Commit Graph

3544 Commits

Author SHA1 Message Date
Kubernetes Submit Queue 5d5945cb00 Merge pull request #3114 from gambol99/etcd_tls
Automatic merge from submit-queue

Etcd TLS Options

The current implementation does not put any transport security on the etcd cluster. The PR provides and optional flag to enable TLS the etcd cluster

- cleaned up and fixed any formatting issues on the journey
- added two new certificates (server/client) for etcd peers and a client certificate for kubeapi and others perhaps (perhaps calico?)
- disabled the protokube service for nodes completely is not required; note this was first raised in https://github.com/kubernetes/kops/pull/3091, but figured it would be easier to place in here given the relation
- updated protokube codebase to reflect the changes, removing the master option as its no longer required
- added additional integretion tests for the protokube manifests;
- note, still need to add documentation, but opening the PR to get feedback
- one outstanding issue is the migration from http -> https for preexisting clusters, i'm gonna hit the coreos board to ask for the best options
2017-08-06 14:02:06 -07:00
Rohith f61e1ebe08 Etcd TLS Options
- changed the location of this variable to be in the etcd cluster spec rather the kops cluster spec
- reflected the changes against the models
2017-08-06 20:50:05 +01:00
Rohith 74f59612c7 Fixes
- added the master option back the protokube, updating the nodeup model and protokube code
- removed any comments no related to the PR as suggested
- reverted the ordering of the mutex in the AWSVolumes in protokube
2017-08-06 18:52:38 +01:00
Kubernetes Submit Queue 9f079975be Merge pull request #3142 from prachetasp/psp/canal-tolerations
Automatic merge from submit-queue

Fix for Canal Taints and Tolerations

This PR fixes issues with taints and tolerations for the Canal network type.

There are 2 problems:

1. Canal pods will not schedule onto dedicated instancegroups due to their too-strict tolerations. A similar fix for calico was merged recently #3097 - this is the same fix for Canal instead.
2. When booting a cluster with 1.7.0 we ran into the same issue mentioned in projectcalico/canal#77 and likely experienced in #2856. Specifically one of our dedicated instancegroups and the master nodes had no Taints attached. To mitigate we simply bump the versions of calico/node and calico/cni to match the versions that resolved projectcalico/canal#77.

When using these fixes to boot our k8s 1.7.3 cluster with this branch the Taints showed up and Calico scheduled on our masters and our dedicated IG.

I am not sure if there are associated tests that need to be updated here - still not familiar enough with the kops repo to tell.
2017-08-06 10:40:21 -07:00
Kubernetes Submit Queue 0942ae3783 Merge pull request #3145 from BradErz/fixing-clusterautoscaler-rbac
Automatic merge from submit-queue

Fixing clusterautoscaler rbac

Fixes #3144 

I have tested on my cluster and it can now update the status of the pods. Im not sure if it also needs the permission to `patch` on the `endpoint`

Maybe someone with better RBAC knowlage can pick up on this? @chrislovecnm 

I also gave the file some pretty treatment.. sorry habbit
2017-08-06 10:08:12 -07:00
Rohith a73d255b03 Etcd TLS Options
The current implementation does not put any transport security on the etcd cluster. The PR provides and optional flag to enable TLS the etcd cluster

- cleaned up and fixed any formatting issues on the journey
- added two new certificates (server/client) for etcd peers and a client certificate for kubeapi and others perhaps (perhaps calico?)
- disabled the protokube service for nodes completely is not required; note this was first raised in https://github.com/kubernetes/kops/pull/3091, but figured it would be easier to place in here given the relation
- updated protokube codebase to reflect the changes, removing the master option as its no longer required
- added additional integretion tests for the protokube manifests;
- note, still need to add documentation, but opening the PR to get feedback
- one outstanding issue is the migration from http -> https for preexisting clusters, i'm gonna hit the coreos board to ask for the best options
2017-08-06 17:06:46 +01:00
Prachetas Prabhu 76378da0d0 Bumps version of Canal manifest addon to upgrade Canal on existing clusters 2017-08-06 00:57:20 -05:00
Kubernetes Submit Queue 75c6de3ec4 Merge pull request #3134 from johanneswuerbach/configure-docker-on-coreos
Automatic merge from submit-queue

CoreOS: Ensure docker configuration is loaded
2017-08-05 21:17:29 -07:00
BradErz be2305ff18 Adding pod/status update permissions and adding patch for events 2017-08-05 12:53:52 +01:00
BradErz 938f42ca5a Fixing the order of the manifest 2017-08-05 12:52:01 +01:00
Prachetas Prabhu 8f13944ac3 Bumps calico versions to mitigate taint stripping issue 2017-08-04 21:23:23 -05:00
Prachetas Prabhu 32502ad54f Adds wider tolerations to Canal Daemonset to allow scheduling on nodes with strict taints 2017-08-04 21:23:23 -05:00
Kubernetes Submit Queue ec4c33ed89 Merge pull request #3133 from spiffxp/assignees-to-approvers
Automatic merge from submit-queue

Rename OWNERS assignees: to approvers:

They are effectively the same, assignees is deprecated

ref: kubernetes/test-infra#3851

I broke this into two commits around vendor/ because I'm not sure it's kosher to be editing vendored OWNERS directly. ref: kubernetes/test-infra#3694

ref: https://github.com/kubernetes/gengo/pull/71 for the gengo OWNERS changes if that's the more appropriate route to go
2017-08-04 14:55:06 -07:00
Kubernetes Submit Queue 10ce978b64 Merge pull request #3040 from mad01/templating
Automatic merge from submit-queue

MVP of templating 

MVP implementation of templating to generate cluster.yaml file: related to #2404 implementation is using the `text/template`

```bash
cat > values.yaml <<EOF
clusterName: eu1
kubernetesVersion: 1.7.1
dnsZone: k8s.example.com
awsRegion: eu-west-1
EOF
```

```bash
cat > cluster.tmpl.yaml <<EOF
apiVersion: kops/v1alpha2
kind: InstanceGroup
metadata:
  labels:
	kops.k8s.io/cluster: {{.clusterName}}.{{.dnsZone}}
  name: nodes
spec:
  image: coreos.com/CoreOS-stable-1409.6.0-hvm
  machineType: m4.large
  maxPrice: "0.5"
  maxSize: 2
  minSize: 15
  role: Node
  rootVolumeSize: 100
  subnets:
  - {{.awsRegion}}a
  - {{.awsRegion}}b
  - {{.awsRegion}}c

EOF
```

running the templating command
```bash
  kops toolbox template \
      --values values.yaml \
      --template cluster.tmpl.yaml \
      --output cluster.yaml
```

output
```bash
apiVersion: kops/v1alpha2
kind: InstanceGroup
metadata:
  labels:
	kops.k8s.io/cluster: eu1.k8s.example.com
  name: nodes
spec:
  image: coreos.com/CoreOS-stable-1409.6.0-hvm
  machineType: m4.large
  maxPrice: "0.5"
  maxSize: 2
  minSize: 15
  role: Node
  rootVolumeSize: 100
  subnets:
  - eu-west-1a
  - eu-west-1b
  - eu-west-1c
```
2017-08-04 09:26:41 -07:00
Kubernetes Submit Queue 76fc1aed3f Merge pull request #3138 from sathiyas/patch-1
Automatic merge from submit-queue

Update aws.md for SSH Key pair generation instructions
2017-08-04 08:54:24 -07:00
Sathiya Shunmugasundaram d92ea22ecd Update aws.md
SSH key pair must be available before creating the cluster, adding the instructions.
2017-08-04 09:48:42 -04:00
Johannes Würbach 47256fed82
CoreOS: Ensure docker configuration is loaded
Previously the configuration has been written after docker has been started and
was actually only applied after a reboot.

Manually reload system and restart docker to ensure the configuration has been
applied.
2017-08-04 11:44:12 +02:00
Kubernetes Submit Queue 09452834eb Merge pull request #3130 from gambol99/feature_gates
Automatic merge from submit-queue

Kube Proxy Feature Gates

- fixing the [kubeproxy feature gates](https://github.com/kubernetes/kops/pull/3078), this should have been a [map](https://github.com/kubernetes/kops/blob/master/pkg/apis/kops/v1alpha2/componentconfig.go#L134) not  an array ... apologizes!! from
2017-08-03 23:46:07 -07:00
Kubernetes Submit Queue f123a95236 Merge pull request #3075 from Globegitter/patch-2
Automatic merge from submit-queue

Add k8s dashbard v1.6.2
2017-08-03 23:16:30 -07:00
Kubernetes Submit Queue 5153ed5cf7 Merge pull request #3116 from gekart/patch-1
Automatic merge from submit-queue

added missing command in documentation

Documentation correction.
2017-08-03 22:42:18 -07:00
Kubernetes Submit Queue b040c11281 Merge pull request #3098 from johanneswuerbach/configure-docker-on-coreos
Automatic merge from submit-queue

Configure docker on CoreOS/ContainerOS

While the installation of docker should be skipped, docker should still be
configured to allow overriding the docker config using kops.

Fixes https://github.com/kubernetes/kops/issues/3057

//cc @aledbf
2017-08-03 22:10:40 -07:00
Kubernetes Submit Queue 29415860e2 Merge pull request #2950 from chrislovecnm/full-spec-warning
Automatic merge from submit-queue

adding warning about --full

This starts work on https://github.com/kubernetes/kops/issues/2290.  Adds a warning to deter users from using YAML generated by --full.
2017-08-03 21:05:02 -07:00
Kubernetes Submit Queue d274b22016 Merge pull request #3067 from erickt/hostname
Automatic merge from submit-queue

Update kube-proxy to handle aws returning multiple hostnames

Amazon's dhcp service supports returning a space separated list of hostnames. This patch makes sure to split the domains first before picking the hostname override.

Closes #3060.
2017-08-03 20:34:49 -07:00
Kubernetes Submit Queue 69d6fc9f6b Merge pull request #3097 from igorcanadi/calico_tolerations
Automatic merge from submit-queue

added wider toleration to calico-node daemonset (#2857)

Calico pod needs to run on all nodes, regardless of their taints. Otherwise the node cannot join the cluster. See #2857 for more discussion. This commit was originally b66b6260e7 by @ca16. It's also similar to the PR that kube-aws recently merged: https://github.com/kubernetes-incubator/kube-aws/pull/687/files.

Would you mind merging this to 1.7 branch too?
2017-08-03 20:02:57 -07:00
Kubernetes Submit Queue 5577fab602 Merge pull request #3087 from blakebarnett/bdb/add_node_docker_config_secret
Automatic merge from submit-queue

Add `kops create secret dockerconfig` feature

This adds a well-known secret name `dockerconfig` which will automatically
be used if present to create `/root/.docker/config.json` on all nodes. This will
allow private registries to be used for kops hooks as well as any k8s images
without the need to define `imagePullSecrets` in every namespace.

closes https://github.com/kubernetes/kops/issues/2505
2017-08-03 19:33:42 -07:00
Aaron Crickenberger 1297328f47 Rename OWNERS assignees: to approvers: (ignoring vendor)
They are effectively the same, assignees is deprecated
2017-08-03 17:03:51 -07:00
Rohith 2057f60def Kube Proxy Feature Gates
- fixing the kubeproxy feature gates, this should have been a map not array (https://github.com/kubernetes/kops/blob/master/pkg/apis/kops/v1alpha2/componentconfig.go#L134)
2017-08-03 20:34:36 +01:00
Kubernetes Submit Queue 0fa00f3653 Merge pull request #3128 from bhack/patch-1
Automatic merge from submit-queue

Sync image version
2017-08-03 09:14:08 -07:00
Kubernetes Submit Queue 26e0c781ea Merge pull request #3078 from gambol99/component_options
Automatic merge from submit-queue

Vetting / Formatting / Cleanup

- fixed any of the vettting / formatting issues that i'm came across on the update
- removed the commented out lines from the componentconfig as it make its increasingly difficult to find what is supported, what is not and the difference between them.
- added SerializeImagePulls, RegisterSchedulable to kubelet (by default they are ignored)
- added FeatureGates to the kube-proxy
- fixed the vetting issue with NodeUpConfig -> Config
- added the aws london regions for cloud provider lookup

Out of interest can someone point me to where these multi-versioned componentconfig are being used?
2017-08-03 08:03:06 -07:00
Kubernetes Submit Queue 0b3bf5f1aa Merge pull request #3074 from Globegitter/heapster-kubernetes-1.7.0
Automatic merge from submit-queue

Updated Heapster for kubernetes 1.7.0
2017-08-03 07:29:18 -07:00
Kubernetes Submit Queue bc47b748f2 Merge pull request #3095 from msvbhat/docs-topology-command-fix
Automatic merge from submit-queue

docs/topology - Fix the rolling-update command

This patch updates the `kops rolling-update` command which should be
run after making changes to the API server topology.

Fixes #3093 

Signed-off-by: M S Vishwanath Bhat <msvbhat@gmail.com>
2017-08-02 23:45:29 -07:00
bhack ddef7f13c5 Sync image version 2017-08-02 19:04:34 -07:00
Grischa Ekart 04ffccf60f added missing command 2017-08-02 16:08:38 +02:00
Johannes Würbach 798d87da32
Configure docker on CoreOS/ContainerOS
While the installation of docker should be skipped, docker should still be
configured to allow overriding the docker config using kops.

Fixes https://github.com/kubernetes/kops/issues/3057
2017-08-02 13:32:33 +02:00
Kubernetes Submit Queue 366f38b1f9 Merge pull request #3107 from murali-reddy/kube-router-doc
Automatic merge from submit-queue

remove source/destination check requirement for kube-router from docs

Kube-router automatically disables source/destination checks for the AWS
EC2 instances now user need not perform explicitly.

Fixed as part of https://github.com/cloudnativelabs/kube-router/issues/35
2017-08-01 22:15:11 -07:00
Kubernetes Submit Queue b40320a413 Merge pull request #3110 from mikesplain/FixWildcards
Automatic merge from submit-queue

Fix Wildcard domains returned as ASCII in dns-controller

After running into https://github.com/kubernetes/kops/issues/2671 whenever dns-controller restarted, I looked into why dns-controller successfully creates entries for wildcard domains (e.g. `*.example.com` ) but after restarting, it errors, unable to find the old record.  It looks amazon returns ascii `\\052.example.com` instead of the `*.example.com` we expect. This was a simple fix I tested in our cluster and it seems to have fixed the issue.  I'm open to any changes but I think this could be a useful fix for those that may run into this in the future.

This isn't a new thing apparently: https://github.com/boto/boto/issues/818

Fixes https://github.com/kubernetes/kops/issues/2671
2017-08-01 21:40:32 -07:00
Kubernetes Submit Queue 58e0074e8d Merge pull request #3108 from DevipriyaSarkar/patch-1
Automatic merge from submit-queue

Update update_kops.md
2017-08-01 21:04:52 -07:00
Blake e093702fc3 Don't error if the dockerconfig isn't present 2017-08-01 16:51:20 -07:00
Blake 4f95fe473f Incorporate review feedback
- Rename to just DockerConfig / dockerconfig everywhere for consistency
- Check if the config is valid JSON
- Update docs
2017-08-01 13:15:19 -07:00
Mike Splain 84daad4c78 Fix Wildcards returned as ASCII 2017-08-01 13:19:57 -04:00
Kubernetes Submit Queue 576dca6fb7 Merge pull request #3102 from yoz2326/aws_ebs_iops
Automatic merge from submit-queue

AWS: root volume provisioned IOPS support

It is possible to set `rootVolumeType: gp2` so an instance group will use `gp2` as disk type (https://github.com/kubernetes/kops/blob/master/docs/instance_groups.md)

If the option is set to `rootVolumeType: io1` then the below error is thrown when building the cluster:

`W0731 13:44:44.298875    8784 executor.go:109] error running task "LaunchConfiguration/master-eu-west-1a.masters.cluster.name" (9m48s remaining to succeed): error creating AutoscalingLaunchConfiguration: ValidationError: Iops is required for a provisioned IOPS volume.
    status code: 400, request id: 072e23b2-75ee-11e7-968a-191d6f6e9343`

This PR tries to address this so if anyone needs, it can use `io1` as disk type for the root volume.
In order to define the number of Iops set `rootVolumeIops: <number>` (minimum is 100)

If `rootVolumeType: io1` is set and `rootVolumeIops` is not defined, then `rootVolumeIops` defaults to 100.

I am not quite familiar with the Kops codebase and this is my first encounter with Go, so some changes might not be suitable (I also do not have a software developer background so bear with me :) ). Please review and add feed-back.  

I've included a small change to the Makefile as I compiled Kops on a Mac and didn't had $GOPATH set after installing Go. I thought that pulling this via `go env` would be more flexible, but I am not 100% sure as I don't do much development in this area and not sure about possible use cases.
2017-08-01 09:03:50 -07:00
Devipriya Sarkar 58820b8e44 Update update_kops.md
fix heading in the docs
2017-08-01 21:06:26 +05:30
Murali Reddy b7e1b12022 remove source/destination check requirement for kube-router
Kube-router automatically disables source/destination checks for the AWS
EC2 instances now user need not perform explicitly.

Fixed as part of https://github.com/cloudnativelabs/kube-router/issues/35
2017-08-01 19:27:58 +05:30
Markus Padourek 9665bd486c Update usage to 1.6.3 2017-08-01 08:47:33 +02:00
Markus Padourek fd6eb881b4 Update to dashboard v1.6.3 2017-08-01 08:47:05 +02:00
Markus Padourek cce013b1bb Fixed typo 2017-08-01 08:41:42 +02:00
Kubernetes Submit Queue 62be6832c2 Merge pull request #3100 from PaulCapestany/patch-1
Automatic merge from submit-queue

Fix small typo
2017-07-31 23:36:42 -07:00
Ionut Craciunescu 14526aedea fixed white space 2017-08-01 00:35:49 +01:00
Ionut Craciunescu 07397ec2f0 ran make gofmt 2017-08-01 00:34:39 +01:00
Ionut Craciunescu 66d377f5c4 comment update 2017-08-01 00:28:59 +01:00