Update calico to version 3.24.0
All checks were successful
continuous-integration/drone/push Build is passing
All checks were successful
continuous-integration/drone/push Build is passing
This commit is contained in:
parent
8e4129387e
commit
0de1caead0
30 changed files with 101 additions and 49 deletions
|
|
@ -1,5 +1,4 @@
|
||||||
# Source: calico/templates/kdd-crds.yaml
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
|
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -11,6 +10,7 @@ spec:
|
||||||
listKind: BGPConfigurationList
|
listKind: BGPConfigurationList
|
||||||
plural: bgpconfigurations
|
plural: bgpconfigurations
|
||||||
singular: bgpconfiguration
|
singular: bgpconfiguration
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -178,4 +178,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: BGPPeerList
|
listKind: BGPPeerList
|
||||||
plural: bgppeers
|
plural: bgppeers
|
||||||
singular: bgppeer
|
singular: bgppeer
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -115,4 +117,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: BlockAffinityList
|
listKind: BlockAffinityList
|
||||||
plural: blockaffinities
|
plural: blockaffinities
|
||||||
singular: blockaffinity
|
singular: blockaffinity
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -57,4 +59,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -51,4 +51,3 @@ data:
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,4 @@
|
||||||
# Source: calico/templates/calico-kube-controllers-rbac.yaml
|
# Source: calico/templates/calico-kube-controllers-rbac.yaml
|
||||||
|
|
||||||
# Include a clusterrole for the kube-controllers component,
|
# Include a clusterrole for the kube-controllers component,
|
||||||
# and bind it to the calico-kube-controllers serviceaccount.
|
# and bind it to the calico-kube-controllers serviceaccount.
|
||||||
kind: ClusterRole
|
kind: ClusterRole
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/calico-kube-controllers-rbac.yaml
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
metadata:
|
metadata:
|
||||||
|
|
|
||||||
|
|
@ -30,11 +30,14 @@ spec:
|
||||||
operator: Exists
|
operator: Exists
|
||||||
- key: node-role.kubernetes.io/master
|
- key: node-role.kubernetes.io/master
|
||||||
effect: NoSchedule
|
effect: NoSchedule
|
||||||
|
- key: node-role.kubernetes.io/control-plane
|
||||||
|
effect: NoSchedule
|
||||||
serviceAccountName: calico-kube-controllers
|
serviceAccountName: calico-kube-controllers
|
||||||
priorityClassName: system-cluster-critical
|
priorityClassName: system-cluster-critical
|
||||||
containers:
|
containers:
|
||||||
- name: calico-kube-controllers
|
- name: calico-kube-controllers
|
||||||
image: docker.io/calico/kube-controllers:v3.23.3
|
image: docker.io/calico/kube-controllers:v3.24.0
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
env:
|
env:
|
||||||
# Choose which controllers to run.
|
# Choose which controllers to run.
|
||||||
- name: ENABLED_CONTROLLERS
|
- name: ENABLED_CONTROLLERS
|
||||||
|
|
@ -56,4 +59,3 @@ spec:
|
||||||
- /usr/bin/check-status
|
- /usr/bin/check-status
|
||||||
- -r
|
- -r
|
||||||
periodSeconds: 10
|
periodSeconds: 10
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
|
# Source: calico/templates/calico-kube-controllers.yaml
|
||||||
# This manifest creates a Pod Disruption Budget for Controller to allow K8s Cluster Autoscaler to evict
|
# This manifest creates a Pod Disruption Budget for Controller to allow K8s Cluster Autoscaler to evict
|
||||||
|
|
||||||
apiVersion: policy/v1
|
apiVersion: policy/v1
|
||||||
|
|
@ -13,4 +13,3 @@ spec:
|
||||||
selector:
|
selector:
|
||||||
matchLabels:
|
matchLabels:
|
||||||
k8s-app: calico-kube-controllers
|
k8s-app: calico-kube-controllers
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,6 @@
|
||||||
|
# Source: calico/templates/calico-kube-controllers.yaml
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
metadata:
|
metadata:
|
||||||
name: calico-kube-controllers
|
name: calico-kube-controllers
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -143,11 +143,14 @@ rules:
|
||||||
- create
|
- create
|
||||||
- update
|
- update
|
||||||
- delete
|
- delete
|
||||||
|
# The CNI plugin and calico/node need to be able to create a default
|
||||||
|
# IPAMConfiguration
|
||||||
- apiGroups: ["crd.projectcalico.org"]
|
- apiGroups: ["crd.projectcalico.org"]
|
||||||
resources:
|
resources:
|
||||||
- ipamconfigs
|
- ipamconfigs
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
|
- create
|
||||||
# Block affinities must also be watchable by confd for route aggregation.
|
# Block affinities must also be watchable by confd for route aggregation.
|
||||||
- apiGroups: ["crd.projectcalico.org"]
|
- apiGroups: ["crd.projectcalico.org"]
|
||||||
resources:
|
resources:
|
||||||
|
|
@ -161,4 +164,3 @@ rules:
|
||||||
- daemonsets
|
- daemonsets
|
||||||
verbs:
|
verbs:
|
||||||
- get
|
- get
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/calico-node-rbac.yaml
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
kind: ClusterRoleBinding
|
kind: ClusterRoleBinding
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -10,4 +11,3 @@ subjects:
|
||||||
- kind: ServiceAccount
|
- kind: ServiceAccount
|
||||||
name: calico-node
|
name: calico-node
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -44,7 +44,8 @@ spec:
|
||||||
# It can be deleted if this is a fresh installation, or if you have already
|
# It can be deleted if this is a fresh installation, or if you have already
|
||||||
# upgraded to use calico-ipam.
|
# upgraded to use calico-ipam.
|
||||||
- name: upgrade-ipam
|
- name: upgrade-ipam
|
||||||
image: docker.io/calico/cni:v3.23.3
|
image: docker.io/calico/cni:v3.24.0
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
command: ["/opt/cni/bin/calico-ipam", "-upgrade"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
|
@ -71,7 +72,8 @@ spec:
|
||||||
# This container installs the CNI binaries
|
# This container installs the CNI binaries
|
||||||
# and CNI network config file on each node.
|
# and CNI network config file on each node.
|
||||||
- name: install-cni
|
- name: install-cni
|
||||||
image: docker.io/calico/cni:v3.23.3
|
image: docker.io/calico/cni:v3.24.0
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
command: ["/opt/cni/bin/install"]
|
command: ["/opt/cni/bin/install"]
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
|
|
@ -113,7 +115,8 @@ spec:
|
||||||
# i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed
|
# i.e. bpf at /sys/fs/bpf and cgroup2 at /run/calico/cgroup. Calico-node initialisation is executed
|
||||||
# in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode.
|
# in best effort fashion, i.e. no failure for errors, to not disrupt pod creation in iptable mode.
|
||||||
- name: "mount-bpffs"
|
- name: "mount-bpffs"
|
||||||
image: docker.io/calico/node:v3.23.3
|
image: docker.io/calico/node:v3.24.0
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
command: ["calico-node", "-init", "-best-effort"]
|
command: ["calico-node", "-init", "-best-effort"]
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- mountPath: /sys/fs
|
- mountPath: /sys/fs
|
||||||
|
|
@ -138,7 +141,8 @@ spec:
|
||||||
# container programs network policy and routes on each
|
# container programs network policy and routes on each
|
||||||
# host.
|
# host.
|
||||||
- name: calico-node
|
- name: calico-node
|
||||||
image: docker.io/calico/node:v3.23.3
|
image: docker.io/calico/node:v3.24.0
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
envFrom:
|
envFrom:
|
||||||
- configMapRef:
|
- configMapRef:
|
||||||
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
# Allow KUBERNETES_SERVICE_HOST and KUBERNETES_SERVICE_PORT to be overridden for eBPF mode.
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,6 @@
|
||||||
|
# Source: calico/templates/calico-node.yaml
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
metadata:
|
metadata:
|
||||||
name: calico-node
|
name: calico-node
|
||||||
namespace: kube-system
|
namespace: kube-system
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -11,7 +11,7 @@ spec:
|
||||||
serviceAccountName: calicoctl
|
serviceAccountName: calicoctl
|
||||||
containers:
|
containers:
|
||||||
- name: calicoctl
|
- name: calicoctl
|
||||||
image: calico/ctl:v3.23.3
|
image: calico/ctl:v3.24.0
|
||||||
command:
|
command:
|
||||||
- /calicoctl
|
- /calicoctl
|
||||||
args:
|
args:
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,7 @@
|
||||||
# Calico Version v3.23.3
|
# Calico Version master
|
||||||
# https://projectcalico.docs.tigera.io/releases#v3.23.3
|
# https://projectcalico.docs.tigera.io/releases#master
|
||||||
# This manifest includes the following component versions:
|
# This manifest includes the following component versions:
|
||||||
# calico/ctl:v3.23.3
|
# calico/ctl:v3.24.0
|
||||||
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: ServiceAccount
|
kind: ServiceAccount
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -12,6 +13,7 @@ spec:
|
||||||
listKind: CalicoNodeStatusList
|
listKind: CalicoNodeStatusList
|
||||||
plural: caliconodestatuses
|
plural: caliconodestatuses
|
||||||
singular: caliconodestatus
|
singular: caliconodestatus
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -259,4 +261,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: ClusterInformationList
|
listKind: ClusterInformationList
|
||||||
plural: clusterinformations
|
plural: clusterinformations
|
||||||
singular: clusterinformation
|
singular: clusterinformation
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -60,4 +62,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: FelixConfigurationList
|
listKind: FelixConfigurationList
|
||||||
plural: felixconfigurations
|
plural: felixconfigurations
|
||||||
singular: felixconfiguration
|
singular: felixconfiguration
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -86,7 +88,7 @@ spec:
|
||||||
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
|
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
|
||||||
mark that is set on connections from an external client to a local
|
mark that is set on connections from an external client to a local
|
||||||
service. This mark allows us to control how packets of that connection
|
service. This mark allows us to control how packets of that connection
|
||||||
are routed within the host and how is routing intepreted by RPF
|
are routed within the host and how is routing interpreted by RPF
|
||||||
check. [Default: 0]'
|
check. [Default: 0]'
|
||||||
type: integer
|
type: integer
|
||||||
bpfExternalServiceMode:
|
bpfExternalServiceMode:
|
||||||
|
|
@ -134,6 +136,11 @@ spec:
|
||||||
policy. Selectors such as "all()" can result in large numbers of
|
policy. Selectors such as "all()" can result in large numbers of
|
||||||
entries (one entry per endpoint in that case).
|
entries (one entry per endpoint in that case).
|
||||||
type: integer
|
type: integer
|
||||||
|
bpfMapSizeIfState:
|
||||||
|
description: BPFMapSizeIfState sets the size for ifstate map. The
|
||||||
|
ifstate map must be large enough to hold an entry for each device
|
||||||
|
(host + workloads) on a host.
|
||||||
|
type: integer
|
||||||
bpfMapSizeNATAffinity:
|
bpfMapSizeNATAffinity:
|
||||||
type: integer
|
type: integer
|
||||||
bpfMapSizeNATBackend:
|
bpfMapSizeNATBackend:
|
||||||
|
|
@ -166,6 +173,11 @@ spec:
|
||||||
are inclusive. [Default: 20000:29999]'
|
are inclusive. [Default: 20000:29999]'
|
||||||
pattern: ^.*
|
pattern: ^.*
|
||||||
x-kubernetes-int-or-string: true
|
x-kubernetes-int-or-string: true
|
||||||
|
bpfPolicyDebugEnabled:
|
||||||
|
description: BPFPolicyDebugEnabled when true, Felix records detailed
|
||||||
|
information about the BPF policy programs, which can be examined
|
||||||
|
with the calico-bpf command-line tool.
|
||||||
|
type: boolean
|
||||||
chainInsertMode:
|
chainInsertMode:
|
||||||
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
|
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
|
||||||
top-level iptables chains by inserting a rule at the top of the
|
top-level iptables chains by inserting a rule at the top of the
|
||||||
|
|
@ -295,7 +307,6 @@ spec:
|
||||||
are auto-detected.
|
are auto-detected.
|
||||||
type: string
|
type: string
|
||||||
floatingIPs:
|
floatingIPs:
|
||||||
default: Disabled
|
|
||||||
description: FloatingIPs configures whether or not Felix will program
|
description: FloatingIPs configures whether or not Felix will program
|
||||||
floating IP addresses.
|
floating IP addresses.
|
||||||
enum:
|
enum:
|
||||||
|
|
@ -557,6 +568,10 @@ spec:
|
||||||
information. - WorkloadIPs: use workload endpoints to construct
|
information. - WorkloadIPs: use workload endpoints to construct
|
||||||
routes. - CalicoIPAM: the default - use IPAM data to construct routes.'
|
routes. - CalicoIPAM: the default - use IPAM data to construct routes.'
|
||||||
type: string
|
type: string
|
||||||
|
routeSyncDisabled:
|
||||||
|
description: RouteSyncDisabled will disable all operations performed
|
||||||
|
on the route table. Set to true to run in network-policy mode only.
|
||||||
|
type: boolean
|
||||||
routeTableRange:
|
routeTableRange:
|
||||||
description: Deprecated in favor of RouteTableRanges. Calico programs
|
description: Deprecated in favor of RouteTableRanges. Calico programs
|
||||||
additional Linux route tables for various purposes. RouteTableRange
|
additional Linux route tables for various purposes. RouteTableRange
|
||||||
|
|
@ -634,7 +649,13 @@ spec:
|
||||||
vxlanVNI:
|
vxlanVNI:
|
||||||
type: integer
|
type: integer
|
||||||
wireguardEnabled:
|
wireguardEnabled:
|
||||||
description: 'WireguardEnabled controls whether Wireguard is enabled.
|
description: 'WireguardEnabled controls whether Wireguard is enabled
|
||||||
|
for IPv4 (encapsulating IPv4 traffic over an IPv4 underlay network).
|
||||||
|
[Default: false]'
|
||||||
|
type: boolean
|
||||||
|
wireguardEnabledV6:
|
||||||
|
description: 'WireguardEnabledV6 controls whether Wireguard is enabled
|
||||||
|
for IPv6 (encapsulating IPv6 traffic over an IPv6 underlay network).
|
||||||
[Default: false]'
|
[Default: false]'
|
||||||
type: boolean
|
type: boolean
|
||||||
wireguardHostEncryptionEnabled:
|
wireguardHostEncryptionEnabled:
|
||||||
|
|
@ -643,7 +664,11 @@ spec:
|
||||||
type: boolean
|
type: boolean
|
||||||
wireguardInterfaceName:
|
wireguardInterfaceName:
|
||||||
description: 'WireguardInterfaceName specifies the name to use for
|
description: 'WireguardInterfaceName specifies the name to use for
|
||||||
the Wireguard interface. [Default: wg.calico]'
|
the IPv4 Wireguard interface. [Default: wireguard.cali]'
|
||||||
|
type: string
|
||||||
|
wireguardInterfaceNameV6:
|
||||||
|
description: 'WireguardInterfaceNameV6 specifies the name to use for
|
||||||
|
the IPv6 Wireguard interface. [Default: wg-v6.cali]'
|
||||||
type: string
|
type: string
|
||||||
wireguardKeepAlive:
|
wireguardKeepAlive:
|
||||||
description: 'WireguardKeepAlive controls Wireguard PersistentKeepalive
|
description: 'WireguardKeepAlive controls Wireguard PersistentKeepalive
|
||||||
|
|
@ -651,11 +676,19 @@ spec:
|
||||||
type: string
|
type: string
|
||||||
wireguardListeningPort:
|
wireguardListeningPort:
|
||||||
description: 'WireguardListeningPort controls the listening port used
|
description: 'WireguardListeningPort controls the listening port used
|
||||||
by Wireguard. [Default: 51820]'
|
by IPv4 Wireguard. [Default: 51820]'
|
||||||
|
type: integer
|
||||||
|
wireguardListeningPortV6:
|
||||||
|
description: 'WireguardListeningPortV6 controls the listening port
|
||||||
|
used by IPv6 Wireguard. [Default: 51821]'
|
||||||
type: integer
|
type: integer
|
||||||
wireguardMTU:
|
wireguardMTU:
|
||||||
description: 'WireguardMTU controls the MTU on the Wireguard interface.
|
description: 'WireguardMTU controls the MTU on the IPv4 Wireguard
|
||||||
See Configuring MTU [Default: 1420]'
|
interface. See Configuring MTU [Default: 1440]'
|
||||||
|
type: integer
|
||||||
|
wireguardMTUV6:
|
||||||
|
description: 'WireguardMTUV6 controls the MTU on the IPv6 Wireguard
|
||||||
|
interface. See Configuring MTU [Default: 1420]'
|
||||||
type: integer
|
type: integer
|
||||||
wireguardRoutingRulePriority:
|
wireguardRoutingRulePriority:
|
||||||
description: 'WireguardRoutingRulePriority controls the priority value
|
description: 'WireguardRoutingRulePriority controls the priority value
|
||||||
|
|
@ -687,4 +720,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: GlobalNetworkPolicyList
|
listKind: GlobalNetworkPolicyList
|
||||||
plural: globalnetworkpolicies
|
plural: globalnetworkpolicies
|
||||||
singular: globalnetworkpolicy
|
singular: globalnetworkpolicy
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -851,4 +853,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: GlobalNetworkSetList
|
listKind: GlobalNetworkSetList
|
||||||
plural: globalnetworksets
|
plural: globalnetworksets
|
||||||
singular: globalnetworkset
|
singular: globalnetworkset
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -49,4 +51,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: HostEndpointList
|
listKind: HostEndpointList
|
||||||
plural: hostendpoints
|
plural: hostendpoints
|
||||||
singular: hostendpoint
|
singular: hostendpoint
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -104,4 +106,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: IPAMBlockList
|
listKind: IPAMBlockList
|
||||||
plural: ipamblocks
|
plural: ipamblocks
|
||||||
singular: ipamblock
|
singular: ipamblock
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -115,4 +117,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: IPAMConfigList
|
listKind: IPAMConfigList
|
||||||
plural: ipamconfigs
|
plural: ipamconfigs
|
||||||
singular: ipamconfig
|
singular: ipamconfig
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -36,6 +38,8 @@ spec:
|
||||||
maxBlocksPerHost:
|
maxBlocksPerHost:
|
||||||
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
|
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
|
||||||
that can be affine to each host.
|
that can be affine to each host.
|
||||||
|
maximum: 2147483647
|
||||||
|
minimum: 0
|
||||||
type: integer
|
type: integer
|
||||||
strictAffinity:
|
strictAffinity:
|
||||||
type: boolean
|
type: boolean
|
||||||
|
|
@ -52,4 +56,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: IPAMHandleList
|
listKind: IPAMHandleList
|
||||||
plural: ipamhandles
|
plural: ipamhandles
|
||||||
singular: ipamhandle
|
singular: ipamhandle
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -52,4 +54,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: IPPoolList
|
listKind: IPPoolList
|
||||||
plural: ippools
|
plural: ippools
|
||||||
singular: ippool
|
singular: ippool
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -105,4 +107,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -12,6 +13,7 @@ spec:
|
||||||
listKind: IPReservationList
|
listKind: IPReservationList
|
||||||
plural: ipreservations
|
plural: ipreservations
|
||||||
singular: ipreservation
|
singular: ipreservation
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -50,4 +52,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: KubeControllersConfigurationList
|
listKind: KubeControllersConfigurationList
|
||||||
plural: kubecontrollersconfigurations
|
plural: kubecontrollersconfigurations
|
||||||
singular: kubecontrollersconfiguration
|
singular: kubecontrollersconfiguration
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Cluster
|
scope: Cluster
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -249,4 +251,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: NetworkPolicyList
|
listKind: NetworkPolicyList
|
||||||
plural: networkpolicies
|
plural: networkpolicies
|
||||||
singular: networkpolicy
|
singular: networkpolicy
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Namespaced
|
scope: Namespaced
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -832,4 +834,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,3 +1,4 @@
|
||||||
|
# Source: calico/templates/kdd-crds.yaml
|
||||||
apiVersion: apiextensions.k8s.io/v1
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
kind: CustomResourceDefinition
|
kind: CustomResourceDefinition
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -9,6 +10,7 @@ spec:
|
||||||
listKind: NetworkSetList
|
listKind: NetworkSetList
|
||||||
plural: networksets
|
plural: networksets
|
||||||
singular: networkset
|
singular: networkset
|
||||||
|
preserveUnknownFields: false
|
||||||
scope: Namespaced
|
scope: Namespaced
|
||||||
versions:
|
versions:
|
||||||
- name: v1
|
- name: v1
|
||||||
|
|
@ -47,4 +49,3 @@ status:
|
||||||
plural: ""
|
plural: ""
|
||||||
conditions: []
|
conditions: []
|
||||||
storedVersions: []
|
storedVersions: []
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,8 @@
|
||||||
---
|
---
|
||||||
calico_files:
|
calico_files:
|
||||||
|
- "calico-kube-controllers-PodDisruptionBudget.yaml"
|
||||||
|
- "calico-kube-controllers-ServiceAccount.yaml"
|
||||||
|
- "calico-node-ServiceAccount.yaml"
|
||||||
- "calico-config-ConfigMap.yaml"
|
- "calico-config-ConfigMap.yaml"
|
||||||
- "bgpconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "bgpconfigurations.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "bgppeers.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
|
|
@ -19,14 +22,11 @@ calico_files:
|
||||||
- "networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "networkpolicies.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "networksets.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
- "networksets.crd.projectcalico.org-CustomResourceDefinition.yaml"
|
||||||
- "calico-kube-controllers-ClusterRole.yaml"
|
- "calico-kube-controllers-ClusterRole.yaml"
|
||||||
- "calico-kube-controllers-ClusterRoleBinding.yaml"
|
|
||||||
- "calico-node-ClusterRole.yaml"
|
- "calico-node-ClusterRole.yaml"
|
||||||
|
- "calico-kube-controllers-ClusterRoleBinding.yaml"
|
||||||
- "calico-node-ClusterRoleBinding.yaml"
|
- "calico-node-ClusterRoleBinding.yaml"
|
||||||
- "calico-node-DaemonSet.yaml"
|
- "calico-node-DaemonSet.yaml"
|
||||||
- "calico-node-ServiceAccount.yaml"
|
|
||||||
- "calico-kube-controllers-Deployment.yaml"
|
- "calico-kube-controllers-Deployment.yaml"
|
||||||
- "calico-kube-controllers-ServiceAccount.yaml"
|
|
||||||
- "calico-kube-controllers-PodDisruptionBudget.yaml"
|
|
||||||
|
|
||||||
calicoctl_files:
|
calicoctl_files:
|
||||||
- "calicoctl-ServiceAccount.yaml"
|
- "calicoctl-ServiceAccount.yaml"
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue