Skip to content
  1. Sep 23, 2016
    • Bogdan Dobrelya's avatar
      Make dnsmasq daemon set optional · 82ee60fe
      Bogdan Dobrelya authored
      
      
      Change additional dnsmasq opts:
      - Adjust caching size and TTL
      - Disable resolve conf to not create loops
      - Change dnsPolicy to default (similarly to kubedns's dnsmasq). The
        ClusterFirst should not be used to not create loops
      - Disable negative NXDOMAIN replies to be cached
      - Make its very installation as optional step (enabled by default).
        If you don't want more than 3 DNS servers, including 1 for K8s, disable
        it.
      - Add docs and a drawing to clarify DNS setup.
      - Fix stdout logs for dnsmasq/kubedns app configs
      - Add missed notifies to resolvconf -u handler
      - Fix idempotency of resolvconf head file changes
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      82ee60fe
  2. Sep 15, 2016
  3. Aug 25, 2016
    • Bogdan Dobrelya's avatar
      Refactor roles and hosts · 8168689c
      Bogdan Dobrelya authored
      
      
      Shorten deployment time with:
      - Remove redundand roles if duplicated by a dependency and vice versa
      - When a member of k8s-cluster, always install docker as a dependency
        of the etcd role and drop the docker role from cluster.yaml.
      - Drop etcd and node role dependencies from master role as they are
        covered by the node role in k8s-cluster group as well. Copy defaults
        for master from node role.
      - Decouple master, node, secrets roles handlers and vars to be used w/o
        cross references.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      8168689c
  4. Aug 24, 2016
  5. Aug 23, 2016
  6. Aug 18, 2016
  7. Aug 15, 2016
  8. Aug 02, 2016
    • Matthew Mosesohn's avatar
      Move docker systemd unit creation to docker role · e8a1c7a5
      Matthew Mosesohn authored
      Creating the unit using default settings early on
      and then changing it during network_plugin section
      leads to too many docker restarts and duplicated code.
      
      Reversed Wants= dependence on docker.service so it does not
      restart docker when reloading systemd
      
      Consolidated all docker restart handlers.
      e8a1c7a5
    • Bogdan Dobrelya's avatar
      Rework systemd service units · 2af71f31
      Bogdan Dobrelya authored
      
      
      * Add for docker system units:
          ExecReload=/bin/kill -s HUP $MAINPID
          Delegate=yes
          KillMode=process.
      * Add missed DOCKER_OPTIONS for calico/weave docker systemd unit.
      * Change Requires= to a less strict and non-faily Wants=, add missing
        Wants= for After=.
      * Align wants/after in a wat if Wants=foo, After= has foo as well.
      * Make wants/after docker.service to ask for the docker.socket as well.
      * Move "docker rm -f" commands from ExecStartPre= to ExecStopPost=.
        hooks to ensure non-destructive start attempts issued by Wants=.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      2af71f31
  9. Jul 29, 2016
  10. Jul 26, 2016
    • Matthew Mosesohn's avatar
      Fix etcd standalone deployment · 1b1f5f22
      Matthew Mosesohn authored
      etcd facts are generated in kubernetes/preinstall, so etcd nodes need
      to be evaluated first before the rest of the deployment.
      
      Moved several directory facts from kubernetes/node to
      kubernetes/preinstall because they are not backward dependent.
      1b1f5f22
  11. Jul 25, 2016
    • Bogdan Dobrelya's avatar
      Add HA/LB endpoints for kube-apiserver · 731d32af
      Bogdan Dobrelya authored
      
      
      * Add HA docs for API server.
      * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver
      vars and usecases.
      * Use facts for kube_apiserver to not repeat code and enable LB endpoints use.
      * Use /healthz check for the wait-for apiserver.
      * Use the single endpoint for kubelet instead of the list of apiservers
      * Specify kube_apiserver_count to for HA layout
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      731d32af
  12. Jul 22, 2016
  13. Jul 21, 2016
    • Bogdan Dobrelya's avatar
      Add HA/LB endpoints for kube-apiserver · a70c3b66
      Bogdan Dobrelya authored
      
      
      * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver
      vars and usecases.
      * Add loadbalancer_apiserver_localhost (default false). If enabled, override
      the external LB and expect localhost:443/8080 to be new internal only frontends.
      * Add kube_apiserver_multiaccess to ignore loadbalancers, and make clients
      to access the apiservers as a comma-separated list of access_ip/ip/ansible ip
      (a default mode). When disabled, allow clients to use the given loadbalancers.
      * Define connections security mode for kube controllers, schedulers, proxies.
      It is insecure be default, which is the current deployment choice.
      * Rework the groups['kube-master'][0] hardcode defining the apiserver
      endpoints.
      * Improve grouping of vars and add facts for kube_apiserver.
      * Define kube_apiserver_insecure_bind_address as a fact, add more
      facts for ease of use.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      a70c3b66
  14. Jul 20, 2016
  15. Jul 19, 2016
    • Bogdan Dobrelya's avatar
      Add etcd proxy support · 32cd6e99
      Bogdan Dobrelya authored
      
      
      * Enforce a etcd-proxy role to a k8s-cluster group members. This
      provides an HA layout for all of the k8s cluster internal clients.
      * Proxies to be run on each node in the group as a separate etcd
      instances with a readwrite proxy mode and listen the given endpoint,
      which is either the access_ip:2379 or the localhost:2379.
      * A notion for the 'kube_etcd_multiaccess' is: ignore endpoints and
      loadbalancers and use the etcd members IPs as a comma-separated
      list. Otherwise, clients shall use the local endpoint provided by a
      etcd-proxy instances on each etcd node. A Netwroking plugins always
      use that access mode.
      * Fix apiserver's etcd servers args to use the etcd_access_endpoint.
      * Fix networking plugins flannel/calico to use the etcd_endpoint.
      * Fix name env var for non masters to be set as well.
      * Fix etcd_client_url was not used anywhere and other etcd_* facts
      evaluation was duplicated in a few places.
      * Define proxy modes only in the env file, if not a master. Del
      an automatic proxy mode decisions for etcd nodes in init/unit scripts.
      * Use Wants= instead of Requires= as "This is the recommended way to
      hook start-up of one unit to the start-up of another unit"
      * Make apiserver/calico Wants= etcd-proxy to keep it always up
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      Co-authored-by: default avatarMatthew Mosesohn <mmosesohn@mirantis.com>
      32cd6e99
  16. Jul 14, 2016
  17. Jul 12, 2016
  18. Jul 08, 2016
  19. Jul 06, 2016
  20. Jul 05, 2016
  21. Jul 03, 2016
  22. Jun 29, 2016
  23. May 31, 2016
  24. May 23, 2016
  25. May 12, 2016
  26. Apr 20, 2016
  27. Apr 11, 2016
  28. Apr 05, 2016
  29. Mar 29, 2016
  30. Mar 22, 2016
  31. Mar 21, 2016
  32. Feb 29, 2016
  33. Feb 25, 2016
  34. Feb 21, 2016
Loading