forked from kubernetes-sigs/cluster-api
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Standalone esx (kubernetes-sigs#264)
* add standalone esx support * move all glog to klog * Fixed machine provisioning on ESXi. - fixed boot sequence on some images (e.g. xenial) - fixed sudo on machines without DNS access - fixed cloud provider bootstrap - fixed rbac role preventing machine deletion - refactored templates.go and the esx cloning code Fixed boot sequence on some images by adding a serial port to allow random number initialization. This affect some images like Xenial. It currently adds a serial port to all machines if it doesn't already in the vm spec. Fixed sudo access for machines without DNS access, which for most development scenarios in nested ESXi on dev laptops. Fixed cloud provider bootstrapping on infrastructure that do not have cloud provider support (e.g. ESXi) issue kubernetes-sigs#177
- Loading branch information
1 parent
0ec7a86
commit b5f2a28
Showing
20 changed files
with
4,086 additions
and
629 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -59,3 +59,11 @@ rules: | |
- update | ||
- patch | ||
- delete | ||
- apiGroups: | ||
- "" | ||
resources: | ||
- nodes | ||
verbs: | ||
- list | ||
- get | ||
- watch |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,27 @@ | ||
# Provisioning on ESXi | ||
|
||
This cluster api provider is capable of provisioning clusters on ESXi with some limitations. It was written as a | ||
productivity tool for developers of this provider. Some of the limitations are as follows, | ||
|
||
1. The vSphere cloud provider is not available on ESXi. All features provided by the cloud provider will be | ||
unavailable to clusters provisioned to ESXi. | ||
2. VM cloning is available on vCenter but not on ESXi. The VM creation process currently is unable to resize the | ||
machine's disk yet. This may change in the future. | ||
|
||
Provioning on ESXi is very similar to provisioning on vCenter. Make sure to read the [main Quickstart intro]( | ||
./README.md) to learn the basics. This page will discuss the differences, which are simple changes to the cluster | ||
and machine definition files. The vSphere Cluster API provider will automatically detect whether the infrastructure | ||
is vCenter or ESXi; however, some of the changes to the definition files will ensure the cluster is properly | ||
functioning once it is provisioned. | ||
|
||
### Cluster definition files | ||
|
||
The cluster definition file remain largely the same as for deploying to vCenter. The one thing to watch out for is | ||
to make sure the cidr ranges do not overlap with the subnet of your ESXi's network. If the pod cidr ranges overlap, | ||
the CNI plugin may fail to deploy correctly. As an example, suppose a developer deploys an ESXi host and uses the | ||
internal gateway server as the DNS server, make sure the pod CIDR does not overlap with the ESXi host's DHCP IP range. | ||
|
||
### Machine definition files | ||
|
||
The machine definition files remain largely the same. Make sure to leave `datacenter` and `resourcePool` empty. | ||
These fields are irrelevant for ESXi. |
Oops, something went wrong.