Skip to content
  1. Jan 08, 2019
    • Andreas Holmsten's avatar
      Allow override of bind addr for controller-manager and scheduler (#3968) · 4d5b41b8
      Andreas Holmsten authored
      * allows to override the bind addresses for controller-manager and scheduler
      
      Useful for Prometheus metrics monitoring
      
      * Add bind addr override support in kubeadm/v1beta1
      
      Adds support for override of bind addresses for controller-manager
      and scheduler in kubeadm/v1beta1
      
      * Move location of bind address vars
      
      * Remove double declaration of schedulerExtraArgs
      4d5b41b8
  2. Jan 03, 2019
    • Chad Swenson's avatar
      Fix kube-proxy configuration for kubeadm (#3958) · 80379f6c
      Chad Swenson authored
      - Creates and defaults an ansible variable for every configuration option in the `kubeproxy.config.k8s.io/v1alpha1` type spec
        - Fixes vars that were orphaned by removing non-kubeadm
        - Fixes previously harcoded kubeadm values
      - Introduces a `main` directory for role default files per component (requires ansible 2.6.0+)
        - Split out just `kube-proxy.yml` in this first effort
      - Removes the kube-proxy server field patch task
      
      We should continue to pull out other components from `main.yml` into their own defaults files as I did here for `defaults/main/kube-proxy.yml`. I hope for and will need others to join me in this refactoring across the project until each component config template has a matching role defaults file, with shared defaults in `kubespray-defaults` or `downloads`
      80379f6c
  3. Dec 26, 2018
  4. Dec 25, 2018
  5. Dec 18, 2018
  6. Dec 07, 2018
  7. Nov 29, 2018
  8. Nov 08, 2018
  9. Oct 17, 2018
  10. Sep 28, 2018
  11. Sep 24, 2018
  12. Sep 03, 2018
  13. Aug 22, 2018
  14. Aug 20, 2018
  15. Aug 16, 2018
  16. Aug 07, 2018
  17. May 11, 2018
    • Matthew Mosesohn's avatar
      refactor vault role (#2733) · 07cc9819
      Matthew Mosesohn authored
      * Move front-proxy-client certs back to kube mount
      
      We want the same CA for all k8s certs
      
      * Refactor vault to use a third party module
      
      The module adds idempotency and reduces some of the repetitive
      logic in the vault role
      
      Requires ansible-modules-hashivault on ansible node and hvac
      on the vault hosts themselves
      
      Add upgrade test scenario
      Remove bootstrap-os tags from tasks
      
      * fix upgrade issues
      
      * improve unseal logic
      
      * specify ca and fix etcd check
      
      * Fix initialization check
      
      bump machine size
      07cc9819
  18. Apr 23, 2018
  19. Apr 10, 2018
  20. Apr 09, 2018
  21. Mar 31, 2018
  22. Mar 21, 2018
  23. Mar 15, 2018
    • Andreas Krüger's avatar
      Added option for encrypting secrets to etcd v.2 (#2428) · 3d6fd491
      Andreas Krüger authored
      * Added option for encrypting secrets to etcd
      
      * Fix keylength to 32
      
      * Forgot the default
      
      * Rename secrets.yaml to secrets_encryption.yaml
      
      * Fix static path for secrets file to use ansible variable
      
      * Rename secrets.yaml.j2 to secrets_encryption.yaml.j2
      
      * Base64 encode the token
      
      * Fixed merge error
      
      * Changed path to credentials dir
      
      * Update path to secrets file which is now readable inside the apiserver container. Set better file permissions
      
      * Add encryption option to k8s-cluster.yml
      3d6fd491
  24. Mar 05, 2018
    • Ayaz Ahmed Khan's avatar
      Explicitly defines the --kubelet-preferred-address-types parameter · 89847d56
      Ayaz Ahmed Khan authored
      to the API server configuration.
      
      This solves the problem where if you have non-resolvable node names,
      and try to scale the server by adding new nodes, kubectl commands
      start to fail for newly added nodes, giving a TCP timeout error when
      trying to resolve the node hostname against a public DNS.
      89847d56
  25. Feb 12, 2018
  26. Feb 09, 2018
  27. Feb 05, 2018
  28. Jan 23, 2018
  29. Jan 18, 2018
  30. Dec 20, 2017
  31. Nov 29, 2017
    • Steven Hardy's avatar
      Allow setting --bind-address for apiserver hyperkube (#1985) · d39a88d6
      Steven Hardy authored
      * Allow setting --bind-address for apiserver hyperkube
      
      This is required if you wish to configure a loadbalancer (e.g haproxy)
      running on the master nodes without choosing a different port for the
      vip from that used by the API - in this case you need the API to bind to
      a specific interface, then haproxy can bind the same port on the VIP:
      
      root@overcloud-controller-0 ~]# netstat -taupen | grep 6443
      tcp        0      0 192.168.24.6:6443       0.0.0.0:*               LISTEN      0          680613     134504/haproxy
      tcp        0      0 192.168.24.16:6443      0.0.0.0:*               LISTEN      0          653329     131423/hyperkube
      tcp        0      0 192.168.24.16:6443      192.168.24.16:58404     ESTABLISHED 0          652991     131423/hyperkube
      tcp        0      0 192.168.24.16:58404     192.168.24.16:6443      ESTABLISHED 0          652986     131423/hyperkube
      
      This can be achieved e.g via:
      
      kube_apiserver_bind_address: 192.168.24.16
      
      * Address code review feedback
      
      * Update kube-apiserver.manifest.j2
      d39a88d6
  32. Oct 24, 2017
  33. Oct 15, 2017
  34. Oct 13, 2017
  35. Sep 13, 2017
    • Matthew Mosesohn's avatar
      kubeadm support (#1631) · 67447260
      Matthew Mosesohn authored
      * kubeadm support
      
      * move k8s master to a subtask
      * disable k8s secrets when using kubeadm
      * fix etcd cert serial var
      * move simple auth users to master role
      * make a kubeadm-specific env file for kubelet
      * add non-ha CI job
      
      * change ci boolean vars to json format
      
      * fixup
      
      * Update create-gce.yml
      
      * Update create-gce.yml
      
      * Update create-gce.yml
      67447260
Loading