Revisions of kubernetes-salt
Containers Team (containersteam)
committed
(revision 317)
new commit from concourse: Commit 1d5c830 by Kiall Mac Innes kiall@macinnes.ie Reintroduce kubelet drain timeout and abort if draining fails This is a partial revert of 03d371fc489f4bd0e15da348b60390aa558daf76. We reintroduce the --timeout flag, leaving --grace-period unset (thus, inheriting from from the Pods terminationGracePeriodSeconds value). Without this, kubectl drain can hang forever in certain circumstances. Additionally, should the drain fail, then fail the orchestration. This ensures that we do not reboot a node which has, for example, SES/Ceph mounts active, which would in turn cause systemd to hang as the machine is rebooted. bsc#1104217
Containers Team (containersteam)
committed
(revision 316)
new commit from concourse: Commit 6990731 by Rafael Fernández López ereslibre@ereslibre.es Fix `--peer-urls=` argument provide (no quoting) Commit 8583884 by Rafael Fernández López ereslibre@ereslibre.es Pass `ETCDCTL_API` version as an envvar instead of at the command name. This would not work as what is fork + exec'ed is the `ETCDCTL_API=version`, what is not found in the `PATH`, causing the whole command to fail. Besides, each version produces a different output, and the parsing needs to be updated in order to properly get the member id. Follow up of https://github.com/kubic-project/salt/pull/622
Containers Team (containersteam)
committed
(revision 315)
new commit from concourse: Commit 6bc0d83 by Alvaro Saurin alvaro.saurin@gmail.com Set things like the runtime_config and admission_control in the pillar. Minor cleanups. feature#cleanups
Containers Team (containersteam)
committed
(revision 314)
new commit from concourse: Commit 54e4891 by Rafael Fernández López ereslibre@ereslibre.es HAProxy will refuse to start if it cannot resolve any name. In a context in which cloud-init could be updating the hostnames after machines are continuing with the update orchestration, we could be writing one thing to `/etc/hosts` and another one in the `haproxy` configuration, refusing this one to start because it cannot resolve the new name. This easily fixable in a newer HAProxy version by using the `init-addr` configuration, so HAProxy won't refuse to start if it cannot resolve any backend -- it will just ignore it --. For now, let's make the temporal window as small as possible, making the `haproxy` init.sls depend on the `etc-hosts` SLS, as it's *so* dependant on it. However, this is not in any way an ideal fix; rather a way to make this problematic window as small as possible. Fixes: bsc#1097478
Containers Team (containersteam)
committed
(revision 313)
new commit from concourse: Commit 2872769 by Nirmoy Das ndas@suse.de add default network policy for kube-dns and dex
Containers Team (containersteam)
committed
(revision 312)
new commit from concourse: Commit 9629ada by Maximilian Meister mmeister@suse.de read ETCDCTL_API version from the pillar upgrade#etcdctl Signed-off-by: Maximilian Meister <mmeister@suse.de> Commit 30907a3 by Michal Jura mjura@suse.com fix migration script from etcd2 to etcd3 Commit 129466a by Michal Jura mjura@suse.com update etcdctl sysconfig with ENDPOINTS flag Commit a02ac2e by Maximilian Meister mmeister@suse.de switch to etcd3 as a storage back-end upgrade#etcdctl Signed-off-by: Maximilian Meister <mmeister@suse.de>
Containers Team (containersteam)
committed
(revision 311)
new commit from concourse: Commit 241bc5f by Alvaro Saurin alvaro.saurin@gmail.com Updated diagrams for docs feature#docs
Containers Team (containersteam)
committed
(revision 310)
new commit from concourse: Commit 5a466f7 by Kiall Mac Innes kiall@macinnes.ie Update salt version used for tests to 2018.3.0
Containers Team (containersteam)
committed
(revision 309)
new commit from concourse: Commit 3c67ad3 by Florian Bergmann fbergmann@suse.de Allow states targeting specific versions of caasp to have no nodes. Otherwise the states would fail if no nodes are returned in the `tgt` expression. Commit c7550b2 by Florian Bergmann fbergmann@suse.de Adjust network_settings config format for salt 2018.3.0. Before this release the format did not use the 'interfaces' key. Commit bd20320 by Florian Bergmann fbergmann@suse.de Use a reactor to sync modules and update mine on minion start. Commit a7a3273 by Florian Bergmann fbergmann@suse.de Force the 15-secret.yaml file to be created first in dex. Otherwise the kubectl_apply_dir_template macro will fail, as the file does not exist when it tries to run `salt.hashutil.digest` on it. Commit a79c041 by Florian Bergmann fbergmann@suse.de Add missing __virtual__ functions to execution modules. (Attempt to make the automatic synchronization work for custom execution modules - seems not to work)
Containers Team (containersteam)
committed
(revision 308)
new commit from concourse: Commit 6b7abdb by Maximilian Meister mmeister@suse.de remove deprecated flag see https://github.com/kubernetes/kubernetes/pull/58968 k8s#1.11 Signed-off-by: Maximilian Meister <mmeister@suse.de>
Containers Team (containersteam)
committed
(revision 307)
new commit from concourse: Commit 67e276c by Michal Jura mjura@suse.com [CPI] Add self-signed certificate to CPI configuration, bsc#1101973
buildservice-autocommit
accepted
request 624696
from
Containers Team (containersteam)
(revision 306)
baserev update by copy to link target
Containers Team (containersteam)
committed
(revision 305)
new commit from concourse: Commit f93b74b by Michal Jura mjura@suse.com Fix and remove empty lines in OpenStack cpi config
Containers Team (containersteam)
committed
(revision 304)
new commit from concourse: Commit 66cafde by Kiall Mac Innes kiall@macinnes.ie Configure addon pod affinity Sometimes, Kubernetes will schedule all replicas of an addon to the same machine. Defeating much of the purpose of running multiple replicas. Configure all addons with affinity rules to encourage Kubernetes to spread these pods around the available machines. bsc#1101805
Containers Team (containersteam)
committed
(revision 303)
new commit from concourse: Commit c02c3ec by Michal Jura mjura@suse.com Move deprecated flags to kubelet config.yaml
Containers Team (containersteam)
committed
(revision 302)
new commit from concourse: Commit f0a0ac1 by Rafael Fernández López ereslibre@ereslibre.es Batch potentially dangerous and massive operations. Fixes: bsc#1101124
buildservice-autocommit
accepted
request 622262
from
Containers Team (containersteam)
(revision 301)
baserev update by copy to link target
Containers Team (containersteam)
committed
(revision 300)
new commit from concourse: Commit d03c2fa by Rafael Fernández López ereslibre@ereslibre.es Add haproxy migration sls to apply during upgrade During an upgrade from 2.0 to 3.0, workers will lose communication with the apiservers on the master nodes because of an auth change. After we have applied all the master nodes, and before we start looping over the workers, apply haproxy system-wide on all the workers, allowing their haproxy to update its configuration, thus, being able to authenticate against the apiservers again. This patch includes a new tree structure, meant to be destroyed between versions, but that allows to not poison the main structure of states with transient migration logic. The structure is as follows: - migrations - <orig_version>-<target_version> - overriden-sls/* - _service kubernetes-salt.changes kubernetes-salt.spec master.tar.gz (direct actions that can spawn other migration tasks) Fixes: bsc#1100212 Commit f190a7a by Rafael Fernández López ereslibre@ereslibre.es Migrate all labels when renaming a node (builtin and user-defined labels). Fixes: bsc#1100891 Commit a7e1b72 by Rafael Fernández López ereslibre@ereslibre.es Only perform migrations on machines that are going to be updated. On an upgrade process we are going to perform different migrations; only perform these migrations on machines that are part of the current subset of machines to be updated. Fixes: bsc#1100115
Containers Team (containersteam)
committed
(revision 299)
new commit from concourse: Commit a609b3c by David Helkowski dhelkowski@suse.com Add configmap from pillar data to dex ldap connectors
Containers Team (containersteam)
committed
(revision 298)
new commit from concourse: Commit 8ded363 by Michal Jura mjura@suse.com [CPI] Add option to ignore OpenStack Cinder availability zone, bsc#1095572 Ignore OpenStack Cinder avability zone when attaching volumes. When Nova and Cinder have different availability zones, this should be set to true. Default is false.
Displaying revisions 61 - 80 of 377