Skip to content
Snippets Groups Projects
Select Git revision
  • master default protected
  • v2.28.0
  • v2.27.0
  • v2.25.1
  • v2.24.3
  • v2.26.0
  • v2.24.2
  • v2.25.0
  • v2.24.1
  • v2.22.2
  • v2.23.3
  • v2.24.0
  • v2.23.2
  • v2.23.1
  • v2.23.0
  • v2.22.1
  • v2.22.0
  • v2.21.0
  • v2.20.0
  • v2.19.1
  • v2.18.2
21 results

kubespray

  • Clone with SSH
  • Clone with HTTPS
  • user avatar
    Aleksandr Didenko authored
    By default Calico CNI does not create any network access policies
    or profiles if 'policy' is enabled in CNI config. And without any
    policies/profiles network access to/from PODs is blocked.
    
    K8s related policies are created by calico-policy-controller in
    such case. So we need to start it as soon as possible, before any
    real workloads.
    
    This patch also fixes kube-api port in calico-policy-controller
    yaml template.
    
    Closes #1132
    3a399040
    History
    Name Last commit Last update