Skip to content
Snippets Groups Projects
  1. Sep 10, 2017
  2. Sep 01, 2017
  3. Aug 30, 2017
    • Maxim Krasilnikov's avatar
      Change single Vault pki mount to multi pki mounts paths for etcd and kube CA`s (#1552) · 6eb22c5d
      Maxim Krasilnikov authored
      * Added update CA trust step for etcd and kube/secrets roles
      
      * Added load_balancer_domain_name to certificate alt names if defined. Reset CA's in RedHat os.
      
      * Rename kube-cluster-ca.crt to vault-ca.crt, we need separated CA`s for vault, etcd and kube.
      
      * Vault role refactoring, remove optional cert vault auth because not not used and worked. Create separate CA`s fro vault and etcd.
      
      * Fixed different certificates set for vault cert_managment
      
      * Update doc/vault.md
      
      * Fixed condition create vault CA, wrong group
      
      * Fixed missing etcd_cert_path mount for rkt deployment type. Distribute vault roles for all vault hosts
      
      * Removed wrong when condition in create etcd role vault tasks.
      6eb22c5d
  4. Apr 13, 2017
  5. Mar 15, 2017
    • Matthew Mosesohn's avatar
      More idempotency fixes · a422ad0d
      Matthew Mosesohn authored
      Fixed sync_tokens fact
      Fixed sync_certs for k8s tokens fact
      Disabled register docker images changability
      Fixed CNI dir permission
      Fix idempotency for etcd pre upgrade checks
      a422ad0d
  6. Mar 04, 2017
  7. Feb 18, 2017
  8. Feb 09, 2017
  9. Feb 06, 2017
  10. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  11. Jan 17, 2017
  12. Jan 03, 2017
  13. Dec 22, 2016
  14. Dec 09, 2016
  15. Nov 09, 2016
  16. Jul 20, 2016
  17. Jul 19, 2016
    • Bogdan Dobrelya's avatar
      Add etcd proxy support · 32cd6e99
      Bogdan Dobrelya authored
      
      * Enforce a etcd-proxy role to a k8s-cluster group members. This
      provides an HA layout for all of the k8s cluster internal clients.
      * Proxies to be run on each node in the group as a separate etcd
      instances with a readwrite proxy mode and listen the given endpoint,
      which is either the access_ip:2379 or the localhost:2379.
      * A notion for the 'kube_etcd_multiaccess' is: ignore endpoints and
      loadbalancers and use the etcd members IPs as a comma-separated
      list. Otherwise, clients shall use the local endpoint provided by a
      etcd-proxy instances on each etcd node. A Netwroking plugins always
      use that access mode.
      * Fix apiserver's etcd servers args to use the etcd_access_endpoint.
      * Fix networking plugins flannel/calico to use the etcd_endpoint.
      * Fix name env var for non masters to be set as well.
      * Fix etcd_client_url was not used anywhere and other etcd_* facts
      evaluation was duplicated in a few places.
      * Define proxy modes only in the env file, if not a master. Del
      an automatic proxy mode decisions for etcd nodes in init/unit scripts.
      * Use Wants= instead of Requires= as "This is the recommended way to
      hook start-up of one unit to the start-up of another unit"
      * Make apiserver/calico Wants= etcd-proxy to keep it always up
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      Co-authored-by: default avatarMatthew Mosesohn <mmosesohn@mirantis.com>
      32cd6e99
  18. Jul 07, 2016
  19. May 31, 2016
    • Evgeny L's avatar
      Scale-up functionality for etcd cluster · 0500f27d
      Evgeny L authored
      * Set ETCD_INITIAL_CLUSTER_STATE from `new` to `existing`,
      because parameter `new` makes sense only on cluster assembly
      stage.
      * If cluster exists and current node is not a part
      of the cluster, add it with command `etcdctl add member name url`.
      
      Closes kubespray/kargo/#270
      0500f27d
  20. Jan 25, 2016
  21. Jan 23, 2016
  22. Jan 21, 2016
    • Smaine Kahlouch's avatar
      etcd directly in host · 97159623
      Smaine Kahlouch authored
      fix etcd configuration for nodes
      
      fix wrong calico checksums
      
      using a var name etcd_bin_dir
      
      fix etcd handlers for sysvinit
      
      using a var name etcd_bin_dir
      
      sysvinit script
      
      review etcd configuration
      97159623
  23. Jan 15, 2016
  24. Dec 30, 2015
  25. Dec 29, 2015
  26. Oct 04, 2015
Loading