Skip to content
Snippets Groups Projects
  1. Apr 04, 2017
  2. Mar 23, 2017
    • Vladimir Rutsky's avatar
      replace non-breakable space with regular space · c4e57477
      Vladimir Rutsky authored
      Non-brekable space is 0xc2 0xa0 byte sequence in UTF-8.
      
      To find one:
      
          $ git grep -I -P '\xc2\xa0'
      
      To replace with regular space:
      
          $ git grep -l -I -P '\xc2\xa0' | xargs sed -i 's/\xc2\xa0/ /g'
      
      This commit doesn't include changes that will overlap with commit f1c59a91.
      c4e57477
  3. Mar 17, 2017
    • Aleksandr Didenko's avatar
      Move calico-policy-controller into separate role · 3a399040
      Aleksandr Didenko authored
      By default Calico CNI does not create any network access policies
      or profiles if 'policy' is enabled in CNI config. And without any
      policies/profiles network access to/from PODs is blocked.
      
      K8s related policies are created by calico-policy-controller in
      such case. So we need to start it as soon as possible, before any
      real workloads.
      
      This patch also fixes kube-api port in calico-policy-controller
      yaml template.
      
      Closes #1132
      3a399040
  4. Mar 14, 2017
    • Vincent Schwarzer's avatar
      Granular authentication Control · 026da060
      Vincent Schwarzer authored
      It is now possible to deactivate selected authentication methods
      (basic auth, token auth) inside the cluster by adding
      removing the required arguments to the Kube API Server and generating
      the secrets accordingly.
      
      The x509 authentification is currently not optional because disabling it
      would affect the kubectl clients deployed on the master nodes.
      026da060
  5. Mar 06, 2017
    • Vincent Schwarzer's avatar
      Added Support for OpenID Connect Authentication · b075960e
      Vincent Schwarzer authored
      To use OpenID Connect Authentication beside deploying an OpenID Connect
      Identity Provider it is necesarry to pass additional arguments to the Kube API Server.
      These required arguments were added to the kube apiserver manifest.
      b075960e
  6. Feb 28, 2017
  7. Feb 27, 2017
  8. Feb 10, 2017
    • Sergii Golovatiuk's avatar
      Kubernetes Reliability Improvements · c07d60bc
      Sergii Golovatiuk authored
      
      - Exclude kubelet CPU/RAM (kube-reserved) from cgroup. It decreases a
        chance of overcommitment
      - Add a possibility to modify Kubelet node-status-update-frequency
      - Add a posibility to configure node-monitor-grace-period,
        node-monitor-period, pod-eviction-timeout for Kubernetes controller
        manager
      - Add Kubernetes Relaibility Documentation with recomendations for
        various scenarios.
      
      Signed-off-by: default avatarSergii Golovatiuk <sgolovatiuk@mirantis.com>
      c07d60bc
  9. Feb 06, 2017
  10. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  11. Jan 13, 2017
  12. Jan 11, 2017
  13. Dec 28, 2016
  14. Dec 22, 2016
  15. Dec 13, 2016
  16. Dec 07, 2016
  17. Nov 29, 2016
  18. Nov 25, 2016
    • Bogdan Dobrelya's avatar
      Tune dnsmasq/kubedns limits, replicas, logging · 2d18e192
      Bogdan Dobrelya authored
      
      * Add dns_replicas, dns_memory/cpu_limit/requests vars for
      dns related apps.
      * When kube_log_level=4, log dnsmasq queries as well.
      * Add log level control for skydns (part of kubedns app).
      * Add limits/requests vars for dnsmasq (part of kubedns app) and
        dnsmasq daemon set.
      * Drop string defaults for kube_log_level as it is int and
        is defined in the global vars as well.
      * Add docs
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      2d18e192
  19. Nov 22, 2016
  20. Nov 21, 2016
  21. Nov 18, 2016
  22. Nov 10, 2016
  23. Nov 09, 2016
  24. Nov 04, 2016
  25. Oct 10, 2016
  26. Oct 04, 2016
  27. Aug 29, 2016
  28. Aug 24, 2016
  29. Aug 23, 2016
  30. Jul 25, 2016
    • Bogdan Dobrelya's avatar
      Add HA/LB endpoints for kube-apiserver · 731d32af
      Bogdan Dobrelya authored
      
      * Add HA docs for API server.
      * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver
      vars and usecases.
      * Use facts for kube_apiserver to not repeat code and enable LB endpoints use.
      * Use /healthz check for the wait-for apiserver.
      * Use the single endpoint for kubelet instead of the list of apiservers
      * Specify kube_apiserver_count to for HA layout
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      731d32af
  31. Jul 22, 2016
  32. Jul 21, 2016
    • Bogdan Dobrelya's avatar
      Add HA/LB endpoints for kube-apiserver · a70c3b66
      Bogdan Dobrelya authored
      
      * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver
      vars and usecases.
      * Add loadbalancer_apiserver_localhost (default false). If enabled, override
      the external LB and expect localhost:443/8080 to be new internal only frontends.
      * Add kube_apiserver_multiaccess to ignore loadbalancers, and make clients
      to access the apiservers as a comma-separated list of access_ip/ip/ansible ip
      (a default mode). When disabled, allow clients to use the given loadbalancers.
      * Define connections security mode for kube controllers, schedulers, proxies.
      It is insecure be default, which is the current deployment choice.
      * Rework the groups['kube-master'][0] hardcode defining the apiserver
      endpoints.
      * Improve grouping of vars and add facts for kube_apiserver.
      * Define kube_apiserver_insecure_bind_address as a fact, add more
      facts for ease of use.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      a70c3b66
  33. Jul 19, 2016
    • Bogdan Dobrelya's avatar
      Add etcd proxy support · 32cd6e99
      Bogdan Dobrelya authored
      
      * Enforce a etcd-proxy role to a k8s-cluster group members. This
      provides an HA layout for all of the k8s cluster internal clients.
      * Proxies to be run on each node in the group as a separate etcd
      instances with a readwrite proxy mode and listen the given endpoint,
      which is either the access_ip:2379 or the localhost:2379.
      * A notion for the 'kube_etcd_multiaccess' is: ignore endpoints and
      loadbalancers and use the etcd members IPs as a comma-separated
      list. Otherwise, clients shall use the local endpoint provided by a
      etcd-proxy instances on each etcd node. A Netwroking plugins always
      use that access mode.
      * Fix apiserver's etcd servers args to use the etcd_access_endpoint.
      * Fix networking plugins flannel/calico to use the etcd_endpoint.
      * Fix name env var for non masters to be set as well.
      * Fix etcd_client_url was not used anywhere and other etcd_* facts
      evaluation was duplicated in a few places.
      * Define proxy modes only in the env file, if not a master. Del
      an automatic proxy mode decisions for etcd nodes in init/unit scripts.
      * Use Wants= instead of Requires= as "This is the recommended way to
      hook start-up of one unit to the start-up of another unit"
      * Make apiserver/calico Wants= etcd-proxy to keep it always up
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      Co-authored-by: default avatarMatthew Mosesohn <mmosesohn@mirantis.com>
      32cd6e99
Loading