Add mcp11-k8s-calico model
This model has been generated using the cookiecutter and adapted with
the modification from https://github.com/mceloud/k8s-salt-model.git.
Change-Id: Ic47e865b7221e4fd9c2f3b491e3cef047b038d16
diff --git a/classes/cluster/virtual-mcp11-k8s-calico/kubernetes/control.yml b/classes/cluster/virtual-mcp11-k8s-calico/kubernetes/control.yml
new file mode 100644
index 0000000..5f3298d
--- /dev/null
+++ b/classes/cluster/virtual-mcp11-k8s-calico/kubernetes/control.yml
@@ -0,0 +1,39 @@
+classes:
+- service.etcd.server.cluster
+- system.haproxy.proxy.listen.kubernetes.apiserver
+- system.linux.system.repo.docker
+- system.salt.minion.cert.etcd_server
+- system.kubernetes.master.cluster
+- cluster.virtual-mcp11-k8s-calico.kubernetes.compute
+- cluster.virtual-mcp11-k8s-calico.infra
+parameters:
+ _param:
+ keepalived_vip_interface: ens4
+ keepalived_vip_virtual_router_id: 60
+ etcd:
+ server:
+ source:
+ engine: docker_hybrid
+ ssl:
+ enabled: true
+ setup:
+ calico:
+ key: /calico/v1/ipam/v4/pool/${_param:calico_private_network}-${_param:calico_private_netmask}
+ value: '{"masquerade":true,"cidr":"${_param:calico_private_network}/${_param:calico_private_netmask}"}'
+ kubernetes:
+ master:
+ etcd:
+ ssl:
+ enabled: true
+ network:
+ etcd:
+ ssl:
+ enabled: true
+ namespace:
+ netchecker:
+ enabled: true
+ addons:
+ netchecker:
+ enabled: true
+ helm:
+ enabled: true