Skip to content
  1. Apr 09, 2018
  2. Mar 31, 2018
  3. Mar 21, 2018
  4. Mar 15, 2018
    • Andreas Krüger's avatar
      Added option for encrypting secrets to etcd v.2 (#2428) · 3d6fd491
      Andreas Krüger authored
      * Added option for encrypting secrets to etcd
      
      * Fix keylength to 32
      
      * Forgot the default
      
      * Rename secrets.yaml to secrets_encryption.yaml
      
      * Fix static path for secrets file to use ansible variable
      
      * Rename secrets.yaml.j2 to secrets_encryption.yaml.j2
      
      * Base64 encode the token
      
      * Fixed merge error
      
      * Changed path to credentials dir
      
      * Update path to secrets file which is now readable inside the apiserver container. Set better file permissions
      
      * Add encryption option to k8s-cluster.yml
      3d6fd491
  5. Mar 05, 2018
    • Ayaz Ahmed Khan's avatar
      Explicitly defines the --kubelet-preferred-address-types parameter · 89847d56
      Ayaz Ahmed Khan authored
      to the API server configuration.
      
      This solves the problem where if you have non-resolvable node names,
      and try to scale the server by adding new nodes, kubectl commands
      start to fail for newly added nodes, giving a TCP timeout error when
      trying to resolve the node hostname against a public DNS.
      89847d56
  6. Feb 12, 2018
  7. Feb 09, 2018
  8. Feb 05, 2018
  9. Jan 23, 2018
  10. Jan 18, 2018
  11. Dec 20, 2017
  12. Nov 29, 2017
    • Steven Hardy's avatar
      Allow setting --bind-address for apiserver hyperkube (#1985) · d39a88d6
      Steven Hardy authored
      * Allow setting --bind-address for apiserver hyperkube
      
      This is required if you wish to configure a loadbalancer (e.g haproxy)
      running on the master nodes without choosing a different port for the
      vip from that used by the API - in this case you need the API to bind to
      a specific interface, then haproxy can bind the same port on the VIP:
      
      root@overcloud-controller-0 ~]# netstat -taupen | grep 6443
      tcp        0      0 192.168.24.6:6443       0.0.0.0:*               LISTEN      0          680613     134504/haproxy
      tcp        0      0 192.168.24.16:6443      0.0.0.0:*               LISTEN      0          653329     131423/hyperkube
      tcp        0      0 192.168.24.16:6443      192.168.24.16:58404     ESTABLISHED 0          652991     131423/hyperkube
      tcp        0      0 192.168.24.16:58404     192.168.24.16:6443      ESTABLISHED 0          652986     131423/hyperkube
      
      This can be achieved e.g via:
      
      kube_apiserver_bind_address: 192.168.24.16
      
      * Address code review feedback
      
      * Update kube-apiserver.manifest.j2
      d39a88d6
  13. Oct 24, 2017
  14. Oct 15, 2017
  15. Oct 13, 2017
  16. Sep 13, 2017
    • Matthew Mosesohn's avatar
      kubeadm support (#1631) · 67447260
      Matthew Mosesohn authored
      * kubeadm support
      
      * move k8s master to a subtask
      * disable k8s secrets when using kubeadm
      * fix etcd cert serial var
      * move simple auth users to master role
      * make a kubeadm-specific env file for kubelet
      * add non-ha CI job
      
      * change ci boolean vars to json format
      
      * fixup
      
      * Update create-gce.yml
      
      * Update create-gce.yml
      
      * Update create-gce.yml
      67447260
  17. Aug 24, 2017
    • Brad Beam's avatar
      Adding yamllinter to ci steps (#1556) · 8b151d12
      Brad Beam authored
      * Adding yaml linter to ci check
      
      * Minor linting fixes from yamllint
      
      * Changing CI to install python pkgs from requirements.txt
      
      - adding in a secondary requirements.txt for tests
      - moving yamllint to tests requirements
      8b151d12
  18. Jul 17, 2017
  19. Apr 17, 2017
  20. Apr 15, 2017
  21. Apr 03, 2017
  22. Mar 27, 2017
  23. Mar 14, 2017
    • Vincent Schwarzer's avatar
      Granular authentication Control · 026da060
      Vincent Schwarzer authored
      It is now possible to deactivate selected authentication methods
      (basic auth, token auth) inside the cluster by adding
      removing the required arguments to the Kube API Server and generating
      the secrets accordingly.
      
      The x509 authentification is currently not optional because disabling it
      would affect the kubectl clients deployed on the master nodes.
      026da060
    • Matthew Mosesohn's avatar
      Migrate k8s data to etcd3 api store · 804e9a09
      Matthew Mosesohn authored
      Default backend is now etcd3 (was etcd2).
      The migration process consists of the following steps:
      * check if migration is necessary
      * stop etcd on first etcd server
      * run migration script
      * start etcd on first etcd server
      * stop kube-apiserver until configuration is updated
      * update kube-apiserver
      * purge old etcdv2 data
      804e9a09
  24. Mar 06, 2017
    • Vincent Schwarzer's avatar
      Added Support for OpenID Connect Authentication · b075960e
      Vincent Schwarzer authored
      To use OpenID Connect Authentication beside deploying an OpenID Connect
      Identity Provider it is necesarry to pass additional arguments to the Kube API Server.
      These required arguments were added to the kube apiserver manifest.
      b075960e
  25. Feb 28, 2017
  26. Feb 10, 2017
    • Sergii Golovatiuk's avatar
      Kubernetes Reliability Improvements · c07d60bc
      Sergii Golovatiuk authored
      
      
      - Exclude kubelet CPU/RAM (kube-reserved) from cgroup. It decreases a
        chance of overcommitment
      - Add a possibility to modify Kubelet node-status-update-frequency
      - Add a posibility to configure node-monitor-grace-period,
        node-monitor-period, pod-eviction-timeout for Kubernetes controller
        manager
      - Add Kubernetes Relaibility Documentation with recomendations for
        various scenarios.
      
      Signed-off-by: default avatarSergii Golovatiuk <sgolovatiuk@mirantis.com>
      c07d60bc
  27. Feb 06, 2017
  28. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  29. Dec 28, 2016
  30. Dec 13, 2016
  31. Nov 18, 2016
  32. Nov 09, 2016
  33. Oct 24, 2016
  34. Sep 15, 2016
  35. Aug 25, 2016
    • Bogdan Dobrelya's avatar
      Refactor roles and hosts · 8168689c
      Bogdan Dobrelya authored
      
      
      Shorten deployment time with:
      - Remove redundand roles if duplicated by a dependency and vice versa
      - When a member of k8s-cluster, always install docker as a dependency
        of the etcd role and drop the docker role from cluster.yaml.
      - Drop etcd and node role dependencies from master role as they are
        covered by the node role in k8s-cluster group as well. Copy defaults
        for master from node role.
      - Decouple master, node, secrets roles handlers and vars to be used w/o
        cross references.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      8168689c
Loading