summaryrefslogtreecommitdiffstats
path: root/roles
Commit message (Collapse)AuthorAgeFilesLines
* List existing health checks when none is requestedRodolfo Carvalho2017-08-242-8/+43
| | | | | | | | This is a simple mechanism to learn what health checks are available. Note that we defer task_vars verification, so that we can compute requested_checks and resolved_checks earlier, allowing us to list checks even if openshift_facts has not run.
* Add playbook for running arbitrary health checksRodolfo Carvalho2017-08-241-1/+1
| | | | | | | | This is useful on its own, and also aids in developing/testing new checks that are not part of any playbook. Since the intent when running this playbook is to execute checks, opt for a less verbose explanation on the error summary.
* Merge pull request #5161 from sdodson/image-stream-syncScott Dodson2017-08-2459-199/+1337
|\ | | | | Sync latest image stream and templates
| * Add dotnet 2.0 to v3.6Scott Dodson2017-08-224-0/+450
| |
| * Add dotnet 2.0 to v3.7Scott Dodson2017-08-228-20/+555
| |
| * Update v3.6 contentScott Dodson2017-08-2223-89/+166
| |
| * Update all image streams and templatesScott Dodson2017-08-2224-90/+166
| |
* | Merge pull request #5158 from ewolinetz/logging_issue605Scott Dodson2017-08-241-0/+4
|\ \ | | | | | | Passing memory and cpu limit for ops ES install
| * | Passing memory and cpu limit for ops ES installEric Wolinetz2017-08-221-0/+4
| |/
* | Merge pull request #5145 from sdodson/bz1480438Scott Dodson2017-08-231-31/+34
|\ \ | | | | | | If IP4_NAMESERVERS are unset then pull the value from /etc/resolv.conf
| * | If IP4_NAMESERVERS are unset then pull the value from /etc/resolv.confScott Dodson2017-08-211-31/+34
| | | | | | | | | | | | | | | | | | This will happen whenever someone has directly modified /etc/resolv.conf Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1480438
* | | Merge pull request #5100 from mgugino-upstream-stage/check-hostname-lenScott Dodson2017-08-232-3/+5
|\ \ \ | | | | | | | | Add hostname/nodename length check
| * | | Add hostname/nodename length checkMichael Gugino2017-08-162-3/+5
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | OpenShift will not allow nodes to register if the nodename is > 63 chars. This commit verifies that nodename is not set to a potential hostname that is greater than 63 characters. This commit also updates logic to check `openshift_hostname` to check for > 63 chars. Fixes: https://bugzilla.redhat.com/show_bug.cgi?id=1467790
* | | | Fix generated contentScott Dodson2017-08-231-5/+4
| | | |
* | | | Merge pull request #5011 from kwoodson/provisionScott Dodson2017-08-2338-59/+1724
|\ \ \ \ | | | | | | | | | | AWS Provisioning with scale groups.
| * | | | First attempt at provisioning.Kenny Woodson2017-08-2138-59/+1724
| | |/ / | |/| |
* | | | Merge pull request #5112 from kwoodson/oc_adm_csrScott Dodson2017-08-236-0/+2001
|\ \ \ \ | | | | | | | | | | Adding oc_adm_csr to lib_openshift for node approvals
| * | | | First attempt at creating the cert signer.Kenny Woodson2017-08-216-0/+2001
| | | | |
* | | | | Merge pull request #5101 from maxamillion/add-dnf-supportScott Dodson2017-08-2330-162/+165
|\ \ \ \ \ | | | | | | | | | | | | Add dnf support
| * | | | | remove out of scope variable from exception messageAdam Miller2017-08-181-1/+0
| | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Adam Miller <maxamillion@fedoraproject.org>
| * | | | | raise AosVersionException if no expected packages found by dnf queryAdam Miller2017-08-181-0/+8
| | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Adam Miller <maxamillion@fedoraproject.org>
| * | | | | add dnf support to roles/openshift_health_checker/library/aos_version.pyAdam Miller2017-08-1630-162/+158
| | | | | | | | | | | | | | | | | | | | | | | | Signed-off-by: Adam Miller <maxamillion@fedoraproject.org>
* | | | | | Merge pull request #4980 from sdodson/migrate-v2Scott Dodson2017-08-236-38/+66
|\ \ \ \ \ \ | | | | | | | | | | | | | | Switch to migrating one host and scaling etcd members back up
| * | | | | | Switch to migrating one host and forming a new clusterScott Dodson2017-08-226-38/+66
| | |_|_|_|/ | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With large datasets where there are many keys with TTLs the expiry was creating a data inconsistency problem. The hope is that by performing the migration once and then forming a new cluster this is avoided. Fixes https://bugzilla.redhat.com/show_bug.cgi?id=1475351
* | | | | | Merge pull request #4761 from wozniakjan/logging_kibana_oomScott Dodson2017-08-231-1/+1
|\ \ \ \ \ \ | | | | | | | | | | | | | | bug 1468987: kibana_proxy OOM
| * | | | | | bug 1468987: kibana_proxy OOMJan Wozniak2017-07-141-1/+1
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We currently set the memory allocated to the kibana-proxy container to be the same as `max_old_space_size` for nodejs. But in V8, the heap consists of multiple spaces. The old space has only memory ready to be GC and measuring the used heap by kibana-proxy code, there is at least additional 32MB needed in the code space when `max_old_space_size` peaks. Setting the default memory limit to 256MB here and also changing the default calculation of `max_old_space_size` in the image repository to be only half of what the container receives to allow some heap for other `spaces`.
* | | | | | | Merge pull request #5120 from smarterclayton/allow_gcs_registryScott Dodson2017-08-234-12/+15
|\ \ \ \ \ \ \ | |_|/ / / / / |/| | | | | | Allow GCS object storage to be configured
| * | | | | | Allow GCS object storage to be configuredClayton Coleman2017-08-174-12/+15
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Previously, setting the GCS registry object storage settings resulted in an invalid configuration. This generates a registry-config secret that has the correct file if the GCS config is set.
* | | | | | | Merge pull request #5126 from ozdanborne/fix-calico-spacingScott Dodson2017-08-212-2/+2
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | Fix missing space in calico ansible roles
| * | | | | | | Fix missing space in calico ansible rolesDan Osborne2017-08-172-2/+2
| | | | | | | |
* | | | | | | | Merge pull request #4254 from dmsimard/registry_certsScott Dodson2017-08-214-49/+138
|\ \ \ \ \ \ \ \ | |_|_|_|_|_|/ / |/| | | | | | | Refactor openshift_hosted's docker-registry route setup
| * | | | | | | Refactor openshift_hosted's docker-registry route setupDavid Moreau-Simard2017-07-234-49/+138
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | We have identified an issue where a docker-registry service set up as 'reencrypt' with a provided certificate and a self-signed certificate on the pod does not authorize users to push images. If the docker-registry service is set up as 'passthrough' with the same provided certificate, everything works. In light of this, this commit essentially adds support for configuring provided certificates with a passthrough route while maintaining backwards compatibility with the other use cases. The default remains 'passthrough' with self-generated certificates. Other miscellaneous changes include: - Move fact setup that were only used in secure.yml there - Omit the hostname for the route if there are none to configure, oc_route takes care of handling the default - Replace hardcoded /etc/origin/master by openshift_master_config_dir
* | | | | | | | Merge pull request #5142 from sdodson/fix-dnsScott Dodson2017-08-201-0/+1
|\ \ \ \ \ \ \ \ | |_|/ / / / / / |/| | | | | | | Ensure that openshift_node_facts has been called for dns_ip
| * | | | | | | Ensure that openshift_node_facts has been called for dns_ipScott Dodson2017-08-181-0/+1
| | | | | | | |
* | | | | | | | Merge pull request #4773 from jcantrill/fix_console_loggingOpenShift Bot2017-08-173-3/+31
|\ \ \ \ \ \ \ \ | |_|_|/ / / / / |/| | | | | | | Merged by openshift-bot
| * | | | | | | fix missing console appending in loggingJeff Cantrill2017-08-173-3/+31
| |/ / / / / /
* | | | | | | Merge pull request #5111 from ozdanborne/calico-default-poolScott Dodson2017-08-175-4/+3
|\ \ \ \ \ \ \ | |/ / / / / / |/| | | | | | Use sdn_cluster_network_cidr as default calico pool
| * | | | | | Use sdn_cluster_network_cidr as default calico poolDan Osborne2017-08-175-4/+3
| | |_|_|/ / | |/| | | |
* | | | | | Merge pull request #5113 from bacek/masterScott Dodson2017-08-171-2/+2
|\ \ \ \ \ \ | | | | | | | | | | | | | | Enable version 3.6 for OSE
| * | | | | | Enable version 3.6 for OSEVasily Chekalkin2017-08-171-2/+2
| | | | | | |
* | | | | | | Merge pull request #4547 from mtnbikenc/etcd-pre_upgrade-fixOpenShift Bot2017-08-171-1/+1
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | Merged by openshift-bot
| * | | | | | | Don't include noopRussell Teague2017-08-161-1/+1
| | | | | | | |
* | | | | | | | Merge pull request #5107 from mtnbikenc/refactor-openshift_repos-depsOpenShift Bot2017-08-171-15/+0
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | Merged by openshift-bot
| * | | | | | | | Remove openshift_repos dependenciesRussell Teague2017-08-161-15/+0
| | |_|_|_|_|/ / | |/| | | | | |
* | | | | | | | Merge pull request #5026 from sosiouxme/20170808-fix-checksOpenShift Bot2017-08-172-6/+4
|\ \ \ \ \ \ \ \ | |_|_|/ / / / / |/| | | | | | | Merged by openshift-bot
| * | | | | | | etc_traffic check: factor away short_versionLuke Meyer2017-08-152-6/+4
| |/ / / / / /
* | | | | | | Merge pull request #4947 from ingvagabund/polish-openshift-master-roleOpenShift Bot2017-08-177-112/+208
|\ \ \ \ \ \ \ | | | | | | | | | | | | | | | | Merged by openshift-bot
| * | | | | | | polish openshift-master roleJan Chaloupka2017-08-167-112/+208
| | | | | | | |
* | | | | | | | Merge pull request #5098 from ashcrow/bin-sync-link-checkOpenShift Bot2017-08-161-0/+5
|\ \ \ \ \ \ \ \ | | | | | | | | | | | | | | | | | | Merged by openshift-bot
| * | | | | | | | bug: container_binary_sync no longer moves upon symlinksSteve Milner2017-08-151-0/+5
| | |/ / / / / / | |/| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | With origin 1.5, /usr/local/bin/oc was a symlink to /usr/local/bin/openshift. During the container_binary_sync updated versions of both binaries are copied to the host. First openshift is copied to /usr/local/bin/openshift followed by copying oc to /usr/local/bin/oc. Since oc is a symlink back to /usr/local/bin/openshift the end result was everything linked to oc. This change adds a check before copying a binary. If the destination is a symlink then said symlink is removed before copying the new binary over. Fixed #4965 Reference: https://github.com/openshift/openshift-ansible/issues/4965