Skip to content
  1. Feb 26, 2019
  2. Feb 25, 2019
  3. Feb 21, 2019
    • Frank Ritchie's avatar
      Add flexvolume plugin dir to kubeadm kubelet (#4168) · 9805fb7a
      Frank Ritchie authored
      This was already approved in #4106 but there are CI issues
      with that PR due to references to kubernetes incubator.
      
      After upgrading to Kubespray 2.8.1 with Kubeadm enabled Rook
      Ceph volume provision failed due to the flexvolume plugin dir not
      being correct. Adding the var fixed the issue
      9805fb7a
  4. Feb 20, 2019
  5. Feb 19, 2019
  6. Feb 18, 2019
  7. Feb 14, 2019
  8. Feb 13, 2019
    • Florent Monbillard's avatar
      Explicitely set etcd endpoint in kubeadm-images.yaml (#4063) · 061f5a31
      Florent Monbillard authored
      Currently, the task `container_download | download images for kubeadm config images` fetches etcd image even though it's not required (etcd is bootstrapped by kubespray, not kubeadm).
      
      `kubeadm-images.yaml` is only a subset of `kubeadm-config.yaml`, therefore ``kubeadm config images pull` will try to get all this list (including etcd)
      
      ```
      # kubeadm config images list --config /etc/kubernetes/kubeadm-images.yaml
      k8s.gcr.io/kube-apiserver:v1.13.2
      k8s.gcr.io/kube-controller-manager:v1.13.2
      k8s.gcr.io/kube-scheduler:v1.13.2
      k8s.gcr.io/kube-proxy:v1.13.2
      k8s.gcr.io/pause:3.1
      k8s.gcr.io/etcd:3.2.24
      k8s.gcr.io/coredns:1.2.6
      ```
      
      When using the `kubeadm-config.yaml` though, it doesn't list etcd image:
      
      ```
      # kubeadm config images list --config /etc/kubernetes/kubeadm-config.yaml
      k8s.gcr.io/kube-apiserver:v1.13.2
      k8s.gcr.io/kube-controller-manager:v1.13.2
      k8s.gcr.io/kube-scheduler:v1.13.2
      k8s.gcr.io/kube-proxy:v1.13.2
      k8s.gcr.io/pause:3.1
      k8s.gcr.io/coredns:1.2.6
      ```
      
      This change just adds the etcd endpoints in the `kubeadm-images.yaml` to give a hint to kubeadm it doesn't need etcd image for its boostrapping as etcd is "external".
      I confess it is a ugly hack, a better way would be to use a single `kubeadm-config.yaml` for both tasks, but they are triggered by different roles (`kubeadm-images.yaml` is used by download, `kubeadm-config.yaml` by kubernetes/master) at different steps and I didn't want to refactor too many things to prevent breakage. 
      
      This is specially useful for offline installation where a whitelist of container images is mirrored on a local private container registry. `k8s.gcr.io/etcd` and `quay.io/coreos/etcd`  are two different repositories hosting the same images but using *different tags*! 
      * coreos/etcd:v3.2.24   
      * k8s.gcr.io/etcd:3.2.24 (note the missing 'v' in the tag name)
      061f5a31
    • Chad Swenson's avatar
      [SECURITY] Docker patches for CVE-2019-5736 (#4223) · 2e2ed3bd
      Chad Swenson authored
      This updates docker 18.06 and 18.09 with the two patches released
      yesterday to address the new runc exploit. Details here:
      https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
      2e2ed3bd
    • Manuel Cintron's avatar
      Omit does not work in the context of yum_repository proxy. The ansible... · 7697baf0
      Manuel Cintron authored
      Omit does not work in the context of yum_repository proxy. The ansible documentation specifies to use _none_ to disable the global proxy setting. (#4225)
      
      7697baf0
    • Sorin Sbarnea's avatar
      Improve kubeadm join tasks (#4206) · 22a5a00c
      Sorin Sbarnea authored
      Fix issue where `kubeadm join` could wait forever for joining.
      
      Fix issue where `kubeadm join` were not reaching the user, making
      impossible to find the cause of the failure.
      
      New behaviour is to first attempt to join without bypassing the
      verifications checks and to display them if needed.
      
      If this fails it still attempts to join by ignoring the check in
      order to make previous behavior.
      
      A timeout of 60 seconds is allocated for a joining.
      
      Related-bug: #3973
      22a5a00c
  9. Feb 12, 2019
  10. Feb 11, 2019
  11. Feb 09, 2019
  12. Feb 07, 2019
  13. Feb 06, 2019
  14. Feb 04, 2019
  15. Feb 02, 2019
  16. Feb 01, 2019
    • Manuel Cintron's avatar
      Fixing an issue where trying to install docker-ce-18.09 on rhel7 nodes (or... · 143e2272
      Manuel Cintron authored
      Fixing an issue where trying to install docker-ce-18.09 on rhel7 nodes (or potentially centos 7) without an enabled extras repo the installation will fail because container-selinux >= 2.9 is required. The check for container-selinux upfront should obviate the need for adding an extras repo if the node is able to find it from another source. (#4161)
      
      143e2272
Loading