- Jan 23, 2025
-
-
Max Gautier authored
-
Max Gautier authored
Since 'none' can be, for instance, a manual calico deployment, don't check whether there is enough ip for pods on a node, because the plugin can use another mechanism than the podCIDR to allocate IPs.
-
Max Gautier authored
When the etcd group is not specified we assume it's kube_control_plane. In that case, etcd still can't be even, so instead of only checking the etcd group we need to default to kube_control_plane
-
Max Gautier authored
-
Max Gautier authored
-
Max Gautier authored
Upstream calico isn't doing that, and: - this can cause throttling - the cpu needed by calico is very cluster / workload dependent - missing cpu limits will not starve other pods (unlike missing memory requests), because the kernel scheduler will still gives priority to other process in pods not exceeding their requests
-
- Jan 16, 2025
-
-
ChengHao Yang authored
* Cleanup not in k-sigs members OWNERS Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> * Cleanup inactive members on Kubespray Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> --------- Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com>
-
- Jan 15, 2025
-
-
Kay Yan authored
* [kubernetes] Support Kubernetes v1.32.0 * add workaround for RHEL8 Signed-off-by:
Kay Yan <kay.yan@daocloud.io> --------- Signed-off-by:
Kay Yan <kay.yan@daocloud.io> Co-authored-by:
Mohamed Zaian <mohamedzaian@gmail.com>
-
Christian Kröger authored
-
- Jan 14, 2025
-
-
Fredrik Liv authored
Co-authored-by:
nvalembois <nvalembois@live.com>
-
Kay Yan authored
Signed-off-by:
Kay Yan <kay.yan@daocloud.io>
-
- Jan 13, 2025
-
-
ChengHao Yang authored
* Add `manual` option in the `external_cloud_provider` value Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> * Update external cloud provider description in roles & sample inventory Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> --------- Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com>
-
- Jan 09, 2025
-
-
kyrie authored
Signed-off-by:
KubeKyrie <shaolong.qin@daocloud.io>
-
- Jan 07, 2025
-
-
Chad Swenson authored
Adds the ability to configure the Kubernetes API server with a structured authorization configuration file. Structured AuthorizationConfiguration is a new feature in Kubernetes v1.29+ (GA in v1.32) that configures the API server's authorization modes with a structured configuration file. AuthorizationConfiguration files offer features not available with the `--authorization-mode` flag, although Kubespray supports both methods and authorization-mode remains the default for now. Note: Because the `--authorization-config` and `--authorization-mode` flags are mutually exclusive, the `authorization_modes` ansible variable is ignored when `kube_apiserver_use_authorization_config_file` is set to true. The two features cannot be used at the same time. Docs: https://kubernetes.io/docs/reference/access-authn-authz/authorization/#configuring-the-api-server-using-an-authorization-config-file Blog + Examples: https://kubernetes.io/blog/2024/04/26/multi-webhook-and-modular-authorization-made-much-easier/ KEP: https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3221-structured-authorization-configuration I tested this all the way back to k8s v1.29 when AuthorizationConfiguration was first introduced as an alpha feature, although v1.29 required some additional workarounds with `kubeadm_patches`, which I included in example comments. I also included some example comments with CEL expressions that allowed me to configure webhook authorizers without hitting kubeadm 1.29+ issues that block cluster creation and upgrades such as this one: https://github.com/kubernetes/cloud-provider-openstack/issues/2575. My workaround configures the webhook to ignore requests from kubeadm and system components, which prevents fatal errors from webhooks that are not available yet, and should be authorized by Node or RBAC anyway.
-
- Jan 06, 2025
-
-
Noam authored
* remove check for os family on bash completion tasks * add Suse
-
- Jan 02, 2025
-
- Dec 31, 2024
-
-
Antoine Legrand authored
-
- Dec 27, 2024
-
-
ChengHao Yang authored
* Bump: Containerd upgrade to 1.7.24 Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> * Docs: README.md update Containerd version 1.7.24 Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> * Bump: runc upgrade to v1.2.3 Runc upgrade to v1.2.3, and add v1.1.15, v1.2.x checksum Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> --------- Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com>
-
- Dec 26, 2024
-
-
ChengHao Yang authored
* Bump: Helm default version v3.16.4 Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> * Docs: README.md update helm version Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> --------- Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com>
-
Mohamed Omar Zaian authored
-
ChengHao Yang authored
* Bump: kubernetes upgrade to 1.31.4 Add Kubernetes 1.31.4, 1.30.8 and 1.29.12 version Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> * Docs: Upgrade Kubernetes version to 1.31.4 Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com> --------- Signed-off-by:
ChengHao Yang <17496418+tico88612@users.noreply.github.com>
-
- Dec 24, 2024
-
-
kyrie authored
* enhance reset network service Signed-off-by:
KubeKyrie <shaolong.qin@daocloud.io> * reset network service: use systemd module directly --------- Signed-off-by:
KubeKyrie <shaolong.qin@daocloud.io> Co-authored-by:
Max Gautier <mg@max.gautier.name>
-
- Dec 23, 2024
-
-
Max Gautier authored
This avoids spurious failure with 'localhost'. It should also be more correct the inventory contains uncached hosts which are not in `k8s_cluster` and therefore should not be Kubespray business. (We still use hostvars for uncached hosts, because it's easier to select on 'ansible_default_ipv4' that way and does not change the end result)
-
- Dec 19, 2024
-
-
Chad Swenson authored
This enables [configuration](https://kubernetes.io/docs/concepts/policy/resource-quotas/#limit-priority-class-consumption-by-default) of the [ResourceQuota AdmissionController plugin](https://kubernetes.io/docs/reference/access-authn-authz/admission-controllers/#resourcequota). The configuration file will be empty by default when no limitedResources are set.
-
Max Gautier authored
-
Max Gautier authored
- Move validation from facts to verify-settings - Move set_fact to vars/
-
Max Gautier authored
We use a lot of facts where variables are enough, and format too early, which prevent reusing the variables in different contexts. - Moves set_fact variables to the vars directory, remove unnecessary intermediate variables, and render them at usage sites to only do logic on native Ansible/Jinja lists. - Use defaults/ rather than default filters for several variables.
-
Max Gautier authored
-
Ekko authored
Signed-off-by:
ekko <lihai.tu@daocloud.io>
-
- Dec 18, 2024
-
-
Max Gautier authored
This reverts commit 742409e6.
-
- Dec 17, 2024
-
-
ERIK authored
Signed-off-by:
bo.jiang <bo.jiang@daocloud.io>
-
- Dec 16, 2024
-
-
Max Gautier authored
-
- Dec 11, 2024
-
-
Max Gautier authored
This is needed for shutdown ordering: while at startup, it's not a problem that containerd start before dbus (the dbus socket already exists) it needs to shutdown before dbus to do its cleanup (asking systemd via dbus to cleanup cgroups).
-
- Dec 09, 2024
-
-
Max Gautier authored
Not that the Apparmor check result is no longer used since the PSP removal.
-
Max Gautier authored
-
Max Gautier authored
Note that we're reapplying the RBAC/Sa/Config from coredns which is not strictly necessary, but harmless, when the secondary is enabled.
-
Max Gautier authored
-
Max Gautier authored
-
Max Gautier authored
-
Max Gautier authored
This is expected to be used in the command module this way: command: cmd: "{{ kubectl_apply_stdin }}" stdin: <... rendered manifests > -> using the 'template' lookup plugin in most cases. The advantages over the kube plugin module integrated in kubespray (which this should replace eventually): - way easier to modify to take advantage of new features (server-side apply for instance) - no need for a separate template tasks + checking the result (which can introduce problem if the first playbook runs encounters an error).
-