diff --git a/ansible/roles/traffic-engine/files/helm/templates/_config.tpl b/ansible/roles/traffic-engine/files/helm/templates/_config.tpl index 3cacd38b..7b8f1054 100644 --- a/ansible/roles/traffic-engine/files/helm/templates/_config.tpl +++ b/ansible/roles/traffic-engine/files/helm/templates/_config.tpl @@ -163,7 +163,7 @@ enable_breakpad_upload=0 {{- end -}} -{{- define "traffic-engine.public.prepare-access-API" -}} +{{- define "public.prepare-access-API" -}} export APISERVER=https://kubernetes.default.svc export SERVICEACCOUNT=/var/run/secrets/kubernetes.io/serviceaccount export NAMESPACE=$(cat ${SERVICEACCOUNT}/namespace) @@ -172,8 +172,7 @@ export CACERT=${SERVICEACCOUNT}/ca.crt {{- end -}} -{{- define "traffic-engine.init" -}} -{{- include "traffic-engine.public.prepare-access-API" . }} +{{- define "public.serialize-node-annotations" -}} curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/nodes/${NODE_NAME} -o /tmp/node-${NODE_NAME}.json export DEVICE_SN=$(cat /tmp/node-${NODE_NAME}.json | jq -r '.metadata.annotations."tsg-os/device-sn"') mkdir -p /target_config/opt/tsg/etc @@ -182,18 +181,6 @@ echo "{\"sn\": \"$DEVICE_SN\"}" > /target_config/opt/tsg/etc/tsg_sn.json echo "export device_id=${DEVICE_SN}" > /target_config/etc/profile.d/device_id.sh {{- end -}} -{{- define "traffic-engine.init.sce" -}} -{{ if .Values.sce_config.vxlan_config.endpoint_nic }} - ip tuntap add dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} mode tap - ip link set dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} up - ip route add {{ .Values.sce_config.vxlan_config.endpoint_netip }}/{{ .Values.sce_config.vxlan_config.endpoint_mask }} dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} table 10 -{{ if .Values.sce_config.vxlan_config.endpoint_gateway }} - ip route add default via {{ .Values.sce_config.vxlan_config.endpoint_gateway }} table 10 -{{- end }} - ip a a {{ .Values.sce_config.vxlan_config.endpoint_ip }}/{{ .Values.sce_config.vxlan_config.endpoint_mask }} dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} noprefixroute - ip rule add dport 3784 table 10 -{{- end }} -{{- end -}} {{/* #tfe-env-stop.sh @@ -217,20 +204,6 @@ echo "export device_id=${DEVICE_SN}" > /target_config/etc/profile.d/device_id.sh cp /opt/tsg/config/tsg_device_tag.json /opt/tsg/etc/tsg_device_tag.json {{- end -}} -{{- define "traffic-engine.shaping.get-service-node-port" -}} - export APISERVER=https://kubernetes.default.svc - export SERVICEACCOUNT=/var/run/secrets/kubernetes.io/serviceaccount - export NAMESPACE=$(cat ${SERVICEACCOUNT}/namespace) - export TOKEN=$(cat ${SERVICEACCOUNT}/token) - export CACERT=${SERVICEACCOUNT}/ca.crt - curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/${NAMESPACE}/services/${SERVICENAME} -o /tmp/service.txt - export CLUSTER_ANNOUNCE_PORT=$(cat /tmp/service.txt | jq '.spec.ports[] | select(.name=="cluster-announce-port") | .nodePort') - export HEALTH_CHECK_ANNOUNCE_PORT=$(cat /tmp/service.txt | jq '.spec.ports[] | select(.name=="healthcheck-announce-port") | .nodePort') - echo "export CLUSTER_ANNOUNCE_PORT=${CLUSTER_ANNOUNCE_PORT}" > /etc/profile.d/announceinfo.sh - echo "export HEALTH_CHECK_ANNOUNCE_PORT=${HEALTH_CHECK_ANNOUNCE_PORT}" >> /etc/profile.d/announceinfo.sh - chmod 0755 /etc/profile.d/announceinfo.sh -{{- end -}} - {{- define "traffic-engine.shaping.set-shaping-config" -}} sed -Ei "s|NODE_IP_LOCATION|${NODE_IP?}|g" /opt/tsg/shaping_engine/conf/shaping.conf sed -Ei "s|CLUSTER_ANNOUNCE_PORT_LOCATION|${CLUSTER_ANNOUNCE_PORT?}|g" /opt/tsg/shaping_engine/conf/shaping.conf @@ -559,56 +532,15 @@ echo "export device_id=${DEVICE_SN}" > /target_config/etc/profile.d/device_id.sh {{- define "traffic-engine.global.cm.read-server-ip" -}} {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - export APISERVER=https://kubernetes.default.svc - export SERVICEACCOUNT=/var/run/secrets/kubernetes.io/serviceaccount - export TOKEN=$(cat ${SERVICEACCOUNT}/token) - export CACERT=${SERVICEACCOUNT}/ca.crt - curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/tsg-os-system/services/${CM_CACHE_SERVICE_NAME} -o /tmp/cm-cache.txt - export CM_POLICY_LOCAL_CACHE_IP=$(cat /tmp/cm-cache.txt | jq -r '.spec.clusterIP') - echo "export CM_POLICY_LOCAL_CACHE_IP=${CM_POLICY_LOCAL_CACHE_IP}" > /etc/profile.d/cm-local-cache.sh - chmod 0755 /etc/profile.d/cm-local-cache.sh +{{ include "public.prepare-access-API" . }} +curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/tsg-os-system/services/${CM_CACHE_SERVICE_NAME} -o /tmp/cm-cache.txt +export CM_POLICY_LOCAL_CACHE_IP=$(cat /tmp/cm-cache.txt | jq -r '.spec.clusterIP') +echo "export CM_POLICY_LOCAL_CACHE_IP=${CM_POLICY_LOCAL_CACHE_IP}" > /etc/profile.d/cm-local-cache.sh +chmod 0755 /etc/profile.d/cm-local-cache.sh {{- end }} {{- end -}} -{{- define "traffic-engine.global.cm.env-service-name" -}} -{{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - - name: CM_CACHE_SERVICE_NAME - value: {{ .Values.external_resources.cm.local_cache.cache_name }}-redis-master -{{- end }} -{{- end -}} - - -{{- define "traffic-engine.firewall.set-redis-ip" -}} -{{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/sapp/tsgconf/maat.conf -{{- end }} -{{- end -}} - -{{- define "traffic-engine.proxy.certstore.set-redis-ip" -}} -{{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/certstore/conf/cert_store.ini -{{- end }} -{{- end -}} - -{{- define "traffic-engine.proxy.tfe.set-redis-ip" -}} -{{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/tfe/conf/tfe/tfe.conf -{{- end }} -{{- end -}} - -{{- define "traffic-engine.sce.set-redis-ip" -}} -{{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/sce/conf/sce.conf -{{- end }} -{{- end -}} - -{{- define "traffic-engine.shaping.set-redis-ip" -}} -{{- if eq .Values.external_resources.cm.connectivity "local_cache" }} - sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/shaping_engine/conf/shaping.conf -{{- end }} -{{- end -}} - {{- define "traffic-engine.volume.dev-shm" -}} - name: dev-shm hostPath: @@ -643,33 +575,11 @@ echo "export device_id=${DEVICE_SN}" > /target_config/etc/profile.d/device_id.sh {{- define "traffic-engine.global.sd.read-server-ip" -}} {{- if eq .Values.external_resources.sd.enable .Values.define_enable_val_yes }} {{- if eq .Values.external_resources.sd.connectivity "local_cache" }} - export APISERVER=https://kubernetes.default.svc - export SERVICEACCOUNT=/var/run/secrets/kubernetes.io/serviceaccount - export TOKEN=$(cat ${SERVICEACCOUNT}/token) - export CACERT=${SERVICEACCOUNT}/ca.crt - curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/tsg-os-system/services/${SD_CACHE_SERVICE_NAME} -o /tmp/sd-cache.txt - export SD_POLICY_LOCAL_CACHE_IP=$(cat /tmp/sd-cache.txt | jq -r '.spec.clusterIP') - echo "export SD_POLICY_LOCAL_CACHE_IP=${SD_POLICY_LOCAL_CACHE_IP}" > /etc/profile.d/sd-local-cache.sh - chmod 0755 /etc/profile.d/sd-local-cache.sh -{{- end }} -{{- end }} -{{- end -}} - - -{{- define "traffic-engine.global.sd.env-service-name" -}} -{{- if eq .Values.external_resources.sd.enable .Values.define_enable_val_yes }} -{{- if eq .Values.external_resources.sd.connectivity "local_cache" }} - - name: SD_CACHE_SERVICE_NAME - value: {{ .Values.external_resources.sd.local_cache.cache_name }}-redis-master -{{- end }} -{{- end }} -{{- end -}} - - -{{- define "traffic-engine.firewall.sd.set-redis-ip" -}} -{{- if eq .Values.external_resources.sd.enable .Values.define_enable_val_yes }} -{{- if eq .Values.external_resources.sd.connectivity "local_cache" }} - sed -Ei "s|SD_POLICY_LOCAL_CACHE_IP_LOCATION|${SD_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/sapp/tsgconf/maat.conf +{{ include "public.prepare-access-API" . }} +curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/tsg-os-system/services/${SD_CACHE_SERVICE_NAME} -o /tmp/sd-cache.txt +export SD_POLICY_LOCAL_CACHE_IP=$(cat /tmp/sd-cache.txt | jq -r '.spec.clusterIP') +echo "export SD_POLICY_LOCAL_CACHE_IP=${SD_POLICY_LOCAL_CACHE_IP}" > /etc/profile.d/sd-local-cache.sh +chmod 0755 /etc/profile.d/sd-local-cache.sh {{- end }} {{- end }} {{- end -}} diff --git a/ansible/roles/traffic-engine/files/helm/templates/deployment-firewall.yaml b/ansible/roles/traffic-engine/files/helm/templates/deployment-firewall.yaml index fa549b00..15afbdf8 100644 --- a/ansible/roles/traffic-engine/files/helm/templates/deployment-firewall.yaml +++ b/ansible/roles/traffic-engine/files/helm/templates/deployment-firewall.yaml @@ -45,10 +45,14 @@ spec: - | ldconfig {{ template "traffic-engine.firewall.copy-config-to-dest" . }} - {{ template "traffic-engine.global.cm.read-server-ip" . }} - {{ template "traffic-engine.firewall.set-redis-ip" . }} - {{ template "traffic-engine.global.sd.read-server-ip" . }} - {{ template "traffic-engine.firewall.sd.set-redis-ip" . }} + {{- include "traffic-engine.global.cm.read-server-ip" . | nindent 12 }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/sapp/tsgconf/maat.conf + {{- end }} + {{- include "traffic-engine.global.sd.read-server-ip" . | nindent 12 }} + {{- if eq .Values.external_resources.sd.connectivity "local_cache" }} + sed -Ei "s|SD_POLICY_LOCAL_CACHE_IP_LOCATION|${SD_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/sapp/tsgconf/maat.conf + {{- end }} {{ template "traffic-engine.firewall.prestart" . }} {{ template "traffic-engine.firewall.start" . }} ports: @@ -66,8 +70,16 @@ spec: valueFrom: fieldRef: fieldPath: status.hostIP - {{ template "traffic-engine.global.cm.env-service-name" . }} - {{ template "traffic-engine.global.sd.env-service-name" . }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + - name: CM_CACHE_SERVICE_NAME + value: {{ .Values.external_resources.cm.local_cache.cache_name }}-redis-master + {{- end }} + {{- if eq .Values.external_resources.sd.enable .Values.define_enable_val_yes }} + {{- if eq .Values.external_resources.sd.connectivity "local_cache" }} + - name: SD_CACHE_SERVICE_NAME + value: {{ .Values.external_resources.sd.local_cache.cache_name }}-redis-master + {{- end }} + {{- end }} securityContext: privileged: true {{- if eq .Values.debug.firewall.enable_liveness_probe .Values.define_enable_val_yes }} @@ -83,9 +95,7 @@ spec: periodSeconds: 10 {{- end }} volumeMounts: - - name: sapp - mountPath: "/opt/tsg/config" - - name: config-volume + - name: shared-configs-volume mountPath: "/opt/tsg/etc/tsg_sn.json" subPath: "opt/tsg/etc/tsg_sn.json" - name: firewall-minidump @@ -162,7 +172,9 @@ spec: - "bash" - "-ec" - | - {{- include "traffic-engine.init" . | nindent 12 }} + cp -r /opt/tsg/configs/* /opt/tsg/shared-configs + {{- include "public.prepare-access-API" . | nindent 12 }} + {{- include "public.serialize-node-annotations" . | nindent 12 }} securityContext: privileged: true env: @@ -175,17 +187,19 @@ spec: fieldRef: fieldPath: spec.nodeName volumeMounts: - - name: config-volume - mountPath: /target_config + - name: shared-configs-volume + mountPath: /opt/tsg/shared-configs + - name: app-configs-volume + mountPath: "/opt/tsg/config" - name: localtime-node mountPath: /etc/localtime readOnly: true volumes: - - name: sapp + - name: app-configs-volume configMap: name: sapp-{{ .Release.Name }} - - name: config-volume + - name: shared-configs-volume emptyDir: {} - name: metrics-json-dir emptyDir: {} diff --git a/ansible/roles/traffic-engine/files/helm/templates/deployment-proxy.yaml b/ansible/roles/traffic-engine/files/helm/templates/deployment-proxy.yaml index d301c553..6074e0da 100644 --- a/ansible/roles/traffic-engine/files/helm/templates/deployment-proxy.yaml +++ b/ansible/roles/traffic-engine/files/helm/templates/deployment-proxy.yaml @@ -47,8 +47,10 @@ spec: - | ldconfig {{ template "traffic-engine.proxy.copy-config-to-dest" . }} - {{ template "traffic-engine.global.cm.read-server-ip" . }} - {{ template "traffic-engine.proxy.tfe.set-redis-ip" . }} + {{- include "traffic-engine.global.cm.read-server-ip" . | nindent 12 }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/tfe/conf/tfe/tfe.conf + {{- end }} {{ template "traffic-engine.proxy.prestart" . }} {{ template "traffic-engine.proxy.start" . }} ports: @@ -62,7 +64,10 @@ spec: valueFrom: fieldRef: fieldPath: status.hostIP - {{ template "traffic-engine.global.cm.env-service-name" . }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + - name: CM_CACHE_SERVICE_NAME + value: {{ .Values.external_resources.cm.local_cache.cache_name }}-redis-master + {{- end }} securityContext: privileged: true {{- if eq .Values.debug.proxy.enable_liveness_probe .Values.define_enable_val_yes }} @@ -102,8 +107,10 @@ spec: - "-ec" - | {{ template "traffic-engine.certstore.copy-config-to-dest" . }} - {{ template "traffic-engine.global.cm.read-server-ip" . }} - {{ template "traffic-engine.proxy.certstore.set-redis-ip" . }} + {{- include "traffic-engine.global.cm.read-server-ip" . | nindent 12 }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/certstore/conf/cert_store.ini + {{- end }} {{ template "traffic-engine.certstore.prestart" . }} exec /opt/tsg/certstore/bin/certstore securityContext: @@ -115,7 +122,10 @@ spec: valueFrom: fieldRef: fieldPath: status.hostIP - {{ template "traffic-engine.global.cm.env-service-name" . }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + - name: CM_CACHE_SERVICE_NAME + value: {{ .Values.external_resources.cm.local_cache.cache_name }}-redis-master + {{- end }} volumeMounts: {{ template "traffic-engine.mount.localtime" . }} - name: certstore @@ -211,8 +221,6 @@ spec: # disable tcp windows scaling for kernel bugs sysctl -w net.ipv4.tcp_window_scaling=0 - - {{ include "traffic-engine.init" . | nindent 12 }} ip tuntap add dev tap0 mode tap multi_queue /usr/sbin/ip link set tap0 address fe:65:b7:03:50:bd /usr/sbin/ip link set tap0 up @@ -276,6 +284,9 @@ spec: /usr/sbin/ip -6 rule add iif tap_c tab 102 /usr/sbin/ip -6 rule add iif tap_s tab 102 + {{ include "public.prepare-access-API" . | nindent 12 }} + {{- include "public.serialize-node-annotations" . | nindent 12 }} + securityContext: privileged: true env: diff --git a/ansible/roles/traffic-engine/files/helm/templates/deployment-service-chaining.yaml b/ansible/roles/traffic-engine/files/helm/templates/deployment-service-chaining.yaml index cae9ad48..883b2c91 100644 --- a/ansible/roles/traffic-engine/files/helm/templates/deployment-service-chaining.yaml +++ b/ansible/roles/traffic-engine/files/helm/templates/deployment-service-chaining.yaml @@ -47,8 +47,10 @@ spec: - | ldconfig {{ template "traffic-engine.sce.copy-config-to-dest" . }} - {{ template "traffic-engine.global.cm.read-server-ip" . }} - {{ template "traffic-engine.sce.set-redis-ip" . }} + {{- include "traffic-engine.global.cm.read-server-ip" . | nindent 12 }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/sce/conf/sce.conf + {{- end }} {{ template "traffic-engine.service-chaining.prestart" . }} {{ template "traffic-engine.service-chaining.start" . }} ports: @@ -62,7 +64,10 @@ spec: valueFrom: fieldRef: fieldPath: status.hostIP - {{ template "traffic-engine.global.cm.env-service-name" . }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + - name: CM_CACHE_SERVICE_NAME + value: {{ .Values.external_resources.cm.local_cache.cache_name }}-redis-master + {{- end }} securityContext: privileged: true {{- if eq .Values.debug.service_chaining.enable_liveness_probe .Values.define_enable_val_yes }} @@ -175,8 +180,18 @@ spec: - "bash" - "-ec" - | - {{- include "traffic-engine.init" . | nindent 12 }} - {{ template "traffic-engine.init.sce" . }} + {{- include "public.prepare-access-API" . | nindent 12 }} + {{- include "public.serialize-node-annotations" . | nindent 12 }} + {{- if .Values.sce_config.vxlan_config.endpoint_nic }} + ip tuntap add dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} mode tap + ip link set dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} up + ip route add {{ .Values.sce_config.vxlan_config.endpoint_netip }}/{{ .Values.sce_config.vxlan_config.endpoint_mask }} dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} table 10 + {{- if .Values.sce_config.vxlan_config.endpoint_gateway }} + ip route add default via {{ .Values.sce_config.vxlan_config.endpoint_gateway }} table 10 + {{- end }} + ip a a {{ .Values.sce_config.vxlan_config.endpoint_ip }}/{{ .Values.sce_config.vxlan_config.endpoint_mask }} dev {{ .Values.sce_config.vxlan_config.endpoint_nic }} noprefixroute + ip rule add dport 3784 table 10 + {{- end }} securityContext: privileged: true env: diff --git a/ansible/roles/traffic-engine/files/helm/templates/deployment-shaping.yaml b/ansible/roles/traffic-engine/files/helm/templates/deployment-shaping.yaml index af300603..b0a7f852 100644 --- a/ansible/roles/traffic-engine/files/helm/templates/deployment-shaping.yaml +++ b/ansible/roles/traffic-engine/files/helm/templates/deployment-shaping.yaml @@ -47,9 +47,17 @@ spec: - | ldconfig {{ template "traffic-engine.shaping.copy-config-to-dest" . }} - {{ template "traffic-engine.global.cm.read-server-ip" . }} - {{ template "traffic-engine.shaping.set-redis-ip" . }} - {{ template "traffic-engine.shaping.get-service-node-port" . }} + {{- include "traffic-engine.global.cm.read-server-ip" . | nindent 12 }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + sed -Ei "s|CM_POLICY_LOCAL_CACHE_IP_LOCATION|${CM_POLICY_LOCAL_CACHE_IP?}|g" /opt/tsg/shaping_engine/conf/shaping.conf + {{- end }} + {{- include "public.prepare-access-API" . | nindent 12 }} + curl --cacert ${CACERT} --header "Authorization: Bearer ${TOKEN}" -X GET ${APISERVER}/api/v1/namespaces/${NAMESPACE}/services/${SERVICENAME} -o /tmp/service.txt + export CLUSTER_ANNOUNCE_PORT=$(cat /tmp/service.txt | jq '.spec.ports[] | select(.name=="cluster-announce-port") | .nodePort') + export HEALTH_CHECK_ANNOUNCE_PORT=$(cat /tmp/service.txt | jq '.spec.ports[] | select(.name=="healthcheck-announce-port") | .nodePort') + echo "export CLUSTER_ANNOUNCE_PORT=${CLUSTER_ANNOUNCE_PORT}" > /etc/profile.d/announceinfo.sh + echo "export HEALTH_CHECK_ANNOUNCE_PORT=${HEALTH_CHECK_ANNOUNCE_PORT}" >> /etc/profile.d/announceinfo.sh + chmod 0755 /etc/profile.d/announceinfo.sh {{ template "traffic-engine.shaping.set-shaping-config" . }} {{ template "traffic-engine.shaping.prestart" . }} {{ template "traffic-engine.shaping.start" . }} @@ -72,7 +80,10 @@ spec: valueFrom: fieldRef: fieldPath: status.hostIP - {{ template "traffic-engine.global.cm.env-service-name" . }} + {{- if eq .Values.external_resources.cm.connectivity "local_cache" }} + - name: CM_CACHE_SERVICE_NAME + value: {{ .Values.external_resources.cm.local_cache.cache_name }}-redis-master + {{- end }} {{- if eq .Values.debug.shaping.enable_liveness_probe .Values.define_enable_val_yes }} livenessProbe: tcpSocket: @@ -146,7 +157,8 @@ spec: - "bash" - "-ec" - | - {{- include "traffic-engine.init" . | nindent 12 }} + {{- include "public.prepare-access-API" . | nindent 12 }} + {{- include "public.serialize-node-annotations" . | nindent 12 }} securityContext: privileged: true env: