Skip to content
  1. Dec 27, 2016
  2. Dec 23, 2016
  3. Dec 16, 2016
  4. Dec 15, 2016
  5. Dec 14, 2016
  6. Dec 13, 2016
  7. Dec 12, 2016
  8. Dec 09, 2016
    • Bogdan Dobrelya's avatar
      Preconfigure DNS stack and docker early · a15d6267
      Bogdan Dobrelya authored
      
      
      In order to enable offline/intranet installation cases:
      * Move DNS/resolvconf configuration to preinstall role. Remove
        skip_dnsmasq_k8s var as not needed anymore.
      
      * Preconfigure DNS stack early, which may be the case when downloading
        artifacts from intranet repositories. Do not configure
        K8s DNS resolvers for hosts /etc/resolv.conf yet early (as they may be
        not existing).
      
      * Reconfigure K8s DNS resolvers for hosts only after kubedns/dnsmasq
        was set up and before K8s apps to be created.
      
      * Move docker install task to early stage as well and unbind it from the
        etcd role's specific install path. Fix external flannel dependency on
        docker role handlers. Also fix the docker restart handlers' steps
        ordering to match the expected sequence (the socket then the service).
      
      * Add default resolver fact, which is
        the cloud provider specific and remove hardcoded GCE resolver.
      
      * Reduce default ndots for hosts /etc/resolv.conf to 2. Multiple search
        domains combined with high ndots values lead to poor performance of
        DNS stack and make ansible workers to fail very often with the
        "Timeout (12s) waiting for privilege escalation prompt:" error.
      
      * Update docs.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      a15d6267
    • Bogdan Dobrelya's avatar
      Add tags · 8cc84e13
      Bogdan Dobrelya authored
      
      
      Add tags to allow more granular tasks filtering.
      Add generator script for MD formatted tags found.
      Add docs for tags how-to.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      8cc84e13
  9. Dec 07, 2016
    • Dan Bode's avatar
      Allow etcd_access_addresses to be more flexible · eec2ed58
      Dan Bode authored
      The variale etcd_access_addresses is used to determine
      how to address communication from other roles to
      the etcd cluster.
      
      It was set to the address that ansible uses to
      connect to instance ({{ item }})s and not the
      the variable:
        ip_access
      which had already been created and could already
      be overridden through the access_ip variable.
      
      This change allows ansible to connect to a machine using
      a different address than the one used to access etcd.
      eec2ed58
    • Bogdan Dobrelya's avatar
      Change GCE sysctls placement and docs · f0f2b812
      Bogdan Dobrelya authored
      
      
      Override GCE sysctl in /etc/sysctl.d/99-sysctl.conf instead of
      the /etc/sysctl.d/11-gce-network-security.conf. It is recreated
      by GCE, f.e. if gcloud CLI invokes some security related changes,
      thus losing customizations we want to be persistent.
      
      Update cloud providers firewall requirements in calico docs.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      f0f2b812
  10. Dec 06, 2016
  11. Dec 02, 2016
  12. Nov 29, 2016
  13. Nov 21, 2016
  14. Nov 09, 2016
  15. Nov 08, 2016
  16. Oct 21, 2016
  17. Oct 19, 2016
  18. Oct 15, 2016
  19. Oct 05, 2016
  20. Sep 18, 2016
  21. Sep 15, 2016
  22. Sep 14, 2016
  23. Sep 13, 2016
  24. Aug 26, 2016
  25. Aug 23, 2016
  26. Aug 08, 2016
  27. Jul 26, 2016
    • Matthew Mosesohn's avatar
      Fix etcd standalone deployment · 1b1f5f22
      Matthew Mosesohn authored
      etcd facts are generated in kubernetes/preinstall, so etcd nodes need
      to be evaluated first before the rest of the deployment.
      
      Moved several directory facts from kubernetes/node to
      kubernetes/preinstall because they are not backward dependent.
      1b1f5f22
  28. Jul 25, 2016
    • Bogdan Dobrelya's avatar
      Add HA/LB endpoints for kube-apiserver · 731d32af
      Bogdan Dobrelya authored
      
      
      * Add HA docs for API server.
      * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver
      vars and usecases.
      * Use facts for kube_apiserver to not repeat code and enable LB endpoints use.
      * Use /healthz check for the wait-for apiserver.
      * Use the single endpoint for kubelet instead of the list of apiservers
      * Specify kube_apiserver_count to for HA layout
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      731d32af
  29. Jul 22, 2016
  30. Jul 21, 2016
    • Bogdan Dobrelya's avatar
      Add HA/LB endpoints for kube-apiserver · a70c3b66
      Bogdan Dobrelya authored
      
      
      * Add auto-evaluated internal endpoints and clarify the loadbalancer_apiserver
      vars and usecases.
      * Add loadbalancer_apiserver_localhost (default false). If enabled, override
      the external LB and expect localhost:443/8080 to be new internal only frontends.
      * Add kube_apiserver_multiaccess to ignore loadbalancers, and make clients
      to access the apiservers as a comma-separated list of access_ip/ip/ansible ip
      (a default mode). When disabled, allow clients to use the given loadbalancers.
      * Define connections security mode for kube controllers, schedulers, proxies.
      It is insecure be default, which is the current deployment choice.
      * Rework the groups['kube-master'][0] hardcode defining the apiserver
      endpoints.
      * Improve grouping of vars and add facts for kube_apiserver.
      * Define kube_apiserver_insecure_bind_address as a fact, add more
      facts for ease of use.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      a70c3b66
Loading