Stop templating kube-system namespace and creating it (#2545)

Kubernetes makes this namespace automatically, so there is
no need for kubespray to manage it.
This commit is contained in:
Matthew Mosesohn
2018-03-30 14:29:13 +03:00
committed by GitHub
parent f619eb08b1
commit 03bcfa7ff5
91 changed files with 122 additions and 159 deletions

View File

@@ -2,7 +2,7 @@ kind: ConfigMap
apiVersion: v1
metadata:
name: calico-config
namespace: {{ system_namespace }}
namespace: kube-system
data:
etcd_endpoints: "{{ etcd_access_addresses }}"
etcd_ca: "/calico-secrets/ca_cert.crt"

View File

@@ -3,7 +3,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: calico-node
namespace: {{ system_namespace }}
namespace: kube-system
rules:
- apiGroups: [""]
resources:

View File

@@ -10,4 +10,4 @@ roleRef:
subjects:
- kind: ServiceAccount
name: calico-node
namespace: {{ system_namespace }}
namespace: kube-system

View File

@@ -3,6 +3,6 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: calico-node
namespace: {{ system_namespace }}
namespace: kube-system
labels:
kubernetes.io/cluster-service: "true"

View File

@@ -6,7 +6,7 @@ kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: calico-node
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: calico-node
spec:

View File

@@ -3,7 +3,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: calico
namespace: {{ system_namespace }}
namespace: kube-system
rules:
- apiGroups: [""]
resources:

View File

@@ -11,4 +11,4 @@ roleRef:
subjects:
- kind: ServiceAccount
name: canal
namespace: {{ system_namespace }}
namespace: kube-system

View File

@@ -11,4 +11,4 @@ roleRef:
subjects:
- kind: ServiceAccount
name: canal
namespace: {{ system_namespace }}
namespace: kube-system

View File

@@ -3,7 +3,7 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: canal
namespace: {{ system_namespace }}
namespace: kube-system
labels:
kubernetes.io/cluster-service: "true"

View File

@@ -3,7 +3,7 @@ kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: canal-node
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: canal-node
spec:

View File

@@ -2,7 +2,7 @@ kind: ConfigMap
apiVersion: v1
metadata:
name: cilium-config
namespace: {{ system_namespace }}
namespace: kube-system
data:
# This etcd-config contains the etcd endpoints of your cluster. If you use
# TLS please make sure you uncomment the ca-file line and add the respective

View File

@@ -10,6 +10,6 @@ roleRef:
subjects:
- kind: ServiceAccount
name: cilium
namespace: {{ system_namespace }}
namespace: kube-system
- kind: Group
name: system:nodes

View File

@@ -3,7 +3,7 @@ apiVersion: extensions/v1beta1
kind: DaemonSet
metadata:
name: cilium
namespace: {{ system_namespace }}
namespace: kube-system
spec:
template:
metadata:

View File

@@ -3,4 +3,4 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: cilium
namespace: {{ system_namespace }}
namespace: kube-system

View File

@@ -3,7 +3,7 @@ apiVersion: extensions/v1beta1
kind: DaemonSet
metadata:
name: contiv-api-proxy
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-api-proxy
spec:
@@ -12,7 +12,7 @@ spec:
template:
metadata:
name: contiv-api-proxy
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-api-proxy
annotations:

View File

@@ -5,7 +5,7 @@ kind: ConfigMap
apiVersion: v1
metadata:
name: contiv-config
namespace: {{ system_namespace }}
namespace: kube-system
data:
# The location of your cluster store. This is set to the
# avdertise-client value below from the contiv-etcd service.

View File

@@ -3,7 +3,7 @@ kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: contiv-etcd-proxy
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-etcd-proxy
spec:

View File

@@ -3,7 +3,7 @@ kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: contiv-etcd
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-etcd
spec:

View File

@@ -2,7 +2,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: contiv-netmaster
namespace: {{ system_namespace }}
namespace: kube-system
rules:
- apiGroups:
- ""

View File

@@ -9,4 +9,4 @@ roleRef:
subjects:
- kind: ServiceAccount
name: contiv-netmaster
namespace: {{ system_namespace }}
namespace: kube-system

View File

@@ -2,6 +2,6 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: contiv-netmaster
namespace: {{ system_namespace }}
namespace: kube-system
labels:
kubernetes.io/cluster-service: "true"

View File

@@ -3,7 +3,7 @@ kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: contiv-netmaster
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-netmaster
spec:
@@ -12,7 +12,7 @@ spec:
template:
metadata:
name: contiv-netmaster
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-netmaster
annotations:

View File

@@ -2,7 +2,7 @@ kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: contiv-netplugin
namespace: {{ system_namespace }}
namespace: kube-system
rules:
- apiGroups:
- ""

View File

@@ -9,4 +9,4 @@ roleRef:
subjects:
- kind: ServiceAccount
name: contiv-netplugin
namespace: {{ system_namespace }}
namespace: kube-system

View File

@@ -2,6 +2,6 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: contiv-netplugin
namespace: {{ system_namespace }}
namespace: kube-system
labels:
kubernetes.io/cluster-service: "true"

View File

@@ -5,7 +5,7 @@ kind: DaemonSet
apiVersion: extensions/v1beta1
metadata:
name: contiv-netplugin
namespace: {{ system_namespace }}
namespace: kube-system
labels:
k8s-app: contiv-netplugin
spec:

View File

@@ -3,7 +3,7 @@ apiVersion: v1
kind: ServiceAccount
metadata:
name: flannel
namespace: "{{system_namespace}}"
namespace: "kube-system"
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
@@ -41,4 +41,4 @@ roleRef:
subjects:
- kind: ServiceAccount
name: flannel
namespace: "{{system_namespace}}"
namespace: "kube-system"

View File

@@ -3,7 +3,7 @@ kind: ConfigMap
apiVersion: v1
metadata:
name: kube-flannel-cfg
namespace: "{{system_namespace}}"
namespace: "kube-system"
labels:
tier: node
app: flannel
@@ -41,7 +41,7 @@ apiVersion: extensions/v1beta1
kind: DaemonSet
metadata:
name: kube-flannel
namespace: "{{system_namespace}}"
namespace: "kube-system"
labels:
tier: node
k8s-app: flannel

View File

@@ -8,14 +8,14 @@ items:
name: weave-net
labels:
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
- apiVersion: rbac.authorization.k8s.io/v1beta1
kind: ClusterRole
metadata:
name: weave-net
labels:
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
rules:
- apiGroups:
- ''
@@ -41,7 +41,7 @@ items:
name: weave-net
labels:
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
roleRef:
kind: ClusterRole
name: weave-net
@@ -49,14 +49,14 @@ items:
subjects:
- kind: ServiceAccount
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
- apiVersion: rbac.authorization.k8s.io/v1beta1
kind: Role
metadata:
name: weave-net
labels:
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
rules:
- apiGroups:
- ''
@@ -79,7 +79,7 @@ items:
name: weave-net
labels:
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
roleRef:
kind: Role
name: weave-net
@@ -87,7 +87,7 @@ items:
subjects:
- kind: ServiceAccount
name: weave-net
namespace: {{ system_namespace }}
namespace: kube-system
- apiVersion: extensions/v1beta1
kind: DaemonSet
metadata:
@@ -95,7 +95,7 @@ items:
labels:
name: weave-net
version: v{{ weave_version }}
namespace: {{ system_namespace }}
namespace: kube-system
spec:
minReadySeconds: 5
template: