- Dec 27, 2016
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 23, 2016
-
-
Bogdan Dobrelya authored
Also fix kube log level 4 to log dnsmasq queries. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 16, 2016
-
-
Bogdan Dobrelya authored
Current design expects users to define at least one nameserver in the nameservers var to backup host OS DNS config when the K8s cluster DNS service IP is not available and hosts still have to resolve external or intranet FQDNs. Fix undefined nameservers to fallback to the default_resolver. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Bogdan Dobrelya authored
-
- Dec 15, 2016
-
-
Matthew Mosesohn authored
Fixes #754
-
Alexander Block authored
/etc/dhclient.conf is ignored on RedHat/CentOS Correct location is /etc/dhcp/dhclient.conf
-
- Dec 14, 2016
-
-
Alexander Block authored
-
Aleksandr Didenko authored
Add BGP route reflectors support in order to optimize BGP topology for deployments with Calico network plugin. Also bump version of calico/ctl for some bug fixes.
-
- Dec 13, 2016
-
-
Alexander Block authored
-
Bogdan Dobrelya authored
Do not repeat options and nameservers in the dhclient hooks. Do not prepend nameservers for dhclient but supersede and fail back to the upstream_dns_resolvers then default_resolver. Fixes order of nameservers placement, which is cluster DNS ip goes always first. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 12, 2016
-
-
Bogdan Dobrelya authored
* For Debian/RedHat OS families (with NetworkManager/dhclient/resolvconf optionally enabled) prepend /etc/resolv.conf with required nameservers, options, and supersede domain and search domains via the dhclient/resolvconf hooks. * Drop (z)nodnsupdate dhclient hook and re-implement it to complement the resolvconf -u command, which is distro/cloud provider specific. Update docs as well. * Enable network restart to apply and persist changes and simplify handlers to rely on network restart only. This fixes DNS resolve for hostnet K8s pods for Red Hat OS family. Skip network restart for canal/calico plugins, unless https://github.com/projectcalico/felix/issues/1185 fixed. * Replace linefiles line plus with_items to block mode as it's faster. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com> Co-authored-by:
Matthew Mosesohn <mmosesohn@mirantis.com>
-
Alexander Block authored
-
Alexander Block authored
At least the OS images from Azure do not grow the root FS automatically.
-
- Dec 09, 2016
-
-
Bogdan Dobrelya authored
In order to enable offline/intranet installation cases: * Move DNS/resolvconf configuration to preinstall role. Remove skip_dnsmasq_k8s var as not needed anymore. * Preconfigure DNS stack early, which may be the case when downloading artifacts from intranet repositories. Do not configure K8s DNS resolvers for hosts /etc/resolv.conf yet early (as they may be not existing). * Reconfigure K8s DNS resolvers for hosts only after kubedns/dnsmasq was set up and before K8s apps to be created. * Move docker install task to early stage as well and unbind it from the etcd role's specific install path. Fix external flannel dependency on docker role handlers. Also fix the docker restart handlers' steps ordering to match the expected sequence (the socket then the service). * Add default resolver fact, which is the cloud provider specific and remove hardcoded GCE resolver. * Reduce default ndots for hosts /etc/resolv.conf to 2. Multiple search domains combined with high ndots values lead to poor performance of DNS stack and make ansible workers to fail very often with the "Timeout (12s) waiting for privilege escalation prompt:" error. * Update docs. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Bogdan Dobrelya authored
Add tags to allow more granular tasks filtering. Add generator script for MD formatted tags found. Add docs for tags how-to. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 07, 2016
-
-
Dan Bode authored
The variale etcd_access_addresses is used to determine how to address communication from other roles to the etcd cluster. It was set to the address that ansible uses to connect to instance ({{ item }})s and not the the variable: ip_access which had already been created and could already be overridden through the access_ip variable. This change allows ansible to connect to a machine using a different address than the one used to access etcd.
-
Bogdan Dobrelya authored
Override GCE sysctl in /etc/sysctl.d/99-sysctl.conf instead of the /etc/sysctl.d/11-gce-network-security.conf. It is recreated by GCE, f.e. if gcloud CLI invokes some security related changes, thus losing customizations we want to be persistent. Update cloud providers firewall requirements in calico docs. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 06, 2016
-
-
Matthew Mosesohn authored
ipv4 forwarding gets broken when restarting networking, which breaks all networking for all pods.
-
- Dec 02, 2016
-
-
ant31 authored
-
- Nov 29, 2016
-
-
Sebastian Melchior authored
-
- Nov 21, 2016
-
-
Paweł Skrzyński authored
-
- Nov 09, 2016
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
- Nov 08, 2016
-
-
Aleksandr Didenko authored
This patch provides support for Canal network plugin installation as a self-hosted app, see the following link for details: https://github.com/tigera/canal/tree/master/k8s-install
-
- Oct 21, 2016
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
- Oct 19, 2016
-
-
Chad Swenson authored
Change the kubelet --hostname-override flag to use the ansible_hostname variable which should be more consistent with the value required by cloud providers Add ansible_hostname alias to /etc/hosts when it is different from inventory_hostname to overcome node name limitations see https://github.com/kubernetes/kubernetes/issues/22770 Signed-off-by:
Chad Swenson <chadswen@gmail.com>
-
- Oct 15, 2016
-
-
Chad Swenson authored
Signed-off-by:
Chad Swenson <chadswen@gmail.com>
-
- Oct 05, 2016
-
-
Matthew Mosesohn authored
Also adds all masters by hostname and localhost/127.0.0.1 to apiserver SSL certificate. Includes documentation update on how localhost loadbalancer works.
-
- Sep 18, 2016
-
-
Matthew Mosesohn authored
-
- Sep 15, 2016
-
-
Bogdan Dobrelya authored
* Add the retry_stagger var to tweak push and retry time strategies. * Add large deployments related docs. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Sep 14, 2016
-
-
Matthew Mosesohn authored
-
- Sep 13, 2016
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Aug 26, 2016
-
-
Spencer Smith authored
-
- Aug 23, 2016
-
-
Bogdan Dobrelya authored
Cleanup collected artifacts, drop unrelated files/commands. Always install gitinfos script to binaries for external use. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Aug 08, 2016
-
-
Matthew Mosesohn authored
New variable disable_ipv6_dns in kubernetes/preinstall.
-
- Jul 26, 2016
-
-
Matthew Mosesohn authored
etcd facts are generated in kubernetes/preinstall, so etcd nodes need to be evaluated first before the rest of the deployment. Moved several directory facts from kubernetes/node to kubernetes/preinstall because they are not backward dependent.
-
- Jul 25, 2016
-
-
Bogdan Dobrelya authored
* Add HA docs for API server. * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver vars and usecases. * Use facts for kube_apiserver to not repeat code and enable LB endpoints use. * Use /healthz check for the wait-for apiserver. * Use the single endpoint for kubelet instead of the list of apiservers * Specify kube_apiserver_count to for HA layout Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Jul 22, 2016
-
-
Matthew Mosesohn authored
This reverts commit a70c3b66.
-
- Jul 21, 2016
-
-
Bogdan Dobrelya authored
* Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver vars and usecases. * Add loadbalancer_apiserver_localhost (default false). If enabled, override the external LB and expect localhost:443/8080 to be new internal only frontends. * Add kube_apiserver_multiaccess to ignore loadbalancers, and make clients to access the apiservers as a comma-separated list of access_ip/ip/ansible ip (a default mode). When disabled, allow clients to use the given loadbalancers. * Define connections security mode for kube controllers, schedulers, proxies. It is insecure be default, which is the current deployment choice. * Rework the groups['kube-master'][0] hardcode defining the apiserver endpoints. * Improve grouping of vars and add facts for kube_apiserver. * Define kube_apiserver_insecure_bind_address as a fact, add more facts for ease of use. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-