2015-12-11 18:52:20 +08:00
|
|
|
apiVersion: v1
|
|
|
|
kind: Pod
|
|
|
|
metadata:
|
|
|
|
name: kube-apiserver
|
2018-03-30 19:29:13 +08:00
|
|
|
namespace: kube-system
|
2016-11-09 21:15:27 +08:00
|
|
|
labels:
|
|
|
|
k8s-app: kube-apiserver
|
2017-06-17 01:25:46 +08:00
|
|
|
kubespray: v2
|
2017-09-01 14:02:23 +08:00
|
|
|
annotations:
|
2017-09-14 02:00:51 +08:00
|
|
|
kubespray.etcd-cert/serial: "{{ etcd_client_cert_serial }}"
|
2017-09-01 14:02:23 +08:00
|
|
|
kubespray.apiserver-cert/serial: "{{ apiserver_cert_serial }}"
|
2015-12-11 18:52:20 +08:00
|
|
|
spec:
|
|
|
|
hostNetwork: true
|
2017-03-28 22:33:07 +08:00
|
|
|
{% if kube_version | version_compare('v1.6', '>=') %}
|
2017-04-20 17:07:34 +08:00
|
|
|
dnsPolicy: ClusterFirst
|
2018-09-25 22:50:22 +08:00
|
|
|
{% endif %}
|
|
|
|
{% if kube_version|version_compare('v1.11.1', '>=') %}
|
|
|
|
priorityClassName: system-node-critical
|
2017-03-28 22:33:07 +08:00
|
|
|
{% endif %}
|
2015-12-11 18:52:20 +08:00
|
|
|
containers:
|
|
|
|
- name: kube-apiserver
|
2015-12-14 16:54:58 +08:00
|
|
|
image: {{ hyperkube_image_repo }}:{{ hyperkube_image_tag }}
|
2016-11-22 23:16:04 +08:00
|
|
|
imagePullPolicy: {{ k8s_image_pull_policy }}
|
2016-12-23 22:44:44 +08:00
|
|
|
resources:
|
|
|
|
limits:
|
|
|
|
cpu: {{ kube_apiserver_cpu_limit }}
|
|
|
|
memory: {{ kube_apiserver_memory_limit }}
|
|
|
|
requests:
|
|
|
|
cpu: {{ kube_apiserver_cpu_requests }}
|
|
|
|
memory: {{ kube_apiserver_memory_requests }}
|
2015-12-11 18:52:20 +08:00
|
|
|
command:
|
|
|
|
- /hyperkube
|
|
|
|
- apiserver
|
2018-08-15 16:41:13 +08:00
|
|
|
{% if kubernetes_audit %}
|
|
|
|
- --audit-log-path={{ audit_log_path }}
|
|
|
|
- --audit-log-maxage={{ audit_log_maxage }}
|
|
|
|
- --audit-log-maxbackup={{ audit_log_maxbackups }}
|
|
|
|
- --audit-log-maxsize={{ audit_log_maxsize }}
|
2018-09-19 16:01:45 +08:00
|
|
|
- --audit-policy-file={{ audit_policy_file }}
|
2018-08-15 16:41:13 +08:00
|
|
|
{% endif %}
|
2016-05-23 02:44:17 +08:00
|
|
|
- --advertise-address={{ ip | default(ansible_default_ipv4.address) }}
|
2017-10-04 20:27:55 +08:00
|
|
|
- --etcd-servers={{ etcd_access_addresses }}
|
2018-06-18 21:19:12 +08:00
|
|
|
{% if etcd_events_cluster_enabled %}
|
2018-10-16 22:25:03 +08:00
|
|
|
- --etcd-servers-overrides=/events#{{ etcd_events_access_addresses_semicolon }}
|
2018-03-01 16:39:14 +08:00
|
|
|
{% endif %}
|
2018-02-01 04:49:52 +08:00
|
|
|
{% if kube_version | version_compare('v1.9', '<') %}
|
2016-10-04 23:31:42 +08:00
|
|
|
- --etcd-quorum-read=true
|
2018-02-01 04:49:52 +08:00
|
|
|
{% endif %}
|
2016-11-09 18:44:41 +08:00
|
|
|
- --etcd-cafile={{ etcd_cert_dir }}/ca.pem
|
2016-12-13 17:03:35 +08:00
|
|
|
- --etcd-certfile={{ etcd_cert_dir }}/node-{{ inventory_hostname }}.pem
|
|
|
|
- --etcd-keyfile={{ etcd_cert_dir }}/node-{{ inventory_hostname }}-key.pem
|
2018-09-12 14:22:11 +08:00
|
|
|
{% if kube_apiserver_insecure_port|string != "0" %}
|
2016-07-13 23:13:47 +08:00
|
|
|
- --insecure-bind-address={{ kube_apiserver_insecure_bind_address }}
|
2018-09-12 14:22:11 +08:00
|
|
|
{% endif %}
|
2017-11-29 23:24:02 +08:00
|
|
|
- --bind-address={{ kube_apiserver_bind_address }}
|
2016-07-13 23:13:47 +08:00
|
|
|
- --apiserver-count={{ kube_apiserver_count }}
|
2018-03-20 20:19:53 +08:00
|
|
|
{% if kube_version | version_compare('v1.9', '>=') %}
|
2018-03-20 20:06:34 +08:00
|
|
|
- --endpoint-reconciler-type=lease
|
2018-03-20 20:19:53 +08:00
|
|
|
{% endif %}
|
2018-08-03 02:10:40 +08:00
|
|
|
{% if kube_version | version_compare('v1.10', '<') %}
|
2017-04-17 10:03:45 +08:00
|
|
|
- --admission-control={{ kube_apiserver_admission_control | join(',') }}
|
2018-08-03 02:10:40 +08:00
|
|
|
{% else %}
|
2018-08-07 02:50:48 +08:00
|
|
|
{% if kube_apiserver_enable_admission_plugins|length > 0 %}
|
2018-09-19 16:01:45 +08:00
|
|
|
- --enable-admission-plugins={{ kube_apiserver_enable_admission_plugins | join(',') }}
|
2018-08-07 02:50:48 +08:00
|
|
|
{% endif %}
|
|
|
|
{% if kube_apiserver_disable_admission_plugins|length > 0 %}
|
2018-09-19 16:01:45 +08:00
|
|
|
- --disable-admission-plugins={{ kube_apiserver_disable_admission_plugins | join(',') }}
|
2018-08-07 02:50:48 +08:00
|
|
|
{% endif %}
|
2018-08-03 02:10:40 +08:00
|
|
|
{% endif %}
|
2015-12-11 18:52:20 +08:00
|
|
|
- --service-cluster-ip-range={{ kube_service_addresses }}
|
2016-11-18 20:56:55 +08:00
|
|
|
- --service-node-port-range={{ kube_apiserver_node_port_range }}
|
2015-12-11 18:52:20 +08:00
|
|
|
- --client-ca-file={{ kube_cert_dir }}/ca.pem
|
2018-09-19 16:01:45 +08:00
|
|
|
- --profiling={{ kube_profiling }}
|
2017-10-16 03:41:17 +08:00
|
|
|
- --repair-malformed-updates=false
|
|
|
|
- --kubelet-client-certificate={{ kube_cert_dir }}/node-{{ inventory_hostname }}.pem
|
|
|
|
- --kubelet-client-key={{ kube_cert_dir }}/node-{{ inventory_hostname }}-key.pem
|
|
|
|
- --service-account-lookup=true
|
2017-07-12 15:51:12 +08:00
|
|
|
- --kubelet-preferred-address-types={{ kubelet_preferred_address_types }}
|
2018-09-24 17:17:18 +08:00
|
|
|
- --request-timeout={{ kube_apiserver_request_timeout }}
|
2017-02-27 21:15:50 +08:00
|
|
|
{% if kube_basic_auth|default(true) %}
|
2015-12-11 18:52:20 +08:00
|
|
|
- --basic-auth-file={{ kube_users_dir }}/known_users.csv
|
2017-02-27 21:15:50 +08:00
|
|
|
{% endif %}
|
2017-01-13 19:03:20 +08:00
|
|
|
- --tls-cert-file={{ kube_cert_dir }}/apiserver.pem
|
|
|
|
- --tls-private-key-file={{ kube_cert_dir }}/apiserver-key.pem
|
2017-02-27 21:15:50 +08:00
|
|
|
{% if kube_token_auth|default(true) %}
|
2016-07-08 17:59:21 +08:00
|
|
|
- --token-auth-file={{ kube_token_dir }}/known_tokens.csv
|
2017-02-27 21:15:50 +08:00
|
|
|
{% endif %}
|
2018-03-29 22:35:28 +08:00
|
|
|
- --service-account-key-file={{ kube_cert_dir }}/service-account-key.pem
|
2017-02-27 20:24:21 +08:00
|
|
|
{% if kube_oidc_auth|default(false) and kube_oidc_url is defined and kube_oidc_client_id is defined %}
|
|
|
|
- --oidc-issuer-url={{ kube_oidc_url }}
|
|
|
|
- --oidc-client-id={{ kube_oidc_client_id }}
|
2017-03-23 05:25:01 +08:00
|
|
|
{% if kube_oidc_ca_file is defined %}
|
2017-02-27 20:24:21 +08:00
|
|
|
- --oidc-ca-file={{ kube_oidc_ca_file }}
|
|
|
|
{% endif %}
|
2017-03-23 05:25:01 +08:00
|
|
|
{% if kube_oidc_username_claim is defined %}
|
2017-02-27 20:24:21 +08:00
|
|
|
- --oidc-username-claim={{ kube_oidc_username_claim }}
|
|
|
|
{% endif %}
|
2018-04-23 11:17:00 +08:00
|
|
|
{% if kube_oidc_username_prefix is defined %}
|
|
|
|
- "--oidc-username-prefix={{ kube_oidc_username_prefix }}"
|
|
|
|
{% endif %}
|
2017-03-23 05:25:01 +08:00
|
|
|
{% if kube_oidc_groups_claim is defined %}
|
2017-02-27 20:24:21 +08:00
|
|
|
- --oidc-groups-claim={{ kube_oidc_groups_claim }}
|
|
|
|
{% endif %}
|
2018-04-23 11:17:00 +08:00
|
|
|
{% if kube_oidc_groups_prefix is defined %}
|
|
|
|
- "--oidc-groups-prefix={{ kube_oidc_groups_prefix }}"
|
|
|
|
{% endif %}
|
2017-02-27 20:24:21 +08:00
|
|
|
{% endif %}
|
2015-12-11 18:52:20 +08:00
|
|
|
- --secure-port={{ kube_apiserver_port }}
|
2015-12-15 23:27:12 +08:00
|
|
|
- --insecure-port={{ kube_apiserver_insecure_port }}
|
2017-02-21 22:44:36 +08:00
|
|
|
- --storage-backend={{ kube_apiserver_storage_backend }}
|
2015-12-13 01:24:21 +08:00
|
|
|
{% if kube_api_runtime_config is defined %}
|
|
|
|
{% for conf in kube_api_runtime_config %}
|
|
|
|
- --runtime-config={{ conf }}
|
|
|
|
{% endfor %}
|
2016-10-10 22:09:50 +08:00
|
|
|
{% endif %}
|
2017-03-13 23:04:31 +08:00
|
|
|
{% if enable_network_policy %}
|
2017-10-31 14:43:54 +08:00
|
|
|
{% if kube_version | version_compare('v1.8', '<') %}
|
2016-10-10 22:09:50 +08:00
|
|
|
- --runtime-config=extensions/v1beta1/networkpolicies=true
|
2017-10-31 14:43:54 +08:00
|
|
|
{% endif %}
|
2015-12-13 01:24:21 +08:00
|
|
|
{% endif %}
|
2016-11-25 18:33:39 +08:00
|
|
|
- --v={{ kube_log_level }}
|
2015-12-11 18:52:20 +08:00
|
|
|
- --allow-privileged=true
|
2018-09-20 22:31:28 +08:00
|
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws"] %}
|
2016-07-08 17:59:21 +08:00
|
|
|
- --cloud-provider={{ cloud_provider }}
|
|
|
|
- --cloud-config={{ kube_config_dir }}/cloud_config
|
2016-12-14 00:06:53 +08:00
|
|
|
{% endif %}
|
|
|
|
{% if kube_api_anonymous_auth is defined and kube_version | version_compare('v1.5', '>=') %}
|
|
|
|
- --anonymous-auth={{ kube_api_anonymous_auth }}
|
2016-07-08 17:59:21 +08:00
|
|
|
{% endif %}
|
2017-06-27 12:27:25 +08:00
|
|
|
{% if authorization_modes %}
|
|
|
|
- --authorization-mode={{ authorization_modes|join(',') }}
|
|
|
|
{% endif %}
|
2018-03-16 03:20:05 +08:00
|
|
|
{% if kube_encrypt_secret_data %}
|
|
|
|
- --experimental-encryption-provider-config={{ kube_config_dir }}/ssl/secrets_encryption.yaml
|
|
|
|
{% endif %}
|
2017-08-25 04:18:38 +08:00
|
|
|
{% if kube_feature_gates %}
|
|
|
|
- --feature-gates={{ kube_feature_gates|join(',') }}
|
|
|
|
{% endif %}
|
2018-02-10 03:49:49 +08:00
|
|
|
{% if kube_version | version_compare('v1.9', '>=') %}
|
2018-05-12 00:11:38 +08:00
|
|
|
- --requestheader-client-ca-file={{ kube_cert_dir }}/{{ kube_front_proxy_ca }}
|
|
|
|
{# FIXME(mattymo): Vault certs do not work with front-proxy-client #}
|
|
|
|
{% if cert_management == "vault" %}
|
|
|
|
- --requestheader-allowed-names=
|
|
|
|
{% else %}
|
2018-02-07 17:07:46 +08:00
|
|
|
- --requestheader-allowed-names=front-proxy-client
|
2018-05-12 00:11:38 +08:00
|
|
|
{% endif %}
|
2018-02-07 16:50:08 +08:00
|
|
|
- --requestheader-extra-headers-prefix=X-Remote-Extra-
|
2018-02-06 03:37:06 +08:00
|
|
|
- --requestheader-group-headers=X-Remote-Group
|
|
|
|
- --requestheader-username-headers=X-Remote-User
|
2018-02-07 16:50:08 +08:00
|
|
|
- --enable-aggregator-routing={{ kube_api_aggregator_routing }}
|
|
|
|
- --proxy-client-cert-file={{ kube_cert_dir }}/front-proxy-client.pem
|
|
|
|
- --proxy-client-key-file={{ kube_cert_dir }}/front-proxy-client-key.pem
|
2018-04-10 23:10:48 +08:00
|
|
|
{% else %}
|
|
|
|
- --proxy-client-cert-file={{ kube_cert_dir }}/apiserver.pem
|
|
|
|
- --proxy-client-key-file={{ kube_cert_dir }}/apiserver-key.pem
|
2018-02-06 03:37:06 +08:00
|
|
|
{% endif %}
|
2017-04-17 23:09:34 +08:00
|
|
|
{% if apiserver_custom_flags is string %}
|
|
|
|
- {{ apiserver_custom_flags }}
|
2017-04-18 00:13:39 +08:00
|
|
|
{% else %}
|
2018-02-12 15:29:46 +08:00
|
|
|
{% for flag in apiserver_custom_flags %}
|
2017-04-15 05:33:04 +08:00
|
|
|
- {{ flag }}
|
2018-02-12 15:29:46 +08:00
|
|
|
{% endfor %}
|
2016-07-08 17:59:21 +08:00
|
|
|
{% endif %}
|
2016-11-21 20:11:47 +08:00
|
|
|
livenessProbe:
|
|
|
|
httpGet:
|
|
|
|
host: 127.0.0.1
|
|
|
|
path: /healthz
|
2018-02-22 21:00:32 +08:00
|
|
|
{% if kube_apiserver_insecure_port|int == 0 %}
|
2017-11-07 04:01:10 +08:00
|
|
|
port: {{ kube_apiserver_port }}
|
|
|
|
scheme: HTTPS
|
|
|
|
{% else %}
|
2017-06-07 00:36:04 +08:00
|
|
|
port: {{ kube_apiserver_insecure_port }}
|
2017-11-07 04:01:10 +08:00
|
|
|
{% endif %}
|
|
|
|
failureThreshold: 8
|
|
|
|
initialDelaySeconds: 15
|
|
|
|
periodSeconds: 10
|
|
|
|
successThreshold: 1
|
|
|
|
timeoutSeconds: 15
|
2015-12-11 18:52:20 +08:00
|
|
|
volumeMounts:
|
|
|
|
- mountPath: {{ kube_config_dir }}
|
|
|
|
name: kubernetes-config
|
|
|
|
readOnly: true
|
2017-08-31 03:41:09 +08:00
|
|
|
- mountPath: /etc/ssl
|
2015-12-11 18:52:20 +08:00
|
|
|
name: ssl-certs-host
|
|
|
|
readOnly: true
|
2017-08-31 03:41:09 +08:00
|
|
|
{% for dir in ssl_ca_dirs %}
|
|
|
|
- mountPath: {{ dir }}
|
|
|
|
name: {{ dir | regex_replace('^/(.*)$', '\\1' ) | regex_replace('/', '-') }}
|
|
|
|
readOnly: true
|
|
|
|
{% endfor %}
|
2016-11-09 18:44:41 +08:00
|
|
|
- mountPath: {{ etcd_cert_dir }}
|
|
|
|
name: etcd-certs
|
|
|
|
readOnly: true
|
2017-05-31 20:24:24 +08:00
|
|
|
{% if cloud_provider is defined and cloud_provider == 'aws' and ansible_os_family == 'RedHat' %}
|
2017-05-27 05:32:50 +08:00
|
|
|
- mountPath: /etc/ssl/certs/ca-bundle.crt
|
|
|
|
name: rhel-ca-bundle
|
|
|
|
readOnly: true
|
2018-08-15 16:41:13 +08:00
|
|
|
{% endif %}
|
|
|
|
{% if kubernetes_audit %}
|
2018-08-16 18:51:09 +08:00
|
|
|
{% if audit_log_path != "-" %}
|
2018-08-15 16:41:13 +08:00
|
|
|
- mountPath: {{ audit_log_mountpath }}
|
|
|
|
name: {{ audit_log_name }}
|
|
|
|
Writable: true
|
2018-08-16 18:51:09 +08:00
|
|
|
{% endif %}
|
2018-08-15 16:41:13 +08:00
|
|
|
- mountPath: {{ audit_policy_mountpath }}
|
|
|
|
name: {{ audit_policy_name }}
|
2017-05-27 05:32:50 +08:00
|
|
|
{% endif %}
|
2015-12-11 18:52:20 +08:00
|
|
|
volumes:
|
|
|
|
- hostPath:
|
|
|
|
path: {{ kube_config_dir }}
|
|
|
|
name: kubernetes-config
|
2017-08-31 03:41:09 +08:00
|
|
|
- name: ssl-certs-host
|
|
|
|
hostPath:
|
|
|
|
path: /etc/ssl
|
|
|
|
{% for dir in ssl_ca_dirs %}
|
|
|
|
- name: {{ dir | regex_replace('^/(.*)$', '\\1' ) | regex_replace('/', '-') }}
|
|
|
|
hostPath:
|
|
|
|
path: {{ dir }}
|
|
|
|
{% endfor %}
|
2016-11-09 18:44:41 +08:00
|
|
|
- hostPath:
|
|
|
|
path: {{ etcd_cert_dir }}
|
|
|
|
name: etcd-certs
|
2017-05-31 20:24:24 +08:00
|
|
|
{% if cloud_provider is defined and cloud_provider == 'aws' and ansible_os_family == 'RedHat' %}
|
2017-05-27 05:32:50 +08:00
|
|
|
- hostPath:
|
|
|
|
path: /etc/ssl/certs/ca-bundle.crt
|
|
|
|
name: rhel-ca-bundle
|
2017-06-07 00:36:04 +08:00
|
|
|
{% endif %}
|
2018-08-15 16:41:13 +08:00
|
|
|
{% if kubernetes_audit %}
|
2018-08-16 18:51:09 +08:00
|
|
|
{% if audit_log_path != "-" %}
|
2018-08-15 16:41:13 +08:00
|
|
|
- hostPath:
|
|
|
|
path: {{ audit_log_hostpath }}
|
|
|
|
name: {{ audit_log_name }}
|
2018-08-16 18:51:09 +08:00
|
|
|
{% endif %}
|
2018-08-15 16:41:13 +08:00
|
|
|
- hostPath:
|
|
|
|
path: {{ audit_policy_hostpath }}
|
|
|
|
name: {{ audit_policy_name }}
|
|
|
|
{% endif %}
|