@@ -16,6 +16,19 @@ This role requires that you already created some certificates for Kubernetes API
16
16
Changelog
17
17
---------
18
18
19
+ ** r4.0.0_v1.10.4**
20
+
21
+ - update ` k8s_release ` to ` 1.10.4 `
22
+ - removed deprecated kube-apiserver parameter ` insecure-bind-address ` (see: [ #59018 ] ( https://github.com/kubernetes/kubernetes/pull/59018 ) )
23
+ - added variable ` k8s_apiserver_secure_port: 6443 `
24
+ - added parameter ` secure-port ` to ` k8s_apiserver_settings ` parameter list
25
+ - added ` kube-controller-manager-ca ` certificate files to ` k8s_certificates ` list
26
+ - added variable ` k8s_controller_manager_conf_dir ` / added kubeconfig for kube-controller-manager
27
+ - added variable ` k8s_scheduler_conf_dir ` / added kubeconfig for kube-scheduler / settings for kube-scheduler now in ` templates/var/lib/kube-scheduler/kube-scheduler.yaml.j2 `
28
+ - added kubeconfig for ` admin ` user (located by default in ` k8s_conf_dir ` ). This ` admin.kubeconfig ` will be needed for ` kubectl `
29
+ - new ` service-account-key-file ` value for kube-apiserver
30
+ - changes in ` k8s_controller_manager_settings ` : removed ` master ` parameter, added ` kubeconfig ` , new value for ` service-account-private-key-file ` , new parameter ` use-service-account-credentials `
31
+
19
32
** r3.0.0_v1.9.8**
20
33
21
34
- update ` k8s_release ` to ` 1.9.8 `
@@ -61,7 +74,7 @@ k8s_conf_dir: "/var/lib/kubernetes"
61
74
# The directory to store the K8s binaries
62
75
k8s_bin_dir: "/usr/local/bin"
63
76
# K8s release
64
- k8s_release: "1.9.8 "
77
+ k8s_release: "1.10.4 "
65
78
# The interface on which the K8s services should listen on. As all cluster
66
79
# communication should use the PeerVPN interface the interface name is
67
80
# normally "tap0" or "peervpn0".
@@ -91,14 +104,18 @@ k8s_certificates:
91
104
- ca-k8s-apiserver-key.pem
92
105
- cert-k8s-apiserver.pem
93
106
- cert-k8s-apiserver-key.pem
107
+ - cert-k8s-controller-manager-sa.pem
108
+ - cert-k8s-controller-manager-sa-key.pem
109
+
110
+ k8s_apiserver_secure_port: "6443"
94
111
95
112
# kube-apiserver settings (can be overriden or additional added by defining
96
113
# "k8s_apiserver_settings_user" - see text below)
97
114
k8s_apiserver_settings:
98
115
"advertise-address": "hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address"
99
116
"bind-address": "hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address"
100
- "insecure-bind-address ": "hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address "
101
- "admission-control ": "Initializers,NamespaceLifecycle,NodeRestriction,LimitRanger,ServiceAccount,DefaultStorageClass,ResourceQuota"
117
+ "secure-port ": "{{k8s_apiserver_secure_port}} "
118
+ "enable- admission-plugins ": "Initializers,NamespaceLifecycle,NodeRestriction,LimitRanger,ServiceAccount,DefaultStorageClass,ResourceQuota"
102
119
"allow-privileged": "true"
103
120
"apiserver-count": "3"
104
121
"authorization-mode": "Node,RBAC"
@@ -121,35 +138,36 @@ k8s_apiserver_settings:
121
138
"kubelet-certificate-authority": "{{k8s_conf_dir}}/ca-k8s-apiserver.pem"
122
139
"kubelet-client-certificate": "{{k8s_conf_dir}}/cert-k8s-apiserver.pem"
123
140
"kubelet-client-key": "{{k8s_conf_dir}}/cert-k8s-apiserver-key.pem"
124
- "service-account-key-file": "{{k8s_conf_dir}}/cert-k8s-apiserver-key .pem"
141
+ "service-account-key-file": "{{k8s_conf_dir}}/cert-k8s-controller-manager-sa .pem"
125
142
"tls-ca-file": "{{k8s_conf_dir}}/ca-k8s-apiserver.pem"
126
143
"tls-cert-file": "{{k8s_conf_dir}}/cert-k8s-apiserver.pem"
127
144
"tls-private-key-file": "{{k8s_conf_dir}}/cert-k8s-apiserver-key.pem"
128
145
129
146
# The directory to store controller manager configuration.
130
- k8s_controller_manager_conf_dir: "{{k8s_conf_dir}} "
147
+ k8s_controller_manager_conf_dir: "/var/lib/kube-controller-manager "
131
148
132
149
# kube-controller-manager settings (can be overriden or additional added by defining
133
150
# "k8s_controller_manager_settings_user" - see text below)
134
151
k8s_controller_manager_settings:
135
152
"address": "{{hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address}}"
136
- "master": "{{'http://' + hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address + ':8080'}}"
137
153
"cluster-cidr": "10.200.0.0/16"
138
154
"cluster-name": "kubernetes"
155
+ "kubeconfig": "{{k8s_controller_manager_conf_dir}}/kube-controller-manager.kubeconfig"
139
156
"leader-elect": "true"
140
157
"service-cluster-ip-range": "10.32.0.0/16"
141
- "cluster-signing-cert-file": "{{k8s_controller_manager_conf_dir}}/ca-k8s-apiserver.pem"
142
- "cluster-signing-key-file": "{{k8s_controller_manager_conf_dir}}/cert-k8s-apiserver-key.pem"
143
- "root-ca-file": "{{k8s_controller_manager_conf_dir}}/ca-k8s-apiserver.pem"
144
- "cluster-signing-cert-file": "{{k8s_controller_manager_conf_dir}}/ca-k8s-apiserver.pem"
145
- "service-account-private-key-file": "{{k8s_controller_manager_conf_dir}}/cert-k8s-apiserver-key.pem"
146
-
147
- # kube-scheduler settings (can be overriden or additional added by defining
148
- # "k8s_scheduler_settings_user" - see text below)
158
+ "cluster-signing-cert-file": "{{k8s_conf_dir}}/ca-k8s-apiserver.pem"
159
+ "cluster-signing-key-file": "{{k8s_conf_dir}}/cert-k8s-apiserver-key.pem"
160
+ "root-ca-file": "{{k8s_conf_dir}}/ca-k8s-apiserver.pem"
161
+ "service-account-private-key-file": "{{k8s_conf_dir}}/cert-k8s-controller-manager-sa-key.pem"
162
+ "use-service-account-credentials": "true"
163
+
164
+ # The directory to store scheduler configuration.
165
+ k8s_scheduler_conf_dir: "/var/lib/kube-scheduler"
166
+
167
+ # kube-scheduler settings (only --config left,
168
+ # see https://github.com/kubernetes/kubernetes/pull/62515, remaining parameter deprecated)
149
169
k8s_scheduler_settings:
150
- "address": "{{hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address}}"
151
- "master": "{{'http://' + hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address + ':8080'}}"
152
- "leader-elect": "true"
170
+ "config": "{{k8s_scheduler_conf_dir}}/kube-scheduler.yaml"
153
171
154
172
# The port the control plane componentes should connect to etcd cluster
155
173
etcd_client_port: "2379"
0 commit comments