Skip to content
Snippets Groups Projects
  1. Apr 11, 2019
  2. Apr 04, 2019
  3. Feb 19, 2019
    • Manuel Cintron's avatar
      Adding ability to maintain existing Encryption Secrets at Rest. (#4255) · 07b28940
      Manuel Cintron authored
      * Adding ability to maintain existing Encryption Secrets at Rest.
      
      If secrets_encryption.yaml is present it will not be overriten with a new kube_encrypt_token.
      
      This should allow for it to be set ahead of a playbook running or maintain it if cluster.yml is ran on the same cluster and the ansible host does not have access to the secrets.
      
      * Setting existing kube_encrypt_token across all master nodes in case it was missing in one or more nodes.
      07b28940
  4. Jan 10, 2019
  5. Jan 08, 2019
    • Andreas Holmsten's avatar
      Allow override of bind addr for controller-manager and scheduler (#3968) · 4d5b41b8
      Andreas Holmsten authored
      * allows to override the bind addresses for controller-manager and scheduler
      
      Useful for Prometheus metrics monitoring
      
      * Add bind addr override support in kubeadm/v1beta1
      
      Adds support for override of bind addresses for controller-manager
      and scheduler in kubeadm/v1beta1
      
      * Move location of bind address vars
      
      * Remove double declaration of schedulerExtraArgs
      4d5b41b8
  6. Jan 03, 2019
    • Chad Swenson's avatar
      Fix kube-proxy configuration for kubeadm (#3958) · 80379f6c
      Chad Swenson authored
      - Creates and defaults an ansible variable for every configuration option in the `kubeproxy.config.k8s.io/v1alpha1` type spec
        - Fixes vars that were orphaned by removing non-kubeadm
        - Fixes previously harcoded kubeadm values
      - Introduces a `main` directory for role default files per component (requires ansible 2.6.0+)
        - Split out just `kube-proxy.yml` in this first effort
      - Removes the kube-proxy server field patch task
      
      We should continue to pull out other components from `main.yml` into their own defaults files as I did here for `defaults/main/kube-proxy.yml`. I hope for and will need others to join me in this refactoring across the project until each component config template has a matching role defaults file, with shared defaults in `kubespray-defaults` or `downloads`
      80379f6c
  7. Dec 26, 2018
  8. Dec 25, 2018
  9. Dec 18, 2018
  10. Dec 07, 2018
  11. Nov 29, 2018
  12. Nov 08, 2018
  13. Oct 17, 2018
  14. Sep 28, 2018
  15. Sep 24, 2018
  16. Sep 03, 2018
  17. Aug 22, 2018
  18. Aug 20, 2018
  19. Aug 16, 2018
  20. Aug 07, 2018
  21. May 11, 2018
    • Matthew Mosesohn's avatar
      refactor vault role (#2733) · 07cc9819
      Matthew Mosesohn authored
      * Move front-proxy-client certs back to kube mount
      
      We want the same CA for all k8s certs
      
      * Refactor vault to use a third party module
      
      The module adds idempotency and reduces some of the repetitive
      logic in the vault role
      
      Requires ansible-modules-hashivault on ansible node and hvac
      on the vault hosts themselves
      
      Add upgrade test scenario
      Remove bootstrap-os tags from tasks
      
      * fix upgrade issues
      
      * improve unseal logic
      
      * specify ca and fix etcd check
      
      * Fix initialization check
      
      bump machine size
      Unverified
      07cc9819
  22. Apr 23, 2018
  23. Apr 10, 2018
  24. Apr 09, 2018
  25. Mar 31, 2018
  26. Mar 21, 2018
  27. Mar 15, 2018
    • Andreas Krüger's avatar
      Added option for encrypting secrets to etcd v.2 (#2428) · 3d6fd491
      Andreas Krüger authored
      * Added option for encrypting secrets to etcd
      
      * Fix keylength to 32
      
      * Forgot the default
      
      * Rename secrets.yaml to secrets_encryption.yaml
      
      * Fix static path for secrets file to use ansible variable
      
      * Rename secrets.yaml.j2 to secrets_encryption.yaml.j2
      
      * Base64 encode the token
      
      * Fixed merge error
      
      * Changed path to credentials dir
      
      * Update path to secrets file which is now readable inside the apiserver container. Set better file permissions
      
      * Add encryption option to k8s-cluster.yml
      3d6fd491
  28. Mar 05, 2018
    • Ayaz Ahmed Khan's avatar
      Explicitly defines the --kubelet-preferred-address-types parameter · 89847d56
      Ayaz Ahmed Khan authored
      to the API server configuration.
      
      This solves the problem where if you have non-resolvable node names,
      and try to scale the server by adding new nodes, kubectl commands
      start to fail for newly added nodes, giving a TCP timeout error when
      trying to resolve the node hostname against a public DNS.
      89847d56
  29. Feb 12, 2018
  30. Feb 09, 2018
  31. Feb 05, 2018
  32. Jan 23, 2018
  33. Jan 18, 2018
  34. Dec 20, 2017
Loading