Skip to content
This repository was archived by the owner on Sep 30, 2020. It is now read-only.

Commit 4c8ca96

Browse files
authored
Merge pull request #1872 from dominicgunn/v0.16.x-calico
[v0.16.x] Setup Calico Networking Option
2 parents 675ee63 + 771b148 commit 4c8ca96

File tree

8 files changed

+1319
-100
lines changed

8 files changed

+1319
-100
lines changed

.travis.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ go:
44
- 1.13.x
55

66
script:
7-
- travis_wait 40 make test-with-cover
7+
- travis_wait 50 make test-with-cover
88

99
after_success:
1010
- bash <(curl -s https://codecov.io/bash)

builtin/files/cluster.yaml.tmpl

+9-5
Original file line numberDiff line numberDiff line change
@@ -1206,10 +1206,10 @@ kubernetes:
12061206
# cpu: "250m"
12071207
# memory: "200Mi"
12081208
# calicoNodeImage:
1209-
# repo: quay.io/calico/node
1209+
# repo: calico/node
12101210
# tag: v3.9.1
12111211
# calicoCniImage:
1212-
# repo: quay.io/calico/cni
1212+
# repo: calico/cni
12131213
# tag: v3.9.1
12141214
# flannelImage:
12151215
# repo: quay.io/coreos/flannel
@@ -1218,16 +1218,20 @@ kubernetes:
12181218
# repo: quay.io/coreos/flannel-cni
12191219
# tag: v0.3.0
12201220
# typhaImage:
1221-
# repo: quay.io/calico/typha
1221+
# repo: calico/typha
12221222
# tag: v3.9.1
12231223
# # By default, flannel assigns a /24 per node for pod's ips, this is effectively limiting your cluster size
12241224
# # to 255 nodes since each lease will be preserved for 24h.
12251225
# # If you have a bigger cluster you may want to tune this number to assign an smaller block per node.
12261226
# # Be aware that network should be able to accomodate at least 4 subnets, and networks smaller than /28
12271227
# # will make flannel panic and exit.
12281228
# # Ref: https://github.com/coreos/flannel/blob/62a1314e51047e25606b4e4e30bd23d7a8d746bc/subnet/config.go#L69
1229-
# flannelConfig:
1230-
# subnetLen: 24
1229+
# flannelConfig:
1230+
# subnetLen: 24
1231+
# calicoConfig:
1232+
# # If false, we will run with bird in bgp/ip-in-ip mode.
1233+
# vxlanMode: true
1234+
12311235

12321236
# Create MountTargets to subnets managed by kube-aws for a pre-existing Elastic File System (Amazon EFS),
12331237
# and then mount to every node.

builtin/files/stack-templates/network.json.tmpl

+107
Original file line numberDiff line numberDiff line change
@@ -194,6 +194,61 @@
194194
},
195195
"Type": "AWS::EC2::SecurityGroupIngress"
196196
},
197+
"SecurityGroupControllerIngressFromControllerToController": {
198+
"Properties": {
199+
"GroupId": {
200+
"Ref": "SecurityGroupController"
201+
},
202+
"IpProtocol": "-1",
203+
"SourceSecurityGroupId": {
204+
"Ref": "SecurityGroupController"
205+
}
206+
},
207+
"Type": "AWS::EC2::SecurityGroupIngress"
208+
},
209+
"SecurityGroupControllerIngressFromWorkerToControllelr": {
210+
"Properties": {
211+
"GroupId": {
212+
"Ref": "SecurityGroupController"
213+
},
214+
"Description": "controller to controller sg",
215+
"IpProtocol": "-1",
216+
"SourceSecurityGroupId": {
217+
"Ref": "SecurityGroupWorker"
218+
}
219+
},
220+
"Type": "AWS::EC2::SecurityGroupIngress"
221+
},
222+
"SecurityGroupControllerIngressFromControllerToCalico": {
223+
"Properties": {
224+
"FromPort": 4789,
225+
"GroupId": {
226+
"Ref": "SecurityGroupController"
227+
},
228+
"Description": "controller to calico",
229+
"IpProtocol": "udp",
230+
"SourceSecurityGroupId": {
231+
"Ref": "SecurityGroupController"
232+
},
233+
"ToPort": 4789
234+
},
235+
"Type": "AWS::EC2::SecurityGroupIngress"
236+
},
237+
"SecurityGroupControllerIngressFromWorkerToCalico": {
238+
"Properties": {
239+
"FromPort": 4789,
240+
"GroupId": {
241+
"Ref": "SecurityGroupController"
242+
},
243+
"Description": "worker to calico sg",
244+
"IpProtocol": "udp",
245+
"SourceSecurityGroupId": {
246+
"Ref": "SecurityGroupWorker"
247+
},
248+
"ToPort": 4789
249+
},
250+
"Type": "AWS::EC2::SecurityGroupIngress"
251+
},
197252
"SecurityGroupWorker": {
198253
"Properties": {
199254
"GroupDescription": {
@@ -331,6 +386,58 @@
331386
},
332387
"Type": "AWS::EC2::SecurityGroupIngress"
333388
},
389+
"SecurityGroupWorkerIngressFromControllerToWorker": {
390+
"Properties": {
391+
"GroupId": {
392+
"Ref": "SecurityGroupWorker"
393+
},
394+
"IpProtocol": "-1",
395+
"SourceSecurityGroupId": {
396+
"Ref": "SecurityGroupController"
397+
}
398+
},
399+
"Type": "AWS::EC2::SecurityGroupIngress"
400+
},
401+
"SecurityGroupWorkerIngressFromWorkerToWorker": {
402+
"Properties": {
403+
"GroupId": {
404+
"Ref": "SecurityGroupWorker"
405+
},
406+
"IpProtocol": "-1",
407+
"SourceSecurityGroupId": {
408+
"Ref": "SecurityGroupWorker"
409+
}
410+
},
411+
"Type": "AWS::EC2::SecurityGroupIngress"
412+
},
413+
"SecurityGroupWorkerIngressFromControllerToCalico": {
414+
"Properties": {
415+
"FromPort": 4789,
416+
"GroupId": {
417+
"Ref": "SecurityGroupWorker"
418+
},
419+
"IpProtocol": "udp",
420+
"SourceSecurityGroupId": {
421+
"Ref": "SecurityGroupController"
422+
},
423+
"ToPort": 4789
424+
},
425+
"Type": "AWS::EC2::SecurityGroupIngress"
426+
},
427+
"SecurityGroupWorkerIngressFromWorkerToCalico": {
428+
"Properties": {
429+
"FromPort": 4789,
430+
"GroupId": {
431+
"Ref": "SecurityGroupWorker"
432+
},
433+
"IpProtocol": "udp",
434+
"SourceSecurityGroupId": {
435+
"Ref": "SecurityGroupWorker"
436+
},
437+
"ToPort": 4789
438+
},
439+
"Type": "AWS::EC2::SecurityGroupIngress"
440+
},
334441
"SecurityGroupWorkerIngressFromControllerTocAdvisor": {
335442
"Properties": {
336443
"FromPort": 4194,

0 commit comments

Comments
 (0)