blob: ba334341e3d305e0a5264f53b44701533377fc20 [file] [log] [blame]
Simon Pasquier3f9d3fc2017-04-26 10:47:10 +02001classes:
2- service.etcd.server.cluster
3- system.haproxy.proxy.listen.kubernetes.apiserver
4- system.linux.system.repo.docker
5- system.salt.minion.cert.etcd_server
6- system.kubernetes.master.cluster
Simon Pasquier3f9d3fc2017-04-26 10:47:10 +02007- cluster.virtual-mcp11-k8s-calico.kubernetes.compute
8- cluster.virtual-mcp11-k8s-calico.infra
Matthew Mosesohnbb05ea32017-06-01 16:40:21 +03009- cluster.overrides
Simon Pasquier3f9d3fc2017-04-26 10:47:10 +020010parameters:
11 _param:
Sergii Golovatiuka7a19d52017-07-20 18:20:26 +020012 keepalived_vip_interface: ens3
Simon Pasquier3f9d3fc2017-04-26 10:47:10 +020013 keepalived_vip_virtual_router_id: 60
14 etcd:
15 server:
16 source:
17 engine: docker_hybrid
18 ssl:
19 enabled: true
20 setup:
21 calico:
22 key: /calico/v1/ipam/v4/pool/${_param:calico_private_network}-${_param:calico_private_netmask}
23 value: '{"masquerade":true,"cidr":"${_param:calico_private_network}/${_param:calico_private_netmask}"}'
24 kubernetes:
Sergii Golovatiukce63afb2017-08-10 17:39:19 +020025 common:
26 addons:
27 helm:
28 enabled: ${_param:kubernetes_helm_enabled}
29 calico_policy:
30 enabled: ${_param:kubernetes_calico_policy_enabled}
31 image: ${_param:kubernetes_calico_policy_image}
32 netchecker:
33 enabled: ${_param:kubernetes_netchecker_enabled}
34 agent_image: ${_param:kubernetes_netchecker_agent_image}
35 server_image: ${_param:kubernetes_netchecker_server_image}
Simon Pasquier3f9d3fc2017-04-26 10:47:10 +020036 master:
37 etcd:
38 ssl:
39 enabled: true
40 network:
41 etcd:
42 ssl:
43 enabled: true
44 namespace:
45 netchecker:
vrovachev0f291422017-06-21 18:30:01 +040046 enabled: ${_param:kubernetes_netchecker_enabled}
Sergii Golovatiukce63afb2017-08-10 17:39:19 +020047