Skip to content
  1. Apr 15, 2021
  2. Apr 14, 2021
  3. Apr 13, 2021
  4. Apr 12, 2021
  5. Apr 11, 2021
  6. Apr 09, 2021
  7. Apr 08, 2021
  8. Apr 07, 2021
  9. Apr 06, 2021
    • Frank Ritchie's avatar
      Update cilium_ipsec_enabled check (#7413) · a6622b17
      Frank Ritchie authored
      When attempting a fresh install without cilium_ipsec_enabled I ran
      into the following error:
      
      failed: [k8m01] (item={'name': 'cilium', 'file': 'cilium-secret.yml', 'type': 'secret', 'when': 'cilium_ipsec_enabled'}) =>
      {"ansible_loop_var": "item", "changed": false, "item": {"file": "cilium-secret.yml", "name": "cilium", "type": "secret",
      "when": "cilium_ipsec_enabled"},"msg": "AnsibleUndefinedVariable: 'cilium_ipsec_key' is undefined"}
      
      Moving the when condition from the item level to the task level solved
      the issue.
      a6622b17
    • Maciej Wereski's avatar
      Add KubeSchedulerConfiguration for k8s 1.19 and up (#7351) · 771a5e26
      Maciej Wereski authored
      
      
      * Add KubeSchedulerConfiguration for k8s 1.19 and up
      
      With release of version 1.19.0 of kubernetes KubeSchedulerConfiguration
      was graduated to beta. It allows to extend different stages of
      scheduling with profiles. Such effect is achieved by using plugins and
      extensions.
      
      This patch adds KubeSchedulerConfiguration for versions 1.19 and later.
      Configuration is set to k8s defaults or to kubespray vars. Moving those
      defaults to new vars will be done in following patch.
      
      Signed-off-by: default avatarMaciej Wereski <m.wereski@partner.samsung.com>
      
      * KubeSchedulerConfiguration: add defaults
      
      Signed-off-by: default avatarMaciej Wereski <m.wereski@partner.samsung.com>
      771a5e26
  10. Apr 05, 2021
  11. Apr 02, 2021
  12. Apr 01, 2021
    • Pasquale Toscano's avatar
      Update KataContainers to 1.12.1 (#7427) · 6330db89
      Pasquale Toscano authored
      6330db89
    • Frank Ritchie's avatar
      Add cilium_ipam_mode variable (#7418) · f05d6b37
      Frank Ritchie authored
      Starting with Cilium v1.9 the default ipam mode has changed to "Cluster
      Scope". See:
      
      https://docs.cilium.io/en/v1.9/concepts/networking/ipam/
      
      With this ipam mode Cilium handles assigning subnets to nodes to use
      for pod ip addresses. The default Kubespray deploy uses the Kube
      Controller Manager for this (the --allocate-node-cidrs
      kube-controller-manager flag is set). This makes the proper ipam mode
      for kubespray using cilium v1.9+ "kubernetes".
      
      Tested with Cilium 1.9.5.
      
      This PR also mounts the cilium-config ConfigMap for this variable
      to be read properly.
      
      In the future we can probably remove the kvstore and kvstore-opt
      Cilium Operator args since they can be in the ConfigMap. I will tackle
      that after this merges.
      f05d6b37
  13. Mar 31, 2021
  14. Mar 30, 2021
  15. Mar 29, 2021
    • Fernando's avatar
      add support for custom calico port (#7419) · 5dbce6a2
      Fernando authored
      5dbce6a2
    • Frank Ritchie's avatar
      Update cilium-operator clusterrole (#7416) · 5b0e8833
      Frank Ritchie authored
      When upgrading cilium from 1.8.8 to 1.9.5 I ran into the following
      error:
      
      level=error msg="Unable to update CRD" error="customresourcedefinitions.apiextensions.k8s.io
      \"ciliumnodes.cilium.io\" is forbidden: User \"system:serviceaccount:kube-system:cilium-operator\"
      cannot update resource \"customresourcedefinitions\" in API group \"apiextensions.k8s.io\" at the
      cluster scope" name=CiliumNode/v2 subsys=k8s
      
      The fix was to add the update verb to the clusterrole. I also added
      create to match the clusterrole created by the cilium helm chart.
      5b0e8833
    • Samuel Liu's avatar
      db43891f
    • Terry's avatar
      Remove DNSSEC config management in bootstrap-debian.yml (#7408) · f72063e7
      Terry authored
      DNSSEC is off by default on ubuntu/bionic64 (18.04) as per resolved.conf(5).
      These tasks are artefacts of obsolete infra configuration, and no longer needed.
      
      Further removing these tasks resolves the issue that the tasks always reports
      'changed' and bounces systemd-resolved unneccesarily, even if there was no
      actual modification of /etc/systemd/resolved.conf.
      f72063e7
  16. Mar 26, 2021
  17. Mar 25, 2021
  18. Mar 24, 2021
Loading