Documentation ¶
Index ¶
- Constants
- func NewCalicoKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
- func NewCalicoKubeControllersPolicy(cfg *KubeControllersConfiguration) render.Component
- func NewElasticsearchKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
- type KubeControllersConfiguration
Constants ¶
View Source
const ( KubeController = "calico-kube-controllers" KubeControllerServiceAccount = "calico-kube-controllers" KubeControllerRole = "calico-kube-controllers" KubeControllerRoleBinding = "calico-kube-controllers" KubeControllerPodSecurityPolicy = "calico-kube-controllers" KubeControllerMetrics = "calico-kube-controllers-metrics" KubeControllerNetworkPolicyName = networkpolicy.TigeraComponentPolicyPrefix + "kube-controller-access" EsKubeController = "es-calico-kube-controllers" EsKubeControllerRole = "es-calico-kube-controllers" EsKubeControllerRoleBinding = "es-calico-kube-controllers" EsKubeControllerPodSecurityPolicy = "es-calico-kube-controllers" EsKubeControllerMetrics = "es-calico-kube-controllers-metrics" EsKubeControllerNetworkPolicyName = networkpolicy.TigeraComponentPolicyPrefix + "es-kube-controller-access" ElasticsearchKubeControllersUserSecret = "tigera-ee-kube-controllers-elasticsearch-access" ElasticsearchKubeControllersUserName = "tigera-ee-kube-controllers" ElasticsearchKubeControllersSecureUserSecret = "tigera-ee-kube-controllers-elasticsearch-access-gateway" ElasticsearchKubeControllersVerificationUserSecret = "tigera-ee-kube-controllers-gateway-verification-credentials" KubeControllerPrometheusTLSSecret = "calico-kube-controllers-metrics-tls" )
Variables ¶
This section is empty.
Functions ¶
func NewCalicoKubeControllers ¶
func NewCalicoKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
func NewCalicoKubeControllersPolicy ¶ added in v1.28.0
func NewCalicoKubeControllersPolicy(cfg *KubeControllersConfiguration) render.Component
func NewElasticsearchKubeControllers ¶
func NewElasticsearchKubeControllers(cfg *KubeControllersConfiguration) *kubeControllersComponent
Types ¶
type KubeControllersConfiguration ¶
type KubeControllersConfiguration struct { K8sServiceEp k8sapi.ServiceEndpoint Installation *operatorv1.InstallationSpec ManagementCluster *operatorv1.ManagementCluster ManagementClusterConnection *operatorv1.ManagementClusterConnection Authentication *operatorv1.Authentication // Whether or not the LogStorage CRD is present in the cluster. LogStorageExists bool ClusterDomain string MetricsPort int // For details on why this is needed see 'Node and Installation finalizer' in the core_controller. Terminating bool // Secrets - provided by the caller. Used to generate secrets in the destination // namespace to be returned by the rendered. Expected that the calling code // take care to pass the same secret on each reconcile where possible. KubeControllersGatewaySecret *corev1.Secret TrustedBundle certificatemanagement.TrustedBundleRO // Whether the cluster supports pod security policies. UsePSP bool MetricsServerTLS certificatemanagement.KeyPairInterface // Namespace to be installed into. Namespace string // List of namespaces that are running a kube-controllers instance that need a cluster role binding. BindingNamespaces []string // Tenant object provides tenant configuration for both single and multi-tenant modes. // If this is nil, then we should run in zero-tenant mode. Tenant *operatorv1.Tenant }
Click to show internal directories.
Click to hide internal directories.