Commit Graph

13 Commits

Author SHA1 Message Date
Ritesh H Shukla
35a750ac21 Remove kube-up for vsphere 2016-12-22 20:15:37 +00:00
Weixu Zhuang
e35c1ccba2 Implement Azure cloud provider scripts
Implement basic cloud provider functionality to deploy Kubernetes on
Azure.  SaltStack is used to deploy Kubernetes on top of Ubuntu
virtual machines.  OpenVpn provides network connectivity.  For
kubelet authentication, we use basic authentication (username and
password).  The scripts use the legacy Azure Service Management APIs.

We have set up a nightly test job in our Jenkins server for federated
testing to run the e2e test suite on Azure.  With the cloud provider
scripts in this commit, 14 e2e test cases pass in this environment.
We plan to implement additional Azure functionality to support more
test cases.
2016-06-17 23:46:03 -07:00
Weixu Zhuang
4523429b20 Azure/ubuntu/saltstack support re-instated
This first reverts commit 8e8437dad8.
Also resolves conflicts with docs on f334fc41
And resolves conflicts with https://github.com/kubernetes/kubernetes/pull/22231/commits
to make people switching between two different methods of setting up by
setting env variables.

Conflicts:
	cluster/get-kube.sh
	cluster/saltbase/salt/README.md
	cluster/saltbase/salt/kube-proxy/default
	cluster/saltbase/salt/top.sls
2016-06-17 23:41:41 -07:00
Alain Roy
fa9d79df75 Initial kube-up support for VMware's Photon Controller
This is for: https://github.com/kubernetes/kubernetes/issues/24121

Photon Controller is an open-source cloud management platform. More
information is available at:
http://vmware.github.io/photon-controller/

This commit provides initial support for Photon Controller. The
following features are tested and working:
- kube-up and kube-down
- Basic pod and service management
- Networking within the Kubernetes cluster
- UI and DNS addons

It has been tested with a Kubernetes cluster of up to 10
nodes. Further work on scaling is planned for the near future.

Internally we have implemented continuous integration testing and will
run it multiple times per day against the Kubernetes master branch
once this is integrated so we can quickly react to problems.

A few things have not yet been implemented, but are planned:
- Support for kube-push
- Support for test-build-release, test-setup, test-teardown

Assuming this is accepted for inclusion, we will write documentation
for the kubernetes.io site.

We have included a script to help users configure Photon Controller
for use with Kubernetes. While not required, it will help some
users get started more quickly. It will be documented.

We are aware of the kube-deploy efforts and will track them and
support them as appropriate.
2016-04-25 13:24:16 -07:00
Michael Faille
ce7d5fe6e7 fix : openssl don't exist by default on CentOS docker image
To fix it, I just add openssl depedency on "generate-cert" state. It
should work on Debian-like and RedHat-Like systems. (and, Archlinux,
Opensuse, etc)

Fixed error :
$ sudo salt 'kubernetes-master' state.apply
----------
          ID: kubernetes-cert
    Function: cmd.script
      Result: False
     Comment: Command 'kubernetes-cert' run
     Started: 06:57:06.634203
    Duration: 208.719 ms
     Changes:
              ----------
              pid:
                  793
              retcode:
                  1
              stderr:
                  /tmpm24T3R.sh: line 22: openssl: command not found
                  chgrp: cannot access '/srv/kubernetes/server.key': No such file or directory
                  chgrp: cannot access '/srv/kubernetes/server.cert': No such file or directory
                  chmod: cannot access '/srv/kubernetes/server.key': No such file or directory
                  chmod: cannot access '/srv/kubernetes/server.cert': No such file or directory
              stdout:

After applying my patch (success) :
----------
          ID: kubernetes-cert
    Function: cmd.script
      Result: True
     Comment: Command 'kubernetes-cert' run
     Started: 07:17:04.172384
    Duration: 1041.092 ms
     Changes:
              ----------
              pid:
                  1045
              retcode:
                  0
              stderr:
                  Generating a 4096 bit RSA private key
                  ......................................................................++
                  ...............................................................................++
                  writing new private key to '/srv/kubernetes/server.key'
                  -----
              stdout:
----------
2016-01-24 02:18:11 -05:00
Mike Danese
8e8437dad8 declare azure/ubuntu/saltstack bankruptcy 2015-10-16 18:21:21 -07:00
Fred Jean
1305f54645 Booting a Kubernetes cluster on Vagrant
* Using Fedora 21 as the base box
* Discover the active network interfaces in the box to avoid hardcoding
  them in configuration.
* Use the master IP for the certificate.
2015-08-27 21:43:36 -06:00
Justin Santa Barbara
c676c11189 AWS: Configure SSL certificate alternate-names
GCE does this in its per-provider scripts; this does the same for AWS and lets
other providers do the same; I believe kube2sky requires 10.0.0.1 as a SAN.
2015-07-03 01:18:07 -04:00
Robert Bailey
6c42cb154b Stop copying certs into /usr/share/nginx/ since nothing relies
on that location any longer.
2015-05-11 11:44:19 -07:00
Brendan Burns
b07515c5ea Add some backward compatability for GKE. 2014-12-02 11:32:45 -08:00
Jeff Mendoza
9934a0ace4 Update cert generation for Azure. 2014-11-18 14:10:50 -08:00
Joe Beda
5a0159ea00 Get Vagrant to start using TLS client certs.
Also fix up cert generation. It was failing during the first salt highstate when trying to chown the certs as the apiserver user didn't exist yet.  Fix this by creating a 'kube-cert' group and chgrping the files to that.  Then make the apiserver a member of that group.

Fixes #2365
Fixes #2368
2014-11-13 22:16:45 -08:00
Joe Beda
ee2f030623 Give the API server access to TLS certs.
Moved the cert generation to a separate salt state and put it in a more appropriate sharable location (`/srv/kubernetes/`).
2014-11-12 18:14:24 -08:00