Lee Spottiswood
aa76e39f79
adds nodelocaldns_additional_configs to facilitate additional CoreDNS config options ( #11657 )
2024-11-08 02:46:44 +00:00
Vlad Korolev
9a7b021eb8
Do not use ‘yes/no’ for boolean values ( #11472 )
...
Consistent boolean values in ansible playbooks
2024-08-28 06:30:56 +01:00
Erwan Miran
d469503e84
Make netchecker log levels configurable ( #11334 )
...
* Make netchecker log levels configurable
* use ETCD_LOG_LEVEL
2024-07-28 23:57:56 -07:00
Bas
8f5f75211f
Improving yamllint configuration ( #11389 )
...
Signed-off-by: Bas Meijer <bas.meijer@enexis.nl>
2024-07-25 18:42:20 -07:00
Max Gautier
d8a4aea9bc
Revert "support CoreDNS use host network and config dns port ( #10617 )" ( #11185 )
...
This reverts commit bc5b38a771
.
2024-05-13 14:51:11 -07:00
Mathieu Parent
7844b8dbac
Promote nodelocaldns daemonset to system-node-critical ( #11056 )
...
As upstream
2024-04-09 19:48:01 -07:00
Gary Miguel
a1cf8291a9
spelling: scrapper -> scraper ( #11015 )
2024-03-15 07:34:30 -07:00
Max Gautier
c80f2cd573
Allow the DNS stack to be backward compatible with an old dns_domain ( #10630 )
...
Handle all old dns domains:
- for nodelocaldns: in the same server block as the current dns_domain
- for coredns: uffix rewrite of each of the old dns domains to the
current one
2024-01-24 06:31:22 +01:00
Max Gautier
89d42a7716
Fix coredns_dual usage ( #10821 )
2024-01-22 18:36:16 +01:00
lobiyed.karim
7b7c9f509e
Add PodDisruptionBudget for CoreDNS deployment. Allows users to control disruption behavior and set maximum unavailable pods ( #10557 )
2024-01-16 10:04:47 +01:00
Louis Tu
ddf5c6ee12
Update coredns rolling update strategy ( #10748 )
...
Signed-off-by: tu1h <lihai.tu@daocloud.io>
2024-01-08 17:38:05 +01:00
Max Gautier
471326f458
Remove PodSecurityPolicy support and references ( #10723 )
...
This is removed from kubernetes since 1.25, time to cut some dead code.
2023-12-18 14:13:43 +01:00
刘旭
eb73f1d27d
support disable dns autoscaler when use CoreDNS ( #10608 )
2023-12-14 10:03:34 +01:00
Max Gautier
85f15900a4
Remove unneeded workaround for removing kubeadm DNS ( #10695 )
...
Kubeadm dns phase is correctly skipped.
This was a workaround for kubernetes/kubeadm#1557, which was actually
not a bug ; the correct fix was #4867
2023-12-07 12:54:15 +01:00
刘旭
bc5b38a771
support CoreDNS use host network and config dns port ( #10617 )
2023-11-17 14:41:53 +01:00
Unai Arríen
228efcba0e
Migrate node-role.kubernetes.io/master to node-role.kubernetes.io/con… ( #10464 )
...
* Migrate node-role.kubernetes.io/master to node-role.kubernetes.io/control-plane
* Migrate node-role.kubernetes.io/master to node-role.kubernetes.io/control-plane
* Migrate node-role.kubernetes.io/master to node-role.kubernetes.io/control-plane
2023-10-17 21:39:40 +02:00
Elias-elastisys
d3101d65aa
Added templating to coredns error to allow for consolidation ( #10501 )
2023-10-10 14:32:41 +02:00
Arthur Outhenin-Chalandre
5d00b851ce
project: fix var-spacing ansible rule ( #10266 )
...
* project: fix var-spacing ansible rule
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
* project: fix spacing on the beginning/end of jinja template
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
* project: fix spacing of default filter
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
* project: fix spacing between filter arguments
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
* project: fix double space at beginning/end of jinja
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
* project: fix remaining jinja[spacing] ansible-lint warning
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
---------
Signed-off-by: Arthur Outhenin-Chalandre <arthur.outhenin-chalandre@proton.ch>
2023-07-04 20:36:54 -07:00
Mohamed Omar Zaian
9405eb821b
[feature] Supprt enabling cpu limit in corends deployment ( #10103 )
2023-05-19 03:38:29 -07:00
Maxime Leroy
4ffe138dfa
feat(coredns): coredns_rewrite_block to perform internal message rewriting ( #10045 )
...
Signed-off-by: Maxime Leroy <19607336+maxime1907@users.noreply.github.com>
2023-05-12 14:32:46 -07:00
Navid Nabavi
4313c13656
[feature] Add coredns_additional_configs to handle any extra configurations for coredns deployment ( #10023 ) ( #10025 )
2023-05-09 06:45:58 -07:00
Mohamed Omar Zaian
4deeaba335
[feature] Update dns-autoscaler ( #9996 )
2023-04-24 02:47:01 -07:00
Mohamed Omar Zaian
ed6f8df784
[feature] Update CoreDNS manifests ( #9977 )
2023-04-12 21:38:35 -07:00
stelucz
9247137e60
Replace label `k8s-app: nodelocaldns` in DaemonSet template by `k8s-app: node-local-dns` ( #9745 )
2023-02-02 15:42:28 -08:00
Marijn van der Giesen
0d5bcd3e20
feat(coredns): Forward extra domains to coredns kubernetes plugin ( #9635 )
2023-01-05 06:57:58 -08:00
Marijn van der Giesen
ab80342750
[feat] Add custom options to coredns kubernets plugin ( #9608 )
2022-12-27 18:21:27 -08:00
emiran-orange
df6da52195
Enable check mode in DNS Cleanup tasks ( #9472 )
2022-11-10 19:58:09 -08:00
emiran-orange
5c25b57989
Ability to define options for DNS upstream servers ( #9311 )
...
* Ability to define options for DNS upstream servers
* Doc and sample inventory vars
2022-11-08 06:44:25 -08:00
Mohamed Zaian
2af918132e
Update kubernetes dashboard to 2.7.0 (k8s 1.25 support) ( #9425 )
2022-10-24 18:32:36 -07:00
Kenichi Omichi
c38fb866b7
Update securityContext of netchecker ( #9398 )
...
To run netchecker with necessary privilege,
this updates the securityContext.
2022-10-17 19:11:18 -07:00
Unai Arríen
ef76a578a4
Change dns upstream condition for nodelocaldns ( #9378 )
2022-10-11 00:47:02 -07:00
Kay Yan
1b3c2dab2e
add_max_concurrent_in_coredns ( #9307 )
2022-09-22 04:27:03 -07:00
Michael Schmitz
be2bfd867c
Add Support for Rewrite Plugin to CoreDNS/NodelocalDNS ( #9245 )
2022-09-03 16:16:35 -07:00
Peter Pan
14063b023c
Extend DNS memory limit. 170Mi tents to OOM ( #9084 )
2022-07-13 00:03:37 -07:00
Sébastien Masset
9d5d945bdb
[MASTER] Add missing configuration for extra tolerations ( #8908 )
...
* Added new configuration item for extra tolerations in policy controllers
Signed-off-by: Sébastien Masset <smt.masset@gmail.com>
* Added new configuration item for extra tolerations in DNS autoscaler
Signed-off-by: Sébastien Masset <smt.masset@gmail.com>
* Aligned existing handling of extra DNS tolerations
Signed-off-by: Sébastien Masset <smt.masset@gmail.com>
2022-06-20 01:36:06 -07:00
orange-llajeanne
a26a9ee14f
set apparmor_enabled in netchecker task ( #8844 )
2022-05-19 10:49:21 -07:00
weizhoublue
b289f533b3
get wrong server name of coredns ( #8811 )
...
Signed-off-by: weizhou.lan@daocloud.io <weizhou.lan@daocloud.io>
2022-05-12 08:33:14 -07:00
cyril-corbon
418fc00718
fix: kube-dns service deletion ( #8565 )
...
Signed-off-by: Cyril Corbon <corboncyril@gmail.com>
2022-02-21 02:48:11 -08:00
Tristan
92d612c3e0
8487: Allow override of default CoreDNS zone cache ( #8488 )
...
Using the coredns_cluster_zone_cache_block variable
2022-02-01 00:48:18 -08:00
Ilya Margolin
2bbe5732b7
Add node label to etcd metrics ( #8475 )
...
targetRef on endpoints surfaces as
__meta_kubernetes_endpoint_address_target_kind/__meta_kubernetes_endpoint_address_target_name
in prometheus and gets converted to the label `node` by
prometheus-operator
2022-01-31 06:08:23 -08:00
Kenichi Omichi
f80fd24a55
Fix risky-file-permissions ( #8370 )
...
When running ansible-lint directly, we can see a lot of warning
message like
risky-file-permissions File permissions unset or incorrect
This fixes the warning messages.
2022-01-09 01:51:12 -08:00
Florian Ruynat
6abae713f7
Update helm / kube-router and coredns ( #8382 )
...
* Update kube-router to 1.4.0
* Update Helm to 3.7.2
* Up coredns to 1.8.6 when k8s is 1.23.x
2022-01-06 12:14:27 -08:00
Max Gautier
cb54eb40ce
Use a variable for standardizing kubectl invocation ( #8329 )
...
* Add kubectl variable
* Replace kubectl usage by kubectl variable in roles
* Remove redundant --kubeconfig on kubectl usage
* Replace unecessary shell usage with command
2022-01-05 02:26:32 -08:00
toplordsaito
9afca43807
change dns upstream condition for coredns ( #8263 )
...
upstream_dns_servers should change corefile config even resolvconf_mode=docker_dns
2021-12-06 02:46:32 -08:00
ishizuka
7e1873d927
DeprecationWarning occurs when indentfirst=None is specified in coredns-config.yml.j2 ( #8224 )
2021-11-24 08:56:21 -08:00
Mathieu Parent
0263c649f4
Allow to scrape etcd metrics using a service ( #8203 )
...
Signed-off-by: Mathieu Parent <math.parent@gmail.com>
2021-11-17 23:53:01 -08:00
Cristian Calin
039205560a
nodelocaldns: allow a secondary pod for nodelocaldns for local-HA ( #8100 )
...
* nodelocaldns: allow a secondary pod for nodelocaldns for local-HA
* CI: add job to test nodelocaldns secondary
2021-11-09 09:57:47 -08:00
Sébastien Masset
7c3369e1b9
Fixed default DNS min replica for single node clusters ( #8112 )
2021-10-26 16:03:46 -07:00
Cristian Calin
6a5b87dda4
netchecker: update images to 1.2.2 from Mirantis ( #8074 )
...
* netchecker: update images to 1.2.2 from Mirantis which is slightly less ancinet than the l23networks images
* Netchecker: use local etcd instead of kubernetes v1beta1 crds which are no longer suported by kube 1.22+
2021-10-19 10:17:04 -07:00
Florian Ruynat
c8d7f000c9
Remove k8s hooks for versions prior to 1.20 ( #7998 )
2021-09-22 10:32:01 -07:00