/
exoscale-cloud-control-manager.yaml
169 lines (169 loc) · 3.21 KB
/
exoscale-cloud-control-manager.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
apiVersion: v1
kind: Secret
metadata:
name: cloud-control-manager-cloud-config
namespace: kube-system
type: Opaque
data:
api-endpoint: '${exoscale_api_endpoint}'
api-key: '${exoscale_api_key}'
api-secret: '${exoscale_api_secret}'
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: exoscale-cloud-controller-manager
namespace: kube-system
labels:
app: exoscale-cloud-controller-manager
spec:
replicas: 1
selector:
matchLabels:
app: exoscale-cloud-controller-manager
template:
metadata:
labels:
app: exoscale-cloud-controller-manager
spec:
dnsPolicy: Default
hostNetwork: true
serviceAccountName: cloud-controller-manager
tolerations:
- key: node.cloudprovider.kubernetes.io/uninitialized
value: "true"
effect: NoSchedule
- key: "CriticalAddonsOnly"
operator: "Exists"
- key: node-role.kubernetes.io/master
effect: NoSchedule
containers:
- image: exoscale/cloud-controller-manager:latest
imagePullPolicy: Always
name: exoscale-cloud-controller-manager
args:
- --cloud-provider=exoscale
- --leader-elect=true
- --allow-untagged-cloud
env:
- name: EXOSCALE_API_KEY
valueFrom:
secretKeyRef:
key: api-key
name: cloud-control-manager-cloud-config
- name: EXOSCALE_API_SECRET
valueFrom:
secretKeyRef:
key: api-secret
name: cloud-control-manager-cloud-config
- name: EXOSCALE_API_ENDPOINT
valueFrom:
secretKeyRef:
key: api-endpoint
name: cloud-control-manager-cloud-config
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: cloud-controller-manager
namespace: kube-system
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
annotations:
rbac.authorization.kubernetes.io/autoupdate: "true"
name: system:cloud-controller-manager
rules:
- apiGroups:
- coordination.k8s.io
resources:
- leases
verbs:
- get
- create
- update
- apiGroups:
- ""
resources:
- events
verbs:
- create
- patch
- update
- apiGroups:
- ""
resources:
- nodes
verbs:
- '*'
- apiGroups:
- ""
resources:
- configmaps
verbs:
- 'get'
- 'watch'
- 'list'
- apiGroups:
- ""
resources:
- nodes/status
verbs:
- patch
- apiGroups:
- ""
resources:
- services
verbs:
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- services/status
verbs:
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- serviceaccounts
verbs:
- create
- apiGroups:
- ""
resources:
- persistentvolumes
verbs:
- get
- list
- update
- watch
- apiGroups:
- ""
resources:
- endpoints
verbs:
- create
- get
- list
- watch
- update
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: system:cloud-controller-manager
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: system:cloud-controller-manager
subjects:
- kind: ServiceAccount
name: cloud-controller-manager
namespace: kube-system