|
 |
 |
 |
Changelog for kubernetes-salt-3.0.0+git_r527_7678041-3.1.noarch.rpm :
Wed Jan 17 13:00:00 2018 containers-bugownerAATTsuse.de - Commit 9e358bb by Federico Ceratto federico.cerattoAATTsuse.de Add swap disabling Tue Jan 16 13:00:00 2018 containers-bugownerAATTsuse.de - Commit 02fa131 by Maximilian Meister mmeisterAATTsuse.de Configure docker via config file, not args docker can be configured via /etc/docker/daemon.json registries can be configured there too, but need to be in their own dedicated pillar as we need to map certificates to the registry names Signed-off-by: Maximilian Meister
Mon Jan 15 13:00:00 2018 containers-bugownerAATTsuse.de - Commit 73189f3 by Rafael Fernández López ereslibreAATTereslibre.es Fix version to 3.0.0+dev
Thu Jan 11 13:00:00 2018 containers-bugownerAATTsuse.de - Commit 1215ced by Rafael Fernández López ereslibreAATTereslibre.es Migrate CNI metadata on workers before doing anything else This does not give any chance for kubelets to try to request a new `podCIDR`. Also, fix node patching of the CNI migration Before restarting the master with the new configuration we migrate the workers to their expected `podCIDR` values, then we start with the general update procedure: masters first, then workers.
Thu Jan 11 13:00:00 2018 containers-bugownerAATTsuse.de - Commit f5e1dd3 by Alvaro Saurin alvaro.saurinAATTgmail.com Use a bath size for etcd setup equal to the number of etcd masters (bsc#1066695) Minor cleanups and a fix for a case where caasp_etcd.py could return 0.
Thu Jan 11 13:00:00 2018 containers-bugownerAATTsuse.de - Commit b8bff11 by Kiall Mac Innes kiallAATTmacinnes.ie Remove discovered IP addresses from certs As the discovered IP addresses are not static, that we don\'t maintain that the certs are updated+services are reloaded upon cert change, that we\'re including all IPs - even 127.0.0.1 - in this list, and that we don\'t make use of any of these SAN\'s, we should remove them.
Tue Jan 9 13:00:00 2018 containers-bugownerAATTsuse.de - Commit 94e697f by Rafael Fernández López ereslibreAATTereslibre.es Only uncordon nodes that were cordoned because of our own processes Fix kubelet highstate to uncordon the node only if we did cordon it by one of our processes (like an update). Without this patch, adding new nodes or performing an update would uncordon all nodes unconditionally, without taking into account if a user had a node cordoned for some reason (e.g. hardware failures or other reasons). Do not uncordon those nodes, keep them cordoned. Fixes: bsc#1050017
Mon Jan 8 13:00:00 2018 containers-bugownerAATTsuse.de - Commit 208a0da by Alvaro Saurin alvaro.saurinAATTgmail.com Let flannel calculate the Max and Min subnet from other parameters we are providing. More documentation on the flannel configuration.
Fri Dec 22 13:00:00 2017 containers-bugownerAATTsuse.de - Commit cc2aae4 by Rafael Fernández López ereslibreAATTereslibre.es Do not check if we need to uncordon this node depending on its state. The `onlyif` section can fail its check (without retrial opportunity), making the whole uncordon process to abort, when we really want to uncordon a node. In the future, we need to keep track of cordoned nodes by the update so we only uncordon those, leaving cordoned the nodes that were cordoned by the user. In any case, for this issue, `kubectl` will be smart enough: - For a cordoned node, uncordoning: ``` ~ KUBECONFIG=~/Downloads/kubeconfig kubectl uncordon 7a4f4985eaed4f519e27900ece559b8e.infra.caasp.local node \"7a4f4985eaed4f519e27900ece559b8e.infra.caasp.local\" uncordoned ~ echo $? 0 ``` - For an uncordoned node, uncordoning again: ``` ~ KUBECONFIG=~/Downloads/kubeconfig kubectl uncordon 7a4f4985eaed4f519e27900ece559b8e.infra.caasp.local node \"7a4f4985eaed4f519e27900ece559b8e.infra.caasp.local\" already uncordoned ~ echo $? 0 ``` We know we want to uncordon the node, let\'s do that directly, and it will just succeed in any case (unless the process of uncordoning fails for some reason, and in that case we have the `retries` in place). Fixes: bsc#1073919 Fixes: #336
Fri Dec 22 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 628ba55 by Alvaro Saurin alvaro.saurinAATTgmail.com Explicitly pass the kubeconfig file to kubectl
Thu Dec 21 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 3c64b88 by Rafael Fernández López ereslibreAATTereslibre.es Add beacon to notify network changes only on the default network interface Fixes: bsc#1063709
Mon Dec 18 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 1863c06 by Rafael Fernández López ereslibreAATTereslibre.es Bump dex version
Tue Dec 12 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 8fb3e79 by Alvaro Saurin alvaro.saurinAATTgmail.com Use a sanitized version of pillar.get
Wed Nov 29 13:00:00 2017 containers-bugownerAATTsuse.de - Commit c91add1 by Kiall Mac Innes kiallAATTmacinnes.ie Remove empty state from etc-hosts orch The final state in the etc-hosts orch was not actually calling anything, and hasn\'t been for quite a while. Lets remove it, so that the error it logs can be finally be gone!
Wed Nov 29 13:00:00 2017 containers-bugownerAATTsuse.de - Commit fd431b6 by Alvaro Saurin alvaro.saurinAATTgmail.com Run some things in only one master instead of in all the masters in the cluster.
Wed Nov 29 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 20070dc by Alvaro Saurin alvaro.saurinAATTgmail.com In the certs macros, do not assume \"names\" are always names and \"ips\" are always IPs: just filter with the \"is_ip\" filter. Minor shortcuts in the arguments. Fixes: bsc#1069205
Tue Nov 28 13:00:00 2017 containers-bugownerAATTsuse.de - Commit af1428a by Rafael Fernández López ereslibreAATTereslibre.es Never write `None` if we get `null` on the pillar override Instead, we write an empty string, because we don\'t intend to write `None` on the configuration file.
Tue Nov 28 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 4ed69ee by Kiall Mac Innes kiallAATTmacinnes.ie Support IPs as Kube external FQDN in /etc/hosts Currently, we assumed external names were FQDNs. When an IP was used instead, we would generate an incorrect /etc/hosts. bsc#1070154
Mon Nov 27 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 73a9fd3 by Rafael Fernández López ereslibreAATTereslibre.es Preserve haproxy configurations for Velum * Handle `haproxy` configuration. * Generate `pem` certificates, that include the certificate and private key. * Remove `velum` container restart.
Mon Nov 27 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 182c840 by Alvaro Saurin alvaro.saurinAATTgmail.com Use some Jinja macros for getting the default interface\'s IP. (bsc#1058079) Get rid of our custom grain.
Mon Nov 27 13:00:00 2017 containers-bugownerAATTsuse.de - Commit f215a10 by Rafael Fernández López ereslibreAATTereslibre.es Include `Internal Dashboard FQDN/IP` value in the LDAP certificate Since Dex will connect to LDAP using this FQDN/IP, make sure that the TLS handshake will succeed by regenerating the certificate early in the orchestration, so it includes this FQDN/IP in the SAN extensions of the LDAP certificate. Fixes: bsc#1069175
Thu Nov 23 13:00:00 2017 containers-bugownerAATTsuse.de - Commit ef4bd9b by Rafael Fernández López ereslibreAATTereslibre.es Sync _pillar modules only. We want to sync the pillars on the master first.
Tue Nov 21 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 072a014 by Rafael Fernández López ereslibreAATTereslibre.es Introduce Velum pillar * Use Velum pillar that serves json content * Cache the result if it differs from what we got * Serve the cached result if a connection problem happens Fixes: bsc#1069145
Mon Nov 20 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 3af7f41 by Maximilian Meister mmeisterAATTsuse.de only set service entries for localhost on kube-master also explain in a comment why we need to set the apiserver for 127.0.0.1 on all hosts (bsc#1067219) Signed-off-by: Maximilian Meister
Fri Nov 10 13:00:00 2017 containers-bugownerAATTsuse.de - Commit f74c756 by Rafael Fernández López ereslibreAATTereslibre.es Disable container-feeder before rebooting. This will allow us to control when container-feeder starts to load new images from the filesystem. Due to some possible docker configuration changes it might be restarted while container-feeder is working (if we keep it enabled). Force to disable the service before rebooting. Fixes: bsc#1066653
Fri Nov 10 13:00:00 2017 containers-bugownerAATTsuse.de - Commit ebd1907 by Rafael Fernández López ereslibreAATTereslibre.es Generate sa key in the update orchestration This is the safest path, but a refactor should come to make this part of the ca highstate so the update and the kubernetes orchestrations just force the ca highstate on both cases. Related: bsc#1066653
Thu Nov 9 13:00:00 2017 containers-bugownerAATTsuse.de - Commit bc29cc9 by Kiall Mac Innes kiallAATTmacinnes.ie Removed unused flannel iface grain This is a followup to 129e927
Fri Nov 3 13:00:00 2017 containers-bugownerAATTsuse.de - Commit ce396af by Alvaro Saurin alvaro.saurinAATTgmail.com Replace some other certificates by Jinja templates
Fri Nov 3 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 771634b by Alvaro Saurin alvaro.saurinAATTgmail.com Reorganize the addons in a subdirectory per addon Use some Jinja macros for running kubectl with retries, the kubectl path and the right dependencies
Mon Oct 30 13:00:00 2017 containers-bugownerAATTsuse.de - Commit a5fef22 by Flavio Castelli fcastelliAATTsuse.com Retry all iptables states Retry all iptables states to prevent failures like seen with bsc#1064186. Signed-off-by: Flavio Castelli Commit 2646dc4 by Flavio Castelli fcastelliAATTsuse.com Introduce caasp_retriable Provide a generic way to retry any kind of salt state. Signed-off-by: Flavio Castelli
Mon Oct 30 13:00:00 2017 containers-bugownerAATTsuse.de - Commit 2974490 by Alvaro Saurin alvaro.saurinAATTgmail.com Increase worker threads and backlog length (bsc#1065018)
Fri Oct 27 14:00:00 2017 containers-bugownerAATTsuse.de - Commit d78fe5d by Alvaro Saurin alvaro.saurinAATTgmail.com New \'retry[until]\' argument for caasp_cmd.run Use a unless/onlyif and retry[until] for skipping some executions and not using some nasty loops
Thu Oct 26 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e869357 by Alvaro Saurin alvaro.saurinAATTgmail.com Wait for etcd before trying to set anything, or just retry of etcd is not responding
Wed Oct 25 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e8d8612 by Alvaro Saurin alvaro.saurinAATTgmail.com Use http.wait_for_successful_query instead of looping with curl
Wed Oct 25 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 98c214f by Alvaro Saurin alvaro.saurinAATTgmail.com Minor: rename k8s_etcd to caasp_etcd (following the implicit code conventions)
Tue Oct 24 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7e88148 by Alvaro Saurin alvaro.saurinAATTgmail.com Use some Jinja macros for generating certificates
Tue Oct 24 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 9dedba0 by Michal Jura mjuraAATTsuse.com Fix whitespaces striping in Kubernetes api jinja template
Tue Oct 24 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 129e927 by Alvaro Saurin alvaro.saurinAATTgmail.com Use the default network interface instead of the hardcoded \'eth0\' (bsc#1058079)
Tue Oct 24 14:00:00 2017 containers-bugownerAATTsuse.de - Commit a2f0485 by Rafael Fernández López ereslibreAATTereslibre.es Add `caasp_cmd` state module featuring `run` with retry feature This state module will provide `run` state with `retry` option that accepts `attempts` and `interval` arguments. This allow us to retry a command if it failed, and retry to this maximum number of retries, sleeping between retries.
Fri Oct 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit ef91829 by Michal Jura mjuraAATTsuse.com Add comment message about keeping update /etc/hosts in velum container See https://github.com/kubic-project/salt/pull/265#issuecomment-337256898
Fri Oct 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 51f2da2 by Kiall Mac Innes kiallAATTmacinnes.ie Correctly handle FQDN `dashboard` values in Velum cert Ensure we correctly handle FQDN values for the `dashboard` pillar when generating the Velum TLS certificate. Fixes bsc#1064284
Fri Oct 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 21ec9f3 by Rafael Fernández López ereslibreAATTereslibre.es Remove outdated comment and improve it.
Thu Oct 19 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 0d3cdfe by Flavio Castelli fcastelliAATTsuse.com Add help message to etc/sysconfig/etcdctl Quick tip about how to source the variables defined inside of the file to quickly have etcdctl work. Signed-off-by: Flavio Castelli
Wed Oct 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 863cc73 by Kiall Mac Innes kiallAATTmacinnes.ie Manage the Velum TLS cert This ensures that the dashboard_external_fqdn is registered within the velum TLS certificate. bsc#1063998
Tue Oct 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 061c968 by Michal Jura mjuraAATTsuse.com Keep updated /etc/hosts on velum-dashboard container, bsc#1062728 We would like to keep /etc/hosts file updated for velum-dashboard with Admin host. Velum needs to know external name of Kube API which will be used to register in Dex service. Problem was discovered and discribed in bug 1062728
Tue Oct 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c9d4710 by Kiall Mac Innes kiallAATTmacinnes.ie Docker package was renamed to docker_1_12_6 Update salt to reference the new docker package name, as this was renamed from \"docker\" to \"docker_1_12_6\"
Tue Oct 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 146e288 by Kiall Mac Innes kiallAATTmacinnes.ie Revert K8S to use etcd2 storage format With etcd3, the kubernetes api server will sit in a (slow) restart loop when multimaster is enabled, logging a stacktrace and then restarting. This will manifest as, most commonly, \"Unable to connect to the server: unexpected EOF\" from kubectl. This will break bootstrap as we need to talk to K8S API to deploy dex, kube-dns, and tiller. bsc#1063235 bsc#1063285 bsc#1063543
Tue Oct 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 75145fe by Kiall Mac Innes kiallAATTmacinnes.ie Revert \"Revert K8S to use etcd2 storage format\" This reverts commit 5e95b0b0fb90d3d8ebd37df0e640303579c9e2c4. This was pushed to master, rather than a branch, by accident.
Wed Oct 11 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e3b0d3b by Rafael Fernández López ereslibreAATTereslibre.es Fix missing requirement during the upgrade process. Fixes: bsc#1062824
Wed Oct 11 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 1e04919 by Kiall Mac Innes kiallAATTmacinnes.ie Allow Dex to redirect to the Dashboard\'s external FQDN Some scenarios where the admin node\'s private IP is not accessible to the outside world require that we use a end user provided FQDN - e.g. as is the case on OpenStack and possibly other cloud environments. Allow redirections to this FQDN. Part of bsc#1062291
Tue Oct 10 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 75e85a0 by Nikhil Manchanda SlickNikAATTgmail.com Update tiller deployment to use sles-based docker image Currently the tiller image being used for the tiller deployment is from the upstream registry at gcr.io. We should be using the SLES based docker image instead of the upstream one. Fixes: bsc#1062380
Sat Oct 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 1df2665 by Kiall Mac Innes kiallAATTmacinnes.ie Update VERSION file to 2.0.0+dev
Fri Oct 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 497891d by Michal Jura mjuraAATTsuse.com Add floating network to cloud-provider integration with OpenStack We would like add new pillar value floating, which will be used to configure floating network for cloud provider intergration with OpenStack. If this option is specified, it will create floating ip for loadbalancer automatically.
Fri Oct 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit ba9c3f8 by Rafael Fernández López ereslibreAATTereslibre.es Set frontend settings: `dir` and `theme`.
Fri Oct 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 1ecef44 by Kiall Mac Innes kiallAATTmacinnes.ie Dex: Wait for Dex to be fully up and running We shouldn\'t allow a bootstrap to complete without Dex being up and running, so lets wait for the Dex API to start responding.
Fri Oct 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c4b42e6 by Michal Jura mjuraAATTsuse.com Remove duplicated storage-backend option for Kubernetes API, bsc#1061810 Option storage-backend is provided two times for Kubernetes API configuration. We have to keep only one option with value provided from pillar.
Fri Oct 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 3e654d9 by Robert Roland robert.rolandAATTsuse.com Add a URL off Velum as a valid OIDC redirect URI This will make it so that Dex will be happy to redirect you to velum
Thu Sep 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 50f84f4 by Rafael Fernández López ereslibreAATTereslibre.es Add `caasp_service.running_stable` This new state will allow us to make sure that a service is running in a stable manner. Also, will do some waits in case systemd will do retries on the background, what avoids instant failure from salt being reported with a regular `service.running`. Fixes: bsc#1059105
Thu Sep 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 408ab7a by Kiall Mac Innes kiallAATTmacinnes.ie Allow custom options to be passed to the Salt Master Rename the salt master configurations, so that custom options can be loaded after the stock options, allowing an override. bsc#1059724
Thu Sep 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 60e6a69 by Alvaro Saurin alvaro.saurinAATTgmail.com Do not access infra machines through the proxy (bsc#1053739)
Thu Sep 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit f730743 by Kiall Mac Innes kiallAATTmacinnes.ie Ensure cluster-service labels are consistent These were inconsistent, with some services using the labels, and others not. Within services, some of the resoures the label should be applied to were not, even though other parts of the same service did have the label applied. Commit 6520870 by Kiall Mac Innes kiallAATTmacinnes.ie Add CriticalAddonsOnly tolerations Add CriticalAddonsOnly toleration to dex/kube-dns/timmer, this syncs them with upstream, and allows for masters to be flagged as suitable for running these critical contains if desired. Commit 6cde454 by Kiall Mac Innes kiallAATTmacinnes.ie Remove Kube addonmanager references As Kubernetes addonmanager is not used to deploy these, we should not apply the addonmanager labels. Should a end user deploy kube addonmanager, it will believe these pods are under it\'s control and potentially remove or change them. bsc#1059516
Thu Sep 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7184f5e by Kiall Mac Innes kiallAATTmacinnes.ie Prevent update-etc-hosts conflicting with bootstrap Fix another case where the etc hosts update orchestration would otherwise conflict with the bootstrap / add node orchestration. bsc#1059577
Wed Sep 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 8865d73 by Robert Roland rob.rolandAATTgmail.com Making the service account key the same on all nodes (#230) The kube-apiserver and kube-controller-manager must agree on what the private key is for service account generation. In a multi-master scenario, where an api server starts on one machine, and the controller-manager on another machine becomes primary, pods cannot be created because kube-controller-manager cannot communicate with the apiserver. So, now, we generate the service account key on the ca minion and store it in the mine, so that it\'s generated once. Fixes bsc#1059398
Tue Sep 19 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6868ea5 by Alvaro Saurin alvaro.saurinAATTgmail.com Set a default external fqdn
Tue Sep 19 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 2df25a0 by Aishwarya Thangappa aishwarya.thangappaAATTgmail.com Fix the race condition that occurs when starting Kube-DNS KubeDNS may fail to apply due to a race condition within `kubectl apply`, this mitigates that issue.
Fri Sep 15 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5d0e520 by Kiall Mac Innes kiallAATTmacinnes.ie Update paths to match SLES based Dex container The SLES based dex container does not put dex in /usr/local/bin, additionally, we install the web content in /usr/share/caasp-dex/web. Part of bsc#1058833
Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e966106 by Michal Jura mjuraAATTsuse.com Add OpenStack block storage version as a option
Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 8e90c5c by Kiall Mac Innes kiallAATTmacinnes.ie Include kube-apiserver in the dex role Without this, We\'re seeing an error post-bootstrap, so deployments look green, but fail with: The following requisites were not found: require: id: kube-apiserver
Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit cc32e39 by Robert Roland robert.rolandAATTsuse.com Switch to the sles12/caasp-dex image
Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6c2b47a by Michal Jura mjuraAATTsuse.com Add orchestration for etcd storage \'etcd2\' to \'etcd3\' In Kubernetes v1.7 default storage backend for apiserver is \'etcd3\'. We need orchestrate migration between version \'etcd2\' and \'etcd3\'.
Wed Sep 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c26d987 by Robert Roland rob.rolandAATTgmail.com Role-based access control (#192) Adding role-based access control based on CoreOS Dex and OpenLDAP
Tue Sep 12 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 2b5dd9b by Nikhil Manchanda SlickNikAATTgmail.com Add cluster role binding for tiller Tiller requires a cluster role binding to work correctly with the new RBAC changes. Add this cluster role binding so that helm commands work correctly.
Tue Sep 12 14:00:00 2017 containers-bugownerAATTsuse.de - Commit efd8877 by Rafael Fernández López ereslibreAATTereslibre.es Set etcd3 as default backend storage
Sat Sep 9 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 3e9bcd6 by Kiall Mac Innes kiallAATTmacinnes.ie Move External FQDN to 127.0.0.1 address s was added to ensure Dex was always reachable, however, with multi masters, this name was assigned to 3 different lines in /etc/hosts. Most consumers of /etc/hosts do not deal with this as they would a round-robin DNS entry which returns multiple IPs. When the \"selected\" master is powered off, this name continues to resolve the same dead IP address. As Dex uses a NodePort service, putting this to 127.0.0.1 works as we expect it to.
Fri Sep 8 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5e89d99 by Alvaro Saurin alvaro.saurinAATTgmail.com Refactor the wait-for-apiserver so it can be used in some other parts of the code
Fri Sep 8 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5a13bbc by Kiall Mac Innes kiallAATTmacinnes.ie Ensure systemd is reloaded after units are changed Ensure systemd is reloaded as soon as a unit is changed, rather than relying on a task later within the orchestration to execute. Fixes bsc#1057641
Fri Sep 8 14:00:00 2017 containers-bugownerAATTsuse.de - Commit a601b38 by Kiall Mac Innes kiallAATTmacinnes.ie Include short hostname for masters The short hostname for masters was not being set, as it was for both the admin node, and worker nodes Fixes bsc#1057794
Fri Sep 8 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 755ad7c by Sam Leavens rbwsamAATTgmail.com Adding optional addon for Helm\'s tiller
Fri Sep 8 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e0727d2 by Kiall Mac Innes kiallAATTmacinnes.ie Combine etcd and etcd-proxy formulas The base etcd formula is never used on it\'s own, lets remove this unnecessary complexity.
Thu Sep 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c0bbaba by Kiall Mac Innes kiallAATTmacinnes.ie Include both v2 and v3 flags in etcdctl vars
Tue Sep 5 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c1c851c by Robert Roland rob.rolandAATTgmail.com Role-based access control (#192) Adding role-based access control based on CoreOS Dex and OpenLDAP
Wed Aug 30 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 66b0de2 by Aishwarya Thangappa aishwarya.thangappaAATTgmail.com Update docker images for KubeDNS to ones based on SLES from the rpms in MicroOS
Tue Aug 29 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 67846f6 by Kiall Mac Innes kiallAATTmacinnes.ie Fix flannel config for 0.8.0 Flannel in 0.8.0 rejects the \"-logtostderr\" flag we were providing, this doesn\'t seem to have ever been an option, however it was silently ignored in the past.
Tue Aug 29 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5c4bf44 by Michal Jura mjuraAATTsuse.com Set kube-apiserver storage backend as option Parametrize Kubernetes apiserver storage backend. This will be used in future for migration process from storage etcd2 to etcd3.
Fri Aug 25 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 0a8f3e2 by Michal Jura mjuraAATTsuse.com Add cloud provider integration for OpenStack Storage Commit 885cc4d by Michal Jura mjuraAATTsuse.com Add cloud provider integration for OpenStack LoadBalancer
Tue Aug 22 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6ac7ffb by Kiall Mac Innes kiallAATTmacinnes.ie Use haproxy to load balance Kube API requests Now that we can have multiple masters, we need a way for the various services and end-users to be load balanced over the set of kube-api servers. We install haproxy on each node, inside a docker container, configured to load balance requests over all the cluster masters. This haproxy is configured to listen on 0.0.0.0 on the masters, and 127.0.0.1 on the workers. This is to allow the minions to simply \"talk\" to 127.0.0.0, and be routed to an active kube-api server.
Mon Aug 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 2269176 by Kiall Mac Innes kiallAATTmacinnes.ie Use apply instead of create for addons kubectl apply is generally idempotent, while kubectl create is not. With multi-master now enabled, if two masters execute this script at once, one of them is likely to fail given the check+set race within this script - Switching to apply removes part of this this C+S race. The second part of this race, is it client-side decision by apply to create or update, by retrying the command once if it fails, we can ensure when two masters run this script at the same time, for the first time, the C+S race will be avoided here too.
Mon Aug 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit b470a20 by Kiall Mac Innes kiallAATTmacinnes.ie Ensure k8s_etcd.get_cluster_size works for multi-master If we had enough masters to form a etcd cluster, we would end up returning \"None\" from this method, preventing the cluster formation.
Mon Aug 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 06033b3 by Alvaro Saurin alvaro.saurinAATTgmail.com Wait for the API server after starting the service.
Mon Aug 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit af41306 by Alvaro Saurin alvaro.saurinAATTgmail.com Do not generate an empty --proxy line in curlrc
Fri Aug 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit bdd9b9c by Kiall Mac Innes kiallAATTmacinnes.ie Grow flannel CIDR to accommodate 1024 workers Flannel was setup such that 150 workers could obtain a subnet before there were not none left. By growing this range, and the size of the individual allocations, we allow for up to 1024 workers with 510 pods on each. bsc#1047847
Thu Aug 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 4b40d4c by Aishwarya Thangappa aishwarya.thangappaAATTgmail.com Add kube-dns service account
Thu Aug 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e1d5650 by Kiall Mac Innes kiallAATTmacinnes.ie Disable Salt\'s Job Cache Salt\'s job cache is buggy, causing random failures to lookup mine data, which in turn causes our deployments to fail. Fixes bsc#1054256
Thu Aug 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7c47d63 by Alvaro Saurin alvaro.saurinAATTgmail.com Properly wait for a HTTP endpoint
Wed Aug 16 14:00:00 2017 containers-bugownerAATTsuse.de - Commit a4a049e by Kiall Mac Innes kiallAATTmacinnes.ie Kube-API: Set storage-backend to etcd2 In our current configuration, kube-api logs a series of errors unless this is set.
Wed Aug 9 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6caa9fa by Robert Roland robert.rolandAATTsuse.com Dedicated certificate for kube-controller-manager Commit 5e5dfb5 by Robert Roland robert.rolandAATTsuse.com Dedicated certificate for kube-proxy Commit afe4f63 by Robert Roland robert.rolandAATTsuse.com Dedicated certificate for kubelet Commit 8acea7c by Robert Roland robert.rolandAATTsuse.com Dedicated certificate for kube-scheduler Commit e59670e by Robert Roland robert.rolandAATTsuse.com Adapting kube-apiserver wait fix into this branch Commit c4eef4d by Robert Roland robert.rolandAATTsuse.com eliminated the kubernetes-master formula the daemons are all separate now, so it\'s controlled by role membership in the top.sls file moved addons to a separate salt formula Commit 9232705 by Robert Roland robert.rolandAATTsuse.com kube-proxy as a separate salt formula Commit 15ff190 by Robert Roland robert.rolandAATTsuse.com kubelet as a separate salt formula Commit 4412b9d by Robert Roland robert.rolandAATTsuse.com kube-scheduler as its own formula fixing a bug where we uncordon master nodes. but we should never do that. Commit 4662dd1 by Robert Roland robert.rolandAATTsuse.com kube-controller-manager as a separate formula Commit ee9fb0b by Robert Roland robert.rolandAATTsuse.com kube-apiserver as a separate formula Makes a dedicated formula for the kube-apiserver Generates a cert specifically for the kube-apiserver
Mon Aug 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 65b9e9c by Robert Roland robert.rolandAATTsuse.com can\'t talk to 6443 without a client cert talk to the insecure-bind-address instead. Commit 5c6d2e1 by Kiall Mac Innes kiallAATTmacinnes.ie Wait for Kube-API before installing Kube-DNS
Thu Aug 3 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 3a6869d by Aishwarya Thangappa aishwarya.thangappaAATTgmail.com Install Kube-DNS by default 1. Removed the skydns template files and added kubedns template files. We will be using deployments instead of replication controllers. 2. Modified the deploy script to check for the existence of kube-dns deployment, kube-dns service and config map before creating one. 3. Turned on the addon:dns flag so as to install KubeDNS by default.
Wed Aug 2 14:00:00 2017 containers-bugownerAATTsuse.de - Commit d1abfaa by Thomas Hipp thippAATTsuse.de update k8s version Signed-off-by: Thomas Hipp
Tue Aug 1 14:00:00 2017 containers-bugownerAATTsuse.de - Commit bc3adf7 by Robert Roland robert.rolandAATTsuse.com Explicit dependency ordering Commit 1086ebf by Robert Roland robert.rolandAATTsuse.com Run kubelet and kube-proxy on the master node A standard Kubernetes installation runs a kubelet and kube-proxy on every node, and then you decide where to run apiserver, controller-manager and scheduler. This change is required to support RBAC, DaemonSets and many other changes. Requires an updated kubernetes-client package that contains: https://build.opensuse.org/request/show/494998
Thu Jul 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5df94da by Kiall Mac Innes kiallAATTmacinnes.ie Delay reboots during upgrade by 15 seconds Even with backgrounding the call, salt-minion sometimes still does not have enough time to respond before systemd shuts down salt-minion on some environments. By adding a 15 second delay, we give salt-minion much more time than it should need in a healthy cluster to respond. Additionally, switch from the deprecated syntax for supplying bg=True, to the newer syntax which no longer logs a warning. Followup up fix for bsc#1049200
Thu Jul 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 4920c7a by Rafael Fernández López ereslibreAATTereslibre.es Do not publish the `ca.crt` from the `ca` SLS, use `mine_functions` We will be publishing this contents when the `ca` minion starts, so there\'s no need to do this during the orchestration. `mine.send` is not reliable enough since we cannot confirm that the contents are there yet, and waiting a random amount of time is not appropriate as we are just hiding the real problem. In the near future we can do an active wait for the content to be there using `retry`, but for now we just publish the contents of the `ca.crt` using `mine_functions`, so it is sent when the `ca` minion starts. There\'s no need to refresh the mine, as this was just hiding the real problem when we were publishing this contents during the orchestration phase. Fixes: bsc#1049137 Fixes: bsc#1048548
Wed Jul 19 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 3e5cf9f by Kiall Mac Innes kiallAATTmacinnes.ie Add extra requisites to the update orchestration These additional requisites enforce a stricter ordering of tasks during the upgrade. In some case, \"-set-update-grain\" would not execute in the right place, potentially leading to a failed upgrade. bsc#1045381
Wed Jul 19 14:00:00 2017 containers-bugownerAATTsuse.de - Commit d97a24e by Kiall Mac Innes kiallAATTmacinnes.ie Don\'t wait for minion responses when rebooting When we instruct a minion to reboot, we can\'t reliably wait for the response from salt-minion letting us know that the \"systemctl reboot\" command succeeded, as systemd may choose to shutdown the salt-minion service before it can sent out the \"Yes, that worked\" response. Salt does not make any attempt to finish in progress tasks when it receives a SIGTERM, leaving us with few other viable choices for this. Fixes bsc#1049200
Tue Jul 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 0692dbf by Rafael Fernández López ereslibreAATTereslibre.es Explicitly refresh the mine on all minions after the `ca` has published the `ca.crt` We will explicitly force all minions to refresh the mine after the `ca` minion has published the `ca.crt` certificate on the mine, to avoid rendering problems with later SLS being executed. It might happen that a minion was missing this information on its mine, so the rendering of the SLS failed, effectively stopping the whole orchestration process. Fixes: bsc#1048548
Mon Jul 17 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 219b7d5 by Kiall Mac Innes kiallAATTmacinnes.ie Upgrade: Wait longer for minions to reboot Wait 1200 seconds (20 minutes) for minions to reboot, instead of the default 300 seconds (5 minutes). We increase this to cover off cases where slower to boot physical hardware is used. 20 minutes was chosen as, I\'ve seen physical hardware take 10-12 minutes in the past, and someone likely has something that is slower to reboot. bsc#1048683
Fri Jul 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 1e41512 by Alvaro Saurin alvaro.saurinAATTgmail.com Add some extra naames to the AIP server certificate (bsc#1033671)
Fri Jul 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6b146d5 by Maximilian Meister mmeisterAATTsuse.de make branch safe by transforming slashes to dashes Signed-off-by: Maximilian Meister Commit 588b834 by Maximilian Meister mmeisterAATTsuse.de packaging: make branch configurable Signed-off-by: Maximilian Meister
Fri Jul 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6b146d5 by Maximilian Meister mmeisterAATTsuse.de make branch safe by transforming slashes to dashes Signed-off-by: Maximilian Meister Commit 588b834 by Maximilian Meister mmeisterAATTsuse.de packaging: make branch configurable Signed-off-by: Maximilian Meister
Fri Jul 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c59070d by Rafael Fernández López ereslibreAATTereslibre.es Fix `ca` key path This was a leftover from the previous implementation. Now the ca key is present under `/etc/pki/private` in the ca container too (as it mounts `/etc/pki`)
Thu Jul 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit b6281ae by Kiall Mac Innes kiallAATTmacinnes.ie Ensure grains are always refreshed periodically Salt\'s grains_refresh_every configuration param does not quite do what we need it to, it\'s failing to refresh grains from the `grains` file - leading to updates going undetected. This change adds a slightly modified version of what this config param internally does, adding the force_refresh: True argument, ensuring we correctly refresh. bsc#1048583
Tue Jul 11 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 88e9ff9 by Rafael Fernández López ereslibreAATTereslibre.es Keep `job_cache: True` as it\'s discouraged to disable it Our deployment is also failing probably due to the fact that we were disabling the salt `job_cache`. Commit b0547af by Miquel Sabaté Solà msabateAATTsuse.com Set MySQL as the job cache for the Salt master First of all, we can specify an external job cache. If we don\'t do that, then the `keep_jobs` option only applies to the local cache. This means that Salt will not clean up jobs, events and returns older than the specified `keep_jobs` value (default: 24h) for the MySQL returner that we have already configured. Moreover, since we\'d already be using MySQL as a job cache, we don\'t have to use the local system (/var/cache/salt/master/jobs/) as a cache (note that Salt would still be using this directory to avoid JID collisions). The documentation also says that the local cache can be a burden for large deployments. See bsc#1044133 Signed-off-by: Miquel Sabaté Solà
Tue Jul 11 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 31ad98d by Michal Jura mjuraAATTsuse.com Don\'t duplicate log level argument for k8s services, bsc#1046407
Tue Jul 11 14:00:00 2017 containers-bugownerAATTsuse.de - Commit fcbfd6b by Michal Jura mjuraAATTsuse.com Make log level configurable for dockerd service, bsc#1046407 Set the logging level for dockerd, possible values are: [ debug, info, warn, error, fatal ]
Tue Jul 11 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e3c9c21 by Kiall Mac Innes kiallAATTmacinnes.ie Add Jenkinsfile The Jenkinsfile in each repo, if we adopt Jenkins in the end, will be very thin, including just a single library load, and a single method call. This prevents us from needing to keep each projects Jenkinsfile in sync as CI changes are made.
Mon Jul 10 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 08a0960 by Kiall Mac Innes kiallAATTmacinnes.ie Revert \"Set MySQL as the job cache for the Salt master\" This reverts commit de22c660a99bc1425295c86be7d7dc3e79089845.
Mon Jul 10 14:00:00 2017 containers-bugownerAATTsuse.de - Commit de22c66 by Miquel Sabaté Solà msabateAATTsuse.com Set MySQL as the job cache for the Salt master First of all, we can specify an external job cache. If we don\'t do that, then the `keep_jobs` option only applies to the local cache. This means that Salt will not clean up jobs, events and returns older than the specified `keep_jobs` value (default: 24h) for the MySQL returner that we have already configured. Moreover, since we\'d already be using MySQL as a job cache, we don\'t have to use the local system (/var/cache/salt/master/jobs/) as a cache (note that Salt would still be using this directory to avoid JID collisions). The documentation also says that the local cache can be a burden for large deployments. See bsc#1044133 Signed-off-by: Miquel Sabaté Solà
Fri Jul 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit d2df0ed by Rafael Fernández López ereslibreAATTereslibre.es When generating the certificate use the pillar path Since we added the minion certificate location to the pillar, also take the public key location from the pillar, or the certificate generation will fail if the pillar value changes.
Fri Jul 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit ce45c56 by Rafael Fernández López ereslibreAATTereslibre.es Remove unneeded signing policies These signing policies were used when the CA wasn\'t containerized, when we containerized it, they were moved to `caasp-container-manifests`, and the CA container is mounting it from there. If we uncontainerize the CA in the future we can move it back if needed, but let\'s keep this clean so it\'s not misleading.
Fri Jul 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 871a9dc by Michal Jura mjuraAATTsuse.com Fix JINJA escaping for docker_opts in docker state module
Thu Jul 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 2bd42f5 by Rafael Fernández López ereslibreAATTereslibre.es Add prerequisite for key to be present on `cert` sls Add a specific dependency for the key to be present when generating the certificate for the minion.
Thu Jul 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit eb852df by Rafael Fernández López ereslibreAATTereslibre.es Add kubectl client certificate This certificate will be served by Velum when downloading the `kubeconfig` file, and is specific for that usage. Fixes: bsc#1046963
Fri Jun 30 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 9950702 by Kiall Mac Innes kiallAATTmacinnes.ie Ensure bootstrap_complete grain is set At the time this if block is called, the mine / grains sync hasn\'t happened yet. This reverts a change from commit fc8347c (bsc#1043589)
Fri Jun 30 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5e7c46f by Michal Jura mjuraAATTsuse.com Define etcdctl config file with SSL variables Let\'s add /etc/sysconfig/etcdctl with paths to the client server TLS files and endpoint. This will make possible to run etcdctl command in easy way, e.g. source /etc/sysconfig/etcdctl etcdctl cluster-health fixes bsc#1046818
Fri Jun 30 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 15748cd by Flavio Castelli fcastelliAATTsuse.com Handle curl proxy settings YaST is also configuring proxy settings inside of `/root/.curlrc`, this is needed because zypper is using libcurl. So if you run zypper from a cronjob or `su`, the `/etc/sysconfig/proxy` variables are not parsed and set in the environment. Which means, zypper will not use the proxy and fail. With `/root/.curlrc`, libcurl will use the proxies configured there. Signed-off-by: Flavio Castelli
Thu Jun 29 14:00:00 2017 containers-bugownerAATTsuse.de - Commit fc8347c by Rafael Fernández López ereslibreAATTereslibre.es Enable TLS on the salt-api service Fixes: bsc#1043589
Thu Jun 29 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 465a4d6 by Kiall Mac Innes kiallAATTmacinnes.ie Add proxy state to admin node Installs proxies onto the admin node - bsc#1043538 Commit a16c19e by Kiall Mac Innes kiallAATTmacinnes.ie Disable rebootmgr on admin node Once the system bootstraps, we now disable rebootmgr on the admin node. This allows the velum initiated updates to takeover and prevent any unexpected surprises. bsc#1046602 Commit ef8ba5b by Kiall Mac Innes kiallAATTmacinnes.ie Render /etc/hosts on admin node Render the /etc/hosts file on the admin node, so nodes are reacable via their internal FQDNs everywhere. Additionally, include the admin node in the /etc/hosts files. bsc#1045186
Thu Jun 29 14:00:00 2017 containers-bugownerAATTsuse.de - Commit eadd8e1 by Kiall Mac Innes kiallAATTmacinnes.ie Increase salt-master timeout When dealing with a large number of minions, timeouts are visible when using the default value of 5 seconds. Increasing the CPU/RAM resources allocated to the master helps, but given it it\'s short bursts of heavy usage (bootstrap and upgrade), this shouldn\'t be necessary. We increase the timeout from 5 to 20 seconds, allowing tasks to take longer yet still succeed.
Wed Jun 28 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 3f2c44b by Graham Hayes graham.hayesAATTsuse.com bsc#1045381 Ensure updates do not conflict with etc-hosts This ensure that the etc-hosts orchestration does not run during an upgrade, as this can cause conflicts on the nodes, which cause salt to fail to complete an `orch.update` run.
Tue Jun 27 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5f492f9 by Graham Hayes graham.hayesAATTsuse.com Turn off `auto_accept`
Mon Jun 26 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 197d164 by Michal Jura mjuraAATTsuse.com Enable etcd authentication based on client certificates Enable ETCD_CLIENT_CERT_AUTH and ETCD_PEER_CLIENT_CERT_AUTH in etcd-proxy state module. - Enable client cert authentication ETCD_CLIENT_CERT_AUTH=\"true\" - Enable peer client cert authentication. ETCD_PEER_CLIENT_CERT_AUTH=\"true\" Commit 970a590 by Michal Jura mjuraAATTsuse.com Use Kubernetes API server etcd ssl Commit 776bf33 by Michal Jura mjuraAATTsuse.com Enable https for flanneld service Commit b762959 by Michal Jura mjuraAATTsuse.com Add ssl pillar profile Commit 07a5652 by Michal Jura mjuraAATTsuse.com Enable https for etcd-proxy services All these fixes bsc#1043595
Fri Jun 23 14:00:00 2017 containers-bugownerAATTsuse.de - Commit a567814 by Kiall Mac Innes kiallAATTmacinnes.ie Ensure CA fields are static (bsc#1045766) As the DHCP domain name can change, we should avoid using it in our CA cert in order to prevent it being unnecessarily regenerated. Fixes bsc#1045766
Thu Jun 22 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 9e20d89 by Alvaro Saurin alvaro.saurinAATTgmail.com Option for using the proxy settings system-wide (bsc#1036627)
Wed Jun 21 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 5042479 by Rafael Fernández López ereslibreAATTereslibre.es Do not run etcd discovery on every orchestration run, only the first time When adding new nodes, the `orch.kubernetes` orchestration was failing because etcd is refusing to start since the etcd discovery mechanism was already used when bootstrapping the cluster. With this change we ensure that we use the discovery mechanism only when we are boostrapping the cluster.
Tue Jun 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e51791e by Kiall Mac Innes kiallAATTmacinnes.ie Set etcd batch size to 3 nodes Currently, we never ask for more than 3 members. Setting this to 3 ensures we don\'t let more than 3 members attempt etcd discovery before a cluster has been fully formed. If we have less this 3, this will still succeed, as the exact number of members we expect will also end up attempting discovery at the same time.
Tue Jun 20 14:00:00 2017 containers-bugownerAATTsuse.de - Commit a13010e by Rafael Fernández López ereslibreAATTereslibre.es Do not fail if `salt.function` has no minions to target Currently, `update-etc-hosts` orchestration fails because `update_mine` `salt.function` cannot target any minions at the beginning, and since this is a prerequisite for other states, the Reactor orchestration fails. Only call to these `salt.function` if there are any minions to target.
Fri Jun 16 14:00:00 2017 containers-bugownerAATTsuse.de - Commit d2f8840 by Rafael Fernández López ereslibreAATTereslibre.es Add missing `tgt_type` so we target the minions we intend to This last step on the orchestration was returning a `False` result because no targets were found to execute the grain set.
Fri Jun 16 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 9ddaa5a by Flavio Castelli fcastelliAATTsuse.com salt-api: listen to localhost [bsc#1043589] Do not expose the salt-api to the entire world. This is needed only by Velum to trigger salt actions. Given both the containers use the same network namespace we can just bind this service to localhost. By doing that we are going to reduce the attack surface. This fixes one of the two issues reported by bsc#1043589 Signed-off-by: Flavio Castelli
Thu Jun 15 14:00:00 2017 containers-bugownerAATTsuse.de - Commit a99d516 by Aishwarya Thangappa aishwarya.thangappaAATTgmail.com Making the cluster-dns and cluster-domain arguments default Right now, caasp doesn\'t support kube-dns out of the box. If customers wanted to have dns support, they have to bring it up on their own by using `kubectl create -f kubedns.yaml`. But this will not work until you add the cluster-dns and cluster-domain arguments to kubelet args and restart the kubelet. While doing this manually in every node is one pain point, salt will try to bring it back to its original state. Meaning that the changes you made to the kubelet args will no longer be there. So, unless you bring up the caasp cluster with the addon set to true, you cannot have kube-dns working reliably on the cluster. This change will make it a little easier, by having these arguements by default in every node.
Wed Jun 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 706837b by Graham Hayes graham.hayesAATTsuse.com Ensure that reactor states only run on completed nodes This ensures that we do not run reactor orchestrations on nodes that have not completed bootstrapping. This ensures that a node cannot have 2 states applied to it at the same time.
Wed Jun 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e44cf82 by Kiall Mac Innes kiallAATTmacinnes.ie Remove concurrent=True from orchestrations Salt\'s documentation calls this option out as dangerous, staging that the state must be able to be ran concurrently. This is not something we can reasonably ensure works, so lets not use it. From Salt\'s documentation: This flag is potentially dangerous. It is designed for use when multiple state runs can safely be run at the same time. Do not use this flag for performance optimization.
Wed Jun 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 3fd0d08 by Kiall Mac Innes kiallAATTmacinnes.ie Refresh grains at the start of orchestration Additionally, refresh pillars at the start of update-etc-hosts.sls for consistency.
Wed Jun 14 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7d0a037 by Graham Hayes graham.hayesAATTsuse.com Update transactional-update to use \"salt\" option This will ensure that the transactional-update code will write a grain (`tx_update_reboot_needed:true`) on the node instead of rebooting the node. This also allows for increasing the frequency of the snapshots being built
Tue Jun 13 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 91d649f by Alvaro Saurin alvaro.saurinAATTgmail.com React to IP changes by using beacons
Mon Jun 12 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 53e389f by Rafael Fernández López ereslibreAATTereslibre.es Only run `service.dead` on salt minions that we know support it. The `ca` container was reporting this error during the orchestration: ``` service.dead { \"__run_num__\": 0, \"_stamp\": \"2017-06-12T10:33:29.009340\", \"changes\": {}, \"comment\": \"State \'service.dead\' was not found in SLS \'rebootmgr\' Reason: \'service\' __virtual__ returned False: No service execution module loaded: check support for service management on SLES-12 \", \"name\": \"rebootmgr\", \"result\": false, \"retcode\": 2 } ``` Also, the overall result of the orchestration was not successfully (despite individual highstates reported success) because of this. Containers don\'t have `systemctl` available, so `salt` doesn\'t know how to handle this. Right now, rely on our roles for doing this (despite we could have used `virtual` grain -- but for some reason a container reports `physical`, which doesn\'t help) -- at least with the `salt` version we are currently using. The orchestration result overall looks like this with this change: ``` \"outputter\": \"highstate\", \"retcode\": 0 }, \"success\": true, \"user\": \"saltapi\" } ```
Mon Jun 12 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 0cd2559 by Graham Hayes graham.hayesAATTsuse.com Batch runs of the `cert` state This allows more nodes to be deployed without causing timeouts and failed runs on the `cert` state. Also, remove concurrecny from the etcd member and proxy to ensure members are created before proxies bsc#1038814
Fri Jun 9 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 9b3652a by Kiall Mac Innes kiallAATTmacinnes.ie Revert \"Add module for removing etcd cluster members\" - bsc#1043676 This reverts commit 27a4e81c331dc345e56266a57c5dcd86d1c1a177 Commit befe0b5 by Kiall Mac Innes kiallAATTmacinnes.ie Revert \"Add etcd_info salt grain module\" - bsc#1043676 This reverts commit da17af3f0f9cb89a9057618b7561074a4e35818e.
Wed Jun 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 4132fa9 by Rafael Fernández López ereslibreAATTereslibre.es Remove hardcoded secrets
Wed Jun 7 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 27a4e81 by Michal Jura mjuraAATTsuse.com Add module for removing etcd cluster members
Tue Jun 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 40d8e9b by Robert Roland robert.rolandAATTsuse.com Fixing broken build Need to remove a reference to /var/lib/etcd if salt isn\'t managing it anymore
Tue Jun 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 1100cfe by Graham Hayes graham.hayesAATTsuse.com Stop managing /var/lib/etcd in salt This dir is created by the etcd rpm, and permissions are maintained by etcd when it is running The salt and etcd disagree an what these permissions are causing extra \"changed\" entries. As etcd is changing them to what it needs, and the directory is created by etcd (and its RPM) we should not try and manage it.
Tue Jun 6 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 26fa83b by Jordi Massaguer Pla jmassaguerplaAATTsuse.de use git revision in package version this way zypper sees each new commit as an update Otherwise, using the date, will create a conflict if 2 commits are from the same day Signed-off-by: Jordi Massaguer Pla
Fri Jun 2 14:00:00 2017 containers-bugownerAATTsuse.de - Commit e706873 by Michal Jura mjuraAATTusers.noreply.github.com Enable https for all services and create dedicated ssl pillar profile (#86) * Enable https for etcd-proxy services * Enable https for flanneld service * Add ssl pillar profile * Use Kubernetes API server etcd ssl
Fri Jun 2 14:00:00 2017 containers-bugownerAATTsuse.de - Commit da17af3 by Michal Jura mjuraAATTsuse.com Add etcd_info salt grain module To maintaine etcd cluster configuration by salt, it is needed to get etcd status about members and their roles in etcd cluster. This etcd_info grain module provides followind information: - \'etcd_module\' - return \"available\" if python-etcd module is installed - \'members_all\' - return list of all members in etcd cluster - \'member_type\' - return role of local etcd service, possible values \"proxy\", \"member\", \"leader\" - \'member_id\' - return unique id of local etcd service in the cluster This grain module will be used by salt_delete state module for removing etcd nodes from the cluster. To run this module is required to install following packages: - python-etcd - python-urllib3 - python-dnspython
Fri Jun 2 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7031d71 by Victor Palade vpaladeAATTsuse.com disable reboot manager when orchestration happens
Fri Jun 2 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 9815b3b by Rafael Fernández López ereslibreAATTereslibre.es Ensure our states are idempotent - Adapt some `cmd.run` to use `onchanges`, so they only execute when their `watched` states change. - Add `stateful: True` to some `cmd.run`s, so following the salt protocol for this we ensure that the command didn\'t change anything in the system state. - Move `ca-cert` to its own SLS, so `cert` will only now generate the `/etc/pki/minion.{key,crt}` files. - The `cert` SLS will now be the only responsible for generating certificates depending on the role of the machine. This way we ensure that without mattering how this SLS is included it behaves in the same way under all conditions. We might want to use a certificate for different services, but that will need some extra changes. - Change some `module.run` to `module.wait` so they only execute when the `watched` states change. - Remove cleanups that make it impossible to have idempotent states.
Fri Jun 2 14:00:00 2017 containers-bugownerAATTsuse.de - Commit c0667e3 by Kiall Mac Innes kiallAATTmacinnes.ie Don\'t change the system hostname Operators don\'t want us to change the system hostname, which we previously did to account for environments which don\'t provide unique DHCP hostnames. We\'ll undo this change, as we have now removed our reliance on the system default hostname. Fixes bsc#1041789
Thu Jun 1 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 86ae430 by Alvaro Saurin alvaro.saurinAATTgmail.com Update the /etc/hosts by using a loop, so the file doesn not grow indefinetively. Do not set the IP address for API server in the API servers to 127.0.0.1 Commit acb76f3 by Alvaro Saurin alvaro.saurinAATTgmail.com Add the kubelet port configurable with a Pillar variable Open the kubelet port in the firewall
Thu Jun 1 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 8bc25b2 by Kiall Mac Innes kiallAATTmacinnes.ie Add a caasp_fqdn grain and migrate to it This adds a caasp_fqdn grain and migrates usage of fqdn to it. This is needed because the fqdn grain has proved unrelable, where we know *exactly * what we want, and salt\'s detection will be broken by a upcoming change. Partial fix for bsc#1041789
Thu Jun 1 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7f7d9aa by Graham Hayes graham.hayesAATTsuse.com Initial framework of update orchestration
Thu Jun 1 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 631ea1d by Kiall Mac Innes kiallAATTmacinnes.ie Allow for clean shutdown of nodes Add a stop SLS for each service we wish to shutdown clearly, doing any necessary pre-stop actions such as draining kubelet.
Tue May 30 14:00:00 2017 containers-bugownerAATTsuse.de - Commit d8ce355 by Rafael Fernández López ereslibreAATTereslibre.es Do not include etcd-proxy on this last action This triggers a chain reaction when the reboot sls is called directly (salt-call state.apply reboot) on the last step of the orchestration, since etcd-proxy includes etcd, and etcd includes cert. Cert sls will generate a new certificate overriding the current one with all the correct DNS names and IP addresses, by one that only contains `fqdn` as the only dns name. Fixes: bsc#1040858
Mon May 29 14:00:00 2017 containers-bugownerAATTsuse.de - Commit daadead by Rafael Fernández López ereslibreAATTereslibre.es - Make cert always include `fqdn` - - The only component that was adding `fqdn` to the list of dns names of SAN - certificates is the `kube-master` role. - - However, depending on the size of the cluster and other possible reasons it - might happen that a etcd member falls in a `kube-minion` instance, where the - certificate is missing local ip addresses, as well as the `fqdn` of the - machine. With this change, we are enforcing `cert` to always generate this - information automatically, while we still allow to extend it, in case that\'s - still necessary (for example, as kubernetes-master still requires). - - Check https://bugzilla.novell.com/show_bug.cgi?id=1039269#c9 for further - information. - - Fixes: bsc#1039269
Fri May 26 14:00:00 2017 containers-bugownerAATTsuse.de - Commit ce5954e by Alvaro Saurin alvaro.saurinAATTgmail.com - Minor changes in etcd: do not remoove /var/lib/etcd and close some ports we - don\'t really need
Thu May 25 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 7317ca8 by Miquel Sabaté Solà msabateAATTsuse.com - docker: reload container-feeder after starting docker - - See bsc#1040579 - - Signed-off-by: Miquel Sabaté Solà
Tue May 23 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 6013d74 by Robert Roland rob.rolandAATTgmail.com - Update etcd.conf - - Stray + character was causing this line to not execute, and I ended up with a - cluster with both folders present, preventing etcd from starting.
Mon May 22 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 824101b by Alvaro Saurin alvaro.saurinAATTgmail.com - Fix some problems with Docker when HTTP proxy vars are empty
Thu May 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 4f664e1 by PI-Victor palade.ionutAATTgmail.com - revert changes to etcd systemd drop-in unit
Thu May 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit bace710 by Rafael Fernández López ereslibreAATTereslibre.es - Add apiserver main hostname - - Fixes: bsc#1039437
Thu May 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit 88c1434 by Michal Jura mjuraAATTsuse.com - Configure ETCD_INITIAL_ADVERTISE_PEER_URLS only with FQDN - - We have to remove IP based ETCD_INITIAL_ADVERTISE_PEER_URLS, because they use - HTTPS, which is failing for IP URLS with following error - - health check for peer 100fbbb05571e58f could not connect: x509: - cannot validate certificate for 10.17.3.176 because it doesn\'t contain any - IP SANs
Thu May 18 14:00:00 2017 containers-bugownerAATTsuse.de - Commit fcc6f23 by Alvaro Saurin alvaro.saurinAATTgmail.com - Handle proxies in the docker daemon
Tue May 16 14:00:00 2017 containers-bugownerAATTsuse.de - Use colons as nesting instead of dots
Tue May 16 14:00:00 2017 containers-bugownerAATTsuse.de - Do a deeper cleanup before restarting etcd Some etcd deps Take flannel setup out of the master Perform flannel setup before k8s master setup
Thu May 11 14:00:00 2017 containers-bugownerAATTsuse.de - bump number of worker threads * to avoid minion calls to master timing out * fixes https://github.com/kubic-project/salt/issues/62
Mon May 8 14:00:00 2017 containers-bugownerAATTsuse.de - Initial config files for the reactor, with an example sls for presence
Tue May 2 14:00:00 2017 containers-bugownerAATTsuse.de - Renamed docker registry variable
Tue May 2 14:00:00 2017 containers-bugownerAATTsuse.de - Update etcd member count logic
Tue May 2 14:00:00 2017 containers-bugownerAATTsuse.de - Cleanup the docker options
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Set Hostname to match machine-id
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Fix Jinja2 syntax error in kubelet.jinja
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Fix Jinja2 syntax error in kubeconfig.jinja
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Use some constant names for the API server
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Use machine ID and domain as kubelet hostname
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Update default etcd cluster size to match number of masters
Thu Apr 27 14:00:00 2017 containers-bugownerAATTsuse.de - Configure kube-{scheduler/controller-manager} leader elections
Tue Apr 25 14:00:00 2017 containers-bugownerAATTsuse.de - [WIP] Use machine ID as kubelet hostname
Mon Apr 24 14:00:00 2017 containers-bugownerAATTsuse.de - Replace the SVGs by PNGs
Mon Apr 24 14:00:00 2017 containers-bugownerAATTsuse.de - Some docs
Wed Apr 19 14:00:00 2017 containers-bugownerAATTsuse.de - Cleanup
Wed Apr 19 14:00:00 2017 containers-bugownerAATTsuse.de - Do not assume minion_id is hostname/fqdn
Tue Apr 18 14:00:00 2017 containers-bugownerAATTsuse.de - Allow the kubelet to run on Kubernetes 1.6
Mon Apr 10 14:00:00 2017 containers-bugownerAATTsuse.de - Bug 1032379 - Must install flanneld on the kubernetes master node
Wed Mar 29 14:00:00 2017 containers-bugownerAATTsuse.de - Actually use `grains.get` default value
Tue Mar 28 14:00:00 2017 containers-bugownerAATTsuse.de - Always set `CN`. Even if no grains are set (because the domain could not be inferred), set the default dns domain from the pillar.
Tue Mar 28 14:00:00 2017 containers-bugownerAATTsuse.de - Fix etcd deps
Tue Mar 28 14:00:00 2017 containers-bugownerAATTsuse.de - Make etcd state a requirement for states that need etcd running on localhost
Mon Mar 27 14:00:00 2017 containers-bugownerAATTsuse.de - Do not indent (it\'s not a mine_function)
Mon Mar 27 14:00:00 2017 containers-bugownerAATTsuse.de - Fixed the infra container path for CaaSP
Mon Mar 27 14:00:00 2017 containers-bugownerAATTsuse.de - Do not set certificate `CN` if domain was not specified by a grain
Thu Mar 23 13:00:00 2017 containers-bugownerAATTsuse.de - Added parameters for passing extra arguments
Tue Mar 21 13:00:00 2017 containers-bugownerAATTsuse.de - Renamed API server vars
Mon Mar 20 13:00:00 2017 containers-bugownerAATTsuse.de - fix infra container image (=pause image) for opensuse
Mon Mar 20 13:00:00 2017 containers-bugownerAATTsuse.de - pod_infra_container_image is not optional anymore
Mon Mar 20 13:00:00 2017 containers-bugownerAATTsuse.de - Revert 6bae304 and fe1677c
Mon Mar 20 13:00:00 2017 containers-bugownerAATTsuse.de - fix etcd proxy instance failure on restart
Mon Mar 20 13:00:00 2017 containers-bugownerAATTsuse.de - Renamed API server vars
Fri Mar 17 13:00:00 2017 containers-bugownerAATTsuse.de - packaging: fix name of tarball directory
Fri Mar 17 13:00:00 2017 containers-bugownerAATTsuse.de - packaging: fix name of tarball directory
Fri Mar 17 13:00:00 2017 containers-bugownerAATTsuse.de - packaging: fix name of tarball directory
Thu Mar 9 13:00:00 2017 jmassaguerplaAATTsuse.com - Disable service as it needs to be this way in the final repo
Fri Mar 3 13:00:00 2017 alvaro.saurinAATTsuse.com - Updated for CaaSP
Thu Feb 23 13:00:00 2017 alvaro.saurinAATTsuse.com - Updated for k8s 1.5.3
Thu Feb 23 13:00:00 2017 alvaro.saurinAATTsuse.com - Initial version
|
|
|