Commit Graph

67 Commits

Author SHA1 Message Date
Peter Rifel 4d9f0128a3
Upgrade to klog2
This splits up the kubernetes 1.19 PR to make it easier to keep up to date until we get it sorted out.
2020-08-16 20:56:48 -05:00
Ciprian Hacman 172031859d ARM64 support - Build multi-arch images 2020-08-10 13:47:07 +03:00
Ciprian Hacman dcd8c15db9 Move Protokube images build scripts to its dir 2020-07-15 19:34:35 +03:00
John Gardiner Myers 0d74344a43 Remove the baremetal cloud provider 2020-06-14 10:38:29 -07:00
Ole Markus With 7342525872 Remove vsphere from kops files 2020-05-30 13:36:55 +02:00
Srikanth d237a4cb04 Code cleanup for PR 2019-10-29 09:45:30 +05:30
Srikanth afe59ba7cc Remove clusterID to be passed as a parameter for protokube 2019-10-29 09:40:38 +05:30
Srikanth cb4a8ef6fc Rebase with latest master 2019-10-29 09:40:38 +05:30
Justin SB b6862103bb
Change default port for memberlist from 3997
We had a port collision on 3997; change the default memberlist ports
to avoid the collision (we haven't shipped a release with this in it).

Also create a go file so that we can use constants to keep track of
our port numbers, rather than magic values.
2019-10-14 07:26:27 -04:00
Thomas Jackson 14a60a53c9 Enable primary=mesh secondary=memberlist by default 2019-10-10 13:21:00 -07:00
Thomas Jackson cd8c743d1c make gomod 2019-10-10 13:10:13 -07:00
Thomas Jackson 6acbfe661b Move gossip implementations into a plugin interface 2019-10-10 13:09:22 -07:00
Thomas Jackson 421ee540b9 Add memberlist gossip option 2019-10-10 13:08:55 -07:00
Peter Rifel c8d424dd87 Fix some staticcheck warnings 2019-09-25 06:35:25 -07:00
mikesplain 9e55b8230a Update copyright notices
Also cleans some white spaces
2019-09-09 14:47:51 -04:00
Justin SB 8e2dbb6a99
Bootstrap: protokube labels its own node with node-role label
As of k8s 1.16, the node-role label is protected for security reasons.
We will introduce a controller to set those labels generically.
However, we need these labels to run the controller (only) on master
nodes.

To solve this bootstrapping problem, we use protokube to apply the
master role node labels to the master node only.  This isn't a
security problem because we assume that protokube on the master is
highly trusted - we are still administering labels centrally.

Then kops-controller can use this label to target the master nodes,
and run a central label controller.
2019-09-08 20:51:00 -04:00
Justin SB 044395c588
Call klog.InitFlags to enable logging 2019-05-06 13:00:31 -04:00
Justin SB 76d03b3f71
Generated files: glog -> klog 2019-05-06 12:56:03 -04:00
Justin SB 3e33ac7682
Change code from glog to klog
We don't call klog.InitFlags yet, because that will cause a flag
redefinition error until we get everyone to stop using glog.  That
will happen when we update to k8s 1.13.
2019-05-06 12:54:51 -04:00
Kubernetes Prow Robot 9ecabb9159
Merge pull request #6628 from AliyunContainerService/flags
add ALI flags
2019-03-25 09:23:09 -07:00
Kubernetes Prow Robot 93988d8fdd
Merge pull request #6359 from justinsb/integration_etcd
Enable etcd-manager / etcd3 / etcd-tls in kops 1.12
2019-03-19 10:28:23 -07:00
Lily e4cbd3c17c add ALI flags 2019-03-16 17:26:44 +08:00
LilyFaFa 12d54b6a1f support gossip for AliCloud 2019-03-15 15:26:12 +08:00
Justin SB 31f408c978
Support etcd-manager in kops 1.12
In 1.12 (kops & kubenetes):

* We default etcd-manager on
* We default to etcd3
* We default to full TLS for etcd (client and peer)
* We stop allowing external access to etcd
2019-03-14 23:13:06 -04:00
Jan Wozniak 6d3c9fe44f protokube: add support for OpenStack 2019-01-16 09:25:58 -07:00
Ilya Shaisultanov 712528728c dns-controller: allow configuring DNS update interval 2018-09-06 13:29:51 -06:00
Erik Berdonces Bonelo fdeed33719 Add --min-request-timeout flag in kube-APIServer 2018-07-13 10:29:30 +02:00
Justin Santa Barbara c6995e9a9a gossip: create zone in protokube
We were doing this implicitly previously by creating the etcd records.

As etcd-manager doesn't need to create gossip records, we instead
create a zone explicilty.
2018-06-14 17:43:49 -04:00
Justin Santa Barbara d5a6b15b9b Fix typo: adddresses -> addresses 2018-05-31 13:14:34 -07:00
Justin Santa Barbara ba87c36f73 Support (optional) etcd-manager 2018-05-25 16:01:22 -04:00
andrewsykim b480898af7 digitalocean: add protokube support 2018-04-01 21:47:31 -04:00
k8s-ci-robot 37d4b53d0d
Merge pull request #4010 from gambol99/etcd_options
Etcd TLS Peer & CLient Auth
2018-02-27 22:27:56 -08:00
Mike Splain 45a57915e2 Fix bazel deprecation notice 2018-02-26 09:36:13 -05:00
Rohith a140d5b7f1 - fixing the protokube flag issue 2018-02-24 10:03:43 +00:00
Rohith d065111453 Etcd TLS Peer & CLient Auth 2018-02-24 10:02:41 +00:00
Justin Santa Barbara dde7600dae Initial support for standalone etcd-manager backups
The etcd-manager will (ideally) take over etcd management.  To provide a
nice migration path, and because we want etcd backups, we're creating a
standalone image that just backs up etcd in the etcd-manager format.

This isn't really ready for actual usage, but should be harmless because
it runs as a sidecar container.
2018-02-20 20:06:08 -05:00
Tim Hockin 79d5f793e7 Convert registry to k8s.gcr.io 2018-02-14 10:08:41 -08:00
chrislovecnm 4dd3bb1dea Updating bazel BUILD files with new go_rules version 2017-12-29 15:03:14 -07:00
Kubernetes Submit Queue b44d894813
Merge pull request #3860 from justinsb/batching
Automatic merge from submit-queue.

Copy dnsprovider into our code, implement route53 batching

Fixes #3121
2017-12-15 15:44:12 -08:00
Kubernetes Submit Queue 490f860bc9
Merge pull request #4078 from justinsb/protokube_local_addresses
Automatic merge from submit-queue.

protokube: better discovery of local address
2017-12-15 05:03:47 -08:00
Justin Santa Barbara 3472b0dc6d protokube: fix logging / logic around cluster-id
Remove superfluous if statement
2017-12-15 01:11:56 -05:00
Justin Santa Barbara 414b0172f0 protokube: better discovery of local address
Fix up the local IP address discovery logic, to recognize new
en-interfaces, and to better log what it is doing.  Plug it in for
baremetal installations.
2017-12-15 01:10:26 -05:00
Justin Santa Barbara f03cc5dbd9 Update dnsprovider imports to use our version 2017-12-13 20:43:01 -05:00
chrislovecnm 609e268a1d gazelle updates with new bazel version 2017-11-05 17:41:53 -07:00
Matt Schurenko 298747e9ae adding etcd settings to protokube 2017-10-20 00:32:53 -04:00
Justin Santa Barbara 0143be7c4f autogen: BUILD and BUILD.bazel 2017-10-02 14:27:21 -04:00
Justin Santa Barbara 544990842a More fixes for 1.8 API changes 2017-10-01 23:02:32 -04:00
Rohith 7cd214266a Requested Changes - Etvd v3
- removing the StorageType on the etcd cluster spec (sticking with the Version field only)
- changed the protokube flag back to -etcd-image
- users have to explicitly set the etcd version now; the latest version in gcr.io is 3.0.17
- reverted the ordering on the populate spec
2017-08-11 21:08:09 +01:00
Rohith f3e98af217 Etcd V3 Support
The current implementation is running v2.2.1 which is two year old and end of life. This PR add the ability to use etcd and set the versions if required. Note at the moment the image is still using the gcr.io registry image. As note, much like TLS their presently is not 'automated' migration path from v2 to v3.

- the feature is gated behine the storageType of the etcd cluster, bot clusters events and main must use the same storage type
- the version for v2 is unchanged and pinned at v2.2.1 with v2 using v3.0.17
- @question: we shoudl consider allowing the use to override the images though I think this should be addresses more generically, than one offs here and then. I know chris is working on a asset registry??
2017-08-11 21:04:31 +01:00
Rohith 74f59612c7 Fixes
- added the master option back the protokube, updating the nodeup model and protokube code
- removed any comments no related to the PR as suggested
- reverted the ordering of the mutex in the AWSVolumes in protokube
2017-08-06 18:52:38 +01:00