52 lines
1.6 KiB
YAML
52 lines
1.6 KiB
YAML
---
|
|
# Calico Version v2.2.1
|
|
# http://docs.projectcalico.org/v2.2/releases#v2.2.1
|
|
# This manifest includes the following component versions:
|
|
# calico/node:v1.2.1
|
|
# calico/cni:v1.8.3
|
|
# calico/kube-policy-controller:v0.6.0
|
|
|
|
# This ConfigMap is used to configure a self-hosted Calico installation.
|
|
kind: ConfigMap
|
|
apiVersion: v1
|
|
metadata:
|
|
name: calico-config
|
|
namespace: kube-system
|
|
data:
|
|
# The location of your etcd cluster. This uses the Service clusterIP
|
|
# defined below.
|
|
etcd_endpoints: https://{{ .Values.etcd.service.ip }}:{{ .Values.etcd.service.port }}
|
|
|
|
# Configure the Calico backend to use.
|
|
calico_backend: "bird"
|
|
|
|
# The CNI network configuration to install on each node.
|
|
cni_network_config: |-
|
|
{
|
|
"name": "k8s-pod-network",
|
|
"cniVersion": "0.1.0",
|
|
"type": "calico",
|
|
"etcd_endpoints": "__ETCD_ENDPOINTS__",
|
|
"etcd_key_file": "__ETCD_KEY_FILE__",
|
|
"etcd_cert_file": "__ETCD_CERT_FILE__",
|
|
"etcd_ca_cert_file": "__ETCD_CA_CERT_FILE__",
|
|
"log_level": "info",
|
|
"ipam": {
|
|
"type": "calico-ipam"
|
|
},
|
|
"policy": {
|
|
"type": "k8s",
|
|
"k8s_api_root": "https://__KUBERNETES_SERVICE_HOST__:__KUBERNETES_SERVICE_PORT__",
|
|
"k8s_auth_token": "__SERVICEACCOUNT_TOKEN__"
|
|
},
|
|
"kubernetes": {
|
|
"kubeconfig": "/etc/cni/net.d/__KUBECONFIG_FILENAME__"
|
|
}
|
|
}
|
|
|
|
# If you're using TLS enabled etcd uncomment the following.
|
|
# You must also populate the Secret below with these files.
|
|
etcd_ca: "/calico-secrets/etcd-ca"
|
|
etcd_cert: "/calico-secrets/etcd-cert"
|
|
etcd_key: "/calico-secrets/etcd-key"
|