kubespray/roles/kubernetes-apps/ansible/templates
Aleksandr Didenko 3a39904011 Move calico-policy-controller into separate role
By default Calico CNI does not create any network access policies
or profiles if 'policy' is enabled in CNI config. And without any
policies/profiles network access to/from PODs is blocked.

K8s related policies are created by calico-policy-controller in
such case. So we need to start it as soon as possible, before any
real workloads.

This patch also fixes kube-api port in calico-policy-controller
yaml template.

Closes #1132
2017-03-17 11:21:52 +01:00
..
kubedns-autoscaler.yml Add autoscalers for dnsmasq and kubedns 2017-03-02 13:44:22 +03:00
kubedns-deploy.yml Add autoscalers for dnsmasq and kubedns 2017-03-02 13:44:22 +03:00
kubedns-svc.yml Address standalone kubelet config case 2016-12-13 16:35:53 +01:00
netchecker-agent-ds.yml Update playbooks to support new netchecker 2017-02-07 15:20:34 +01:00
netchecker-agent-hostnet-ds.yml Update playbooks to support new netchecker 2017-02-07 15:20:34 +01:00
netchecker-server-pod.yml Update playbooks to support new netchecker 2017-02-07 15:20:34 +01:00
netchecker-server-svc.yml Add advanced net check for DNS K8s app 2016-11-28 13:23:25 +01:00