Skip to content
  1. Jun 16, 2017
  2. Jun 12, 2017
  3. May 31, 2017
  4. May 27, 2017
  5. Apr 20, 2017
  6. Apr 19, 2017
  7. Apr 17, 2017
  8. Apr 15, 2017
  9. Apr 06, 2017
  10. Apr 05, 2017
  11. Apr 04, 2017
  12. Apr 03, 2017
  13. Mar 30, 2017
  14. Mar 27, 2017
  15. Mar 23, 2017
    • Vladimir Rutsky's avatar
      replace non-breakable space with regular space · c4e57477
      Vladimir Rutsky authored
      Non-brekable space is 0xc2 0xa0 byte sequence in UTF-8.
      
      To find one:
      
          $ git grep -I -P '\xc2\xa0'
      
      To replace with regular space:
      
          $ git grep -l -I -P '\xc2\xa0' | xargs sed -i 's/\xc2\xa0/ /g'
      
      This commit doesn't include changes that will overlap with commit f1c59a91.
      c4e57477
  16. Mar 17, 2017
    • Aleksandr Didenko's avatar
      Move calico-policy-controller into separate role · 3a399040
      Aleksandr Didenko authored
      By default Calico CNI does not create any network access policies
      or profiles if 'policy' is enabled in CNI config. And without any
      policies/profiles network access to/from PODs is blocked.
      
      K8s related policies are created by calico-policy-controller in
      such case. So we need to start it as soon as possible, before any
      real workloads.
      
      This patch also fixes kube-api port in calico-policy-controller
      yaml template.
      
      Closes #1132
      3a399040
  17. Mar 15, 2017
    • Matthew Mosesohn's avatar
      More idempotency fixes · a422ad0d
      Matthew Mosesohn authored
      Fixed sync_tokens fact
      Fixed sync_certs for k8s tokens fact
      Disabled register docker images changability
      Fixed CNI dir permission
      Fix idempotency for etcd pre upgrade checks
      a422ad0d
  18. Mar 14, 2017
    • Vincent Schwarzer's avatar
      Granular authentication Control · 026da060
      Vincent Schwarzer authored
      It is now possible to deactivate selected authentication methods
      (basic auth, token auth) inside the cluster by adding
      removing the required arguments to the Kube API Server and generating
      the secrets accordingly.
      
      The x509 authentification is currently not optional because disabling it
      would affect the kubectl clients deployed on the master nodes.
      026da060
    • Matthew Mosesohn's avatar
      Migrate k8s data to etcd3 api store · 804e9a09
      Matthew Mosesohn authored
      Default backend is now etcd3 (was etcd2).
      The migration process consists of the following steps:
      * check if migration is necessary
      * stop etcd on first etcd server
      * run migration script
      * start etcd on first etcd server
      * stop kube-apiserver until configuration is updated
      * update kube-apiserver
      * purge old etcdv2 data
      804e9a09
  19. Mar 06, 2017
    • Vincent Schwarzer's avatar
      Added Support for OpenID Connect Authentication · b075960e
      Vincent Schwarzer authored
      To use OpenID Connect Authentication beside deploying an OpenID Connect
      Identity Provider it is necesarry to pass additional arguments to the Kube API Server.
      These required arguments were added to the kube apiserver manifest.
      b075960e
  20. Feb 28, 2017
  21. Feb 27, 2017
  22. Feb 18, 2017
  23. Feb 10, 2017
    • Sergii Golovatiuk's avatar
      Kubernetes Reliability Improvements · c07d60bc
      Sergii Golovatiuk authored
      
      
      - Exclude kubelet CPU/RAM (kube-reserved) from cgroup. It decreases a
        chance of overcommitment
      - Add a possibility to modify Kubelet node-status-update-frequency
      - Add a posibility to configure node-monitor-grace-period,
        node-monitor-period, pod-eviction-timeout for Kubernetes controller
        manager
      - Add Kubernetes Relaibility Documentation with recomendations for
        various scenarios.
      
      Signed-off-by: default avatarSergii Golovatiuk <sgolovatiuk@mirantis.com>
      c07d60bc
  24. Feb 06, 2017
  25. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  26. Jan 17, 2017
  27. Jan 13, 2017
  28. Jan 11, 2017
Loading