Commit Graph

727 Commits

Author SHA1 Message Date
Maciej Borsz
2d9a9f7713
Revert "Revert "Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers.""" 2019-10-02 09:22:02 +02:00
Kubernetes Prow Robot
6610260cc4
Merge pull request #78466 from yuwenma/revert-77904-revert-76396-reapply-75624
Revert "Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers.""
2019-10-01 01:21:33 -07:00
Zheng Chen
3972e5c3e7
using STACKDRIVER_ENDPOINT to set exporter sd endpoint according to cluster env 2019-09-26 14:00:59 -04:00
Kubernetes Prow Robot
5cdf18e348
Merge pull request #82624 from qingling128/master
Upgrade stackdriver-logging-agent image to 1.6.17 to fix CVEs.
2019-09-18 17:30:59 -07:00
Ling Huang
dc9db4b413 Upgrade stackdriver-logging-agent image to 1.6.17 to fix CVEs.
Change-Id: Ic37a8d3663d616e7d196353efd9a0164da724728
2019-09-12 04:02:08 -04:00
Kubernetes Prow Robot
0dbb93125f
Merge pull request #82579 from mm4tt/etcd_expose_metrics
Expose etcd metric port in tests
2019-09-11 22:53:35 -07:00
Matt Matejczyk
fbbb4ebeca Expose etcd metric port in tests
This is to allow scraping etcd metrics in scalabiblity tests.
This was already done in
https://github.com/kubernetes/kubernetes/pull/77657, but then the logic
got changed when introducing mtls in
https://github.com/kubernetes/kubernetes/pull/77561 and the new etcd
metric port 2382 is currently only exposed on localhost.

Ref. https://github.com/kubernetes/perf-tests/issues/786
2019-09-11 13:57:00 +02:00
Kubernetes Prow Robot
f48659e9fd
Merge pull request #81681 from zhenglol/sd_test_endpoint
override stackdriver endpoint in event-exporter in test cluster
2019-09-10 14:32:00 -07:00
Zhen Wang
d874dbfcb1 Bump NPD version to v0.7 for GCI 2019-08-27 22:26:30 -07:00
Kubernetes Prow Robot
d52b212189
Merge pull request #79908 from wenjiaswe/remove-aggregator-ca-key
Remove unused aggregator ca key
2019-08-23 13:31:18 -07:00
Zheng Chen
70a7134906
added override for sd testing env in event-exporter yaml 2019-08-20 16:29:15 -04:00
Walter Fender
ebb65c5f4c Get network-proxy working with GCE.
Got the proxy-server coming up in the master.
Added certs and have it comiung up with those certs.
Added a daemonset to run the network-agent.
Adding support for agent running as a sameon set on every node.

Added quick hack to test that proxy server/agent were correctly
tunneling traffic to the kubelet.

Added more WIP for reading network proxy configuration.
Get flags set correctly and fix connection services.
Adding missing ApplyTo
Added ConnectivityService.
Fixed build directives. Added connectivity service configuration.
Fixed log levels.
Fixed minor issues for feature turned off.
Fixed boilerplate and format.
Moved log dialer initialization earlier as per Liggits suggestion.
Fixed a few minor issues in the configuration for GCE.
Fixed scheme allocation
Adding unit test.
Added test for direct connectivity service.

Switching to injecting the Lookup method rather than using a Singleton.
First round of mikedaneses feedback.
Fixed deployment to use yaml and other changes suggested by MikeDanese.

Switched network proxy server/agent which are kebab-case not camelCase.
Picked up DIAL_RSP fix.
Factored in deads2k feedback.
Feedback from mikedanese
Factored in second round of feedback from David.
Fix path in verify.
Factored in anfernee's feedback.
First part of lavalamps feedback.
Factored in more changes from lavalamp and mikedanese.

Renamed network-proxy to konnectivity-server and konnectivity-agent.
Fixed tolerations and config file checking.
Added missing strptr
Finished lavalamps requested rename.
Disambiguating konnectivity service by renaming it egress selector.

Switched feature flag to KUBE_ENABLE_EGRESS_VIA_KONNECTIVITY_SERVICE
2019-08-06 23:09:49 -07:00
Kubernetes Prow Robot
3be827e912
Merge pull request #77561 from wenjiaswe/fix-etcd-server
Use HTTPS as etcd-apiserver protocol when mTLS is enabled
2019-07-29 12:14:49 -07:00
Kubernetes Prow Robot
0612c7de0b
Merge pull request #80232 from shihan9/gce
remove function apply-encryption-config in configure-helper
2019-07-24 13:50:19 -07:00
Taahir Ahmed
9702c6e6e9 GCP config: gke-exec-auth-plugin for ValidatingAdmissionWebhook
This commit adds support for using `gke-exec-auth-plugin` (vTPM-based
certificates for mTLS) for webhooks when calling endpoints matching
`*.googleapis.com`, and integrates this support with
ValidatingAdmissionWebhook.

To enable it, request ValidatingAdmissionWebhook with
`ADMISSION_CONTROL=...,ValidatingAdmissionWebhook,...` (default) and
opt in to `gke-exec-auth-plugin` using `WEBHOOK_GKE_EXEC_AUTH=true`
during the configuration process.

If you don't opt-in, ValidatingAdmissionWebhook will be deployed as
before.

Requesting `WEBHOOK_GKE_EXEC_AUTH=true` will fail if you have not
provided other configuration variables:

  * `EXEC_AUTH_PLUGIN_URL`: controls whether `gke-exec-auth-plugin` is
    downloaded during the installation step.  A prerequisite for
    actually using the plugin.

  * `TOKEN_URL`, `TOKEN_BODY`, and `TOKEN_BODY_UNQUOTED`:
    configuration values used when calling the plugin.  `TOKEN_URL`
    and `TOKEN_BODY` have existing usage. `TOKEN_BODY_UNQUOTED` is a
    new variable that is meant to sidestep the problem of inverting
    `strconv.Quote` in Bash.

The existing configuration process for ImagePolicyWebhook has been
reworked to make it play nicely with ValidatingAdmissionWebhook under
`WEBHOOK_GKE_EXEC_AUTH=true`.

  * It originally placed the ImagePolicyWebhook configuration object
    at the top-level of the file specified by
    `--admission-control-config-file`.  I can't see why this worked;
    it must have been hitting some sort of lucky path through the
    various config file loading mechanisms.  Now, it places its
    configuration in a sub-field of that file, which is shared among
    all admission control plugins.

  * It mounted its various config files read-write.  I reviewed the
    code and couldn't see why it was necessary, so I moved the config
    files into the existing read-only mount at `/etc/srv/kubernetes`.

  * It now checks that all the configuration values it requires have
    been provided.

Co-authored-by: Mike Danese <mikedanese@google.com>
Co-authored-by: Taahir Ahmed <taahm@google.com>
2019-07-22 16:01:37 -07:00
Wenjia Zhang
2e61ae0c56 Use HTTPS as etcd-apiserver protocol when mTLS is enabled 2019-07-20 14:24:31 -07:00
Shihang Zhang
e6607cc259 remove function apply-encryption-config in configure-helper
Change-Id: I4df76abcc94eb222219968dc5e08655677d4623f
2019-07-16 14:03:13 -07:00
Wenjia Zhang
5abd36824a Remove unused aggregator ca key 2019-07-08 17:22:25 -07:00
Wenjia Zhang
22591ad8f2 Remove unnecessary ETCD_CA_KEY check 2019-07-01 15:19:16 -07:00
Zhen Wang
8f40368fb6 Clean up node-problem-detector configuration for GCI 2019-06-13 21:43:05 -07:00
Yuwen Ma
ccbb88fc53 Revert "Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers."" 2019-05-30 08:02:41 -07:00
Kubernetes Prow Robot
88da568586
Merge pull request #78406 from losipiuk/lo/split-args-ca
Split CA paramters on manifest template expansions
2019-05-30 00:32:46 -07:00
Kubernetes Prow Robot
f4945a81e2
Merge pull request #78314 from Random-Liu/set-containerd-oom-score
Set containerd oom score adj to -999.
2019-05-29 07:59:16 -07:00
Łukasz Osipiuk
dda5e49cac Split CA parameters on manifest template expansion
Split arguments to be passed to cluster autoscaler binary,
so each argument is passed separately.
This is preparatory work for migrating CA to disroless base image
and passing multiple arguments together does not work if CA is
not wrapped around with shell script

Change-Id: I26b5a764d2a12079c7f4ed6633ccabf8d623e232
2019-05-29 15:20:34 +02:00
Jake Sanders
5a9af2e0ef specify additional static auth for components by env var 2019-05-24 12:16:40 -07:00
Lantao Liu
f6aa22e9e3 Set containerd oom score adj to -999.
Signed-off-by: Lantao Liu <lantaol@google.com>
2019-05-24 10:36:54 -07:00
Matt Matejczyk
6ced6491c6 Change etcd's --listen-client-urls to 0.0.0.0 in tests
This is to allow scraping etcd metrics in scalability tests.

Ref. https://github.com/kubernetes/perf-tests/issues/522
2019-05-23 15:11:22 +02:00
Kubernetes Prow Robot
0203192970
Merge pull request #78044 from dekkagaijin/patch-6
Consolidate logic to ensure kubectl auth
2019-05-17 23:21:37 -07:00
Kubernetes Prow Robot
72f6954614
Merge pull request #77889 from Random-Liu/support-using-containerd-in-cos
Support using docker containerd in COS and Ubuntu on GCE.
2019-05-17 20:26:59 -07:00
Jake Sanders
9bc3c2af00 Consolidate logic to ensure kubectl auth 2019-05-17 11:32:09 -07:00
Kubernetes Prow Robot
314264aeaf
Merge pull request #78010 from mikedanese/fixdns
cluster/gce: fix line 2414: DNS_MEMORY_LIMIT: unbound variable
2019-05-17 10:12:59 -07:00
Kubernetes Prow Robot
20d6b2ff11
Merge pull request #78008 from mikedanese/fixunset
cluster/gce: fix unset variable when insecure port is enabled
2019-05-17 10:12:46 -07:00
Kubernetes Prow Robot
af692da080
Merge pull request #77844 from grayluck/one-more-ip
Add 198.51.100.0/24 to non-masq ranges.
2019-05-17 05:38:19 -07:00
Mike Danese
59f4661b18 cluster/gce: fix line 2414: DNS_MEMORY_LIMIT: unbound variable 2019-05-16 22:58:34 -07:00
Mike Danese
4edec1f3be cluster/gce: fix unset variable when insecure port is enabled 2019-05-16 19:47:11 -07:00
Lantao Liu
bc1a78d31e Support using docker containerd in COS and Ubuntu on GCE.
Signed-off-by: Lantao Liu <lantaol@google.com>
2019-05-16 13:53:57 -07:00
Kubernetes Prow Robot
f8d2b6b982
Merge pull request #77918 from mborsz/coredns
Make dns memory limit configurable
2019-05-16 08:49:08 -07:00
yankaiz
14015d9ce1 Add 198.51.100.0/24 to non-masq ranges.
Groupped the IP ranges by RFC and type.

Change reference for 198.18.0.0/15 from RFC 2544 to RFC 6815.
2019-05-15 16:23:41 -07:00
Maciej Borsz
59af63c687 Make coredns memory limit configurable 2019-05-15 13:35:28 +02:00
Maciej Borsz
9da7db76b7
Revert "[Re-Apply][Distroless] Convert the GCE manifests for master containers." 2019-05-15 08:31:19 +02:00
Jake Sanders
2576713a40 when disabled, don't create the API server's insecure port mapping 2019-05-09 11:50:59 -07:00
Kubernetes Prow Robot
0befec7fb6
Merge pull request #77447 from dekkagaijin/mip
disable the apiserver's insecure port by default
2019-05-07 22:14:32 -07:00
Kubernetes Prow Robot
b34d7ac0ce
Merge pull request #77458 from grayluck/agent-v2.3.0
Bump ip-masq-agent version to v2.3.0. Enable nomasq for reserved IPs.
2019-05-07 17:52:58 -07:00
yankaiz
1059a71973 Bump ip-masq-agent version to v2.3.0. Enable nomasq for reserved IPs.
Added the non-masq ranges to configure-helper.sh so that GCE clusters
will have the non-masq IP ranges aligned with GKE clusters.
2019-05-06 22:32:34 -07:00
Jake Sanders
e4d521e825 disable the apiserver insecure port by default in configure-helper 2019-05-06 19:26:57 -07:00
Jake Sanders
ff4c372eaa ensure that kubectl works when the master insecure port is disabled 2019-05-06 19:25:41 -07:00
Yuwen Ma
b8a8bdb127 [Distroless] Convert the GCE manifests for master containers.
* Touched containers: kube-apiserver, kube-scheduler,
kube-controller-manager.
* Remove the shell dependencies when upstart the containers.
* Reformat the command parameters to ["Exec", "Param1", "Param2"]
2019-05-06 08:04:06 -07:00
Mark Wolters
1456979e93 Added function to create kubeconfig for addon-manager 2019-05-03 15:12:16 -07:00
Kubernetes Prow Robot
0b10d1b830
Merge pull request #77140 from dekkagaijin/glbc
use static token to authenticate glbc
2019-05-02 16:22:30 -07:00
Jake Sanders
8bd0b45eae use static token to authenticate glbc 2019-05-01 22:24:48 -07:00