mirror of https://github.com/kubernetes/kops.git
Fixes for import from kube-up
This commit is contained in:
parent
23d44f78d8
commit
e3eb7454d2
|
@ -35,7 +35,7 @@ on AWS.
|
||||||
* Based on a simple meta-model defined in a directory tree
|
* Based on a simple meta-model defined in a directory tree
|
||||||
* Command line [autocomplete](/docs/cli/kops_completion.md)
|
* Command line [autocomplete](/docs/cli/kops_completion.md)
|
||||||
* Community support
|
* Community support
|
||||||
|
* [Upgrade from kube-up](/docs/upgrade_from_kubeup.md)
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
`kubectl` is required, see [here](http://kubernetes.io/docs/user-guide/prereqs/).
|
`kubectl` is required, see [here](http://kubernetes.io/docs/user-guide/prereqs/).
|
||||||
|
@ -123,7 +123,7 @@ If you think you have found a bug please follow the instructions below.
|
||||||
|
|
||||||
- Please spend a small amount of time giving due diligence to the issue tracker. Your issue might be a duplicate.
|
- Please spend a small amount of time giving due diligence to the issue tracker. Your issue might be a duplicate.
|
||||||
- Set `-v 10` command line option and save the log output. Please paste this into your issue.
|
- Set `-v 10` command line option and save the log output. Please paste this into your issue.
|
||||||
- Note you version of `kops`, and the command line options you are using
|
- Note the version of kops you are running (from `kops version`), and the command line options you are using
|
||||||
- Open a [new issue](https://github.com/kubernetes/kops/issues/new)
|
- Open a [new issue](https://github.com/kubernetes/kops/issues/new)
|
||||||
- Remember users might be searching for your issue in the future, so please give it a meaningful title to helps others.
|
- Remember users might be searching for your issue in the future, so please give it a meaningful title to helps others.
|
||||||
- Feel free to reach out to the kops community on [kubernetes slack](https://github.com/kubernetes/community#slack-chat)
|
- Feel free to reach out to the kops community on [kubernetes slack](https://github.com/kubernetes/community#slack-chat)
|
||||||
|
|
|
@ -48,7 +48,7 @@ func NewCmdCreateSecretPublicKey(f *util.Factory, out io.Writer) *cobra.Command
|
||||||
}
|
}
|
||||||
options.Name = args[0]
|
options.Name = args[0]
|
||||||
|
|
||||||
err := rootCommand.ProcessArgs(args)
|
err := rootCommand.ProcessArgs(args[1:])
|
||||||
if err != nil {
|
if err != nil {
|
||||||
exitWithError(err)
|
exitWithError(err)
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,191 +1 @@
|
||||||
# Upgrading from kubernetes 1.2 to kubernetes 1.3
|
[Moved here](upgrade_from_kubeup.md)
|
||||||
|
|
||||||
Kops let you upgrade an existing 1.2 cluster, installed using kube-up, to a cluster managed by
|
|
||||||
kops running kubernetes version 1.3.
|
|
||||||
|
|
||||||
** This is an experimental and slightly risky procedure, so we recommend backing up important data before proceeding.
|
|
||||||
Take a snapshot of your EBS volumes; export all your data from kubectl etc. **
|
|
||||||
|
|
||||||
Limitations:
|
|
||||||
|
|
||||||
* kops splits etcd onto two volumes now: `main` and `events`. We will keep the `main` data, but
|
|
||||||
you will lose your events history.
|
|
||||||
* Doubtless others not yet known - please open issues if you encounter them!
|
|
||||||
|
|
||||||
## Overview
|
|
||||||
|
|
||||||
There are a few steps to upgrade a kubernetes cluster from 1.2 to 1.3:
|
|
||||||
|
|
||||||
* First you import the existing cluster state, so you can see and edit the configuration
|
|
||||||
* You verify the cluster configuration
|
|
||||||
* You move existing AWS resources to your new cluster
|
|
||||||
* You bring up the new cluster
|
|
||||||
* You can then delete the old cluster
|
|
||||||
|
|
||||||
## Importing the existing cluster
|
|
||||||
|
|
||||||
The `import cluster` command reverse engineers an existing cluster, and creates a cluster
|
|
||||||
configuration.
|
|
||||||
|
|
||||||
Make sure you have set `export KOPS_STATE_STORE=s3://<mybucket>`
|
|
||||||
|
|
||||||
Then import the cluster; setting `--name` and `--region` to match the old cluster. If you're not sure
|
|
||||||
of the old cluster name, you can find it by looking at the `KubernetesCluster` tag on your AWS resources.
|
|
||||||
|
|
||||||
```
|
|
||||||
export OLD_NAME=kubernetes
|
|
||||||
export REGION=us-west-2
|
|
||||||
kops import cluster --region ${REGION} --name ${OLD_NAME}
|
|
||||||
```
|
|
||||||
|
|
||||||
## Verify the cluster configuration
|
|
||||||
|
|
||||||
Now have a look at the cluster configuration, to make sure it looks right. If it doesn't, please
|
|
||||||
open an issue.
|
|
||||||
|
|
||||||
```
|
|
||||||
kops get cluster ${OLD_NAME} -oyaml
|
|
||||||
````
|
|
||||||
|
|
||||||
## Move resources to a new cluster
|
|
||||||
|
|
||||||
The upgrade moves some resources so they will be adopted by the new cluster. There are a number of things
|
|
||||||
this step does:
|
|
||||||
|
|
||||||
* It resizes existing autoscaling groups to size 0
|
|
||||||
* It will stop the existing master
|
|
||||||
* It detaches the master EBS volume from the master
|
|
||||||
* It re-tags resources to associate them with the new cluster: volumes, ELBs
|
|
||||||
* It re-tags the VPC to associate it with the new cluster
|
|
||||||
|
|
||||||
The upgrade procedure forces you to choose a new cluster name (e.g. `k8s.mydomain.com`)
|
|
||||||
|
|
||||||
```
|
|
||||||
export NEW_NAME=k8s.mydomain.com
|
|
||||||
kops toolbox convert-imported --newname ${NEW_NAME} --name ${OLD_NAME}
|
|
||||||
```
|
|
||||||
|
|
||||||
If you now list the clusters, you should see both the old cluster & the new cluster
|
|
||||||
|
|
||||||
```
|
|
||||||
kops get clusters
|
|
||||||
```
|
|
||||||
|
|
||||||
You can also list the instance groups: `kops get ig --name ${NEW_NAME}`
|
|
||||||
|
|
||||||
## Import the SSH public key
|
|
||||||
|
|
||||||
The SSH public key is not easily retrieved from the old cluster, so you must add it:
|
|
||||||
|
|
||||||
```
|
|
||||||
kops create secret --name ${NEW_NAME} sshpublickey admin -i ~/.ssh/id_rsa.pub
|
|
||||||
```
|
|
||||||
|
|
||||||
## Bring up the new cluster
|
|
||||||
|
|
||||||
Use the update command to bring up the new cluster:
|
|
||||||
|
|
||||||
```
|
|
||||||
kops update cluster ${NEW_NAME}
|
|
||||||
```
|
|
||||||
|
|
||||||
Things to check are that it is reusing the existing volume for the _main_ etcd cluster (but not the events clusters).
|
|
||||||
|
|
||||||
And then when you are happy:
|
|
||||||
|
|
||||||
```
|
|
||||||
kops update cluster ${NEW_NAME} --yes
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Export kubecfg settings to access the new cluster
|
|
||||||
|
|
||||||
You can export a kubecfg (although update cluster did this automatically): `kops export kubecfg ${NEW_NAME}`
|
|
||||||
|
|
||||||
|
|
||||||
## Workaround for secret import failure
|
|
||||||
|
|
||||||
The import procedure tries to preserve the CA certificates, but unfortunately this isn't supported
|
|
||||||
in kubernetes until [#34029](https://github.com/kubernetes/kubernetes/pull/34029) ships (should be
|
|
||||||
in 1.5).
|
|
||||||
|
|
||||||
So you will need to delete the service-accounts, so they can be recreated with the correct keys.
|
|
||||||
|
|
||||||
Unfortunately, until you do this, some services (most notably internal & external DNS) will not work.
|
|
||||||
Because of that you must SSH to the master to do this repair.
|
|
||||||
|
|
||||||
You can get the public IP address of the master from the AWS console, or by doing this:
|
|
||||||
|
|
||||||
```
|
|
||||||
aws ec2 --region $REGION describe-instances \
|
|
||||||
--filter Name=tag:KubernetesCluster,Values=${NEW_NAME} \
|
|
||||||
Name=tag-key,Values=k8s.io/role/master \
|
|
||||||
Name=instance-state-name,Values=running \
|
|
||||||
--query Reservations[].Instances[].PublicIpAddress \
|
|
||||||
--output text
|
|
||||||
```
|
|
||||||
|
|
||||||
Then `ssh admin@<ip>` (the SSH key will be the one you added above, i.e. `~/.ssh/id_rsa.pub`), and run:
|
|
||||||
|
|
||||||
First check that the apiserver is running:
|
|
||||||
```
|
|
||||||
kubectl get nodes
|
|
||||||
```
|
|
||||||
|
|
||||||
You should see only one node (the master). Then run
|
|
||||||
```
|
|
||||||
NS=`kubectl get namespaces -o 'jsonpath={.items[*].metadata.name}'`
|
|
||||||
for i in ${NS}; do kubectl get secrets --namespace=${i} --no-headers | grep "kubernetes.io/service-account-token" | awk '{print $1}' | xargs -I {} kubectl delete secret --namespace=$i {}; done
|
|
||||||
sleep 60 # Allow for new secrets to be created
|
|
||||||
kubectl delete pods -lk8s-app=dns-controller --namespace=kube-system
|
|
||||||
kubectl delete pods -lk8s-app=kube-dns --namespace=kube-system
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
You probably also want to delete the imported DNS services from prior versions:
|
|
||||||
|
|
||||||
```
|
|
||||||
kubectl delete rc -lk8s-app=kube-dns --namespace=kube-system
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
Within a few minutes the new cluster should be running.
|
|
||||||
|
|
||||||
Try `kubectl get nodes --show-labels`, `kubectl get pods --all-namespaces` etc until you are sure that all is well.
|
|
||||||
|
|
||||||
This should work even without being SSH-ed into the master, although it can take a few minutes
|
|
||||||
for DNS to propagate. If it doesn't work, double-check that you have specified a valid
|
|
||||||
domain name for your cluster, that records have been created in Route53, and that you
|
|
||||||
can resolve those records from your machine (using `nslookup` or `dig`).
|
|
||||||
|
|
||||||
## Other fixes
|
|
||||||
|
|
||||||
* If you're using a manually created ELB, the auto-scaling groups change, so you will need to reconfigure
|
|
||||||
your ELBs to include the new auto-scaling group(s).
|
|
||||||
|
|
||||||
* It is recommended to delete old kubernetes system services that we imported (and replace them with newer versions):
|
|
||||||
|
|
||||||
```
|
|
||||||
kubectl delete rc -lk8s-app=kube-dns --namespace=kube-system
|
|
||||||
|
|
||||||
kubectl delete rc -lk8s-app=elasticsearch-logging --namespace=kube-system
|
|
||||||
kubectl delete rc -lk8s-app=kibana-logging --namespace=kube-system
|
|
||||||
kubectl delete rc -lk8s-app=kubernetes-dashboard --namespace=kube-system
|
|
||||||
kubectl delete rc -lk8s-app=influxGrafana --namespace=kube-system
|
|
||||||
|
|
||||||
kubectl delete deployment -lk8s-app=heapster --namespace=kube-system
|
|
||||||
```
|
|
||||||
|
|
||||||
## Delete remaining resources of the old cluster
|
|
||||||
|
|
||||||
`kops delete cluster ${OLD_NAME}`
|
|
||||||
> ```
|
|
||||||
TYPE NAME ID
|
|
||||||
autoscaling-config kubernetes-minion-group-us-west-2a kubernetes-minion-group-us-west-2a
|
|
||||||
autoscaling-group kubernetes-minion kubernetes-minion-group-us-west-2a
|
|
||||||
instance kubernetes-master i-67af2ec8
|
|
||||||
```
|
|
||||||
|
|
||||||
And once you've confirmed it looks right, run with `--yes`
|
|
||||||
|
|
||||||
You will also need to release the old ElasticIP manually.
|
|
||||||
|
|
|
@ -0,0 +1,197 @@
|
||||||
|
# Upgrading from kube-up to kops
|
||||||
|
|
||||||
|
Kops let you upgrade an existing kubernetes cluster installed using kube-up, to a cluster managed by
|
||||||
|
kops.
|
||||||
|
|
||||||
|
** This is a slightly risky procedure, so we recommend backing up important data before proceeding.
|
||||||
|
Take a snapshot of your EBS volumes; export all your data from kubectl etc. **
|
||||||
|
|
||||||
|
Limitations:
|
||||||
|
|
||||||
|
* kops splits etcd onto two volumes now: `main` and `events`. We will keep the `main` data, but
|
||||||
|
you will lose your events history.
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
There are a few steps to upgrade a kubernetes cluster:
|
||||||
|
|
||||||
|
* First you import the existing cluster state, so you can see and edit the configuration
|
||||||
|
* You verify the cluster configuration
|
||||||
|
* You move existing AWS resources to your new cluster
|
||||||
|
* You bring up the new cluster
|
||||||
|
* You can then delete the old cluster
|
||||||
|
|
||||||
|
## Importing the existing cluster
|
||||||
|
|
||||||
|
The `import cluster` command reverse engineers an existing cluster, and creates a cluster
|
||||||
|
configuration.
|
||||||
|
|
||||||
|
Make sure you have set `export KOPS_STATE_STORE=s3://<mybucket>`
|
||||||
|
|
||||||
|
Then import the cluster; setting `--name` and `--region` to match the old cluster. If you're not sure
|
||||||
|
of the old cluster name, you can find it by looking at the `KubernetesCluster` tag on your AWS resources.
|
||||||
|
|
||||||
|
```
|
||||||
|
export OLD_NAME=kubernetes
|
||||||
|
export REGION=us-west-2
|
||||||
|
kops import cluster --region ${REGION} --name ${OLD_NAME}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Verify the cluster configuration
|
||||||
|
|
||||||
|
Now have a look at the cluster configuration, to make sure it looks right. If it doesn't, please
|
||||||
|
open an issue.
|
||||||
|
|
||||||
|
```
|
||||||
|
kops get cluster ${OLD_NAME} -oyaml
|
||||||
|
````
|
||||||
|
|
||||||
|
## Move resources to a new cluster
|
||||||
|
|
||||||
|
The upgrade moves some resources so they will be adopted by the new cluster. There are a number of things
|
||||||
|
this step does:
|
||||||
|
|
||||||
|
* It resizes existing autoscaling groups to size 0
|
||||||
|
* It will stop the existing master
|
||||||
|
* It detaches the master EBS volume from the master
|
||||||
|
* It re-tags resources to associate them with the new cluster: volumes, ELBs
|
||||||
|
* It re-tags the VPC to associate it with the new cluster
|
||||||
|
|
||||||
|
The upgrade procedure forces you to choose a new cluster name (e.g. `k8s.mydomain.com`)
|
||||||
|
|
||||||
|
```
|
||||||
|
export NEW_NAME=k8s.mydomain.com
|
||||||
|
kops toolbox convert-imported --newname ${NEW_NAME} --name ${OLD_NAME}
|
||||||
|
```
|
||||||
|
|
||||||
|
If you now list the clusters, you should see both the old cluster & the new cluster
|
||||||
|
|
||||||
|
```
|
||||||
|
kops get clusters
|
||||||
|
```
|
||||||
|
|
||||||
|
You can also list the instance groups: `kops get ig --name ${NEW_NAME}`
|
||||||
|
|
||||||
|
## Import the SSH public key
|
||||||
|
|
||||||
|
The SSH public key is not easily retrieved from the old cluster, so you must add it:
|
||||||
|
|
||||||
|
```
|
||||||
|
kops create secret --name ${NEW_NAME} sshpublickey admin -i ~/.ssh/id_rsa.pub
|
||||||
|
```
|
||||||
|
|
||||||
|
## Bring up the new cluster
|
||||||
|
|
||||||
|
Use the update command to bring up the new cluster:
|
||||||
|
|
||||||
|
```
|
||||||
|
kops update cluster ${NEW_NAME}
|
||||||
|
```
|
||||||
|
|
||||||
|
Things to check are that it is reusing the existing volume for the _main_ etcd cluster (but not the events clusters).
|
||||||
|
|
||||||
|
And then when you are happy:
|
||||||
|
|
||||||
|
```
|
||||||
|
kops update cluster ${NEW_NAME} --yes
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
## Export kubecfg settings to access the new cluster
|
||||||
|
|
||||||
|
You can export a kubecfg (although update cluster did this automatically): `kops export kubecfg ${NEW_NAME}`
|
||||||
|
|
||||||
|
|
||||||
|
## Workaround for secret import failure
|
||||||
|
|
||||||
|
The import procedure tries to preserve the CA certificates, but unfortunately this isn't supported
|
||||||
|
in kubernetes until [#34029](https://github.com/kubernetes/kubernetes/pull/34029) ships (should be
|
||||||
|
in 1.5).
|
||||||
|
|
||||||
|
So you will need to delete the service-accounts, so they can be recreated with the correct keys.
|
||||||
|
|
||||||
|
Unfortunately, until you do this, some services (most notably internal & external DNS) will not work.
|
||||||
|
Because of that you must SSH to the master to do this repair.
|
||||||
|
|
||||||
|
You can get the public IP address of the master from the AWS console, or by doing this:
|
||||||
|
|
||||||
|
```
|
||||||
|
aws ec2 --region $REGION describe-instances \
|
||||||
|
--filter Name=tag:KubernetesCluster,Values=${NEW_NAME} \
|
||||||
|
Name=tag-key,Values=k8s.io/role/master \
|
||||||
|
Name=instance-state-name,Values=running \
|
||||||
|
--query Reservations[].Instances[].PublicIpAddress \
|
||||||
|
--output text
|
||||||
|
```
|
||||||
|
|
||||||
|
Then `ssh admin@<ip>` (the SSH key will be the one you added above, i.e. `~/.ssh/id_rsa.pub`), and run:
|
||||||
|
|
||||||
|
First check that the apiserver is running:
|
||||||
|
```
|
||||||
|
kubectl get nodes
|
||||||
|
```
|
||||||
|
|
||||||
|
You should see only one node (the master). Then run
|
||||||
|
```
|
||||||
|
NS=`kubectl get namespaces -o 'jsonpath={.items[*].metadata.name}'`
|
||||||
|
for i in ${NS}; do kubectl get secrets --namespace=${i} --no-headers | grep "kubernetes.io/service-account-token" | awk '{print $1}' | xargs -I {} kubectl delete secret --namespace=$i {}; done
|
||||||
|
sleep 60 # Allow for new secrets to be created
|
||||||
|
kubectl delete pods -lk8s-app=dns-controller --namespace=kube-system
|
||||||
|
kubectl delete pods -lk8s-app=kube-dns --namespace=kube-system
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
You probably also want to delete the imported DNS services from prior versions:
|
||||||
|
|
||||||
|
```
|
||||||
|
kubectl delete rc -lk8s-app=kube-dns --namespace=kube-system # Will work for k8s <= 1.4
|
||||||
|
kubectl delete deployment --namespace=kube-system kube-dns # Will work for k8s >= 1.5
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
Within a few minutes the new cluster should be running.
|
||||||
|
|
||||||
|
Try `kubectl get nodes --show-labels`, `kubectl get pods --all-namespaces` etc until you are sure that all is well.
|
||||||
|
|
||||||
|
This should work even without being SSH-ed into the master, although it can take a few minutes
|
||||||
|
for DNS to propagate. If it doesn't work, double-check that you have specified a valid
|
||||||
|
domain name for your cluster, that records have been created in Route53, and that you
|
||||||
|
can resolve those records from your machine (using `nslookup` or `dig`).
|
||||||
|
|
||||||
|
## Other fixes
|
||||||
|
|
||||||
|
* If you're using a manually created ELB, the auto-scaling groups change, so you will need to reconfigure
|
||||||
|
your ELBs to include the new auto-scaling group(s).
|
||||||
|
|
||||||
|
* It is recommended to delete old kubernetes system services that we imported (and replace them with newer versions):
|
||||||
|
|
||||||
|
```
|
||||||
|
kubectl delete rc -lk8s-app=kube-dns --namespace=kube-system # <= 1.4
|
||||||
|
kubectl delete deployment --namespace=kube-system kube-dns # 1.5
|
||||||
|
|
||||||
|
kubectl delete rc -lk8s-app=elasticsearch-logging --namespace=kube-system
|
||||||
|
|
||||||
|
kubectl delete rc -lk8s-app=kibana-logging --namespace=kube-system # <= 1.4
|
||||||
|
kubectl delete deployment -lk8s-app=kibana-logging --namespace=kube-system # 1.5
|
||||||
|
|
||||||
|
kubectl delete rc -lk8s-app=kubernetes-dashboard --namespace=kube-system # <= 1.4
|
||||||
|
kubectl delete deployment -lk8s-app=kubernetes-dashboard --namespace=kube-system # 1.5
|
||||||
|
|
||||||
|
kubectl delete rc -lk8s-app=influxGrafana --namespace=kube-system
|
||||||
|
|
||||||
|
kubectl delete deployment -lk8s-app=heapster --namespace=kube-system
|
||||||
|
```
|
||||||
|
|
||||||
|
## Delete remaining resources of the old cluster
|
||||||
|
|
||||||
|
`kops delete cluster ${OLD_NAME}`
|
||||||
|
> ```
|
||||||
|
TYPE NAME ID
|
||||||
|
autoscaling-config kubernetes-minion-group-us-west-2a kubernetes-minion-group-us-west-2a
|
||||||
|
autoscaling-group kubernetes-minion kubernetes-minion-group-us-west-2a
|
||||||
|
instance kubernetes-master i-67af2ec8
|
||||||
|
```
|
||||||
|
|
||||||
|
And once you've confirmed it looks right, run with `--yes`
|
||||||
|
|
||||||
|
You will also need to release the old ElasticIP manually.
|
|
@ -20,7 +20,6 @@ import (
|
||||||
"bufio"
|
"bufio"
|
||||||
"bytes"
|
"bytes"
|
||||||
"compress/gzip"
|
"compress/gzip"
|
||||||
"encoding/base64"
|
|
||||||
"fmt"
|
"fmt"
|
||||||
"github.com/aws/aws-sdk-go/aws"
|
"github.com/aws/aws-sdk-go/aws"
|
||||||
"github.com/aws/aws-sdk-go/service/autoscaling"
|
"github.com/aws/aws-sdk-go/service/autoscaling"
|
||||||
|
@ -32,6 +31,7 @@ import (
|
||||||
"io"
|
"io"
|
||||||
"k8s.io/kops/upup/pkg/fi"
|
"k8s.io/kops/upup/pkg/fi"
|
||||||
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
"k8s.io/kops/upup/pkg/fi/cloudup/awsup"
|
||||||
|
"k8s.io/kubernetes/pkg/util/sets"
|
||||||
"strings"
|
"strings"
|
||||||
"sync"
|
"sync"
|
||||||
"time"
|
"time"
|
||||||
|
@ -118,8 +118,6 @@ func (c *DeleteCluster) ListResources() (map[string]*ResourceTracker, error) {
|
||||||
ListELBs,
|
ListELBs,
|
||||||
// ASG
|
// ASG
|
||||||
ListAutoScalingGroups,
|
ListAutoScalingGroups,
|
||||||
ListAutoScalingLaunchConfigurations,
|
|
||||||
// LC
|
|
||||||
|
|
||||||
// Route 53
|
// Route 53
|
||||||
ListRoute53Records,
|
ListRoute53Records,
|
||||||
|
@ -166,6 +164,26 @@ func (c *DeleteCluster) ListResources() (map[string]*ResourceTracker, error) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
{
|
||||||
|
// We delete a launch configuration if it is bound to one of the tagged security groups
|
||||||
|
securityGroups := sets.NewString()
|
||||||
|
for k := range resources {
|
||||||
|
if !strings.HasPrefix(k, "security-group:") {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
id := strings.TrimPrefix(k, "security-group:")
|
||||||
|
securityGroups.Insert(id)
|
||||||
|
}
|
||||||
|
lcs, err := FindAutoScalingLaunchConfigurations(cloud, securityGroups)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, t := range lcs {
|
||||||
|
resources[t.Type+":"+t.ID] = t
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if err := addUntaggedRouteTables(cloud, c.ClusterName, resources); err != nil {
|
if err := addUntaggedRouteTables(cloud, c.ClusterName, resources); err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
}
|
}
|
||||||
|
@ -726,6 +744,11 @@ func DeleteKeypair(cloud fi.Cloud, r *ResourceTracker) error {
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListKeypairs(cloud fi.Cloud, clusterName string) ([]*ResourceTracker, error) {
|
func ListKeypairs(cloud fi.Cloud, clusterName string) ([]*ResourceTracker, error) {
|
||||||
|
if !strings.Contains(clusterName, ".") {
|
||||||
|
glog.Infof("cluster %q is legacy (kube-up) cluster; won't delete keypairs", clusterName)
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
c := cloud.(awsup.AWSCloud)
|
c := cloud.(awsup.AWSCloud)
|
||||||
|
|
||||||
keypairName := "kubernetes." + clusterName
|
keypairName := "kubernetes." + clusterName
|
||||||
|
@ -1312,52 +1335,40 @@ func ListAutoScalingGroups(cloud fi.Cloud, clusterName string) ([]*ResourceTrack
|
||||||
return trackers, nil
|
return trackers, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func ListAutoScalingLaunchConfigurations(cloud fi.Cloud, clusterName string) ([]*ResourceTracker, error) {
|
func FindAutoScalingLaunchConfigurations(cloud fi.Cloud, securityGroups sets.String) ([]*ResourceTracker, error) {
|
||||||
c := cloud.(awsup.AWSCloud)
|
c := cloud.(awsup.AWSCloud)
|
||||||
|
|
||||||
glog.V(2).Infof("Listing all Autoscaling LaunchConfigurations for cluster %q", clusterName)
|
glog.V(2).Infof("Finding all Autoscaling LaunchConfigurations by security group")
|
||||||
|
|
||||||
var trackers []*ResourceTracker
|
var trackers []*ResourceTracker
|
||||||
|
|
||||||
request := &autoscaling.DescribeLaunchConfigurationsInput{}
|
request := &autoscaling.DescribeLaunchConfigurationsInput{}
|
||||||
err := c.Autoscaling().DescribeLaunchConfigurationsPages(request, func(p *autoscaling.DescribeLaunchConfigurationsOutput, lastPage bool) bool {
|
err := c.Autoscaling().DescribeLaunchConfigurationsPages(request, func(p *autoscaling.DescribeLaunchConfigurationsOutput, lastPage bool) bool {
|
||||||
for _, t := range p.LaunchConfigurations {
|
for _, t := range p.LaunchConfigurations {
|
||||||
if t.UserData == nil {
|
found := false
|
||||||
continue
|
for _, sg := range t.SecurityGroups {
|
||||||
}
|
if securityGroups.Has(aws.StringValue(sg)) {
|
||||||
|
found = true
|
||||||
b, err := base64.StdEncoding.DecodeString(aws.StringValue(t.UserData))
|
break
|
||||||
if err != nil {
|
|
||||||
glog.Infof("Ignoring autoscaling LaunchConfiguration with invalid UserData: %v", *t.LaunchConfigurationName)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
userData, err := UserDataToString(b)
|
|
||||||
if err != nil {
|
|
||||||
glog.Infof("Ignoring autoscaling LaunchConfiguration with invalid UserData: %v", *t.LaunchConfigurationName)
|
|
||||||
continue
|
|
||||||
}
|
|
||||||
|
|
||||||
//I finally found what was polluting logs with the bash scripts.
|
|
||||||
//glog.V(8).Infof("UserData: %s", string(userData))
|
|
||||||
|
|
||||||
// Adding in strings.Contains() here on cluster name, making the grand assumption that if our clustername string is present
|
|
||||||
// in the name of the LC, it's safe to delete. This solves the bastion LC problem.
|
|
||||||
if extractClusterName(userData) == clusterName || strings.Contains(*t.LaunchConfigurationName, clusterName) {
|
|
||||||
tracker := &ResourceTracker{
|
|
||||||
Name: aws.StringValue(t.LaunchConfigurationName),
|
|
||||||
ID: aws.StringValue(t.LaunchConfigurationName),
|
|
||||||
Type: TypeAutoscalingLaunchConfig,
|
|
||||||
deleter: DeleteAutoscalingLaunchConfiguration,
|
|
||||||
}
|
}
|
||||||
|
|
||||||
var blocks []string
|
|
||||||
//blocks = append(blocks, TypeAutoscalingLaunchConfig + ":" + aws.StringValue(asg.LaunchConfigurationName))
|
|
||||||
|
|
||||||
tracker.blocks = blocks
|
|
||||||
|
|
||||||
trackers = append(trackers, tracker)
|
|
||||||
}
|
}
|
||||||
|
if !found {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
tracker := &ResourceTracker{
|
||||||
|
Name: aws.StringValue(t.LaunchConfigurationName),
|
||||||
|
ID: aws.StringValue(t.LaunchConfigurationName),
|
||||||
|
Type: TypeAutoscalingLaunchConfig,
|
||||||
|
deleter: DeleteAutoscalingLaunchConfiguration,
|
||||||
|
}
|
||||||
|
|
||||||
|
var blocks []string
|
||||||
|
//blocks = append(blocks, TypeAutoscalingLaunchConfig + ":" + aws.StringValue(asg.LaunchConfigurationName))
|
||||||
|
|
||||||
|
tracker.blocks = blocks
|
||||||
|
|
||||||
|
trackers = append(trackers, tracker)
|
||||||
}
|
}
|
||||||
return true
|
return true
|
||||||
})
|
})
|
||||||
|
|
|
@ -93,7 +93,11 @@ func (x *ImportCluster) ImportAWSCluster() error {
|
||||||
|
|
||||||
subnet := subnets[subnetName]
|
subnet := subnets[subnetName]
|
||||||
if subnet == nil {
|
if subnet == nil {
|
||||||
subnet = &api.ClusterSubnetSpec{Name: subnetName}
|
subnet = &api.ClusterSubnetSpec{
|
||||||
|
Name: subnetName,
|
||||||
|
Zone: zoneName,
|
||||||
|
Type: api.SubnetTypePublic,
|
||||||
|
}
|
||||||
subnets[subnetName] = subnet
|
subnets[subnetName] = subnet
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue