Skip to content

taboola/consul2calico

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Go Report Card

Consul Calico Sync

Overview

This project will sync/configure calico network policies based on consul KV state.

It will allow ingress/egress traffic from nodes registered in consul to deployments running on kubernetes .

Whenever a node is added to the Hostgroup / rebuilt / changes ip , this project will dynamically change the corresponding calico GlobalNetworkSet.

Getting Started Running with Helm

  1. Create ETCD secret:

    kubectl create secret generic etcd-cert \
    --from-file=etcd-ca.crt=./etcd-ca.crt.txt \
    --from-file=etcd.crt=./etcd.crt.txt \
    --from-file=etcd.key=./etcd.key.txt 
  2. Build docker image :

    docker build -t consul-calico-sync:0.0.1 .
  3. Push to local repository :

    docker push  http://local-repo:8080/consul-calico-sync:0.0.1 .
  4. Change image in values.yaml

    # The name (and tag) of the Docker image for consul2calico sync.
    image:
    repository: http://local-repo:8080/consul-calico-sync
    pullPolicy: Always
    tag: 0.0.1
  5. Install chart

    helm install -n consul-calico-sync -c ./charts/ --namespace namespace

How to run tests :

Defaults configured for tests : CALICO_SYNC_INTERVAL=2s CALICO_REMOVE_GRACE_TIME=30m

  • With logs :

    go test  ./...
  • Without logs :

    go test  ./... -v

Future releases

  • Add support for Kubernetes API datastore . (Currently this project support Calico deployments with etcd as datastore)
  • Add support for consul TLS .

Releases

No releases published

Packages

No packages published