- Feb 02, 2019
-
-
Sorin Sbarnea authored
Avoid waiting forever for this task that should be very quick. Fixes: #4148
-
- Dec 27, 2018
-
-
Gautam Divgi authored
-
- Dec 18, 2018
-
-
Ganesh Maharaj Mahalingam authored
Signed-off-by:
Ganesh Maharaj Mahalingam <ganesh.mahalingam@intel.com>
-
- Dec 12, 2018
-
-
Maxim Snezhkov authored
-
- Dec 06, 2018
-
-
Andreas Krüger authored
* Remove non-kubeadm deployment * More cleanup * More cleanup * More cleanup * More cleanup * Fix gitlab * Try stop gce first before absent to make the delete process work * More cleanup * Fix bug with checking if kubeadm has already run * Fix bug with checking if kubeadm has already run * More fixes * Fix test * fix * Fix gitlab checkout untill kubespray 2.8 is on quay * Fixed * Add upgrade path from non-kubeadm to kubeadm. Revert ssl path * Readd secret checking * Do gitlab checks from v2.7.0 test upgrade path to 2.8.0 * fix typo * Fix CI jobs to kubeadm again. Fix broken hyperkube path * Fix gitlab * Fix rotate tokens * More fixes * More fixes * Fix tokens
-
- Nov 12, 2018
-
-
Miao Zhou authored
the ':' makes wrong return of calico_version after the calicoctl downloaded && before the cluster is up
-
- Nov 10, 2018
-
-
Antoine Legrand authored
* Remove Vault * Remove reference to 'kargo' in the doc * change check order
-
- Oct 24, 2018
-
-
Louis authored
-
- Oct 17, 2018
-
-
Erwan Miran authored
* warning on meta flush_handlers * avoid rm * avoid "Module remote_tmp /root/.ansible/tmp did not exist and was created with a mode of 0700, this may cause issues when running as another user. To avoid this, create the remote_tmp dir with the correct permissions manually" warning on subsequent tasks using blockinfile * is match
-
Erwan Miran authored
* failed * version_compare * succeeded * skipped * success * version_compare becomes version since ansible 2.5 * ansible minimal version updated in doc and spec * last version_compare
-
- Oct 16, 2018
-
-
JuanJo Ciarlante authored
* [jjo] add kube-router support Fixes cloudnativelabs/kube-router#147. * add kube-router as another network_plugin choice * support most used kube-router flags via `kube_router_foo` vars as other plugins * implement replacing kube-proxy (--run-service-proxy=true) via `kube_proxy_mode: none`, verified in a _non kubeadm_enabled_ install, should also work for recent kubeadm releases via `skipKubeProxyInstall: true` config * [jjo] address PR#3339 review from @woopstar * add busybox image used by kube-router to downloads * fix busybox download groups key * rework kubeadm_enabled + kube_router_run_service_proxy - verify it working ok w/the kubeadm_enabled and kube_router_run_service_proxy true or false - introduce `kube_proxy_remove` fact, to decouple logic from kube_proxy_mode (which affects kubeadm configmap settings, thus no-good to ab-use it to 'none') * improve kube-router.md re: kubeadm_enabled and kube_router_run_service_proxy * address @woopstar latest review * add inventory/sample/group_vars/k8s-cluster/k8s-net-kube-router.yml * fix kube_router_run_service_proxy conditional for kube-proxy removal * fix kube_proxy_remove fact (w/ |bool), add some needed kube-proxy tags on my and existing changes * update kube-router tolerations for 1.12 compatibility * add PriorityClass to kube-router DaemonSet
-
- Oct 11, 2018
-
-
Andreas Krüger authored
* Update pre-install verify settings with network checks and etc. * Remove upstream dns server check. It's bogus
-
- Sep 21, 2018
-
-
Sergey Magidovich authored
-
- Sep 20, 2018
-
-
Andreas Kruger authored
-
- Sep 19, 2018
-
-
Karol Chrapek authored
-
- Aug 31, 2018
-
-
Antoine Legrand authored
-
Antoine Legrand authored
-
- Aug 22, 2018
-
-
Jeff Bornemann authored
Signed-off-by:
Jeff Bornemann <jeff.bornemann@oracle.com>
-
- Aug 21, 2018
-
-
Mark Eisenblaetter authored
we use FQDN as inventory_hostname
-
- Aug 20, 2018
-
-
Tatsuyuki Ishi authored
Hostname must be a valid DNS name, which is checked as https://github.com/kubernetes/apimachinery/blob/master/pkg/util/validation/validation.go#L115 The situation I have encountered is that my hostname contained underscore which is disallowed and apiserver refused to start.
-
- Aug 07, 2018
-
-
rongzhang authored
-
- May 27, 2018
-
-
Oleg Ozimok authored
-
- May 22, 2018
-
-
dvazar authored
-
- May 18, 2018
-
-
dvazar authored
-
- May 16, 2018
-
-
Christopher J. Ruwe authored
The number of pods on a given node is determined by the --max-pods=k directive. When the address space is exhausted, no more pods can be scheduled even if from the --max-pods-perspective, the node still has capacity. The special case that a pod is scheduled and uses the node IP in the host network namespace is too "soft" to derive a guarantee. Comparing kubelet_max_pods with kube_network_node_prefix when given allows to assert that pod limits match the CIDR address space.
-
- Apr 26, 2018
-
-
Markos Chandras authored
This reverts commit 51f4e658.
-
- Apr 23, 2018
-
-
Matthew Mosesohn authored
-
- Apr 11, 2018
-
-
Markos Chandras authored
Add support for installing package dependencies and refreshing metadata on SUSE distributions Co-authored-by:
Nirmoy Das <ndas@suse.de>
-
- Feb 17, 2018
-
-
melkosoft authored
* Added cilium support * Fix typo in debian test config * Remove empty lines * Changed cilium version from <latest> to <v1.0.0-rc3> * Add missing changes for cilium * Add cilium to CI pipeline * Fix wrong file name * Check kernel version for cilium * fixed ci error * fixed cilium-ds.j2 template * added waiting for cilium pods to run * Fixed missing EOF * Fixed trailing spaces * Fixed trailing spaces * Fixed trailing spaces * Fixed too many blank lines * Updated tolerations,annotations in cilium DS template * Set cilium_version to iptables-1.9 to see if bug is fixed in CI * Update cilium image tag to v1.0.0-rc4 * Update Cilium test case CI vars filenames * Add optional prometheus flag, adjust initial readiness delay * Update README.md with cilium info
-
- Dec 06, 2017
-
-
Matthew Mosesohn authored
-
- Dec 05, 2017
-
-
Chad Swenson authored
This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). Rework of #1937 with kubeadm support Also, fixed an issue in `kubeadm-migrate-certs` where the old apiserver cert was copied as the kubeadm key
-
- Nov 15, 2017
-
-
Chad Swenson authored
This version required changing the previous access model for dashboard completely but it's a change for the better. Docs were updated. * New login/auth options that use apiserver auth proxying by default * Requires RBAC in `authorization_modes` * Only serves over https * No longer available at https://first_master:6443/ui until apiserver is updated with the https proxy URL: * Can access from https://first_master:6443/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/#!/login you will be prompted for credentials * Or you can run 'kubectl proxy' from your local machine to access dashboard in your browser from: http://localhost:8001/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/ * It is recommended to access dashboard from behind a gateway that enforces an authentication token, details and other access options here: https://github.com/kubernetes/dashboard/wiki/Accessing-Dashboard---1.7.X-and-above
-
- Nov 14, 2017
-
-
Matthew Mosesohn authored
-
- Nov 07, 2017
-
-
Chad Swenson authored
This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). It's working, but so far I have had to: 1. Make the `uri` module "Wait for apiserver up" checks use `kube_apiserver_port` (HTTPS) 2. Add apiserver client cert/key to the "Wait for apiserver up" checks 3. Update apiserver liveness probe to use HTTPS ports 4. Set `kube_api_anonymous_auth` to true to allow liveness probe to hit apiserver's /healthz over HTTPS (livenessProbes can't use client cert/key unfortunately) 5. RBAC has to be enabled. Anonymous requests are in the `system:unauthenticated` group which is granted access to /healthz by one of RBAC's default ClusterRoleBindings. An equivalent ABAC rule could allow this as well. Changes 1 and 2 should work for everyone, but 3, 4, and 5 require new coupling of currently independent configuration settings. So I also added a new settings check. Options: 1. The problem goes away if you have both anonymous-auth and RBAC enabled. This is how kubeadm does it. This may be the best way to go since RBAC is already on by default but anonymous auth is not. 2. Include conditional templates to set a different liveness probe for possible combinations of `kube_apiserver_insecure_port = 0`, RBAC, and `kube_api_anonymous_auth` (won't be possible to cover every case without a guaranteed authorizer for the secure port) 3. Use basic auth headers for the liveness probe (I really don't like this, it adds a new dependency on basic auth which I'd also like to leave independently configurable, and it requires encoded passwords in the apiserver manifest) Option 1 seems like the clear winner to me, but is there a reason we wouldn't want anonymous-auth on by default? The apiserver binary defaults anonymous-auth to true, but kubespray's default was false.
-
- Nov 03, 2017
-
-
Günther Grill authored
* Change deprecated vagrant ansible flag 'sudo' to 'become' * Workaround ansible bug where access var via dict doesn't get real value When accessing a variable via it's name "{{ foo }}" its value is retrieved. But when the variable value is retrieved via the vars-dict "{{ vars['foo'] }}" this doesn't resolve the expression of the variable any more due to a bug. So e.g. a expression foo="{{ 1 == 1 }}" isn't longer resolved but just returned as string "1 == 1". * Make file yamllint complient
-
- Oct 27, 2017
-
-
mkrasilnikov authored
-
- Oct 20, 2017
-
-
Matthew Mosesohn authored
-
- Oct 17, 2017
-
-
Tennis Smith authored
-
- Oct 06, 2017
-
-
ant31 authored
-
- Sep 29, 2017
-
-
Matthew Mosesohn authored
Fixes #1716
-