Skip to content
Snippets Groups Projects
user avatar
Matthew Mosesohn authored
* Enable kubeadm etcd mode

Uses cert commands from kubeadm experimental control plane to
enable non-master nodes to obtain etcd certs.

Related story: PROD-29434

Change-Id: Idafa1d223e5c6ceadf819b6f9c06adf4c4f74178

* Add validation checks and exclude calico kdd mode

Change-Id: Ic234f5e71261d33191376e70d438f9f6d35f358c

* Move etcd mode test to ubuntu flannel HA job

Change-Id: I9af6fd80a1bbb1692ab10d6da095eb368f6bc732

* rename etcd_mode to etcd_kubeadm_enabled

Change-Id: Ib196d6c8a52f48cae370b026f7687ff9ca69c172
4348e78b
History

Kubespray cloud deployment tests

Amazon Web Service

Calico Flannel Weave
Debian Jessie Build Status Build Status Build Status
Ubuntu Trusty Build Status Build Status Build Status
RHEL 7.2 Build Status Build Status Build Status
CentOS 7 Build Status Build Status Build Status

Test environment variables

Common

Variable Description Required Default
TEST_ID A unique execution ID for this test Yes
KUBE_NETWORK_PLUGIN The network plugin (calico or flannel) Yes
PRIVATE_KEY_FILE The path to the SSH private key file No

AWS Tests

Variable Description Required Default
AWS_ACCESS_KEY The Amazon Access Key ID Yes
AWS_SECRET_KEY The Amazon Secret Access Key Yes
AWS_AMI_ID The AMI ID to deploy Yes
AWS_KEY_PAIR_NAME The name of the EC2 key pair to use Yes
AWS_SECURITY_GROUP The EC2 Security Group to use No default
AWS_REGION The EC2 region No eu-central-1

Use private ssh key

Key
openssl pkcs12 -in gce-secure.p12 -passin pass:notasecret -nodes -nocerts | openssl rsa -out gce-secure.pem
cat gce-secure.pem |base64 -w0 > GCE_PEM_FILE`