- Apr 04, 2017
-
-
Sergii Golovatiuk authored
In kubernetes 1.6 ClusterFirstWithHostNet was added as an option. In accordance to it kubelet will generate resolv.conf based on own resolv.conf. However, this doesn't create 'options', thus the proper solution requires some investigation. This patch sets the same resolv.conf for kubelet as host Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Mar 23, 2017
-
-
Vladimir Rutsky authored
Non-brekable space is 0xc2 0xa0 byte sequence in UTF-8. To find one: $ git grep -I -P '\xc2\xa0' To replace with regular space: $ git grep -l -I -P '\xc2\xa0' | xargs sed -i 's/\xc2\xa0/ /g' This commit doesn't include changes that will overlap with commit f1c59a91.
-
- Mar 17, 2017
-
-
Aleksandr Didenko authored
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
-
- Mar 14, 2017
-
-
Vincent Schwarzer authored
It is now possible to deactivate selected authentication methods (basic auth, token auth) inside the cluster by adding removing the required arguments to the Kube API Server and generating the secrets accordingly. The x509 authentification is currently not optional because disabling it would affect the kubectl clients deployed on the master nodes.
-
- Mar 06, 2017
-
-
Vincent Schwarzer authored
To use OpenID Connect Authentication beside deploying an OpenID Connect Identity Provider it is necesarry to pass additional arguments to the Kube API Server. These required arguments were added to the kube apiserver manifest.
-
- Feb 28, 2017
-
-
Sergii Golovatiuk authored
Kubernetes project is about to set etcdv3 as default storage engine in 1.6. This patch allows to specify particular backend for kube-apiserver. User may force the option to etcdv3 for new environment. At the same time if the environment uses v2 it will continue uses it until user decides to upgrade to v3. Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
Brad Beam authored
-
- Feb 27, 2017
-
-
Jan Jungnickel authored
-
- Feb 10, 2017
-
-
Sergii Golovatiuk authored
- Exclude kubelet CPU/RAM (kube-reserved) from cgroup. It decreases a chance of overcommitment - Add a possibility to modify Kubelet node-status-update-frequency - Add a posibility to configure node-monitor-grace-period, node-monitor-period, pod-eviction-timeout for Kubernetes controller manager - Add Kubernetes Relaibility Documentation with recomendations for various scenarios. Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Feb 06, 2017
-
-
Matthew Mosesohn authored
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 13, 2017
-
- Jan 11, 2017
-
-
Matthew Mosesohn authored
-
- Dec 28, 2016
-
-
Bogdan Dobrelya authored
* Add restart for weave service unit * Reuse docker_bin_dir everythere * Limit systemd managed docker containers by CPU/RAM. Do not configure native systemd limits due to the lack of consensus in the kernel community requires out-of-tree kernel patches. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 22, 2016
-
-
Matthew Mosesohn authored
Includes hooks for triggering calico, kubelet, and kube-apiserver restarts if etcd certs changed.
-
- Dec 13, 2016
-
-
Alexander Block authored
Allow to let the cloud provider configure proper routing for nodes.
-
Alexander Block authored
Fixes #732
-
Bogdan Dobrelya authored
Also place in global vars and do not repeat the kube_*_config_dir and kube_namespace vars for better code maintainability and UX. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 07, 2016
-
-
fen4o authored
kube-controller-manager's cluster signing cert and key points by default to not existing `/etc/kubernetes/ca/ca.pem` and `/etc/kubernetes/ca/ca.key` [docs][1] [1]: http://kubernetes.io/docs/admin/kube-controller-manager/#options
-
- Nov 29, 2016
-
-
Sebastian Melchior authored
-
- Nov 25, 2016
-
-
Bogdan Dobrelya authored
* Add dns_replicas, dns_memory/cpu_limit/requests vars for dns related apps. * When kube_log_level=4, log dnsmasq queries as well. * Add log level control for skydns (part of kubedns app). * Add limits/requests vars for dnsmasq (part of kubedns app) and dnsmasq daemon set. * Drop string defaults for kube_log_level as it is int and is defined in the global vars as well. * Add docs Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 22, 2016
-
-
Bogdan Dobrelya authored
According to http://kubernetes.io/docs/user-guide/images/ : By default, the kubelet will try to pull each image from the specified registry. However, if the imagePullPolicy property of the container is set to IfNotPresent or Never, then a local\ image is used (preferentially or exclusively, respectively). Use IfNotPresent value to allow images prepared by the download role dependencies to be effectively used by kubelet without pull errors resulting apps to stay blocked in PullBackOff/Error state even when there are images on the localhost exist. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 21, 2016
-
-
Bogdan Dobrelya authored
Fix unreliable waiting for the apiserver to become ready. Remove logfile mount to align with the rest of static pods and because containers shall write logs to stdout only. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 18, 2016
-
-
Maciej Filipiak authored
-
- Nov 10, 2016
-
-
Bogdan Dobrelya authored
- Drop debugs from collect-info playbook - Drop sudo from collect-info step and add target dir var (required for travis jobs) - Label all k8s apps, including static manifests - Add logs for K8s apps to be collected as well - Fix upload to GCS as a public-read tarball Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 09, 2016
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
- Nov 04, 2016
-
-
Spencer Smith authored
-
- Oct 10, 2016
-
-
Artem Roma authored
The requirements for network policy feature are described here [1]. In order to enable it, appropriate configuration must be provided to the CNI plug in and Calico policy controller must be set up. Beside that corresponding extensions needed to be enabled in k8s API. Now to turn on the feature user can define `enable_network_policy` customization variable for Ansible. [1] http://kubernetes.io/docs/user-guide/networkpolicies/
-
- Oct 04, 2016
-
-
Matthew Mosesohn authored
This reduces the likelihood of apiserver status updates timing out due to etcd write conflicts.
-
- Aug 29, 2016
-
-
Matthew Mosesohn authored
This is no longer recommended for use since K8s 1.2: http://kubernetes.io/docs/admin/admission-controllers/#is-there-a-recommended-set-of-plug-ins-to-use
-
- Aug 24, 2016
-
-
Spencer Smith authored
-
- Aug 23, 2016
-
-
Spencer Smith authored
-
Spencer Smith authored
-
- Jul 25, 2016
-
-
Bogdan Dobrelya authored
* Add HA docs for API server. * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver vars and usecases. * Use facts for kube_apiserver to not repeat code and enable LB endpoints use. * Use /healthz check for the wait-for apiserver. * Use the single endpoint for kubelet instead of the list of apiservers * Specify kube_apiserver_count to for HA layout Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Jul 22, 2016
-
-
Matthew Mosesohn authored
kubelet via docker kube-apiserver as a static pod Fixed etcd service start to be more tolerant of slow start. Workaround for kube_version to stay in download role, but not download an files by creating a new "nothing" download entry.
-
Matthew Mosesohn authored
This reverts commit a70c3b66.
-
- Jul 21, 2016
-
-
Bogdan Dobrelya authored
* Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver vars and usecases. * Add loadbalancer_apiserver_localhost (default false). If enabled, override the external LB and expect localhost:443/8080 to be new internal only frontends. * Add kube_apiserver_multiaccess to ignore loadbalancers, and make clients to access the apiservers as a comma-separated list of access_ip/ip/ansible ip (a default mode). When disabled, allow clients to use the given loadbalancers. * Define connections security mode for kube controllers, schedulers, proxies. It is insecure be default, which is the current deployment choice. * Rework the groups['kube-master'][0] hardcode defining the apiserver endpoints. * Improve grouping of vars and add facts for kube_apiserver. * Define kube_apiserver_insecure_bind_address as a fact, add more facts for ease of use. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Jul 19, 2016
-
-
Bogdan Dobrelya authored
* Enforce a etcd-proxy role to a k8s-cluster group members. This provides an HA layout for all of the k8s cluster internal clients. * Proxies to be run on each node in the group as a separate etcd instances with a readwrite proxy mode and listen the given endpoint, which is either the access_ip:2379 or the localhost:2379. * A notion for the 'kube_etcd_multiaccess' is: ignore endpoints and loadbalancers and use the etcd members IPs as a comma-separated list. Otherwise, clients shall use the local endpoint provided by a etcd-proxy instances on each etcd node. A Netwroking plugins always use that access mode. * Fix apiserver's etcd servers args to use the etcd_access_endpoint. * Fix networking plugins flannel/calico to use the etcd_endpoint. * Fix name env var for non masters to be set as well. * Fix etcd_client_url was not used anywhere and other etcd_* facts evaluation was duplicated in a few places. * Define proxy modes only in the env file, if not a master. Del an automatic proxy mode decisions for etcd nodes in init/unit scripts. * Use Wants= instead of Requires= as "This is the recommended way to hook start-up of one unit to the start-up of another unit" * Make apiserver/calico Wants= etcd-proxy to keep it always up Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com> Co-authored-by:
Matthew Mosesohn <mmosesohn@mirantis.com>
-