allow non existing etcd group (#6797)
When using kubeadm managed etcd, configuring an etcd group can now be skipped.pull/6851/head
parent
f2ef781efd
commit
04b19359cb
|
@ -1,14 +1,22 @@
|
||||||
---
|
---
|
||||||
- name: Stop if either kube-master, kube-node or etcd is empty
|
- name: Stop if either kube-master or kube-node group is empty
|
||||||
assert:
|
assert:
|
||||||
that: groups.get('{{ item }}')
|
that: "groups.get('{{ item }}')"
|
||||||
with_items:
|
with_items:
|
||||||
- kube-master
|
- kube-master
|
||||||
- kube-node
|
- kube-node
|
||||||
- etcd
|
|
||||||
run_once: true
|
run_once: true
|
||||||
when: not ignore_assert_errors
|
when: not ignore_assert_errors
|
||||||
|
|
||||||
|
- name: Stop if etcd group is empty in external etcd mode
|
||||||
|
assert:
|
||||||
|
that: groups.get('etcd')
|
||||||
|
fail_msg: "Group 'etcd' cannot be empty in external etcd mode"
|
||||||
|
run_once: true
|
||||||
|
when:
|
||||||
|
- not ignore_assert_errors
|
||||||
|
- not etcd_kubeadm_enabled
|
||||||
|
|
||||||
- name: Stop if non systemd OS type
|
- name: Stop if non systemd OS type
|
||||||
assert:
|
assert:
|
||||||
that: ansible_service_mgr == "systemd"
|
that: ansible_service_mgr == "systemd"
|
||||||
|
@ -61,6 +69,7 @@
|
||||||
that: groups.etcd|length is not divisibleby 2
|
that: groups.etcd|length is not divisibleby 2
|
||||||
when:
|
when:
|
||||||
- not ignore_assert_errors
|
- not ignore_assert_errors
|
||||||
|
- groups.get('etcd')
|
||||||
- inventory_hostname in groups['etcd']
|
- inventory_hostname in groups['etcd']
|
||||||
|
|
||||||
- name: Stop if memory is too small for masters
|
- name: Stop if memory is too small for masters
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
- name: Hosts | create list from inventory
|
- name: Hosts | create list from inventory
|
||||||
set_fact:
|
set_fact:
|
||||||
etc_hosts_inventory_block: |-
|
etc_hosts_inventory_block: |-
|
||||||
{% for item in (groups['k8s-cluster'] + groups['etcd'] + groups['calico-rr']|default([]))|unique -%}
|
{% for item in (groups['k8s-cluster'] + groups['etcd']|default([]) + groups['calico-rr']|default([]))|unique -%}
|
||||||
{% if 'access_ip' in hostvars[item] or 'ip' in hostvars[item] or 'ansible_default_ipv4' in hostvars[item] -%}
|
{% if 'access_ip' in hostvars[item] or 'ip' in hostvars[item] or 'ansible_default_ipv4' in hostvars[item] -%}
|
||||||
{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(hostvars[item]['ansible_default_ipv4']['address'])) }}
|
{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(hostvars[item]['ansible_default_ipv4']['address'])) }}
|
||||||
{%- if ('ansible_hostname' in hostvars[item] and item != hostvars[item]['ansible_hostname']) %} {{ hostvars[item]['ansible_hostname'] }}.{{ dns_domain }} {{ hostvars[item]['ansible_hostname'] }}{% endif %} {{ item }}.{{ dns_domain }} {{ item }}
|
{%- if ('ansible_hostname' in hostvars[item] and item != hostvars[item]['ansible_hostname']) %} {{ hostvars[item]['ansible_hostname'] }}.{{ dns_domain }} {{ hostvars[item]['ansible_hostname'] }}{% endif %} {{ item }}.{{ dns_domain }} {{ item }}
|
||||||
|
|
|
@ -472,6 +472,9 @@ kube_apiserver_client_key: "{{ kube_cert_dir }}/ca.key"
|
||||||
# Set to true to deploy etcd-events cluster
|
# Set to true to deploy etcd-events cluster
|
||||||
etcd_events_cluster_enabled: false
|
etcd_events_cluster_enabled: false
|
||||||
|
|
||||||
|
# etcd group can be empty when kubeadm manages etcd
|
||||||
|
etcd_hosts: "{{ groups['etcd'] | default(groups['kube-master']) }}"
|
||||||
|
|
||||||
# Vars for pointing to etcd endpoints
|
# Vars for pointing to etcd endpoints
|
||||||
is_etcd_master: "{{ inventory_hostname in groups['etcd'] }}"
|
is_etcd_master: "{{ inventory_hostname in groups['etcd'] }}"
|
||||||
etcd_address: "{{ ip | default(fallback_ips[inventory_hostname]) }}"
|
etcd_address: "{{ ip | default(fallback_ips[inventory_hostname]) }}"
|
||||||
|
@ -482,12 +485,12 @@ etcd_client_url: "https://{{ etcd_access_address }}:2379"
|
||||||
etcd_events_peer_url: "https://{{ etcd_events_access_address }}:2382"
|
etcd_events_peer_url: "https://{{ etcd_events_access_address }}:2382"
|
||||||
etcd_events_client_url: "https://{{ etcd_events_access_address }}:2381"
|
etcd_events_client_url: "https://{{ etcd_events_access_address }}:2381"
|
||||||
etcd_access_addresses: |-
|
etcd_access_addresses: |-
|
||||||
{% for item in groups['etcd'] -%}
|
{% for item in etcd_hosts -%}
|
||||||
https://{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(fallback_ips[item])) }}:2379{% if not loop.last %},{% endif %}
|
https://{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(fallback_ips[item])) }}:2379{% if not loop.last %},{% endif %}
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
etcd_events_access_addresses_list: |-
|
etcd_events_access_addresses_list: |-
|
||||||
[
|
[
|
||||||
{% for item in groups['etcd'] -%}
|
{% for item in etcd_hosts -%}
|
||||||
'https://{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(fallback_ips[item])) }}:2381'{% if not loop.last %},{% endif %}
|
'https://{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(fallback_ips[item])) }}:2381'{% if not loop.last %},{% endif %}
|
||||||
{%- endfor %}
|
{%- endfor %}
|
||||||
]
|
]
|
||||||
|
|
|
@ -11,7 +11,7 @@
|
||||||
{% else %}
|
{% else %}
|
||||||
{% set cluster_or_master = 'k8s-cluster' %}
|
{% set cluster_or_master = 'k8s-cluster' %}
|
||||||
{% endif %}
|
{% endif %}
|
||||||
{%- for item in (groups[cluster_or_master] + groups['etcd'] + groups['calico-rr']|default([]))|unique -%}
|
{%- for item in (groups[cluster_or_master] + groups['etcd']|default([]) + groups['calico-rr']|default([]))|unique -%}
|
||||||
{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(fallback_ips[item])) }},
|
{{ hostvars[item]['access_ip'] | default(hostvars[item]['ip'] | default(fallback_ips[item])) }},
|
||||||
{%- if item != hostvars[item].get('ansible_hostname', '') -%}
|
{%- if item != hostvars[item].get('ansible_hostname', '') -%}
|
||||||
{{ hostvars[item]['ansible_hostname'] }},
|
{{ hostvars[item]['ansible_hostname'] }},
|
||||||
|
|
|
@ -18,8 +18,9 @@ spec:
|
||||||
labels:
|
labels:
|
||||||
k8s-app: calico-node
|
k8s-app: calico-node
|
||||||
annotations:
|
annotations:
|
||||||
# Mark pod as critical for rescheduling (Will have no effect starting with kubernetes 1.12)
|
{% if calico_datastore == "etcd" %}
|
||||||
kubespray.etcd-cert/serial: "{{ etcd_client_cert_serial }}"
|
kubespray.etcd-cert/serial: "{{ etcd_client_cert_serial }}"
|
||||||
|
{% endif %}
|
||||||
{% if calico_felix_prometheusmetricsenabled %}
|
{% if calico_felix_prometheusmetricsenabled %}
|
||||||
prometheus.io/scrape: 'true'
|
prometheus.io/scrape: 'true'
|
||||||
prometheus.io/port: "{{ calico_felix_prometheusmetricsport }}"
|
prometheus.io/port: "{{ calico_felix_prometheusmetricsport }}"
|
||||||
|
|
Loading…
Reference in New Issue