- Mar 26, 2019
-
-
Matthew Mosesohn authored
-
Etienne authored
-
- Mar 20, 2019
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
This reverts commit ea7a6f1c. This change modified the certs dir for Kubernetes, but did not move the directories for existing clusters.
-
- Mar 18, 2019
-
-
Dmitry Chepurovskiy authored
-
- Mar 14, 2019
-
-
Matthew Mosesohn authored
Pods on down/unresponsive nodes can't be deleted without --force --grace-period=0. Fixes #4314
-
- Mar 13, 2019
-
-
Manuel Cintron authored
-
Matthew Mosesohn authored
* Move most coredns templates to static files This should speed up the task slightly * yaml lint fixes
-
- Mar 07, 2019
-
-
Bort Verwilst authored
-
- Mar 06, 2019
-
-
chadswilson authored
* add blockSize to IPPool spec for Calico >= v3.3.0 * fix "cidr" spec in Calico IPPool resource for my PR
-
- Mar 05, 2019
-
-
Matthew Mosesohn authored
* Remove hard dependence on facts for all nodes * Update main.yaml * Update main.yaml
-
- Mar 01, 2019
-
-
Matthew Mosesohn authored
-
- Feb 28, 2019
-
-
Bort Verwilst authored
* Add 1.12.6, sort arm64 descending * remove 1.10.x checksums (EOL anyways)
-
Matthew Mosesohn authored
-
- Feb 26, 2019
-
-
Anupam Basak authored
-
Peter Metz authored
* feat(external-provisioner/local-path-provisioner): adds support for local path provisioner Helpful for local development but also in production workloads (once the permission model is worked out) where you have redundancy built into the software uses the PVCs (e.g. database cluster with synchronous replication) * feat(local-path-provisioner): adds debug flag, image tag group var * fix(local-path-provisioner): moves image repo/tag to download role * test(gce_centos7-flannel): enables local-path-provisioner in test case * fix(addons): add image repo/tag to commented default values * fix(local-path-provisioner): typo in jinja template for local path provisioner * style(local-path-provisioner): debug flag condition re-formatted * fix(local-path-provisioner): adds missing default value for debug flag * fix(local-path-provisioner): syntax fix for debug if condition end * fix(local-path-provisioner): jinja template syntax: if condition white space
-
hikoz authored
-
hikoz authored
* 30MiB for gpu-device-plugin * use vars for easier configuration
-
Wong Hoi Sing Edison authored
Upstream Changes: - weave 2.5.1 (https://github.com/weaveworks/weave/releases/tag/v2.5.1) Our Changes: - Sync templates with upstream changes
-
Ryler Hockenbury authored
-
Gabor Lekeny authored
* fact gathering should run only once per node * eliminate ansible version check, it is at the beginning of each playbook
-
Vasilis Remmas authored
-
Etienne authored
-
- Feb 25, 2019
-
-
Matthew Mosesohn authored
-
Matthew Mosesohn authored
-
Kaoet authored
The lastest version of ubuntu-nvidia-driver-installer contains a fix for https://github.com/GoogleCloudPlatform/container-engine-accelerators/issues/90 which causes the installer pod to crash when driver is already loaded.
-
- Feb 21, 2019
-
-
Frank Ritchie authored
This was already approved in #4106 but there are CI issues with that PR due to references to kubernetes incubator. After upgrading to Kubespray 2.8.1 with Kubeadm enabled Rook Ceph volume provision failed due to the flexvolume plugin dir not being correct. Adding the var fixed the issue
-
- Feb 20, 2019
-
-
Maxime Guyot authored
-
Abdulaziz AlMalki authored
-
Seungkyu Ahn authored
because of etc-kubernetes-manifests not empty.
-
- Feb 19, 2019
-
-
Manuel Cintron authored
* Adding ability to maintain existing Encryption Secrets at Rest. If secrets_encryption.yaml is present it will not be overriten with a new kube_encrypt_token. This should allow for it to be set ahead of a playbook running or maintain it if cluster.yml is ran on the same cluster and the ansible host does not have access to the secrets. * Setting existing kube_encrypt_token across all master nodes in case it was missing in one or more nodes.
-
Florent Monbillard authored
-
- Feb 18, 2019
-
-
Kaoet authored
-
- Feb 14, 2019
-
-
Chad Swenson authored
For some reason 18.09 packages are now prefixed with `5:` in the download.docker.com apt repos Followup to #4236
-
Ryler Hockenbury authored
-
Kaoet authored
-
hikoz authored
-
Chad Swenson authored
This fixes an issue where the `nodename` in calico's cni config json can fall out of sync with the k8s node name used by the calico pod if `kube_override_hostname` is set
-
- Feb 13, 2019
-
-
Florent Monbillard authored
Currently, the task `container_download | download images for kubeadm config images` fetches etcd image even though it's not required (etcd is bootstrapped by kubespray, not kubeadm). `kubeadm-images.yaml` is only a subset of `kubeadm-config.yaml`, therefore ``kubeadm config images pull` will try to get all this list (including etcd) ``` # kubeadm config images list --config /etc/kubernetes/kubeadm-images.yaml k8s.gcr.io/kube-apiserver:v1.13.2 k8s.gcr.io/kube-controller-manager:v1.13.2 k8s.gcr.io/kube-scheduler:v1.13.2 k8s.gcr.io/kube-proxy:v1.13.2 k8s.gcr.io/pause:3.1 k8s.gcr.io/etcd:3.2.24 k8s.gcr.io/coredns:1.2.6 ``` When using the `kubeadm-config.yaml` though, it doesn't list etcd image: ``` # kubeadm config images list --config /etc/kubernetes/kubeadm-config.yaml k8s.gcr.io/kube-apiserver:v1.13.2 k8s.gcr.io/kube-controller-manager:v1.13.2 k8s.gcr.io/kube-scheduler:v1.13.2 k8s.gcr.io/kube-proxy:v1.13.2 k8s.gcr.io/pause:3.1 k8s.gcr.io/coredns:1.2.6 ``` This change just adds the etcd endpoints in the `kubeadm-images.yaml` to give a hint to kubeadm it doesn't need etcd image for its boostrapping as etcd is "external". I confess it is a ugly hack, a better way would be to use a single `kubeadm-config.yaml` for both tasks, but they are triggered by different roles (`kubeadm-images.yaml` is used by download, `kubeadm-config.yaml` by kubernetes/master) at different steps and I didn't want to refactor too many things to prevent breakage. This is specially useful for offline installation where a whitelist of container images is mirrored on a local private container registry. `k8s.gcr.io/etcd` and `quay.io/coreos/etcd` are two different repositories hosting the same images but using *different tags*! * coreos/etcd:v3.2.24 * k8s.gcr.io/etcd:3.2.24 (note the missing 'v' in the tag name)
-
Chad Swenson authored
This updates docker 18.06 and 18.09 with the two patches released yesterday to address the new runc exploit. Details here: https://kubernetes.io/blog/2019/02/11/runc-and-cve-2019-5736/
-