- Aug 28, 2018
-
-
Takashi Okamoto authored
-
- Aug 24, 2018
-
-
Vasilis Remmas authored
-
Aivars Sterns authored
-
- Aug 23, 2018
-
-
Tatsuyuki Ishi authored
-
- Aug 17, 2018
-
-
Sergey Bondarev authored
Trigger reboot handler when version upgrade during update script
-
Mathieu Herbert authored
-
- Jul 11, 2018
-
-
Matthew Mosesohn authored
apiserver cert should be created only once
-
- Jul 06, 2018
-
-
Matthew Mosesohn authored
* Add tags for cert serial tasks This will help facilitate tag-based deployment of specific components. * fixup kubernetes node
-
- Jun 30, 2018
-
-
elementyang authored
-
- Jun 24, 2018
-
-
elementyang authored
-
- Jun 22, 2018
-
-
elementyang authored
-
- Jun 18, 2018
-
-
Matthew Mosesohn authored
-
- Jun 06, 2018
-
-
Brad Beam authored
-
Matthew Mosesohn authored
-
- May 30, 2018
-
-
Matthew Mosesohn authored
-
- May 11, 2018
-
-
Matthew Mosesohn authored
* Move front-proxy-client certs back to kube mount We want the same CA for all k8s certs * Refactor vault to use a third party module The module adds idempotency and reduces some of the repetitive logic in the vault role Requires ansible-modules-hashivault on ansible node and hvac on the vault hosts themselves Add upgrade test scenario Remove bootstrap-os tags from tasks * fix upgrade issues * improve unseal logic * specify ca and fix etcd check * Fix initialization check bump machine size
-
- May 02, 2018
-
-
Andreas Kruger authored
-
- May 01, 2018
-
-
ashon authored
-
- Apr 26, 2018
-
-
Markos Chandras authored
This reverts commit 51f4e658.
-
- Apr 23, 2018
-
-
Matthew Mosesohn authored
-
- Apr 18, 2018
-
-
Spencer Smith authored
-
- Apr 11, 2018
-
-
Markos Chandras authored
Add path for certificate location for SUSE distributions. Also make sure the 'update-ca-certificates' command is executed on SUSE hosts as well.
-
- Apr 01, 2018
-
-
woopstar authored
The current way to setup the etc cluster is messy and buggy. - It checks for cluster is healthy before the cluster is even created. - The unit files are started on handlers, not in the task, so you mess with "flush handlers". - The join_member.yml is not used. - etcd events cluster is not configured for kubeadm - remove duplicate runs between running the role on etcd nodes and k8s nodes
-
- Mar 31, 2018
-
-
Andreas Krüger authored
* Update etcd deployment to use correct cert and key * Update to use admin cert for etcdctl commands * Update handler to use admin cert too
-
Wong Hoi Sing Edison authored
-
woopstar authored
-
- Mar 30, 2018
-
-
Matthew Mosesohn authored
Kubernetes makes this namespace automatically, so there is no need for kubespray to manage it.
-
- Mar 28, 2018
-
-
woopstar authored
-
- Mar 26, 2018
-
-
Sergey Bondarev authored
https://coreos.com/etcd/docs/latest/tuning.html etcd_snapshot_count and ionice priority
-
- Mar 14, 2018
-
-
Sergey Bondarev authored
-
- Mar 06, 2018
-
-
RongZhang authored
Enable OOM killing like docker run etcd
-
- Mar 01, 2018
-
-
RongZhang authored
Add etcd-events cluster for kube-apiserver
-
- Feb 22, 2018
-
-
Maxim Krasilnikov authored
* Fixed generate front proxy client certs with vault * fix vault cert management * Distrebute etcd node certs to vault hosts
-
- Feb 21, 2018
-
-
Matthew Mosesohn authored
Now calico can be deployed if there are other existing pools and not confuse IPAM and end up with pods in the wrong pools.
-
- Feb 12, 2018
-
-
RongZhang authored
Fix bug issues #2289
-
- Feb 09, 2018
-
-
Damian Nowak authored
When etcd exceeds its memory limit, it becomes useless but keeps running. We should let OOM killer kill etcd process in the container, so systemd can spot the problem and restart etcd according to "Restart" setting in etcd.service unit file. If OOME problem keep repeating, i.e. it happens every single restart, systemd will eventually back off and stop restarting it anyway. --restart=on-failure:5 in this file has no effect because memory allocation error doesn't by itself cause the process to die Related: https://github.com/kubernetes-incubator/kubespray/blob/master/roles/etcd/templates/etcd-docker.service.j2 This kind of reverts a change introduced in #1860.
-
- Jan 30, 2018
-
-
Dmitri Rubinstein authored
DNS entries generated from 'etcd_cert_alt_names' variable in etcd's openssl.conf are not terminated by a newline. This fixes issue #2207.
-
Sébastien Han authored
Some installation are failing to authenticate with peers due to etcd picking up/resoling the wrong node. By setting 'etcd_peer_client_auth' to "False" you can disable peer client cert authentication. Signed-off-by:
Sébastien Han <seb@redhat.com>
-
- Jan 29, 2018
-
-
Matthew Mosesohn authored
import_tasks will consume far less memory, so it should be used whenever it is compatible.
-
- Jan 09, 2018
-
-
Matthew Mosesohn authored
* Add support for cert alt names for etcd * Update gen_certs_vault.yml
-