Skip to content

Instantly share code, notes, and snippets.

@davidspek
Last active March 8, 2022 12:16
Show Gist options
  • Save davidspek/5fbfc8b66ccbf36b47b2ca292965e7bc to your computer and use it in GitHub Desktop.
Save davidspek/5fbfc8b66ccbf36b47b2ca292965e7bc to your computer and use it in GitHub Desktop.
kube-vip cluster api test
---
# Source: kube-vip/templates/rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: kube-vip-control-plane
namespace: kube-system
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
---
# Source: kube-vip/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
name: kube-vip-control-plane
rules:
- apiGroups: [""]
resources: ["services", "services/status", "nodes"]
verbs: ["list","get","watch", "update"]
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["list", "get", "watch", "update", "create"]
---
# Source: kube-vip/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: kube-vip-control-plane
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kube-vip-control-plane
subjects:
- kind: ServiceAccount
name: kube-vip-control-plane
namespace: kube-system
---
# Source: kube-vip/templates/daemonset.yaml
apiVersion: apps/v1
kind: Pod
metadata:
name: kube-vip-control-plane
namespace: kube-system
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
spec:
containers:
- args:
- manager
env:
- name: vip_address
value: ${LB_ADDRESS}
- name: "annotation"
value: "metal.equinix.com"
- name: "bgp_as"
value: "65000"
- name: "bgp_enable"
value: "true"
- name: "bgp_peeraddress"
value: ""
- name: "bgp_peeras"
value: "65000"
- name: "bgp_peerpass"
value: ""
- name: "bgp_routerid"
value: ""
- name: "cp_enable"
value: "true"
- name: "cp_namespace"
value: "kube-system"
- name: "lb_enable"
value: "false"
- name: "lb_port"
value: "6443"
- name: "svc_enable"
value: "false"
- name: "vip_arp"
value: "false"
- name: "vip_cidr"
value: "32"
- name: "vip_interface"
value: "lo"
- name: "vip_leaderelection"
value: "true"
image: ghcr.io/kube-vip/kube-vip:v0.4.0
imagePullPolicy: IfNotPresent
name: kube-vip
resources:
{}
securityContext:
capabilities:
add:
- NET_ADMIN
- NET_RAW
hostNetwork: true
serviceAccountName: kube-vip-control-plane
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- key: "node.kubernetes.io/not-ready"
operator: "Exists"
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
---
# Source: kube-vip/templates/rbac.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: kube-vip-control-plane
namespace: kube-system
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
---
# Source: kube-vip/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
name: kube-vip-control-plane
rules:
- apiGroups: [""]
resources: ["services", "services/status", "nodes"]
verbs: ["list","get","watch", "update"]
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
verbs: ["list", "get", "watch", "update", "create"]
---
# Source: kube-vip/templates/rbac.yaml
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: kube-vip-control-plane
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: kube-vip-control-plane
subjects:
- kind: ServiceAccount
name: kube-vip-control-plane
namespace: kube-system
---
# Source: kube-vip/templates/daemonset.yaml
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: kube-vip-control-plane
namespace: kube-system
labels:
helm.sh/chart: kube-vip-0.4.3
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
app.kubernetes.io/version: "v0.4.1"
app.kubernetes.io/managed-by: Helm
spec:
selector:
matchLabels:
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
template:
metadata:
labels:
app.kubernetes.io/name: kube-vip
app.kubernetes.io/instance: kube-vip-control-plane
spec:
containers:
- args:
- manager
env:
- name: vip_address
value: ${LB_ADDRESS}
- name: "annotation"
value: "metal.equinix.com"
- name: "bgp_as"
value: "65000"
- name: "bgp_enable"
value: "true"
- name: "bgp_peeraddress"
value: ""
- name: "bgp_peeras"
value: "65000"
- name: "bgp_peerpass"
value: ""
- name: "bgp_routerid"
value: ""
- name: "cp_enable"
value: "true"
- name: "cp_namespace"
value: "kube-system"
- name: "lb_enable"
value: "false"
- name: "lb_port"
value: "6443"
- name: "svc_enable"
value: "false"
- name: "vip_arp"
value: "false"
- name: "vip_cidr"
value: "32"
- name: "vip_interface"
value: "lo"
- name: "vip_leaderelection"
value: "true"
image: ghcr.io/kube-vip/kube-vip:v0.4.0
imagePullPolicy: IfNotPresent
name: kube-vip
resources:
{}
securityContext:
capabilities:
add:
- NET_ADMIN
- NET_RAW
hostNetwork: true
serviceAccountName: kube-vip-control-plane
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/control-plane
operator: Exists
- effect: NoSchedule
key: node-role.kubernetes.io/master
operator: Exists
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: node-role.kubernetes.io/master
operator: Exists
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment