Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
K
Kubespray
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Model registry
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Mirror
Kubespray
Commits
ed1ab110
Commit
ed1ab110
authored
8 years ago
by
Bogdan Dobrelya
Browse files
Options
Downloads
Patches
Plain Diff
Fix misleading HA docs
Signed-off-by:
Bogdan Dobrelya
<
bogdando@mail.ru
>
parent
3b1a196c
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
docs/ha-mode.md
+4
-10
4 additions, 10 deletions
docs/ha-mode.md
with
4 additions
and
10 deletions
docs/ha-mode.md
+
4
−
10
View file @
ed1ab110
...
...
@@ -11,15 +11,9 @@ achieve the same goal.
Etcd
----
Etcd proxies are deployed on each node in the
`k8s-cluster`
group. A proxy is
a separate etcd process. It has a
`localhost:2379`
frontend and all of the etcd
cluster members as backends. Note that the
`access_ip`
is used as the backend
IP, if specified. Frontend endpoints cannot be accessed externally as they are
bound to a localhost only.
The
`etcd_access_endpoint`
fact provides an access pattern for clients. And the
`etcd_multiaccess`
(defaults to
`
fals
e`
) group var controlls that behavior.
When enabled, i
t makes deployed components to access the etcd cluster members
`etcd_multiaccess`
(defaults to
`
Tru
e`
) group var controlls that behavior.
I
t makes deployed components to access the etcd cluster members
directly:
`http://ip1:2379, http://ip2:2379,...`
. This mode assumes the clients
do a loadbalancing and handle HA for connections. Note, a pod definition of a
flannel networking plugin always uses a single
`--etcd-server`
endpoint!
...
...
@@ -34,8 +28,8 @@ non-master Kubernetes node. This is referred to as localhost loadbalancing. It
is less efficient than a dedicated load balancer because it creates extra
health checks on the Kubernetes apiserver, but is more practical for scenarios
where an external LB or virtual IP management is inconvenient. This option is
configured by the variable
`loadbalancer_apiserver_localhost`
. You may also
define the port the local internal loadbalancer users by changing,
configured by the variable
`loadbalancer_apiserver_localhost`
(defaults to
`False`
).
You may also
define the port the local internal loadbalancer users by changing,
`nginx_kube_apiserver_port`
. This defaults to the value of
`kube_apiserver_port`
.
It is also import to note that Kargo will only configure kubelet and kube-proxy
on non-master nodes to use the local internal loadbalancer.
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment