mirror of
https://github.com/kubernetes-sigs/kubespray.git
synced 2026-02-01 09:38:12 -03:30
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
15 lines
436 B
YAML
15 lines
436 B
YAML
dependencies:
|
|
- role: download
|
|
file: "{{ downloads.netcheck_server }}"
|
|
when: deploy_netchecker
|
|
tags: [download, netchecker]
|
|
- role: download
|
|
file: "{{ downloads.netcheck_agent }}"
|
|
when: deploy_netchecker
|
|
tags: [download, netchecker]
|
|
- {role: kubernetes-apps/ansible, tags: apps}
|
|
- {role: kubernetes-apps/kpm, tags: [apps, kpm]}
|
|
- role: kubernetes-apps/efk
|
|
when: efk_enabled
|
|
tags: [ apps, efk ]
|