Skip to content
  1. Oct 15, 2018
    • JuanJo Ciarlante's avatar
      [jjo] add DIND support to contrib/ (#3468) · 40779345
      JuanJo Ciarlante authored
      * [jjo] add DIND support to contrib/
      
      - add contrib/dind with ansible playbook to
        create "node" containers, and setup them to mimic
        host nodes as much as possible (using Ubuntu images),
        see contrib/dind/README.md
      
      - nodes' /etc/hosts editing via `blockinfile` and
        `lineinfile` need `unsafe_writes: yes` because /etc/hosts
        are mounted by docker, and thus can't be handled atomically
        (modify copy + rename)
      
      * dind-host role: set node container hostname on creation
      
      * add "Resulting deployment" section with some CLI outputs
      
      * typo
      
      * selectable node_distro: debian, ubuntu
      
      * some fixes for node_distro: ubuntu
      
      * cpu optimization: add early `pkill -STOP agetty`
      
      * typo
      
      * add centos dind support ;)
      
      * add kubespray-dind.yaml, support fedora
      
      - add kubespray-dind.yaml (former custom.yaml at README.md)
      - rework README.md as per above
      - use some YAML power to share distros' commonality
      - add fedora support
      
      * create unique /etc/machine-id and other updates
      
      - create unique /etc/machine-id in each docker node,
        used as seed for e.g. weave mac addresses
      
      - with above, now netchecker 100% passes WoHooOO!
        🎉 🎉 🎉
      
      - updated README.md output from (1.12.1, verified
        netcheck)
      
      * minor typos
      
      * fix centos node creation, needs earlier udevadm removal to avoid flaky facts, also verified netcheck Ok \o/
      
      * add Q&D test-distros.sh, back to manual /etc/machine-id hack
      
      * run-test-distros.sh cosmetics and minor fixes
      
      * run-test-distros.sh: $rc fix and minor formatting changes
      
      * run-test-distros.sh output cosmetics
      40779345
  2. Oct 11, 2018
  3. Oct 05, 2018
    • Chad Swenson's avatar
      Support multiple local volume provisioner StorageClasses (#3450) · 6602760a
      Chad Swenson authored
      - Local Volume StorageClass configuration is now manged by `local_volume_provisioner_storage_classes`, a list of maps that specifies local storage classes with `name` `host_dir` and `mount_dir` keys per entry
      - Tasks and templates updated to loop through local volume storage classes
      - Previous defaults for path/class names were not changed
      - Fixed an issue where a `kubernetes/preinstall` was creating directories inconsistently with the `kubernetes-apps/external_provisioner/local_volume_provisioner` task
      6602760a
  4. Sep 21, 2018
  5. Sep 20, 2018
  6. Sep 19, 2018
  7. Sep 06, 2018
  8. Aug 31, 2018
  9. Aug 27, 2018
  10. Aug 25, 2018
  11. Aug 24, 2018
  12. Aug 23, 2018
    • Aivars Sterns's avatar
      calico upgrade to v3 (#3086) · 23fd3461
      Aivars Sterns authored
      * calico upgrade to v3
      
      * update calico_rr version
      
      * add missing file
      
      * change contents of main.yml as it was left old version
      
      * enable network policy by default
      
      * remove unneeded task
      
      * Fix kubelet calico settings
      
      * fix when statement
      
      * switch back to node-kubeconfig.yaml
      23fd3461
  13. Aug 22, 2018
  14. Aug 21, 2018
  15. Aug 20, 2018
  16. Aug 19, 2018
  17. Aug 17, 2018
  18. Aug 14, 2018
  19. Aug 10, 2018
  20. Aug 08, 2018
  21. Aug 07, 2018
  22. Aug 05, 2018
  23. Jul 31, 2018
  24. Jun 28, 2018
  25. Jun 21, 2018
  26. Jun 04, 2018
  27. May 27, 2018
  28. May 22, 2018
  29. May 18, 2018
  30. May 16, 2018
    • Christopher J. Ruwe's avatar
      assert that number of pods on node does not exceed CIDR address range · c1bc4615
      Christopher J. Ruwe authored
      The number of pods on a given node is determined by the  --max-pods=k
      directive. When the address space is exhausted, no more pods can be
      scheduled even if from the --max-pods-perspective, the node still has
      capacity.
      
      The special case that a pod is scheduled and uses the node IP in the
      host network namespace is too "soft" to derive a guarantee.
      
      Comparing kubelet_max_pods with kube_network_node_prefix when given
      allows to assert that pod limits match the CIDR address space.
      c1bc4615
  31. May 11, 2018
    • Matthew Mosesohn's avatar
      refactor vault role (#2733) · 07cc9819
      Matthew Mosesohn authored
      * Move front-proxy-client certs back to kube mount
      
      We want the same CA for all k8s certs
      
      * Refactor vault to use a third party module
      
      The module adds idempotency and reduces some of the repetitive
      logic in the vault role
      
      Requires ansible-modules-hashivault on ansible node and hvac
      on the vault hosts themselves
      
      Add upgrade test scenario
      Remove bootstrap-os tags from tasks
      
      * fix upgrade issues
      
      * improve unseal logic
      
      * specify ca and fix etcd check
      
      * Fix initialization check
      
      bump machine size
      07cc9819
  32. May 08, 2018
  33. Apr 27, 2018
  34. Apr 26, 2018
  35. Apr 23, 2018
Loading