- Oct 10, 2018
-
-
pastushenko authored
* #3475 - make dnsmasq to send queries to all servers in upstream. Make dnsmasq config file customizable. * Code style fixes. Return current behaviour for dnsmasq strict-order flag.
-
- Aug 31, 2018
-
-
Antoine Legrand authored
-
- Jun 05, 2018
-
-
Di Xu authored
Currently all the gcr.io images used in kubespray can only run on x86. Also gcr.io has not fully support multi-arch docker images. Add extra var "image_arch" (default is amd64) to support running other platforms, like arm64. Change-Id: I8e1c9af533c021cb96ade291a1ce58773b40e271
-
- Aug 24, 2017
-
-
Brad Beam authored
* Adding yaml linter to ci check * Minor linting fixes from yamllint * Changing CI to install python pkgs from requirements.txt - adding in a secondary requirements.txt for tests - moving yamllint to tests requirements
-
- Jul 06, 2017
-
-
Vladimir Kozyrev authored
-
- Mar 27, 2017
-
-
Matthew Mosesohn authored
Canal runs more pods and upgrades need a bit of extra room to load new pods in and get the old ones out.
-
- Mar 02, 2017
-
-
Matthew Mosesohn authored
By default kubedns and dnsmasq scale when installed. Dnsmasq is no longer a daemonset. It is now a deployment. Kubedns is no longer a replicationcluster. It is now a deployment. Minimum replicas is two (to enable rolling updates). Reduced memory erquirements for dnsmasq and kubedns
-
- Feb 06, 2017
-
-
Matthew Mosesohn authored
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 19, 2017
-
-
Sergii Golovatiuk authored
ndots creates overhead as every pod creates 5 concurrent connections that are forwarded to sky dns. Under some circumstances dnsmasq may prevent forwarding traffic with "Maximum number of concurrent DNS queries reached" in the logs. This patch allows to configure the number of concurrent forwarded DNS queries "dns-forward-max" as well as "cache-size" leaving the default values as they were before. Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Jan 06, 2017
-
-
Alexander Block authored
Also update reset.yml to do more dns/network related cleanup.
-
- Dec 09, 2016
-
-
Bogdan Dobrelya authored
In order to enable offline/intranet installation cases: * Move DNS/resolvconf configuration to preinstall role. Remove skip_dnsmasq_k8s var as not needed anymore. * Preconfigure DNS stack early, which may be the case when downloading artifacts from intranet repositories. Do not configure K8s DNS resolvers for hosts /etc/resolv.conf yet early (as they may be not existing). * Reconfigure K8s DNS resolvers for hosts only after kubedns/dnsmasq was set up and before K8s apps to be created. * Move docker install task to early stage as well and unbind it from the etcd role's specific install path. Fix external flannel dependency on docker role handlers. Also fix the docker restart handlers' steps ordering to match the expected sequence (the socket then the service). * Add default resolver fact, which is the cloud provider specific and remove hardcoded GCE resolver. * Reduce default ndots for hosts /etc/resolv.conf to 2. Multiple search domains combined with high ndots values lead to poor performance of DNS stack and make ansible workers to fail very often with the "Timeout (12s) waiting for privilege escalation prompt:" error. * Update docs. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 25, 2016
-
-
Bogdan Dobrelya authored
* Add dns_replicas, dns_memory/cpu_limit/requests vars for dns related apps. * When kube_log_level=4, log dnsmasq queries as well. * Add log level control for skydns (part of kubedns app). * Add limits/requests vars for dnsmasq (part of kubedns app) and dnsmasq daemon set. * Drop string defaults for kube_log_level as it is int and is defined in the global vars as well. * Add docs Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 23, 2016
-
-
Bogdan Dobrelya authored
Use cloud-init config to replace /etc/resolv.conf with the content for kubelet to properly configure hostnet pods. Do not use systemd-resolved yet, see https://coreos.com/os/docs/latest/configuring-dns.html "Only nss-aware applications can take advantage of the systemd-resolved cache. Notably, this means that statically linked Go programs and programs running within Docker/rkt will use /etc/resolv.conf only, and will not use the systemd-resolve cache." Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Nov 07, 2016
-
-
Matthew Mosesohn authored
Squashed commits: [f9355ea1] Swap order in which we reload docker/socket [2ca6819c] Reload docker.socket after installing flannel on coreos Workaround for #569 [9f976e56] Vagrantfile: setup proxy inside virtual machines In corporate networks, it is good to pre-configure proxy variables. [9d7142f4] Vagrantfile: use Ubuntu 16.04 LTS Use recent supported version of Ubuntu for local development setup with Vagrant. [50f77cca] Add CI test layouts * Drop Wily from test matrix * Replace the Wily cases dropped with extra cases to test separate roles deployment Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com> [03e162b3] Update OWNERS [c7b00cae] Use tar+register instead of copy/slurp for distributing tokens and certs Related bug: https://github.com/ansible/ansible/issues/15405 Uses tar and register because synchronize module cannot sudo on the remote side correctly and copy is too slow. This patch dramatically cuts down the number of tasks to process for cert synchronization. [2778ac61] Add new var skip_dnsmasq_k8s If skip_dnsmasq is set, it will still not set up dnsmasq k8s pod. This enables independent setup of resolvconf section before kubelet is up.
-
- Oct 26, 2016
-
-
Matthew Mosesohn authored
If skip_dnsmasq is set, it will still not set up dnsmasq k8s pod. This enables independent setup of resolvconf section before kubelet is up.
-
- Oct 15, 2016
-
-
Chad Swenson authored
Signed-off-by:
Chad Swenson <chadswen@gmail.com>
-
- Aug 24, 2016
-
-
Bogdan Dobrelya authored
* Ensure additional nameserver/search, if defined as vars. * Don't backup changed dhclient hooks as they are going to be executed by dhclient as well, which is not what we want. * For debian OS family only: - Rename nodnsupdate hook the resolvconf hook to be sourced always before it. - Ensure dhclient restarted via network restart to apply the nodnsupdate hook. * For rhel OS family, the fix TBD, it doesn't work the same way. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Aug 22, 2016
-
-
Bogdan Dobrelya authored
Rename nodnsupdate hook the resolvconf hook to be sourced always before it. Ensure dhclient restarted via network restart to apply the nodnsupdate hook. Ensure additional nameserver/search, if defined as vars. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-