- Oct 23, 2020
-
-
axelgobletbdr authored
* added an ansible var to manage retention of etcd backups * refactord ls/grep into find in etcd backup removal command
-
- Sep 23, 2020
-
-
Sergey authored
-
- Sep 21, 2020
-
-
Florian Ruynat authored
-
- Jul 22, 2020
-
-
chenguoquan1024 authored
* change /etc/ssl/etcd to etcd_config_dir param * add use etcd_events_data_dir param
-
- May 10, 2020
-
-
Andrew DeMaria authored
-
- Feb 11, 2020
-
-
qvicksilver authored
* Fix recover-control-plane to work with etcd 3.3.x and add CI * Set default values for testcase * Add actual test jobs * Attempt to satisty gitlab ci linter * Fix ansible targets * Set etcd_member_name as stated in the docs... * Recovering from 0 masters is not supported yet * Add other master to broken_kube-master group as well * Increase number of retries to see if etcd needs more time to heal * Make number of retries for ETCD loops configurable, increase it for recovery CI and document it
-
- Nov 10, 2018
-
-
Antoine Legrand authored
* Remove Vault * Remove reference to 'kargo' in the doc * change check order
-
- Aug 31, 2018
-
-
Erwan Miran authored
-
- Aug 24, 2018
-
-
Vasilis Remmas authored
-
- Jun 18, 2018
-
-
Matthew Mosesohn authored
-
- May 11, 2018
-
-
Matthew Mosesohn authored
* Move front-proxy-client certs back to kube mount We want the same CA for all k8s certs * Refactor vault to use a third party module The module adds idempotency and reduces some of the repetitive logic in the vault role Requires ansible-modules-hashivault on ansible node and hvac on the vault hosts themselves Add upgrade test scenario Remove bootstrap-os tags from tasks * fix upgrade issues * improve unseal logic * specify ca and fix etcd check * Fix initialization check bump machine size
-
- Apr 18, 2018
-
-
Spencer Smith authored
-
- Apr 01, 2018
-
-
woopstar authored
The current way to setup the etc cluster is messy and buggy. - It checks for cluster is healthy before the cluster is even created. - The unit files are started on handlers, not in the task, so you mess with "flush handlers". - The join_member.yml is not used. - etcd events cluster is not configured for kubeadm - remove duplicate runs between running the role on etcd nodes and k8s nodes
-
- Mar 31, 2018
-
-
Wong Hoi Sing Edison authored
-
- Mar 30, 2018
-
-
Matthew Mosesohn authored
Kubernetes makes this namespace automatically, so there is no need for kubespray to manage it.
-
- Mar 26, 2018
-
-
Sergey Bondarev authored
https://coreos.com/etcd/docs/latest/tuning.html etcd_snapshot_count and ionice priority
-
- Mar 01, 2018
-
-
RongZhang authored
Add etcd-events cluster for kube-apiserver
-
- Feb 22, 2018
-
-
Maxim Krasilnikov authored
* Fixed generate front proxy client certs with vault * fix vault cert management * Distrebute etcd node certs to vault hosts
-
- Feb 21, 2018
-
-
Matthew Mosesohn authored
Now calico can be deployed if there are other existing pools and not confuse IPAM and end up with pods in the wrong pools.
-
- Jan 30, 2018
-
-
Sébastien Han authored
Some installation are failing to authenticate with peers due to etcd picking up/resoling the wrong node. By setting 'etcd_peer_client_auth' to "False" you can disable peer client cert authentication. Signed-off-by:
Sébastien Han <seb@redhat.com>
-
- Jan 09, 2018
-
-
Matthew Mosesohn authored
* Add support for cert alt names for etcd * Update gen_certs_vault.yml
-
- Jan 02, 2018
-
-
Steve Mitchell authored
-
- Oct 25, 2017
-
-
Matthew Mosesohn authored
Also disable oom killer on etcd
-
- Sep 25, 2017
-
-
Hassan Zamani authored
-
Matthew Mosesohn authored
Fixes #1660
-
- Aug 30, 2017
-
-
Maxim Krasilnikov authored
* Added update CA trust step for etcd and kube/secrets roles * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os. * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube. * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd. * Fixed different certificates set for vault cert_managment * Update doc/vault.md * Fixed condition create vault CA, wrong group * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts * Removed wrong when condition in create etcd role vault tasks.
-
- Aug 24, 2017
-
-
Brad Beam authored
* Adding yaml linter to ci check * Minor linting fixes from yamllint * Changing CI to install python pkgs from requirements.txt - adding in a secondary requirements.txt for tests - moving yamllint to tests requirements
-
- Aug 20, 2017
-
-
Anton authored
-
- Jul 25, 2017
-
-
Hassan Zamani authored
-
- Jun 27, 2017
-
-
gdmelloatpoints authored
-
- Jun 14, 2017
-
-
Gregory Storme authored
-
- Mar 04, 2017
-
-
Matthew Mosesohn authored
Now etcd role can optionally disable etcd cluster setup for faster deployment when it is combined with etcd role.
-
- Feb 28, 2017
-
-
Sergii Golovatiuk authored
Closes: #1073 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Feb 09, 2017
-
-
Josh Conant authored
-
Josh Conant authored
-
- Feb 07, 2017
-
-
Matthew Mosesohn authored
Reduce election timeout to 5000ms (was 10000ms) Raise heartbeat interval to 250ms (was 100ms) Remove etcd cpu share (was 300) Make etcd_cpu_limit and etcd_memory_limit optional.
-
- Feb 06, 2017
-
-
Matthew Mosesohn authored
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 28, 2016
-
-
Bogdan Dobrelya authored
* Add restart for weave service unit * Reuse docker_bin_dir everythere * Limit systemd managed docker containers by CPU/RAM. Do not configure native systemd limits due to the lack of consensus in the kernel community requires out-of-tree kernel patches. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 09, 2016
-
-
Matthew Mosesohn authored
-