Update metrics-server from upstream

This commit is contained in:
Adrien Reslinger 2021-05-07 23:46:01 +02:00
parent a70fe74a66
commit dfe3f3a60e
Signed by: adrien
GPG key ID: DA7B27055C66D6DE
12 changed files with 82 additions and 42 deletions

View file

@ -2,7 +2,7 @@
METRICS_SERVER_FILE="vars/metrics_server_files_list.yml" METRICS_SERVER_FILE="vars/metrics_server_files_list.yml"
wget https://github.com/kubernetes-sigs/metrics-server/releases/download/v0.3.6/components.yaml wget https://github.com/kubernetes-sigs/metrics-server/releases/download/v0.4.4/components.yaml
kubernetes-split-yaml components.yaml > generated.log kubernetes-split-yaml components.yaml > generated.log
rm -f files/*.yaml rm -f files/*.yaml
mv generated/*.yaml files/ mv generated/*.yaml files/
@ -10,3 +10,4 @@ echo -e "---\nmetrics_server_files:" > "${METRICS_SERVER_FILE}"
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "\2"|' >> "${METRICS_SERVER_FILE}" cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "\2"|' >> "${METRICS_SERVER_FILE}"
rm -fr generated generated.log components.yaml rm -fr generated generated.log components.yaml
sed '/ args:/ a\ - --kubelet-insecure-tls' -i files/metrics-server-Deployment.yaml

View file

@ -1 +1,3 @@
my_context: minikube my_context: minikube
metrics_server_version: "v0.4.4"
metrics_server_url: "https://github.com/kubernetes-sigs/metrics-server/releases/download/{{ metrics_server_version }}/components.yaml"

View file

@ -1,43 +1,61 @@
apiVersion: apps/v1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: metrics-server
namespace: kube-system
labels: labels:
k8s-app: metrics-server k8s-app: metrics-server
name: metrics-server
namespace: kube-system
spec: spec:
selector: selector:
matchLabels: matchLabels:
k8s-app: metrics-server k8s-app: metrics-server
strategy:
rollingUpdate:
maxUnavailable: 0
template: template:
metadata: metadata:
name: metrics-server
labels: labels:
k8s-app: metrics-server k8s-app: metrics-server
spec: spec:
serviceAccountName: metrics-server
volumes:
# mount in tmp so we can safely use from-scratch images and/or read-only containers
- name: tmp-dir
emptyDir: {}
containers: containers:
- name: metrics-server - args:
image: k8s.gcr.io/metrics-server-amd64:v0.3.6 - --kubelet-insecure-tls
imagePullPolicy: IfNotPresent
args:
- --cert-dir=/tmp - --cert-dir=/tmp
- --secure-port=4443 - --secure-port=4443
- --kubelet-preferred-address-types=InternalIP,ExternalIP,Hostname
- --kubelet-use-node-status-port
image: k8s.gcr.io/metrics-server/metrics-server:v0.4.4
imagePullPolicy: IfNotPresent
livenessProbe:
failureThreshold: 3
httpGet:
path: /livez
port: https
scheme: HTTPS
periodSeconds: 10
name: metrics-server
ports: ports:
- name: main-port - containerPort: 4443
containerPort: 4443 name: https
protocol: TCP protocol: TCP
readinessProbe:
failureThreshold: 3
httpGet:
path: /readyz
port: https
scheme: HTTPS
periodSeconds: 10
securityContext: securityContext:
readOnlyRootFilesystem: true readOnlyRootFilesystem: true
runAsNonRoot: true runAsNonRoot: true
runAsUser: 1000 runAsUser: 1000
volumeMounts: volumeMounts:
- name: tmp-dir - mountPath: /tmp
mountPath: /tmp name: tmp-dir
nodeSelector: nodeSelector:
kubernetes.io/os: linux kubernetes.io/os: linux
kubernetes.io/arch: "amd64" priorityClassName: system-cluster-critical
serviceAccountName: metrics-server
volumes:
- emptyDir: {}
name: tmp-dir

View file

@ -1,15 +1,15 @@
apiVersion: v1 apiVersion: v1
kind: Service kind: Service
metadata: metadata:
labels:
k8s-app: metrics-server
name: metrics-server name: metrics-server
namespace: kube-system namespace: kube-system
labels:
kubernetes.io/name: "Metrics-server"
kubernetes.io/cluster-service: "true"
spec: spec:
ports:
- name: https
port: 443
protocol: TCP
targetPort: https
selector: selector:
k8s-app: metrics-server k8s-app: metrics-server
ports:
- port: 443
protocol: TCP
targetPort: main-port

View file

@ -1,5 +1,7 @@
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
labels:
k8s-app: metrics-server
name: metrics-server name: metrics-server
namespace: kube-system namespace: kube-system

View file

@ -1,6 +1,8 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding kind: RoleBinding
metadata: metadata:
labels:
k8s-app: metrics-server
name: metrics-server-auth-reader name: metrics-server-auth-reader
namespace: kube-system namespace: kube-system
roleRef: roleRef:

View file

@ -1,6 +1,8 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels:
k8s-app: metrics-server
name: metrics-server:system:auth-delegator name: metrics-server:system:auth-delegator
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io

View file

@ -1,12 +1,19 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
name: system:aggregated-metrics-reader
labels: labels:
rbac.authorization.k8s.io/aggregate-to-view: "true" k8s-app: metrics-server
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true" rbac.authorization.k8s.io/aggregate-to-admin: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-view: "true"
name: system:aggregated-metrics-reader
rules: rules:
- apiGroups: ["metrics.k8s.io"] - apiGroups:
resources: ["pods", "nodes"] - metrics.k8s.io
verbs: ["get", "list", "watch"] resources:
- pods
- nodes
verbs:
- get
- list
- watch

View file

@ -1,6 +1,8 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole kind: ClusterRole
metadata: metadata:
labels:
k8s-app: metrics-server
name: system:metrics-server name: system:metrics-server
rules: rules:
- apiGroups: - apiGroups:

View file

@ -1,6 +1,8 @@
apiVersion: rbac.authorization.k8s.io/v1 apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding kind: ClusterRoleBinding
metadata: metadata:
labels:
k8s-app: metrics-server
name: system:metrics-server name: system:metrics-server
roleRef: roleRef:
apiGroup: rbac.authorization.k8s.io apiGroup: rbac.authorization.k8s.io

View file

@ -1,13 +1,15 @@
apiVersion: apiregistration.k8s.io/v1beta1 apiVersion: apiregistration.k8s.io/v1
kind: APIService kind: APIService
metadata: metadata:
labels:
k8s-app: metrics-server
name: v1beta1.metrics.k8s.io name: v1beta1.metrics.k8s.io
spec: spec:
group: metrics.k8s.io
groupPriorityMinimum: 100
insecureSkipTLSVerify: true
service: service:
name: metrics-server name: metrics-server
namespace: kube-system namespace: kube-system
group: metrics.k8s.io
version: v1beta1 version: v1beta1
insecureSkipTLSVerify: true
groupPriorityMinimum: 100
versionPriority: 100 versionPriority: 100

View file

@ -1,11 +1,11 @@
--- ---
metrics_server_files: metrics_server_files:
- "system:aggregated-metrics-reader-ClusterRole.yaml"
- "metrics-server:system:auth-delegator-ClusterRoleBinding.yaml"
- "metrics-server-auth-reader-RoleBinding.yaml"
- "v1beta1.metrics.k8s.io-APIService.yaml"
- "metrics-server-ServiceAccount.yaml" - "metrics-server-ServiceAccount.yaml"
- "metrics-server-Deployment.yaml" - "system:aggregated-metrics-reader-ClusterRole.yaml"
- "metrics-server-Service.yaml"
- "system:metrics-server-ClusterRole.yaml" - "system:metrics-server-ClusterRole.yaml"
- "metrics-server-auth-reader-RoleBinding.yaml"
- "metrics-server:system:auth-delegator-ClusterRoleBinding.yaml"
- "system:metrics-server-ClusterRoleBinding.yaml" - "system:metrics-server-ClusterRoleBinding.yaml"
- "metrics-server-Service.yaml"
- "metrics-server-Deployment.yaml"
- "v1beta1.metrics.k8s.io-APIService.yaml"