kilo-k3s-userspace.yaml 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. apiVersion: v1
  2. kind: ConfigMap
  3. metadata:
  4. name: kilo
  5. namespace: kube-system
  6. labels:
  7. app.kubernetes.io/name: kilo
  8. data:
  9. cni-conf.json: |
  10. {
  11. "cniVersion":"0.3.1",
  12. "name":"kilo",
  13. "plugins":[
  14. {
  15. "name":"kubernetes",
  16. "type":"bridge",
  17. "bridge":"kube-bridge",
  18. "isDefaultGateway":true,
  19. "forceAddress":true,
  20. "mtu": 1420,
  21. "ipam":{
  22. "type":"host-local"
  23. }
  24. },
  25. {
  26. "type":"portmap",
  27. "snat":true,
  28. "capabilities":{
  29. "portMappings":true
  30. }
  31. }
  32. ]
  33. }
  34. ---
  35. apiVersion: v1
  36. kind: ServiceAccount
  37. metadata:
  38. name: kilo
  39. namespace: kube-system
  40. ---
  41. apiVersion: rbac.authorization.k8s.io/v1
  42. kind: ClusterRole
  43. metadata:
  44. name: kilo
  45. rules:
  46. - apiGroups:
  47. - ""
  48. resources:
  49. - nodes
  50. verbs:
  51. - list
  52. - patch
  53. - watch
  54. - apiGroups:
  55. - kilo.squat.ai
  56. resources:
  57. - peers
  58. verbs:
  59. - list
  60. - update
  61. - watch
  62. - apiGroups:
  63. - apiextensions.k8s.io
  64. resources:
  65. - customresourcedefinitions
  66. verbs:
  67. - get
  68. ---
  69. apiVersion: rbac.authorization.k8s.io/v1
  70. kind: ClusterRoleBinding
  71. metadata:
  72. name: kilo
  73. roleRef:
  74. apiGroup: rbac.authorization.k8s.io
  75. kind: ClusterRole
  76. name: kilo
  77. subjects:
  78. - kind: ServiceAccount
  79. name: kilo
  80. namespace: kube-system
  81. ---
  82. apiVersion: apps/v1
  83. kind: DaemonSet
  84. metadata:
  85. name: kilo
  86. namespace: kube-system
  87. labels:
  88. app.kubernetes.io/name: kilo-userspace
  89. app.kubernetes.io/part-of: kilo
  90. spec:
  91. selector:
  92. matchLabels:
  93. app.kubernetes.io/name: kilo-userspace
  94. app.kubernetes.io/part-of: kilo
  95. template:
  96. metadata:
  97. labels:
  98. app.kubernetes.io/name: kilo-userspace
  99. app.kubernetes.io/part-of: kilo
  100. spec:
  101. serviceAccountName: kilo
  102. hostNetwork: true
  103. containers:
  104. - name: kilo
  105. image: squat/kilo
  106. args:
  107. - --kubeconfig=/etc/kubernetes/kubeconfig
  108. - --hostname=$(NODE_NAME)
  109. - --create-interface=false
  110. - --interface=kilo0
  111. env:
  112. - name: NODE_NAME
  113. valueFrom:
  114. fieldRef:
  115. fieldPath: spec.nodeName
  116. ports:
  117. - containerPort: 1107
  118. name: metrics
  119. securityContext:
  120. privileged: true
  121. volumeMounts:
  122. - name: cni-conf-dir
  123. mountPath: /etc/cni/net.d
  124. - name: kilo-dir
  125. mountPath: /var/lib/kilo
  126. - name: kubeconfig
  127. mountPath: /etc/kubernetes/kubeconfig
  128. readOnly: true
  129. - name: lib-modules
  130. mountPath: /lib/modules
  131. readOnly: true
  132. - name: xtables-lock
  133. mountPath: /run/xtables.lock
  134. readOnly: false
  135. - name: wireguard
  136. mountPath: /var/run/wireguard
  137. readOnly: false
  138. - name: boringtun
  139. image: leonnicolas/boringtun
  140. args:
  141. - --disable-drop-privileges=true
  142. - --foreground
  143. - kilo0
  144. securityContext:
  145. privileged: true
  146. volumeMounts:
  147. - name: wireguard
  148. mountPath: /var/run/wireguard
  149. readOnly: false
  150. initContainers:
  151. - name: install-cni
  152. image: squat/kilo
  153. command:
  154. - /bin/sh
  155. - -c
  156. - set -e -x;
  157. cp /opt/cni/bin/* /host/opt/cni/bin/;
  158. TMP_CONF="$CNI_CONF_NAME".tmp;
  159. echo "$CNI_NETWORK_CONFIG" > $TMP_CONF;
  160. rm -f /host/etc/cni/net.d/*;
  161. mv $TMP_CONF /host/etc/cni/net.d/$CNI_CONF_NAME
  162. env:
  163. - name: CNI_CONF_NAME
  164. value: 10-kilo.conflist
  165. - name: CNI_NETWORK_CONFIG
  166. valueFrom:
  167. configMapKeyRef:
  168. name: kilo
  169. key: cni-conf.json
  170. volumeMounts:
  171. - name: cni-bin-dir
  172. mountPath: /host/opt/cni/bin
  173. - name: cni-conf-dir
  174. mountPath: /host/etc/cni/net.d
  175. tolerations:
  176. - effect: NoSchedule
  177. operator: Exists
  178. - effect: NoExecute
  179. operator: Exists
  180. volumes:
  181. - name: cni-bin-dir
  182. hostPath:
  183. path: /opt/cni/bin
  184. - name: cni-conf-dir
  185. hostPath:
  186. path: /etc/cni/net.d
  187. - name: kilo-dir
  188. hostPath:
  189. path: /var/lib/kilo
  190. - name: kubeconfig
  191. hostPath:
  192. # Since kilo runs as a daemonset, it is recommended that you copy the
  193. # k3s.yaml kubeconfig file from the master node to all worker nodes
  194. # with the same path structure.
  195. path: /etc/rancher/k3s/k3s.yaml
  196. - name: lib-modules
  197. hostPath:
  198. path: /lib/modules
  199. - name: xtables-lock
  200. hostPath:
  201. path: /run/xtables.lock
  202. type: FileOrCreate
  203. - name: wireguard
  204. hostPath:
  205. path: /var/run/wireguard