012aaadacc
A new release is added to the cluster: Name: metrics-server Namespace: kube-system Version: 3.11.0 Chart: metrics-server/metrics-server
271 lines
9.3 KiB
YAML
271 lines
9.3 KiB
YAML
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
|
|
namespace: {{ .Release.Namespace }}
|
|
labels:
|
|
app: istiod
|
|
istio.io/rev: {{ .Values.revision | default "default" | quote }}
|
|
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
|
|
operator.istio.io/component: "Pilot"
|
|
istio: pilot
|
|
release: {{ .Release.Name }}
|
|
{{- range $key, $val := .Values.pilot.deploymentLabels }}
|
|
{{ $key }}: "{{ $val }}"
|
|
{{- end }}
|
|
spec:
|
|
{{- if not .Values.pilot.autoscaleEnabled }}
|
|
{{- if .Values.pilot.replicaCount }}
|
|
replicas: {{ .Values.pilot.replicaCount }}
|
|
{{- end }}
|
|
{{- end }}
|
|
strategy:
|
|
rollingUpdate:
|
|
maxSurge: {{ .Values.pilot.rollingMaxSurge }}
|
|
maxUnavailable: {{ .Values.pilot.rollingMaxUnavailable }}
|
|
selector:
|
|
matchLabels:
|
|
{{- if ne .Values.revision "" }}
|
|
app: istiod
|
|
istio.io/rev: {{ .Values.revision | default "default" | quote }}
|
|
{{- else }}
|
|
istio: pilot
|
|
{{- end }}
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app: istiod
|
|
istio.io/rev: {{ .Values.revision | default "default" | quote }}
|
|
install.operator.istio.io/owning-resource: {{ .Values.ownerName | default "unknown" }}
|
|
sidecar.istio.io/inject: "false"
|
|
operator.istio.io/component: "Pilot"
|
|
{{- if ne .Values.revision "" }}
|
|
istio: istiod
|
|
{{- else }}
|
|
istio: pilot
|
|
{{- end }}
|
|
{{- range $key, $val := .Values.pilot.podLabels }}
|
|
{{ $key }}: "{{ $val }}"
|
|
{{- end }}
|
|
istio.io/dataplane-mode: none
|
|
annotations:
|
|
prometheus.io/port: "15014"
|
|
prometheus.io/scrape: "true"
|
|
sidecar.istio.io/inject: "false"
|
|
{{- if .Values.pilot.podAnnotations }}
|
|
{{ toYaml .Values.pilot.podAnnotations | indent 8 }}
|
|
{{- end }}
|
|
spec:
|
|
{{- if .Values.pilot.nodeSelector }}
|
|
nodeSelector:
|
|
{{ toYaml .Values.pilot.nodeSelector | indent 8 }}
|
|
{{- end }}
|
|
{{- with .Values.pilot.affinity }}
|
|
affinity:
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
tolerations:
|
|
- key: cni.istio.io/not-ready
|
|
operator: "Exists"
|
|
{{- with .Values.pilot.tolerations }}
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
{{- with .Values.pilot.topologySpreadConstraints }}
|
|
topologySpreadConstraints:
|
|
{{- toYaml . | nindent 8 }}
|
|
{{- end }}
|
|
serviceAccountName: istiod{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
|
|
{{- if .Values.global.priorityClassName }}
|
|
priorityClassName: "{{ .Values.global.priorityClassName }}"
|
|
{{- end }}
|
|
containers:
|
|
- name: discovery
|
|
{{- if contains "/" .Values.pilot.image }}
|
|
image: "{{ .Values.pilot.image }}"
|
|
{{- else }}
|
|
image: "{{ .Values.pilot.hub | default .Values.global.hub }}/{{ .Values.pilot.image | default "pilot" }}:{{ .Values.pilot.tag | default .Values.global.tag }}{{with (.Values.pilot.variant | default .Values.global.variant)}}-{{.}}{{end}}"
|
|
{{- end }}
|
|
{{- if .Values.global.imagePullPolicy }}
|
|
imagePullPolicy: {{ .Values.global.imagePullPolicy }}
|
|
{{- end }}
|
|
args:
|
|
- "discovery"
|
|
- --monitoringAddr=:15014
|
|
{{- if .Values.global.logging.level }}
|
|
- --log_output_level={{ .Values.global.logging.level }}
|
|
{{- end}}
|
|
{{- if .Values.global.logAsJson }}
|
|
- --log_as_json
|
|
{{- end }}
|
|
- --domain
|
|
- {{ .Values.global.proxy.clusterDomain }}
|
|
{{- if .Values.pilot.taint.namespace }}
|
|
- --cniNamespace={{ .Values.pilot.taint.namespace }}
|
|
{{- end }}
|
|
- --keepaliveMaxServerConnectionAge
|
|
- "{{ .Values.pilot.keepaliveMaxServerConnectionAge }}"
|
|
{{- if .Values.pilot.extraContainerArgs }}
|
|
{{- with .Values.pilot.extraContainerArgs }}
|
|
{{- toYaml . | nindent 10 }}
|
|
{{- end }}
|
|
{{- end }}
|
|
ports:
|
|
- containerPort: 8080
|
|
protocol: TCP
|
|
- containerPort: 15010
|
|
protocol: TCP
|
|
- containerPort: 15017
|
|
protocol: TCP
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /ready
|
|
port: 8080
|
|
initialDelaySeconds: 1
|
|
periodSeconds: 3
|
|
timeoutSeconds: 5
|
|
env:
|
|
- name: REVISION
|
|
value: "{{ .Values.revision | default `default` }}"
|
|
- name: PILOT_CERT_PROVIDER
|
|
value: {{ .Values.global.pilotCertProvider }}
|
|
- name: POD_NAME
|
|
valueFrom:
|
|
fieldRef:
|
|
apiVersion: v1
|
|
fieldPath: metadata.name
|
|
- name: POD_NAMESPACE
|
|
valueFrom:
|
|
fieldRef:
|
|
apiVersion: v1
|
|
fieldPath: metadata.namespace
|
|
- name: SERVICE_ACCOUNT
|
|
valueFrom:
|
|
fieldRef:
|
|
apiVersion: v1
|
|
fieldPath: spec.serviceAccountName
|
|
- name: KUBECONFIG
|
|
value: /var/run/secrets/remote/config
|
|
# If you explicitly told us where ztunnel lives, use that.
|
|
# Otherwise, assume it lives in our namespace
|
|
# Also, check for an explicit ENV override (legacy approach) and prefer that
|
|
# if present
|
|
{{ $ztTrustedNS := or .Values.pilot.trustedZtunnelNamespace .Release.Namespace }}
|
|
{{- if not .Values.pilot.env.CA_TRUSTED_NODE_ACCOUNTS }}
|
|
- name: CA_TRUSTED_NODE_ACCOUNTS
|
|
value: "{{ $ztTrustedNS }}/ztunnel"
|
|
{{- end }}
|
|
{{- if .Values.pilot.env }}
|
|
{{- range $key, $val := .Values.pilot.env }}
|
|
- name: {{ $key }}
|
|
value: "{{ $val }}"
|
|
{{- end }}
|
|
{{- end }}
|
|
{{- if .Values.pilot.traceSampling }}
|
|
- name: PILOT_TRACE_SAMPLING
|
|
value: "{{ .Values.pilot.traceSampling }}"
|
|
{{- end }}
|
|
# If externalIstiod is set via Values.Global, then enable the pilot env variable. However, if it's set via Values.pilot.env, then
|
|
# don't set it here to avoid duplication.
|
|
{{- if and .Values.global.externalIstiod (eq .Values.pilot.env.EXTERNAL_ISTIOD "")}}
|
|
- name: EXTERNAL_ISTIOD
|
|
value: "{{ .Values.global.externalIstiod }}"
|
|
{{- end }}
|
|
- name: PILOT_ENABLE_ANALYSIS
|
|
value: "{{ .Values.global.istiod.enableAnalysis }}"
|
|
- name: CLUSTER_ID
|
|
value: "{{ $.Values.global.multiCluster.clusterName | default `Kubernetes` }}"
|
|
- name: GOMEMLIMIT
|
|
valueFrom:
|
|
resourceFieldRef:
|
|
resource: limits.memory
|
|
- name: GOMAXPROCS
|
|
valueFrom:
|
|
resourceFieldRef:
|
|
resource: limits.cpu
|
|
- name: PLATFORM
|
|
value: "{{ .Values.global.platform }}"
|
|
resources:
|
|
{{- if .Values.pilot.resources }}
|
|
{{ toYaml .Values.pilot.resources | trim | indent 12 }}
|
|
{{- else }}
|
|
{{ toYaml .Values.global.defaultResources | trim | indent 12 }}
|
|
{{- end }}
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: true
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
{{- if .Values.pilot.seccompProfile }}
|
|
seccompProfile:
|
|
{{ toYaml .Values.pilot.seccompProfile | trim | indent 14 }}
|
|
{{- end }}
|
|
volumeMounts:
|
|
- name: istio-token
|
|
mountPath: /var/run/secrets/tokens
|
|
readOnly: true
|
|
- name: local-certs
|
|
mountPath: /var/run/secrets/istio-dns
|
|
- name: cacerts
|
|
mountPath: /etc/cacerts
|
|
readOnly: true
|
|
- name: istio-kubeconfig
|
|
mountPath: /var/run/secrets/remote
|
|
readOnly: true
|
|
{{- if .Values.pilot.jwksResolverExtraRootCA }}
|
|
- name: extracacerts
|
|
mountPath: /cacerts
|
|
{{- end }}
|
|
- name: istio-csr-dns-cert
|
|
mountPath: /var/run/secrets/istiod/tls
|
|
readOnly: true
|
|
- name: istio-csr-ca-configmap
|
|
mountPath: /var/run/secrets/istiod/ca
|
|
readOnly: true
|
|
{{- with .Values.pilot.volumeMounts }}
|
|
{{- toYaml . | nindent 10 }}
|
|
{{- end }}
|
|
volumes:
|
|
# Technically not needed on this pod - but it helps debugging/testing SDS
|
|
# Should be removed after everything works.
|
|
- emptyDir:
|
|
medium: Memory
|
|
name: local-certs
|
|
- name: istio-token
|
|
projected:
|
|
sources:
|
|
- serviceAccountToken:
|
|
audience: {{ .Values.global.sds.token.aud }}
|
|
expirationSeconds: 43200
|
|
path: istio-token
|
|
# Optional: user-generated root
|
|
- name: cacerts
|
|
secret:
|
|
secretName: cacerts
|
|
optional: true
|
|
- name: istio-kubeconfig
|
|
secret:
|
|
secretName: istio-kubeconfig
|
|
optional: true
|
|
# Optional: istio-csr dns pilot certs
|
|
- name: istio-csr-dns-cert
|
|
secret:
|
|
secretName: istiod-tls
|
|
optional: true
|
|
- name: istio-csr-ca-configmap
|
|
configMap:
|
|
name: istio-ca-root-cert
|
|
defaultMode: 420
|
|
optional: true
|
|
{{- if .Values.pilot.jwksResolverExtraRootCA }}
|
|
- name: extracacerts
|
|
configMap:
|
|
name: pilot-jwks-extra-cacerts{{- if not (eq .Values.revision "") }}-{{ .Values.revision }}{{- end }}
|
|
{{- end }}
|
|
{{- with .Values.pilot.volumes }}
|
|
{{- toYaml . | nindent 6}}
|
|
{{- end }}
|
|
|
|
---
|