- Sep 03, 2018
-
-
Erwan Miran authored
-
- Aug 22, 2018
-
-
rongzhang authored
1.fix audit log not write 2.fix Parameter not recognized 3.delete kubedm futuregates auditing and use apiServerExtraArgs
-
Erwan Miran authored
-
- Aug 20, 2018
-
-
Erwan Miran authored
-
Erwan Miran authored
Define apiserver flags directly instead of relying on auditPolicy section in order to have the ability to redirect audit log to stdout with kubeadm
-
- Aug 16, 2018
-
-
Erwan Miran authored
-
rongzhang authored
-
- Aug 07, 2018
-
-
Robert Everson authored
-
Robert Everson authored
-
Robert Everson authored
-
- May 11, 2018
-
-
Matthew Mosesohn authored
* Move front-proxy-client certs back to kube mount We want the same CA for all k8s certs * Refactor vault to use a third party module The module adds idempotency and reduces some of the repetitive logic in the vault role Requires ansible-modules-hashivault on ansible node and hvac on the vault hosts themselves Add upgrade test scenario Remove bootstrap-os tags from tasks * fix upgrade issues * improve unseal logic * specify ca and fix etcd check * Fix initialization check bump machine size
-
- Apr 23, 2018
-
-
Suzuka Asagiri authored
-
- Apr 10, 2018
-
- Apr 09, 2018
-
- Mar 31, 2018
-
-
Wong Hoi Sing Edison authored
-
- Mar 21, 2018
-
-
mirwan authored
Addition of the .creds extension to the credentials files generated by password lookup in order for Ansible not to consider them as inventory files with inventory_ignore_extensions set accordingly (#2446)
-
- Mar 15, 2018
-
-
Andreas Krüger authored
* Added option for encrypting secrets to etcd * Fix keylength to 32 * Forgot the default * Rename secrets.yaml to secrets_encryption.yaml * Fix static path for secrets file to use ansible variable * Rename secrets.yaml.j2 to secrets_encryption.yaml.j2 * Base64 encode the token * Fixed merge error * Changed path to credentials dir * Update path to secrets file which is now readable inside the apiserver container. Set better file permissions * Add encryption option to k8s-cluster.yml
-
- Mar 05, 2018
-
-
Ayaz Ahmed Khan authored
to the API server configuration. This solves the problem where if you have non-resolvable node names, and try to scale the server by adding new nodes, kubectl commands start to fail for newly added nodes, giving a TCP timeout error when trying to resolve the node hostname against a public DNS.
-
- Feb 12, 2018
-
-
Maxim Krasilnikov authored
-
- Feb 09, 2018
-
-
mlushpenko authored
-
- Feb 05, 2018
-
-
Maxim Krasilnikov authored
-
- Jan 23, 2018
-
-
Virgil Chereches authored
Renamed variable from disable_volume_zone_conflict to volume_cross_zone_attachment and removed cloud provider condition; fix identation
-
- Jan 18, 2018
-
-
Virgil Chereches authored
-
- Dec 20, 2017
-
-
Matthew Mosesohn authored
This does not update v1.9.0, but fixes two incompatibilities when trying to deploy v1.9.0.
-
- Nov 29, 2017
-
-
Steven Hardy authored
* Allow setting --bind-address for apiserver hyperkube This is required if you wish to configure a loadbalancer (e.g haproxy) running on the master nodes without choosing a different port for the vip from that used by the API - in this case you need the API to bind to a specific interface, then haproxy can bind the same port on the VIP: root@overcloud-controller-0 ~]# netstat -taupen | grep 6443 tcp 0 0 192.168.24.6:6443 0.0.0.0:* LISTEN 0 680613 134504/haproxy tcp 0 0 192.168.24.16:6443 0.0.0.0:* LISTEN 0 653329 131423/hyperkube tcp 0 0 192.168.24.16:6443 192.168.24.16:58404 ESTABLISHED 0 652991 131423/hyperkube tcp 0 0 192.168.24.16:58404 192.168.24.16:6443 ESTABLISHED 0 652986 131423/hyperkube This can be achieved e.g via: kube_apiserver_bind_address: 192.168.24.16 * Address code review feedback * Update kube-apiserver.manifest.j2
-
- Oct 24, 2017
-
-
Chiang Fong Lee authored
-
- Oct 15, 2017
-
-
Matthew Mosesohn authored
* Disable basic and token auth by default * Add recommended security params * allow basic auth to fail in tests * Enable TLS authentication for kubelet
-
- Oct 13, 2017
-
-
Matthew Mosesohn authored
* add istio addon * add addons to a ci job
-
- Sep 13, 2017
-
-
Matthew Mosesohn authored
* kubeadm support * move k8s master to a subtask * disable k8s secrets when using kubeadm * fix etcd cert serial var * move simple auth users to master role * make a kubeadm-specific env file for kubelet * add non-ha CI job * change ci boolean vars to json format * fixup * Update create-gce.yml * Update create-gce.yml * Update create-gce.yml
-
- Aug 24, 2017
-
-
Brad Beam authored
* Adding yaml linter to ci check * Minor linting fixes from yamllint * Changing CI to install python pkgs from requirements.txt - adding in a secondary requirements.txt for tests - moving yamllint to tests requirements
-
- Jul 17, 2017
-
-
jwfang authored
-
- Apr 17, 2017
-
-
gbolo authored
-
- Apr 15, 2017
-
-
Spencer Smith authored
-
- Apr 03, 2017
-
-
Matthew Mosesohn authored
-
- Mar 27, 2017
-
-
Matthew Mosesohn authored
Canal runs more pods and upgrades need a bit of extra room to load new pods in and get the old ones out.
-
- Mar 14, 2017
-
-
Vincent Schwarzer authored
It is now possible to deactivate selected authentication methods (basic auth, token auth) inside the cluster by adding removing the required arguments to the Kube API Server and generating the secrets accordingly. The x509 authentification is currently not optional because disabling it would affect the kubectl clients deployed on the master nodes.
-
Matthew Mosesohn authored
Default backend is now etcd3 (was etcd2). The migration process consists of the following steps: * check if migration is necessary * stop etcd on first etcd server * run migration script * start etcd on first etcd server * stop kube-apiserver until configuration is updated * update kube-apiserver * purge old etcdv2 data
-
- Mar 06, 2017
-
-
Vincent Schwarzer authored
To use OpenID Connect Authentication beside deploying an OpenID Connect Identity Provider it is necesarry to pass additional arguments to the Kube API Server. These required arguments were added to the kube apiserver manifest.
-
- Feb 28, 2017
-
-
Sergii Golovatiuk authored
Kubernetes project is about to set etcdv3 as default storage engine in 1.6. This patch allows to specify particular backend for kube-apiserver. User may force the option to etcdv3 for new environment. At the same time if the environment uses v2 it will continue uses it until user decides to upgrade to v3. Signed-off-by: Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Feb 10, 2017
-
-
Sergii Golovatiuk authored
- Exclude kubelet CPU/RAM (kube-reserved) from cgroup. It decreases a chance of overcommitment - Add a possibility to modify Kubelet node-status-update-frequency - Add a posibility to configure node-monitor-grace-period, node-monitor-period, pod-eviction-timeout for Kubernetes controller manager - Add Kubernetes Relaibility Documentation with recomendations for various scenarios. Signed-off-by: Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-