Commit Graph

295 Commits

Author SHA1 Message Date
Justin SB 8809b5aeaf
Update to etcd-manager 3.0.20190509
Includes the fixes for concurrent file writes
2019-05-09 22:58:32 -04:00
Arto Jantunen 238fdaf1c1 Give etcd pods system-cluster-critical priority
Again unlikely to matter since master nodes aren't expected to run out of
capacity, done mostly for completeness (all pods should usually have a
priority defined if the cluster is running with PodPriority enabled).
2019-05-09 16:03:08 +03:00
Justin SB ba9a4afc43
apigroup -> kops.k8s.io: Tests & supporting changes
Autogenerated code, docs & test changes

Also a new test for the older "kops" apiGroup, to make sure that
continues to work.
2019-05-06 22:26:29 -04:00
Justin SB 76d03b3f71
Generated files: glog -> klog 2019-05-06 12:56:03 -04:00
Justin SB 3e33ac7682
Change code from glog to klog
We don't call klog.InitFlags yet, because that will cause a flag
redefinition error until we get everyone to stop using glog.  That
will happen when we update to k8s 1.13.
2019-05-06 12:54:51 -04:00
Ryan Bonham 189ccfe919 Fix spelling error. 2019-04-02 10:50:58 -05:00
Ryan Bonham 73845e200d Fix handling of nil and set correct defaults for memory. 2019-04-02 10:38:12 -05:00
Ryan Bonham 88a2a3f11f Cleanup changes to kubedns 2019-04-01 14:04:28 -05:00
Ryan Bonham 1fe925e01f Update BUILD.bazel 2019-04-01 13:51:56 -05:00
Ryan Bonham 9d36a0ab13 Add missing dep. 2019-04-01 08:49:46 -05:00
Ryan Bonham 2fc67b4678 Add DNS Resource Settings 2019-04-01 08:09:29 -05:00
Justin Santa Barbara 4999f95c26 Update etcd-manager to 1.0.20190328
Significant changes:

* Support adoption of tls-enabled etcd databases (i.e. migration from
  legacy to etcd-manager when using https)
2019-03-28 07:23:18 -04:00
Justin SB 29445998e7
Bump etcd-manager / etcd-backup to 3.0.20190325
Picking up kopeio/etcd-manager#192, for #6562
2019-03-25 13:01:50 -04:00
Kubernetes Prow Robot 9ecabb9159
Merge pull request #6628 from AliyunContainerService/flags
add ALI flags
2019-03-25 09:23:09 -07:00
Lily e4cbd3c17c add ALI flags 2019-03-16 17:26:44 +08:00
Justin SB 31f408c978
Support etcd-manager in kops 1.12
In 1.12 (kops & kubenetes):

* We default etcd-manager on
* We default to etcd3
* We default to full TLS for etcd (client and peer)
* We stop allowing external access to etcd
2019-03-14 23:13:06 -04:00
Kubernetes Prow Robot c2bcefd82f
Merge pull request #6340 from mtaufen/rm-allow-privileged
Stop setting deprecated --allow-privileged Kubelet flag in 1.14
2019-03-05 18:48:03 -08:00
Michael Taufen 798044b720 Stop setting deprecated --allow-privileged Kubelet flag in 1.14 2019-03-04 13:28:41 -08:00
Kashif Saadat 72882ed370 update bazel 2019-03-01 12:31:55 +00:00
Kashif Saadat 34b5b6c3ac Fix panic when using etcd-manager and resource requests are nil 2019-03-01 12:17:54 +00:00
Justin SB 8a22a257f1
Bump etcd-manager version to 3.0.20190224
Includes https://github.com/kopeio/etcd-manager/pull/190, fix for
symlinks as seen on GCE.
2019-02-24 15:15:25 -05:00
Justin SB 8539d54565
Make docker 18.06.3 the default for k8s >= 1.12
Includes the fix for CVE-2019-5736
2019-02-23 17:23:48 -05:00
Eric Greer 89a5fa58a4 removig unecessary package after squashing and patching to current master 2019-02-21 18:12:42 -08:00
Eric Greer 31a4c40131 merge conflict resolution 2019-02-21 15:20:05 -08:00
Eric Greer 8362b1260e etcd memory requests can now be specified 2019-02-21 15:14:51 -08:00
Justin SB aa5024f2c6
Choose docker version 18.06.2 for k8s >= 1.12
Helps us avoid the recent CVE
2019-02-19 21:24:00 -05:00
Justin SB dd7533398d
Support etcd-manager v3, suitable for backporting
Add etcd-manager v3 in a way that we can safely backport.
2019-01-29 23:51:26 -05:00
Derek Lemon -T (delemon - AEROTEK INC at Cisco) c9b5911b1c Openstack gopkg updates 2019-01-19 08:41:15 -07:00
Jordan Liggitt 32f196fd71 Remove Initializers from default admission plugins 2019-01-16 16:49:46 -05:00
Derek Lemon -T (delemon - AEROTEK INC at Cisco) 4f0169bb79 codegen 2019-01-16 09:30:40 -07:00
Kubernetes Prow Robot f5ce011fa0
Merge pull request #6242 from justinsb/bulk_fix_typos
Bulk spelling fixes
2018-12-21 07:45:14 -08:00
Justin SB 26bd75aecb
Bulk spelling fixes
Experimenting with my own spelling checker, these are the typos it caught.
2018-12-20 17:43:56 -05:00
Rodrigo Menezes 2b9243ff8c Getting things ready for when we are ready for 1.12 2018-12-04 18:50:17 -08:00
Chris Phillips 2b9a56f8e6 rename to LyftVPC. Removes all the settings from the NetworkingSpec 2018-11-07 08:08:44 -08:00
Chris Phillips 3a8078763a Adds support for Lyft's cni-ipvlan-vpc-k8s
https://github.com/lyft/cni-ipvlan-vpc-k8s

This cni solution is slightly different in that it doesn't require running a daemonset

It requires:
  * a config file in /etc/cni/net.d
  * the binaries in /opt/cni/bin
  * adding the --node-ip param to the kubelet

This code is modeled after the AmazonVPC cni bits.

I've left the setup of the required subnets as an exercise to the reader.
2018-11-07 08:08:13 -08:00
Justin SB 4b3e66b347
Use hostPID: true with etcd-manager
Addresses issues with mounting inside a container with systemd
("Failed to add PIDs to scope's control group: Invalid argument")
2018-10-18 20:20:11 -07:00
k8s-ci-robot c81a0c64c5
Merge pull request #5868 from gambol99/fix_up_client
Node Authorizer Fixes
2018-10-03 06:12:55 -07:00
k8s-ci-robot 9c851ddcda
Merge pull request #5867 from gambol99/node_mode_controllers
Node mode controllers
2018-10-03 06:12:45 -07:00
Rohith aa700961b5 - fixing up the prometheus metrics annotation to indicates a https scheme 2018-10-03 11:39:35 +01:00
Rohith 2ce1df88cc - fixing the logging message, variable were wrong way around 2018-10-03 11:39:35 +01:00
Rohith 97dc2beb71 Node Authorizer Client Fix
- fixing up the client for reboots ... somewhat of a oversight on my part :-)
- added the reason to the node denial message
2018-10-03 11:39:35 +01:00
Rohith cf67cfd030 - enabling the tokencleaner controller when bootstrap tokens are enabled 2018-10-03 11:36:51 +01:00
k8s-ci-robot b3d61542cd
Merge pull request #5820 from justinsb/etcd_manager_channels_step1
etcd: introduce field to specify whether we are using etcd-manager or legacy mode
2018-10-02 14:20:37 -07:00
Justin Santa Barbara 9a9a947f7d Extract default etcd versions as constants 2018-10-02 13:13:11 -07:00
Justin Santa Barbara 54c499fe9b Introduce field to specify whether we are using etcd-manager or legacy mode
Splitting this out from the bigger bundle PR
2018-10-01 15:36:24 -07:00
Rohith 8401273b06 - fixing the reference to the import, goimports made an error
- updating the version of the node-authorizer manifest
2018-09-27 10:21:10 +01:00
Rohith 26942eb601 - updating to the fix rollout image for node authorizer 2018-09-27 09:59:23 +01:00
Justin Santa Barbara 7cf432fcba Add test for etcd-manager output
We need to get this under test coverage so we can start changing it confidently!
2018-09-14 08:46:32 -04:00
andrewsykim 6dc9f01a41 add kube-proxy hostname override 2018-08-16 23:26:37 -04:00
Justin Santa Barbara b208bd44b3 Create ExperimentalClusterDNS feature flag
This currently just turns off validation of the kubelet cluster dns
flag, which should allow for experimenting with more complicated DNS
configurations such as local proxies, which may address shortcomings
of DNS retries with UDP.

Issue #5584
2018-08-14 14:59:20 -04:00
Spike Curtis 1540f906d2 Don't set kube-proxy cluster-cidr with aws-vpc-cni
Signed-off-by: Spike Curtis <spike@tigera.io>
2018-08-03 15:48:14 -07:00
k8s-ci-robot 56ccfac26d
Merge pull request #5317 from gambol99/node_registration
Node Authorization Service
2018-07-19 05:17:41 -07:00
Rohith 92115b2341 - dropping the specific flags and using a genenic --feature gate model for the authorizers, meaning i don't need to come back to the API whenever we want to make changes 2018-07-06 20:15:18 +01:00
Rohith ce55c257eb - making the node-authorizer image default v0.0.1 (with sha) or use an environment variable override 2018-07-06 20:14:35 +01:00
Rohith fd6cef8180 Requested Changes
- switching to using code rather than a template for the systemd unit creation as requested in review
- as part of the review, changing the name of the ca from tls-ca to tls-client-ca
- changing the api from DisableAddressCheck to EnableAddressCheck and defaulting to true if no set
- fixing up the test for node-authorizer and shifting the parsing of the certificates as suggested in reviews to a method
2018-07-06 20:14:35 +01:00
Rohith 304d0ce8a9 - consuming the node authorization api spec in nodeup binary
- adding the options builder to fill in the model
- adding the spec into the bootstrap config
2018-07-06 20:14:35 +01:00
Mike Splain 48c9f3d7c9 Fixes issue when setting docker version
Previously when setting docker version, logdriver was automatically
added to cluster config. Switching it to a pointer fixes this issue.

Fixes #5384
2018-07-06 11:29:11 -04:00
k8s-ci-robot 019ecdecae
Merge pull request #5335 from justinsb/gce_etcd_manager
etcd-manager: GCE support
2018-06-20 08:45:08 -07:00
Justin Santa Barbara 5120b913a5 Initial work for etcd-manager on GCE 2018-06-14 17:50:07 -04:00
Justin Santa Barbara 553e519a56 Set log-verbosity for etcd-manager 2018-06-14 17:40:06 -04:00
Rohith d2bae64dd1 - adding the enable-bootstrap-token-auth to the kubeapi and fixing up the various compoents 2018-06-11 09:57:26 +01:00
Rohith 2d5bd2cfd9 - update the IAM policy to ensure the kubelet permision is skipped
- update the PKI to ensure on new clusters the certificate it not created
2018-06-11 09:57:26 +01:00
Rohith 4531384649 This PR attempts to solve two issues
a) The current implementation use's a static kubelet which doesn't not conform to the Node authorization mode (i.e. system:nodes:<nodename>)
b) As present the kubeconfig is static and reused across all the masters and nodes

The PR firstly introduces the ability for users to use bootstrap tokens and secondly when enabled ensure the kubelets for the masters as have unique usernames.  Note, this PR does not attempt to address the distribution of the bootstrap tokens themselves, that's for cluster admins. One solution for this would be a daemonset on the masters running on hostNetwork and reuse dns-controller to annotated the pods and give as the DNS

Notes:
- the master node do not use bootstrap tokens, instead given they have access to the ca anyhow, we generate certificates for each.
- when bootstrap token is not enabled the behaviour will stay the same; i.e. a kubelet configuration brought down from the store.
- when bootstrap tokens are enabled, the Nodes sit in a timeout loop waiting for the configuration to appear (by third party).
- given the nodeup docker and manifests builders are executed before the kubelet builder, the assumption here is a unit file kicks of a custom container to bootstrap the rest.
- the current firewalls on between the master and nodes are fairly open so no need to open ports between the two
- much of the work was ported from @justinsb PR [here](https://github.com/kubernetes/kops/pull/4134/)
- we add a very presumptuous server and client certificates for use with an authorizer (node-bootstrap-internal.dns_zone)

I do have an additional PR which performs the entire thing. The process being a node_authorizer which runs on the master nodes via a daemonset, the service implements a series of authorizers (i.e. alwaysallow, aws, gce etc). For aws, the process is similar to how vault authorizes nodes [here](https://www.vaultproject.io/docs/auth/aws.html). Nodeup no then calls out to the node_authorizer on bootstrap and provisions the kubelet.
2018-06-11 09:56:32 +01:00
k8s-ci-robot aef1afbc02
Merge pull request #4724 from gambol99/custom_kube_dns
Customize KubeDNS
2018-06-10 18:52:01 -07:00
Andrew Sy Kim 5004652505
Revert "digitalocean: don't set --cloud-provider=external on control plane starting v1.10" 2018-06-08 11:41:07 -04:00
Justin Santa Barbara 2b4888a596 Delay overlay2 to 1.11
Gives us more time to consider image support.
2018-06-07 17:11:19 -04:00
Justin Santa Barbara ef5936d8b5 Support overlay2 in docker
We also have to stop passing the flag on ContainerOS, because it's set
in /etc/docker/default.json and it's now an error to pass the flag.

That in turn means we move those options to code, which are the last of
those legacy config options.  (We still have a few tasks declaratively
defined though)
2018-06-07 17:11:11 -04:00
Tomas Virgl 874e2a514f Override hostname with '@aws' only if hostname override is not specified. 2018-06-06 13:54:19 -07:00
Rohith 67296c2db9 - fixing up the spelling mistakes found 2018-06-06 10:03:51 +01:00
Justin Santa Barbara 53bf6ea6ad Replace deprecated flags: address -> insecure-bind-address 2018-05-31 23:23:33 -04:00
Ripta Pasay dfa4190cb5 Add --enable-admission-plugins API server flag, deprecating --admission-control in v1.10 2018-05-29 16:42:23 -07:00
k8s-ci-robot ad60dbd63d
Merge pull request #5178 from dims/patch-1
Add a FIXME and don't log about insecure ports
2018-05-26 14:22:41 -07:00
k8s-ci-robot e323fa918f
Merge pull request #5126 from justinsb/optional_etcd_manager
Support (optional) etcd-manager
2018-05-25 15:45:32 -07:00
Justin Santa Barbara ba87c36f73 Support (optional) etcd-manager 2018-05-25 16:01:22 -04:00
Davanum Srinivas 3e075fcab5
Add a FIXME and don't log about insecure ports
Thanks to @craigtracey for spotting this.
2018-05-25 09:35:06 -07:00
Rohith de977e627e Customize KubeDNS
This PR adds the ability for users to customize the kubedns upstream nameservers and provider stubdomains, as per [here](https://kubernetes.io/docs/tasks/administer-cluster/dns-custom-nameservers/)
2018-05-13 17:08:56 +01:00
andrewsykim 2b325be8cf digitalocean: don't set --cloud-provider=external on control plane starting v1.10 2018-04-16 18:19:38 -04:00
James McMinn 458f59d5d8 Add dnsmasq parameteres to kubeDNS config 2018-04-06 09:09:54 +10:00
andrewsykim 54bee09f47 digitalocean: add kubelet hostname override 2018-04-03 01:16:50 -04:00
k8s-ci-robot fc1bed4353
Merge pull request #4224 from nebril/cilium-support
Add Cilium as CNI plugin
2018-03-26 07:49:02 -07:00
Justin Santa Barbara 2bccf880d2 etcd-quorum-read flag: explicitly default to off for v2
Kubernetes 1.9 changed the default for etcd-quorum-read flag value to
true, in the hope of fixing some of the edge-case controller issues.

However, while this is cheap on etcd3, that fix was not backported to
etcd2, and performance there of quorum reads is poor.

For non-HA clusters with etcd2, it still goes through raft, but does not
need to - we set etcd-quorum-read to false, as this is just a missed
optimization in etcd2.

For HA clusters with etcd2, it's trickier, but at least for now we're
going to avoid the (crippling) performance regression.  kops 1.10 should
have etcd-manager (allowing upgrades to etcd3), and the ability to
configure IOPS on the etcd volume, so we can revisit this in 1.10 /
1.11.
2018-03-25 19:08:05 -04:00
Maciej Kwiek ed67c013f5 Validate etcd and k8s version for Cilium
Signed-off-by: Maciej Kwiek <maciej@covalent.io>
2018-03-20 13:08:39 +01:00
Maciej Kwiek bca52dede9 Add Cilium as CNI plugin
Signed-off-by: Maciej Kwiek <maciej@covalent.io>
2018-03-20 13:07:26 +01:00
Justin Santa Barbara b2fa0bfa09
Merge pull request #4443 from zacblazic/update-default-docker-in-k8s-1.8
Set the default docker for kubernetes 1.9 to 17.03.2
2018-02-28 00:23:18 -05:00
k8s-ci-robot 0ab8b57c2a
Merge pull request #4493 from justinsb/vfs_streaming
VFS: WriteFile takes an io.ReadSeeker
2018-02-26 15:50:45 -08:00
Zac Blazic 935251413c
Set the default docker for kubernetes 1.9 to 17.03.02
As 17.03.2 has been validated for 1.8 and 1.9.
2018-02-26 19:11:18 +02:00
Zac Blazic 2518b3b656
Revert default docker version for kubernetes 1.8 back to 1.13.1 2018-02-26 19:10:23 +02:00
Mike Splain 45a57915e2 Fix bazel deprecation notice 2018-02-26 09:36:13 -05:00
Justin Santa Barbara 412cf377c2 VFS: WriteFile takes an io.ReadSeeker
Means we don't have to buffer big files in memory, in combination with
WriteTo for reading.
2018-02-26 09:09:17 -05:00
chrislovecnm fe790df0ce fixing bazel files to pass CI 2018-02-23 17:36:43 -07:00
Justin Santa Barbara c74f956697 Add test for image name remap 2018-02-22 21:42:41 -08:00
Justin Santa Barbara b68f58d746 Change NewAssetBuilder to take a kops.Cluseter 2018-02-22 21:42:40 -08:00
Justin Santa Barbara dde7600dae Initial support for standalone etcd-manager backups
The etcd-manager will (ideally) take over etcd management.  To provide a
nice migration path, and because we want etcd backups, we're creating a
standalone image that just backs up etcd in the etcd-manager format.

This isn't really ready for actual usage, but should be harmless because
it runs as a sidecar container.
2018-02-20 20:06:08 -05:00
Tim Hockin 79d5f793e7 Convert registry to k8s.gcr.io 2018-02-14 10:08:41 -08:00
Zac Blazic 32a7f770b8
Set the default docker for kubernetes 1.8 to 17.03.02
Since 17.03.2 has been validated for 1.8 and GKE are now using
it in their COS images, I think it's a better default than 1.13.1.
2018-02-14 18:34:01 +02:00
zhangxiaoyu-zidif 30b10cb1c8 modify check require-kubeconfig 2018-01-30 17:53:16 +08:00
k8s-ci-robot cbf16fd6e2
Merge pull request #4245 from ottoyiu/etcd-override
Allow image override for etcd
2018-01-26 10:11:33 -08:00
k8s-ci-robot b68ff3893f
Merge pull request #4308 from justinsb/stop_specifying_require_kubeconfig
Don't specify require-kubeconfig from 1.10
2018-01-23 15:44:01 -08:00
Justin Santa Barbara 4dccf6d56d Don't specify require-kubeconfig from 1.10
Should fix https://github.com/kubernetes/kubernetes/pull/58367
2018-01-20 17:57:58 -05:00
Blake e37be9a88c Update list of AdmissionControllers for k8s 1.9 2018-01-18 13:40:23 -08:00
Otto Yiu 2b12b59d75 add ability to override etcd image and update apimachinery generated files from EtcdClusterSpec changes 2018-01-10 13:39:07 -08:00
chrislovecnm 4dd3bb1dea Updating bazel BUILD files with new go_rules version 2017-12-29 15:03:14 -07:00
Kubernetes Submit Queue 15c7d61dfb
Merge pull request #3997 from aledbf/amazon-vpc-cni
Automatic merge from submit-queue.

Add support for Amazon VPC CNI plugin

TODO:
- [x] IAM perms so that the CNI provider only has perms for the nodes in the cluster
- [x] Cleanup of security groups
- [ ] Replace image aledbf/k8s-ec2-srcdst:v0.1.0-5 with the official after https://github.com/ottoyiu/k8s-ec2-srcdst/pull/5 and https://github.com/ottoyiu/k8s-ec2-srcdst/pull/6
2017-12-17 21:41:13 -08:00
chrislovecnm 7057aaf1bb Enabling the file assets
File assets and the SHA files are uploaded to the new location. Files
when are users uses s3 are upload public read only. The copyfile task
uses only the existing SHA value.

This PR include major refactoring of the use of URLs.  Strings are no
longer categnated, but converted into a URL struct and path.Join is
utlilized.

A new values.go file is included so that we can start refactoring more
code out of the "fi" package.

A
2017-12-17 15:26:57 -07:00
Manuel de Brito Fontes 2e05dd17aa Add support for Amazon VPC CNI plugin 2017-12-17 18:08:24 -03:00
Kubernetes Submit Queue ac7ae3fd58
Merge pull request #3809 from rdrgmnzs/hostnameOverride_use_hostname
Automatic merge from submit-queue.

Let a user set a hostnameOverride when the cloud provider is aws.

Let a user use the hostname or set a hostnameOverride when the cloud provider is aws. This would allow for a more descriptive name to be used. The name of the hosts when using @hostname can be set by using a hook or some other method.
2017-12-13 17:46:21 -08:00
zengchen1024 f9c98c3b4c add openstack cloud provider 2017-11-13 16:59:24 +08:00
Rodrigo Menezes 255305b8ef Let a user use the hostname or set a hostnameOverride when the cloud provider is aws 2017-11-08 23:59:21 -08:00
chrislovecnm 609e268a1d gazelle updates with new bazel version 2017-11-05 17:41:53 -07:00
chrislovecnm 9647b1d349 deprecated API values that are no longer used with kube-dns 2017-11-04 22:15:48 -06:00
chrislovecnm 1e418c3e13 more goimport updates 2017-11-04 10:03:02 -06:00
chrislovecnm 8d1ee1fa16 updating files for goimports 2017-11-01 12:51:43 -06:00
Manatsawin Hanmongkolchai a708919bf4 Generate scheduler policy by dynamic cluster addons 2017-10-27 08:56:07 +07:00
chrislovecnm 4de78b0055 setting up etcd to use asset builder for its container 2017-10-26 17:25:50 -06:00
Kubernetes Submit Queue 8df13bd468 Merge pull request #3679 from justinsb/support_api_aggregation
Automatic merge from submit-queue.

Initial aggregation work

Create the keypairs, which are supposed to be signed by a different CA.
    
Set the `--requestheader-...` flags on apiserver.
    
Fix #3152
Fix #2691
2017-10-24 12:08:27 -07:00
Justin Santa Barbara a879521ba3 Initial aggregation support
Create the keypairs, which are supposed to be signed by a different CA.

Set the `--requestheader-...` flags on apiserver.

Fix #3152
Fix #2691
2017-10-22 14:41:38 -04:00
wlan0 d3143ec3cc add Cloud Controller Manager addon 2017-10-19 12:33:44 -07:00
Justin Santa Barbara 19677523c0 Mock kops version in tests
This avoids having to update the tests every time our version changes.
2017-10-10 11:11:57 -04:00
Manatsawin Hanmongkolchai a06fbbac79 Added documentation that PolicyConfigMap should not be used during cluster creation 2017-10-10 09:33:48 +07:00
Manatsawin Hanmongkolchai c00f5ea9a7 Added error when trying to use kube-scheduler policyConfigMap before Kube 1.7.x 2017-10-10 09:10:05 +07:00
Justin Santa Barbara cc559dc373 Map docker 1.13.1 & 17.03.2, default 1.8 to 1.13.1
Kubernetes 1.8 is validated with 1.13.1 and 17.03.2.

For 1.8, the default should be 1.13.1
2017-10-03 19:04:20 -04:00
Justin Santa Barbara 0143be7c4f autogen: BUILD and BUILD.bazel 2017-10-02 14:27:21 -04:00
Justin Santa Barbara 3478031533 API types changed package 2017-10-01 14:03:56 -04:00
Kubernetes Submit Queue fc3716677a Merge pull request #3345 from andreychernih/enable-critical-feature-gate
Automatic merge from submit-queue. .

Enable ExperimentalCriticalPodAnnotation feature gate

Otherwise, it is possible that critical system components will be evicted

https://github.com/kubernetes/kops/issues/3194
https://github.com/kubernetes/kubernetes/issues/51432
2017-09-24 21:59:49 -07:00
Justin Santa Barbara 45032502c6 baremetal: fill out more of the baremetal mappings
This gets us to the point where we can create the objects.
2017-09-22 23:03:07 -04:00
Andrey Chernih b3acc4b5f8 Merge branch 'master' into enable-critical-feature-gate 2017-09-18 20:05:22 -07:00
Andrey Chernih 56553c5971 Add ability to override feature gates and check version 2017-09-18 20:04:54 -07:00
Caleb Gilmour 79d331e590 Add support for Romana as a networking option 2017-09-13 22:48:18 +00:00
Andrey Chernih 11c702ea0c Enable ExperimentalCriticalPodAnnotation feature gate
Otherwise, it is possible that critical system components will be
evicted

https://github.com/kubernetes/kops/issues/3194
https://github.com/kubernetes/kubernetes/issues/51432

Closes #3194
2017-09-05 21:28:13 -07:00
Justin Santa Barbara 4d52a7c9e6 Add Initializers admission controller
Also sync up Admission controllers with current default sets for 1.7 &
1.8
2017-08-27 20:53:57 -04:00
georgebuckerfield 58960f39cd Move etcd config for apiserver into code, set cloud provider for Digital Ocean to external 2017-08-26 08:23:19 +01:00
georgebuckerfield ff7f60dc35 Initial work on moving apiserver templates into code 2017-08-26 00:32:28 +01:00
Kubernetes Submit Queue 2d7fb51c2a Merge pull request #3025 from chrislovecnm/mapping-and-uploading-kubernetes-assets
Automatic merge from submit-queue

inventory assets - mapping and uploading kubernetes containers
2017-08-22 19:15:31 -07:00
andrewsykim 0411ba270e Create cluster requirements for DigitalOcean 2017-08-22 09:01:19 -04:00
chrislovecnm 2afdb5ab2e mapping-and-uploading-kube-assets 2017-08-21 15:16:56 -06:00
Rohith 7cd214266a Requested Changes - Etvd v3
- removing the StorageType on the etcd cluster spec (sticking with the Version field only)
- changed the protokube flag back to -etcd-image
- users have to explicitly set the etcd version now; the latest version in gcr.io is 3.0.17
- reverted the ordering on the populate spec
2017-08-11 21:08:09 +01:00
Rohith f3e98af217 Etcd V3 Support
The current implementation is running v2.2.1 which is two year old and end of life. This PR add the ability to use etcd and set the versions if required. Note at the moment the image is still using the gcr.io registry image. As note, much like TLS their presently is not 'automated' migration path from v2 to v3.

- the feature is gated behine the storageType of the etcd cluster, bot clusters events and main must use the same storage type
- the version for v2 is unchanged and pinned at v2.2.1 with v2 using v3.0.17
- @question: we shoudl consider allowing the use to override the images though I think this should be addresses more generically, than one offs here and then. I know chris is working on a asset registry??
2017-08-11 21:04:31 +01:00
Justin Santa Barbara 0115ece62d Remap pause image through our AssetBuilder 2017-07-22 00:35:37 -04:00
Justin Santa Barbara c9cec3b3d2 kube-proxy: set hostname-override on AWS
So that it matches the Node.Name

Fix #2915
2017-07-14 10:31:07 -04:00
Chris Love 20535248b4 Merge pull request #2773 from justinsb/authn_integration
Initial support for authentication (kopeio)
2017-07-06 14:11:22 -06:00
Justin Santa Barbara 7c8dcc4a0d Code changes for 1.7 2017-07-02 13:10:28 -04:00
Justin Santa Barbara 752150ef22 Initial support for authentication (kopeio)
Still experimental, so not doing a flag yet.
2017-06-20 00:15:39 -04:00
Justin Santa Barbara d2df318ecc Move CloudProvider to kops API
This avoids a circular reference when breaking up the fi package
2017-06-17 16:27:07 -04:00
Justin Santa Barbara 8fb99a87e2 Merge pull request #2680 from murali-reddy/kube-router
add support for kube-router as CNI networking provider
2017-06-16 10:37:49 -04:00
Murali Reddy e872dbcb86 add support for kube-router as CNI networking provider
fixes #2606

Most part of the changes are similar to current supported CNI networking
provider. Kube-router also support IPVS bassed service proxy which can
be used as replacement for kube-proxy. So the manifest for kube-router
included with this patch enables kube-router to provide pod-to-pod
networking, IPVS based service proxy and ingress pod firewall.
2017-06-09 17:01:31 +05:30
chrislovecnm 9b4a86a616 tweak to log level 2017-05-19 20:19:05 -06:00
Chris Love d135085e54 Merge pull request #2447 from justinsb/deprecate_babysit_daemons
Remove babysit-daemons flag from 1.7
2017-05-08 08:36:53 -06:00
Justin Santa Barbara 42ea0d4770 Remove babysit-daemons flag from 1.7 2017-04-27 01:47:39 -04:00
Abrar Shivani 5889814c90 Support for vSphere Cloud Provider 2017-04-20 23:33:21 -07:00
SandeepPissay 3ed60bd708 Fixed the formatting and added copyright headers to new files 2017-04-20 23:31:49 -07:00