- Feb 23, 2017
-
-
Antoine Legrand authored
-
Antoine Legrand authored
-
Bogdan Dobrelya authored
* Leave all.yml to keep only optional vars * Store groups' specific vars by existing group names * Fix optional vars casted as mandatory (add default()) * Fix missing defaults for an optional IP var * Relink group_vars for terraform to reflect changes Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Feb 21, 2017
-
-
Sergii Golovatiuk authored
Docker 1.13 changes the behaviour of iptables defaults from allow to drop. This patch disables docker's iptables management as it was in Docker 1.12 [1] [1] https://github.com/docker/docker/pull/28257 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Feb 20, 2017
-
-
Matthew Mosesohn authored
-
- Feb 15, 2017
-
-
Matthew Mosesohn authored
-
- Feb 14, 2017
-
-
Hung Nguyen Viet authored
-
- Feb 10, 2017
-
-
Alexander Block authored
-
- Feb 09, 2017
-
-
Vladimir Rutsky authored
-
Greg Althaus authored
Update code and docs for that assumption.
-
Greg Althaus authored
kubelet lost the ability to load kernel modules. This puts that back by adding the lib/modules mount to kubelet. The new variable kubelet_load_modules can be set to true to enable this item. It is OFF by default.
-
Josh Conant authored
-
Josh Conant authored
-
- Feb 06, 2017
-
-
Vladimir Rutsky authored
-
Vladimir Rutsky authored
-
Matthew Mosesohn authored
-
- Feb 04, 2017
-
-
Brad Beam authored
-
- Jan 23, 2017
-
-
David Kirstein authored
This makes it a bit more secure. Also the password can now be changed with a (inventory) variable (no need to edit all.yml).
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 15, 2017
-
-
Greg Althaus authored
the which port the local nginx proxy should listen on for HA local balancer configurations.
-
- Jan 06, 2017
-
-
Alexander Block authored
Also update reset.yml to do more dns/network related cleanup.
-
- Jan 05, 2017
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 03, 2017
- Jan 02, 2017
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 28, 2016
-
-
Bogdan Dobrelya authored
* Add restart for weave service unit * Reuse docker_bin_dir everythere * Limit systemd managed docker containers by CPU/RAM. Do not configure native systemd limits due to the lack of consensus in the kernel community requires out-of-tree kernel patches. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 16, 2016
-
-
Matthew Mosesohn authored
-
- Dec 14, 2016
-
-
Alexander Block authored
https://github.com/kubernetes-incubator/kargo/pull/736 missed this
-
- Dec 13, 2016
-
-
Alexander Block authored
-
Alexander Block authored
Allow to let the cloud provider configure proper routing for nodes.
-
Alexander Block authored
Also allows to perform version dependent logic in Ansible roles.
-
Alexander Block authored
Fixes #732
-
Bogdan Dobrelya authored
Also place in global vars and do not repeat the kube_*_config_dir and kube_namespace vars for better code maintainability and UX. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 12, 2016
-
-
Alexander Block authored
It actually slows down things dramatically when used in combination with Ansible.
-
- Dec 09, 2016
-
-
Bogdan Dobrelya authored
In order to enable offline/intranet installation cases: * Move DNS/resolvconf configuration to preinstall role. Remove skip_dnsmasq_k8s var as not needed anymore. * Preconfigure DNS stack early, which may be the case when downloading artifacts from intranet repositories. Do not configure K8s DNS resolvers for hosts /etc/resolv.conf yet early (as they may be not existing). * Reconfigure K8s DNS resolvers for hosts only after kubedns/dnsmasq was set up and before K8s apps to be created. * Move docker install task to early stage as well and unbind it from the etcd role's specific install path. Fix external flannel dependency on docker role handlers. Also fix the docker restart handlers' steps ordering to match the expected sequence (the socket then the service). * Add default resolver fact, which is the cloud provider specific and remove hardcoded GCE resolver. * Reduce default ndots for hosts /etc/resolv.conf to 2. Multiple search domains combined with high ndots values lead to poor performance of DNS stack and make ansible workers to fail very often with the "Timeout (12s) waiting for privilege escalation prompt:" error. * Update docs. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
Alexander Block authored
-
- Dec 03, 2016
-
-
Chad Swenson authored
-
- Nov 29, 2016
-
-
Sebastian Melchior authored
-
- Nov 28, 2016
-
-
Bogdan Dobrelya authored
* Add an option to deploy K8s app to test e2e network connectivity and cluster DNS resolve via Kubedns for nethost/simple pods (defaults to false). * Parametrize existing k8s apps templates with kube_namespace and kube_config_dir instead of hardcode. * For CoreOS, ensure nameservers from inventory to be put in the first place to allow hostnet pods connectivity via short names or FQDN and hostnet agents to pass as well, if netchecker deployed. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 22, 2016
-
-
Bogdan Dobrelya authored
According to http://kubernetes.io/docs/user-guide/images/ : By default, the kubelet will try to pull each image from the specified registry. However, if the imagePullPolicy property of the container is set to IfNotPresent or Never, then a local\ image is used (preferentially or exclusively, respectively). Use IfNotPresent value to allow images prepared by the download role dependencies to be effectively used by kubelet without pull errors resulting apps to stay blocked in PullBackOff/Error state even when there are images on the localhost exist. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-