mirror of
				https://github.com/optim-enterprises-bv/terraform-talos.git
				synced 2025-10-30 17:58:32 +00:00 
			
		
		
		
	Update cilium 1.12.1
This commit is contained in:
		| @@ -53,7 +53,7 @@ create-kubeconfig: ## Prepare kubeconfig | |||||||
| 	kubectl --kubeconfig=kubeconfig config set-context --current --namespace=kube-system | 	kubectl --kubeconfig=kubeconfig config set-context --current --namespace=kube-system | ||||||
|  |  | ||||||
| create-deployments: | create-deployments: | ||||||
| 	helm template --namespace=kube-system   --version=1.11.6 -f deployments/cilium.yaml cilium \ | 	helm template --namespace=kube-system   --version=1.12.1 -f deployments/cilium.yaml cilium \ | ||||||
| 		cilium/cilium > deployments/cilium-result.yaml | 		cilium/cilium > deployments/cilium-result.yaml | ||||||
| 	helm template --namespace=ingress-nginx --version=4.2.1 -f deployments/ingress.yaml ingress-nginx \ | 	helm template --namespace=ingress-nginx --version=4.2.1 -f deployments/ingress.yaml ingress-nginx \ | ||||||
| 		ingress-nginx/ingress-nginx > deployments/ingress-result.yaml | 		ingress-nginx/ingress-nginx > deployments/ingress-result.yaml | ||||||
|   | |||||||
| @@ -148,7 +148,6 @@ data: | |||||||
|   kube-proxy-replacement: "strict" |   kube-proxy-replacement: "strict" | ||||||
|   kube-proxy-replacement-healthz-bind-address: "" |   kube-proxy-replacement-healthz-bind-address: "" | ||||||
|   bpf-lb-sock: "false" |   bpf-lb-sock: "false" | ||||||
|   host-reachable-services-protos: |  | ||||||
|   enable-health-check-nodeport: "true" |   enable-health-check-nodeport: "true" | ||||||
|   node-port-bind-protection: "true" |   node-port-bind-protection: "true" | ||||||
|   enable-auto-protect-node-port-range: "true" |   enable-auto-protect-node-port-range: "true" | ||||||
| @@ -172,10 +171,10 @@ data: | |||||||
|   vtep-mac: "" |   vtep-mac: "" | ||||||
|   enable-k8s-endpoint-slice: "true" |   enable-k8s-endpoint-slice: "true" | ||||||
|   enable-bgp-control-plane: "false" |   enable-bgp-control-plane: "false" | ||||||
|   procfs: "/host/proc" |  | ||||||
|   bpf-root: "/sys/fs/bpf" |   bpf-root: "/sys/fs/bpf" | ||||||
|   cgroup-root: "/sys/fs/cgroup" |   cgroup-root: "/sys/fs/cgroup" | ||||||
|   enable-k8s-terminating-endpoint: "true" |   enable-k8s-terminating-endpoint: "true" | ||||||
|  |   annotate-k8s-node: "true" | ||||||
|   remove-cilium-node-taints: "true" |   remove-cilium-node-taints: "true" | ||||||
|   set-cilium-is-up-condition: "true" |   set-cilium-is-up-condition: "true" | ||||||
|   unmanaged-pod-watcher-interval: "15" |   unmanaged-pod-watcher-interval: "15" | ||||||
| @@ -222,6 +221,13 @@ rules: | |||||||
|   - get |   - get | ||||||
|   - list |   - list | ||||||
|   - watch |   - watch | ||||||
|  | - apiGroups: | ||||||
|  |   - "" | ||||||
|  |   resources: | ||||||
|  |   - nodes/status | ||||||
|  |   verbs: | ||||||
|  |   # To annotate the k8s node with Cilium's metadata | ||||||
|  |   - patch | ||||||
| - apiGroups: | - apiGroups: | ||||||
|   - apiextensions.k8s.io |   - apiextensions.k8s.io | ||||||
|   resources: |   resources: | ||||||
| @@ -546,12 +552,6 @@ spec: | |||||||
|       annotations: |       annotations: | ||||||
|         prometheus.io/port: "9962" |         prometheus.io/port: "9962" | ||||||
|         prometheus.io/scrape: "true" |         prometheus.io/scrape: "true" | ||||||
|         # Set app AppArmor's profile to "unconfined". The value of this annotation |  | ||||||
|         # can be modified as long users know which profiles they have available |  | ||||||
|         # in AppArmor. |  | ||||||
|         container.apparmor.security.beta.kubernetes.io/cilium-agent: "unconfined" |  | ||||||
|         container.apparmor.security.beta.kubernetes.io/clean-cilium-state: "unconfined" |  | ||||||
|         container.apparmor.security.beta.kubernetes.io/mount-cgroup: "unconfined" |  | ||||||
|       labels: |       labels: | ||||||
|         k8s-app: cilium |         k8s-app: cilium | ||||||
|     spec: |     spec: | ||||||
| @@ -663,59 +663,11 @@ spec: | |||||||
|           hostPort: 9964 |           hostPort: 9964 | ||||||
|           protocol: TCP |           protocol: TCP | ||||||
|         securityContext: |         securityContext: | ||||||
|           seLinuxOptions: |           privileged: true | ||||||
|             level: 's0' |  | ||||||
|             # Running with spc_t since we have removed the privileged mode. |  | ||||||
|             # Users can change it to a different type as long as they have the |  | ||||||
|             # type available on the system. |  | ||||||
|             type: 'spc_t' |  | ||||||
|           capabilities: |  | ||||||
|             add: |  | ||||||
|               # Use to set socket permission |  | ||||||
|               - CHOWN |  | ||||||
|               # Used to terminate envoy child process |  | ||||||
|               - KILL |  | ||||||
|               # Used since cilium modifies routing tables, etc... |  | ||||||
|               - NET_ADMIN |  | ||||||
|               # Used since cilium creates raw sockets, etc... |  | ||||||
|               - NET_RAW |  | ||||||
|               # Used since cilium monitor uses mmap |  | ||||||
|               - IPC_LOCK |  | ||||||
|               # Used in iptables. Consider removing once we are iptables-free |  | ||||||
|               - SYS_MODULE |  | ||||||
|               # We need it for now but might not need it for >= 5.11 specially |  | ||||||
|               # for the 'SYS_RESOURCE'. |  | ||||||
|               # In >= 5.8 there's already BPF and PERMON capabilities |  | ||||||
|               - SYS_ADMIN |  | ||||||
|               # Could be an alternative for the SYS_ADMIN for the RLIMIT_NPROC |  | ||||||
|               - SYS_RESOURCE |  | ||||||
|               # Both PERFMON and BPF requires kernel 5.8, container runtime |  | ||||||
|               # cri-o >= v1.22.0 or containerd >= v1.5.0. |  | ||||||
|               # If available, SYS_ADMIN can be removed. |  | ||||||
|               #- PERFMON |  | ||||||
|               #- BPF |  | ||||||
|               - DAC_OVERRIDE |  | ||||||
|               - FOWNER |  | ||||||
|               - SETGID |  | ||||||
|               - SETUID |  | ||||||
|             drop: |  | ||||||
|               - ALL |  | ||||||
|         volumeMounts: |         volumeMounts: | ||||||
|         # Unprivileged containers need to mount /proc/sys/net from the host |  | ||||||
|         # to have write access |  | ||||||
|         - mountPath: /host/proc/sys/net |  | ||||||
|           name: host-proc-sys-net |  | ||||||
|         # Unprivileged containers need to mount /proc/sys/kernel from the host |  | ||||||
|         # to have write access |  | ||||||
|         - mountPath: /host/proc/sys/kernel |  | ||||||
|           name: host-proc-sys-kernel |  | ||||||
|         - name: bpf-maps |         - name: bpf-maps | ||||||
|           mountPath: /sys/fs/bpf |           mountPath: /sys/fs/bpf | ||||||
|           # Unprivileged containers can't set mount propagation to bidirectional |           mountPropagation: Bidirectional | ||||||
|           # in this case we will mount the bpf fs from an init container that |  | ||||||
|           # is privileged and set the mount propagation from host to container |  | ||||||
|           # in Cilium. |  | ||||||
|           mountPropagation: HostToContainer |  | ||||||
|         # Check for duplicate mounts before mounting |         # Check for duplicate mounts before mounting | ||||||
|         - name: cilium-cgroup |         - name: cilium-cgroup | ||||||
|           mountPath: /sys/fs/cgroup |           mountPath: /sys/fs/cgroup | ||||||
| @@ -738,24 +690,6 @@ spec: | |||||||
|         - name: xtables-lock |         - name: xtables-lock | ||||||
|           mountPath: /run/xtables.lock |           mountPath: /run/xtables.lock | ||||||
|       initContainers: |       initContainers: | ||||||
|       # Mount the bpf fs if it is not mounted. We will perform this task |  | ||||||
|       # from a privileged container because the mount propagation bidirectional |  | ||||||
|       # only works from privileged containers. |  | ||||||
|       - name: mount-bpf-fs |  | ||||||
|         image: "quay.io/cilium/cilium:v1.12.1@sha256:ea2db1ee21b88127b5c18a96ad155c25485d0815a667ef77c2b7c7f31cab601b" |  | ||||||
|         imagePullPolicy: IfNotPresent |  | ||||||
|         args: |  | ||||||
|         - 'mount | grep "/sys/fs/bpf type bpf" || mount -t bpf bpf /sys/fs/bpf' |  | ||||||
|         command: |  | ||||||
|         - /bin/bash |  | ||||||
|         - -c |  | ||||||
|         - -- |  | ||||||
|         securityContext: |  | ||||||
|           privileged: true |  | ||||||
|         volumeMounts: |  | ||||||
|         - name: bpf-maps |  | ||||||
|           mountPath: /sys/fs/bpf |  | ||||||
|           mountPropagation: Bidirectional |  | ||||||
|       - name: clean-cilium-state |       - name: clean-cilium-state | ||||||
|         image: "quay.io/cilium/cilium:v1.12.1@sha256:ea2db1ee21b88127b5c18a96ad155c25485d0815a667ef77c2b7c7f31cab601b" |         image: "quay.io/cilium/cilium:v1.12.1@sha256:ea2db1ee21b88127b5c18a96ad155c25485d0815a667ef77c2b7c7f31cab601b" | ||||||
|         imagePullPolicy: IfNotPresent |         imagePullPolicy: IfNotPresent | ||||||
| @@ -779,35 +713,7 @@ spec: | |||||||
|         - name: KUBERNETES_SERVICE_PORT |         - name: KUBERNETES_SERVICE_PORT | ||||||
|           value: "6443" |           value: "6443" | ||||||
|         securityContext: |         securityContext: | ||||||
|           seLinuxOptions: |           privileged: true | ||||||
|             level: 's0' |  | ||||||
|             # Running with spc_t since we have removed the privileged mode. |  | ||||||
|             # Users can change it to a different type as long as they have the |  | ||||||
|             # type available on the system. |  | ||||||
|             type: 'spc_t' |  | ||||||
|           capabilities: |  | ||||||
|             # Most of the capabilities here are the same ones used in the |  | ||||||
|             # cilium-agent's container because this container can be used to |  | ||||||
|             # uninstall all Cilium resources, and therefore it is likely that |  | ||||||
|             # will need the same capabilities. |  | ||||||
|             add: |  | ||||||
|               # Used since cilium modifies routing tables, etc... |  | ||||||
|               - NET_ADMIN |  | ||||||
|               # Used in iptables. Consider removing once we are iptables-free |  | ||||||
|               - SYS_MODULE |  | ||||||
|               # We need it for now but might not need it for >= 5.11 specially |  | ||||||
|               # for the 'SYS_RESOURCE'. |  | ||||||
|               # In >= 5.8 there's already BPF and PERMON capabilities |  | ||||||
|               - SYS_ADMIN |  | ||||||
|               # Could be an alternative for the SYS_ADMIN for the RLIMIT_NPROC |  | ||||||
|               - SYS_RESOURCE |  | ||||||
|               # Both PERFMON and BPF requires kernel 5.8, container runtime |  | ||||||
|               # cri-o >= v1.22.0 or containerd >= v1.5.0. |  | ||||||
|               # If available, SYS_ADMIN can be removed. |  | ||||||
|               #- PERFMON |  | ||||||
|               #- BPF |  | ||||||
|             drop: |  | ||||||
|               - ALL |  | ||||||
|         volumeMounts: |         volumeMounts: | ||||||
|         - name: bpf-maps |         - name: bpf-maps | ||||||
|           mountPath: /sys/fs/bpf |           mountPath: /sys/fs/bpf | ||||||
| @@ -884,14 +790,6 @@ spec: | |||||||
|       - name: cilium-config-path |       - name: cilium-config-path | ||||||
|         configMap: |         configMap: | ||||||
|           name: cilium-config |           name: cilium-config | ||||||
|       - name: host-proc-sys-net |  | ||||||
|         hostPath: |  | ||||||
|           path: /proc/sys/net |  | ||||||
|           type: Directory |  | ||||||
|       - name: host-proc-sys-kernel |  | ||||||
|         hostPath: |  | ||||||
|           path: /proc/sys/kernel |  | ||||||
|           type: Directory |  | ||||||
| --- | --- | ||||||
| # Source: cilium/templates/cilium-operator/deployment.yaml | # Source: cilium/templates/cilium-operator/deployment.yaml | ||||||
| apiVersion: apps/v1 | apiVersion: apps/v1 | ||||||
|   | |||||||
| @@ -19,6 +19,7 @@ autoDirectNodeRoutes: false | |||||||
| devices: [eth+] | devices: [eth+] | ||||||
|  |  | ||||||
| healthChecking: true | healthChecking: true | ||||||
|  | annotateK8sNode: true | ||||||
|  |  | ||||||
| # l7Proxy: false | # l7Proxy: false | ||||||
| # encryption: | # encryption: | ||||||
| @@ -40,8 +41,6 @@ ipv4: | |||||||
|   enabled: true |   enabled: true | ||||||
| ipv6: | ipv6: | ||||||
|   enabled: true |   enabled: true | ||||||
| hostServices: |  | ||||||
|   enabled: true |  | ||||||
| hostPort: | hostPort: | ||||||
|   enabled: true |   enabled: true | ||||||
| nodePort: | nodePort: | ||||||
| @@ -51,6 +50,9 @@ externalIPs: | |||||||
| hostFirewall: | hostFirewall: | ||||||
|   enabled: true |   enabled: true | ||||||
|  |  | ||||||
|  | securityContext: | ||||||
|  |   privileged: true | ||||||
|  |  | ||||||
| hubble: | hubble: | ||||||
|   enabled: false |   enabled: false | ||||||
|  |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user
	 Serge Logvinov
					Serge Logvinov