Skip to content
  1. Feb 26, 2019
    • Gabor Lekeny's avatar
      Speed up tasks (#4278) · b4aaa7b9
      Gabor Lekeny authored
      * fact gathering should run only once per node
      * eliminate ansible version check, it is at the beginning of each
        playbook
      b4aaa7b9
  2. Feb 12, 2019
  3. Feb 02, 2019
  4. Dec 27, 2018
  5. Dec 18, 2018
  6. Dec 12, 2018
  7. Dec 06, 2018
    • Andreas Krüger's avatar
      Remove non-kubeadm deployment (#3811) · ddffdb63
      Andreas Krüger authored
      * Remove non-kubeadm deployment
      
      * More cleanup
      
      * More cleanup
      
      * More cleanup
      
      * More cleanup
      
      * Fix gitlab
      
      * Try stop gce first before absent to make the delete process work
      
      * More cleanup
      
      * Fix bug with checking if kubeadm has already run
      
      * Fix bug with checking if kubeadm has already run
      
      * More fixes
      
      * Fix test
      
      * fix
      
      * Fix gitlab checkout untill kubespray 2.8 is on quay
      
      * Fixed
      
      * Add upgrade path from non-kubeadm to kubeadm. Revert ssl path
      
      * Readd secret checking
      
      * Do gitlab checks from v2.7.0 test upgrade path to 2.8.0
      
      * fix typo
      
      * Fix CI jobs to kubeadm again. Fix broken hyperkube path
      
      * Fix gitlab
      
      * Fix rotate tokens
      
      * More fixes
      
      * More fixes
      
      * Fix tokens
      ddffdb63
  8. Nov 12, 2018
  9. Nov 10, 2018
  10. Oct 24, 2018
  11. Oct 17, 2018
  12. Oct 16, 2018
    • JuanJo Ciarlante's avatar
      [jjo] add kube-router support (#3339) · a5edd0d7
      JuanJo Ciarlante authored
      * [jjo] add kube-router support
      
      Fixes cloudnativelabs/kube-router#147.
      
      * add kube-router as another network_plugin choice
      * support most used kube-router flags via
        `kube_router_foo` vars as other plugins
      * implement replacing kube-proxy (--run-service-proxy=true) via
        `kube_proxy_mode: none`, verified in a _non kubeadm_enabled_
        install, should also work for recent kubeadm releases via
        `skipKubeProxyInstall: true` config
      
      * [jjo] address PR#3339 review from @woopstar
      
      * add busybox image used by kube-router to downloads
      
      * fix busybox download groups key
      
      * rework kubeadm_enabled + kube_router_run_service_proxy
      
      - verify it working ok w/the kubeadm_enabled and
        kube_router_run_service_proxy true or false
      
      - introduce `kube_proxy_remove` fact, to decouple logic
        from kube_proxy_mode (which affects kubeadm configmap
        settings, thus no-good to ab-use it to 'none')
      
      * improve kube-router.md re: kubeadm_enabled and kube_router_run_service_proxy
      
      * address @woopstar latest review
      
      * add inventory/sample/group_vars/k8s-cluster/k8s-net-kube-router.yml
      
      * fix kube_router_run_service_proxy conditional for kube-proxy removal
      
      * fix kube_proxy_remove fact (w/ |bool), add some needed kube-proxy tags on my and existing changes
      
      * update kube-router tolerations for 1.12 compatibility
      
      * add PriorityClass to kube-router DaemonSet
      a5edd0d7
  13. Oct 11, 2018
  14. Sep 21, 2018
  15. Sep 20, 2018
  16. Sep 19, 2018
  17. Aug 31, 2018
  18. Aug 22, 2018
  19. Aug 21, 2018
  20. Aug 20, 2018
  21. Aug 07, 2018
  22. May 27, 2018
  23. May 22, 2018
  24. May 18, 2018
  25. May 16, 2018
    • Christopher J. Ruwe's avatar
      assert that number of pods on node does not exceed CIDR address range · c1bc4615
      Christopher J. Ruwe authored
      The number of pods on a given node is determined by the  --max-pods=k
      directive. When the address space is exhausted, no more pods can be
      scheduled even if from the --max-pods-perspective, the node still has
      capacity.
      
      The special case that a pod is scheduled and uses the node IP in the
      host network namespace is too "soft" to derive a guarantee.
      
      Comparing kubelet_max_pods with kube_network_node_prefix when given
      allows to assert that pod limits match the CIDR address space.
      c1bc4615
  26. Apr 26, 2018
  27. Apr 23, 2018
  28. Apr 11, 2018
  29. Feb 17, 2018
    • melkosoft's avatar
      Added cilium support (#2236) · f13e76d0
      melkosoft authored
      * Added cilium support
      
      * Fix typo in debian test config
      
      * Remove empty lines
      
      * Changed cilium version from <latest> to <v1.0.0-rc3>
      
      * Add missing changes for cilium
      
      * Add cilium to CI pipeline
      
      * Fix wrong file name
      
      * Check kernel version for cilium
      
      * fixed ci error
      
      * fixed cilium-ds.j2 template
      
      * added waiting for cilium pods to run
      
      * Fixed missing EOF
      
      * Fixed trailing spaces
      
      * Fixed trailing spaces
      
      * Fixed trailing spaces
      
      * Fixed too many blank lines
      
      * Updated tolerations,annotations in cilium DS template
      
      * Set cilium_version to iptables-1.9 to see if bug is fixed in CI
      
      * Update cilium image tag to v1.0.0-rc4
      
      * Update Cilium test case CI vars filenames
      
      * Add optional prometheus flag, adjust initial readiness delay
      
      * Update README.md with cilium info
      f13e76d0
  30. Dec 06, 2017
  31. Dec 05, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · b8788421
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled).
      
      Rework of #1937 with kubeadm support
      
      Also, fixed an issue in `kubeadm-migrate-certs` where the old apiserver cert was copied as the kubeadm key
      b8788421
  32. Nov 15, 2017
  33. Nov 14, 2017
  34. Nov 07, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · 0c7e1889
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). It's working, but so far I have had to:
      
      1. Make the `uri` module "Wait for apiserver up" checks use `kube_apiserver_port` (HTTPS)
      2. Add apiserver client cert/key to the "Wait for apiserver up" checks
      3. Update apiserver liveness probe to use HTTPS ports
      4. Set `kube_api_anonymous_auth` to true to allow liveness probe to hit apiserver's /healthz over HTTPS (livenessProbes can't use client cert/key unfortunately)
      5. RBAC has to be enabled. Anonymous requests are in the `system:unauthenticated` group which is granted access to /healthz by one of RBAC's default ClusterRoleBindings. An equivalent ABAC rule could allow this as well.
      
      Changes 1 and 2 should work for everyone, but 3, 4, and 5 require new coupling of currently independent configuration settings. So I also added a new settings check.
      
      Options:
      
      1. The problem goes away if you have both anonymous-auth and RBAC enabled. This is how kubeadm does it. This may be the best way to go since RBAC is already on by default but anonymous auth is not.
      2. Include conditional templates to set a different liveness probe for possible combinations of `kube_apiserver_insecure_port = 0`, RBAC, and `kube_api_anonymous_auth` (won't be possible to cover every case without a guaranteed authorizer for the secure port)
      3. Use basic auth headers for the liveness probe (I really don't like this, it adds a new dependency on basic auth which I'd also like to leave independently configurable, and it requires encoded passwords in the apiserver manifest)
      
      Option 1 seems like the clear winner to me, but is there a reason we wouldn't want anonymous-auth on by default? The apiserver binary defaults anonymous-auth to true, but kubespray's default was false.
      0c7e1889
  35. Nov 03, 2017
    • Günther Grill's avatar
      Workaround ansible bug where access var via dict doesn't get real value (#1912) · 01957255
      Günther Grill authored
      * Change deprecated vagrant ansible flag 'sudo' to 'become'
      
      * Workaround ansible bug where access var via dict doesn't get real value
      
      When accessing a variable via it's name "{{ foo }}" its value is
      retrieved. But when the variable value is retrieved via the vars-dict
      "{{ vars['foo'] }}" this doesn't resolve the expression of the variable
      any more due to a bug. So e.g. a expression foo="{{ 1 == 1 }}" isn't
      longer resolved but just returned as string "1 == 1".
      
      * Make file yamllint complient
      01957255
  36. Oct 27, 2017
  37. Oct 20, 2017
  38. Oct 17, 2017
Loading