Skip to content
  1. Aug 24, 2017
    • Brad Beam's avatar
      Adding yamllinter to ci steps (#1556) · 8b151d12
      Brad Beam authored
      * Adding yaml linter to ci check
      
      * Minor linting fixes from yamllint
      
      * Changing CI to install python pkgs from requirements.txt
      
      - adding in a secondary requirements.txt for tests
      - moving yamllint to tests requirements
      8b151d12
  2. Aug 18, 2017
    • Matthew Mosesohn's avatar
      Fix cert and netchecker upgrade issues (#1543) · df28db00
      Matthew Mosesohn authored
      * Bump tag for upgrade CI, fix netchecker upgrade
      
      netchecker-server was changed from pod to deployment, so
      we need an upgrade hook for it.
      
      CI now uses v2.1.1 as a basis for upgrade.
      
      * Fix upgrades for certs from non-rbac to rbac
      df28db00
  3. Aug 14, 2017
  4. Jul 17, 2017
  5. Jul 04, 2017
  6. Jun 27, 2017
  7. Jun 12, 2017
  8. May 13, 2017
  9. May 12, 2017
  10. Apr 27, 2017
  11. Apr 24, 2017
  12. Apr 14, 2017
    • Sergii Golovatiuk's avatar
      Reschedule netchecker-server in case of HW failure. · 45044c2d
      Sergii Golovatiuk authored
      Pod opbject is not reschedulable by kubernetes. It means that if node
      with netchecker-server goes down, netchecker-server won't be scheduled
      somewhere. This commit changes the type of netchecker-server to
      Deployment, so netchecker-server will be scheduled on other nodes in
      case of failures.
      45044c2d
  13. Apr 13, 2017
  14. Apr 06, 2017
  15. Apr 05, 2017
  16. Apr 04, 2017
  17. Mar 17, 2017
    • Aleksandr Didenko's avatar
      Move calico-policy-controller into separate role · 3a399040
      Aleksandr Didenko authored
      By default Calico CNI does not create any network access policies
      or profiles if 'policy' is enabled in CNI config. And without any
      policies/profiles network access to/from PODs is blocked.
      
      K8s related policies are created by calico-policy-controller in
      such case. So we need to start it as soon as possible, before any
      real workloads.
      
      This patch also fixes kube-api port in calico-policy-controller
      yaml template.
      
      Closes #1132
      3a399040
  18. Mar 02, 2017
    • Matthew Mosesohn's avatar
      Add autoscalers for dnsmasq and kubedns · 9cb12cf2
      Matthew Mosesohn authored
      By default kubedns and dnsmasq scale when installed.
      Dnsmasq is no longer a daemonset. It is now a deployment.
      Kubedns is no longer a replicationcluster. It is now a deployment.
      Minimum replicas is two (to enable rolling updates).
      
      Reduced memory erquirements for dnsmasq and kubedns
      9cb12cf2
  19. Feb 28, 2017
  20. Feb 27, 2017
    • Brad Beam's avatar
      Lower default memory requests · 56664b34
      Brad Beam authored
      This is to address out of memory issues on CI as well as help
      fit deployments for people starting out with kargo on smaller
      machines
      56664b34
  21. Feb 18, 2017
  22. Feb 08, 2017
  23. Feb 07, 2017
  24. Feb 06, 2017
  25. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  26. Jan 18, 2017
  27. Jan 09, 2017
  28. Jan 06, 2017
  29. Jan 03, 2017
  30. Dec 28, 2016
  31. Dec 23, 2016
  32. Dec 22, 2016
  33. Dec 21, 2016
Loading