Skip to content
Snippets Groups Projects
  1. Mar 01, 2018
  2. Oct 20, 2017
  3. Mar 29, 2017
  4. Mar 24, 2017
  5. Feb 28, 2017
  6. Feb 07, 2017
    • Matthew Mosesohn's avatar
      Re-tune ETCD performance params · 71e14a13
      Matthew Mosesohn authored
      Reduce election timeout to 5000ms (was 10000ms)
      Raise heartbeat interval to 250ms (was 100ms)
      Remove etcd cpu share (was 300)
      Make etcd_cpu_limit and etcd_memory_limit optional.
      71e14a13
  7. Feb 06, 2017
  8. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  9. Dec 28, 2016
  10. Nov 18, 2016
  11. Nov 09, 2016
  12. Aug 02, 2016
    • Matthew Mosesohn's avatar
      Move docker systemd unit creation to docker role · e8a1c7a5
      Matthew Mosesohn authored
      Creating the unit using default settings early on
      and then changing it during network_plugin section
      leads to too many docker restarts and duplicated code.
      
      Reversed Wants= dependence on docker.service so it does not
      restart docker when reloading systemd
      
      Consolidated all docker restart handlers.
      e8a1c7a5
    • Bogdan Dobrelya's avatar
      Rework systemd service units · 2af71f31
      Bogdan Dobrelya authored
      
      * Add for docker system units:
          ExecReload=/bin/kill -s HUP $MAINPID
          Delegate=yes
          KillMode=process.
      * Add missed DOCKER_OPTIONS for calico/weave docker systemd unit.
      * Change Requires= to a less strict and non-faily Wants=, add missing
        Wants= for After=.
      * Align wants/after in a wat if Wants=foo, After= has foo as well.
      * Make wants/after docker.service to ask for the docker.socket as well.
      * Move "docker rm -f" commands from ExecStartPre= to ExecStopPost=.
        hooks to ensure non-destructive start attempts issued by Wants=.
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      2af71f31
  13. Jul 29, 2016
  14. Jul 20, 2016
    • Matthew Mosesohn's avatar
      Set default etcd deployment to docker · 7a86b6c7
      Matthew Mosesohn authored
      Improved docker reload command to wait for etcd to be
      up before proceeding. Switched reload to run restart
      because it can't reload if it is not guaranteed to be
      in running state.
      7a86b6c7
  15. Jul 19, 2016
    • Bogdan Dobrelya's avatar
      Add etcd proxy support · 32cd6e99
      Bogdan Dobrelya authored
      
      * Enforce a etcd-proxy role to a k8s-cluster group members. This
      provides an HA layout for all of the k8s cluster internal clients.
      * Proxies to be run on each node in the group as a separate etcd
      instances with a readwrite proxy mode and listen the given endpoint,
      which is either the access_ip:2379 or the localhost:2379.
      * A notion for the 'kube_etcd_multiaccess' is: ignore endpoints and
      loadbalancers and use the etcd members IPs as a comma-separated
      list. Otherwise, clients shall use the local endpoint provided by a
      etcd-proxy instances on each etcd node. A Netwroking plugins always
      use that access mode.
      * Fix apiserver's etcd servers args to use the etcd_access_endpoint.
      * Fix networking plugins flannel/calico to use the etcd_endpoint.
      * Fix name env var for non masters to be set as well.
      * Fix etcd_client_url was not used anywhere and other etcd_* facts
      evaluation was duplicated in a few places.
      * Define proxy modes only in the env file, if not a master. Del
      an automatic proxy mode decisions for etcd nodes in init/unit scripts.
      * Use Wants= instead of Requires= as "This is the recommended way to
      hook start-up of one unit to the start-up of another unit"
      * Make apiserver/calico Wants= etcd-proxy to keep it always up
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      Co-authored-by: default avatarMatthew Mosesohn <mmosesohn@mirantis.com>
      32cd6e99
  16. Jul 07, 2016
Loading