diff --git a/roles/kubernetes/control-plane/tasks/kubeadm-setup.yml b/roles/kubernetes/control-plane/tasks/kubeadm-setup.yml index 08da3293c13..c33f94b3004 100644 --- a/roles/kubernetes/control-plane/tasks/kubeadm-setup.yml +++ b/roles/kubernetes/control-plane/tasks/kubeadm-setup.yml @@ -61,6 +61,7 @@ dest: "{{ audit_policy_file }}" mode: "0640" when: kubernetes_audit or kubernetes_audit_webhook + notify: Control plane | Restart apiserver - name: Write api audit webhook config yaml template: @@ -68,6 +69,7 @@ dest: "{{ audit_webhook_config_file }}" mode: "0640" when: kubernetes_audit_webhook + notify: Control plane | Restart apiserver - name: Create apiserver tracing config directory file: @@ -82,6 +84,7 @@ dest: "{{ kube_config_dir }}/tracing/apiserver-tracing.yaml" mode: "0640" when: kube_apiserver_tracing + notify: Control plane | Restart apiserver # Nginx LB(default), If kubeadm_config_api_fqdn is defined, use other LB by kubeadm controlPlaneEndpoint. - name: Set kubeadm_config_api_fqdn define @@ -109,6 +112,7 @@ dest: "{{ kube_config_dir }}/admission-controls/admission-controls.yaml" mode: "0640" when: kube_apiserver_admission_control_config_file + notify: Control plane | Restart apiserver - name: Kubeadm | Push admission control config files template: @@ -119,6 +123,7 @@ - kube_apiserver_admission_control_config_file - item in kube_apiserver_admission_plugins_needs_configuration loop: "{{ kube_apiserver_enable_admission_plugins }}" + notify: Control plane | Restart apiserver - name: Kubeadm | Check apiserver.crt SANs vars: