Skip to content
Snippets Groups Projects
  1. Nov 29, 2017
    • unclejack's avatar
      contiv network support (#1914) · e5d353d0
      unclejack authored
      
      * Add Contiv support
      
      Contiv is a network plugin for Kubernetes and Docker. It supports
      vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies,
      multiple networks and bridging pods onto physical networks.
      
      * Update contiv version to 1.1.4
      
      Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config.
      
      * Load openvswitch module to workaround on CentOS7.4
      
      * Set contiv cni version to 0.1.0
      
      Correct contiv CNI version to 0.1.0.
      
      * Use kube_apiserver_endpoint for K8S_API_SERVER
      
      Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks
      to a available endpoint no matter if there's a loadbalancer or not.
      
      * Make contiv use its own etcd
      
      Before this commit, contiv is using a etcd proxy mode to k8s etcd,
      this work fine when the etcd hosts are co-located with contiv etcd
      proxy, however the k8s peering certs are only in etcd group, as a
      result the etcd-proxy is not able to peering with the k8s etcd on
      etcd group, plus the netplugin is always trying to find the etcd
      endpoint on localhost, this will cause problem for all netplugins
      not runnign on etcd group nodes.
      This commit make contiv uses its own etcd, separate from k8s one.
      on kube-master nodes (where net-master runs), it will run as leader
      mode and on all rest nodes it will run as proxy mode.
      
      * Use cp instead of rsync to copy cni binaries
      
      Since rsync has been removed from hyperkube, this commit changes it
      to use cp instead.
      
      * Make contiv-etcd able to run on master nodes
      
      * Add rbac_enabled flag for contiv pods
      
      * Add contiv into CNI network plugin lists
      
      * migrate contiv test to tests/files
      
      Signed-off-by: default avatarCristian Staretu <cristian.staretu@gmail.com>
      
      * Add required rules for contiv netplugin
      
      * Better handling json return of fwdMode
      
      * Make contiv etcd port configurable
      
      * Use default var instead of templating
      
      * roles/download/defaults/main.yml: use contiv 1.1.7
      
      Signed-off-by: default avatarCristian Staretu <cristian.staretu@gmail.com>
      e5d353d0
  2. Nov 15, 2017
  3. Nov 14, 2017
  4. Nov 07, 2017
    • Chad Swenson's avatar
      Support for disabling apiserver insecure port · 0c7e1889
      Chad Swenson authored
      This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). It's working, but so far I have had to:
      
      1. Make the `uri` module "Wait for apiserver up" checks use `kube_apiserver_port` (HTTPS)
      2. Add apiserver client cert/key to the "Wait for apiserver up" checks
      3. Update apiserver liveness probe to use HTTPS ports
      4. Set `kube_api_anonymous_auth` to true to allow liveness probe to hit apiserver's /healthz over HTTPS (livenessProbes can't use client cert/key unfortunately)
      5. RBAC has to be enabled. Anonymous requests are in the `system:unauthenticated` group which is granted access to /healthz by one of RBAC's default ClusterRoleBindings. An equivalent ABAC rule could allow this as well.
      
      Changes 1 and 2 should work for everyone, but 3, 4, and 5 require new coupling of currently independent configuration settings. So I also added a new settings check.
      
      Options:
      
      1. The problem goes away if you have both anonymous-auth and RBAC enabled. This is how kubeadm does it. This may be the best way to go since RBAC is already on by default but anonymous auth is not.
      2. Include conditional templates to set a different liveness probe for possible combinations of `kube_apiserver_insecure_port = 0`, RBAC, and `kube_api_anonymous_auth` (won't be possible to cover every case without a guaranteed authorizer for the secure port)
      3. Use basic auth headers for the liveness probe (I really don't like this, it adds a new dependency on basic auth which I'd also like to leave independently configurable, and it requires encoded passwords in the apiserver manifest)
      
      Option 1 seems like the clear winner to me, but is there a reason we wouldn't want anonymous-auth on by default? The apiserver binary defaults anonymous-auth to true, but kubespray's default was false.
      0c7e1889
  5. Nov 03, 2017
  6. Nov 01, 2017
  7. Oct 30, 2017
  8. Oct 24, 2017
  9. Oct 17, 2017
  10. Oct 15, 2017
  11. Oct 13, 2017
  12. Oct 11, 2017
    • Vijay Katam's avatar
      Rename dns_server, add var for selinux. (#1572) · 27ed73e3
      Vijay Katam authored
      * Rename dns_server to dnsmasq_dns_server so that it includes role prefix
      as the var name is generic and conflicts when integrating with existing ansible automation.
      *  Enable selinux state to be configurable with new var preinstall_selinux_state
      27ed73e3
  13. Oct 05, 2017
  14. Sep 18, 2017
    • Matthew Mosesohn's avatar
      Create admin credential kubeconfig (#1647) · ef8e35e3
      Matthew Mosesohn authored
      New files: /etc/kubernetes/admin.conf
                 /root/.kube/config
                 $GITDIR/artifacts/{kubectl,admin.conf}
      
      Optional method to download kubectl and admin.conf if
      kubeconfig_lcoalhost is set to true (default false)
      ef8e35e3
  15. Sep 14, 2017
  16. Sep 10, 2017
  17. Sep 08, 2017
  18. Sep 06, 2017
  19. Aug 21, 2017
    • Matthew Mosesohn's avatar
      Update to Kubernetes v1.7.3 (#1549) · ca3050ec
      Matthew Mosesohn authored
      Change kubelet deploy mode to host
      Enable cri and qos per cgroup for kubelet
      Update CoreOS images
      Add upgrade hook for switching from kubelet deployment from docker to host.
      Bump machine type for ubuntu-rkt-sep
      ca3050ec
  20. Jul 31, 2017
  21. Jul 26, 2017
    • timtoum's avatar
      Enable weave seed mode for kubespray (#1414) · 3e457e4e
      timtoum authored
      * Enable weave seed mode for kubespray
      
      * fix task Weave seed | Set peers if existing peers
      
      * fix mac address variabilisation
      
      * fix default values
      
      * fix include seed condition
      
      * change weave var to default values
      
      * fix Set peers if existing peers
      3e457e4e
  22. Jul 14, 2017
  23. Jul 11, 2017
  24. Jul 07, 2017
  25. Jul 06, 2017
  26. Jun 23, 2017
  27. Jun 20, 2017
  28. May 23, 2017
  29. May 12, 2017
  30. Apr 12, 2017
  31. Apr 05, 2017
  32. Mar 17, 2017
    • Matthew Mosesohn's avatar
      Add helm deployment · b69d4b0e
      Matthew Mosesohn authored
      b69d4b0e
    • Aleksandr Didenko's avatar
      Move calico-policy-controller into separate role · 3a399040
      Aleksandr Didenko authored
      By default Calico CNI does not create any network access policies
      or profiles if 'policy' is enabled in CNI config. And without any
      policies/profiles network access to/from PODs is blocked.
      
      K8s related policies are created by calico-policy-controller in
      such case. So we need to start it as soon as possible, before any
      real workloads.
      
      This patch also fixes kube-api port in calico-policy-controller
      yaml template.
      
      Closes #1132
      3a399040
  33. Mar 14, 2017
  34. Mar 06, 2017
    • Vincent Schwarzer's avatar
      Added Support for OpenID Connect Authentication · b075960e
      Vincent Schwarzer authored
      To use OpenID Connect Authentication beside deploying an OpenID Connect
      Identity Provider it is necesarry to pass additional arguments to the Kube API Server.
      These required arguments were added to the kube apiserver manifest.
      b075960e
  35. Feb 28, 2017
Loading