From 01e4b9ba5f1da9c4f11571ea78cbadd4366798cf Mon Sep 17 00:00:00 2001 From: pavel <36902936+pavel-github@users.noreply.github.com> Date: Wed, 11 May 2022 12:46:10 +0200 Subject: [PATCH] Release v0.3.0 --- releases/latest/xelon-ccm.yml | 2 + releases/v0.3.0/xelon-ccm.yml | 146 ++++++++++++++++++++++++++++++++++ 2 files changed, 148 insertions(+) create mode 100644 releases/v0.3.0/xelon-ccm.yml diff --git a/releases/latest/xelon-ccm.yml b/releases/latest/xelon-ccm.yml index 1216484..e77ad92 100644 --- a/releases/latest/xelon-ccm.yml +++ b/releases/latest/xelon-ccm.yml @@ -49,6 +49,8 @@ spec: value: "INSERT_TOKEN_HERE" - name: XELON_API_URL value: "INSERT_API_URL_HERE" + - name: XELON_CLOUD_ID + value: "INSERT_CLOUD_ID_HERE" - name: XELON_CLUSTER_ID value: "INSERT_CLUSTER_ID_HERE" diff --git a/releases/v0.3.0/xelon-ccm.yml b/releases/v0.3.0/xelon-ccm.yml new file mode 100644 index 0000000..cf296c2 --- /dev/null +++ b/releases/v0.3.0/xelon-ccm.yml @@ -0,0 +1,146 @@ +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: xelon-cloud-controller-manager + namespace: kube-system +spec: + replicas: 1 + revisionHistoryLimit: 2 + selector: + matchLabels: + app: xelon-cloud-controller-manager + template: + metadata: + labels: + app: xelon-cloud-controller-manager + annotations: + scheduler.alpha.kubernetes.io/critical-pod: '' + spec: + dnsPolicy: Default + hostNetwork: true + serviceAccountName: cloud-controller-manager + tolerations: + # this taint is set by all kubelets running `--cloud-provider=external` + # so we should tolerate it to schedule the xelon ccm + - key: "node.cloudprovider.kubernetes.io/uninitialized" + value: "true" + effect: "NoSchedule" + - key: "CriticalAddonsOnly" + operator: "Exists" + # cloud controller manages should be able to run on masters + - key: "node-role.kubernetes.io/master" + effect: NoSchedule + containers: + - image: xelonag/xelon-cloud-controller-manager:v0.3.0 + name: xelon-cloud-controller-manager + args: + - --v=2 + command: + - "/bin/xelon-cloud-controller-manager" + - "--leader-elect=false" + imagePullPolicy: "Always" + resources: + requests: + cpu: 100m + memory: 50Mi + env: + - name: XELON_TOKEN + value: "INSERT_TOKEN_HERE" + - name: XELON_API_URL + value: "INSERT_API_URL_HERE" + - name: XELON_CLOUD_ID + value: "INSERT_CLOUD_ID_HERE" + - name: XELON_CLUSTER_ID + value: "INSERT_CLUSTER_ID_HERE" + +--- +apiVersion: v1 +kind: ServiceAccount +metadata: + name: cloud-controller-manager + namespace: kube-system +--- +apiVersion: rbac.authorization.k8s.io/v1 +kind: ClusterRole +metadata: + annotations: + rbac.authorization.kubernetes.io/autoupdate: "true" + name: system:cloud-controller-manager +rules: + - apiGroups: + - "" + resources: + - events + verbs: + - create + - patch + - update + - apiGroups: + - "" + resources: + - nodes + verbs: + - '*' + - apiGroups: + - "" + resources: + - nodes/status + verbs: + - patch + - apiGroups: + - "" + resources: + - services + verbs: + - list + - patch + - update + - watch + - apiGroups: + - "" + resources: + - services/status + verbs: + - list + - patch + - update + - watch + - apiGroups: + - "" + resources: + - serviceaccounts + verbs: + - create + - apiGroups: + - "" + resources: + - persistentvolumes + verbs: + - get + - list + - update + - watch + - apiGroups: + - "" + resources: + - endpoints + verbs: + - create + - get + - list + - watch + - update +--- +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: system:cloud-controller-manager +roleRef: + apiGroup: rbac.authorization.k8s.io + kind: ClusterRole + name: system:cloud-controller-manager +subjects: + - kind: ServiceAccount + name: cloud-controller-manager + namespace: kube-system