Commit Graph

31 Commits

Author SHA1 Message Date
Jordan Liggitt
5534c12dad Fix priorityClass typo, add numeric priority to static pods 2020-04-08 15:33:39 -04:00
Jefftree
725d2b6a8f Network Proxy: GRPC + HTTP Connect with UDS 2020-02-20 10:19:37 -08:00
Han Kang
0e786cbafc swap over kube-apiserver manifest to use livez and readyz
Change-Id: I90df19b58b0d4d3004dcc3ca3002b099845dfe3a
2019-12-19 13:52:23 -08:00
Maciej Borsz
2d9a9f7713
Revert "Revert "Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers.""" 2019-10-02 09:22:02 +02:00
Kubernetes Prow Robot
6610260cc4
Merge pull request #78466 from yuwenma/revert-77904-revert-76396-reapply-75624
Revert "Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers.""
2019-10-01 01:21:33 -07:00
Shihang Zhang
42cb861487 exclude kms provider from health check
Change-Id: Ie1f828b327c5eede8a0b105a8c3f8fc7affd6f3e
2019-09-18 10:37:55 -07:00
draveness
495faa22db feat: cleanup pod critical pod annotations feature 2019-08-09 08:41:23 +08:00
Walter Fender
ebb65c5f4c Get network-proxy working with GCE.
Got the proxy-server coming up in the master.
Added certs and have it comiung up with those certs.
Added a daemonset to run the network-agent.
Adding support for agent running as a sameon set on every node.

Added quick hack to test that proxy server/agent were correctly
tunneling traffic to the kubelet.

Added more WIP for reading network proxy configuration.
Get flags set correctly and fix connection services.
Adding missing ApplyTo
Added ConnectivityService.
Fixed build directives. Added connectivity service configuration.
Fixed log levels.
Fixed minor issues for feature turned off.
Fixed boilerplate and format.
Moved log dialer initialization earlier as per Liggits suggestion.
Fixed a few minor issues in the configuration for GCE.
Fixed scheme allocation
Adding unit test.
Added test for direct connectivity service.

Switching to injecting the Lookup method rather than using a Singleton.
First round of mikedaneses feedback.
Fixed deployment to use yaml and other changes suggested by MikeDanese.

Switched network proxy server/agent which are kebab-case not camelCase.
Picked up DIAL_RSP fix.
Factored in deads2k feedback.
Feedback from mikedanese
Factored in second round of feedback from David.
Fix path in verify.
Factored in anfernee's feedback.
First part of lavalamps feedback.
Factored in more changes from lavalamp and mikedanese.

Renamed network-proxy to konnectivity-server and konnectivity-agent.
Fixed tolerations and config file checking.
Added missing strptr
Finished lavalamps requested rename.
Disambiguating konnectivity service by renaming it egress selector.

Switched feature flag to KUBE_ENABLE_EGRESS_VIA_KONNECTIVITY_SERVICE
2019-08-06 23:09:49 -07:00
Taahir Ahmed
9702c6e6e9 GCP config: gke-exec-auth-plugin for ValidatingAdmissionWebhook
This commit adds support for using `gke-exec-auth-plugin` (vTPM-based
certificates for mTLS) for webhooks when calling endpoints matching
`*.googleapis.com`, and integrates this support with
ValidatingAdmissionWebhook.

To enable it, request ValidatingAdmissionWebhook with
`ADMISSION_CONTROL=...,ValidatingAdmissionWebhook,...` (default) and
opt in to `gke-exec-auth-plugin` using `WEBHOOK_GKE_EXEC_AUTH=true`
during the configuration process.

If you don't opt-in, ValidatingAdmissionWebhook will be deployed as
before.

Requesting `WEBHOOK_GKE_EXEC_AUTH=true` will fail if you have not
provided other configuration variables:

  * `EXEC_AUTH_PLUGIN_URL`: controls whether `gke-exec-auth-plugin` is
    downloaded during the installation step.  A prerequisite for
    actually using the plugin.

  * `TOKEN_URL`, `TOKEN_BODY`, and `TOKEN_BODY_UNQUOTED`:
    configuration values used when calling the plugin.  `TOKEN_URL`
    and `TOKEN_BODY` have existing usage. `TOKEN_BODY_UNQUOTED` is a
    new variable that is meant to sidestep the problem of inverting
    `strconv.Quote` in Bash.

The existing configuration process for ImagePolicyWebhook has been
reworked to make it play nicely with ValidatingAdmissionWebhook under
`WEBHOOK_GKE_EXEC_AUTH=true`.

  * It originally placed the ImagePolicyWebhook configuration object
    at the top-level of the file specified by
    `--admission-control-config-file`.  I can't see why this worked;
    it must have been hitting some sort of lucky path through the
    various config file loading mechanisms.  Now, it places its
    configuration in a sub-field of that file, which is shared among
    all admission control plugins.

  * It mounted its various config files read-write.  I reviewed the
    code and couldn't see why it was necessary, so I moved the config
    files into the existing read-only mount at `/etc/srv/kubernetes`.

  * It now checks that all the configuration values it requires have
    been provided.

Co-authored-by: Mike Danese <mikedanese@google.com>
Co-authored-by: Taahir Ahmed <taahm@google.com>
2019-07-22 16:01:37 -07:00
Kubernetes Prow Robot
49f6510d9a
Merge pull request #80277 from draveness/feature/revert-cleanup-critical-pod
Revert "feat: cleanup pod critical pod annotations feature"
2019-07-18 19:31:37 -07:00
Javier Pérez Hernández
288ea10a59 gce: configure: use 'amd64' in kube core images manifest 2019-07-18 08:31:45 -07:00
draveness
d83526d253 Revert "feat: cleanup pod critical pod annotations feature"
This reverts commit b6d41ee5cc.
2019-07-18 13:31:12 +08:00
draveness
b6d41ee5cc feat: cleanup pod critical pod annotations feature 2019-07-11 08:54:19 +08:00
Yuwen Ma
ccbb88fc53 Revert "Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers."" 2019-05-30 08:02:41 -07:00
Maciej Borsz
9da7db76b7
Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers." 2019-05-15 08:31:19 +02:00
Jake Sanders
2576713a40 when disabled, don't create the API server's insecure port mapping 2019-05-09 11:50:59 -07:00
Yuwen Ma
b8a8bdb127 [Distroless] Convert the GCE manifests for master containers.
* Touched containers: kube-apiserver, kube-scheduler,
kube-controller-manager.
* Remove the shell dependencies when upstart the containers.
* Reformat the command parameters to ["Exec", "Param1", "Param2"]
2019-05-06 08:04:06 -07:00
Jake Sanders
113ab741e6 add option to set the value of the apiserver's insecure port 2019-04-18 20:35:08 +00:00
Maciej Borsz
a0b51681c4
Revert "[Distroless] Convert the GCE manifests for master containers." 2019-04-05 12:55:14 +02:00
Yuwen Ma
af2659527f [Distroless] Convert the GCE manifests for master containers.
* Touched containers: kube-apiserver, kube-scheduler,
kube-controller-manager.
* Remove the shell dependencies when upstart the containers.
* Reformat the command parameters to ["Exec", "Param1", "Param2"]
2019-04-04 11:16:23 -07:00
Han Kang
e9a39533c3 fail faster for readiness checks 2018-12-27 16:17:02 -08:00
Han Kang
895dd4187b exclude etcd from the liveness health check for the kube-apiserver on GCE 2018-11-13 14:48:56 -08:00
immutablet
4bc62be0e6 Run kms-plugin in its own POD. 2018-10-04 09:19:57 -07:00
Marian Lobur
1deb5acc2f Revert cpu resource decrease. 2018-09-13 11:13:07 +02:00
Marian Lobur
aaedbb52d3 Decrease CPU requests of master components in two times. 2018-08-16 15:50:53 +02:00
Karol Gołąb
f31d2d0bcb Removed unused srv_kube_path variable 2018-06-21 13:58:11 +02:00
Zhen Wang
227f7d761d Use default seccomp profile for GCE manifests 2018-05-31 10:35:26 -07:00
immutablet
cbc428395c Enable CloudKMS Plugin deployment. 2018-04-10 09:47:32 -07:00
Mike Danese
0d39648775 cluster/gce: remove salt comments from manifests 2018-02-01 08:39:56 -08:00
Wojciech Tyczynski
617321e420 Expose etcd compaction time via environmental variable in GCE 2018-01-31 14:44:01 +01:00
Mike Danese
13116457ba cluster: remove gce dependencies out of salt
basically just:
* move all manifests into the new gce/manifests dir
* move limit-range into gce/addons/limit-range
* move abac jsonl into gce/manifests. this is gross but we will
  hopefully be able to delete this config soon. it only exists to support
  a deprecated feature.
* fix build, release, deploy to look for everything in its new home
2018-01-16 09:59:29 -08:00