addon-dir-delete: file.absent: - name: /etc/kubernetes/addons addon-dir-create: file.directory: - name: /etc/kubernetes/addons - user: root - group: root - mode: 0755 - require: - file: addon-dir-delete {% if pillar.get('enable_cluster_monitoring', '').lower() == 'influxdb' %} /etc/kubernetes/addons/cluster-monitoring/influxdb: file.recurse: - source: salt://kube-addons/cluster-monitoring/influxdb - include_pat: E@(^.+\.yaml$|^.+\.json$) - user: root - group: root - dir_mode: 755 - file_mode: 644 {% endif %} {% if pillar.get('enable_cluster_monitoring', '').lower() == 'google' %} /etc/kubernetes/addons/cluster-monitoring/google: file.recurse: - source: salt://kube-addons/cluster-monitoring/google - include_pat: E@(^.+\.yaml$|^.+\.json$) - user: root - group: root - dir_mode: 755 - file_mode: 644 {% endif %} {% if pillar.get('enable_cluster_monitoring', '').lower() == 'standalone' %} /etc/kubernetes/addons/cluster-monitoring/standalone: file.recurse: - source: salt://kube-addons/cluster-monitoring/standalone - include_pat: E@(^.+\.yaml$|^.+\.json$) - user: root - group: root - dir_mode: 755 - file_mode: 644 {% endif %} {% if pillar.get('enable_cluster_monitoring', '').lower() == 'googleinfluxdb' %} /etc/kubernetes/addons/cluster-monitoring/googleinfluxdb: file.recurse: - source: salt://kube-addons/cluster-monitoring - include_pat: E@(^.+\.yaml$|^.+\.json$) - exclude_pat: E@(^.+heapster-controller\.yaml$|^.+heapster-controller\.json$) - user: root - group: root - dir_mode: 755 - file_mode: 644 {% endif %} {% if pillar.get('enable_cluster_dns', '').lower() == 'true' %} /etc/kubernetes/addons/dns/skydns-svc.yaml: file.managed: - source: salt://kube-addons/dns/skydns-svc.yaml.in - template: jinja - group: root - dir_mode: 755 - makedirs: True /etc/kubernetes/addons/dns/skydns-rc.yaml: file.managed: - source: salt://kube-addons/dns/skydns-rc.yaml.in - template: jinja - group: root - dir_mode: 755 - makedirs: True {% endif %} {% if pillar.get('enable_node_logging', '').lower() == 'true' and pillar.get('logging_destination').lower() == 'elasticsearch' and pillar.get('enable_cluster_logging', '').lower() == 'true' %} /etc/kubernetes/addons/fluentd-elasticsearch: file.recurse: - source: salt://kube-addons/fluentd-elasticsearch - include_pat: E@^.+\.yaml$ - user: root - group: root - dir_mode: 755 - file_mode: 644 {% endif %} {% if pillar.get('enable_cluster_ui', 'true').lower() == 'true' %} /etc/kubernetes/addons/kube-ui: file.recurse: - source: salt://kube-addons/kube-ui - include_pat: E@^.+\.yaml$ - user: root - group: root - dir_mode: 755 - file_mode: 644 {% endif %} /etc/kubernetes/kube-addons.sh: file.managed: - source: salt://kube-addons/kube-addons.sh - user: root - group: root - mode: 755 /etc/kubernetes/kube-addon-update.sh: file.managed: - source: salt://kube-addons/kube-addon-update.sh - user: root - group: root - mode: 755 {% if grains['os_family'] == 'RedHat' %} /usr/lib/systemd/system/kube-addons.service: file.managed: - source: salt://kube-addons/kube-addons.service - user: root - group: root {% else %} /etc/init.d/kube-addons: file.managed: - source: salt://kube-addons/initd - user: root - group: root - mode: 755 {% endif %} # Stop kube-addons service each time salt is executed, just in case # there was a modification of addons. # Actually, this should be handled by watching file changes, but # somehow it doesn't work. service-kube-addon-stop: service.dead: - name: kube-addons kube-addons: service.running: - enable: True - require: - service: service-kube-addon-stop