Skip to content
  1. Aug 16, 2018
  2. Aug 07, 2018
  3. May 11, 2018
    • Matthew Mosesohn's avatar
      refactor vault role (#2733) · 07cc9819
      Matthew Mosesohn authored
      * Move front-proxy-client certs back to kube mount
      
      We want the same CA for all k8s certs
      
      * Refactor vault to use a third party module
      
      The module adds idempotency and reduces some of the repetitive
      logic in the vault role
      
      Requires ansible-modules-hashivault on ansible node and hvac
      on the vault hosts themselves
      
      Add upgrade test scenario
      Remove bootstrap-os tags from tasks
      
      * fix upgrade issues
      
      * improve unseal logic
      
      * specify ca and fix etcd check
      
      * Fix initialization check
      
      bump machine size
      07cc9819
  4. Apr 23, 2018
  5. Apr 10, 2018
  6. Apr 09, 2018
  7. Mar 31, 2018
  8. Mar 21, 2018
  9. Mar 15, 2018
    • Andreas Krüger's avatar
      Added option for encrypting secrets to etcd v.2 (#2428) · 3d6fd491
      Andreas Krüger authored
      * Added option for encrypting secrets to etcd
      
      * Fix keylength to 32
      
      * Forgot the default
      
      * Rename secrets.yaml to secrets_encryption.yaml
      
      * Fix static path for secrets file to use ansible variable
      
      * Rename secrets.yaml.j2 to secrets_encryption.yaml.j2
      
      * Base64 encode the token
      
      * Fixed merge error
      
      * Changed path to credentials dir
      
      * Update path to secrets file which is now readable inside the apiserver container. Set better file permissions
      
      * Add encryption option to k8s-cluster.yml
      3d6fd491
  10. Mar 05, 2018
    • Ayaz Ahmed Khan's avatar
      Explicitly defines the --kubelet-preferred-address-types parameter · 89847d56
      Ayaz Ahmed Khan authored
      to the API server configuration.
      
      This solves the problem where if you have non-resolvable node names,
      and try to scale the server by adding new nodes, kubectl commands
      start to fail for newly added nodes, giving a TCP timeout error when
      trying to resolve the node hostname against a public DNS.
      89847d56
  11. Feb 12, 2018
  12. Feb 09, 2018
  13. Feb 05, 2018
  14. Jan 23, 2018
  15. Jan 18, 2018
  16. Dec 20, 2017
  17. Nov 29, 2017
    • Steven Hardy's avatar
      Allow setting --bind-address for apiserver hyperkube (#1985) · d39a88d6
      Steven Hardy authored
      * Allow setting --bind-address for apiserver hyperkube
      
      This is required if you wish to configure a loadbalancer (e.g haproxy)
      running on the master nodes without choosing a different port for the
      vip from that used by the API - in this case you need the API to bind to
      a specific interface, then haproxy can bind the same port on the VIP:
      
      root@overcloud-controller-0 ~]# netstat -taupen | grep 6443
      tcp        0      0 192.168.24.6:6443       0.0.0.0:*               LISTEN      0          680613     134504/haproxy
      tcp        0      0 192.168.24.16:6443      0.0.0.0:*               LISTEN      0          653329     131423/hyperkube
      tcp        0      0 192.168.24.16:6443      192.168.24.16:58404     ESTABLISHED 0          652991     131423/hyperkube
      tcp        0      0 192.168.24.16:58404     192.168.24.16:6443      ESTABLISHED 0          652986     131423/hyperkube
      
      This can be achieved e.g via:
      
      kube_apiserver_bind_address: 192.168.24.16
      
      * Address code review feedback
      
      * Update kube-apiserver.manifest.j2
      d39a88d6
  18. Oct 24, 2017
  19. Oct 15, 2017
  20. Oct 13, 2017
  21. Sep 13, 2017
    • Matthew Mosesohn's avatar
      kubeadm support (#1631) · 67447260
      Matthew Mosesohn authored
      * kubeadm support
      
      * move k8s master to a subtask
      * disable k8s secrets when using kubeadm
      * fix etcd cert serial var
      * move simple auth users to master role
      * make a kubeadm-specific env file for kubelet
      * add non-ha CI job
      
      * change ci boolean vars to json format
      
      * fixup
      
      * Update create-gce.yml
      
      * Update create-gce.yml
      
      * Update create-gce.yml
      67447260
  22. Aug 24, 2017
    • Brad Beam's avatar
      Adding yamllinter to ci steps (#1556) · 8b151d12
      Brad Beam authored
      * Adding yaml linter to ci check
      
      * Minor linting fixes from yamllint
      
      * Changing CI to install python pkgs from requirements.txt
      
      - adding in a secondary requirements.txt for tests
      - moving yamllint to tests requirements
      8b151d12
  23. Jul 17, 2017
  24. Apr 17, 2017
  25. Apr 15, 2017
  26. Apr 03, 2017
  27. Mar 27, 2017
  28. Mar 14, 2017
    • Vincent Schwarzer's avatar
      Granular authentication Control · 026da060
      Vincent Schwarzer authored
      It is now possible to deactivate selected authentication methods
      (basic auth, token auth) inside the cluster by adding
      removing the required arguments to the Kube API Server and generating
      the secrets accordingly.
      
      The x509 authentification is currently not optional because disabling it
      would affect the kubectl clients deployed on the master nodes.
      026da060
    • Matthew Mosesohn's avatar
      Migrate k8s data to etcd3 api store · 804e9a09
      Matthew Mosesohn authored
      Default backend is now etcd3 (was etcd2).
      The migration process consists of the following steps:
      * check if migration is necessary
      * stop etcd on first etcd server
      * run migration script
      * start etcd on first etcd server
      * stop kube-apiserver until configuration is updated
      * update kube-apiserver
      * purge old etcdv2 data
      804e9a09
  29. Mar 06, 2017
    • Vincent Schwarzer's avatar
      Added Support for OpenID Connect Authentication · b075960e
      Vincent Schwarzer authored
      To use OpenID Connect Authentication beside deploying an OpenID Connect
      Identity Provider it is necesarry to pass additional arguments to the Kube API Server.
      These required arguments were added to the kube apiserver manifest.
      b075960e
  30. Feb 28, 2017
  31. Feb 10, 2017
    • Sergii Golovatiuk's avatar
      Kubernetes Reliability Improvements · c07d60bc
      Sergii Golovatiuk authored
      
      
      - Exclude kubelet CPU/RAM (kube-reserved) from cgroup. It decreases a
        chance of overcommitment
      - Add a possibility to modify Kubelet node-status-update-frequency
      - Add a posibility to configure node-monitor-grace-period,
        node-monitor-period, pod-eviction-timeout for Kubernetes controller
        manager
      - Add Kubernetes Relaibility Documentation with recomendations for
        various scenarios.
      
      Signed-off-by: default avatarSergii Golovatiuk <sgolovatiuk@mirantis.com>
      c07d60bc
  32. Feb 06, 2017
  33. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  34. Dec 28, 2016
  35. Dec 13, 2016
  36. Nov 18, 2016
Loading