Documentation
¶
Index ¶
- Constants
- func NewCalicoKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
- func NewCalicoKubeControllersPolicy(cfg *KubeControllersConfiguration) render.Component
- func NewElasticsearchKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
- type KubeControllersConfiguration
Constants ¶
View Source
const ( KubeController = "calico-kube-controllers" KubeControllerServiceAccount = "calico-kube-controllers" KubeControllerRole = "calico-kube-controllers" KubeControllerRoleBinding = "calico-kube-controllers" KubeControllerMetrics = "calico-kube-controllers-metrics" KubeControllerNetworkPolicyName = networkpolicy.TigeraComponentPolicyPrefix + "kube-controller-access" EsKubeController = "es-calico-kube-controllers" EsKubeControllerRole = "es-calico-kube-controllers" EsKubeControllerRoleBinding = "es-calico-kube-controllers" EsKubeControllerMetrics = "es-calico-kube-controllers-metrics" EsKubeControllerNetworkPolicyName = networkpolicy.TigeraComponentPolicyPrefix + "es-kube-controller-access" ManagedClustersWatchRoleBindingName = "es-calico-kube-controllers-managed-cluster-watch" ElasticsearchKubeControllersUserSecret = "tigera-ee-kube-controllers-elasticsearch-access" ElasticsearchKubeControllersUserName = "tigera-ee-kube-controllers" ElasticsearchKubeControllersSecureUserSecret = "tigera-ee-kube-controllers-elasticsearch-access-gateway" ElasticsearchKubeControllersVerificationUserSecret = "tigera-ee-kube-controllers-gateway-verification-credentials" KubeControllerPrometheusTLSSecret = "calico-kube-controllers-metrics-tls" )
Variables ¶
This section is empty.
Functions ¶
func NewCalicoKubeControllers ¶
func NewCalicoKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
func NewCalicoKubeControllersPolicy ¶ added in v1.28.0
func NewCalicoKubeControllersPolicy(cfg *KubeControllersConfiguration) render.Component
func NewElasticsearchKubeControllers ¶
func NewElasticsearchKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
Types ¶
type KubeControllersConfiguration ¶
type KubeControllersConfiguration struct {
K8sServiceEp k8sapi.ServiceEndpoint
Installation *operatorv1.InstallationSpec
ManagementCluster *operatorv1.ManagementCluster
ManagementClusterConnection *operatorv1.ManagementClusterConnection
Authentication *operatorv1.Authentication
// Whether or not the LogStorage CRD is present in the cluster.
LogStorageExists bool
ClusterDomain string
MetricsPort int
// For details on why this is needed see 'Node and Installation finalizer' in the core_controller.
Terminating bool
// Secrets - provided by the caller. Used to generate secrets in the destination
// namespace to be returned by the rendered. Expected that the calling code
// take care to pass the same secret on each reconcile where possible.
KubeControllersGatewaySecret *corev1.Secret
TrustedBundle certificatemanagement.TrustedBundleRO
MetricsServerTLS certificatemanagement.KeyPairInterface
// Namespace to be installed into.
Namespace string
// List of namespaces that are running a kube-controllers instance that need a cluster role binding.
BindingNamespaces []string
// Tenant object provides tenant configuration for both single and multi-tenant modes.
// If this is nil, then we should run in zero-tenant mode.
Tenant *operatorv1.Tenant
}
Click to show internal directories.
Click to hide internal directories.