--- # The interface on which the K8s services should listen on. As all cluster # communication should use the PeerVPN interface the interface name is # normally "tap0" or "peervpn0". k8s_interface: "tap0" # The directory to store the K8s certificates and other configuration k8s_conf_dir: "/var/lib/kubernetes" # CNI network plugin settings k8s_cni_conf_dir: "/etc/cni/net.d" # The directory from where to copy the K8s certificates. By default this # will expand to user's LOCAL $HOME (the user that run's "ansible-playbook ..." # plus "/k8s/certs". That means if the user's $HOME directory is e.g. # "/home/da_user" then "k8s_ca_conf_directory" will have a value of # "/home/da_user/k8s/certs". k8s_ca_conf_directory: "{{ '~/k8s/certs' | expanduser }}" etcd_conf_dir: "/etc/etcd" etcd_bin_dir: "/usr/local/bin" etcd_client_port: 2379 etcd_certificates: - ca-etcd.pem - ca-etcd-key.pem - cert-etcd.pem - cert-etcd-key.pem flannel_version: "v0.10.0" flannel_etcd_prefix: "/kubernetes-cluster/network" flannel_ip_range: "10.200.0.0/16" flannel_backend_type: "vxlan" flannel_cni_name: "podnet" flannel_subnet_file_dir: "/run/flannel" flannel_options_dir: "/etc/flannel" flannel_bin_dir: "/usr/local/sbin" flannel_cni_conf_file: "10-flannel" flannel_systemd_restartsec: "5" flannel_systemd_limitnofile: "40000" flannel_systemd_limitnproc: "1048576" flannel_settings: "etcd-cafile": "{{k8s_conf_dir}}/ca-etcd.pem" "etcd-certfile": "{{k8s_conf_dir}}/cert-etcd.pem" "etcd-keyfile": "{{k8s_conf_dir}}/cert-etcd-key.pem" "etcd-prefix": "{{flannel_etcd_prefix}}" "iface": "{{k8s_interface}}" "public-ip": "{{hostvars[inventory_hostname]['ansible_' + k8s_interface].ipv4.address}}" "subnet-file": "{{flannel_subnet_file_dir}}/subnet.env" "ip-masq": "true" "healthz-ip": "0.0.0.0" "healthz-port": "0" # 0 = disable