Discover Packages
github.com/taboola/consul2calico
command
module
Version:
v0.0.0-...-4a28188
Opens a new window with list of versions in this module.
Published: Jan 6, 2022
License: Apache-2.0
Opens a new window with license information.
Imports: 11
Opens a new window with list of imports.
Imported by: 0
Opens a new window with list of known importers.
README
README
¶
Consul Calico Sync
Overview
This project will sync/configure calico network policies based on consul KV state.
It will allow ingress/egress traffic from nodes registered in consul to deployments running on kubernetes .
Whenever a node is added to the Hostgroup / rebuilt / changes ip , this project will dynamically change the corresponding calico GlobalNetworkSet.
Getting Started Running with Helm
Create ETCD secret:
kubectl create secret generic etcd-cert \
--from-file=etcd-ca.crt=./etcd-ca.crt.txt \
--from-file=etcd.crt=./etcd.crt.txt \
--from-file=etcd.key=./etcd.key.txt
Build docker image :
docker build -t consul-calico-sync:0.0.1 .
Push to local repository :
docker push http://local-repo:8080/consul-calico-sync:0.0.1 .
Change image in values.yaml
# The name (and tag) of the Docker image for consul2calico sync.
image:
repository: http://local-repo:8080/consul-calico-sync
pullPolicy: Always
tag: 0.0.1
Install chart
helm install -n consul-calico-sync -c ./charts/ --namespace namespace
How to run tests :
Defaults configured for tests :
CALICO_SYNC_INTERVAL=2s CALICO_REMOVE_GRACE_TIME=30m
With logs :
go test ./...
Without logs :
go test ./... -v
Future releases
Add support for Kubernetes API datastore . (Currently this project support Calico deployments with etcd as datastore)
Add support for consul TLS .
Expand ▾
Collapse ▴
Documentation
¶
There is no documentation for this package.
Source Files
¶
Directories
¶
pkg
Click to show internal directories.
Click to hide internal directories.