Skip to content
  1. Mar 05, 2018
    • Ayaz Ahmed Khan's avatar
      Explicitly defines the --kubelet-preferred-address-types parameter · 89847d56
      Ayaz Ahmed Khan authored
      to the API server configuration.
      
      This solves the problem where if you have non-resolvable node names,
      and try to scale the server by adding new nodes, kubectl commands
      start to fail for newly added nodes, giving a TCP timeout error when
      trying to resolve the node hostname against a public DNS.
      89847d56
  2. Mar 01, 2018
  3. Feb 22, 2018
  4. Feb 17, 2018
    • melkosoft's avatar
      Added cilium support (#2236) · f13e76d0
      melkosoft authored
      * Added cilium support
      
      * Fix typo in debian test config
      
      * Remove empty lines
      
      * Changed cilium version from <latest> to <v1.0.0-rc3>
      
      * Add missing changes for cilium
      
      * Add cilium to CI pipeline
      
      * Fix wrong file name
      
      * Check kernel version for cilium
      
      * fixed ci error
      
      * fixed cilium-ds.j2 template
      
      * added waiting for cilium pods to run
      
      * Fixed missing EOF
      
      * Fixed trailing spaces
      
      * Fixed trailing spaces
      
      * Fixed trailing spaces
      
      * Fixed too many blank lines
      
      * Updated tolerations,annotations in cilium DS template
      
      * Set cilium_version to iptables-1.9 to see if bug is fixed in CI
      
      * Update cilium image tag to v1.0.0-rc4
      
      * Update Cilium test case CI vars filenames
      
      * Add optional prometheus flag, adjust initial readiness delay
      
      * Update README.md with cilium info
      f13e76d0
  5. Feb 12, 2018
  6. Feb 09, 2018
  7. Feb 07, 2018
  8. Feb 05, 2018
  9. Feb 01, 2018
  10. Jan 30, 2018
  11. Jan 29, 2018
  12. Jan 23, 2018
  13. Jan 18, 2018
  14. Jan 12, 2018
  15. Jan 02, 2018
  16. Dec 25, 2017
    • Matthew Mosesohn's avatar
      Update Kubernetes to v1.9.0 (#2100) · ad6fecef
      Matthew Mosesohn authored
      Update checksum for kubeadm
      Use v1.9.0 kubeadm params
      Include hash of ca.crt for kubeadm join
      Update tag for testing upgrades
      Add workaround for testing upgrades
      Remove scale CI scenarios because of slow inventory parsing
      in ansible 2.4.x.
      
      Change region for tests to us-central1 to
      improve ansible performance
      ad6fecef
  17. Dec 20, 2017
  18. Dec 12, 2017
  19. Dec 05, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · b8788421
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled).
      
      Rework of #1937 with kubeadm support
      
      Also, fixed an issue in `kubeadm-migrate-certs` where the old apiserver cert was copied as the kubeadm key
      b8788421
  20. Nov 29, 2017
    • Steven Hardy's avatar
      Allow setting --bind-address for apiserver hyperkube (#1985) · d39a88d6
      Steven Hardy authored
      * Allow setting --bind-address for apiserver hyperkube
      
      This is required if you wish to configure a loadbalancer (e.g haproxy)
      running on the master nodes without choosing a different port for the
      vip from that used by the API - in this case you need the API to bind to
      a specific interface, then haproxy can bind the same port on the VIP:
      
      root@overcloud-controller-0 ~]# netstat -taupen | grep 6443
      tcp        0      0 192.168.24.6:6443       0.0.0.0:*               LISTEN      0          680613     134504/haproxy
      tcp        0      0 192.168.24.16:6443      0.0.0.0:*               LISTEN      0          653329     131423/hyperkube
      tcp        0      0 192.168.24.16:6443      192.168.24.16:58404     ESTABLISHED 0          652991     131423/hyperkube
      tcp        0      0 192.168.24.16:58404     192.168.24.16:6443      ESTABLISHED 0          652986     131423/hyperkube
      
      This can be achieved e.g via:
      
      kube_apiserver_bind_address: 192.168.24.16
      
      * Address code review feedback
      
      * Update kube-apiserver.manifest.j2
      d39a88d6
  21. Nov 23, 2017
  22. Nov 14, 2017
  23. Nov 08, 2017
    • Chad Swenson's avatar
      Master component and kubelet container upgrade fixes · e9f795c5
      Chad Swenson authored
      * Fixes an issue where apiserver and friends (controller manager, scheduler) were prevented from restarting after manifests/secrets are changed. This occurred when a replaced kubelet doesn't reconcile new master manifests, which caused old master component versions to linger during deployment. In my case this was causing upgrades from k8s 1.6/1.7 -> k8s 1.8 to fail
      * Improves transitions from kubelet container to host kubelet by preventing issues where kubelet container reappeared during the deployment
      e9f795c5
  24. Nov 07, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · 0c7e1889
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). It's working, but so far I have had to:
      
      1. Make the `uri` module "Wait for apiserver up" checks use `kube_apiserver_port` (HTTPS)
      2. Add apiserver client cert/key to the "Wait for apiserver up" checks
      3. Update apiserver liveness probe to use HTTPS ports
      4. Set `kube_api_anonymous_auth` to true to allow liveness probe to hit apiserver's /healthz over HTTPS (livenessProbes can't use client cert/key unfortunately)
      5. RBAC has to be enabled. Anonymous requests are in the `system:unauthenticated` group which is granted access to /healthz by one of RBAC's default ClusterRoleBindings. An equivalent ABAC rule could allow this as well.
      
      Changes 1 and 2 should work for everyone, but 3, 4, and 5 require new coupling of currently independent configuration settings. So I also added a new settings check.
      
      Options:
      
      1. The problem goes away if you have both anonymous-auth and RBAC enabled. This is how kubeadm does it. This may be the best way to go since RBAC is already on by default but anonymous auth is not.
      2. Include conditional templates to set a different liveness probe for possible combinations of `kube_apiserver_insecure_port = 0`, RBAC, and `kube_api_anonymous_auth` (won't be possible to cover every case without a guaranteed authorizer for the secure port)
      3. Use basic auth headers for the liveness probe (I really don't like this, it adds a new dependency on basic auth which I'd also like to leave independently configurable, and it requires encoded passwords in the apiserver manifest)
      
      Option 1 seems like the clear winner to me, but is there a reason we wouldn't want anonymous-auth on by default? The apiserver binary defaults anonymous-auth to true, but kubespray's default was false.
      0c7e1889
  25. Oct 31, 2017
  26. Oct 27, 2017
  27. Oct 26, 2017
  28. Oct 24, 2017
  29. Oct 20, 2017
Loading