From 044dcbaed023ace6e583e87cf160ef703181013a Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Andreas=20Kr=C3=BCger?= <ak@patientsky.com>
Date: Wed, 8 May 2019 22:38:36 +0200
Subject: [PATCH] Add Kubelet config, remove deprecated flags and fix minor
 bugs (#4724)

* Add kubelet config

* Change kubelet_authorization_mode_webhook to true

* Fix lint

* Sync env file

* Refactor the kubernetes node folder

* Remove deprecated flag and fix lint
---
 roles/kubernetes/client/tasks/main.yml        |  2 +-
 .../templates/kubeadm-client.conf.v1beta1.j2  |  4 +-
 .../azure-credential-check.yml                |  0
 .../openstack-credential-check.yml            |  0
 .../vsphere-credential-check.yml              |  0
 roles/kubernetes/node/tasks/install.yml       |  7 --
 roles/kubernetes/node/tasks/kubelet.yml       | 71 +++++++++++++++++
 .../node/tasks/{ => loadbalancer}/haproxy.yml |  2 +-
 .../tasks/{ => loadbalancer}/nginx-proxy.yml  |  2 +-
 roles/kubernetes/node/tasks/main.yml          | 37 ++-------
 .../{ => cloud-configs}/aws-cloud-config.j2   |  0
 .../{ => cloud-configs}/azure-cloud-config.j2 |  0
 .../openstack-cloud-config.j2                 |  0
 .../vsphere-cloud-config.j2                   |  0
 .../templates/kubelet-config.v1beta1.yaml.j2  | 57 ++++++++++++++
 ...{kubelet.kubeadm.env.j2 => kubelet.env.j2} |  0
 .../node/templates/kubelet.env.v1beta1.j2     | 78 +++++++++++++++++++
 ...let.host.service.j2 => kubelet.service.j2} |  1 -
 .../{ => loadbalancer}/haproxy.cfg.j2         |  0
 .../{ => loadbalancer}/nginx.conf.j2          |  0
 .../node/templates/node-kubeconfig.yaml.j2    |  1 +
 roles/kubespray-defaults/defaults/main.yaml   |  2 +-
 22 files changed, 221 insertions(+), 43 deletions(-)
 rename roles/kubernetes/node/tasks/{ => cloud-credentials}/azure-credential-check.yml (100%)
 rename roles/kubernetes/node/tasks/{ => cloud-credentials}/openstack-credential-check.yml (100%)
 rename roles/kubernetes/node/tasks/{ => cloud-credentials}/vsphere-credential-check.yml (100%)
 create mode 100644 roles/kubernetes/node/tasks/kubelet.yml
 rename roles/kubernetes/node/tasks/{ => loadbalancer}/haproxy.yml (93%)
 rename roles/kubernetes/node/tasks/{ => loadbalancer}/nginx-proxy.yml (93%)
 rename roles/kubernetes/node/templates/{ => cloud-configs}/aws-cloud-config.j2 (100%)
 rename roles/kubernetes/node/templates/{ => cloud-configs}/azure-cloud-config.j2 (100%)
 rename roles/kubernetes/node/templates/{ => cloud-configs}/openstack-cloud-config.j2 (100%)
 rename roles/kubernetes/node/templates/{ => cloud-configs}/vsphere-cloud-config.j2 (100%)
 create mode 100644 roles/kubernetes/node/templates/kubelet-config.v1beta1.yaml.j2
 rename roles/kubernetes/node/templates/{kubelet.kubeadm.env.j2 => kubelet.env.j2} (100%)
 create mode 100644 roles/kubernetes/node/templates/kubelet.env.v1beta1.j2
 rename roles/kubernetes/node/templates/{kubelet.host.service.j2 => kubelet.service.j2} (96%)
 rename roles/kubernetes/node/templates/{ => loadbalancer}/haproxy.cfg.j2 (100%)
 rename roles/kubernetes/node/templates/{ => loadbalancer}/nginx.conf.j2 (100%)

diff --git a/roles/kubernetes/client/tasks/main.yml b/roles/kubernetes/client/tasks/main.yml
index a572ba690..7bef94273 100644
--- a/roles/kubernetes/client/tasks/main.yml
+++ b/roles/kubernetes/client/tasks/main.yml
@@ -62,7 +62,7 @@
     --client-name kubernetes-admin
     --org system:masters
     {% endif %}
-    --cert-dir {{ kube_config_dir }}/ssl
+    --cert-dir {{ kube_cert_dir }}
     --apiserver-advertise-address {{ external_apiserver_address }}
     --apiserver-bind-port {{ external_apiserver_port }}
     {% if kubeadm_version is version('v1.14.0', '>=') %}
diff --git a/roles/kubernetes/kubeadm/templates/kubeadm-client.conf.v1beta1.j2 b/roles/kubernetes/kubeadm/templates/kubeadm-client.conf.v1beta1.j2
index 78e861aeb..1f0f9d847 100644
--- a/roles/kubernetes/kubeadm/templates/kubeadm-client.conf.v1beta1.j2
+++ b/roles/kubernetes/kubeadm/templates/kubeadm-client.conf.v1beta1.j2
@@ -1,3 +1,4 @@
+---
 apiVersion: kubeadm.k8s.io/v1beta1
 kind: JoinConfiguration
 discovery:
@@ -8,7 +9,8 @@ discovery:
     apiServerEndpoint: {{ kubeadm_discovery_address | replace("https://", "")}}
 {% endif %}
     token: {{ kubeadm_token }}
-    unsafeSkipCAVerification: true
+    caCertHashes:
+    - sha256:{{ kubeadm_ca_hash.stdout }}
   timeout: {{ discovery_timeout }}
   tlsBootstrapToken: {{ kubeadm_token }}
 caCertPath: {{ kube_cert_dir }}/ca.crt
diff --git a/roles/kubernetes/node/tasks/azure-credential-check.yml b/roles/kubernetes/node/tasks/cloud-credentials/azure-credential-check.yml
similarity index 100%
rename from roles/kubernetes/node/tasks/azure-credential-check.yml
rename to roles/kubernetes/node/tasks/cloud-credentials/azure-credential-check.yml
diff --git a/roles/kubernetes/node/tasks/openstack-credential-check.yml b/roles/kubernetes/node/tasks/cloud-credentials/openstack-credential-check.yml
similarity index 100%
rename from roles/kubernetes/node/tasks/openstack-credential-check.yml
rename to roles/kubernetes/node/tasks/cloud-credentials/openstack-credential-check.yml
diff --git a/roles/kubernetes/node/tasks/vsphere-credential-check.yml b/roles/kubernetes/node/tasks/cloud-credentials/vsphere-credential-check.yml
similarity index 100%
rename from roles/kubernetes/node/tasks/vsphere-credential-check.yml
rename to roles/kubernetes/node/tasks/cloud-credentials/vsphere-credential-check.yml
diff --git a/roles/kubernetes/node/tasks/install.yml b/roles/kubernetes/node/tasks/install.yml
index 52ad10b6a..fb38da862 100644
--- a/roles/kubernetes/node/tasks/install.yml
+++ b/roles/kubernetes/node/tasks/install.yml
@@ -73,10 +73,3 @@
   args:
     creates: "{{ bin_dir }}/socat"
   when: ansible_os_family in ['CoreOS', 'Container Linux by CoreOS']
-
-- name: install | Write kubelet systemd init file
-  template:
-    src: "kubelet.host.service.j2"
-    dest: "/etc/systemd/system/kubelet.service"
-    backup: "yes"
-  notify: restart kubelet
diff --git a/roles/kubernetes/node/tasks/kubelet.yml b/roles/kubernetes/node/tasks/kubelet.yml
new file mode 100644
index 000000000..6963c965d
--- /dev/null
+++ b/roles/kubernetes/node/tasks/kubelet.yml
@@ -0,0 +1,71 @@
+---
+- name: Make sure dynamic kubelet configuration directory is writeable
+  file:
+    path: "{{ dynamic_kubelet_configuration_dir }}"
+    mode: 0600
+    state: directory
+  when: dynamic_kubelet_configuration
+
+- name: gets the kubeadm version
+  command: "{{ bin_dir }}/kubeadm version -o short"
+  register: kubeadm_output
+
+- name: sets kubeadm api version to v1beta1
+  set_fact:
+    kubeadmConfig_api_version: v1beta1
+  when: kubeadm_output.stdout is version('v1.13.0', '>=')
+  tags:
+    - kubelet
+    - kubeadm
+
+- name: Write kubelet environment config file (kubeadm)
+  template:
+    src: "kubelet.env.{{ kubeadmConfig_api_version }}.j2"
+    dest: "{{ kube_config_dir }}/kubelet.env"
+    backup: yes
+  notify: restart kubelet
+  when: kubeadm_output.stdout is version('v1.13.0', '>=')
+  tags:
+    - kubelet
+    - kubeadm
+
+- name: Write kubelet environment config file (kubeadm)
+  template:
+    src: "kubelet.env.j2"
+    dest: "{{ kube_config_dir }}/kubelet.env"
+    backup: yes
+  notify: restart kubelet
+  when: kubeadm_output.stdout is version('v1.13.0', '<')
+  tags:
+    - kubelet
+    - kubeadm
+
+- name: Write kubelet config file
+  template:
+    src: "kubelet-config.{{ kubeadmConfig_api_version }}.yaml.j2"
+    dest: "{{ kube_config_dir }}/kubelet-config.yaml"
+  when: kubeadm_output.stdout is version('v1.13.0', '>=')
+  tags:
+    - kubelet
+    - kubeadm
+
+- name: Write kubelet systemd init file
+  template:
+    src: "kubelet.service.j2"
+    dest: "/etc/systemd/system/kubelet.service"
+    backup: "yes"
+  notify: restart kubelet
+  tags:
+    - kubelet
+    - kubeadm
+
+- name: flush_handlers and reload-systemd
+  meta: flush_handlers
+
+- name: Enable kubelet
+  service:
+    name: kubelet
+    enabled: yes
+    state: started
+  tags:
+    - kubelet
\ No newline at end of file
diff --git a/roles/kubernetes/node/tasks/haproxy.yml b/roles/kubernetes/node/tasks/loadbalancer/haproxy.yml
similarity index 93%
rename from roles/kubernetes/node/tasks/haproxy.yml
rename to roles/kubernetes/node/tasks/loadbalancer/haproxy.yml
index ed899a3f4..e7cb579a6 100644
--- a/roles/kubernetes/node/tasks/haproxy.yml
+++ b/roles/kubernetes/node/tasks/loadbalancer/haproxy.yml
@@ -18,7 +18,7 @@
 
 - name: haproxy | Write haproxy configuration
   template:
-    src: haproxy.cfg.j2
+    src: "loadbalancer/haproxy.cfg.j2"
     dest: "{{ haproxy_config_dir }}/haproxy.cfg"
     owner: root
     mode: 0755
diff --git a/roles/kubernetes/node/tasks/nginx-proxy.yml b/roles/kubernetes/node/tasks/loadbalancer/nginx-proxy.yml
similarity index 93%
rename from roles/kubernetes/node/tasks/nginx-proxy.yml
rename to roles/kubernetes/node/tasks/loadbalancer/nginx-proxy.yml
index 36c1d7306..e19101379 100644
--- a/roles/kubernetes/node/tasks/nginx-proxy.yml
+++ b/roles/kubernetes/node/tasks/loadbalancer/nginx-proxy.yml
@@ -18,7 +18,7 @@
 
 - name: nginx-proxy | Write nginx-proxy configuration
   template:
-    src: nginx.conf.j2
+    src: "loadbalancer/nginx.conf.j2"
     dest: "{{ nginx_config_dir }}/nginx.conf"
     owner: root
     mode: 0755
diff --git a/roles/kubernetes/node/tasks/main.yml b/roles/kubernetes/node/tasks/main.yml
index 0a593b3a0..71a2679d0 100644
--- a/roles/kubernetes/node/tasks/main.yml
+++ b/roles/kubernetes/node/tasks/main.yml
@@ -17,7 +17,7 @@
   tags:
     - kubelet
 
-- import_tasks: nginx-proxy.yml
+- import_tasks: loadbalancer/nginx-proxy.yml
   when:
     - not is_kube_master
     - loadbalancer_apiserver_localhost
@@ -25,7 +25,7 @@
   tags:
     - nginx
 
-- import_tasks: haproxy.yml
+- import_tasks: loadbalancer/haproxy.yml
   when:
     - not is_kube_master
     - loadbalancer_apiserver_localhost
@@ -33,23 +33,6 @@
   tags:
     - haproxy
 
-- name: Make sure dynamic kubelet configuration directory is writeable
-  file:
-    path: "{{ dynamic_kubelet_configuration_dir }}"
-    mode: 0600
-    state: directory
-  when: dynamic_kubelet_configuration
-
-- name: Write kubelet config file (kubeadm)
-  template:
-    src: kubelet.kubeadm.env.j2
-    dest: "{{ kube_config_dir }}/kubelet.env"
-    backup: yes
-  notify: restart kubelet
-  tags:
-    - kubelet
-    - kubeadm
-
 - name: Ensure nodePort range is reserved
   sysctl:
     name: net.ipv4.ip_local_reserved_ports
@@ -99,7 +82,7 @@
     name: "{{ item }}"
     state: present
     sysctl_file: "{{ sysctl_file_path }}"
-    value: 1
+    value: "1"
     reload: yes
   when: sysctl_bridge_nf_call_iptables.rc == 0
   with_items:
@@ -175,7 +158,7 @@
   tags:
     - kube-proxy
 
-- include_tasks: "{{ cloud_provider }}-credential-check.yml"
+- include_tasks: "cloud-credentials/{{ cloud_provider }}-credential-check.yml"
   when:
     - cloud_provider is defined
     - cloud_provider in [ 'openstack', 'azure', 'vsphere' ]
@@ -200,7 +183,7 @@
 
 - name: Write cloud-config
   template:
-    src: "{{ cloud_provider }}-cloud-config.j2"
+    src: "cloud-configs/{{ cloud_provider }}-cloud-config.j2"
     dest: "{{ kube_config_dir }}/cloud_config"
     group: "{{ kube_cert_group }}"
     mode: 0640
@@ -211,13 +194,7 @@
   tags:
     - cloud-provider
 
-# reload-systemd
-- meta: flush_handlers
-
-- name: Enable kubelet
-  service:
-    name: kubelet
-    enabled: yes
-    state: started
+- import_tasks: kubelet.yml
   tags:
     - kubelet
+    - kubeadm
\ No newline at end of file
diff --git a/roles/kubernetes/node/templates/aws-cloud-config.j2 b/roles/kubernetes/node/templates/cloud-configs/aws-cloud-config.j2
similarity index 100%
rename from roles/kubernetes/node/templates/aws-cloud-config.j2
rename to roles/kubernetes/node/templates/cloud-configs/aws-cloud-config.j2
diff --git a/roles/kubernetes/node/templates/azure-cloud-config.j2 b/roles/kubernetes/node/templates/cloud-configs/azure-cloud-config.j2
similarity index 100%
rename from roles/kubernetes/node/templates/azure-cloud-config.j2
rename to roles/kubernetes/node/templates/cloud-configs/azure-cloud-config.j2
diff --git a/roles/kubernetes/node/templates/openstack-cloud-config.j2 b/roles/kubernetes/node/templates/cloud-configs/openstack-cloud-config.j2
similarity index 100%
rename from roles/kubernetes/node/templates/openstack-cloud-config.j2
rename to roles/kubernetes/node/templates/cloud-configs/openstack-cloud-config.j2
diff --git a/roles/kubernetes/node/templates/vsphere-cloud-config.j2 b/roles/kubernetes/node/templates/cloud-configs/vsphere-cloud-config.j2
similarity index 100%
rename from roles/kubernetes/node/templates/vsphere-cloud-config.j2
rename to roles/kubernetes/node/templates/cloud-configs/vsphere-cloud-config.j2
diff --git a/roles/kubernetes/node/templates/kubelet-config.v1beta1.yaml.j2 b/roles/kubernetes/node/templates/kubelet-config.v1beta1.yaml.j2
new file mode 100644
index 000000000..2beef8bf1
--- /dev/null
+++ b/roles/kubernetes/node/templates/kubelet-config.v1beta1.yaml.j2
@@ -0,0 +1,57 @@
+apiVersion: kubelet.config.k8s.io/v1beta1
+kind: KubeletConfiguration
+nodeStatusUpdateFrequency: "{{ kubelet_status_update_frequency }}"
+failSwapOn: {{ kubelet_fail_swap_on|default(true) }}
+authentication:
+  anonymous:
+    enabled: false
+  webhook:
+    enabled: {{ kubelet_authentication_token_webhook }}
+  x509:
+    clientCAFile: {{ kube_cert_dir }}/ca.crt
+authorization:
+{% if kubelet_authorization_mode_webhook %}
+  mode: Webhook
+{% else %}
+  mode: AlwaysAllow
+{% endif %}
+{% if kubelet_enforce_node_allocatable is defined and kubelet_enforce_node_allocatable != "\"\"" %}
+{% set kubelet_enforce_node_allocatable_list = kubelet_enforce_node_allocatable.split() %}
+enforceNodeAllocatable:
+{% for item in kubelet_enforce_node_allocatable_list %}
+- {{ item }}
+{% endfor %}
+{% endif %}
+staticPodPath: {{ kube_manifest_dir }}
+cgroupDriver: {{ kubelet_cgroup_driver|default(kubelet_cgroup_driver_detected) }}
+maxPods: {{ kubelet_max_pods }}
+address: {{ kubelet_bind_address }}
+readOnlyPort: {{ kube_read_only_port }}
+kubeletCgroups: {{ kubelet_kubelet_cgroups }}
+clusterDomain: {{ dns_domain }}
+{# DNS settings for kubelet #}
+{% if enable_nodelocaldns %}
+{% set kubelet_cluster_dns = [nodelocaldns_ip] %}
+{% elif dns_mode in ['coredns'] %}
+{% set kubelet_cluster_dns = [skydns_server] %}
+{% elif dns_mode == 'coredns_dual' %}
+{% set kubelet_cluster_dns = [skydns_server,skydns_server_secondary] %}
+{% elif dns_mode == 'manual' %}
+{% set kubelet_cluster_dns = [manual_dns_server] %}
+{% else %}
+{% set kubelet_cluster_dns = [] %}
+{% endif %}
+clusterDNS:
+{% for dns_address in kubelet_cluster_dns %}
+- {{ dns_address }}
+{% endfor %}
+{# Node reserved CPU/memory #}
+kubeReserved:
+{% if is_kube_master|bool %}
+  cpu: {{ kube_master_cpu_reserved }}
+  memory: {{ kube_master_memory_reserved|regex_replace('Mi', 'M') }}
+{% else %}
+  cpu: {{ kube_cpu_reserved }}
+  memory: {{ kube_memory_reserved|regex_replace('Mi', 'M') }}
+{% endif %}
+resolvConf: "{{ kube_resolv_conf }}"
\ No newline at end of file
diff --git a/roles/kubernetes/node/templates/kubelet.kubeadm.env.j2 b/roles/kubernetes/node/templates/kubelet.env.j2
similarity index 100%
rename from roles/kubernetes/node/templates/kubelet.kubeadm.env.j2
rename to roles/kubernetes/node/templates/kubelet.env.j2
diff --git a/roles/kubernetes/node/templates/kubelet.env.v1beta1.j2 b/roles/kubernetes/node/templates/kubelet.env.v1beta1.j2
new file mode 100644
index 000000000..e86ee4565
--- /dev/null
+++ b/roles/kubernetes/node/templates/kubelet.env.v1beta1.j2
@@ -0,0 +1,78 @@
+KUBE_LOGTOSTDERR="--logtostderr=true"
+KUBE_LOG_LEVEL="--v={{ kube_log_level }}"
+KUBELET_ADDRESS="--node-ip={{ kubelet_address }}"
+{% if kube_override_hostname|default('') %}
+KUBELET_HOSTNAME="--hostname-override={{ kube_override_hostname }}"
+{% endif %}
+
+{# Base kubelet args #}
+{% set kubelet_args_base -%}
+{# start kubeadm specific settings #}
+--bootstrap-kubeconfig=/etc/kubernetes/bootstrap-kubelet.conf \
+--config={{ kube_config_dir }}/kubelet-config.yaml \
+--kubeconfig={{ kube_config_dir }}/kubelet.conf \
+{% if kube_version is version('v1.8', '<') %}
+--require-kubeconfig \
+{% endif %}
+{% if kube_version is version('v1.12.0', '<') %}
+--cadvisor-port={{ kube_cadvisor_port }} \
+{% endif %}
+{# end kubeadm specific settings #}
+--pod-infra-container-image={{ pod_infra_image_repo }}:{{ pod_infra_image_tag }} \
+{% if container_manager == 'docker' and kube_version is version('v1.12.0', '<') %}
+--docker-disable-shared-pid={{ kubelet_disable_shared_pid }} \
+{% endif %}
+{% if container_manager == 'crio' %}
+--container-runtime=remote \
+--container-runtime-endpoint=/var/run/crio/crio.sock \
+{% endif %}
+{% if kube_version is version('v1.8', '<') %}
+--experimental-fail-swap-on={{ kubelet_fail_swap_on|default(true)}} \
+{% endif %}
+{% if dynamic_kubelet_configuration %}
+--dynamic-config-dir={{ dynamic_kubelet_configuration_dir }} \
+{% endif %}
+--runtime-cgroups={{ kubelet_runtime_cgroups }} \
+{% endset %}
+
+{# Kubelet node labels #}
+{% set role_node_labels = [] %}
+{% if nvidia_gpu_nodes is defined and nvidia_accelerator_enabled|bool %}
+{%   if inventory_hostname in nvidia_gpu_nodes %}
+{%     set dummy = role_node_labels.append('nvidia.com/gpu=true')  %}
+{%   endif %}
+{% endif %}
+
+{% set inventory_node_labels = [] %}
+{% if node_labels is defined and node_labels is mapping %}
+{%   for labelname, labelvalue in node_labels.items() %}
+{%     set dummy = inventory_node_labels.append('%s=%s'|format(labelname, labelvalue)) %}
+{%   endfor %}
+{% endif %}
+{% set all_node_labels = role_node_labels + inventory_node_labels %}
+
+{# Kubelet node taints for gpu #}
+{% if nvidia_gpu_nodes is defined and nvidia_accelerator_enabled|bool %}
+{%   if inventory_hostname in nvidia_gpu_nodes and node_taints is defined %}
+{%       set dummy = node_taints.append('nvidia.com/gpu=:NoSchedule') %}
+{%   elif inventory_hostname in nvidia_gpu_nodes and node_taints is not defined %}
+{%       set node_taints = [] %}
+{%       set dummy = node_taints.append('nvidia.com/gpu=:NoSchedule') %}
+{%   endif %}
+{% endif %}
+
+KUBELET_ARGS="{{ kubelet_args_base }} {% if node_taints|default([]) %}--register-with-taints={{ node_taints | join(',') }} {% endif %}--node-labels={{ all_node_labels | join(',') }} {% if kube_feature_gates %} --feature-gates={{ kube_feature_gates|join(',') }} {% endif %} {% if kubelet_custom_flags is string %} {{kubelet_custom_flags}} {% else %}{% for flag in kubelet_custom_flags %} {{flag}} {% endfor %}{% endif %}{% if inventory_hostname in groups['kube-node'] %}{% if kubelet_node_custom_flags is string %} {{kubelet_node_custom_flags}} {% else %}{% for flag in kubelet_node_custom_flags %} {{flag}} {% endfor %}{% endif %}{% endif %}"
+{% if kube_network_plugin is defined and kube_network_plugin in ["calico", "canal", "cni", "flannel", "weave", "contiv", "cilium", "kube-router"] %}
+KUBELET_NETWORK_PLUGIN="--network-plugin=cni --cni-conf-dir=/etc/cni/net.d --cni-bin-dir=/opt/cni/bin"
+{% elif kube_network_plugin is defined and kube_network_plugin == "cloud" %}
+KUBELET_NETWORK_PLUGIN="--hairpin-mode=promiscuous-bridge --network-plugin=kubenet"
+{% endif %}
+{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws"] %}
+KUBELET_CLOUDPROVIDER="--cloud-provider={{ cloud_provider }} --cloud-config={{ kube_config_dir }}/cloud_config"
+{% elif cloud_provider is defined and cloud_provider in ["external"] %}
+KUBELET_CLOUDPROVIDER="--cloud-provider=external --cloud-config={{ kube_config_dir }}/cloud_config"
+{% else %}
+KUBELET_CLOUDPROVIDER=""
+{% endif %}
+
+PATH={{ bin_dir }}:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
\ No newline at end of file
diff --git a/roles/kubernetes/node/templates/kubelet.host.service.j2 b/roles/kubernetes/node/templates/kubelet.service.j2
similarity index 96%
rename from roles/kubernetes/node/templates/kubelet.host.service.j2
rename to roles/kubernetes/node/templates/kubelet.service.j2
index 96de60d6e..4b4dce7c7 100644
--- a/roles/kubernetes/node/templates/kubelet.host.service.j2
+++ b/roles/kubernetes/node/templates/kubelet.service.j2
@@ -15,7 +15,6 @@ ExecStart={{ bin_dir }}/kubelet \
 		$KUBELET_ADDRESS \
 		$KUBELET_PORT \
 		$KUBELET_HOSTNAME \
-		$KUBE_ALLOW_PRIV \
 		$KUBELET_ARGS \
 		$DOCKER_SOCKET \
 		$KUBELET_NETWORK_PLUGIN \
diff --git a/roles/kubernetes/node/templates/haproxy.cfg.j2 b/roles/kubernetes/node/templates/loadbalancer/haproxy.cfg.j2
similarity index 100%
rename from roles/kubernetes/node/templates/haproxy.cfg.j2
rename to roles/kubernetes/node/templates/loadbalancer/haproxy.cfg.j2
diff --git a/roles/kubernetes/node/templates/nginx.conf.j2 b/roles/kubernetes/node/templates/loadbalancer/nginx.conf.j2
similarity index 100%
rename from roles/kubernetes/node/templates/nginx.conf.j2
rename to roles/kubernetes/node/templates/loadbalancer/nginx.conf.j2
diff --git a/roles/kubernetes/node/templates/node-kubeconfig.yaml.j2 b/roles/kubernetes/node/templates/node-kubeconfig.yaml.j2
index 0951f2342..4b8af6020 100644
--- a/roles/kubernetes/node/templates/node-kubeconfig.yaml.j2
+++ b/roles/kubernetes/node/templates/node-kubeconfig.yaml.j2
@@ -1,3 +1,4 @@
+---
 apiVersion: v1
 kind: Config
 clusters:
diff --git a/roles/kubespray-defaults/defaults/main.yaml b/roles/kubespray-defaults/defaults/main.yaml
index c0401cd24..8a9478380 100644
--- a/roles/kubespray-defaults/defaults/main.yaml
+++ b/roles/kubespray-defaults/defaults/main.yaml
@@ -314,7 +314,7 @@ rbac_enabled: "{{ 'RBAC' in authorization_modes }}"
 kubelet_authentication_token_webhook: true
 
 # When enabled, access to the kubelet API requires authorization by delegation to the API server
-kubelet_authorization_mode_webhook: false
+kubelet_authorization_mode_webhook: true
 
 # kubelet uses certificates for authenticating to the Kubernetes API
 # Automatically generate a new key and request a new certificate from the Kubernetes API as the current certificate approaches expiration
-- 
GitLab