- Jan 15, 2017
-
-
Greg Althaus authored
be run by limit on each node without regard for order. The changes make sure that all of the directories needed to do certificate management are on the master[0] or etcd[0] node regardless of when the playbook gets run on each node. This allows for separate ansible playbook runs in parallel that don't have to be synchronized.
-
- Jan 13, 2017
-
-
Alexander Block authored
Also remove the check for != "RedHat" when removing the dhclient hook, as this had also to be done on other distros. Instead, check if the dhclienthookfile is defined.
- Jan 12, 2017
-
-
Greg Althaus authored
the tasks fail because selinux prevents ip-forwarding setting. Moving the tasks around addresses two issues. Makes sure that the correct python tools are in place before adjusting of selinux and makes sure that ipforwarding is toggled after selinux adjustments.
-
- Jan 11, 2017
-
-
Alexander Block authored
-
Matthew Mosesohn authored
-
- Jan 10, 2017
-
-
Brad Beam authored
-
- Jan 09, 2017
-
-
Matthew Mosesohn authored
This proxy should only be listening for local connections, not 0.0.0.0. Fixes #868
-
- Jan 06, 2017
-
-
Alexander Block authored
Also update reset.yml to do more dns/network related cleanup.
-
- Jan 05, 2017
-
-
Spencer Smith authored
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 04, 2017
-
-
Brad Beam authored
-
- Jan 02, 2017
-
-
Alexander Block authored
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 28, 2016
-
-
Bogdan Dobrelya authored
* Add restart for weave service unit * Reuse docker_bin_dir everythere * Limit systemd managed docker containers by CPU/RAM. Do not configure native systemd limits due to the lack of consensus in the kernel community requires out-of-tree kernel patches. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 27, 2016
-
-
Matthew Mosesohn authored
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 23, 2016
-
-
Bogdan Dobrelya authored
Also fix kube log level 4 to log dnsmasq queries. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 22, 2016
-
-
Matthew Mosesohn authored
Includes hooks for triggering calico, kubelet, and kube-apiserver restarts if etcd certs changed.
-
Alexander Block authored
This was alredy fixed in #755 but had to be reverted. This PR should be more intelligent about deciding which path to use.
-
- Dec 19, 2016
-
-
Alexander Block authored
Also refactor generation of kubelet args to not repeat args.
-
- Dec 16, 2016
-
-
Bogdan Dobrelya authored
Current design expects users to define at least one nameserver in the nameservers var to backup host OS DNS config when the K8s cluster DNS service IP is not available and hosts still have to resolve external or intranet FQDNs. Fix undefined nameservers to fallback to the default_resolver. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Bogdan Dobrelya authored
-
- Dec 15, 2016
-
-
Matthew Mosesohn authored
Fixes #754
-
Alexander Block authored
/etc/dhclient.conf is ignored on RedHat/CentOS Correct location is /etc/dhcp/dhclient.conf
-
- Dec 14, 2016
-
-
Alexander Block authored
-
Aleksandr Didenko authored
Add BGP route reflectors support in order to optimize BGP topology for deployments with Calico network plugin. Also bump version of calico/ctl for some bug fixes.
-
- Dec 13, 2016
-
-
Alexander Block authored
-
Alexander Block authored
-
Alexander Block authored
Allow to let the cloud provider configure proper routing for nodes.
-
Alexander Block authored
Fixes #732
-
Bogdan Dobrelya authored
Also place in global vars and do not repeat the kube_*_config_dir and kube_namespace vars for better code maintainability and UX. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Bogdan Dobrelya authored
Do not repeat options and nameservers in the dhclient hooks. Do not prepend nameservers for dhclient but supersede and fail back to the upstream_dns_resolvers then default_resolver. Fixes order of nameservers placement, which is cluster DNS ip goes always first. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Bogdan Dobrelya authored
-
- Dec 12, 2016
-
-
Bogdan Dobrelya authored
* For Debian/RedHat OS families (with NetworkManager/dhclient/resolvconf optionally enabled) prepend /etc/resolv.conf with required nameservers, options, and supersede domain and search domains via the dhclient/resolvconf hooks. * Drop (z)nodnsupdate dhclient hook and re-implement it to complement the resolvconf -u command, which is distro/cloud provider specific. Update docs as well. * Enable network restart to apply and persist changes and simplify handlers to rely on network restart only. This fixes DNS resolve for hostnet K8s pods for Red Hat OS family. Skip network restart for canal/calico plugins, unless https://github.com/projectcalico/felix/issues/1185 fixed. * Replace linefiles line plus with_items to block mode as it's faster. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com> Co-authored-by:
Matthew Mosesohn <mmosesohn@mirantis.com>
-
Alexander Block authored
-
Alexander Block authored
At least the OS images from Azure do not grow the root FS automatically.
-
- Dec 09, 2016
-
-
Bogdan Dobrelya authored
In order to enable offline/intranet installation cases: * Move DNS/resolvconf configuration to preinstall role. Remove skip_dnsmasq_k8s var as not needed anymore. * Preconfigure DNS stack early, which may be the case when downloading artifacts from intranet repositories. Do not configure K8s DNS resolvers for hosts /etc/resolv.conf yet early (as they may be not existing). * Reconfigure K8s DNS resolvers for hosts only after kubedns/dnsmasq was set up and before K8s apps to be created. * Move docker install task to early stage as well and unbind it from the etcd role's specific install path. Fix external flannel dependency on docker role handlers. Also fix the docker restart handlers' steps ordering to match the expected sequence (the socket then the service). * Add default resolver fact, which is the cloud provider specific and remove hardcoded GCE resolver. * Reduce default ndots for hosts /etc/resolv.conf to 2. Multiple search domains combined with high ndots values lead to poor performance of DNS stack and make ansible workers to fail very often with the "Timeout (12s) waiting for privilege escalation prompt:" error. * Update docs. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-