- Nov 29, 2017
-
-
unclejack authored
* Add Contiv support Contiv is a network plugin for Kubernetes and Docker. It supports vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies, multiple networks and bridging pods onto physical networks. * Update contiv version to 1.1.4 Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config. * Load openvswitch module to workaround on CentOS7.4 * Set contiv cni version to 0.1.0 Correct contiv CNI version to 0.1.0. * Use kube_apiserver_endpoint for K8S_API_SERVER Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks to a available endpoint no matter if there's a loadbalancer or not. * Make contiv use its own etcd Before this commit, contiv is using a etcd proxy mode to k8s etcd, this work fine when the etcd hosts are co-located with contiv etcd proxy, however the k8s peering certs are only in etcd group, as a result the etcd-proxy is not able to peering with the k8s etcd on etcd group, plus the netplugin is always trying to find the etcd endpoint on localhost, this will cause problem for all netplugins not runnign on etcd group nodes. This commit make contiv uses its own etcd, separate from k8s one. on kube-master nodes (where net-master runs), it will run as leader mode and on all rest nodes it will run as proxy mode. * Use cp instead of rsync to copy cni binaries Since rsync has been removed from hyperkube, this commit changes it to use cp instead. * Make contiv-etcd able to run on master nodes * Add rbac_enabled flag for contiv pods * Add contiv into CNI network plugin lists * migrate contiv test to tests/files Signed-off-by:
Cristian Staretu <cristian.staretu@gmail.com> * Add required rules for contiv netplugin * Better handling json return of fwdMode * Make contiv etcd port configurable * Use default var instead of templating * roles/download/defaults/main.yml: use contiv 1.1.7 Signed-off-by:
Cristian Staretu <cristian.staretu@gmail.com>
-
- Nov 15, 2017
-
-
Chad Swenson authored
-
- Nov 14, 2017
-
-
Matthew Mosesohn authored
-
- Nov 07, 2017
-
-
Chad Swenson authored
This allows `kube_apiserver_insecure_port` to be set to 0 (disabled). It's working, but so far I have had to: 1. Make the `uri` module "Wait for apiserver up" checks use `kube_apiserver_port` (HTTPS) 2. Add apiserver client cert/key to the "Wait for apiserver up" checks 3. Update apiserver liveness probe to use HTTPS ports 4. Set `kube_api_anonymous_auth` to true to allow liveness probe to hit apiserver's /healthz over HTTPS (livenessProbes can't use client cert/key unfortunately) 5. RBAC has to be enabled. Anonymous requests are in the `system:unauthenticated` group which is granted access to /healthz by one of RBAC's default ClusterRoleBindings. An equivalent ABAC rule could allow this as well. Changes 1 and 2 should work for everyone, but 3, 4, and 5 require new coupling of currently independent configuration settings. So I also added a new settings check. Options: 1. The problem goes away if you have both anonymous-auth and RBAC enabled. This is how kubeadm does it. This may be the best way to go since RBAC is already on by default but anonymous auth is not. 2. Include conditional templates to set a different liveness probe for possible combinations of `kube_apiserver_insecure_port = 0`, RBAC, and `kube_api_anonymous_auth` (won't be possible to cover every case without a guaranteed authorizer for the secure port) 3. Use basic auth headers for the liveness probe (I really don't like this, it adds a new dependency on basic auth which I'd also like to leave independently configurable, and it requires encoded passwords in the apiserver manifest) Option 1 seems like the clear winner to me, but is there a reason we wouldn't want anonymous-auth on by default? The apiserver binary defaults anonymous-auth to true, but kubespray's default was false.
-
- Nov 03, 2017
-
-
Matthew Mosesohn authored
-
- Nov 01, 2017
-
-
Matthew Mosesohn authored
-
- Oct 30, 2017
-
-
Andrew Greenwood authored
-
- Oct 24, 2017
-
-
Matthew Mosesohn authored
-
- Oct 17, 2017
-
-
Rémi de Passmoilesel authored
* Add possibility to insert more ip adresses in certificates * Add newline at end of files * Move supp ip parameters to k8s-cluster group file * Add supplementary addresses in kubeadm master role * Improve openssl indexes
-
- Oct 15, 2017
-
-
Matthew Mosesohn authored
* Disable basic and token auth by default * Add recommended security params * allow basic auth to fail in tests * Enable TLS authentication for kubelet
-
- Oct 13, 2017
-
-
Matthew Mosesohn authored
* add istio addon * add addons to a ci job
-
Maxim Krasilnikov authored
-
- Oct 11, 2017
-
-
Vijay Katam authored
* Rename dns_server to dnsmasq_dns_server so that it includes role prefix as the var name is generic and conflicts when integrating with existing ansible automation. * Enable selinux state to be configurable with new var preinstall_selinux_state
-
- Oct 05, 2017
-
-
Matthew Mosesohn authored
* Upgrade to kubernetes v1.8.0 hyperkube no longer contains rsync, so now use cp * Enable node authorization mode * change kube-proxy cert group name
-
- Sep 18, 2017
-
-
Matthew Mosesohn authored
New files: /etc/kubernetes/admin.conf /root/.kube/config $GITDIR/artifacts/{kubectl,admin.conf} Optional method to download kubectl and admin.conf if kubeconfig_lcoalhost is set to true (default false)
-
- Sep 14, 2017
-
-
Kyle Bai authored
-
- Sep 10, 2017
-
-
Matthew Mosesohn authored
* Add kube dashboard, enabled by default Also add rbac role for kube user * Update main.yml
-
- Sep 08, 2017
-
-
Matthew Mosesohn authored
* Clean up debug in check apiserver test * Change password generation for kube_user Special characters are not allowed in known_users.csv file
-
- Sep 06, 2017
-
-
Matthew Mosesohn authored
Removed unnecessary root user
-
Maxim Krasilnikov authored
-
- Aug 21, 2017
-
-
Matthew Mosesohn authored
Change kubelet deploy mode to host Enable cri and qos per cgroup for kubelet Update CoreOS images Add upgrade hook for switching from kubelet deployment from docker to host. Bump machine type for ubuntu-rkt-sep
-
- Jul 31, 2017
-
-
nico authored
Closes #1228 pods is default enforcement see https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/ add update
-
- Jul 26, 2017
-
-
timtoum authored
* Enable weave seed mode for kubespray * fix task Weave seed | Set peers if existing peers * fix mac address variabilisation * fix default values * fix include seed condition * change weave var to default values * fix Set peers if existing peers
-
- Jul 14, 2017
-
-
Dann Bohn authored
-
- Jul 11, 2017
-
-
Delfer authored
-
- Jul 07, 2017
-
-
Julian Poschmann authored
-
- Jul 06, 2017
-
-
Vladimir Kozyrev authored
-
- Jun 23, 2017
-
-
AtzeDeVries authored
-
- Jun 20, 2017
-
-
AtzeDeVries authored
-
- May 23, 2017
-
-
zouyee authored
-
- May 12, 2017
-
-
Spencer Smith authored
-
- Apr 12, 2017
-
-
Vincent Schwarzer authored
-
- Apr 05, 2017
-
-
Matthew Mosesohn authored
-
- Mar 17, 2017
-
-
Matthew Mosesohn authored
-
Aleksandr Didenko authored
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
-
- Mar 14, 2017
-
-
Sergii Golovatiuk authored
Closes: #1135 Closes: #1026 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
Vincent Schwarzer authored
It is now possible to deactivate selected authentication methods (basic auth, token auth) inside the cluster by adding removing the required arguments to the Kube API Server and generating the secrets accordingly. The x509 authentification is currently not optional because disabling it would affect the kubectl clients deployed on the master nodes.
-
- Mar 06, 2017
-
-
Vincent Schwarzer authored
To use OpenID Connect Authentication beside deploying an OpenID Connect Identity Provider it is necesarry to pass additional arguments to the Kube API Server. These required arguments were added to the kube apiserver manifest.
-
- Feb 28, 2017
-
-
Sergii Golovatiuk authored
Operator can specify any port for kube-api (6443 default) This helps in case where some pods such as Ingress require 443 exclusively. Closes: 820 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
Sergii Golovatiuk authored
Closes: #1073 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-