Commit Graph

84 Commits

Author SHA1 Message Date
Ian Hoegen 37c3ac3784 Add max-requests-inflight flag, along with docs 2018-02-13 13:34:48 -08:00
Brian Schultz 93a33bc70b Expose the --fail-swap-on flag for kubelet 2018-01-09 11:08:23 -06:00
Kubernetes Submit Queue fb6725a7c7
Merge pull request #4060 from audip/feature/add-audit-log-format-flag
Automatic merge from submit-queue.

Add audit log format flag for api server

In kubernetes 1.8, a flag for audit-log format has been added, this flag can be set to `legacy` or `json` format on the kubernetes API server.
2017-12-21 10:52:31 -08:00
Purandare, Aditya 9900c8afeb
Add auditlogformat flag for kubernetes api server 2017-12-21 11:31:12 -06:00
Kubernetes Submit Queue 2eae62d460
Merge pull request #4085 from xoen/ag-oidc-prefixes-config
Automatic merge from submit-queue.

Support for OIDC 'username-prefix' and 'groups-prefix' flags

### What
Added support for `--oidc-username-prefix` and `--oidc-groups-prefix`.
By passing these it's possible to override the default prefixes used to map the OIDC user with the username in kubernetes.

### See
See: https://kubernetes.io/docs/admin/authentication/#configuring-the-api-server

### IMPORTANT
I'm far from a kubernetes/KOPS, this is not tested so someone needs to have a look and see if something is missing or if this can cause troubles! (don't want to accidentally cause the destruction of the universe 💥 )

It's basically the same done in this other PR: https://github.com/kubernetes/kops/pull/1438/files

I did **not** change the `zz_generated.conversion.go` files as according to comment at the top of them they're autogenerated:
```go
// This file was autogenerated by conversion-gen. Do not edit it manually!
```
(I wonder if they should be `.gitignore`d)

### Fixes
This should fix [#4007: field oidcUsernamePrefix is not recognized in cluster configuration file](https://github.com/kubernetes/kops/issues/4007)
2017-12-18 09:37:31 -08:00
Aldo "xoen" Giambelluca 9e30999d06 Support for OIDC 'username-prefix' and 'groups-prefix' flags
See: https://kubernetes.io/docs/admin/authentication/#configuring-the-api-server

This is very similar to this other PR: https://github.com/kubernetes/kops/pull/1438/files

I also updated the format of the documentation for the OIDC API Server fields
to follow the Go Style guide: https://blog.golang.org/godoc-documenting-go-code

Fixes: https://github.com/kubernetes/kops/issues/4007
2017-12-18 15:34:37 +00:00
Isac Petruzzi 92abe3676f capitalize imagePullProgressDeadline in docstrings 2017-12-17 18:35:09 +01:00
Isac Petruzzi 2dfa262b3b add imagePullProgressDeadline to kubelet config 2017-12-12 12:02:10 +01:00
King'ori Maina 2d59315b96
Map horizontal-pod-autoscaler-use-rest-clients flag 2017-11-27 21:41:27 +02:00
Justin Santa Barbara c7d3a53e48 upscale-delay flag in two more places
Same idea as in #3872
2017-11-18 17:03:59 -05:00
Johannes 'fish' Ziemke 917e9dec38 Add HPA up/downscale delay 2017-11-13 15:50:37 +01:00
Diego Woitasen eff369bb71 featureGates support in KubeAPIServerConfig, KubeControllerManagerConfig and KubeSchedulerConfig. 2017-11-06 16:16:24 -03:00
Kubernetes Submit Queue cc4d4c437b
Merge pull request #3692 from gambol99/audit_policy
Automatic merge from submit-queue.

Audit Policy File

The current implementation doesn't allow users to set the [advanced audit policy](https://v1-7.docs.kubernetes.io/docs/tasks/debug-application-cluster/audit/#advanced-audit) location. Note, the file contents can be pushed by a [FileAsset](https://v1-7.docs.kubernetes.io/docs/tasks/debug-application-cluster/audit/#advanced-audit) a sample given below .... Or do we want an explicit secret for this? .. 

```YAML
fileAssets:
- name: audit-policy.conf
  path: /srv/kubernetes/audit-policy.conf
  roles: [Master]
  content: |
    some_content
```
related to https://github.com/kubernetes/kops/issues/3672
2017-10-28 17:44:39 -07:00
Kubernetes Submit Queue aab00d7dc3 Merge pull request #3699 from brdude/disable_kube-proxy
Automatic merge from submit-queue.

Allow disabling kube-proxy

This adds the ability to turn off kube-proxy.

My specific use case is the usage of a custom CNI.
2017-10-26 23:05:57 -07:00
Manatsawin Hanmongkolchai a708919bf4 Generate scheduler policy by dynamic cluster addons 2017-10-27 08:56:07 +07:00
Rohith e995c7b98e Audit Policy File
Extending the KubeAPI component config to allow setting the audit-policy-file
2017-10-26 22:08:37 +00:00
Rodrigo Menezes 1edd99ccc1 Allow disabling kube-proxy 2017-10-25 14:23:58 -07:00
Kubernetes Submit Queue 8df13bd468 Merge pull request #3679 from justinsb/support_api_aggregation
Automatic merge from submit-queue.

Initial aggregation work

Create the keypairs, which are supposed to be signed by a different CA.
    
Set the `--requestheader-...` flags on apiserver.
    
Fix #3152
Fix #2691
2017-10-24 12:08:27 -07:00
Justin Santa Barbara a879521ba3 Initial aggregation support
Create the keypairs, which are supposed to be signed by a different CA.

Set the `--requestheader-...` flags on apiserver.

Fix #3152
Fix #2691
2017-10-22 14:41:38 -04:00
Mike Splain 8549e8e7ff Add HorizontalPodAutoscalerSyncPeriod for kubeControllerManager 2017-10-19 17:57:33 -04:00
Manatsawin Hanmongkolchai 78023ba0df Updated PolicyConfigMap comment 2017-10-10 09:10:05 +07:00
Manatsawin Hanmongkolchai 091e87eb4f Added PolicyConfigMap and PolicyConfigMapNamespace to KubeSchedulerConfig 2017-10-10 09:10:04 +07:00
Kubernetes Submit Queue 6a238539e0 Merge pull request #3368 from georgebuckerfield/enable-data-encryption
Automatic merge from submit-queue. .

Support encryption-at-rest for the kube-apiserver

This PR adds support for enabling encryption-at-rest for data in etcd, via the kube-apiserver (as per https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data).

I've put the functionality behind a feature flag, `+EnableDataEncryption`. It can then be enabled per-cluster by using `--enable-encryption-config` on the command line, or by adding a `kubeEncryptionConfig` section to the cluster spec. This is passed through to the kube-apiserver by the nodeup process. I'm not sure if this is the best way of doing it right now, but it is working.

Fixes #3356.
2017-09-22 17:56:44 -07:00
georgebuckerfield da36425dfb Enable support for encryption-at-rest
- add a new kops secret command to store encryption config
- add the experimential-encryption-provider-config flag to the kube-apiserver
- add functionality to nodeup to create the stored encryption config in the correct path
2017-09-22 17:14:51 +01:00
wlan0 0d91badd8f Add apimachinery changes to enable cloud controller manager
This is part I of multi part Pull Request to enable the
cloud-controller-manager through kops. This specific PR introduces the
cloud-controller-manager api, and puts it behind a feature flag.

Please feel free to merge this.
2017-09-21 10:01:09 -07:00
Robin Percy e1b20c0217 Added ability to set --service-node-port-range on kube-apiserver 2017-09-07 17:01:15 -07:00
Kubernetes Submit Queue 0e48620975 Merge pull request #3302 from gambol99/kubelet_options
Automatic merge from submit-queue

Additional Kubelet Options

This PR add additional options to the kubelet spec allowing users to set the --runtime-request-timeout and -volume-stats-agg-period

In related to issue https://github.com/kubernetes/kops/issues/3265
2017-08-29 14:32:55 -07:00
Rohith bf5e154225 Additional Kubelet Options
In related to issue https://github.com/kubernetes/kops/issues/3265
2017-08-29 08:44:25 +01:00
Rohith 9bbe569f3c Kubelet Readonly Port
The current implementaton does not permit the user to specify the kubelet read-only port (which unset defaults to 10255). Note security reasons we need this port switched off i.e. 0. This PR retains the default behaviour but adds the readOnlyPort as an options for those whom need to override.

   podInfraContainerImage: gcr.io/google_containers/pause-amd64:3.0
   podManifestPath: /etc/kubernetes/manifests
+  readOnlyPort: 0
   registerSchedulable: false
   requireKubeconfig: true
2017-08-28 20:53:36 +01:00
Torin Sandall 7cf6e1036c Add support for proxy client certs
This enables external admission controller webhooks, api aggregation,
and anything else that relies on the
--proxy-client-cert-file/--proxy-client-key-file apiserver args.
2017-08-22 08:03:36 -07:00
Rohith a73d255b03 Etcd TLS Options
The current implementation does not put any transport security on the etcd cluster. The PR provides and optional flag to enable TLS the etcd cluster

- cleaned up and fixed any formatting issues on the journey
- added two new certificates (server/client) for etcd peers and a client certificate for kubeapi and others perhaps (perhaps calico?)
- disabled the protokube service for nodes completely is not required; note this was first raised in https://github.com/kubernetes/kops/pull/3091, but figured it would be easier to place in here given the relation
- updated protokube codebase to reflect the changes, removing the master option as its no longer required
- added additional integretion tests for the protokube manifests;
- note, still need to add documentation, but opening the PR to get feedback
- one outstanding issue is the migration from http -> https for preexisting clusters, i'm gonna hit the coreos board to ask for the best options
2017-08-06 17:06:46 +01:00
Rohith 2057f60def Kube Proxy Feature Gates
- fixing the kubeproxy feature gates, this should have been a map not array (https://github.com/kubernetes/kops/blob/master/pkg/apis/kops/v1alpha2/componentconfig.go#L134)
2017-08-03 20:34:36 +01:00
Rohith b5066c967b Vetting / Formating / Cleanup
- fixed any of the vettting / formatting issues that i'm came across on the update
- removed the commented out lines from the componentconfig as it make its increasingly difficult to find what is supported, what is not and the difference between them.
- added SerializeImagePulls, RegisterSchedulable to kubelet (by default they are ignored)
- added FeatureGates to the kube-proxy

Out of interest can someone point me to where these multi-versioned componentconfig are being used?
2017-07-28 17:16:11 +01:00
Justin Santa Barbara 1ac7cae629 Map pod-infra-container-image flag 2017-07-21 12:59:06 -04:00
King'ori Maina 5946450b39
Add node resource allocation flags for kubelet 2017-07-17 23:36:42 +02:00
Justin Santa Barbara c9cec3b3d2 kube-proxy: set hostname-override on AWS
So that it matches the Node.Name

Fix #2915
2017-07-14 10:31:07 -04:00
Austin Moore 124a152724 Add omitempty json tag to resolvConf fields 2017-07-12 13:22:04 -04:00
alexandrst88 6b81385584 Add SG parameter into AWS cloud-config 2017-07-04 15:44:21 +03:00
Rohith 8302c52634 Kubelet / Master Authentication
- adding the options to permit adjusting the cluster to use auth on the kubelet
- for testing i've used kubelet-client-certificate and kubelet-client-key to /srv/kubernetes/server.{cert,key} and
   setting the --client-ca-file on the node kubelet to /srv/kubernetes/ca.crt (tested as working).
- note i'm not enforcing anything i.e. the user has to edit the cluster and apply the configuration on the kubelet and kubeAPIServer in the cluster spec
2017-06-29 13:29:44 +01:00
Austin Moore 119a0801c9 Add support for setting the kubelet's --resolv-conf flag to an empty string 2017-06-12 15:53:52 -04:00
Chris Love d135085e54 Merge pull request #2447 from justinsb/deprecate_babysit_daemons
Remove babysit-daemons flag from 1.7
2017-05-08 08:36:53 -06:00
Justin Santa Barbara 42ea0d4770 Remove babysit-daemons flag from 1.7 2017-04-27 01:47:39 -04:00
chrislovecnm 1aaf973607 missing DisableSecurityGroupIngress from api files 2017-04-26 11:16:25 -06:00
Abrar Shivani 5889814c90 Support for vSphere Cloud Provider 2017-04-20 23:33:21 -07:00
Miao Luo 4f98f5b47e Use CoreDNS for vSphere provider (#2)
* Add support of CoreDNS for vSphere provider.

* Add instructions about how to setup CoreDNS for vSphere provider.

* Address comments for CoreDNS support code.
2017-04-20 23:33:20 -07:00
Miao Luo 716349bf22 Fix the type of vSphere fields in CloudConfig and update auto-generated conversion files.
To make sure the vSphere fields in CloudConfiguration can be successfully serialized
and output into config file.
2017-04-20 23:33:18 -07:00
Miao Luo efdffd1c41 Address comments.
1. Check the emptiness of VSPHERE_USERNAME and VSPHERE_PASSWORD
2. Move vSphere specific fields from clusterSpec to clusterSpec.CloudConfig
2017-04-20 23:33:17 -07:00
chrislovecnm 131bc77abb Adding feature gates flag for kubelet, and unit tests 2017-04-03 11:13:21 -06:00
Chris Love f63c52c425 Merge pull request #2225 from justinsb/use_kcm_serviceaccounts
Set --use-service-account-credentials for 1.6
2017-03-29 10:50:42 -06:00
Justin Santa Barbara 19db8b37a0 Set --use-service-account-credentials for 1.6 2017-03-29 11:42:24 -04:00