"...kubernetes-apps/ansible/templates/dns-autoscaler.yml.j2" did not exist on "d5516a4ca9c42cc6cfb4c1aef692e0ef323abfcc"
- Mar 17, 2018
-
-
woopstar authored
Added CoreDNS to downloads Updated with labels. Should now work without RBAC too Fix DNS settings on hosts Rename CoreDNS service from kube-dns to coredns Add rotate based on http://edgeofsanity.net/rant/2017/12/20/systemd-resolved-is-broken.html Updated docs with CoreDNS info Added labels and fixed minor settings from official yaml file: https://github.com/kubernetes/kubernetes/blob/release-1.9/cluster/addons/dns/coredns.yaml.sed Added a secondary deployment and secondary service ip. This is to mitigate dns timeouts and create high resitency for failures. See discussion at 'https://github.com/coreos/coreos-kubernetes/issues/641#issuecomment-281174806' Set dns list correct. Thanks to @whereismyjetpack Only download KubeDNS or CoreDNS if selected Move dns cleanup to its own file and import tasks based on dns mode Fix install of KubeDNS when dnsmask_kubedns mode is selected Add new dns option coredns_dual for dual stack deployment. Added variable to configure replicas deployed. Updated docs for dual stack deployment. Removed rotate option in resolv.conf. Run DNS manifests for CoreDNS and KubeDNS Set skydns servers on dual stack deployment Use only one template for CoreDNS dual deployment Set correct cluster ip for the dns server
-
- Feb 05, 2018
-
-
Wong Hoi Sing Edison authored
-
- Jan 10, 2018
-
-
rong.zhang authored
-
- Jan 04, 2018
-
-
rong.zhang authored
-
- Dec 22, 2017
-
-
rong.zhang authored
-
- Dec 18, 2017
-
-
rong.zhang authored
-
- Dec 13, 2017
-
-
rong.zhang authored
-
- Nov 15, 2017
-
-
Chad Swenson authored
-
Chad Swenson authored
This version required changing the previous access model for dashboard completely but it's a change for the better. Docs were updated. * New login/auth options that use apiserver auth proxying by default * Requires RBAC in `authorization_modes` * Only serves over https * No longer available at https://first_master:6443/ui until apiserver is updated with the https proxy URL: * Can access from https://first_master:6443/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/#!/login you will be prompted for credentials * Or you can run 'kubectl proxy' from your local machine to access dashboard in your browser from: http://localhost:8001/api/v1/namespaces/kube-system/services/https:kubernetes-dashboard:/proxy/ * It is recommended to access dashboard from behind a gateway that enforces an authentication token, details and other access options here: https://github.com/kubernetes/dashboard/wiki/Accessing-Dashboard---1.7.X-and-above
-
- Oct 26, 2017
-
-
Matthew Mosesohn authored
This should be done after kubeconfig is set for admin and before network plugins are up.
-
- Oct 24, 2017
-
-
Matthew Mosesohn authored
This is to work around #1856 which can occur when kubelet hostname and resolvable hostname (or cloud instance name) do not match.
-
- Sep 15, 2017
-
-
Matthew Mosesohn authored
* fix apply for netchecker upgrade and graceful upgrade * Speed up daemonset upgrades. Make check wait for ds upgrades.
-
- Sep 10, 2017
-
-
Matthew Mosesohn authored
* Add kube dashboard, enabled by default Also add rbac role for kube user * Update main.yml
-
- Sep 05, 2017
-
-
Matthew Mosesohn authored
* Use kubectl apply instead of create/replace Disable checks for existing resources to speed up execution. * Fix non-rbac deployment of resources as a list * Fix autoscaler tolerations field * set all kube resources to state=latest * Update netchecker and weave
-
- Sep 04, 2017
-
-
Matthew Mosesohn authored
Canal will be covered by a separate PR
-
Matthew Mosesohn authored
Refactored how rbac_enabled is set Added RBAC to ubuntu-canal-ha CI job Added rbac for calico policy controller
-
- Aug 24, 2017
-
-
Matthew Mosesohn authored
Added toleration to DNS, netchecker, fluentd, canal, and calico policy. Also small fixes to make yamllint pass.
-
Brad Beam authored
* Adding yaml linter to ci check * Minor linting fixes from yamllint * Changing CI to install python pkgs from requirements.txt - adding in a secondary requirements.txt for tests - moving yamllint to tests requirements
-
- Jul 17, 2017
- Jun 27, 2017
-
-
Chad Swenson authored
-
Seungkyu Ahn authored
Update kube-dns version to 1.14.2 https://github.com/kubernetes/kubernetes/pull/45684
-
- May 13, 2017
-
-
Spencer Smith authored
-
- May 12, 2017
-
-
Spencer Smith authored
-
- Apr 24, 2017
-
-
Aleksey Kasatkin authored
-
- Apr 14, 2017
-
-
Sergii Golovatiuk authored
Pod opbject is not reschedulable by kubernetes. It means that if node with netchecker-server goes down, netchecker-server won't be scheduled somewhere. This commit changes the type of netchecker-server to Deployment, so netchecker-server will be scheduled on other nodes in case of failures.
-
- Apr 13, 2017
-
-
Joe Duhamel authored
The target was a replicationcontroller but kubedns is currently a deployment
-
- Apr 06, 2017
-
-
Matthew Mosesohn authored
-
- Apr 05, 2017
-
-
Sergii Golovatiuk authored
- Renaming templates for netchecker - Add dnsPolicy: ClusterFirstWithHostNet to kube-proxy Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Apr 04, 2017
-
-
Sergii Golovatiuk authored
In kubernetes 1.6 ClusterFirstWithHostNet was added as an option. In accordance to it kubelet will generate resolv.conf based on own resolv.conf. However, this doesn't create 'options', thus the proper solution requires some investigation. This patch sets the same resolv.conf for kubelet as host Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Mar 17, 2017
-
-
Aleksandr Didenko authored
By default Calico CNI does not create any network access policies or profiles if 'policy' is enabled in CNI config. And without any policies/profiles network access to/from PODs is blocked. K8s related policies are created by calico-policy-controller in such case. So we need to start it as soon as possible, before any real workloads. This patch also fixes kube-api port in calico-policy-controller yaml template. Closes #1132
-
- Mar 02, 2017
-
-
Matthew Mosesohn authored
By default kubedns and dnsmasq scale when installed. Dnsmasq is no longer a daemonset. It is now a deployment. Kubedns is no longer a replicationcluster. It is now a deployment. Minimum replicas is two (to enable rolling updates). Reduced memory erquirements for dnsmasq and kubedns
-
- Feb 28, 2017
-
-
Sergii Golovatiuk authored
Operator can specify any port for kube-api (6443 default) This helps in case where some pods such as Ingress require 443 exclusively. Closes: 820 Signed-off-by:
Sergii Golovatiuk <sgolovatiuk@mirantis.com>
-
- Feb 07, 2017
-
-
Aleksandr Didenko authored
Netchecker is rewritten in Go lang with some new args instead of env variables. Also netchecker-server no longer requires kubectl container. Updating playbooks accordingly.
-
- Feb 06, 2017
-
-
Matthew Mosesohn authored
-
- Jan 20, 2017
-
-
Bogdan Dobrelya authored
* Drop linux capabilities for unprivileged containerized worlkoads Kargo configures for deployments. * Configure required securityContext/user/group/groups for kube components' static manifests, etcd, calico-rr and k8s apps, like dnsmasq daemonset. * Rework cloud-init (etcd) users creation for CoreOS. * Fix nologin paths, adjust defaults for addusers role and ensure supplementary groups membership added for users. * Add netplug user for network plugins (yet unused by privileged networking containers though). * Grant the kube and netplug users read access for etcd certs via the etcd certs group. * Grant group read access to kube certs via the kube cert group. * Remove priveleged mode for calico-rr and run it under its uid/gid and supplementary etcd_cert group. * Adjust docs. * Align cpu/memory limits and dropped caps with added rkt support for control plane. Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Jan 03, 2017
-
-
Bogdan Dobrelya authored
Signed-off-by:
Bogdan Dobrelya <bogdando@mail.ru>
-
- Dec 28, 2016
-
-
Bogdan Dobrelya authored
* Add restart for weave service unit * Reuse docker_bin_dir everythere * Limit systemd managed docker containers by CPU/RAM. Do not configure native systemd limits due to the lack of consensus in the kernel community requires out-of-tree kernel patches. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-
- Dec 23, 2016
-
-
Bogdan Dobrelya authored
Also fix kube log level 4 to log dnsmasq queries. Signed-off-by:
Bogdan Dobrelya <bdobrelia@mirantis.com>
-