Skip to content
  1. Sep 19, 2018
  2. Sep 18, 2018
  3. Sep 16, 2018
  4. Sep 06, 2018
  5. Sep 03, 2018
  6. Sep 02, 2018
    • Pablo Estigarribia's avatar
      ensure there is pin priority for docker package to avoid upgrade of docker to incompatible version · 7cbe3c21
      Pablo Estigarribia authored
      ensure there is pin priority for docker package to avoid upgrade of docker to incompatible version
      
      remove empty when line
      
      ensure there is pin priority for docker package to avoid upgrade of docker to incompatible version
      
      force kubeadm upgrade due to failure without --force flag
      
      ensure there is pin priority for docker package to avoid upgrade of docker to incompatible version
      
      added nodeSelector to have compatibility with hybrid cluster with win nodes, also fix for download with missing container type
      
      fixes in syntax and LF for newline in files
      
      fix on yamllint check
      
      ensure there is pin priority for docker package to avoid upgrade of docker to incompatible version
      
      some cleanup for innecesary lines
      
      remove conditions for nodeselector
      7cbe3c21
  7. Aug 28, 2018
  8. Aug 27, 2018
  9. Aug 23, 2018
    • Aivars Sterns's avatar
      calico upgrade to v3 (#3086) · 23fd3461
      Aivars Sterns authored
      * calico upgrade to v3
      
      * update calico_rr version
      
      * add missing file
      
      * change contents of main.yml as it was left old version
      
      * enable network policy by default
      
      * remove unneeded task
      
      * Fix kubelet calico settings
      
      * fix when statement
      
      * switch back to node-kubeconfig.yaml
      23fd3461
  10. Aug 22, 2018
  11. Aug 17, 2018
  12. Aug 14, 2018
    • Rong Zhang's avatar
      Upgrade kubernetes to V1.11.x (#3078) · a11e1eba
      Rong Zhang authored
      Upgrade Kubernetes to V1.11.2
      The kubeadm configuration file version has been upgraded from v1alpha1 to v1alpha2
      Add bootstrap kubeadm-config.yaml with external etcd
      a11e1eba
  13. Jul 19, 2018
  14. Jul 10, 2018
  15. Jul 06, 2018
  16. Jul 02, 2018
  17. Jun 28, 2018
  18. Jun 15, 2018
    • Henry Finucane's avatar
      Fix #2261 by supporting Red Hat's limited PATH · 3ad9e9c5
      Henry Finucane authored
      Red Hat has this theory that binaries in sbin are too dangerous to be on
      the default path, but we need them anyway.
      
      RH7 has /sbin and /usr/sbin as symlinks, so that is no longer important.
      
      I'm adding it to the `PATH` instead of making the path to `modinfo`
      absolute because I am worried about breaking support for other
      distributions.
      3ad9e9c5
  19. Jun 05, 2018
    • Di Xu's avatar
      fix docker opts incompatible running on aarch64 Redhat/Centos · f4d762bb
      Di Xu authored
      On Aarch64, the default cgroup driver for docker is systemd
      instead of cgroupfs. Should conform kubelet to use systemd
      as cgroup driver as well to keep it consistent with docker.
      
      Without this change, below exception will be raised.
      /usr/bin/docker-current: Error response from daemon: shim
      error: docker-runc not installed on system.
      
      Change-Id: Id496ec9eaac6580e4da2f3ef1a386c9abc2a5129
      f4d762bb
  20. Jun 04, 2018
  21. May 16, 2018
    • Christopher J. Ruwe's avatar
      assert that number of pods on node does not exceed CIDR address range · c1bc4615
      Christopher J. Ruwe authored
      The number of pods on a given node is determined by the  --max-pods=k
      directive. When the address space is exhausted, no more pods can be
      scheduled even if from the --max-pods-perspective, the node still has
      capacity.
      
      The special case that a pod is scheduled and uses the node IP in the
      host network namespace is too "soft" to derive a guarantee.
      
      Comparing kubelet_max_pods with kube_network_node_prefix when given
      allows to assert that pod limits match the CIDR address space.
      c1bc4615
  22. May 15, 2018
  23. May 11, 2018
    • Matthew Mosesohn's avatar
      refactor vault role (#2733) · 07cc9819
      Matthew Mosesohn authored
      * Move front-proxy-client certs back to kube mount
      
      We want the same CA for all k8s certs
      
      * Refactor vault to use a third party module
      
      The module adds idempotency and reduces some of the repetitive
      logic in the vault role
      
      Requires ansible-modules-hashivault on ansible node and hvac
      on the vault hosts themselves
      
      Add upgrade test scenario
      Remove bootstrap-os tags from tasks
      
      * fix upgrade issues
      
      * improve unseal logic
      
      * specify ca and fix etcd check
      
      * Fix initialization check
      
      bump machine size
      07cc9819
  24. May 08, 2018
  25. May 01, 2018
  26. Apr 29, 2018
  27. Apr 27, 2018
  28. Apr 24, 2018
  29. Apr 12, 2018
Loading