Files
openstack-helm/roles/deploy-env/defaults/main.yaml
Vladimir Kozhukalov 0e104b9600 Use Metallb for all jobs by default
The current way how we utilize K8s Ingress API
is complicated and we agreed to re-design it.

It assumes we have two ingress controller instances:
- cluster wide instance
- namespace instance

Cluster wide instance is deployed in the host network namespace
and listens on node IPs. We can use it to get access to services
running inside the k8s cluster if we resolve names into cluster IPs.

Namespace instance listens on cluster IPs and is only
available inside the cluster or via a load balancer like Metallb.
For tests we utilize this instance together with the cluster.local
domain suffix to get access to services running on top of K8s.
However cluster.local is not intended to be used outside the cluster.
The *.cluster.local names are not supposed to be visible outside
and should be used only for the communication inside the cluster.

Load balancers or other more generally gateway instances (see Gateway API)
should be used to get access to services running in K8s clusters.

This PS is a step towards clearer ingress implementation.

Change-Id: I57bee6e0f82c9deb2745e8e0d18c420b74837421
2025-06-26 12:59:19 +00:00

78 lines
2.2 KiB
YAML

# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
---
kube_version_repo: "v1.32"
# the list of k8s package versions are available here
# https://pkgs.k8s.io/core:/stable:/{{ kube_version_repo }}/deb/Packages
kube_version: "1.32.5-1.1"
helm_version: "v3.18.1"
crictl_version: "v1.33.0"
calico_setup: true
calico_version: "v3.30.1"
calico_manifest_url: "https://raw.githubusercontent.com/projectcalico/calico/{{ calico_version }}/manifests/calico.yaml"
cilium_setup: false
cilium_version: "1.17.4"
flannel_setup: false
flannel_version: v0.26.7
ingress_setup: false
ingress_nginx_version: "4.12.2"
ingress_openstack_setup: true
ingress_ceph_setup: true
ingress_osh_infra_setup: false
kubectl:
user: zuul
group: zuul
osh_plugin_repo: "https://opendev.org/openstack/openstack-helm-plugin.git"
kubeadm:
pod_network_cidr: "10.244.0.0/16"
service_cidr: "10.96.0.0/16"
docker:
root_path: /var/lib/docker
docker_users:
- zuul
containerd:
root_path: /var/lib/containerd
loopback_setup: false
loopback_device: /dev/loop100
loopback_image: /var/lib/openstack-helm/ceph-loop.img
loopback_image_size: 12G
coredns_resolver_setup: false
metallb_setup: true
metallb_version: "0.14.9"
metallb_pool_cidr: "172.24.128.0/24"
metallb_openstack_endpoint_cidr: "172.24.128.100/24"
client_cluster_ssh_setup: true
client_ssh_user: zuul
cluster_ssh_user: zuul
openstack_provider_gateway_setup: false
openstack_provider_network_cidr: "172.24.4.0/24"
openstack_provider_gateway_cidr: "172.24.4.1/24"
tunnel_network_cidr: "172.24.5.0/24"
tunnel_client_cidr: "172.24.5.2/24"
tunnel_cluster_cidr: "172.24.5.1/24"
dnsmasq_image: "quay.io/airshipit/neutron:2024.2-ubuntu_jammy"
nginx_image: "quay.io/airshipit/nginx:alpine3.18"
...