:
|
|
|
|
|
- name: K8S_NODE_NAME
|
|
|
|
|
valueFrom:
|
|
|
|
|
fieldRef:
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
fieldPath: spec.nodeName
|
|
|
|
|
- name: CILIUM_K8S_NAMESPACE
|
|
|
|
|
valueFrom:
|
|
|
|
|
fieldRef:
|
|
|
|
|
apiVersion: v1
|
|
|
|
|
fieldPath: metadata.namespace
|
|
|
|
|
- name: CILIUM_DEBUG
|
|
|
|
|
valueFrom:
|
|
|
|
|
configMapKeyRef:
|
|
|
|
|
key: debug
|
|
|
|
|
name: cilium-config
|
|
|
|
|
optional: true
|
|
|
|
|
- name: AWS_ACCESS_KEY_ID
|
|
|
|
|
valueFrom:
|
|
|
|
|
secretKeyRef:
|
|
|
|
|
key: AWS_ACCESS_KEY_ID
|
|
|
|
|
name: cilium-aws
|
|
|
|
|
optional: true
|
|
|
|
|
- name: AWS_SECRET_ACCESS_KEY
|
|
|
|
|
valueFrom:
|
|
|
|
|
secretKeyRef:
|
|
|
|
|
key: AWS_SECRET_ACCESS_KEY
|
|
|
|
|
name: cilium-aws
|
|
|
|
|
optional: true
|
|
|
|
|
- name: AWS_DEFAULT_REGION
|
|
|
|
|
valueFrom:
|
|
|
|
|
secretKeyRef:
|
|
|
|
|
key: AWS_DEFAULT_REGION
|
|
|
|
|
name: cilium-aws
|
|
|
|
|
optional: true
|
|
|
|
|
image: "docker.io/cilium/operator-generic:v1.8.0"
|
|
|
|
|
imagePullPolicy: IfNotPresent
|
|
|
|
|
name: cilium-operator
|
|
|
|
|
livenessProbe:
|
|
|
|
|
httpGet:
|
|
|
|
|
host: '127.0.0.1'
|
|
|
|
|
path: /healthz
|
|
|
|
|
port: 9234
|
|
|
|
|
scheme: HTTP
|
|
|
|
|
initialDelaySeconds: 60
|
|
|
|
|
periodSeconds: 10
|
|
|
|
|
timeoutSeconds: 3
|
|
|
|
|
volumeMounts:
|
|
|
|
|
- mountPath: /tmp/cilium/config-map
|
|
|
|
|
name: cilium-config-path
|
|
|
|
|
readOnly: true
|
|
|
|
|
hostNetwork: true
|
|
|
|
|
restartPolicy: Always
|
|
|
|
|
priorityClassName: system-cluster-critical
|
|
|
|
|
serviceAccount: cilium-operator
|
|
|
|
|
serviceAccountName: cilium-operator
|
|
|
|
|
volumes:
|
|
|
|
|
# To read the configuration from the config map
|
|
|
|
|
- configMap:
|
|
|
|
|
name: cilium-config
|
|
|
|
|
name: cilium-config-path
|
|
|
|
|
`
|
|
|
|
|
|
|
|
|
|
// Cilium is the Cilium CNI manager
|
|
|
|
|
type Cilium struct {
|
|
|
|
|
cc config.ClusterConfig
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// String returns a string representation of this CNI
|
|
|
|
|
func (c Cilium) String() string {
|
|
|
|
|
return "Cilium"
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// Apply enables the CNI
|
|
|
|
|
func (c Cilium) Apply(r Runner) error {
|
|
|
|
|
// see https://kubernetes.io/docs/tasks/administer-cluster/network-policy-provider/cilium-network-policy/
|
|
|
|
|
if _, err := r.RunCmd(exec.Command("sudo", "/bin/bash", "-c", "grep 'bpffs /sys/fs/bpf' /proc/mounts || sudo mount bpffs -t bpf /sys/fs/bpf")); err != nil {
|
|
|
|
|
return errors.Wrap(err, "bpf mount")
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
return applyManifest(c.cc, r, manifestAsset([]byte(ciliumTmpl)))
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
// CIDR returns the default CIDR used by this CNI
|
|
|
|
|
func (c Cilium) CIDR() string {
|
|
|
|
|
return DefaultPodCIDR
|
|
|
|
|
}
|