Skip to content
Snippets Groups Projects
  1. Sep 04, 2017
  2. Mar 17, 2017
    • Aleksandr Didenko's avatar
      Move calico-policy-controller into separate role · 3a399040
      Aleksandr Didenko authored
      By default Calico CNI does not create any network access policies
      or profiles if 'policy' is enabled in CNI config. And without any
      policies/profiles network access to/from PODs is blocked.
      
      K8s related policies are created by calico-policy-controller in
      such case. So we need to start it as soon as possible, before any
      real workloads.
      
      This patch also fixes kube-api port in calico-policy-controller
      yaml template.
      
      Closes #1132
      3a399040
  3. Jan 25, 2017
    • Aleksandr Didenko's avatar
      Switch to ansible_hostname in calico · 46c177b9
      Aleksandr Didenko authored
      For consistancy with kubernetes services we should use the same
      hostname for nodes, which is 'ansible_hostname'.
      
      Also fixing missed 'kube-node' in templates, Calico is installed
      on 'k8s-cluster' roles, not only 'kube-node'.
      46c177b9
  4. Dec 22, 2016
  5. Dec 07, 2016
  6. Dec 06, 2016
  7. Nov 15, 2016
  8. Nov 09, 2016
  9. Oct 10, 2016
  10. Oct 06, 2016
  11. Jul 19, 2016
    • Bogdan Dobrelya's avatar
      Add etcd proxy support · 32cd6e99
      Bogdan Dobrelya authored
      
      * Enforce a etcd-proxy role to a k8s-cluster group members. This
      provides an HA layout for all of the k8s cluster internal clients.
      * Proxies to be run on each node in the group as a separate etcd
      instances with a readwrite proxy mode and listen the given endpoint,
      which is either the access_ip:2379 or the localhost:2379.
      * A notion for the 'kube_etcd_multiaccess' is: ignore endpoints and
      loadbalancers and use the etcd members IPs as a comma-separated
      list. Otherwise, clients shall use the local endpoint provided by a
      etcd-proxy instances on each etcd node. A Netwroking plugins always
      use that access mode.
      * Fix apiserver's etcd servers args to use the etcd_access_endpoint.
      * Fix networking plugins flannel/calico to use the etcd_endpoint.
      * Fix name env var for non masters to be set as well.
      * Fix etcd_client_url was not used anywhere and other etcd_* facts
      evaluation was duplicated in a few places.
      * Define proxy modes only in the env file, if not a master. Del
      an automatic proxy mode decisions for etcd nodes in init/unit scripts.
      * Use Wants= instead of Requires= as "This is the recommended way to
      hook start-up of one unit to the start-up of another unit"
      * Make apiserver/calico Wants= etcd-proxy to keep it always up
      
      Signed-off-by: default avatarBogdan Dobrelya <bdobrelia@mirantis.com>
      Co-authored-by: default avatarMatthew Mosesohn <mmosesohn@mirantis.com>
      32cd6e99
  12. Feb 09, 2016
Loading