You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
531 lines
15 KiB
531 lines
15 KiB
heat_template_version: 2014-10-16
|
|
|
|
description: >
|
|
This is a nested stack that defines a single Kubernetes minion, This stack is
|
|
included by an AutoScalingGroup resource in the parent template
|
|
(kubecluster.yaml).
|
|
|
|
parameters:
|
|
|
|
name:
|
|
type: string
|
|
description: server name
|
|
|
|
server_image:
|
|
type: string
|
|
description: glance image used to boot the server
|
|
|
|
minion_flavor:
|
|
type: string
|
|
description: flavor to use when booting the server
|
|
|
|
ssh_key_name:
|
|
type: string
|
|
description: name of ssh key to be provisioned on our server
|
|
|
|
external_network:
|
|
type: string
|
|
description: uuid/name of a network to use for floating ip addresses
|
|
|
|
kube_allow_priv:
|
|
type: string
|
|
description: >
|
|
whether or not kubernetes should permit privileged containers.
|
|
constraints:
|
|
- allowed_values: ["true", "false"]
|
|
|
|
docker_volume_size:
|
|
type: number
|
|
description: >
|
|
size of a cinder volume to allocate to docker for container/image
|
|
storage
|
|
|
|
docker_volume_type:
|
|
type: string
|
|
description: >
|
|
type of a cinder volume to allocate to docker for container/image
|
|
storage
|
|
|
|
docker_storage_driver:
|
|
type: string
|
|
description: docker storage driver name
|
|
default: "devicemapper"
|
|
|
|
tls_disabled:
|
|
type: boolean
|
|
description: whether or not to enable TLS
|
|
|
|
verify_ca:
|
|
type: boolean
|
|
description: whether or not to validate certificate authority
|
|
|
|
kubernetes_port:
|
|
type: number
|
|
description: >
|
|
The port which are used by kube-apiserver to provide Kubernetes
|
|
service.
|
|
|
|
cluster_uuid:
|
|
type: string
|
|
description: identifier for the cluster this template is generating
|
|
|
|
magnum_url:
|
|
type: string
|
|
description: endpoint to retrieve TLS certs from
|
|
|
|
prometheus_monitoring:
|
|
type: boolean
|
|
description: >
|
|
whether or not to have the node-exporter running on the node
|
|
|
|
kube_master_ip:
|
|
type: string
|
|
description: IP address of the Kubernetes master server.
|
|
|
|
etcd_server_ip:
|
|
type: string
|
|
description: IP address of the Etcd server.
|
|
|
|
fixed_network:
|
|
type: string
|
|
description: Network from which to allocate fixed addresses.
|
|
|
|
fixed_subnet:
|
|
type: string
|
|
description: Subnet from which to allocate fixed addresses.
|
|
|
|
network_driver:
|
|
type: string
|
|
description: network driver to use for instantiating container networks
|
|
|
|
flannel_network_cidr:
|
|
type: string
|
|
description: network range for flannel overlay network
|
|
|
|
wait_condition_timeout:
|
|
type: number
|
|
description : >
|
|
timeout for the Wait Conditions
|
|
|
|
registry_enabled:
|
|
type: boolean
|
|
description: >
|
|
Indicates whether the docker registry is enabled.
|
|
|
|
registry_port:
|
|
type: number
|
|
description: port of registry service
|
|
|
|
swift_region:
|
|
type: string
|
|
description: region of swift service
|
|
|
|
registry_container:
|
|
type: string
|
|
description: >
|
|
name of swift container which docker registry stores images in
|
|
|
|
registry_insecure:
|
|
type: boolean
|
|
description: >
|
|
indicates whether to skip TLS verification between registry and backend storage
|
|
|
|
registry_chunksize:
|
|
type: number
|
|
description: >
|
|
size fo the data segments for the swift dynamic large objects
|
|
|
|
secgroup_kube_minion_id:
|
|
type: string
|
|
description: ID of the security group for kubernetes minion.
|
|
|
|
volume_driver:
|
|
type: string
|
|
description: volume driver to use for container storage
|
|
|
|
region_name:
|
|
type: string
|
|
description: A logically separate section of the cluster
|
|
|
|
username:
|
|
type: string
|
|
description: >
|
|
user account
|
|
|
|
password:
|
|
type: string
|
|
description: >
|
|
user password, not set in current implementation, only used to
|
|
fill in for Kubernetes config file
|
|
hidden: true
|
|
|
|
http_proxy:
|
|
type: string
|
|
description: http proxy address for docker
|
|
|
|
https_proxy:
|
|
type: string
|
|
description: https proxy address for docker
|
|
|
|
no_proxy:
|
|
type: string
|
|
description: no proxies for docker
|
|
|
|
kube_tag:
|
|
type: string
|
|
description: tag of the k8s containers used to provision the kubernetes cluster
|
|
|
|
flannel_tag:
|
|
type: string
|
|
description: tag of the flannel system containers
|
|
|
|
kube_version:
|
|
type: string
|
|
description: version of kubernetes used for kubernetes cluster
|
|
|
|
trustee_domain_id:
|
|
type: string
|
|
description: domain id of the trustee
|
|
|
|
trustee_user_id:
|
|
type: string
|
|
description: user id of the trustee
|
|
|
|
trustee_username:
|
|
type: string
|
|
description: username of the trustee
|
|
|
|
trustee_password:
|
|
type: string
|
|
description: password of the trustee
|
|
hidden: true
|
|
|
|
trust_id:
|
|
type: string
|
|
description: id of the trust which is used by the trustee
|
|
hidden: true
|
|
|
|
auth_url:
|
|
type: string
|
|
description: >
|
|
url for keystone, must be v2 since k8s backend only support v2
|
|
at this point
|
|
|
|
insecure_registry_url:
|
|
type: string
|
|
description: insecure registry url
|
|
|
|
container_infra_prefix:
|
|
type: string
|
|
description: >
|
|
prefix of container images used in the cluster, kubernetes components,
|
|
kubernetes-dashboard, coredns etc
|
|
|
|
dns_service_ip:
|
|
type: string
|
|
description: >
|
|
address used by Kubernetes DNS service
|
|
|
|
dns_cluster_domain:
|
|
type: string
|
|
description: >
|
|
domain name for cluster DNS
|
|
|
|
openstack_ca:
|
|
type: string
|
|
description: The OpenStack CA certificate to install on the node.
|
|
|
|
nodes_server_group_id:
|
|
type: string
|
|
description: ID of the server group for kubernetes cluster nodes.
|
|
|
|
availability_zone:
|
|
type: string
|
|
description: >
|
|
availability zone for master and nodes
|
|
default: ""
|
|
|
|
pods_network_cidr:
|
|
type: string
|
|
description: Configure the IP pool/range from which pod IPs will be chosen
|
|
|
|
kubelet_options:
|
|
type: string
|
|
description: >
|
|
additional options to be passed to the kubelet
|
|
|
|
kubeproxy_options:
|
|
type: string
|
|
description: >
|
|
additional options to be passed to the kube proxy
|
|
|
|
octavia_enabled:
|
|
type: boolean
|
|
description: >
|
|
whether or not to use Octavia for LoadBalancer type service.
|
|
default: False
|
|
|
|
container_runtime:
|
|
type: string
|
|
description: >
|
|
Container runtime to use with Kubernetes.
|
|
|
|
hyperkube_image:
|
|
type: string
|
|
description: >
|
|
Docker registry used for hyperkube image
|
|
|
|
resources:
|
|
|
|
|
|
minion_wait_handle:
|
|
type: OS::Heat::WaitConditionHandle
|
|
|
|
minion_wait_condition:
|
|
type: OS::Heat::WaitCondition
|
|
depends_on: kube-minion
|
|
properties:
|
|
handle: {get_resource: minion_wait_handle}
|
|
timeout: {get_param: wait_condition_timeout}
|
|
|
|
######################################################################
|
|
#
|
|
# software configs. these are components that are combined into
|
|
# a multipart MIME user-data archive.
|
|
#
|
|
|
|
write_heat_params:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config:
|
|
str_replace:
|
|
template: {get_file: fragments/write-heat-params.yaml}
|
|
params:
|
|
"$KUBE_ALLOW_PRIV": {get_param: kube_allow_priv}
|
|
"$DOCKER_VOLUME": {get_resource: docker_volume}
|
|
"$DOCKER_VOLUME_SIZE": {get_param: docker_volume_size}
|
|
"$KUBE_MASTER_IP": {get_param: kube_master_ip}
|
|
"$KUBE_NODE_PUBLIC_IP": {get_attr: [kube_minion_floating, floating_ip_address]}
|
|
"$KUBE_NODE_IP": {get_attr: [kube_minion_eth0, fixed_ips, 0, ip_address]}
|
|
"$WAIT_CURL": {get_attr: [minion_wait_handle, curl_cli]}
|
|
"$KUBE_API_PORT": {get_param: kubernetes_port}
|
|
"$TLS_DISABLED": {get_param: tls_disabled}
|
|
"$VERIFY_CA": {get_param: verify_ca}
|
|
"$NETWORK_DRIVER": {get_param: network_driver}
|
|
"$ETCD_SERVER_IP": {get_param: etcd_server_ip}
|
|
"$KUBE_VERSION": {get_param: kube_version}
|
|
"$CLUSTER_UUID": {get_param: cluster_uuid}
|
|
"$MAGNUM_URL": {get_param: magnum_url}
|
|
"$HTTP_PROXY": {get_param: http_proxy}
|
|
"$HTTPS_PROXY": {get_param: https_proxy}
|
|
"$NO_PROXY": {get_param: no_proxy}
|
|
"$TRUSTEE_USER_ID": {get_param: trustee_user_id}
|
|
"$TRUSTEE_PASSWORD": {get_param: trustee_password}
|
|
"$TRUST_ID": {get_param: trust_id}
|
|
"$AUTH_URL": {get_param: auth_url}
|
|
"$KUBE_CERTS_PATH": "/etc/kubernetes/ssl"
|
|
"$HOST_CERTS_PATH": "/usr/share/ca-certificates"
|
|
"$HYPERKUBE_IMAGE_REPO":
|
|
str_replace:
|
|
template: insecure_registry_urlhyperkube_image
|
|
params:
|
|
insecure_registry_url: { get_param: insecure_registry_url }
|
|
hyperkube_image: { get_param: hyperkube_image }
|
|
"$INSECURE_REGISTRY_URL": {get_param: insecure_registry_url}
|
|
"$CONTAINER_RUNTIME": {get_param: container_runtime}
|
|
"$DNS_SERVICE_IP": {get_param: dns_service_ip}
|
|
"$DNS_CLUSTER_DOMAIN": {get_param: dns_cluster_domain}
|
|
"$OCTAVIA_ENABLED": {get_param: octavia_enabled}
|
|
|
|
add_ext_ca_certs:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config:
|
|
str_replace:
|
|
params:
|
|
$OPENSTACK_CA: {get_param: openstack_ca}
|
|
template: {get_file: fragments/add-ext-ca-certs.yaml}
|
|
|
|
enable_docker_mount:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/enable-docker-mount.yaml}
|
|
|
|
write_kubeconfig:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config:
|
|
str_replace:
|
|
template: {get_file: fragments/write-kubeconfig.yaml}
|
|
params:
|
|
"$KUBE_API_PORT": {get_param: kubernetes_port}
|
|
"$KUBE_MASTER_IP": {get_param: kube_master_ip}
|
|
|
|
|
|
make_cert:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/make-cert-client.yaml}
|
|
|
|
enable_network_service:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/enable-network-service-client.yaml}
|
|
|
|
enable_kubelet:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/enable-kubelet-minion.yaml}
|
|
|
|
enable_kube_proxy:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/enable-kube-proxy-minion.yaml}
|
|
|
|
wc_notify:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/wc-notify.yaml}
|
|
|
|
add_proxy:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/add-proxy.yaml}
|
|
|
|
configure_docker:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config: {get_file: fragments/configure-docker.yaml}
|
|
|
|
kube_minion_init:
|
|
type: OS::Heat::SoftwareConfig
|
|
properties:
|
|
group: ungrouped
|
|
config:
|
|
str_replace:
|
|
template: |
|
|
$add_ext_ca_certs
|
|
$write_heat_params
|
|
$enable_docker_mount
|
|
$write_kubeconfig
|
|
$make_cert
|
|
$configure_docker
|
|
$add_proxy
|
|
$enable_network_service
|
|
$enable_kubelet
|
|
$enable_kube_proxy
|
|
$wc_notify
|
|
coreos:
|
|
units:
|
|
- name: "add-ext-ca-certs.service"
|
|
command: "start"
|
|
- name: "make-cert.service"
|
|
command: "start"
|
|
- name: "enable-docker-mount.service"
|
|
command: "start"
|
|
- name: "configure-docker.service"
|
|
command: "start"
|
|
- name: "add-proxy.service"
|
|
command: "start"
|
|
- name: "enable-network-service.service"
|
|
command: "start"
|
|
- name: "enable-kubelet.service"
|
|
command: "start"
|
|
- name: "enable-kube-proxy.service"
|
|
command: "start"
|
|
- name: "wc-notify.service"
|
|
command: "start"
|
|
params:
|
|
"$add_ext_ca_certs": {get_attr: [add_ext_ca_certs, config]}
|
|
"$write_heat_params": {get_attr: [write_heat_params, config]}
|
|
"$write_kubeconfig": {get_attr: [write_kubeconfig, config]}
|
|
"$enable_docker_mount": {get_attr: [enable_docker_mount, config]}
|
|
"$make_cert": {get_attr: [make_cert, config]}
|
|
"$configure_docker": {get_attr: [configure_docker, config]}
|
|
"$add_proxy": {get_attr: [add_proxy, config]}
|
|
"$enable_network_service": {get_attr: [enable_network_service, config]}
|
|
"$enable_kubelet": {get_attr: [enable_kubelet, config]}
|
|
"$enable_kube_proxy": {get_attr: [enable_kube_proxy, config]}
|
|
"$wc_notify": {get_attr: [wc_notify, config]}
|
|
|
|
# do NOT use "_" (underscore) in the Nova server name
|
|
# it creates a mismatch between the generated Nova name and its hostname
|
|
# which can lead to weird problems
|
|
kube-minion:
|
|
type: OS::Nova::Server
|
|
properties:
|
|
name: {get_param: name}
|
|
image: {get_param: server_image}
|
|
flavor: {get_param: minion_flavor}
|
|
key_name: {get_param: ssh_key_name}
|
|
user_data_format: RAW
|
|
user_data: {get_resource: kube_minion_init}
|
|
networks:
|
|
- port: {get_resource: kube_minion_eth0}
|
|
scheduler_hints: { group: { get_param: nodes_server_group_id }}
|
|
|
|
kube_minion_eth0:
|
|
type: OS::Neutron::Port
|
|
properties:
|
|
network: {get_param: fixed_network}
|
|
security_groups:
|
|
- {get_param: secgroup_kube_minion_id}
|
|
fixed_ips:
|
|
- subnet: {get_param: fixed_subnet}
|
|
allowed_address_pairs:
|
|
- ip_address: {get_param: flannel_network_cidr}
|
|
replacement_policy: AUTO
|
|
|
|
kube_minion_floating:
|
|
type: Magnum::Optional::KubeMinion::Neutron::FloatingIP
|
|
properties:
|
|
floating_network: {get_param: external_network}
|
|
port_id: {get_resource: kube_minion_eth0}
|
|
|
|
######################################################################
|
|
#
|
|
# docker storage. This allocates a cinder volume and attaches it
|
|
# to the minion.
|
|
#
|
|
|
|
docker_volume:
|
|
type: Magnum::Optional::Cinder::Volume
|
|
properties:
|
|
size: {get_param: docker_volume_size}
|
|
volume_type: {get_param: docker_volume_type}
|
|
|
|
docker_volume_attach:
|
|
type: Magnum::Optional::Cinder::VolumeAttachment
|
|
properties:
|
|
instance_uuid: {get_resource: kube-minion}
|
|
volume_id: {get_resource: docker_volume}
|
|
mountpoint: /dev/vdb
|
|
|
|
outputs:
|
|
|
|
kube_minion_ip:
|
|
value: {get_attr: [kube_minion_eth0, fixed_ips, 0, ip_address]}
|
|
description: >
|
|
This is the "public" IP address of the Kubernetes minion node.
|
|
|
|
kube_minion_external_ip:
|
|
value: {get_attr: [kube_minion_floating, floating_ip_address]}
|
|
description: >
|
|
This is the "public" IP address of the Kubernetes minion node.
|
|
|
|
OS::stack_id:
|
|
value: {get_param: "OS::stack_id"}
|
|
description: >
|
|
This is a id of the stack which creates from this template.
|