- Sep 10, 2017
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
- Sep 01, 2017
-
-
Brad Beam authored
-
- Aug 31, 2017
-
-
Brad Beam authored
-
- Aug 25, 2017
-
-
Chad Swenson authored
* Updates Controller Manager/Kubelet with Flannel's required configuration for CNI * Removes old Flannel installation * Install CNI enabled Flannel DaemonSet/ConfigMap/CNI bins and config (with portmap plugin) on host * Uses RBAC if enabled * Fixed an issue that could occur if br_netfilter is not a module and net.bridge.bridge-nf-call-iptables sysctl was not set
-
Hassan Zamani authored
-
- Aug 24, 2017
-
-
Brad Beam authored
* Adding yaml linter to ci check * Minor linting fixes from yamllint * Changing CI to install python pkgs from requirements.txt - adding in a secondary requirements.txt for tests - moving yamllint to tests requirements
-
- Aug 20, 2017
-
-
Miad Abrin authored
* Fix Typo etc3 -> etcd3 * Fix typo in post-upgrade of master. stop -> start
-
- Jul 27, 2017
-
-
Anton authored
-
- Jul 17, 2017
-
-
jwfang authored
-
- Jun 16, 2017
-
-
Spencer Smith authored
-
- Jun 12, 2017
-
-
Gregory Storme authored
-
- May 31, 2017
-
-
Spencer Smith authored
-
- May 27, 2017
-
-
Spencer Smith authored
-
- Apr 20, 2017
-
-
Sergii Golovatiuk authored
According to code apiserver, scheduler, controller-manager, proxy don't use resolution of objects they created. It's not harmful to change policy to have external resolver. Signed-off-by: Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Apr 19, 2017
-
-
Hans Kristian Flaatten authored
-
- Apr 17, 2017
-
-
Spencer Smith authored
-
Spencer Smith authored
-
Spencer Smith authored
-
gbolo authored
-
- Apr 15, 2017
-
-
Spencer Smith authored
-
- Apr 06, 2017
-
-
Matthew Mosesohn authored
-
- Apr 05, 2017
-
-
Sergii Golovatiuk authored
- Renaming templates for netchecker - Add dnsPolicy: ClusterFirstWithHostNet to kube-proxy Signed-off-by: Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Apr 04, 2017
-
-
Sergii Golovatiuk authored
In kubernetes 1.6 ClusterFirstWithHostNet was added as an option. In accordance to it kubelet will generate resolv.conf based on own resolv.conf. However, this doesn't create 'options', thus the proper solution requires some investigation. This patch sets the same resolv.conf for kubelet as host Signed-off-by: Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Apr 03, 2017
-
-
Matthew Mosesohn authored
-
- Mar 30, 2017
-
-
Matthew Mosesohn authored
-
- Mar 27, 2017
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
Canal runs more pods and upgrades need a bit of extra room to load new pods in and get the old ones out.
-
Matthew Mosesohn authored
-
- Mar 23, 2017
-
-
Vladimir Rutsky authored
Non-brekable space is 0xc2 0xa0 byte sequence in UTF-8. To find one: $ git grep -I -P '\xc2\xa0' To replace with regular space: $ git grep -l -I -P '\xc2\xa0' | xargs sed -i 's/\xc2\xa0/ /g' This commit doesn't include changes that will overlap with commit f1c59a91.
-
- Mar 17, 2017
-
-
Aleksandr Didenko authored
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
-
- Mar 15, 2017
-
-
Matthew Mosesohn authored
Fixed sync_tokens fact Fixed sync_certs for k8s tokens fact Disabled register docker images changability Fixed CNI dir permission Fix idempotency for etcd pre upgrade checks
-
- Mar 14, 2017
-
-
Vincent Schwarzer authored
It is now possible to deactivate selected authentication methods (basic auth, token auth) inside the cluster by adding removing the required arguments to the Kube API Server and generating the secrets accordingly. The x509 authentification is currently not optional because disabling it would affect the kubectl clients deployed on the master nodes.
-
Matthew Mosesohn authored
Default backend is now etcd3 (was etcd2). The migration process consists of the following steps: * check if migration is necessary * stop etcd on first etcd server * run migration script * start etcd on first etcd server * stop kube-apiserver until configuration is updated * update kube-apiserver * purge old etcdv2 data
-
- Mar 06, 2017
-
-
Vincent Schwarzer authored
To use OpenID Connect Authentication beside deploying an OpenID Connect Identity Provider it is necesarry to pass additional arguments to the Kube API Server. These required arguments were added to the kube apiserver manifest.
-