6098 lines
312 KiB
YAML
6098 lines
312 KiB
YAML
|
apiVersion: v1
|
|||
|
kind: Namespace
|
|||
|
metadata:
|
|||
|
name: tigera-operator
|
|||
|
labels:
|
|||
|
name: tigera-operator
|
|||
|
|
|||
|
---
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_bgpconfigurations.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: bgpconfigurations.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: BGPConfiguration
|
|||
|
listKind: BGPConfigurationList
|
|||
|
plural: bgpconfigurations
|
|||
|
singular: bgpconfiguration
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: BGPConfiguration contains the configuration for any BGP routing.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: BGPConfigurationSpec contains the values of the BGP configuration.
|
|||
|
properties:
|
|||
|
asNumber:
|
|||
|
description: 'ASNumber is the default AS number used by a node. [Default:
|
|||
|
64512]'
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
bindMode:
|
|||
|
description: BindMode indicates whether to listen for BGP connections
|
|||
|
on all addresses (None) or only on the node's canonical IP address
|
|||
|
Node.Spec.BGP.IPvXAddress (NodeIP). Default behaviour is to listen
|
|||
|
for BGP connections on all addresses.
|
|||
|
type: string
|
|||
|
communities:
|
|||
|
description: Communities is a list of BGP community values and their
|
|||
|
arbitrary names for tagging routes.
|
|||
|
items:
|
|||
|
description: Community contains standard or large community value
|
|||
|
and its name.
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name given to community value.
|
|||
|
type: string
|
|||
|
value:
|
|||
|
description: Value must be of format `aa:nn` or `aa:nn:mm`.
|
|||
|
For standard community use `aa:nn` format, where `aa` and
|
|||
|
`nn` are 16 bit number. For large community use `aa:nn:mm`
|
|||
|
format, where `aa`, `nn` and `mm` are 32 bit number. Where,
|
|||
|
`aa` is an AS Number, `nn` and `mm` are per-AS identifier.
|
|||
|
pattern: ^(\d+):(\d+)$|^(\d+):(\d+):(\d+)$
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
listenPort:
|
|||
|
description: ListenPort is the port where BGP protocol should listen.
|
|||
|
Defaults to 179
|
|||
|
maximum: 65535
|
|||
|
minimum: 1
|
|||
|
type: integer
|
|||
|
logSeverityScreen:
|
|||
|
description: 'LogSeverityScreen is the log severity above which logs
|
|||
|
are sent to the stdout. [Default: INFO]'
|
|||
|
type: string
|
|||
|
nodeMeshMaxRestartTime:
|
|||
|
description: Time to allow for software restart for node-to-mesh peerings. When
|
|||
|
specified, this is configured as the graceful restart timeout. When
|
|||
|
not specified, the BIRD default of 120s is used. This field can
|
|||
|
only be set on the default BGPConfiguration instance and requires
|
|||
|
that NodeMesh is enabled
|
|||
|
type: string
|
|||
|
nodeMeshPassword:
|
|||
|
description: Optional BGP password for full node-to-mesh peerings.
|
|||
|
This field can only be set on the default BGPConfiguration instance
|
|||
|
and requires that NodeMesh is enabled
|
|||
|
properties:
|
|||
|
secretKeyRef:
|
|||
|
description: Selects a key of a secret in the node pod's namespace.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The key of the secret to select from. Must be
|
|||
|
a valid secret key.
|
|||
|
type: string
|
|||
|
name:
|
|||
|
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
|
|||
|
TODO: Add other useful fields. apiVersion, kind, uid?'
|
|||
|
type: string
|
|||
|
optional:
|
|||
|
description: Specify whether the Secret or its key must be
|
|||
|
defined
|
|||
|
type: boolean
|
|||
|
required:
|
|||
|
- key
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
nodeToNodeMeshEnabled:
|
|||
|
description: 'NodeToNodeMeshEnabled sets whether full node to node
|
|||
|
BGP mesh is enabled. [Default: true]'
|
|||
|
type: boolean
|
|||
|
prefixAdvertisements:
|
|||
|
description: PrefixAdvertisements contains per-prefix advertisement
|
|||
|
configuration.
|
|||
|
items:
|
|||
|
description: PrefixAdvertisement configures advertisement properties
|
|||
|
for the specified CIDR.
|
|||
|
properties:
|
|||
|
cidr:
|
|||
|
description: CIDR for which properties should be advertised.
|
|||
|
type: string
|
|||
|
communities:
|
|||
|
description: Communities can be list of either community names
|
|||
|
already defined in `Specs.Communities` or community value
|
|||
|
of format `aa:nn` or `aa:nn:mm`. For standard community use
|
|||
|
`aa:nn` format, where `aa` and `nn` are 16 bit number. For
|
|||
|
large community use `aa:nn:mm` format, where `aa`, `nn` and
|
|||
|
`mm` are 32 bit number. Where,`aa` is an AS Number, `nn` and
|
|||
|
`mm` are per-AS identifier.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
serviceClusterIPs:
|
|||
|
description: ServiceClusterIPs are the CIDR blocks from which service
|
|||
|
cluster IPs are allocated. If specified, Calico will advertise these
|
|||
|
blocks, as well as any cluster IPs within them.
|
|||
|
items:
|
|||
|
description: ServiceClusterIPBlock represents a single allowed ClusterIP
|
|||
|
CIDR block.
|
|||
|
properties:
|
|||
|
cidr:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
serviceExternalIPs:
|
|||
|
description: ServiceExternalIPs are the CIDR blocks for Kubernetes
|
|||
|
Service External IPs. Kubernetes Service ExternalIPs will only be
|
|||
|
advertised if they are within one of these blocks.
|
|||
|
items:
|
|||
|
description: ServiceExternalIPBlock represents a single allowed
|
|||
|
External IP CIDR block.
|
|||
|
properties:
|
|||
|
cidr:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
serviceLoadBalancerIPs:
|
|||
|
description: ServiceLoadBalancerIPs are the CIDR blocks for Kubernetes
|
|||
|
Service LoadBalancer IPs. Kubernetes Service status.LoadBalancer.Ingress
|
|||
|
IPs will only be advertised if they are within one of these blocks.
|
|||
|
items:
|
|||
|
description: ServiceLoadBalancerIPBlock represents a single allowed
|
|||
|
LoadBalancer IP CIDR block.
|
|||
|
properties:
|
|||
|
cidr:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_bgppeers.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: bgppeers.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: BGPPeer
|
|||
|
listKind: BGPPeerList
|
|||
|
plural: bgppeers
|
|||
|
singular: bgppeer
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: BGPPeerSpec contains the specification for a BGPPeer resource.
|
|||
|
properties:
|
|||
|
asNumber:
|
|||
|
description: The AS Number of the peer.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
keepOriginalNextHop:
|
|||
|
description: Option to keep the original nexthop field when routes
|
|||
|
are sent to a BGP Peer. Setting "true" configures the selected BGP
|
|||
|
Peers node to use the "next hop keep;" instead of "next hop self;"(default)
|
|||
|
in the specific branch of the Node on "bird.cfg".
|
|||
|
type: boolean
|
|||
|
maxRestartTime:
|
|||
|
description: Time to allow for software restart. When specified,
|
|||
|
this is configured as the graceful restart timeout. When not specified,
|
|||
|
the BIRD default of 120s is used.
|
|||
|
type: string
|
|||
|
node:
|
|||
|
description: The node name identifying the Calico node instance that
|
|||
|
is targeted by this peer. If this is not set, and no nodeSelector
|
|||
|
is specified, then this BGP peer selects all nodes in the cluster.
|
|||
|
type: string
|
|||
|
nodeSelector:
|
|||
|
description: Selector for the nodes that should have this peering. When
|
|||
|
this is set, the Node field must be empty.
|
|||
|
type: string
|
|||
|
numAllowedLocalASNumbers:
|
|||
|
description: Maximum number of local AS numbers that are allowed in
|
|||
|
the AS path for received routes. This removes BGP loop prevention
|
|||
|
and should only be used if absolutely necesssary.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
password:
|
|||
|
description: Optional BGP password for the peerings generated by this
|
|||
|
BGPPeer resource.
|
|||
|
properties:
|
|||
|
secretKeyRef:
|
|||
|
description: Selects a key of a secret in the node pod's namespace.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The key of the secret to select from. Must be
|
|||
|
a valid secret key.
|
|||
|
type: string
|
|||
|
name:
|
|||
|
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
|
|||
|
TODO: Add other useful fields. apiVersion, kind, uid?'
|
|||
|
type: string
|
|||
|
optional:
|
|||
|
description: Specify whether the Secret or its key must be
|
|||
|
defined
|
|||
|
type: boolean
|
|||
|
required:
|
|||
|
- key
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
peerIP:
|
|||
|
description: The IP address of the peer followed by an optional port
|
|||
|
number to peer with. If port number is given, format should be `[<IPv6>]:port`
|
|||
|
or `<IPv4>:<port>` for IPv4. If optional port number is not set,
|
|||
|
and this peer IP and ASNumber belongs to a calico/node with ListenPort
|
|||
|
set in BGPConfiguration, then we use that port to peer.
|
|||
|
type: string
|
|||
|
peerSelector:
|
|||
|
description: Selector for the remote nodes to peer with. When this
|
|||
|
is set, the PeerIP and ASNumber fields must be empty. For each
|
|||
|
peering between the local node and selected remote nodes, we configure
|
|||
|
an IPv4 peering if both ends have NodeBGPSpec.IPv4Address specified,
|
|||
|
and an IPv6 peering if both ends have NodeBGPSpec.IPv6Address specified. The
|
|||
|
remote AS number comes from the remote node's NodeBGPSpec.ASNumber,
|
|||
|
or the global default if that is not set.
|
|||
|
type: string
|
|||
|
sourceAddress:
|
|||
|
description: Specifies whether and how to configure a source address
|
|||
|
for the peerings generated by this BGPPeer resource. Default value
|
|||
|
"UseNodeIP" means to configure the node IP as the source address. "None"
|
|||
|
means not to configure a source address.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_blockaffinities.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: blockaffinities.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: BlockAffinity
|
|||
|
listKind: BlockAffinityList
|
|||
|
plural: blockaffinities
|
|||
|
singular: blockaffinity
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: BlockAffinitySpec contains the specification for a BlockAffinity
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
cidr:
|
|||
|
type: string
|
|||
|
deleted:
|
|||
|
description: Deleted indicates that this block affinity is being deleted.
|
|||
|
This field is a string for compatibility with older releases that
|
|||
|
mistakenly treat this field as a string.
|
|||
|
type: string
|
|||
|
node:
|
|||
|
type: string
|
|||
|
state:
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- cidr
|
|||
|
- deleted
|
|||
|
- node
|
|||
|
- state
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_caliconodestatuses.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
annotations:
|
|||
|
controller-gen.kubebuilder.io/version: (devel)
|
|||
|
creationTimestamp: null
|
|||
|
name: caliconodestatuses.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: CalicoNodeStatus
|
|||
|
listKind: CalicoNodeStatusList
|
|||
|
plural: caliconodestatuses
|
|||
|
singular: caliconodestatus
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: CalicoNodeStatusSpec contains the specification for a CalicoNodeStatus
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
classes:
|
|||
|
description: Classes declares the types of information to monitor
|
|||
|
for this calico/node, and allows for selective status reporting
|
|||
|
about certain subsets of information.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
node:
|
|||
|
description: The node name identifies the Calico node instance for
|
|||
|
node status.
|
|||
|
type: string
|
|||
|
updatePeriodSeconds:
|
|||
|
description: UpdatePeriodSeconds is the period at which CalicoNodeStatus
|
|||
|
should be updated. Set to 0 to disable CalicoNodeStatus refresh.
|
|||
|
Maximum update period is one day.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
status:
|
|||
|
description: CalicoNodeStatusStatus defines the observed state of CalicoNodeStatus.
|
|||
|
No validation needed for status since it is updated by Calico.
|
|||
|
properties:
|
|||
|
agent:
|
|||
|
description: Agent holds agent status on the node.
|
|||
|
properties:
|
|||
|
birdV4:
|
|||
|
description: BIRDV4 represents the latest observed status of bird4.
|
|||
|
properties:
|
|||
|
lastBootTime:
|
|||
|
description: LastBootTime holds the value of lastBootTime
|
|||
|
from bird.ctl output.
|
|||
|
type: string
|
|||
|
lastReconfigurationTime:
|
|||
|
description: LastReconfigurationTime holds the value of lastReconfigTime
|
|||
|
from bird.ctl output.
|
|||
|
type: string
|
|||
|
routerID:
|
|||
|
description: Router ID used by bird.
|
|||
|
type: string
|
|||
|
state:
|
|||
|
description: The state of the BGP Daemon.
|
|||
|
type: string
|
|||
|
version:
|
|||
|
description: Version of the BGP daemon
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
birdV6:
|
|||
|
description: BIRDV6 represents the latest observed status of bird6.
|
|||
|
properties:
|
|||
|
lastBootTime:
|
|||
|
description: LastBootTime holds the value of lastBootTime
|
|||
|
from bird.ctl output.
|
|||
|
type: string
|
|||
|
lastReconfigurationTime:
|
|||
|
description: LastReconfigurationTime holds the value of lastReconfigTime
|
|||
|
from bird.ctl output.
|
|||
|
type: string
|
|||
|
routerID:
|
|||
|
description: Router ID used by bird.
|
|||
|
type: string
|
|||
|
state:
|
|||
|
description: The state of the BGP Daemon.
|
|||
|
type: string
|
|||
|
version:
|
|||
|
description: Version of the BGP daemon
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
bgp:
|
|||
|
description: BGP holds node BGP status.
|
|||
|
properties:
|
|||
|
numberEstablishedV4:
|
|||
|
description: The total number of IPv4 established bgp sessions.
|
|||
|
type: integer
|
|||
|
numberEstablishedV6:
|
|||
|
description: The total number of IPv6 established bgp sessions.
|
|||
|
type: integer
|
|||
|
numberNotEstablishedV4:
|
|||
|
description: The total number of IPv4 non-established bgp sessions.
|
|||
|
type: integer
|
|||
|
numberNotEstablishedV6:
|
|||
|
description: The total number of IPv6 non-established bgp sessions.
|
|||
|
type: integer
|
|||
|
peersV4:
|
|||
|
description: PeersV4 represents IPv4 BGP peers status on the node.
|
|||
|
items:
|
|||
|
description: CalicoNodePeer contains the status of BGP peers
|
|||
|
on the node.
|
|||
|
properties:
|
|||
|
peerIP:
|
|||
|
description: IP address of the peer whose condition we are
|
|||
|
reporting.
|
|||
|
type: string
|
|||
|
since:
|
|||
|
description: Since the state or reason last changed.
|
|||
|
type: string
|
|||
|
state:
|
|||
|
description: State is the BGP session state.
|
|||
|
type: string
|
|||
|
type:
|
|||
|
description: Type indicates whether this peer is configured
|
|||
|
via the node-to-node mesh, or via en explicit global or
|
|||
|
per-node BGPPeer object.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
peersV6:
|
|||
|
description: PeersV6 represents IPv6 BGP peers status on the node.
|
|||
|
items:
|
|||
|
description: CalicoNodePeer contains the status of BGP peers
|
|||
|
on the node.
|
|||
|
properties:
|
|||
|
peerIP:
|
|||
|
description: IP address of the peer whose condition we are
|
|||
|
reporting.
|
|||
|
type: string
|
|||
|
since:
|
|||
|
description: Since the state or reason last changed.
|
|||
|
type: string
|
|||
|
state:
|
|||
|
description: State is the BGP session state.
|
|||
|
type: string
|
|||
|
type:
|
|||
|
description: Type indicates whether this peer is configured
|
|||
|
via the node-to-node mesh, or via en explicit global or
|
|||
|
per-node BGPPeer object.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- numberEstablishedV4
|
|||
|
- numberEstablishedV6
|
|||
|
- numberNotEstablishedV4
|
|||
|
- numberNotEstablishedV6
|
|||
|
type: object
|
|||
|
lastUpdated:
|
|||
|
description: LastUpdated is a timestamp representing the server time
|
|||
|
when CalicoNodeStatus object last updated. It is represented in
|
|||
|
RFC3339 form and is in UTC.
|
|||
|
format: date-time
|
|||
|
nullable: true
|
|||
|
type: string
|
|||
|
routes:
|
|||
|
description: Routes reports routes known to the Calico BGP daemon
|
|||
|
on the node.
|
|||
|
properties:
|
|||
|
routesV4:
|
|||
|
description: RoutesV4 represents IPv4 routes on the node.
|
|||
|
items:
|
|||
|
description: CalicoNodeRoute contains the status of BGP routes
|
|||
|
on the node.
|
|||
|
properties:
|
|||
|
destination:
|
|||
|
description: Destination of the route.
|
|||
|
type: string
|
|||
|
gateway:
|
|||
|
description: Gateway for the destination.
|
|||
|
type: string
|
|||
|
interface:
|
|||
|
description: Interface for the destination
|
|||
|
type: string
|
|||
|
learnedFrom:
|
|||
|
description: LearnedFrom contains information regarding
|
|||
|
where this route originated.
|
|||
|
properties:
|
|||
|
peerIP:
|
|||
|
description: If sourceType is NodeMesh or BGPPeer, IP
|
|||
|
address of the router that sent us this route.
|
|||
|
type: string
|
|||
|
sourceType:
|
|||
|
description: Type of the source where a route is learned
|
|||
|
from.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type:
|
|||
|
description: Type indicates if the route is being used for
|
|||
|
forwarding or not.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
routesV6:
|
|||
|
description: RoutesV6 represents IPv6 routes on the node.
|
|||
|
items:
|
|||
|
description: CalicoNodeRoute contains the status of BGP routes
|
|||
|
on the node.
|
|||
|
properties:
|
|||
|
destination:
|
|||
|
description: Destination of the route.
|
|||
|
type: string
|
|||
|
gateway:
|
|||
|
description: Gateway for the destination.
|
|||
|
type: string
|
|||
|
interface:
|
|||
|
description: Interface for the destination
|
|||
|
type: string
|
|||
|
learnedFrom:
|
|||
|
description: LearnedFrom contains information regarding
|
|||
|
where this route originated.
|
|||
|
properties:
|
|||
|
peerIP:
|
|||
|
description: If sourceType is NodeMesh or BGPPeer, IP
|
|||
|
address of the router that sent us this route.
|
|||
|
type: string
|
|||
|
sourceType:
|
|||
|
description: Type of the source where a route is learned
|
|||
|
from.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type:
|
|||
|
description: Type indicates if the route is being used for
|
|||
|
forwarding or not.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_clusterinformations.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: clusterinformations.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: ClusterInformation
|
|||
|
listKind: ClusterInformationList
|
|||
|
plural: clusterinformations
|
|||
|
singular: clusterinformation
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: ClusterInformation contains the cluster specific information.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: ClusterInformationSpec contains the values of describing
|
|||
|
the cluster.
|
|||
|
properties:
|
|||
|
calicoVersion:
|
|||
|
description: CalicoVersion is the version of Calico that the cluster
|
|||
|
is running
|
|||
|
type: string
|
|||
|
clusterGUID:
|
|||
|
description: ClusterGUID is the GUID of the cluster
|
|||
|
type: string
|
|||
|
clusterType:
|
|||
|
description: ClusterType describes the type of the cluster
|
|||
|
type: string
|
|||
|
datastoreReady:
|
|||
|
description: DatastoreReady is used during significant datastore migrations
|
|||
|
to signal to components such as Felix that it should wait before
|
|||
|
accessing the datastore.
|
|||
|
type: boolean
|
|||
|
variant:
|
|||
|
description: Variant declares which variant of Calico should be active.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_felixconfigurations.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: felixconfigurations.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: FelixConfiguration
|
|||
|
listKind: FelixConfigurationList
|
|||
|
plural: felixconfigurations
|
|||
|
singular: felixconfiguration
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: Felix Configuration contains the configuration for Felix.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: FelixConfigurationSpec contains the values of the Felix configuration.
|
|||
|
properties:
|
|||
|
allowIPIPPacketsFromWorkloads:
|
|||
|
description: 'AllowIPIPPacketsFromWorkloads controls whether Felix
|
|||
|
will add a rule to drop IPIP encapsulated traffic from workloads
|
|||
|
[Default: false]'
|
|||
|
type: boolean
|
|||
|
allowVXLANPacketsFromWorkloads:
|
|||
|
description: 'AllowVXLANPacketsFromWorkloads controls whether Felix
|
|||
|
will add a rule to drop VXLAN encapsulated traffic from workloads
|
|||
|
[Default: false]'
|
|||
|
type: boolean
|
|||
|
awsSrcDstCheck:
|
|||
|
description: 'Set source-destination-check on AWS EC2 instances. Accepted
|
|||
|
value must be one of "DoNothing", "Enable" or "Disable". [Default:
|
|||
|
DoNothing]'
|
|||
|
enum:
|
|||
|
- DoNothing
|
|||
|
- Enable
|
|||
|
- Disable
|
|||
|
type: string
|
|||
|
bpfConnectTimeLoadBalancingEnabled:
|
|||
|
description: 'BPFConnectTimeLoadBalancingEnabled when in BPF mode,
|
|||
|
controls whether Felix installs the connection-time load balancer. The
|
|||
|
connect-time load balancer is required for the host to be able to
|
|||
|
reach Kubernetes services and it improves the performance of pod-to-service
|
|||
|
connections. The only reason to disable it is for debugging purposes. [Default:
|
|||
|
true]'
|
|||
|
type: boolean
|
|||
|
bpfDataIfacePattern:
|
|||
|
description: BPFDataIfacePattern is a regular expression that controls
|
|||
|
which interfaces Felix should attach BPF programs to in order to
|
|||
|
catch traffic to/from the network. This needs to match the interfaces
|
|||
|
that Calico workload traffic flows over as well as any interfaces
|
|||
|
that handle incoming traffic to nodeports and services from outside
|
|||
|
the cluster. It should not match the workload interfaces (usually
|
|||
|
named cali...).
|
|||
|
type: string
|
|||
|
bpfDisableUnprivileged:
|
|||
|
description: 'BPFDisableUnprivileged, if enabled, Felix sets the kernel.unprivileged_bpf_disabled
|
|||
|
sysctl to disable unprivileged use of BPF. This ensures that unprivileged
|
|||
|
users cannot access Calico''s BPF maps and cannot insert their own
|
|||
|
BPF programs to interfere with Calico''s. [Default: true]'
|
|||
|
type: boolean
|
|||
|
bpfEnabled:
|
|||
|
description: 'BPFEnabled, if enabled Felix will use the BPF dataplane.
|
|||
|
[Default: false]'
|
|||
|
type: boolean
|
|||
|
bpfEnforceRPF:
|
|||
|
description: 'BPFEnforceRPF enforce strict RPF on all interfaces with
|
|||
|
BPF programs regardless of what is the per-interfaces or global
|
|||
|
setting. Possible values are Disabled or Strict. [Default: Strict]'
|
|||
|
type: string
|
|||
|
bpfExtToServiceConnmark:
|
|||
|
description: 'BPFExtToServiceConnmark in BPF mode, control a 32bit
|
|||
|
mark that is set on connections from an external client to a local
|
|||
|
service. This mark allows us to control how packets of that connection
|
|||
|
are routed within the host and how is routing intepreted by RPF
|
|||
|
check. [Default: 0]'
|
|||
|
type: integer
|
|||
|
bpfExternalServiceMode:
|
|||
|
description: 'BPFExternalServiceMode in BPF mode, controls how connections
|
|||
|
from outside the cluster to services (node ports and cluster IPs)
|
|||
|
are forwarded to remote workloads. If set to "Tunnel" then both
|
|||
|
request and response traffic is tunneled to the remote node. If
|
|||
|
set to "DSR", the request traffic is tunneled but the response traffic
|
|||
|
is sent directly from the remote node. In "DSR" mode, the remote
|
|||
|
node appears to use the IP of the ingress node; this requires a
|
|||
|
permissive L2 network. [Default: Tunnel]'
|
|||
|
type: string
|
|||
|
bpfKubeProxyEndpointSlicesEnabled:
|
|||
|
description: BPFKubeProxyEndpointSlicesEnabled in BPF mode, controls
|
|||
|
whether Felix's embedded kube-proxy accepts EndpointSlices or not.
|
|||
|
type: boolean
|
|||
|
bpfKubeProxyIptablesCleanupEnabled:
|
|||
|
description: 'BPFKubeProxyIptablesCleanupEnabled, if enabled in BPF
|
|||
|
mode, Felix will proactively clean up the upstream Kubernetes kube-proxy''s
|
|||
|
iptables chains. Should only be enabled if kube-proxy is not running. [Default:
|
|||
|
true]'
|
|||
|
type: boolean
|
|||
|
bpfKubeProxyMinSyncPeriod:
|
|||
|
description: 'BPFKubeProxyMinSyncPeriod, in BPF mode, controls the
|
|||
|
minimum time between updates to the dataplane for Felix''s embedded
|
|||
|
kube-proxy. Lower values give reduced set-up latency. Higher values
|
|||
|
reduce Felix CPU usage by batching up more work. [Default: 1s]'
|
|||
|
type: string
|
|||
|
bpfLogLevel:
|
|||
|
description: 'BPFLogLevel controls the log level of the BPF programs
|
|||
|
when in BPF dataplane mode. One of "Off", "Info", or "Debug". The
|
|||
|
logs are emitted to the BPF trace pipe, accessible with the command
|
|||
|
`tc exec bpf debug`. [Default: Off].'
|
|||
|
type: string
|
|||
|
bpfMapSizeConntrack:
|
|||
|
description: 'BPFMapSizeConntrack sets the size for the conntrack
|
|||
|
map. This map must be large enough to hold an entry for each active
|
|||
|
connection. Warning: changing the size of the conntrack map can
|
|||
|
cause disruption.'
|
|||
|
type: integer
|
|||
|
bpfMapSizeIPSets:
|
|||
|
description: BPFMapSizeIPSets sets the size for ipsets map. The IP
|
|||
|
sets map must be large enough to hold an entry for each endpoint
|
|||
|
matched by every selector in the source/destination matches in network
|
|||
|
policy. Selectors such as "all()" can result in large numbers of
|
|||
|
entries (one entry per endpoint in that case).
|
|||
|
type: integer
|
|||
|
bpfMapSizeNATAffinity:
|
|||
|
type: integer
|
|||
|
bpfMapSizeNATBackend:
|
|||
|
description: BPFMapSizeNATBackend sets the size for nat back end map.
|
|||
|
This is the total number of endpoints. This is mostly more than
|
|||
|
the size of the number of services.
|
|||
|
type: integer
|
|||
|
bpfMapSizeNATFrontend:
|
|||
|
description: BPFMapSizeNATFrontend sets the size for nat front end
|
|||
|
map. FrontendMap should be large enough to hold an entry for each
|
|||
|
nodeport, external IP and each port in each service.
|
|||
|
type: integer
|
|||
|
bpfMapSizeRoute:
|
|||
|
description: BPFMapSizeRoute sets the size for the routes map. The
|
|||
|
routes map should be large enough to hold one entry per workload
|
|||
|
and a handful of entries per host (enough to cover its own IPs and
|
|||
|
tunnel IPs).
|
|||
|
type: integer
|
|||
|
bpfPSNATPorts:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: 'BPFPSNATPorts sets the range from which we randomly
|
|||
|
pick a port if there is a source port collision. This should be
|
|||
|
within the ephemeral range as defined by RFC 6056 (1024–65535) and
|
|||
|
preferably outside the ephemeral ranges used by common operating
|
|||
|
systems. Linux uses 32768–60999, while others mostly use the IANA
|
|||
|
defined range 49152–65535. It is not necessarily a problem if this
|
|||
|
range overlaps with the operating systems. Both ends of the range
|
|||
|
are inclusive. [Default: 20000:29999]'
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
chainInsertMode:
|
|||
|
description: 'ChainInsertMode controls whether Felix hooks the kernel''s
|
|||
|
top-level iptables chains by inserting a rule at the top of the
|
|||
|
chain or by appending a rule at the bottom. insert is the safe default
|
|||
|
since it prevents Calico''s rules from being bypassed. If you switch
|
|||
|
to append mode, be sure that the other rules in the chains signal
|
|||
|
acceptance by falling through to the Calico rules, otherwise the
|
|||
|
Calico policy will be bypassed. [Default: insert]'
|
|||
|
type: string
|
|||
|
dataplaneDriver:
|
|||
|
description: DataplaneDriver filename of the external dataplane driver
|
|||
|
to use. Only used if UseInternalDataplaneDriver is set to false.
|
|||
|
type: string
|
|||
|
dataplaneWatchdogTimeout:
|
|||
|
description: 'DataplaneWatchdogTimeout is the readiness/liveness timeout
|
|||
|
used for Felix''s (internal) dataplane driver. Increase this value
|
|||
|
if you experience spurious non-ready or non-live events when Felix
|
|||
|
is under heavy load. Decrease the value to get felix to report non-live
|
|||
|
or non-ready more quickly. [Default: 90s]'
|
|||
|
type: string
|
|||
|
debugDisableLogDropping:
|
|||
|
type: boolean
|
|||
|
debugMemoryProfilePath:
|
|||
|
type: string
|
|||
|
debugSimulateCalcGraphHangAfter:
|
|||
|
type: string
|
|||
|
debugSimulateDataplaneHangAfter:
|
|||
|
type: string
|
|||
|
defaultEndpointToHostAction:
|
|||
|
description: 'DefaultEndpointToHostAction controls what happens to
|
|||
|
traffic that goes from a workload endpoint to the host itself (after
|
|||
|
the traffic hits the endpoint egress policy). By default Calico
|
|||
|
blocks traffic from workload endpoints to the host itself with an
|
|||
|
iptables "DROP" action. If you want to allow some or all traffic
|
|||
|
from endpoint to host, set this parameter to RETURN or ACCEPT. Use
|
|||
|
RETURN if you have your own rules in the iptables "INPUT" chain;
|
|||
|
Calico will insert its rules at the top of that chain, then "RETURN"
|
|||
|
packets to the "INPUT" chain once it has completed processing workload
|
|||
|
endpoint egress policy. Use ACCEPT to unconditionally accept packets
|
|||
|
from workloads after processing workload endpoint egress policy.
|
|||
|
[Default: Drop]'
|
|||
|
type: string
|
|||
|
deviceRouteProtocol:
|
|||
|
description: This defines the route protocol added to programmed device
|
|||
|
routes, by default this will be RTPROT_BOOT when left blank.
|
|||
|
type: integer
|
|||
|
deviceRouteSourceAddress:
|
|||
|
description: This is the IPv4 source address to use on programmed
|
|||
|
device routes. By default the source address is left blank, leaving
|
|||
|
the kernel to choose the source address used.
|
|||
|
type: string
|
|||
|
deviceRouteSourceAddressIPv6:
|
|||
|
description: This is the IPv6 source address to use on programmed
|
|||
|
device routes. By default the source address is left blank, leaving
|
|||
|
the kernel to choose the source address used.
|
|||
|
type: string
|
|||
|
disableConntrackInvalidCheck:
|
|||
|
type: boolean
|
|||
|
endpointReportingDelay:
|
|||
|
type: string
|
|||
|
endpointReportingEnabled:
|
|||
|
type: boolean
|
|||
|
externalNodesList:
|
|||
|
description: ExternalNodesCIDRList is a list of CIDR's of external-non-calico-nodes
|
|||
|
which may source tunnel traffic and have the tunneled traffic be
|
|||
|
accepted at calico nodes.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
failsafeInboundHostPorts:
|
|||
|
description: 'FailsafeInboundHostPorts is a list of UDP/TCP ports
|
|||
|
and CIDRs that Felix will allow incoming traffic to host endpoints
|
|||
|
on irrespective of the security policy. This is useful to avoid
|
|||
|
accidentally cutting off a host with incorrect configuration. For
|
|||
|
back-compatibility, if the protocol is not specified, it defaults
|
|||
|
to "tcp". If a CIDR is not specified, it will allow traffic from
|
|||
|
all addresses. To disable all inbound host ports, use the value
|
|||
|
none. The default value allows ssh access and DHCP. [Default: tcp:22,
|
|||
|
udp:68, tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666, tcp:6667]'
|
|||
|
items:
|
|||
|
description: ProtoPort is combination of protocol, port, and CIDR.
|
|||
|
Protocol and port must be specified.
|
|||
|
properties:
|
|||
|
net:
|
|||
|
type: string
|
|||
|
port:
|
|||
|
type: integer
|
|||
|
protocol:
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- port
|
|||
|
- protocol
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
failsafeOutboundHostPorts:
|
|||
|
description: 'FailsafeOutboundHostPorts is a list of UDP/TCP ports
|
|||
|
and CIDRs that Felix will allow outgoing traffic from host endpoints
|
|||
|
to irrespective of the security policy. This is useful to avoid
|
|||
|
accidentally cutting off a host with incorrect configuration. For
|
|||
|
back-compatibility, if the protocol is not specified, it defaults
|
|||
|
to "tcp". If a CIDR is not specified, it will allow traffic from
|
|||
|
all addresses. To disable all outbound host ports, use the value
|
|||
|
none. The default value opens etcd''s standard ports to ensure that
|
|||
|
Felix does not get cut off from etcd as well as allowing DHCP and
|
|||
|
DNS. [Default: tcp:179, tcp:2379, tcp:2380, tcp:6443, tcp:6666,
|
|||
|
tcp:6667, udp:53, udp:67]'
|
|||
|
items:
|
|||
|
description: ProtoPort is combination of protocol, port, and CIDR.
|
|||
|
Protocol and port must be specified.
|
|||
|
properties:
|
|||
|
net:
|
|||
|
type: string
|
|||
|
port:
|
|||
|
type: integer
|
|||
|
protocol:
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- port
|
|||
|
- protocol
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
featureDetectOverride:
|
|||
|
description: FeatureDetectOverride is used to override the feature
|
|||
|
detection. Values are specified in a comma separated list with no
|
|||
|
spaces, example; "SNATFullyRandom=true,MASQFullyRandom=false,RestoreSupportsLock=".
|
|||
|
"true" or "false" will force the feature, empty or omitted values
|
|||
|
are auto-detected.
|
|||
|
type: string
|
|||
|
floatingIPs:
|
|||
|
description: FloatingIPs configures whether or not Felix will program
|
|||
|
floating IP addresses.
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
genericXDPEnabled:
|
|||
|
description: 'GenericXDPEnabled enables Generic XDP so network cards
|
|||
|
that don''t support XDP offload or driver modes can use XDP. This
|
|||
|
is not recommended since it doesn''t provide better performance
|
|||
|
than iptables. [Default: false]'
|
|||
|
type: boolean
|
|||
|
healthEnabled:
|
|||
|
type: boolean
|
|||
|
healthHost:
|
|||
|
type: string
|
|||
|
healthPort:
|
|||
|
type: integer
|
|||
|
interfaceExclude:
|
|||
|
description: 'InterfaceExclude is a comma-separated list of interfaces
|
|||
|
that Felix should exclude when monitoring for host endpoints. The
|
|||
|
default value ensures that Felix ignores Kubernetes'' IPVS dummy
|
|||
|
interface, which is used internally by kube-proxy. If you want to
|
|||
|
exclude multiple interface names using a single value, the list
|
|||
|
supports regular expressions. For regular expressions you must wrap
|
|||
|
the value with ''/''. For example having values ''/^kube/,veth1''
|
|||
|
will exclude all interfaces that begin with ''kube'' and also the
|
|||
|
interface ''veth1''. [Default: kube-ipvs0]'
|
|||
|
type: string
|
|||
|
interfacePrefix:
|
|||
|
description: 'InterfacePrefix is the interface name prefix that identifies
|
|||
|
workload endpoints and so distinguishes them from host endpoint
|
|||
|
interfaces. Note: in environments other than bare metal, the orchestrators
|
|||
|
configure this appropriately. For example our Kubernetes and Docker
|
|||
|
integrations set the ''cali'' value, and our OpenStack integration
|
|||
|
sets the ''tap'' value. [Default: cali]'
|
|||
|
type: string
|
|||
|
interfaceRefreshInterval:
|
|||
|
description: InterfaceRefreshInterval is the period at which Felix
|
|||
|
rescans local interfaces to verify their state. The rescan can be
|
|||
|
disabled by setting the interval to 0.
|
|||
|
type: string
|
|||
|
ipipEnabled:
|
|||
|
description: 'IPIPEnabled overrides whether Felix should configure
|
|||
|
an IPIP interface on the host. Optional as Felix determines this
|
|||
|
based on the existing IP pools. [Default: nil (unset)]'
|
|||
|
type: boolean
|
|||
|
ipipMTU:
|
|||
|
description: 'IPIPMTU is the MTU to set on the tunnel device. See
|
|||
|
Configuring MTU [Default: 1440]'
|
|||
|
type: integer
|
|||
|
ipsetsRefreshInterval:
|
|||
|
description: 'IpsetsRefreshInterval is the period at which Felix re-checks
|
|||
|
all iptables state to ensure that no other process has accidentally
|
|||
|
broken Calico''s rules. Set to 0 to disable iptables refresh. [Default:
|
|||
|
90s]'
|
|||
|
type: string
|
|||
|
iptablesBackend:
|
|||
|
description: IptablesBackend specifies which backend of iptables will
|
|||
|
be used. The default is legacy.
|
|||
|
type: string
|
|||
|
iptablesFilterAllowAction:
|
|||
|
type: string
|
|||
|
iptablesLockFilePath:
|
|||
|
description: 'IptablesLockFilePath is the location of the iptables
|
|||
|
lock file. You may need to change this if the lock file is not in
|
|||
|
its standard location (for example if you have mapped it into Felix''s
|
|||
|
container at a different path). [Default: /run/xtables.lock]'
|
|||
|
type: string
|
|||
|
iptablesLockProbeInterval:
|
|||
|
description: 'IptablesLockProbeInterval is the time that Felix will
|
|||
|
wait between attempts to acquire the iptables lock if it is not
|
|||
|
available. Lower values make Felix more responsive when the lock
|
|||
|
is contended, but use more CPU. [Default: 50ms]'
|
|||
|
type: string
|
|||
|
iptablesLockTimeout:
|
|||
|
description: 'IptablesLockTimeout is the time that Felix will wait
|
|||
|
for the iptables lock, or 0, to disable. To use this feature, Felix
|
|||
|
must share the iptables lock file with all other processes that
|
|||
|
also take the lock. When running Felix inside a container, this
|
|||
|
requires the /run directory of the host to be mounted into the calico/node
|
|||
|
or calico/felix container. [Default: 0s disabled]'
|
|||
|
type: string
|
|||
|
iptablesMangleAllowAction:
|
|||
|
type: string
|
|||
|
iptablesMarkMask:
|
|||
|
description: 'IptablesMarkMask is the mask that Felix selects its
|
|||
|
IPTables Mark bits from. Should be a 32 bit hexadecimal number with
|
|||
|
at least 8 bits set, none of which clash with any other mark bits
|
|||
|
in use on the system. [Default: 0xff000000]'
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
iptablesNATOutgoingInterfaceFilter:
|
|||
|
type: string
|
|||
|
iptablesPostWriteCheckInterval:
|
|||
|
description: 'IptablesPostWriteCheckInterval is the period after Felix
|
|||
|
has done a write to the dataplane that it schedules an extra read
|
|||
|
back in order to check the write was not clobbered by another process.
|
|||
|
This should only occur if another application on the system doesn''t
|
|||
|
respect the iptables lock. [Default: 1s]'
|
|||
|
type: string
|
|||
|
iptablesRefreshInterval:
|
|||
|
description: 'IptablesRefreshInterval is the period at which Felix
|
|||
|
re-checks the IP sets in the dataplane to ensure that no other process
|
|||
|
has accidentally broken Calico''s rules. Set to 0 to disable IP
|
|||
|
sets refresh. Note: the default for this value is lower than the
|
|||
|
other refresh intervals as a workaround for a Linux kernel bug that
|
|||
|
was fixed in kernel version 4.11. If you are using v4.11 or greater
|
|||
|
you may want to set this to, a higher value to reduce Felix CPU
|
|||
|
usage. [Default: 10s]'
|
|||
|
type: string
|
|||
|
ipv6Support:
|
|||
|
description: IPv6Support controls whether Felix enables support for
|
|||
|
IPv6 (if supported by the in-use dataplane).
|
|||
|
type: boolean
|
|||
|
kubeNodePortRanges:
|
|||
|
description: 'KubeNodePortRanges holds list of port ranges used for
|
|||
|
service node ports. Only used if felix detects kube-proxy running
|
|||
|
in ipvs mode. Felix uses these ranges to separate host and workload
|
|||
|
traffic. [Default: 30000:32767].'
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
logDebugFilenameRegex:
|
|||
|
description: LogDebugFilenameRegex controls which source code files
|
|||
|
have their Debug log output included in the logs. Only logs from
|
|||
|
files with names that match the given regular expression are included. The
|
|||
|
filter only applies to Debug level logs.
|
|||
|
type: string
|
|||
|
logFilePath:
|
|||
|
description: 'LogFilePath is the full path to the Felix log. Set to
|
|||
|
none to disable file logging. [Default: /var/log/calico/felix.log]'
|
|||
|
type: string
|
|||
|
logPrefix:
|
|||
|
description: 'LogPrefix is the log prefix that Felix uses when rendering
|
|||
|
LOG rules. [Default: calico-packet]'
|
|||
|
type: string
|
|||
|
logSeverityFile:
|
|||
|
description: 'LogSeverityFile is the log severity above which logs
|
|||
|
are sent to the log file. [Default: Info]'
|
|||
|
type: string
|
|||
|
logSeverityScreen:
|
|||
|
description: 'LogSeverityScreen is the log severity above which logs
|
|||
|
are sent to the stdout. [Default: Info]'
|
|||
|
type: string
|
|||
|
logSeveritySys:
|
|||
|
description: 'LogSeveritySys is the log severity above which logs
|
|||
|
are sent to the syslog. Set to None for no logging to syslog. [Default:
|
|||
|
Info]'
|
|||
|
type: string
|
|||
|
maxIpsetSize:
|
|||
|
type: integer
|
|||
|
metadataAddr:
|
|||
|
description: 'MetadataAddr is the IP address or domain name of the
|
|||
|
server that can answer VM queries for cloud-init metadata. In OpenStack,
|
|||
|
this corresponds to the machine running nova-api (or in Ubuntu,
|
|||
|
nova-api-metadata). A value of none (case insensitive) means that
|
|||
|
Felix should not set up any NAT rule for the metadata path. [Default:
|
|||
|
127.0.0.1]'
|
|||
|
type: string
|
|||
|
metadataPort:
|
|||
|
description: 'MetadataPort is the port of the metadata server. This,
|
|||
|
combined with global.MetadataAddr (if not ''None''), is used to
|
|||
|
set up a NAT rule, from 169.254.169.254:80 to MetadataAddr:MetadataPort.
|
|||
|
In most cases this should not need to be changed [Default: 8775].'
|
|||
|
type: integer
|
|||
|
mtuIfacePattern:
|
|||
|
description: MTUIfacePattern is a regular expression that controls
|
|||
|
which interfaces Felix should scan in order to calculate the host's
|
|||
|
MTU. This should not match workload interfaces (usually named cali...).
|
|||
|
type: string
|
|||
|
natOutgoingAddress:
|
|||
|
description: NATOutgoingAddress specifies an address to use when performing
|
|||
|
source NAT for traffic in a natOutgoing pool that is leaving the
|
|||
|
network. By default the address used is an address on the interface
|
|||
|
the traffic is leaving on (ie it uses the iptables MASQUERADE target)
|
|||
|
type: string
|
|||
|
natPortRange:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: NATPortRange specifies the range of ports that is used
|
|||
|
for port mapping when doing outgoing NAT. When unset the default
|
|||
|
behavior of the network stack is used.
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
netlinkTimeout:
|
|||
|
type: string
|
|||
|
openstackRegion:
|
|||
|
description: 'OpenstackRegion is the name of the region that a particular
|
|||
|
Felix belongs to. In a multi-region Calico/OpenStack deployment,
|
|||
|
this must be configured somehow for each Felix (here in the datamodel,
|
|||
|
or in felix.cfg or the environment on each compute node), and must
|
|||
|
match the [calico] openstack_region value configured in neutron.conf
|
|||
|
on each node. [Default: Empty]'
|
|||
|
type: string
|
|||
|
policySyncPathPrefix:
|
|||
|
description: 'PolicySyncPathPrefix is used to by Felix to communicate
|
|||
|
policy changes to external services, like Application layer policy.
|
|||
|
[Default: Empty]'
|
|||
|
type: string
|
|||
|
prometheusGoMetricsEnabled:
|
|||
|
description: 'PrometheusGoMetricsEnabled disables Go runtime metrics
|
|||
|
collection, which the Prometheus client does by default, when set
|
|||
|
to false. This reduces the number of metrics reported, reducing
|
|||
|
Prometheus load. [Default: true]'
|
|||
|
type: boolean
|
|||
|
prometheusMetricsEnabled:
|
|||
|
description: 'PrometheusMetricsEnabled enables the Prometheus metrics
|
|||
|
server in Felix if set to true. [Default: false]'
|
|||
|
type: boolean
|
|||
|
prometheusMetricsHost:
|
|||
|
description: 'PrometheusMetricsHost is the host that the Prometheus
|
|||
|
metrics server should bind to. [Default: empty]'
|
|||
|
type: string
|
|||
|
prometheusMetricsPort:
|
|||
|
description: 'PrometheusMetricsPort is the TCP port that the Prometheus
|
|||
|
metrics server should bind to. [Default: 9091]'
|
|||
|
type: integer
|
|||
|
prometheusProcessMetricsEnabled:
|
|||
|
description: 'PrometheusProcessMetricsEnabled disables process metrics
|
|||
|
collection, which the Prometheus client does by default, when set
|
|||
|
to false. This reduces the number of metrics reported, reducing
|
|||
|
Prometheus load. [Default: true]'
|
|||
|
type: boolean
|
|||
|
prometheusWireGuardMetricsEnabled:
|
|||
|
description: 'PrometheusWireGuardMetricsEnabled disables wireguard
|
|||
|
metrics collection, which the Prometheus client does by default,
|
|||
|
when set to false. This reduces the number of metrics reported,
|
|||
|
reducing Prometheus load. [Default: true]'
|
|||
|
type: boolean
|
|||
|
removeExternalRoutes:
|
|||
|
description: Whether or not to remove device routes that have not
|
|||
|
been programmed by Felix. Disabling this will allow external applications
|
|||
|
to also add device routes. This is enabled by default which means
|
|||
|
we will remove externally added routes.
|
|||
|
type: boolean
|
|||
|
reportingInterval:
|
|||
|
description: 'ReportingInterval is the interval at which Felix reports
|
|||
|
its status into the datastore or 0 to disable. Must be non-zero
|
|||
|
in OpenStack deployments. [Default: 30s]'
|
|||
|
type: string
|
|||
|
reportingTTL:
|
|||
|
description: 'ReportingTTL is the time-to-live setting for process-wide
|
|||
|
status reports. [Default: 90s]'
|
|||
|
type: string
|
|||
|
routeRefreshInterval:
|
|||
|
description: 'RouteRefreshInterval is the period at which Felix re-checks
|
|||
|
the routes in the dataplane to ensure that no other process has
|
|||
|
accidentally broken Calico''s rules. Set to 0 to disable route refresh.
|
|||
|
[Default: 90s]'
|
|||
|
type: string
|
|||
|
routeSource:
|
|||
|
description: 'RouteSource configures where Felix gets its routing
|
|||
|
information. - WorkloadIPs: use workload endpoints to construct
|
|||
|
routes. - CalicoIPAM: the default - use IPAM data to construct routes.'
|
|||
|
type: string
|
|||
|
routeTableRange:
|
|||
|
description: Deprecated in favor of RouteTableRanges. Calico programs
|
|||
|
additional Linux route tables for various purposes. RouteTableRange
|
|||
|
specifies the indices of the route tables that Calico should use.
|
|||
|
properties:
|
|||
|
max:
|
|||
|
type: integer
|
|||
|
min:
|
|||
|
type: integer
|
|||
|
required:
|
|||
|
- max
|
|||
|
- min
|
|||
|
type: object
|
|||
|
routeTableRanges:
|
|||
|
description: Calico programs additional Linux route tables for various
|
|||
|
purposes. RouteTableRanges specifies a set of table index ranges
|
|||
|
that Calico should use. Deprecates`RouteTableRange`, overrides `RouteTableRange`.
|
|||
|
items:
|
|||
|
properties:
|
|||
|
max:
|
|||
|
type: integer
|
|||
|
min:
|
|||
|
type: integer
|
|||
|
required:
|
|||
|
- max
|
|||
|
- min
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
serviceLoopPrevention:
|
|||
|
description: 'When service IP advertisement is enabled, prevent routing
|
|||
|
loops to service IPs that are not in use, by dropping or rejecting
|
|||
|
packets that do not get DNAT''d by kube-proxy. Unless set to "Disabled",
|
|||
|
in which case such routing loops continue to be allowed. [Default:
|
|||
|
Drop]'
|
|||
|
type: string
|
|||
|
sidecarAccelerationEnabled:
|
|||
|
description: 'SidecarAccelerationEnabled enables experimental sidecar
|
|||
|
acceleration [Default: false]'
|
|||
|
type: boolean
|
|||
|
usageReportingEnabled:
|
|||
|
description: 'UsageReportingEnabled reports anonymous Calico version
|
|||
|
number and cluster size to projectcalico.org. Logs warnings returned
|
|||
|
by the usage server. For example, if a significant security vulnerability
|
|||
|
has been discovered in the version of Calico being used. [Default:
|
|||
|
true]'
|
|||
|
type: boolean
|
|||
|
usageReportingInitialDelay:
|
|||
|
description: 'UsageReportingInitialDelay controls the minimum delay
|
|||
|
before Felix makes a report. [Default: 300s]'
|
|||
|
type: string
|
|||
|
usageReportingInterval:
|
|||
|
description: 'UsageReportingInterval controls the interval at which
|
|||
|
Felix makes reports. [Default: 86400s]'
|
|||
|
type: string
|
|||
|
useInternalDataplaneDriver:
|
|||
|
description: UseInternalDataplaneDriver, if true, Felix will use its
|
|||
|
internal dataplane programming logic. If false, it will launch
|
|||
|
an external dataplane driver and communicate with it over protobuf.
|
|||
|
type: boolean
|
|||
|
vxlanEnabled:
|
|||
|
description: 'VXLANEnabled overrides whether Felix should create the
|
|||
|
VXLAN tunnel device for VXLAN networking. Optional as Felix determines
|
|||
|
this based on the existing IP pools. [Default: nil (unset)]'
|
|||
|
type: boolean
|
|||
|
vxlanMTU:
|
|||
|
description: 'VXLANMTU is the MTU to set on the IPv4 VXLAN tunnel
|
|||
|
device. See Configuring MTU [Default: 1410]'
|
|||
|
type: integer
|
|||
|
vxlanMTUV6:
|
|||
|
description: 'VXLANMTUV6 is the MTU to set on the IPv6 VXLAN tunnel
|
|||
|
device. See Configuring MTU [Default: 1390]'
|
|||
|
type: integer
|
|||
|
vxlanPort:
|
|||
|
type: integer
|
|||
|
vxlanVNI:
|
|||
|
type: integer
|
|||
|
wireguardEnabled:
|
|||
|
description: 'WireguardEnabled controls whether Wireguard is enabled.
|
|||
|
[Default: false]'
|
|||
|
type: boolean
|
|||
|
wireguardHostEncryptionEnabled:
|
|||
|
description: 'WireguardHostEncryptionEnabled controls whether Wireguard
|
|||
|
host-to-host encryption is enabled. [Default: false]'
|
|||
|
type: boolean
|
|||
|
wireguardInterfaceName:
|
|||
|
description: 'WireguardInterfaceName specifies the name to use for
|
|||
|
the Wireguard interface. [Default: wg.calico]'
|
|||
|
type: string
|
|||
|
wireguardKeepAlive:
|
|||
|
description: 'WireguardKeepAlive controls Wireguard PersistentKeepalive
|
|||
|
option. Set 0 to disable. [Default: 0]'
|
|||
|
type: string
|
|||
|
wireguardListeningPort:
|
|||
|
description: 'WireguardListeningPort controls the listening port used
|
|||
|
by Wireguard. [Default: 51820]'
|
|||
|
type: integer
|
|||
|
wireguardMTU:
|
|||
|
description: 'WireguardMTU controls the MTU on the Wireguard interface.
|
|||
|
See Configuring MTU [Default: 1420]'
|
|||
|
type: integer
|
|||
|
wireguardRoutingRulePriority:
|
|||
|
description: 'WireguardRoutingRulePriority controls the priority value
|
|||
|
to use for the Wireguard routing rule. [Default: 99]'
|
|||
|
type: integer
|
|||
|
workloadSourceSpoofing:
|
|||
|
description: WorkloadSourceSpoofing controls whether pods can use
|
|||
|
the allowedSourcePrefixes annotation to send traffic with a source
|
|||
|
IP address that is not theirs. This is disabled by default. When
|
|||
|
set to "Any", pods can request any prefix.
|
|||
|
type: string
|
|||
|
xdpEnabled:
|
|||
|
description: 'XDPEnabled enables XDP acceleration for suitable untracked
|
|||
|
incoming deny rules. [Default: true]'
|
|||
|
type: boolean
|
|||
|
xdpRefreshInterval:
|
|||
|
description: 'XDPRefreshInterval is the period at which Felix re-checks
|
|||
|
all XDP state to ensure that no other process has accidentally broken
|
|||
|
Calico''s BPF maps or attached programs. Set to 0 to disable XDP
|
|||
|
refresh. [Default: 90s]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_globalnetworkpolicies.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: globalnetworkpolicies.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: GlobalNetworkPolicy
|
|||
|
listKind: GlobalNetworkPolicyList
|
|||
|
plural: globalnetworkpolicies
|
|||
|
singular: globalnetworkpolicy
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
properties:
|
|||
|
applyOnForward:
|
|||
|
description: ApplyOnForward indicates to apply the rules in this policy
|
|||
|
on forward traffic.
|
|||
|
type: boolean
|
|||
|
doNotTrack:
|
|||
|
description: DoNotTrack indicates whether packets matched by the rules
|
|||
|
in this policy should go through the data plane's connection tracking,
|
|||
|
such as Linux conntrack. If True, the rules in this policy are
|
|||
|
applied before any data plane connection tracking, and packets allowed
|
|||
|
by this policy are marked as not to be tracked.
|
|||
|
type: boolean
|
|||
|
egress:
|
|||
|
description: The ordered set of egress rules. Each rule contains
|
|||
|
a set of packet match criteria and a corresponding action to apply.
|
|||
|
items:
|
|||
|
description: "A Rule encapsulates a set of match criteria and an
|
|||
|
action. Both selector-based security Policy and security Profiles
|
|||
|
reference rules - separated out as a list of rules for both ingress
|
|||
|
and egress packet matching. \n Each positive match criteria has
|
|||
|
a negated version, prefixed with \"Not\". All the match criteria
|
|||
|
within a rule must be satisfied for a packet to match. A single
|
|||
|
rule can contain the positive and negative version of a match
|
|||
|
and both must be satisfied for the rule to match."
|
|||
|
properties:
|
|||
|
action:
|
|||
|
type: string
|
|||
|
destination:
|
|||
|
description: Destination contains the match criteria that apply
|
|||
|
to destination entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
http:
|
|||
|
description: HTTP contains match criteria that apply to HTTP
|
|||
|
requests.
|
|||
|
properties:
|
|||
|
methods:
|
|||
|
description: Methods is an optional field that restricts
|
|||
|
the rule to apply only to HTTP requests that use one of
|
|||
|
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
|
|||
|
methods are OR'd together.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
paths:
|
|||
|
description: 'Paths is an optional field that restricts
|
|||
|
the rule to apply to HTTP requests that use one of the
|
|||
|
listed HTTP Paths. Multiple paths are OR''d together.
|
|||
|
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
|
|||
|
ONLY specify either a `exact` or a `prefix` match. The
|
|||
|
validator will check for it.'
|
|||
|
items:
|
|||
|
description: 'HTTPPath specifies an HTTP path to match.
|
|||
|
It may be either of the form: exact: <path>: which matches
|
|||
|
the path exactly or prefix: <path-prefix>: which matches
|
|||
|
the path prefix'
|
|||
|
properties:
|
|||
|
exact:
|
|||
|
type: string
|
|||
|
prefix:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
icmp:
|
|||
|
description: ICMP is an optional field that restricts the rule
|
|||
|
to apply to a specific type and code of ICMP traffic. This
|
|||
|
should only be specified if the Protocol field is set to "ICMP"
|
|||
|
or "ICMPv6".
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
ipVersion:
|
|||
|
description: IPVersion is an optional field that restricts the
|
|||
|
rule to only match a specific IP version.
|
|||
|
type: integer
|
|||
|
metadata:
|
|||
|
description: Metadata contains additional information for this
|
|||
|
rule
|
|||
|
properties:
|
|||
|
annotations:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: Annotations is a set of key value pairs that
|
|||
|
give extra information about the rule
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
notICMP:
|
|||
|
description: NotICMP is the negated version of the ICMP field.
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
notProtocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: NotProtocol is the negated version of the Protocol
|
|||
|
field.
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
protocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: "Protocol is an optional field that restricts the
|
|||
|
rule to only apply to traffic of a specific IP protocol. Required
|
|||
|
if any of the EntityRules contain Ports (because ports only
|
|||
|
apply to certain protocols). \n Must be one of these string
|
|||
|
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
|
|||
|
\"UDPLite\" or an integer in the range 1-255."
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
source:
|
|||
|
description: Source contains the match criteria that apply to
|
|||
|
source entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
required:
|
|||
|
- action
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
ingress:
|
|||
|
description: The ordered set of ingress rules. Each rule contains
|
|||
|
a set of packet match criteria and a corresponding action to apply.
|
|||
|
items:
|
|||
|
description: "A Rule encapsulates a set of match criteria and an
|
|||
|
action. Both selector-based security Policy and security Profiles
|
|||
|
reference rules - separated out as a list of rules for both ingress
|
|||
|
and egress packet matching. \n Each positive match criteria has
|
|||
|
a negated version, prefixed with \"Not\". All the match criteria
|
|||
|
within a rule must be satisfied for a packet to match. A single
|
|||
|
rule can contain the positive and negative version of a match
|
|||
|
and both must be satisfied for the rule to match."
|
|||
|
properties:
|
|||
|
action:
|
|||
|
type: string
|
|||
|
destination:
|
|||
|
description: Destination contains the match criteria that apply
|
|||
|
to destination entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
http:
|
|||
|
description: HTTP contains match criteria that apply to HTTP
|
|||
|
requests.
|
|||
|
properties:
|
|||
|
methods:
|
|||
|
description: Methods is an optional field that restricts
|
|||
|
the rule to apply only to HTTP requests that use one of
|
|||
|
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
|
|||
|
methods are OR'd together.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
paths:
|
|||
|
description: 'Paths is an optional field that restricts
|
|||
|
the rule to apply to HTTP requests that use one of the
|
|||
|
listed HTTP Paths. Multiple paths are OR''d together.
|
|||
|
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
|
|||
|
ONLY specify either a `exact` or a `prefix` match. The
|
|||
|
validator will check for it.'
|
|||
|
items:
|
|||
|
description: 'HTTPPath specifies an HTTP path to match.
|
|||
|
It may be either of the form: exact: <path>: which matches
|
|||
|
the path exactly or prefix: <path-prefix>: which matches
|
|||
|
the path prefix'
|
|||
|
properties:
|
|||
|
exact:
|
|||
|
type: string
|
|||
|
prefix:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
icmp:
|
|||
|
description: ICMP is an optional field that restricts the rule
|
|||
|
to apply to a specific type and code of ICMP traffic. This
|
|||
|
should only be specified if the Protocol field is set to "ICMP"
|
|||
|
or "ICMPv6".
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
ipVersion:
|
|||
|
description: IPVersion is an optional field that restricts the
|
|||
|
rule to only match a specific IP version.
|
|||
|
type: integer
|
|||
|
metadata:
|
|||
|
description: Metadata contains additional information for this
|
|||
|
rule
|
|||
|
properties:
|
|||
|
annotations:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: Annotations is a set of key value pairs that
|
|||
|
give extra information about the rule
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
notICMP:
|
|||
|
description: NotICMP is the negated version of the ICMP field.
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
notProtocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: NotProtocol is the negated version of the Protocol
|
|||
|
field.
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
protocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: "Protocol is an optional field that restricts the
|
|||
|
rule to only apply to traffic of a specific IP protocol. Required
|
|||
|
if any of the EntityRules contain Ports (because ports only
|
|||
|
apply to certain protocols). \n Must be one of these string
|
|||
|
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
|
|||
|
\"UDPLite\" or an integer in the range 1-255."
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
source:
|
|||
|
description: Source contains the match criteria that apply to
|
|||
|
source entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
required:
|
|||
|
- action
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
namespaceSelector:
|
|||
|
description: NamespaceSelector is an optional field for an expression
|
|||
|
used to select a pod based on namespaces.
|
|||
|
type: string
|
|||
|
order:
|
|||
|
description: Order is an optional field that specifies the order in
|
|||
|
which the policy is applied. Policies with higher "order" are applied
|
|||
|
after those with lower order. If the order is omitted, it may be
|
|||
|
considered to be "infinite" - i.e. the policy will be applied last. Policies
|
|||
|
with identical order will be applied in alphanumerical order based
|
|||
|
on the Policy "Name".
|
|||
|
type: number
|
|||
|
preDNAT:
|
|||
|
description: PreDNAT indicates to apply the rules in this policy before
|
|||
|
any DNAT.
|
|||
|
type: boolean
|
|||
|
selector:
|
|||
|
description: "The selector is an expression used to pick pick out
|
|||
|
the endpoints that the policy should be applied to. \n Selector
|
|||
|
expressions follow this syntax: \n \tlabel == \"string_literal\"
|
|||
|
\ -> comparison, e.g. my_label == \"foo bar\" \tlabel != \"string_literal\"
|
|||
|
\ -> not equal; also matches if label is not present \tlabel in
|
|||
|
{ \"a\", \"b\", \"c\", ... } -> true if the value of label X is
|
|||
|
one of \"a\", \"b\", \"c\" \tlabel not in { \"a\", \"b\", \"c\",
|
|||
|
... } -> true if the value of label X is not one of \"a\", \"b\",
|
|||
|
\"c\" \thas(label_name) -> True if that label is present \t! expr
|
|||
|
-> negation of expr \texpr && expr -> Short-circuit and \texpr
|
|||
|
|| expr -> Short-circuit or \t( expr ) -> parens for grouping \tall()
|
|||
|
or the empty selector -> matches all endpoints. \n Label names are
|
|||
|
allowed to contain alphanumerics, -, _ and /. String literals are
|
|||
|
more permissive but they do not support escape characters. \n Examples
|
|||
|
(with made-up labels): \n \ttype == \"webserver\" && deployment
|
|||
|
== \"prod\" \ttype in {\"frontend\", \"backend\"} \tdeployment !=
|
|||
|
\"dev\" \t! has(label_name)"
|
|||
|
type: string
|
|||
|
serviceAccountSelector:
|
|||
|
description: ServiceAccountSelector is an optional field for an expression
|
|||
|
used to select a pod based on service accounts.
|
|||
|
type: string
|
|||
|
types:
|
|||
|
description: "Types indicates whether this policy applies to ingress,
|
|||
|
or to egress, or to both. When not explicitly specified (and so
|
|||
|
the value on creation is empty or nil), Calico defaults Types according
|
|||
|
to what Ingress and Egress rules are present in the policy. The
|
|||
|
default is: \n - [ PolicyTypeIngress ], if there are no Egress rules
|
|||
|
(including the case where there are also no Ingress rules) \n
|
|||
|
- [ PolicyTypeEgress ], if there are Egress rules but no Ingress
|
|||
|
rules \n - [ PolicyTypeIngress, PolicyTypeEgress ], if there are
|
|||
|
both Ingress and Egress rules. \n When the policy is read back again,
|
|||
|
Types will always be one of these values, never empty or nil."
|
|||
|
items:
|
|||
|
description: PolicyType enumerates the possible values of the PolicySpec
|
|||
|
Types field.
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_globalnetworksets.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: globalnetworksets.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: GlobalNetworkSet
|
|||
|
listKind: GlobalNetworkSetList
|
|||
|
plural: globalnetworksets
|
|||
|
singular: globalnetworkset
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: GlobalNetworkSet contains a set of arbitrary IP sub-networks/CIDRs
|
|||
|
that share labels to allow rules to refer to them via selectors. The labels
|
|||
|
of GlobalNetworkSet are not namespaced.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: GlobalNetworkSetSpec contains the specification for a NetworkSet
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
nets:
|
|||
|
description: The list of IP networks that belong to this set.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_hostendpoints.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: hostendpoints.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: HostEndpoint
|
|||
|
listKind: HostEndpointList
|
|||
|
plural: hostendpoints
|
|||
|
singular: hostendpoint
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: HostEndpointSpec contains the specification for a HostEndpoint
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
expectedIPs:
|
|||
|
description: "The expected IP addresses (IPv4 and IPv6) of the endpoint.
|
|||
|
If \"InterfaceName\" is not present, Calico will look for an interface
|
|||
|
matching any of the IPs in the list and apply policy to that. Note:
|
|||
|
\tWhen using the selector match criteria in an ingress or egress
|
|||
|
security Policy \tor Profile, Calico converts the selector into
|
|||
|
a set of IP addresses. For host \tendpoints, the ExpectedIPs field
|
|||
|
is used for that purpose. (If only the interface \tname is specified,
|
|||
|
Calico does not learn the IPs of the interface for use in match
|
|||
|
\tcriteria.)"
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
interfaceName:
|
|||
|
description: "Either \"*\", or the name of a specific Linux interface
|
|||
|
to apply policy to; or empty. \"*\" indicates that this HostEndpoint
|
|||
|
governs all traffic to, from or through the default network namespace
|
|||
|
of the host named by the \"Node\" field; entering and leaving that
|
|||
|
namespace via any interface, including those from/to non-host-networked
|
|||
|
local workloads. \n If InterfaceName is not \"*\", this HostEndpoint
|
|||
|
only governs traffic that enters or leaves the host through the
|
|||
|
specific interface named by InterfaceName, or - when InterfaceName
|
|||
|
is empty - through the specific interface that has one of the IPs
|
|||
|
in ExpectedIPs. Therefore, when InterfaceName is empty, at least
|
|||
|
one expected IP must be specified. Only external interfaces (such
|
|||
|
as \"eth0\") are supported here; it isn't possible for a HostEndpoint
|
|||
|
to protect traffic through a specific local workload interface.
|
|||
|
\n Note: Only some kinds of policy are implemented for \"*\" HostEndpoints;
|
|||
|
initially just pre-DNAT policy. Please check Calico documentation
|
|||
|
for the latest position."
|
|||
|
type: string
|
|||
|
node:
|
|||
|
description: The node name identifying the Calico node instance.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: Ports contains the endpoint's named ports, which may
|
|||
|
be referenced in security policy rules.
|
|||
|
items:
|
|||
|
properties:
|
|||
|
name:
|
|||
|
type: string
|
|||
|
port:
|
|||
|
type: integer
|
|||
|
protocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
required:
|
|||
|
- name
|
|||
|
- port
|
|||
|
- protocol
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
profiles:
|
|||
|
description: A list of identifiers of security Profile objects that
|
|||
|
apply to this endpoint. Each profile is applied in the order that
|
|||
|
they appear in this list. Profile rules are applied after the selector-based
|
|||
|
security policy.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_ipamblocks.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: ipamblocks.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: IPAMBlock
|
|||
|
listKind: IPAMBlockList
|
|||
|
plural: ipamblocks
|
|||
|
singular: ipamblock
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: IPAMBlockSpec contains the specification for an IPAMBlock
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
affinity:
|
|||
|
description: Affinity of the block, if this block has one. If set,
|
|||
|
it will be of the form "host:<hostname>". If not set, this block
|
|||
|
is not affine to a host.
|
|||
|
type: string
|
|||
|
allocations:
|
|||
|
description: Array of allocations in-use within this block. nil entries
|
|||
|
mean the allocation is free. For non-nil entries at index i, the
|
|||
|
index is the ordinal of the allocation within this block and the
|
|||
|
value is the index of the associated attributes in the Attributes
|
|||
|
array.
|
|||
|
items:
|
|||
|
type: integer
|
|||
|
# TODO: This nullable is manually added in. We should update controller-gen
|
|||
|
# to handle []*int properly itself.
|
|||
|
nullable: true
|
|||
|
type: array
|
|||
|
attributes:
|
|||
|
description: Attributes is an array of arbitrary metadata associated
|
|||
|
with allocations in the block. To find attributes for a given allocation,
|
|||
|
use the value of the allocation's entry in the Allocations array
|
|||
|
as the index of the element in this array.
|
|||
|
items:
|
|||
|
properties:
|
|||
|
handle_id:
|
|||
|
type: string
|
|||
|
secondary:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
cidr:
|
|||
|
description: The block's CIDR.
|
|||
|
type: string
|
|||
|
deleted:
|
|||
|
description: Deleted is an internal boolean used to workaround a limitation
|
|||
|
in the Kubernetes API whereby deletion will not return a conflict
|
|||
|
error if the block has been updated. It should not be set manually.
|
|||
|
type: boolean
|
|||
|
sequenceNumber:
|
|||
|
default: 0
|
|||
|
description: We store a sequence number that is updated each time
|
|||
|
the block is written. Each allocation will also store the sequence
|
|||
|
number of the block at the time of its creation. When releasing
|
|||
|
an IP, passing the sequence number associated with the allocation
|
|||
|
allows us to protect against a race condition and ensure the IP
|
|||
|
hasn't been released and re-allocated since the release request.
|
|||
|
format: int64
|
|||
|
type: integer
|
|||
|
sequenceNumberForAllocation:
|
|||
|
additionalProperties:
|
|||
|
format: int64
|
|||
|
type: integer
|
|||
|
description: Map of allocated ordinal within the block to sequence
|
|||
|
number of the block at the time of allocation. Kubernetes does not
|
|||
|
allow numerical keys for maps, so the key is cast to a string.
|
|||
|
type: object
|
|||
|
strictAffinity:
|
|||
|
description: StrictAffinity on the IPAMBlock is deprecated and no
|
|||
|
longer used by the code. Use IPAMConfig StrictAffinity instead.
|
|||
|
type: boolean
|
|||
|
unallocated:
|
|||
|
description: Unallocated is an ordered list of allocations which are
|
|||
|
free in the block.
|
|||
|
items:
|
|||
|
type: integer
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- allocations
|
|||
|
- attributes
|
|||
|
- cidr
|
|||
|
- strictAffinity
|
|||
|
- unallocated
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_ipamconfigs.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: ipamconfigs.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: IPAMConfig
|
|||
|
listKind: IPAMConfigList
|
|||
|
plural: ipamconfigs
|
|||
|
singular: ipamconfig
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: IPAMConfigSpec contains the specification for an IPAMConfig
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
autoAllocateBlocks:
|
|||
|
type: boolean
|
|||
|
maxBlocksPerHost:
|
|||
|
description: MaxBlocksPerHost, if non-zero, is the max number of blocks
|
|||
|
that can be affine to each host.
|
|||
|
type: integer
|
|||
|
strictAffinity:
|
|||
|
type: boolean
|
|||
|
required:
|
|||
|
- autoAllocateBlocks
|
|||
|
- strictAffinity
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_ipamhandles.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: ipamhandles.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: IPAMHandle
|
|||
|
listKind: IPAMHandleList
|
|||
|
plural: ipamhandles
|
|||
|
singular: ipamhandle
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: IPAMHandleSpec contains the specification for an IPAMHandle
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
block:
|
|||
|
additionalProperties:
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
deleted:
|
|||
|
type: boolean
|
|||
|
handleID:
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- block
|
|||
|
- handleID
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_ippools.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: ippools.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: IPPool
|
|||
|
listKind: IPPoolList
|
|||
|
plural: ippools
|
|||
|
singular: ippool
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: IPPoolSpec contains the specification for an IPPool resource.
|
|||
|
properties:
|
|||
|
allowedUses:
|
|||
|
description: AllowedUse controls what the IP pool will be used for. If
|
|||
|
not specified or empty, defaults to ["Tunnel", "Workload"] for back-compatibility
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
blockSize:
|
|||
|
description: The block size to use for IP address assignments from
|
|||
|
this pool. Defaults to 26 for IPv4 and 122 for IPv6.
|
|||
|
type: integer
|
|||
|
cidr:
|
|||
|
description: The pool CIDR.
|
|||
|
type: string
|
|||
|
disableBGPExport:
|
|||
|
description: 'Disable exporting routes from this IP Pool''s CIDR over
|
|||
|
BGP. [Default: false]'
|
|||
|
type: boolean
|
|||
|
disabled:
|
|||
|
description: When disabled is true, Calico IPAM will not assign addresses
|
|||
|
from this pool.
|
|||
|
type: boolean
|
|||
|
ipip:
|
|||
|
description: 'Deprecated: this field is only used for APIv1 backwards
|
|||
|
compatibility. Setting this field is not allowed, this field is
|
|||
|
for internal use only.'
|
|||
|
properties:
|
|||
|
enabled:
|
|||
|
description: When enabled is true, ipip tunneling will be used
|
|||
|
to deliver packets to destinations within this pool.
|
|||
|
type: boolean
|
|||
|
mode:
|
|||
|
description: The IPIP mode. This can be one of "always" or "cross-subnet". A
|
|||
|
mode of "always" will also use IPIP tunneling for routing to
|
|||
|
destination IP addresses within this pool. A mode of "cross-subnet"
|
|||
|
will only use IPIP tunneling when the destination node is on
|
|||
|
a different subnet to the originating node. The default value
|
|||
|
(if not specified) is "always".
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
ipipMode:
|
|||
|
description: Contains configuration for IPIP tunneling for this pool.
|
|||
|
If not specified, then this is defaulted to "Never" (i.e. IPIP tunneling
|
|||
|
is disabled).
|
|||
|
type: string
|
|||
|
nat-outgoing:
|
|||
|
description: 'Deprecated: this field is only used for APIv1 backwards
|
|||
|
compatibility. Setting this field is not allowed, this field is
|
|||
|
for internal use only.'
|
|||
|
type: boolean
|
|||
|
natOutgoing:
|
|||
|
description: When nat-outgoing is true, packets sent from Calico networked
|
|||
|
containers in this pool to destinations outside of this pool will
|
|||
|
be masqueraded.
|
|||
|
type: boolean
|
|||
|
nodeSelector:
|
|||
|
description: Allows IPPool to allocate for a specific node by label
|
|||
|
selector.
|
|||
|
type: string
|
|||
|
vxlanMode:
|
|||
|
description: Contains configuration for VXLAN tunneling for this pool.
|
|||
|
If not specified, then this is defaulted to "Never" (i.e. VXLAN
|
|||
|
tunneling is disabled).
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- cidr
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_ipreservations.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
annotations:
|
|||
|
controller-gen.kubebuilder.io/version: (devel)
|
|||
|
creationTimestamp: null
|
|||
|
name: ipreservations.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: IPReservation
|
|||
|
listKind: IPReservationList
|
|||
|
plural: ipreservations
|
|||
|
singular: ipreservation
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: IPReservationSpec contains the specification for an IPReservation
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
reservedCIDRs:
|
|||
|
description: ReservedCIDRs is a list of CIDRs and/or IP addresses
|
|||
|
that Calico IPAM will exclude from new allocations.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_kubecontrollersconfigurations.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: kubecontrollersconfigurations.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: KubeControllersConfiguration
|
|||
|
listKind: KubeControllersConfigurationList
|
|||
|
plural: kubecontrollersconfigurations
|
|||
|
singular: kubecontrollersconfiguration
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: KubeControllersConfigurationSpec contains the values of the
|
|||
|
Kubernetes controllers configuration.
|
|||
|
properties:
|
|||
|
controllers:
|
|||
|
description: Controllers enables and configures individual Kubernetes
|
|||
|
controllers
|
|||
|
properties:
|
|||
|
namespace:
|
|||
|
description: Namespace enables and configures the namespace controller.
|
|||
|
Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform reconciliation
|
|||
|
with the Calico datastore. [Default: 5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
node:
|
|||
|
description: Node enables and configures the node controller.
|
|||
|
Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
hostEndpoint:
|
|||
|
description: HostEndpoint controls syncing nodes to host endpoints.
|
|||
|
Disabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
autoCreate:
|
|||
|
description: 'AutoCreate enables automatic creation of
|
|||
|
host endpoints for every node. [Default: Disabled]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
leakGracePeriod:
|
|||
|
description: 'LeakGracePeriod is the period used by the controller
|
|||
|
to determine if an IP address has been leaked. Set to 0
|
|||
|
to disable IP garbage collection. [Default: 15m]'
|
|||
|
type: string
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform reconciliation
|
|||
|
with the Calico datastore. [Default: 5m]'
|
|||
|
type: string
|
|||
|
syncLabels:
|
|||
|
description: 'SyncLabels controls whether to copy Kubernetes
|
|||
|
node labels to Calico nodes. [Default: Enabled]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
policy:
|
|||
|
description: Policy enables and configures the policy controller.
|
|||
|
Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform reconciliation
|
|||
|
with the Calico datastore. [Default: 5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
serviceAccount:
|
|||
|
description: ServiceAccount enables and configures the service
|
|||
|
account controller. Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform reconciliation
|
|||
|
with the Calico datastore. [Default: 5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
workloadEndpoint:
|
|||
|
description: WorkloadEndpoint enables and configures the workload
|
|||
|
endpoint controller. Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform reconciliation
|
|||
|
with the Calico datastore. [Default: 5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
debugProfilePort:
|
|||
|
description: DebugProfilePort configures the port to serve memory
|
|||
|
and cpu profiles on. If not specified, profiling is disabled.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
etcdV3CompactionPeriod:
|
|||
|
description: 'EtcdV3CompactionPeriod is the period between etcdv3
|
|||
|
compaction requests. Set to 0 to disable. [Default: 10m]'
|
|||
|
type: string
|
|||
|
healthChecks:
|
|||
|
description: 'HealthChecks enables or disables support for health
|
|||
|
checks [Default: Enabled]'
|
|||
|
type: string
|
|||
|
logSeverityScreen:
|
|||
|
description: 'LogSeverityScreen is the log severity above which logs
|
|||
|
are sent to the stdout. [Default: Info]'
|
|||
|
type: string
|
|||
|
prometheusMetricsPort:
|
|||
|
description: 'PrometheusMetricsPort is the TCP port that the Prometheus
|
|||
|
metrics server should bind to. Set to 0 to disable. [Default: 9094]'
|
|||
|
type: integer
|
|||
|
required:
|
|||
|
- controllers
|
|||
|
type: object
|
|||
|
status:
|
|||
|
description: KubeControllersConfigurationStatus represents the status
|
|||
|
of the configuration. It's useful for admins to be able to see the actual
|
|||
|
config that was applied, which can be modified by environment variables
|
|||
|
on the kube-controllers process.
|
|||
|
properties:
|
|||
|
environmentVars:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: EnvironmentVars contains the environment variables on
|
|||
|
the kube-controllers that influenced the RunningConfig.
|
|||
|
type: object
|
|||
|
runningConfig:
|
|||
|
description: RunningConfig contains the effective config that is running
|
|||
|
in the kube-controllers pod, after merging the API resource with
|
|||
|
any environment variables.
|
|||
|
properties:
|
|||
|
controllers:
|
|||
|
description: Controllers enables and configures individual Kubernetes
|
|||
|
controllers
|
|||
|
properties:
|
|||
|
namespace:
|
|||
|
description: Namespace enables and configures the namespace
|
|||
|
controller. Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform
|
|||
|
reconciliation with the Calico datastore. [Default:
|
|||
|
5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
node:
|
|||
|
description: Node enables and configures the node controller.
|
|||
|
Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
hostEndpoint:
|
|||
|
description: HostEndpoint controls syncing nodes to host
|
|||
|
endpoints. Disabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
autoCreate:
|
|||
|
description: 'AutoCreate enables automatic creation
|
|||
|
of host endpoints for every node. [Default: Disabled]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
leakGracePeriod:
|
|||
|
description: 'LeakGracePeriod is the period used by the
|
|||
|
controller to determine if an IP address has been leaked.
|
|||
|
Set to 0 to disable IP garbage collection. [Default:
|
|||
|
15m]'
|
|||
|
type: string
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform
|
|||
|
reconciliation with the Calico datastore. [Default:
|
|||
|
5m]'
|
|||
|
type: string
|
|||
|
syncLabels:
|
|||
|
description: 'SyncLabels controls whether to copy Kubernetes
|
|||
|
node labels to Calico nodes. [Default: Enabled]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
policy:
|
|||
|
description: Policy enables and configures the policy controller.
|
|||
|
Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform
|
|||
|
reconciliation with the Calico datastore. [Default:
|
|||
|
5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
serviceAccount:
|
|||
|
description: ServiceAccount enables and configures the service
|
|||
|
account controller. Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform
|
|||
|
reconciliation with the Calico datastore. [Default:
|
|||
|
5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
workloadEndpoint:
|
|||
|
description: WorkloadEndpoint enables and configures the workload
|
|||
|
endpoint controller. Enabled by default, set to nil to disable.
|
|||
|
properties:
|
|||
|
reconcilerPeriod:
|
|||
|
description: 'ReconcilerPeriod is the period to perform
|
|||
|
reconciliation with the Calico datastore. [Default:
|
|||
|
5m]'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
debugProfilePort:
|
|||
|
description: DebugProfilePort configures the port to serve memory
|
|||
|
and cpu profiles on. If not specified, profiling is disabled.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
etcdV3CompactionPeriod:
|
|||
|
description: 'EtcdV3CompactionPeriod is the period between etcdv3
|
|||
|
compaction requests. Set to 0 to disable. [Default: 10m]'
|
|||
|
type: string
|
|||
|
healthChecks:
|
|||
|
description: 'HealthChecks enables or disables support for health
|
|||
|
checks [Default: Enabled]'
|
|||
|
type: string
|
|||
|
logSeverityScreen:
|
|||
|
description: 'LogSeverityScreen is the log severity above which
|
|||
|
logs are sent to the stdout. [Default: Info]'
|
|||
|
type: string
|
|||
|
prometheusMetricsPort:
|
|||
|
description: 'PrometheusMetricsPort is the TCP port that the Prometheus
|
|||
|
metrics server should bind to. Set to 0 to disable. [Default:
|
|||
|
9094]'
|
|||
|
type: integer
|
|||
|
required:
|
|||
|
- controllers
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_networkpolicies.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: networkpolicies.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: NetworkPolicy
|
|||
|
listKind: NetworkPolicyList
|
|||
|
plural: networkpolicies
|
|||
|
singular: networkpolicy
|
|||
|
scope: Namespaced
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
properties:
|
|||
|
egress:
|
|||
|
description: The ordered set of egress rules. Each rule contains
|
|||
|
a set of packet match criteria and a corresponding action to apply.
|
|||
|
items:
|
|||
|
description: "A Rule encapsulates a set of match criteria and an
|
|||
|
action. Both selector-based security Policy and security Profiles
|
|||
|
reference rules - separated out as a list of rules for both ingress
|
|||
|
and egress packet matching. \n Each positive match criteria has
|
|||
|
a negated version, prefixed with \"Not\". All the match criteria
|
|||
|
within a rule must be satisfied for a packet to match. A single
|
|||
|
rule can contain the positive and negative version of a match
|
|||
|
and both must be satisfied for the rule to match."
|
|||
|
properties:
|
|||
|
action:
|
|||
|
type: string
|
|||
|
destination:
|
|||
|
description: Destination contains the match criteria that apply
|
|||
|
to destination entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
http:
|
|||
|
description: HTTP contains match criteria that apply to HTTP
|
|||
|
requests.
|
|||
|
properties:
|
|||
|
methods:
|
|||
|
description: Methods is an optional field that restricts
|
|||
|
the rule to apply only to HTTP requests that use one of
|
|||
|
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
|
|||
|
methods are OR'd together.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
paths:
|
|||
|
description: 'Paths is an optional field that restricts
|
|||
|
the rule to apply to HTTP requests that use one of the
|
|||
|
listed HTTP Paths. Multiple paths are OR''d together.
|
|||
|
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
|
|||
|
ONLY specify either a `exact` or a `prefix` match. The
|
|||
|
validator will check for it.'
|
|||
|
items:
|
|||
|
description: 'HTTPPath specifies an HTTP path to match.
|
|||
|
It may be either of the form: exact: <path>: which matches
|
|||
|
the path exactly or prefix: <path-prefix>: which matches
|
|||
|
the path prefix'
|
|||
|
properties:
|
|||
|
exact:
|
|||
|
type: string
|
|||
|
prefix:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
icmp:
|
|||
|
description: ICMP is an optional field that restricts the rule
|
|||
|
to apply to a specific type and code of ICMP traffic. This
|
|||
|
should only be specified if the Protocol field is set to "ICMP"
|
|||
|
or "ICMPv6".
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
ipVersion:
|
|||
|
description: IPVersion is an optional field that restricts the
|
|||
|
rule to only match a specific IP version.
|
|||
|
type: integer
|
|||
|
metadata:
|
|||
|
description: Metadata contains additional information for this
|
|||
|
rule
|
|||
|
properties:
|
|||
|
annotations:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: Annotations is a set of key value pairs that
|
|||
|
give extra information about the rule
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
notICMP:
|
|||
|
description: NotICMP is the negated version of the ICMP field.
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
notProtocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: NotProtocol is the negated version of the Protocol
|
|||
|
field.
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
protocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: "Protocol is an optional field that restricts the
|
|||
|
rule to only apply to traffic of a specific IP protocol. Required
|
|||
|
if any of the EntityRules contain Ports (because ports only
|
|||
|
apply to certain protocols). \n Must be one of these string
|
|||
|
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
|
|||
|
\"UDPLite\" or an integer in the range 1-255."
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
source:
|
|||
|
description: Source contains the match criteria that apply to
|
|||
|
source entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
required:
|
|||
|
- action
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
ingress:
|
|||
|
description: The ordered set of ingress rules. Each rule contains
|
|||
|
a set of packet match criteria and a corresponding action to apply.
|
|||
|
items:
|
|||
|
description: "A Rule encapsulates a set of match criteria and an
|
|||
|
action. Both selector-based security Policy and security Profiles
|
|||
|
reference rules - separated out as a list of rules for both ingress
|
|||
|
and egress packet matching. \n Each positive match criteria has
|
|||
|
a negated version, prefixed with \"Not\". All the match criteria
|
|||
|
within a rule must be satisfied for a packet to match. A single
|
|||
|
rule can contain the positive and negative version of a match
|
|||
|
and both must be satisfied for the rule to match."
|
|||
|
properties:
|
|||
|
action:
|
|||
|
type: string
|
|||
|
destination:
|
|||
|
description: Destination contains the match criteria that apply
|
|||
|
to destination entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
http:
|
|||
|
description: HTTP contains match criteria that apply to HTTP
|
|||
|
requests.
|
|||
|
properties:
|
|||
|
methods:
|
|||
|
description: Methods is an optional field that restricts
|
|||
|
the rule to apply only to HTTP requests that use one of
|
|||
|
the listed HTTP Methods (e.g. GET, PUT, etc.) Multiple
|
|||
|
methods are OR'd together.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
paths:
|
|||
|
description: 'Paths is an optional field that restricts
|
|||
|
the rule to apply to HTTP requests that use one of the
|
|||
|
listed HTTP Paths. Multiple paths are OR''d together.
|
|||
|
e.g: - exact: /foo - prefix: /bar NOTE: Each entry may
|
|||
|
ONLY specify either a `exact` or a `prefix` match. The
|
|||
|
validator will check for it.'
|
|||
|
items:
|
|||
|
description: 'HTTPPath specifies an HTTP path to match.
|
|||
|
It may be either of the form: exact: <path>: which matches
|
|||
|
the path exactly or prefix: <path-prefix>: which matches
|
|||
|
the path prefix'
|
|||
|
properties:
|
|||
|
exact:
|
|||
|
type: string
|
|||
|
prefix:
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
icmp:
|
|||
|
description: ICMP is an optional field that restricts the rule
|
|||
|
to apply to a specific type and code of ICMP traffic. This
|
|||
|
should only be specified if the Protocol field is set to "ICMP"
|
|||
|
or "ICMPv6".
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
ipVersion:
|
|||
|
description: IPVersion is an optional field that restricts the
|
|||
|
rule to only match a specific IP version.
|
|||
|
type: integer
|
|||
|
metadata:
|
|||
|
description: Metadata contains additional information for this
|
|||
|
rule
|
|||
|
properties:
|
|||
|
annotations:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: Annotations is a set of key value pairs that
|
|||
|
give extra information about the rule
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
notICMP:
|
|||
|
description: NotICMP is the negated version of the ICMP field.
|
|||
|
properties:
|
|||
|
code:
|
|||
|
description: Match on a specific ICMP code. If specified,
|
|||
|
the Type value must also be specified. This is a technical
|
|||
|
limitation imposed by the kernel's iptables firewall,
|
|||
|
which Calico uses to enforce the rule.
|
|||
|
type: integer
|
|||
|
type:
|
|||
|
description: Match on a specific ICMP type. For example
|
|||
|
a value of 8 refers to ICMP Echo Request (i.e. pings).
|
|||
|
type: integer
|
|||
|
type: object
|
|||
|
notProtocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: NotProtocol is the negated version of the Protocol
|
|||
|
field.
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
protocol:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: "Protocol is an optional field that restricts the
|
|||
|
rule to only apply to traffic of a specific IP protocol. Required
|
|||
|
if any of the EntityRules contain Ports (because ports only
|
|||
|
apply to certain protocols). \n Must be one of these string
|
|||
|
values: \"TCP\", \"UDP\", \"ICMP\", \"ICMPv6\", \"SCTP\",
|
|||
|
\"UDPLite\" or an integer in the range 1-255."
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
source:
|
|||
|
description: Source contains the match criteria that apply to
|
|||
|
source entity.
|
|||
|
properties:
|
|||
|
namespaceSelector:
|
|||
|
description: "NamespaceSelector is an optional field that
|
|||
|
contains a selector expression. Only traffic that originates
|
|||
|
from (or terminates at) endpoints within the selected
|
|||
|
namespaces will be matched. When both NamespaceSelector
|
|||
|
and another selector are defined on the same rule, then
|
|||
|
only workload endpoints that are matched by both selectors
|
|||
|
will be selected by the rule. \n For NetworkPolicy, an
|
|||
|
empty NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only workload endpoints in the same namespace
|
|||
|
as the NetworkPolicy. \n For NetworkPolicy, `global()`
|
|||
|
NamespaceSelector implies that the Selector is limited
|
|||
|
to selecting only GlobalNetworkSet or HostEndpoint. \n
|
|||
|
For GlobalNetworkPolicy, an empty NamespaceSelector implies
|
|||
|
the Selector applies to workload endpoints across all
|
|||
|
namespaces."
|
|||
|
type: string
|
|||
|
nets:
|
|||
|
description: Nets is an optional field that restricts the
|
|||
|
rule to only apply to traffic that originates from (or
|
|||
|
terminates at) IP addresses in any of the given subnets.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notNets:
|
|||
|
description: NotNets is the negated version of the Nets
|
|||
|
field.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
notPorts:
|
|||
|
description: NotPorts is the negated version of the Ports
|
|||
|
field. Since only some protocols have ports, if any ports
|
|||
|
are specified it requires the Protocol match in the Rule
|
|||
|
to be set to "TCP" or "UDP".
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
notSelector:
|
|||
|
description: NotSelector is the negated version of the Selector
|
|||
|
field. See Selector field for subtleties with negated
|
|||
|
selectors.
|
|||
|
type: string
|
|||
|
ports:
|
|||
|
description: "Ports is an optional field that restricts
|
|||
|
the rule to only apply to traffic that has a source (destination)
|
|||
|
port that matches one of these ranges/values. This value
|
|||
|
is a list of integers or strings that represent ranges
|
|||
|
of ports. \n Since only some protocols have ports, if
|
|||
|
any ports are specified it requires the Protocol match
|
|||
|
in the Rule to be set to \"TCP\" or \"UDP\"."
|
|||
|
items:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^.*
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: "Selector is an optional field that contains
|
|||
|
a selector expression (see Policy for sample syntax).
|
|||
|
\ Only traffic that originates from (terminates at) endpoints
|
|||
|
matching the selector will be matched. \n Note that: in
|
|||
|
addition to the negated version of the Selector (see NotSelector
|
|||
|
below), the selector expression syntax itself supports
|
|||
|
negation. The two types of negation are subtly different.
|
|||
|
One negates the set of matched endpoints, the other negates
|
|||
|
the whole match: \n \tSelector = \"!has(my_label)\" matches
|
|||
|
packets that are from other Calico-controlled \tendpoints
|
|||
|
that do not have the label \"my_label\". \n \tNotSelector
|
|||
|
= \"has(my_label)\" matches packets that are not from
|
|||
|
Calico-controlled \tendpoints that do have the label \"my_label\".
|
|||
|
\n The effect is that the latter will accept packets from
|
|||
|
non-Calico sources whereas the former is limited to packets
|
|||
|
from Calico-controlled endpoints."
|
|||
|
type: string
|
|||
|
serviceAccounts:
|
|||
|
description: ServiceAccounts is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates from
|
|||
|
(or terminates at) a pod running as a matching service
|
|||
|
account.
|
|||
|
properties:
|
|||
|
names:
|
|||
|
description: Names is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account whose name is in the list.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
selector:
|
|||
|
description: Selector is an optional field that restricts
|
|||
|
the rule to only apply to traffic that originates
|
|||
|
from (or terminates at) a pod running as a service
|
|||
|
account that matches the given label selector. If
|
|||
|
both Names and Selector are specified then they are
|
|||
|
AND'ed.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
services:
|
|||
|
description: "Services is an optional field that contains
|
|||
|
options for matching Kubernetes Services. If specified,
|
|||
|
only traffic that originates from or terminates at endpoints
|
|||
|
within the selected service(s) will be matched, and only
|
|||
|
to/from each endpoint's port. \n Services cannot be specified
|
|||
|
on the same rule as Selector, NotSelector, NamespaceSelector,
|
|||
|
Nets, NotNets or ServiceAccounts. \n Ports and NotPorts
|
|||
|
can only be specified with Services on ingress rules."
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: Name specifies the name of a Kubernetes
|
|||
|
Service to match.
|
|||
|
type: string
|
|||
|
namespace:
|
|||
|
description: Namespace specifies the namespace of the
|
|||
|
given Service. If left empty, the rule will match
|
|||
|
within this policy's namespace.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
required:
|
|||
|
- action
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
order:
|
|||
|
description: Order is an optional field that specifies the order in
|
|||
|
which the policy is applied. Policies with higher "order" are applied
|
|||
|
after those with lower order. If the order is omitted, it may be
|
|||
|
considered to be "infinite" - i.e. the policy will be applied last. Policies
|
|||
|
with identical order will be applied in alphanumerical order based
|
|||
|
on the Policy "Name".
|
|||
|
type: number
|
|||
|
selector:
|
|||
|
description: "The selector is an expression used to pick pick out
|
|||
|
the endpoints that the policy should be applied to. \n Selector
|
|||
|
expressions follow this syntax: \n \tlabel == \"string_literal\"
|
|||
|
\ -> comparison, e.g. my_label == \"foo bar\" \tlabel != \"string_literal\"
|
|||
|
\ -> not equal; also matches if label is not present \tlabel in
|
|||
|
{ \"a\", \"b\", \"c\", ... } -> true if the value of label X is
|
|||
|
one of \"a\", \"b\", \"c\" \tlabel not in { \"a\", \"b\", \"c\",
|
|||
|
... } -> true if the value of label X is not one of \"a\", \"b\",
|
|||
|
\"c\" \thas(label_name) -> True if that label is present \t! expr
|
|||
|
-> negation of expr \texpr && expr -> Short-circuit and \texpr
|
|||
|
|| expr -> Short-circuit or \t( expr ) -> parens for grouping \tall()
|
|||
|
or the empty selector -> matches all endpoints. \n Label names are
|
|||
|
allowed to contain alphanumerics, -, _ and /. String literals are
|
|||
|
more permissive but they do not support escape characters. \n Examples
|
|||
|
(with made-up labels): \n \ttype == \"webserver\" && deployment
|
|||
|
== \"prod\" \ttype in {\"frontend\", \"backend\"} \tdeployment !=
|
|||
|
\"dev\" \t! has(label_name)"
|
|||
|
type: string
|
|||
|
serviceAccountSelector:
|
|||
|
description: ServiceAccountSelector is an optional field for an expression
|
|||
|
used to select a pod based on service accounts.
|
|||
|
type: string
|
|||
|
types:
|
|||
|
description: "Types indicates whether this policy applies to ingress,
|
|||
|
or to egress, or to both. When not explicitly specified (and so
|
|||
|
the value on creation is empty or nil), Calico defaults Types according
|
|||
|
to what Ingress and Egress are present in the policy. The default
|
|||
|
is: \n - [ PolicyTypeIngress ], if there are no Egress rules (including
|
|||
|
the case where there are also no Ingress rules) \n - [ PolicyTypeEgress
|
|||
|
], if there are Egress rules but no Ingress rules \n - [ PolicyTypeIngress,
|
|||
|
PolicyTypeEgress ], if there are both Ingress and Egress rules.
|
|||
|
\n When the policy is read back again, Types will always be one
|
|||
|
of these values, never empty or nil."
|
|||
|
items:
|
|||
|
description: PolicyType enumerates the possible values of the PolicySpec
|
|||
|
Types field.
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/calico/crd.projectcalico.org_networksets.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
name: networksets.crd.projectcalico.org
|
|||
|
spec:
|
|||
|
group: crd.projectcalico.org
|
|||
|
names:
|
|||
|
kind: NetworkSet
|
|||
|
listKind: NetworkSetList
|
|||
|
plural: networksets
|
|||
|
singular: networkset
|
|||
|
scope: Namespaced
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: NetworkSet is the Namespaced-equivalent of the GlobalNetworkSet.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: NetworkSetSpec contains the specification for a NetworkSet
|
|||
|
resource.
|
|||
|
properties:
|
|||
|
nets:
|
|||
|
description: The list of IP networks that belong to this set.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/operator.tigera.io_apiservers_crd.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
annotations:
|
|||
|
controller-gen.kubebuilder.io/version: v0.3.0
|
|||
|
name: apiservers.operator.tigera.io
|
|||
|
spec:
|
|||
|
group: operator.tigera.io
|
|||
|
names:
|
|||
|
kind: APIServer
|
|||
|
listKind: APIServerList
|
|||
|
plural: apiservers
|
|||
|
singular: apiserver
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: APIServer installs the Tigera API server and related resources.
|
|||
|
At most one instance of this resource is supported. It must be named "tigera-secure".
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: Specification of the desired state for the Tigera API server.
|
|||
|
type: object
|
|||
|
status:
|
|||
|
description: Most recently observed status for the Tigera API server.
|
|||
|
properties:
|
|||
|
state:
|
|||
|
description: State provides user-readable status.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
subresources:
|
|||
|
status: {}
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/operator.tigera.io_imagesets_crd.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
annotations:
|
|||
|
controller-gen.kubebuilder.io/version: v0.3.0
|
|||
|
name: imagesets.operator.tigera.io
|
|||
|
spec:
|
|||
|
group: operator.tigera.io
|
|||
|
names:
|
|||
|
kind: ImageSet
|
|||
|
listKind: ImageSetList
|
|||
|
plural: imagesets
|
|||
|
singular: imageset
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: ImageSet is used to specify image digests for the images that
|
|||
|
the operator deploys. The name of the ImageSet is expected to be in the
|
|||
|
format `<variang>-<release>`. The `variant` used is `enterprise` if the
|
|||
|
InstallationSpec Variant is `TigeraSecureEnterprise` otherwise it is `calico`.
|
|||
|
The `release` must match the version of the variant that the operator is
|
|||
|
built to deploy, this version can be obtained by passing the `--version`
|
|||
|
flag to the operator binary.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: ImageSetSpec defines the desired state of ImageSet.
|
|||
|
properties:
|
|||
|
images:
|
|||
|
description: Images is the list of images to use digests. All images
|
|||
|
that the operator will deploy must be specified.
|
|||
|
items:
|
|||
|
properties:
|
|||
|
digest:
|
|||
|
description: Digest is the image identifier that will be used
|
|||
|
for the Image. The field should not include a leading `@`
|
|||
|
and must be prefixed with `sha256:`.
|
|||
|
type: string
|
|||
|
image:
|
|||
|
description: Image is an image that the operator deploys and
|
|||
|
instead of using the built in tag the operator will use the
|
|||
|
Digest for the image identifier. The value should be the image
|
|||
|
name without registry or tag or digest. For the image `docker.io/calico/node:v3.17.1`
|
|||
|
it should be represented as `calico/node`
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- digest
|
|||
|
- image
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
subresources:
|
|||
|
status: {}
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/operator.tigera.io_installations_crd.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
annotations:
|
|||
|
controller-gen.kubebuilder.io/version: v0.3.0
|
|||
|
name: installations.operator.tigera.io
|
|||
|
spec:
|
|||
|
group: operator.tigera.io
|
|||
|
names:
|
|||
|
kind: Installation
|
|||
|
listKind: InstallationList
|
|||
|
plural: installations
|
|||
|
singular: installation
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: Installation configures an installation of Calico or Calico Enterprise.
|
|||
|
At most one instance of this resource is supported. It must be named "default".
|
|||
|
The Installation API installs core networking and network policy components,
|
|||
|
and provides general install-time configuration.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: Specification of the desired state for the Calico or Calico
|
|||
|
Enterprise installation.
|
|||
|
properties:
|
|||
|
calicoNetwork:
|
|||
|
description: CalicoNetwork specifies networking configuration options
|
|||
|
for Calico.
|
|||
|
properties:
|
|||
|
bgp:
|
|||
|
description: BGP configures whether or not to enable Calico's
|
|||
|
BGP capabilities.
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
containerIPForwarding:
|
|||
|
description: 'ContainerIPForwarding configures whether ip forwarding
|
|||
|
will be enabled for containers in the CNI configuration. Default:
|
|||
|
Disabled'
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
hostPorts:
|
|||
|
description: 'HostPorts configures whether or not Calico will
|
|||
|
support Kubernetes HostPorts. Valid only when using the Calico
|
|||
|
CNI plugin. Default: Enabled'
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
ipPools:
|
|||
|
description: IPPools contains a list of IP pools to create if
|
|||
|
none exist. At most one IP pool of each address family may be
|
|||
|
specified. If omitted, a single pool will be configured if needed.
|
|||
|
items:
|
|||
|
properties:
|
|||
|
blockSize:
|
|||
|
description: 'BlockSize specifies the CIDR prefex length
|
|||
|
to use when allocating per-node IP blocks from the main
|
|||
|
IP pool CIDR. Default: 26 (IPv4), 122 (IPv6)'
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
cidr:
|
|||
|
description: CIDR contains the address range for the IP
|
|||
|
Pool in classless inter-domain routing format.
|
|||
|
type: string
|
|||
|
encapsulation:
|
|||
|
description: 'Encapsulation specifies the encapsulation
|
|||
|
type that will be used with the IP Pool. Default: IPIP'
|
|||
|
enum:
|
|||
|
- IPIPCrossSubnet
|
|||
|
- IPIP
|
|||
|
- VXLAN
|
|||
|
- VXLANCrossSubnet
|
|||
|
- None
|
|||
|
type: string
|
|||
|
natOutgoing:
|
|||
|
description: 'NATOutgoing specifies if NAT will be enabled
|
|||
|
or disabled for outgoing traffic. Default: Enabled'
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
nodeSelector:
|
|||
|
description: 'NodeSelector specifies the node selector that
|
|||
|
will be set for the IP Pool. Default: ''all()'''
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- cidr
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
linuxDataplane:
|
|||
|
description: 'LinuxDataplane is used to select the dataplane used
|
|||
|
for Linux nodes. In particular, it causes the operator to add
|
|||
|
required mounts and environment variables for the particular
|
|||
|
dataplane. If not specified, iptables mode is used. Default:
|
|||
|
Iptables'
|
|||
|
enum:
|
|||
|
- Iptables
|
|||
|
- BPF
|
|||
|
- VPP
|
|||
|
type: string
|
|||
|
mtu:
|
|||
|
description: MTU specifies the maximum transmission unit to use
|
|||
|
on the pod network. If not specified, Calico will perform MTU
|
|||
|
auto-detection based on the cluster network.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
multiInterfaceMode:
|
|||
|
description: 'MultiInterfaceMode configures what will configure
|
|||
|
multiple interface per pod. Only valid for Calico Enterprise
|
|||
|
installations using the Calico CNI plugin. Default: None'
|
|||
|
enum:
|
|||
|
- None
|
|||
|
- Multus
|
|||
|
type: string
|
|||
|
nodeAddressAutodetectionV4:
|
|||
|
description: NodeAddressAutodetectionV4 specifies an approach
|
|||
|
to automatically detect node IPv4 addresses. If not specified,
|
|||
|
will use default auto-detection settings to acquire an IPv4
|
|||
|
address for each node.
|
|||
|
properties:
|
|||
|
canReach:
|
|||
|
description: CanReach enables IP auto-detection based on which
|
|||
|
source address on the node is used to reach the specified
|
|||
|
IP or domain.
|
|||
|
type: string
|
|||
|
cidrs:
|
|||
|
description: CIDRS enables IP auto-detection based on which
|
|||
|
addresses on the nodes are within one of the provided CIDRs.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
firstFound:
|
|||
|
description: FirstFound uses default interface matching parameters
|
|||
|
to select an interface, performing best-effort filtering
|
|||
|
based on well-known interface names.
|
|||
|
type: boolean
|
|||
|
interface:
|
|||
|
description: Interface enables IP auto-detection based on
|
|||
|
interfaces that match the given regex.
|
|||
|
type: string
|
|||
|
kubernetes:
|
|||
|
description: Kubernetes configures Calico to detect node addresses
|
|||
|
based on the Kubernetes API.
|
|||
|
enum:
|
|||
|
- NodeInternalIP
|
|||
|
type: string
|
|||
|
skipInterface:
|
|||
|
description: SkipInterface enables IP auto-detection based
|
|||
|
on interfaces that do not match the given regex.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
nodeAddressAutodetectionV6:
|
|||
|
description: NodeAddressAutodetectionV6 specifies an approach
|
|||
|
to automatically detect node IPv6 addresses. If not specified,
|
|||
|
IPv6 addresses will not be auto-detected.
|
|||
|
properties:
|
|||
|
canReach:
|
|||
|
description: CanReach enables IP auto-detection based on which
|
|||
|
source address on the node is used to reach the specified
|
|||
|
IP or domain.
|
|||
|
type: string
|
|||
|
cidrs:
|
|||
|
description: CIDRS enables IP auto-detection based on which
|
|||
|
addresses on the nodes are within one of the provided CIDRs.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
firstFound:
|
|||
|
description: FirstFound uses default interface matching parameters
|
|||
|
to select an interface, performing best-effort filtering
|
|||
|
based on well-known interface names.
|
|||
|
type: boolean
|
|||
|
interface:
|
|||
|
description: Interface enables IP auto-detection based on
|
|||
|
interfaces that match the given regex.
|
|||
|
type: string
|
|||
|
kubernetes:
|
|||
|
description: Kubernetes configures Calico to detect node addresses
|
|||
|
based on the Kubernetes API.
|
|||
|
enum:
|
|||
|
- NodeInternalIP
|
|||
|
type: string
|
|||
|
skipInterface:
|
|||
|
description: SkipInterface enables IP auto-detection based
|
|||
|
on interfaces that do not match the given regex.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
certificateManagement:
|
|||
|
description: CertificateManagement configures pods to submit a CertificateSigningRequest
|
|||
|
to the certificates.k8s.io/v1beta1 API in order to obtain TLS certificates.
|
|||
|
This feature requires that you bring your own CSR signing and approval
|
|||
|
process, otherwise pods will be stuck during initialization.
|
|||
|
properties:
|
|||
|
caCert:
|
|||
|
description: Certificate of the authority that signs the CertificateSigningRequests
|
|||
|
in PEM format.
|
|||
|
format: byte
|
|||
|
type: string
|
|||
|
keyAlgorithm:
|
|||
|
description: 'Specify the algorithm used by pods to generate a
|
|||
|
key pair that is associated with the X.509 certificate request.
|
|||
|
Default: RSAWithSize2048'
|
|||
|
enum:
|
|||
|
- ""
|
|||
|
- RSAWithSize2048
|
|||
|
- RSAWithSize4096
|
|||
|
- RSAWithSize8192
|
|||
|
- ECDSAWithCurve256
|
|||
|
- ECDSAWithCurve384
|
|||
|
- ECDSAWithCurve521
|
|||
|
type: string
|
|||
|
signatureAlgorithm:
|
|||
|
description: 'Specify the algorithm used for the signature of
|
|||
|
the X.509 certificate request. Default: SHA256WithRSA'
|
|||
|
enum:
|
|||
|
- ""
|
|||
|
- SHA256WithRSA
|
|||
|
- SHA384WithRSA
|
|||
|
- SHA512WithRSA
|
|||
|
- ECDSAWithSHA256
|
|||
|
- ECDSAWithSHA384
|
|||
|
- ECDSAWithSHA512
|
|||
|
type: string
|
|||
|
signerName:
|
|||
|
description: 'When a CSR is issued to the certificates.k8s.io
|
|||
|
API, the signerName is added to the request in order to accommodate
|
|||
|
for clusters with multiple signers. Must be formatted as: `<my-domain>/<my-signername>`.'
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- caCert
|
|||
|
- signerName
|
|||
|
type: object
|
|||
|
cni:
|
|||
|
description: CNI specifies the CNI that will be used by this installation.
|
|||
|
properties:
|
|||
|
ipam:
|
|||
|
description: IPAM specifies the pod IP address management that
|
|||
|
will be used in the Calico or Calico Enterprise installation.
|
|||
|
properties:
|
|||
|
type:
|
|||
|
description: "Specifies the IPAM plugin that will be used
|
|||
|
in the Calico or Calico Enterprise installation. * For CNI
|
|||
|
Plugin Calico, this field defaults to Calico. * For CNI
|
|||
|
Plugin GKE, this field defaults to HostLocal. * For CNI
|
|||
|
Plugin AzureVNET, this field defaults to AzureVNET. * For
|
|||
|
CNI Plugin AmazonVPC, this field defaults to AmazonVPC.
|
|||
|
\n The IPAM plugin is installed and configured only if the
|
|||
|
CNI plugin is set to Calico, for all other values of the
|
|||
|
CNI plugin the plugin binaries and CNI config is a dependency
|
|||
|
that is expected to be installed separately. \n Default:
|
|||
|
Calico"
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- HostLocal
|
|||
|
- AmazonVPC
|
|||
|
- AzureVNET
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- type
|
|||
|
type: object
|
|||
|
type:
|
|||
|
description: "Specifies the CNI plugin that will be used in the
|
|||
|
Calico or Calico Enterprise installation. * For KubernetesProvider
|
|||
|
GKE, this field defaults to GKE. * For KubernetesProvider AKS,
|
|||
|
this field defaults to AzureVNET. * For KubernetesProvider EKS,
|
|||
|
this field defaults to AmazonVPC. * If aws-node daemonset exists
|
|||
|
in kube-system when the Installation resource is created, this
|
|||
|
field defaults to AmazonVPC. * For all other cases this field
|
|||
|
defaults to Calico. \n For the value Calico, the CNI plugin
|
|||
|
binaries and CNI config will be installed as part of deployment,
|
|||
|
for all other values the CNI plugin binaries and CNI config
|
|||
|
is a dependency that is expected to be installed separately.
|
|||
|
\n Default: Calico"
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- GKE
|
|||
|
- AmazonVPC
|
|||
|
- AzureVNET
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- type
|
|||
|
type: object
|
|||
|
componentResources:
|
|||
|
description: ComponentResources can be used to customize the resource
|
|||
|
requirements for each component. Node, Typha, and KubeControllers
|
|||
|
are supported for installations.
|
|||
|
items:
|
|||
|
description: The ComponentResource struct associates a ResourceRequirements
|
|||
|
with a component by name
|
|||
|
properties:
|
|||
|
componentName:
|
|||
|
description: ComponentName is an enum which identifies the component
|
|||
|
enum:
|
|||
|
- Node
|
|||
|
- Typha
|
|||
|
- KubeControllers
|
|||
|
type: string
|
|||
|
resourceRequirements:
|
|||
|
description: ResourceRequirements allows customization of limits
|
|||
|
and requests for compute resources such as cpu and memory.
|
|||
|
properties:
|
|||
|
limits:
|
|||
|
additionalProperties:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
description: 'Limits describes the maximum amount of compute
|
|||
|
resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
|
|||
|
type: object
|
|||
|
requests:
|
|||
|
additionalProperties:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
description: 'Requests describes the minimum amount of compute
|
|||
|
resources required. If Requests is omitted for a container,
|
|||
|
it defaults to Limits if that is explicitly specified,
|
|||
|
otherwise to an implementation-defined value. More info:
|
|||
|
https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
required:
|
|||
|
- componentName
|
|||
|
- resourceRequirements
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
controlPlaneNodeSelector:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: ControlPlaneNodeSelector is used to select control plane
|
|||
|
nodes on which to run Calico components. This is globally applied
|
|||
|
to all resources created by the operator excluding daemonsets.
|
|||
|
type: object
|
|||
|
controlPlaneReplicas:
|
|||
|
description: ControlPlaneReplicas defines how many replicas of the
|
|||
|
control plane core components will be deployed. This field applies
|
|||
|
to all control plane components that support High Availability.
|
|||
|
Defaults to 2.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
controlPlaneTolerations:
|
|||
|
description: ControlPlaneTolerations specify tolerations which are
|
|||
|
then globally applied to all resources created by the operator.
|
|||
|
items:
|
|||
|
description: The pod this Toleration is attached to tolerates any
|
|||
|
taint that matches the triple <key,value,effect> using the matching
|
|||
|
operator <operator>.
|
|||
|
properties:
|
|||
|
effect:
|
|||
|
description: Effect indicates the taint effect to match. Empty
|
|||
|
means match all taint effects. When specified, allowed values
|
|||
|
are NoSchedule, PreferNoSchedule and NoExecute.
|
|||
|
type: string
|
|||
|
key:
|
|||
|
description: Key is the taint key that the toleration applies
|
|||
|
to. Empty means match all taint keys. If the key is empty,
|
|||
|
operator must be Exists; this combination means to match all
|
|||
|
values and all keys.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Operator represents a key's relationship to the
|
|||
|
value. Valid operators are Exists and Equal. Defaults to Equal.
|
|||
|
Exists is equivalent to wildcard for value, so that a pod
|
|||
|
can tolerate all taints of a particular category.
|
|||
|
type: string
|
|||
|
tolerationSeconds:
|
|||
|
description: TolerationSeconds represents the period of time
|
|||
|
the toleration (which must be of effect NoExecute, otherwise
|
|||
|
this field is ignored) tolerates the taint. By default, it
|
|||
|
is not set, which means tolerate the taint forever (do not
|
|||
|
evict). Zero and negative values will be treated as 0 (evict
|
|||
|
immediately) by the system.
|
|||
|
format: int64
|
|||
|
type: integer
|
|||
|
value:
|
|||
|
description: Value is the taint value the toleration matches
|
|||
|
to. If the operator is Exists, the value should be empty,
|
|||
|
otherwise just a regular string.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
flexVolumePath:
|
|||
|
description: FlexVolumePath optionally specifies a custom path for
|
|||
|
FlexVolume. If not specified, FlexVolume will be enabled by default.
|
|||
|
If set to 'None', FlexVolume will be disabled. The default is based
|
|||
|
on the kubernetesProvider.
|
|||
|
type: string
|
|||
|
imagePath:
|
|||
|
description: "ImagePath allows for the path part of an image to be
|
|||
|
specified. If specified then the specified value will be used as
|
|||
|
the image path for each image. If not specified or empty, the default
|
|||
|
for each image will be used. A special case value, UseDefault, is
|
|||
|
supported to explicitly specify the default image path will be used
|
|||
|
for each image. \n Image format: `<registry><imagePath>/<imagePrefix><imageName>:<image-tag>`
|
|||
|
\n This option allows configuring the `<imagePath>` portion of the
|
|||
|
above format."
|
|||
|
type: string
|
|||
|
imagePrefix:
|
|||
|
description: "ImagePrefix allows for the prefix part of an image to
|
|||
|
be specified. If specified then the given value will be used as
|
|||
|
a prefix on each image. If not specified or empty, no prefix will
|
|||
|
be used. A special case value, UseDefault, is supported to explicitly
|
|||
|
specify the default image prefix will be used for each image. \n
|
|||
|
Image format: `<registry><imagePath>/<imagePrefix><imageName>:<image-tag>`
|
|||
|
\n This option allows configuring the `<imagePrefix>` portion of
|
|||
|
the above format."
|
|||
|
type: string
|
|||
|
imagePullSecrets:
|
|||
|
description: ImagePullSecrets is an array of references to container
|
|||
|
registry pull secrets to use. These are applied to all images to
|
|||
|
be pulled.
|
|||
|
items:
|
|||
|
description: LocalObjectReference contains enough information to
|
|||
|
let you locate the referenced object inside the same namespace.
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
|
|||
|
TODO: Add other useful fields. apiVersion, kind, uid?'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
kubernetesProvider:
|
|||
|
description: KubernetesProvider specifies a particular provider of
|
|||
|
the Kubernetes platform and enables provider-specific configuration.
|
|||
|
If the specified value is empty, the Operator will attempt to automatically
|
|||
|
determine the current provider. If the specified value is not empty,
|
|||
|
the Operator will still attempt auto-detection, but will additionally
|
|||
|
compare the auto-detected value to the specified value to confirm
|
|||
|
they match.
|
|||
|
enum:
|
|||
|
- ""
|
|||
|
- EKS
|
|||
|
- GKE
|
|||
|
- AKS
|
|||
|
- OpenShift
|
|||
|
- DockerEnterprise
|
|||
|
- RKE2
|
|||
|
type: string
|
|||
|
nodeMetricsPort:
|
|||
|
description: NodeMetricsPort specifies which port calico/node serves
|
|||
|
prometheus metrics on. By default, metrics are not enabled. If specified,
|
|||
|
this overrides any FelixConfiguration resources which may exist.
|
|||
|
If omitted, then prometheus metrics may still be configured through
|
|||
|
FelixConfiguration.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
nodeUpdateStrategy:
|
|||
|
description: NodeUpdateStrategy can be used to customize the desired
|
|||
|
update strategy, such as the MaxUnavailable field.
|
|||
|
properties:
|
|||
|
rollingUpdate:
|
|||
|
description: 'Rolling update config params. Present only if type
|
|||
|
= "RollingUpdate". --- TODO: Update this to follow our convention
|
|||
|
for oneOf, whatever we decide it to be. Same as Deployment `strategy.rollingUpdate`.
|
|||
|
See https://github.com/kubernetes/kubernetes/issues/35345'
|
|||
|
properties:
|
|||
|
maxSurge:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: 'The maximum number of nodes with an existing
|
|||
|
available DaemonSet pod that can have an updated DaemonSet
|
|||
|
pod during during an update. Value can be an absolute number
|
|||
|
(ex: 5) or a percentage of desired pods (ex: 10%). This
|
|||
|
can not be 0 if MaxUnavailable is 0. Absolute number is
|
|||
|
calculated from percentage by rounding up to a minimum of
|
|||
|
1. Default value is 0. Example: when this is set to 30%,
|
|||
|
at most 30% of the total number of nodes that should be
|
|||
|
running the daemon pod (i.e. status.desiredNumberScheduled)
|
|||
|
can have their a new pod created before the old pod is marked
|
|||
|
as deleted. The update starts by launching new pods on 30%
|
|||
|
of nodes. Once an updated pod is available (Ready for at
|
|||
|
least minReadySeconds) the old DaemonSet pod on that node
|
|||
|
is marked deleted. If the old pod becomes unavailable for
|
|||
|
any reason (Ready transitions to false, is evicted, or is
|
|||
|
drained) an updated pod is immediatedly created on that
|
|||
|
node without considering surge limits. Allowing surge implies
|
|||
|
the possibility that the resources consumed by the daemonset
|
|||
|
on any given node can double if the readiness check fails,
|
|||
|
and so resource intensive daemonsets should take into account
|
|||
|
that they may cause evictions during disruption. This is
|
|||
|
an alpha field and requires enabling DaemonSetUpdateSurge
|
|||
|
feature gate.'
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
maxUnavailable:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: 'The maximum number of DaemonSet pods that can
|
|||
|
be unavailable during the update. Value can be an absolute
|
|||
|
number (ex: 5) or a percentage of total number of DaemonSet
|
|||
|
pods at the start of the update (ex: 10%). Absolute number
|
|||
|
is calculated from percentage by rounding down to a minimum
|
|||
|
of one. This cannot be 0 if MaxSurge is 0 Default value
|
|||
|
is 1. Example: when this is set to 30%, at most 30% of the
|
|||
|
total number of nodes that should be running the daemon
|
|||
|
pod (i.e. status.desiredNumberScheduled) can have their
|
|||
|
pods stopped for an update at any given time. The update
|
|||
|
starts by stopping at most 30% of those DaemonSet pods and
|
|||
|
then brings up new DaemonSet pods in their place. Once the
|
|||
|
new pods are available, it then proceeds onto other DaemonSet
|
|||
|
pods, thus ensuring that at least 70% of original number
|
|||
|
of DaemonSet pods are available at all times during the
|
|||
|
update.'
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: object
|
|||
|
type:
|
|||
|
description: Type of daemon set update. Can be "RollingUpdate"
|
|||
|
or "OnDelete". Default is RollingUpdate.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
nonPrivileged:
|
|||
|
description: NonPrivileged configures Calico to be run in non-privileged
|
|||
|
containers as non-root users where possible.
|
|||
|
type: string
|
|||
|
registry:
|
|||
|
description: "Registry is the default Docker registry used for component
|
|||
|
Docker images. If specified then the given value must end with a
|
|||
|
slash character (`/`) and all images will be pulled from this registry.
|
|||
|
If not specified then the default registries will be used. A special
|
|||
|
case value, UseDefault, is supported to explicitly specify the default
|
|||
|
registries will be used. \n Image format: `<registry><imagePath>/<imagePrefix><imageName>:<image-tag>`
|
|||
|
\n This option allows configuring the `<registry>` portion of the
|
|||
|
above format."
|
|||
|
type: string
|
|||
|
typhaAffinity:
|
|||
|
description: TyphaAffinity allows configuration of node affinity characteristics
|
|||
|
for Typha pods.
|
|||
|
properties:
|
|||
|
nodeAffinity:
|
|||
|
description: NodeAffinity describes node affinity scheduling rules
|
|||
|
for typha.
|
|||
|
properties:
|
|||
|
preferredDuringSchedulingIgnoredDuringExecution:
|
|||
|
description: The scheduler will prefer to schedule pods to
|
|||
|
nodes that satisfy the affinity expressions specified by
|
|||
|
this field, but it may choose a node that violates one or
|
|||
|
more of the expressions.
|
|||
|
items:
|
|||
|
description: An empty preferred scheduling term matches
|
|||
|
all objects with implicit weight 0 (i.e. it's a no-op).
|
|||
|
A null preferred scheduling term matches no objects (i.e.
|
|||
|
is also a no-op).
|
|||
|
properties:
|
|||
|
preference:
|
|||
|
description: A node selector term, associated with the
|
|||
|
corresponding weight.
|
|||
|
properties:
|
|||
|
matchExpressions:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's labels.
|
|||
|
items:
|
|||
|
description: A node selector requirement is a
|
|||
|
selector that contains values, a key, and an
|
|||
|
operator that relates the key and values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators are
|
|||
|
In, NotIn, Exists, DoesNotExist. Gt, and
|
|||
|
Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values. If
|
|||
|
the operator is In or NotIn, the values
|
|||
|
array must be non-empty. If the operator
|
|||
|
is Exists or DoesNotExist, the values array
|
|||
|
must be empty. If the operator is Gt or
|
|||
|
Lt, the values array must have a single
|
|||
|
element, which will be interpreted as an
|
|||
|
integer. This array is replaced during a
|
|||
|
strategic merge patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
matchFields:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's fields.
|
|||
|
items:
|
|||
|
description: A node selector requirement is a
|
|||
|
selector that contains values, a key, and an
|
|||
|
operator that relates the key and values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators are
|
|||
|
In, NotIn, Exists, DoesNotExist. Gt, and
|
|||
|
Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values. If
|
|||
|
the operator is In or NotIn, the values
|
|||
|
array must be non-empty. If the operator
|
|||
|
is Exists or DoesNotExist, the values array
|
|||
|
must be empty. If the operator is Gt or
|
|||
|
Lt, the values array must have a single
|
|||
|
element, which will be interpreted as an
|
|||
|
integer. This array is replaced during a
|
|||
|
strategic merge patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
weight:
|
|||
|
description: Weight associated with matching the corresponding
|
|||
|
nodeSelectorTerm, in the range 1-100.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
required:
|
|||
|
- preference
|
|||
|
- weight
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
requiredDuringSchedulingIgnoredDuringExecution:
|
|||
|
description: 'WARNING: Please note that if the affinity requirements
|
|||
|
specified by this field are not met at scheduling time,
|
|||
|
the pod will NOT be scheduled onto the node. There is no
|
|||
|
fallback to another affinity rules with this setting. This
|
|||
|
may cause networking disruption or even catastrophic failure!
|
|||
|
PreferredDuringSchedulingIgnoredDuringExecution should be
|
|||
|
used for affinity unless there is a specific well understood
|
|||
|
reason to use RequiredDuringSchedulingIgnoredDuringExecution
|
|||
|
and you can guarantee that the RequiredDuringSchedulingIgnoredDuringExecution
|
|||
|
will always have sufficient nodes to satisfy the requirement.
|
|||
|
NOTE: RequiredDuringSchedulingIgnoredDuringExecution is
|
|||
|
set by default for AKS nodes, to avoid scheduling Typhas
|
|||
|
on virtual-nodes. If the affinity requirements specified
|
|||
|
by this field cease to be met at some point during pod execution
|
|||
|
(e.g. due to an update), the system may or may not try to
|
|||
|
eventually evict the pod from its node.'
|
|||
|
properties:
|
|||
|
nodeSelectorTerms:
|
|||
|
description: Required. A list of node selector terms.
|
|||
|
The terms are ORed.
|
|||
|
items:
|
|||
|
description: A null or empty node selector term matches
|
|||
|
no objects. The requirements of them are ANDed. The
|
|||
|
TopologySelectorTerm type implements a subset of the
|
|||
|
NodeSelectorTerm.
|
|||
|
properties:
|
|||
|
matchExpressions:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's labels.
|
|||
|
items:
|
|||
|
description: A node selector requirement is a
|
|||
|
selector that contains values, a key, and an
|
|||
|
operator that relates the key and values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators are
|
|||
|
In, NotIn, Exists, DoesNotExist. Gt, and
|
|||
|
Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values. If
|
|||
|
the operator is In or NotIn, the values
|
|||
|
array must be non-empty. If the operator
|
|||
|
is Exists or DoesNotExist, the values array
|
|||
|
must be empty. If the operator is Gt or
|
|||
|
Lt, the values array must have a single
|
|||
|
element, which will be interpreted as an
|
|||
|
integer. This array is replaced during a
|
|||
|
strategic merge patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
matchFields:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's fields.
|
|||
|
items:
|
|||
|
description: A node selector requirement is a
|
|||
|
selector that contains values, a key, and an
|
|||
|
operator that relates the key and values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators are
|
|||
|
In, NotIn, Exists, DoesNotExist. Gt, and
|
|||
|
Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values. If
|
|||
|
the operator is In or NotIn, the values
|
|||
|
array must be non-empty. If the operator
|
|||
|
is Exists or DoesNotExist, the values array
|
|||
|
must be empty. If the operator is Gt or
|
|||
|
Lt, the values array must have a single
|
|||
|
element, which will be interpreted as an
|
|||
|
integer. This array is replaced during a
|
|||
|
strategic merge patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- nodeSelectorTerms
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
typhaMetricsPort:
|
|||
|
description: TyphaMetricsPort specifies which port calico/typha serves
|
|||
|
prometheus metrics on. By default, metrics are not enabled.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
variant:
|
|||
|
description: 'Variant is the product to install - one of Calico or
|
|||
|
TigeraSecureEnterprise Default: Calico'
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- TigeraSecureEnterprise
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
status:
|
|||
|
description: Most recently observed state for the Calico or Calico Enterprise
|
|||
|
installation.
|
|||
|
properties:
|
|||
|
computed:
|
|||
|
description: Computed is the final installation including overlaid
|
|||
|
resources.
|
|||
|
properties:
|
|||
|
calicoNetwork:
|
|||
|
description: CalicoNetwork specifies networking configuration
|
|||
|
options for Calico.
|
|||
|
properties:
|
|||
|
bgp:
|
|||
|
description: BGP configures whether or not to enable Calico's
|
|||
|
BGP capabilities.
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
containerIPForwarding:
|
|||
|
description: 'ContainerIPForwarding configures whether ip
|
|||
|
forwarding will be enabled for containers in the CNI configuration.
|
|||
|
Default: Disabled'
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
hostPorts:
|
|||
|
description: 'HostPorts configures whether or not Calico will
|
|||
|
support Kubernetes HostPorts. Valid only when using the
|
|||
|
Calico CNI plugin. Default: Enabled'
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
ipPools:
|
|||
|
description: IPPools contains a list of IP pools to create
|
|||
|
if none exist. At most one IP pool of each address family
|
|||
|
may be specified. If omitted, a single pool will be configured
|
|||
|
if needed.
|
|||
|
items:
|
|||
|
properties:
|
|||
|
blockSize:
|
|||
|
description: 'BlockSize specifies the CIDR prefex length
|
|||
|
to use when allocating per-node IP blocks from the
|
|||
|
main IP pool CIDR. Default: 26 (IPv4), 122 (IPv6)'
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
cidr:
|
|||
|
description: CIDR contains the address range for the
|
|||
|
IP Pool in classless inter-domain routing format.
|
|||
|
type: string
|
|||
|
encapsulation:
|
|||
|
description: 'Encapsulation specifies the encapsulation
|
|||
|
type that will be used with the IP Pool. Default:
|
|||
|
IPIP'
|
|||
|
enum:
|
|||
|
- IPIPCrossSubnet
|
|||
|
- IPIP
|
|||
|
- VXLAN
|
|||
|
- VXLANCrossSubnet
|
|||
|
- None
|
|||
|
type: string
|
|||
|
natOutgoing:
|
|||
|
description: 'NATOutgoing specifies if NAT will be enabled
|
|||
|
or disabled for outgoing traffic. Default: Enabled'
|
|||
|
enum:
|
|||
|
- Enabled
|
|||
|
- Disabled
|
|||
|
type: string
|
|||
|
nodeSelector:
|
|||
|
description: 'NodeSelector specifies the node selector
|
|||
|
that will be set for the IP Pool. Default: ''all()'''
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- cidr
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
linuxDataplane:
|
|||
|
description: 'LinuxDataplane is used to select the dataplane
|
|||
|
used for Linux nodes. In particular, it causes the operator
|
|||
|
to add required mounts and environment variables for the
|
|||
|
particular dataplane. If not specified, iptables mode is
|
|||
|
used. Default: Iptables'
|
|||
|
enum:
|
|||
|
- Iptables
|
|||
|
- BPF
|
|||
|
- VPP
|
|||
|
type: string
|
|||
|
mtu:
|
|||
|
description: MTU specifies the maximum transmission unit to
|
|||
|
use on the pod network. If not specified, Calico will perform
|
|||
|
MTU auto-detection based on the cluster network.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
multiInterfaceMode:
|
|||
|
description: 'MultiInterfaceMode configures what will configure
|
|||
|
multiple interface per pod. Only valid for Calico Enterprise
|
|||
|
installations using the Calico CNI plugin. Default: None'
|
|||
|
enum:
|
|||
|
- None
|
|||
|
- Multus
|
|||
|
type: string
|
|||
|
nodeAddressAutodetectionV4:
|
|||
|
description: NodeAddressAutodetectionV4 specifies an approach
|
|||
|
to automatically detect node IPv4 addresses. If not specified,
|
|||
|
will use default auto-detection settings to acquire an IPv4
|
|||
|
address for each node.
|
|||
|
properties:
|
|||
|
canReach:
|
|||
|
description: CanReach enables IP auto-detection based
|
|||
|
on which source address on the node is used to reach
|
|||
|
the specified IP or domain.
|
|||
|
type: string
|
|||
|
cidrs:
|
|||
|
description: CIDRS enables IP auto-detection based on
|
|||
|
which addresses on the nodes are within one of the provided
|
|||
|
CIDRs.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
firstFound:
|
|||
|
description: FirstFound uses default interface matching
|
|||
|
parameters to select an interface, performing best-effort
|
|||
|
filtering based on well-known interface names.
|
|||
|
type: boolean
|
|||
|
interface:
|
|||
|
description: Interface enables IP auto-detection based
|
|||
|
on interfaces that match the given regex.
|
|||
|
type: string
|
|||
|
kubernetes:
|
|||
|
description: Kubernetes configures Calico to detect node
|
|||
|
addresses based on the Kubernetes API.
|
|||
|
enum:
|
|||
|
- NodeInternalIP
|
|||
|
type: string
|
|||
|
skipInterface:
|
|||
|
description: SkipInterface enables IP auto-detection based
|
|||
|
on interfaces that do not match the given regex.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
nodeAddressAutodetectionV6:
|
|||
|
description: NodeAddressAutodetectionV6 specifies an approach
|
|||
|
to automatically detect node IPv6 addresses. If not specified,
|
|||
|
IPv6 addresses will not be auto-detected.
|
|||
|
properties:
|
|||
|
canReach:
|
|||
|
description: CanReach enables IP auto-detection based
|
|||
|
on which source address on the node is used to reach
|
|||
|
the specified IP or domain.
|
|||
|
type: string
|
|||
|
cidrs:
|
|||
|
description: CIDRS enables IP auto-detection based on
|
|||
|
which addresses on the nodes are within one of the provided
|
|||
|
CIDRs.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
firstFound:
|
|||
|
description: FirstFound uses default interface matching
|
|||
|
parameters to select an interface, performing best-effort
|
|||
|
filtering based on well-known interface names.
|
|||
|
type: boolean
|
|||
|
interface:
|
|||
|
description: Interface enables IP auto-detection based
|
|||
|
on interfaces that match the given regex.
|
|||
|
type: string
|
|||
|
kubernetes:
|
|||
|
description: Kubernetes configures Calico to detect node
|
|||
|
addresses based on the Kubernetes API.
|
|||
|
enum:
|
|||
|
- NodeInternalIP
|
|||
|
type: string
|
|||
|
skipInterface:
|
|||
|
description: SkipInterface enables IP auto-detection based
|
|||
|
on interfaces that do not match the given regex.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
certificateManagement:
|
|||
|
description: CertificateManagement configures pods to submit a
|
|||
|
CertificateSigningRequest to the certificates.k8s.io/v1beta1
|
|||
|
API in order to obtain TLS certificates. This feature requires
|
|||
|
that you bring your own CSR signing and approval process, otherwise
|
|||
|
pods will be stuck during initialization.
|
|||
|
properties:
|
|||
|
caCert:
|
|||
|
description: Certificate of the authority that signs the CertificateSigningRequests
|
|||
|
in PEM format.
|
|||
|
format: byte
|
|||
|
type: string
|
|||
|
keyAlgorithm:
|
|||
|
description: 'Specify the algorithm used by pods to generate
|
|||
|
a key pair that is associated with the X.509 certificate
|
|||
|
request. Default: RSAWithSize2048'
|
|||
|
enum:
|
|||
|
- ""
|
|||
|
- RSAWithSize2048
|
|||
|
- RSAWithSize4096
|
|||
|
- RSAWithSize8192
|
|||
|
- ECDSAWithCurve256
|
|||
|
- ECDSAWithCurve384
|
|||
|
- ECDSAWithCurve521
|
|||
|
type: string
|
|||
|
signatureAlgorithm:
|
|||
|
description: 'Specify the algorithm used for the signature
|
|||
|
of the X.509 certificate request. Default: SHA256WithRSA'
|
|||
|
enum:
|
|||
|
- ""
|
|||
|
- SHA256WithRSA
|
|||
|
- SHA384WithRSA
|
|||
|
- SHA512WithRSA
|
|||
|
- ECDSAWithSHA256
|
|||
|
- ECDSAWithSHA384
|
|||
|
- ECDSAWithSHA512
|
|||
|
type: string
|
|||
|
signerName:
|
|||
|
description: 'When a CSR is issued to the certificates.k8s.io
|
|||
|
API, the signerName is added to the request in order to
|
|||
|
accommodate for clusters with multiple signers. Must be
|
|||
|
formatted as: `<my-domain>/<my-signername>`.'
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- caCert
|
|||
|
- signerName
|
|||
|
type: object
|
|||
|
cni:
|
|||
|
description: CNI specifies the CNI that will be used by this installation.
|
|||
|
properties:
|
|||
|
ipam:
|
|||
|
description: IPAM specifies the pod IP address management
|
|||
|
that will be used in the Calico or Calico Enterprise installation.
|
|||
|
properties:
|
|||
|
type:
|
|||
|
description: "Specifies the IPAM plugin that will be used
|
|||
|
in the Calico or Calico Enterprise installation. * For
|
|||
|
CNI Plugin Calico, this field defaults to Calico. *
|
|||
|
For CNI Plugin GKE, this field defaults to HostLocal.
|
|||
|
* For CNI Plugin AzureVNET, this field defaults to AzureVNET.
|
|||
|
* For CNI Plugin AmazonVPC, this field defaults to AmazonVPC.
|
|||
|
\n The IPAM plugin is installed and configured only
|
|||
|
if the CNI plugin is set to Calico, for all other values
|
|||
|
of the CNI plugin the plugin binaries and CNI config
|
|||
|
is a dependency that is expected to be installed separately.
|
|||
|
\n Default: Calico"
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- HostLocal
|
|||
|
- AmazonVPC
|
|||
|
- AzureVNET
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- type
|
|||
|
type: object
|
|||
|
type:
|
|||
|
description: "Specifies the CNI plugin that will be used in
|
|||
|
the Calico or Calico Enterprise installation. * For KubernetesProvider
|
|||
|
GKE, this field defaults to GKE. * For KubernetesProvider
|
|||
|
AKS, this field defaults to AzureVNET. * For KubernetesProvider
|
|||
|
EKS, this field defaults to AmazonVPC. * If aws-node daemonset
|
|||
|
exists in kube-system when the Installation resource is
|
|||
|
created, this field defaults to AmazonVPC. * For all other
|
|||
|
cases this field defaults to Calico. \n For the value Calico,
|
|||
|
the CNI plugin binaries and CNI config will be installed
|
|||
|
as part of deployment, for all other values the CNI plugin
|
|||
|
binaries and CNI config is a dependency that is expected
|
|||
|
to be installed separately. \n Default: Calico"
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- GKE
|
|||
|
- AmazonVPC
|
|||
|
- AzureVNET
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- type
|
|||
|
type: object
|
|||
|
componentResources:
|
|||
|
description: ComponentResources can be used to customize the resource
|
|||
|
requirements for each component. Node, Typha, and KubeControllers
|
|||
|
are supported for installations.
|
|||
|
items:
|
|||
|
description: The ComponentResource struct associates a ResourceRequirements
|
|||
|
with a component by name
|
|||
|
properties:
|
|||
|
componentName:
|
|||
|
description: ComponentName is an enum which identifies the
|
|||
|
component
|
|||
|
enum:
|
|||
|
- Node
|
|||
|
- Typha
|
|||
|
- KubeControllers
|
|||
|
type: string
|
|||
|
resourceRequirements:
|
|||
|
description: ResourceRequirements allows customization of
|
|||
|
limits and requests for compute resources such as cpu
|
|||
|
and memory.
|
|||
|
properties:
|
|||
|
limits:
|
|||
|
additionalProperties:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
description: 'Limits describes the maximum amount of
|
|||
|
compute resources allowed. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
|
|||
|
type: object
|
|||
|
requests:
|
|||
|
additionalProperties:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
pattern: ^(\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))(([KMGTPE]i)|[numkMGTPE]|([eE](\+|-)?(([0-9]+(\.[0-9]*)?)|(\.[0-9]+))))?$
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
description: 'Requests describes the minimum amount
|
|||
|
of compute resources required. If Requests is omitted
|
|||
|
for a container, it defaults to Limits if that is
|
|||
|
explicitly specified, otherwise to an implementation-defined
|
|||
|
value. More info: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/'
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
required:
|
|||
|
- componentName
|
|||
|
- resourceRequirements
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
controlPlaneNodeSelector:
|
|||
|
additionalProperties:
|
|||
|
type: string
|
|||
|
description: ControlPlaneNodeSelector is used to select control
|
|||
|
plane nodes on which to run Calico components. This is globally
|
|||
|
applied to all resources created by the operator excluding daemonsets.
|
|||
|
type: object
|
|||
|
controlPlaneReplicas:
|
|||
|
description: ControlPlaneReplicas defines how many replicas of
|
|||
|
the control plane core components will be deployed. This field
|
|||
|
applies to all control plane components that support High Availability.
|
|||
|
Defaults to 2.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
controlPlaneTolerations:
|
|||
|
description: ControlPlaneTolerations specify tolerations which
|
|||
|
are then globally applied to all resources created by the operator.
|
|||
|
items:
|
|||
|
description: The pod this Toleration is attached to tolerates
|
|||
|
any taint that matches the triple <key,value,effect> using
|
|||
|
the matching operator <operator>.
|
|||
|
properties:
|
|||
|
effect:
|
|||
|
description: Effect indicates the taint effect to match.
|
|||
|
Empty means match all taint effects. When specified, allowed
|
|||
|
values are NoSchedule, PreferNoSchedule and NoExecute.
|
|||
|
type: string
|
|||
|
key:
|
|||
|
description: Key is the taint key that the toleration applies
|
|||
|
to. Empty means match all taint keys. If the key is empty,
|
|||
|
operator must be Exists; this combination means to match
|
|||
|
all values and all keys.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Operator represents a key's relationship to
|
|||
|
the value. Valid operators are Exists and Equal. Defaults
|
|||
|
to Equal. Exists is equivalent to wildcard for value,
|
|||
|
so that a pod can tolerate all taints of a particular
|
|||
|
category.
|
|||
|
type: string
|
|||
|
tolerationSeconds:
|
|||
|
description: TolerationSeconds represents the period of
|
|||
|
time the toleration (which must be of effect NoExecute,
|
|||
|
otherwise this field is ignored) tolerates the taint.
|
|||
|
By default, it is not set, which means tolerate the taint
|
|||
|
forever (do not evict). Zero and negative values will
|
|||
|
be treated as 0 (evict immediately) by the system.
|
|||
|
format: int64
|
|||
|
type: integer
|
|||
|
value:
|
|||
|
description: Value is the taint value the toleration matches
|
|||
|
to. If the operator is Exists, the value should be empty,
|
|||
|
otherwise just a regular string.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
flexVolumePath:
|
|||
|
description: FlexVolumePath optionally specifies a custom path
|
|||
|
for FlexVolume. If not specified, FlexVolume will be enabled
|
|||
|
by default. If set to 'None', FlexVolume will be disabled. The
|
|||
|
default is based on the kubernetesProvider.
|
|||
|
type: string
|
|||
|
imagePath:
|
|||
|
description: "ImagePath allows for the path part of an image to
|
|||
|
be specified. If specified then the specified value will be
|
|||
|
used as the image path for each image. If not specified or empty,
|
|||
|
the default for each image will be used. A special case value,
|
|||
|
UseDefault, is supported to explicitly specify the default image
|
|||
|
path will be used for each image. \n Image format: `<registry><imagePath>/<imagePrefix><imageName>:<image-tag>`
|
|||
|
\n This option allows configuring the `<imagePath>` portion
|
|||
|
of the above format."
|
|||
|
type: string
|
|||
|
imagePrefix:
|
|||
|
description: "ImagePrefix allows for the prefix part of an image
|
|||
|
to be specified. If specified then the given value will be used
|
|||
|
as a prefix on each image. If not specified or empty, no prefix
|
|||
|
will be used. A special case value, UseDefault, is supported
|
|||
|
to explicitly specify the default image prefix will be used
|
|||
|
for each image. \n Image format: `<registry><imagePath>/<imagePrefix><imageName>:<image-tag>`
|
|||
|
\n This option allows configuring the `<imagePrefix>` portion
|
|||
|
of the above format."
|
|||
|
type: string
|
|||
|
imagePullSecrets:
|
|||
|
description: ImagePullSecrets is an array of references to container
|
|||
|
registry pull secrets to use. These are applied to all images
|
|||
|
to be pulled.
|
|||
|
items:
|
|||
|
description: LocalObjectReference contains enough information
|
|||
|
to let you locate the referenced object inside the same namespace.
|
|||
|
properties:
|
|||
|
name:
|
|||
|
description: 'Name of the referent. More info: https://kubernetes.io/docs/concepts/overview/working-with-objects/names/#names
|
|||
|
TODO: Add other useful fields. apiVersion, kind, uid?'
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
kubernetesProvider:
|
|||
|
description: KubernetesProvider specifies a particular provider
|
|||
|
of the Kubernetes platform and enables provider-specific configuration.
|
|||
|
If the specified value is empty, the Operator will attempt to
|
|||
|
automatically determine the current provider. If the specified
|
|||
|
value is not empty, the Operator will still attempt auto-detection,
|
|||
|
but will additionally compare the auto-detected value to the
|
|||
|
specified value to confirm they match.
|
|||
|
enum:
|
|||
|
- ""
|
|||
|
- EKS
|
|||
|
- GKE
|
|||
|
- AKS
|
|||
|
- OpenShift
|
|||
|
- DockerEnterprise
|
|||
|
- RKE2
|
|||
|
type: string
|
|||
|
nodeMetricsPort:
|
|||
|
description: NodeMetricsPort specifies which port calico/node
|
|||
|
serves prometheus metrics on. By default, metrics are not enabled.
|
|||
|
If specified, this overrides any FelixConfiguration resources
|
|||
|
which may exist. If omitted, then prometheus metrics may still
|
|||
|
be configured through FelixConfiguration.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
nodeUpdateStrategy:
|
|||
|
description: NodeUpdateStrategy can be used to customize the desired
|
|||
|
update strategy, such as the MaxUnavailable field.
|
|||
|
properties:
|
|||
|
rollingUpdate:
|
|||
|
description: 'Rolling update config params. Present only if
|
|||
|
type = "RollingUpdate". --- TODO: Update this to follow
|
|||
|
our convention for oneOf, whatever we decide it to be. Same
|
|||
|
as Deployment `strategy.rollingUpdate`. See https://github.com/kubernetes/kubernetes/issues/35345'
|
|||
|
properties:
|
|||
|
maxSurge:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: 'The maximum number of nodes with an existing
|
|||
|
available DaemonSet pod that can have an updated DaemonSet
|
|||
|
pod during during an update. Value can be an absolute
|
|||
|
number (ex: 5) or a percentage of desired pods (ex:
|
|||
|
10%). This can not be 0 if MaxUnavailable is 0. Absolute
|
|||
|
number is calculated from percentage by rounding up
|
|||
|
to a minimum of 1. Default value is 0. Example: when
|
|||
|
this is set to 30%, at most 30% of the total number
|
|||
|
of nodes that should be running the daemon pod (i.e.
|
|||
|
status.desiredNumberScheduled) can have their a new
|
|||
|
pod created before the old pod is marked as deleted.
|
|||
|
The update starts by launching new pods on 30% of nodes.
|
|||
|
Once an updated pod is available (Ready for at least
|
|||
|
minReadySeconds) the old DaemonSet pod on that node
|
|||
|
is marked deleted. If the old pod becomes unavailable
|
|||
|
for any reason (Ready transitions to false, is evicted,
|
|||
|
or is drained) an updated pod is immediatedly created
|
|||
|
on that node without considering surge limits. Allowing
|
|||
|
surge implies the possibility that the resources consumed
|
|||
|
by the daemonset on any given node can double if the
|
|||
|
readiness check fails, and so resource intensive daemonsets
|
|||
|
should take into account that they may cause evictions
|
|||
|
during disruption. This is an alpha field and requires
|
|||
|
enabling DaemonSetUpdateSurge feature gate.'
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
maxUnavailable:
|
|||
|
anyOf:
|
|||
|
- type: integer
|
|||
|
- type: string
|
|||
|
description: 'The maximum number of DaemonSet pods that
|
|||
|
can be unavailable during the update. Value can be an
|
|||
|
absolute number (ex: 5) or a percentage of total number
|
|||
|
of DaemonSet pods at the start of the update (ex: 10%).
|
|||
|
Absolute number is calculated from percentage by rounding
|
|||
|
down to a minimum of one. This cannot be 0 if MaxSurge
|
|||
|
is 0 Default value is 1. Example: when this is set to
|
|||
|
30%, at most 30% of the total number of nodes that should
|
|||
|
be running the daemon pod (i.e. status.desiredNumberScheduled)
|
|||
|
can have their pods stopped for an update at any given
|
|||
|
time. The update starts by stopping at most 30% of those
|
|||
|
DaemonSet pods and then brings up new DaemonSet pods
|
|||
|
in their place. Once the new pods are available, it
|
|||
|
then proceeds onto other DaemonSet pods, thus ensuring
|
|||
|
that at least 70% of original number of DaemonSet pods
|
|||
|
are available at all times during the update.'
|
|||
|
x-kubernetes-int-or-string: true
|
|||
|
type: object
|
|||
|
type:
|
|||
|
description: Type of daemon set update. Can be "RollingUpdate"
|
|||
|
or "OnDelete". Default is RollingUpdate.
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
nonPrivileged:
|
|||
|
description: NonPrivileged configures Calico to be run in non-privileged
|
|||
|
containers as non-root users where possible.
|
|||
|
type: string
|
|||
|
registry:
|
|||
|
description: "Registry is the default Docker registry used for
|
|||
|
component Docker images. If specified then the given value must
|
|||
|
end with a slash character (`/`) and all images will be pulled
|
|||
|
from this registry. If not specified then the default registries
|
|||
|
will be used. A special case value, UseDefault, is supported
|
|||
|
to explicitly specify the default registries will be used. \n
|
|||
|
Image format: `<registry><imagePath>/<imagePrefix><imageName>:<image-tag>`
|
|||
|
\n This option allows configuring the `<registry>` portion of
|
|||
|
the above format."
|
|||
|
type: string
|
|||
|
typhaAffinity:
|
|||
|
description: TyphaAffinity allows configuration of node affinity
|
|||
|
characteristics for Typha pods.
|
|||
|
properties:
|
|||
|
nodeAffinity:
|
|||
|
description: NodeAffinity describes node affinity scheduling
|
|||
|
rules for typha.
|
|||
|
properties:
|
|||
|
preferredDuringSchedulingIgnoredDuringExecution:
|
|||
|
description: The scheduler will prefer to schedule pods
|
|||
|
to nodes that satisfy the affinity expressions specified
|
|||
|
by this field, but it may choose a node that violates
|
|||
|
one or more of the expressions.
|
|||
|
items:
|
|||
|
description: An empty preferred scheduling term matches
|
|||
|
all objects with implicit weight 0 (i.e. it's a no-op).
|
|||
|
A null preferred scheduling term matches no objects
|
|||
|
(i.e. is also a no-op).
|
|||
|
properties:
|
|||
|
preference:
|
|||
|
description: A node selector term, associated with
|
|||
|
the corresponding weight.
|
|||
|
properties:
|
|||
|
matchExpressions:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's labels.
|
|||
|
items:
|
|||
|
description: A node selector requirement is
|
|||
|
a selector that contains values, a key,
|
|||
|
and an operator that relates the key and
|
|||
|
values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators
|
|||
|
are In, NotIn, Exists, DoesNotExist.
|
|||
|
Gt, and Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values.
|
|||
|
If the operator is In or NotIn, the
|
|||
|
values array must be non-empty. If the
|
|||
|
operator is Exists or DoesNotExist,
|
|||
|
the values array must be empty. If the
|
|||
|
operator is Gt or Lt, the values array
|
|||
|
must have a single element, which will
|
|||
|
be interpreted as an integer. This array
|
|||
|
is replaced during a strategic merge
|
|||
|
patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
matchFields:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's fields.
|
|||
|
items:
|
|||
|
description: A node selector requirement is
|
|||
|
a selector that contains values, a key,
|
|||
|
and an operator that relates the key and
|
|||
|
values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators
|
|||
|
are In, NotIn, Exists, DoesNotExist.
|
|||
|
Gt, and Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values.
|
|||
|
If the operator is In or NotIn, the
|
|||
|
values array must be non-empty. If the
|
|||
|
operator is Exists or DoesNotExist,
|
|||
|
the values array must be empty. If the
|
|||
|
operator is Gt or Lt, the values array
|
|||
|
must have a single element, which will
|
|||
|
be interpreted as an integer. This array
|
|||
|
is replaced during a strategic merge
|
|||
|
patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
weight:
|
|||
|
description: Weight associated with matching the
|
|||
|
corresponding nodeSelectorTerm, in the range 1-100.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
required:
|
|||
|
- preference
|
|||
|
- weight
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
requiredDuringSchedulingIgnoredDuringExecution:
|
|||
|
description: 'WARNING: Please note that if the affinity
|
|||
|
requirements specified by this field are not met at
|
|||
|
scheduling time, the pod will NOT be scheduled onto
|
|||
|
the node. There is no fallback to another affinity rules
|
|||
|
with this setting. This may cause networking disruption
|
|||
|
or even catastrophic failure! PreferredDuringSchedulingIgnoredDuringExecution
|
|||
|
should be used for affinity unless there is a specific
|
|||
|
well understood reason to use RequiredDuringSchedulingIgnoredDuringExecution
|
|||
|
and you can guarantee that the RequiredDuringSchedulingIgnoredDuringExecution
|
|||
|
will always have sufficient nodes to satisfy the requirement.
|
|||
|
NOTE: RequiredDuringSchedulingIgnoredDuringExecution
|
|||
|
is set by default for AKS nodes, to avoid scheduling
|
|||
|
Typhas on virtual-nodes. If the affinity requirements
|
|||
|
specified by this field cease to be met at some point
|
|||
|
during pod execution (e.g. due to an update), the system
|
|||
|
may or may not try to eventually evict the pod from
|
|||
|
its node.'
|
|||
|
properties:
|
|||
|
nodeSelectorTerms:
|
|||
|
description: Required. A list of node selector terms.
|
|||
|
The terms are ORed.
|
|||
|
items:
|
|||
|
description: A null or empty node selector term
|
|||
|
matches no objects. The requirements of them are
|
|||
|
ANDed. The TopologySelectorTerm type implements
|
|||
|
a subset of the NodeSelectorTerm.
|
|||
|
properties:
|
|||
|
matchExpressions:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's labels.
|
|||
|
items:
|
|||
|
description: A node selector requirement is
|
|||
|
a selector that contains values, a key,
|
|||
|
and an operator that relates the key and
|
|||
|
values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators
|
|||
|
are In, NotIn, Exists, DoesNotExist.
|
|||
|
Gt, and Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values.
|
|||
|
If the operator is In or NotIn, the
|
|||
|
values array must be non-empty. If the
|
|||
|
operator is Exists or DoesNotExist,
|
|||
|
the values array must be empty. If the
|
|||
|
operator is Gt or Lt, the values array
|
|||
|
must have a single element, which will
|
|||
|
be interpreted as an integer. This array
|
|||
|
is replaced during a strategic merge
|
|||
|
patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
matchFields:
|
|||
|
description: A list of node selector requirements
|
|||
|
by node's fields.
|
|||
|
items:
|
|||
|
description: A node selector requirement is
|
|||
|
a selector that contains values, a key,
|
|||
|
and an operator that relates the key and
|
|||
|
values.
|
|||
|
properties:
|
|||
|
key:
|
|||
|
description: The label key that the selector
|
|||
|
applies to.
|
|||
|
type: string
|
|||
|
operator:
|
|||
|
description: Represents a key's relationship
|
|||
|
to a set of values. Valid operators
|
|||
|
are In, NotIn, Exists, DoesNotExist.
|
|||
|
Gt, and Lt.
|
|||
|
type: string
|
|||
|
values:
|
|||
|
description: An array of string values.
|
|||
|
If the operator is In or NotIn, the
|
|||
|
values array must be non-empty. If the
|
|||
|
operator is Exists or DoesNotExist,
|
|||
|
the values array must be empty. If the
|
|||
|
operator is Gt or Lt, the values array
|
|||
|
must have a single element, which will
|
|||
|
be interpreted as an integer. This array
|
|||
|
is replaced during a strategic merge
|
|||
|
patch.
|
|||
|
items:
|
|||
|
type: string
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- key
|
|||
|
- operator
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- nodeSelectorTerms
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
typhaMetricsPort:
|
|||
|
description: TyphaMetricsPort specifies which port calico/typha
|
|||
|
serves prometheus metrics on. By default, metrics are not enabled.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
variant:
|
|||
|
description: 'Variant is the product to install - one of Calico
|
|||
|
or TigeraSecureEnterprise Default: Calico'
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- TigeraSecureEnterprise
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
imageSet:
|
|||
|
description: ImageSet is the name of the ImageSet being used, if there
|
|||
|
is an ImageSet that is being used. If an ImageSet is not being used
|
|||
|
then this will not be set.
|
|||
|
type: string
|
|||
|
mtu:
|
|||
|
description: MTU is the most recently observed value for pod network
|
|||
|
MTU. This may be an explicitly configured value, or based on Calico's
|
|||
|
native auto-detetion.
|
|||
|
format: int32
|
|||
|
type: integer
|
|||
|
variant:
|
|||
|
description: Variant is the most recently observed installed variant
|
|||
|
- one of Calico or TigeraSecureEnterprise
|
|||
|
enum:
|
|||
|
- Calico
|
|||
|
- TigeraSecureEnterprise
|
|||
|
type: string
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
subresources:
|
|||
|
status: {}
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: crds/operator.tigera.io_tigerastatuses_crd.yaml
|
|||
|
apiVersion: apiextensions.k8s.io/v1
|
|||
|
kind: CustomResourceDefinition
|
|||
|
metadata:
|
|||
|
annotations:
|
|||
|
controller-gen.kubebuilder.io/version: v0.3.0
|
|||
|
name: tigerastatuses.operator.tigera.io
|
|||
|
spec:
|
|||
|
group: operator.tigera.io
|
|||
|
names:
|
|||
|
kind: TigeraStatus
|
|||
|
listKind: TigeraStatusList
|
|||
|
plural: tigerastatuses
|
|||
|
singular: tigerastatus
|
|||
|
scope: Cluster
|
|||
|
versions:
|
|||
|
- additionalPrinterColumns:
|
|||
|
- description: Whether the component running and stable.
|
|||
|
jsonPath: .status.conditions[?(@.type=='Available')].status
|
|||
|
name: Available
|
|||
|
type: string
|
|||
|
- description: Whether the component is processing changes.
|
|||
|
jsonPath: .status.conditions[?(@.type=='Progressing')].status
|
|||
|
name: Progressing
|
|||
|
type: string
|
|||
|
- description: Whether the component is degraded.
|
|||
|
jsonPath: .status.conditions[?(@.type=='Degraded')].status
|
|||
|
name: Degraded
|
|||
|
type: string
|
|||
|
- description: The time the component's Available status last changed.
|
|||
|
jsonPath: .status.conditions[?(@.type=='Available')].lastTransitionTime
|
|||
|
name: Since
|
|||
|
type: date
|
|||
|
name: v1
|
|||
|
schema:
|
|||
|
openAPIV3Schema:
|
|||
|
description: TigeraStatus represents the most recently observed status for
|
|||
|
Calico or a Calico Enterprise functional area.
|
|||
|
properties:
|
|||
|
apiVersion:
|
|||
|
description: 'APIVersion defines the versioned schema of this representation
|
|||
|
of an object. Servers should convert recognized schemas to the latest
|
|||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
|||
|
type: string
|
|||
|
kind:
|
|||
|
description: 'Kind is a string value representing the REST resource this
|
|||
|
object represents. Servers may infer this from the endpoint the client
|
|||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
|||
|
type: string
|
|||
|
metadata:
|
|||
|
type: object
|
|||
|
spec:
|
|||
|
description: TigeraStatusSpec defines the desired state of TigeraStatus
|
|||
|
type: object
|
|||
|
status:
|
|||
|
description: TigeraStatusStatus defines the observed state of TigeraStatus
|
|||
|
properties:
|
|||
|
conditions:
|
|||
|
description: Conditions represents the latest observed set of conditions
|
|||
|
for this component. A component may be one or more of Available,
|
|||
|
Progressing, or Degraded.
|
|||
|
items:
|
|||
|
description: TigeraStatusCondition represents a condition attached
|
|||
|
to a particular component.
|
|||
|
properties:
|
|||
|
lastTransitionTime:
|
|||
|
description: The timestamp representing the start time for the
|
|||
|
current status.
|
|||
|
format: date-time
|
|||
|
type: string
|
|||
|
message:
|
|||
|
description: Optionally, a detailed message providing additional
|
|||
|
context.
|
|||
|
type: string
|
|||
|
reason:
|
|||
|
description: A brief reason explaining the condition.
|
|||
|
type: string
|
|||
|
status:
|
|||
|
description: The status of the condition. May be True, False,
|
|||
|
or Unknown.
|
|||
|
type: string
|
|||
|
type:
|
|||
|
description: The type of condition. May be Available, Progressing,
|
|||
|
or Degraded.
|
|||
|
type: string
|
|||
|
required:
|
|||
|
- lastTransitionTime
|
|||
|
- status
|
|||
|
- type
|
|||
|
type: object
|
|||
|
type: array
|
|||
|
required:
|
|||
|
- conditions
|
|||
|
type: object
|
|||
|
type: object
|
|||
|
served: true
|
|||
|
storage: true
|
|||
|
subresources:
|
|||
|
status: {}
|
|||
|
status:
|
|||
|
acceptedNames:
|
|||
|
kind: ""
|
|||
|
plural: ""
|
|||
|
conditions: []
|
|||
|
storedVersions: []
|
|||
|
|
|||
|
---
|
|||
|
# Source: tigera-operator/templates/tigera-operator/02-podsecuritypolicy-tigera-operator.yaml
|
|||
|
# This should not be rendered for an OpenShift install.
|
|||
|
# OpenShift uses SecurityContextConstraints instead.
|
|||
|
apiVersion: policy/v1beta1
|
|||
|
kind: PodSecurityPolicy
|
|||
|
metadata:
|
|||
|
name: tigera-operator
|
|||
|
annotations:
|
|||
|
seccomp.security.alpha.kubernetes.io/allowedProfileNames: '*'
|
|||
|
spec:
|
|||
|
privileged: false
|
|||
|
allowPrivilegeEscalation: false
|
|||
|
requiredDropCapabilities:
|
|||
|
- ALL
|
|||
|
volumes:
|
|||
|
- 'hostPath'
|
|||
|
- 'configMap'
|
|||
|
- 'emptyDir'
|
|||
|
- 'projected'
|
|||
|
- 'secret'
|
|||
|
- 'downwardAPI'
|
|||
|
# Assume that persistentVolumes set up by the cluster admin are safe to use.
|
|||
|
- 'persistentVolumeClaim'
|
|||
|
hostNetwork: true
|
|||
|
hostPorts:
|
|||
|
- min: 0
|
|||
|
max: 65535
|
|||
|
hostIPC: false
|
|||
|
hostPID: false
|
|||
|
runAsUser:
|
|||
|
rule: 'MustRunAsNonRoot'
|
|||
|
seLinux:
|
|||
|
rule: 'RunAsAny'
|
|||
|
supplementalGroups:
|
|||
|
rule: 'MustRunAs'
|
|||
|
ranges:
|
|||
|
# Forbid adding the root group.
|
|||
|
- min: 1
|
|||
|
max: 65535
|
|||
|
fsGroup:
|
|||
|
rule: 'MustRunAs'
|
|||
|
ranges:
|
|||
|
# Forbid adding the root group.
|
|||
|
- min: 1
|
|||
|
max: 65535
|
|||
|
readOnlyRootFilesystem: false
|
|||
|
---
|
|||
|
# Source: tigera-operator/templates/tigera-operator/02-serviceaccount-tigera-operator.yaml
|
|||
|
apiVersion: v1
|
|||
|
kind: ServiceAccount
|
|||
|
metadata:
|
|||
|
name: tigera-operator
|
|||
|
namespace: tigera-operator
|
|||
|
---
|
|||
|
# Source: tigera-operator/templates/tigera-operator/02-role-tigera-operator.yaml
|
|||
|
# Permissions required when running the operator for a Calico cluster.
|
|||
|
apiVersion: rbac.authorization.k8s.io/v1
|
|||
|
kind: ClusterRole
|
|||
|
metadata:
|
|||
|
name: tigera-operator
|
|||
|
rules:
|
|||
|
- apiGroups:
|
|||
|
- ""
|
|||
|
resources:
|
|||
|
- namespaces
|
|||
|
- pods
|
|||
|
- podtemplates
|
|||
|
- services
|
|||
|
- endpoints
|
|||
|
- events
|
|||
|
- configmaps
|
|||
|
- secrets
|
|||
|
- serviceaccounts
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- ""
|
|||
|
resources:
|
|||
|
- resourcequotas
|
|||
|
verbs:
|
|||
|
- list
|
|||
|
- get
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- ""
|
|||
|
resources:
|
|||
|
- resourcequotas
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
resourceNames:
|
|||
|
- calico-critical-pods
|
|||
|
- tigera-critical-pods
|
|||
|
- apiGroups:
|
|||
|
- ""
|
|||
|
resources:
|
|||
|
- nodes
|
|||
|
verbs:
|
|||
|
# Need to update node labels when migrating nodes.
|
|||
|
- get
|
|||
|
- patch
|
|||
|
- list
|
|||
|
# We need this for Typha autoscaling
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- rbac.authorization.k8s.io
|
|||
|
resources:
|
|||
|
- clusterroles
|
|||
|
- clusterrolebindings
|
|||
|
- rolebindings
|
|||
|
- roles
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
- bind
|
|||
|
- escalate
|
|||
|
- apiGroups:
|
|||
|
- apps
|
|||
|
resources:
|
|||
|
- deployments
|
|||
|
- daemonsets
|
|||
|
- statefulsets
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- patch
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- apps
|
|||
|
resourceNames:
|
|||
|
- tigera-operator
|
|||
|
resources:
|
|||
|
- deployments/finalizers
|
|||
|
verbs:
|
|||
|
- update
|
|||
|
- apiGroups:
|
|||
|
- operator.tigera.io
|
|||
|
resources:
|
|||
|
- '*'
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- patch
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- networking.k8s.io
|
|||
|
resources:
|
|||
|
- networkpolicies
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- get
|
|||
|
- list
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- crd.projectcalico.org
|
|||
|
resources:
|
|||
|
- felixconfigurations
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- patch
|
|||
|
- list
|
|||
|
- get
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- crd.projectcalico.org
|
|||
|
resources:
|
|||
|
- ippools
|
|||
|
- kubecontrollersconfigurations
|
|||
|
- bgpconfigurations
|
|||
|
verbs:
|
|||
|
- get
|
|||
|
- list
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- scheduling.k8s.io
|
|||
|
resources:
|
|||
|
- priorityclasses
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- policy
|
|||
|
resources:
|
|||
|
- poddisruptionbudgets
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
- apiGroups:
|
|||
|
- apiregistration.k8s.io
|
|||
|
resources:
|
|||
|
- apiservices
|
|||
|
verbs:
|
|||
|
- list
|
|||
|
- watch
|
|||
|
- create
|
|||
|
- update
|
|||
|
# Needed for operator lock
|
|||
|
- apiGroups:
|
|||
|
- coordination.k8s.io
|
|||
|
resources:
|
|||
|
- leases
|
|||
|
verbs:
|
|||
|
- create
|
|||
|
- get
|
|||
|
- list
|
|||
|
- update
|
|||
|
- delete
|
|||
|
- watch
|
|||
|
# Add the appropriate pod security policy permissions
|
|||
|
- apiGroups:
|
|||
|
- policy
|
|||
|
resources:
|
|||
|
- podsecuritypolicies
|
|||
|
resourceNames:
|
|||
|
- tigera-operator
|
|||
|
verbs:
|
|||
|
- use
|
|||
|
- apiGroups:
|
|||
|
- policy
|
|||
|
resources:
|
|||
|
- podsecuritypolicies
|
|||
|
verbs:
|
|||
|
- get
|
|||
|
- list
|
|||
|
- watch
|
|||
|
- create
|
|||
|
- update
|
|||
|
- delete
|
|||
|
# Add the permissions to monitor the status of certificatesigningrequests when certificate management is enabled.
|
|||
|
- apiGroups:
|
|||
|
- certificates.k8s.io
|
|||
|
resources:
|
|||
|
- certificatesigningrequests
|
|||
|
verbs:
|
|||
|
- list
|
|||
|
---
|
|||
|
# Source: tigera-operator/templates/tigera-operator/02-rolebinding-tigera-operator.yaml
|
|||
|
kind: ClusterRoleBinding
|
|||
|
apiVersion: rbac.authorization.k8s.io/v1
|
|||
|
metadata:
|
|||
|
name: tigera-operator
|
|||
|
subjects:
|
|||
|
- kind: ServiceAccount
|
|||
|
name: tigera-operator
|
|||
|
namespace: tigera-operator
|
|||
|
roleRef:
|
|||
|
kind: ClusterRole
|
|||
|
name: tigera-operator
|
|||
|
apiGroup: rbac.authorization.k8s.io
|
|||
|
---
|
|||
|
# Source: tigera-operator/templates/tigera-operator/02-tigera-operator.yaml
|
|||
|
apiVersion: apps/v1
|
|||
|
kind: Deployment
|
|||
|
metadata:
|
|||
|
name: tigera-operator
|
|||
|
namespace: tigera-operator
|
|||
|
labels:
|
|||
|
k8s-app: tigera-operator
|
|||
|
spec:
|
|||
|
replicas: 1
|
|||
|
selector:
|
|||
|
matchLabels:
|
|||
|
name: tigera-operator
|
|||
|
template:
|
|||
|
metadata:
|
|||
|
labels:
|
|||
|
name: tigera-operator
|
|||
|
k8s-app: tigera-operator
|
|||
|
spec:
|
|||
|
nodeSelector:
|
|||
|
kubernetes.io/os: linux
|
|||
|
tolerations:
|
|||
|
- effect: NoExecute
|
|||
|
operator: Exists
|
|||
|
- effect: NoSchedule
|
|||
|
operator: Exists
|
|||
|
serviceAccountName: tigera-operator
|
|||
|
hostNetwork: true
|
|||
|
# This must be set when hostNetwork is true or else the cluster services won't resolve
|
|||
|
dnsPolicy: ClusterFirstWithHostNet
|
|||
|
containers:
|
|||
|
- name: tigera-operator
|
|||
|
image: quay.io/tigera/operator:v1.27.12
|
|||
|
imagePullPolicy: IfNotPresent
|
|||
|
command:
|
|||
|
- operator
|
|||
|
volumeMounts:
|
|||
|
- name: var-lib-calico
|
|||
|
readOnly: true
|
|||
|
mountPath: /var/lib/calico
|
|||
|
env:
|
|||
|
- name: WATCH_NAMESPACE
|
|||
|
value: ""
|
|||
|
- name: POD_NAME
|
|||
|
valueFrom:
|
|||
|
fieldRef:
|
|||
|
fieldPath: metadata.name
|
|||
|
- name: OPERATOR_NAME
|
|||
|
value: "tigera-operator"
|
|||
|
- name: TIGERA_OPERATOR_INIT_IMAGE_VERSION
|
|||
|
value: v1.27.12
|
|||
|
envFrom:
|
|||
|
- configMapRef:
|
|||
|
name: kubernetes-services-endpoint
|
|||
|
optional: true
|
|||
|
volumes:
|
|||
|
- name: var-lib-calico
|
|||
|
hostPath:
|
|||
|
path: /var/lib/calico
|
|||
|
|