Commit Graph

72 Commits

Author SHA1 Message Date
Xan Manning
ddbf7a71a8 Updated terminology to remove references to "master" 2020-11-14 14:15:19 +00:00
Martin Friedrich
e5133c1f73
add archlinux support, fixed drain invoked on uninstall by adding --delete-local-data 2020-10-23 14:43:58 +02:00
Xan Manning
6e29200d9a Attempt to fix #57 - k3s_node_data_dir set in templates 2020-10-19 20:32:53 +01:00
ᗪєνιη ᗷυнʟ
b16f142c21
Override facts when commit hash is specified 2020-09-23 09:43:31 -04:00
ᗪєνιη ᗷυнʟ
c447fcec39 A number of enhancements for v1.19 release.
- Added option to skip validation checks #47
  - Add SELinux support in containerd #48
  - Added check for Etcd member count #46
  - Moved token to a file #50
  - Added Etcd snapshot configuration options #49
2020-09-22 20:30:50 +01:00
Xan Manning
ab48e3a173 Change delay to 5 seconds for secondary masters startup task to complete 2020-09-18 12:09:56 +01:00
Xan Manning
175b90ecb0 Added support for Etcd, removed DQLite support. See #41 2020-09-17 21:01:20 +01:00
Xan Manning
c743df868b Fixing ansible-linting, exclude name check for Travis-CI
This release also fixes:

  - #38 : removing the --disable-agent option. Please use node taints.
  - #39 : clarified where jmespath should be installed in README.md
2020-09-15 18:20:23 +01:00
Xan Manning
b412858b30 Fix merge conflict 2020-07-25 20:51:31 +01:00
Xan Manning
d53102dda3 Check mode support added 2020-07-25 17:39:01 +01:00
Xan Manning
809e9cd73c Releasable feature for hardlinks 2020-07-25 14:03:53 +01:00
Xan Manning
d2a34546cf Potential fix for #35 2020-07-25 12:27:39 +01:00
Xan Manning
3a6b411430 Added support for args, private registries. Fixes #32 2020-07-04 13:24:10 +01:00
Xan Manning
2c0afbca42 Restart k3s service unit on file change 2020-06-06 14:30:40 +02:00
Michael
f90cc5ca18
Privilege escalation to solve "Access denied"
```
FAILED! => {"attempts": 3, "changed": false, "msg": "Unable to enable service k3s: Failed to enable unit: Access denied\n"}
```

The task never sets become to true, hence failing due to lack of permissions on the user that is executing it by default.
2020-05-30 23:40:05 +02:00
Xan Manning
848a5457ff Add option for unsupported single node with database backend. Issue #27 2020-05-30 15:16:20 +01:00
Xan Manning
6090071982 Bugfix, issue with HA build for joining new nodes 2020-05-25 17:57:43 +01:00
Xan Manning
23ba527bc2 Bugfix, broke clustering with v1.6.2 2020-05-25 17:11:45 +01:00
Xan Manning
9524b07df0 Fix joining nodes to an existing cluster 2020-05-25 16:25:09 +01:00
Xan Manning
141b6f2018 Numerous bug fixes to do with permissions and regressions.
Fix issue #25, check k3s_bind_address for readiness check
Fix issue #24, become for tasks that require root
2020-05-20 19:55:33 +01:00
Xan Manning
5ce8dec6ff Added the ability to set k3s_release_version as a release channel 2020-05-18 20:45:48 +01:00
Xan Manning
e3301a59e4 Updated state tasks to dynamic include rather thn static import
This is an initial attempt to address issue #22, I have also included a
task to drain the node before deleting it.
2020-05-18 19:53:03 +01:00
Xan Manning
02e12e61a8 Bugfix: minimum version for secrets encryption reverted 2020-05-17 20:43:39 +01:00
Xan Manning
b42ffade29 Fixes to variable checks 2020-05-17 11:40:53 +01:00
Xan Manning
aa1a0a9620 Added option to provision multiple standalone k3s
Fixes #21
2020-05-16 20:18:20 +01:00
nolte
df44053349 add a permission check for write the systemd k3s config 2020-05-09 21:07:34 +02:00
SimonHeimberg
acedb08a1f variables to activate become for some steps 2020-04-22 16:42:45 +02:00
Xan Manning
e93b438ee0 Added secrets encryption at rest option 2020-03-28 12:58:58 +00:00
Xan Manning
f684f6d907 A retry has been added to task controlling secondary master startup.
Fixes #17

There appeared to be a race condition where starting all secondary
masters all at once would cause the k3s service to fail on a number of
the other masters. A retry has been added to the task to attempt to
bring them all up until they stop failing.
2020-03-07 16:15:41 +00:00
Xan Manning
f709caf371 Skip final checks when no-flannel option is used.
Fixes #16

This is because without a CNI, nodes will never be ready and the task
will fail. You need to deploy your choice of CNI manually (such as
Calico) then check the state of the cluster using `kubectl get nodes`.
2020-03-07 14:23:09 +00:00
Xan Manning
2c09d4711b
Merge pull request #15 from PyratLabs/tidy_up_additional_validation
Variable check for local storage path
2020-02-28 07:39:33 +00:00
Xan Manning
9dcfa954f9 Variable check for local storage path 2020-02-27 20:10:28 +00:00
Xan Manning
12d01c2a60 Added tests and variable validation 2020-02-27 18:46:59 +00:00
Xan Manning
75fd17aac8 Slightly updated tasks and added validation checks
1. Now does not remove prerequisite packages, lvm2 was included in
these packages (not good when you use LVM2 for real).
  2. Added a bit more idempotency to the shell scripts - only delete if
it exists.
  3. Check that the process isn't running and binaries are gone.
2020-02-26 20:56:05 +00:00
Devin Buhl
5f7ff27f17
Fix 301 lint issue in uninstall-docker-amazon 2020-02-25 15:42:40 -05:00
Devin Buhl
a1e52fb660
fixed 301 lint issue in uninstall-k3s.yml 2020-02-25 15:41:29 -05:00
Devin Buhl
e7c787e10f
Fix other lint issue 2020-02-25 15:25:23 -05:00
Devin Buhl
8d0ee69012
Fix other yaml lint issue 2020-02-25 15:08:17 -05:00
Devin Buhl
fd7498303d
Fix first YAML lint issue 2020-02-25 15:07:05 -05:00
Devin Buhl
be85c9ccc5 state uninstalled 2020-02-25 12:39:34 -05:00
Devin Buhl
9bbf5fd746 add uninstall state 2020-02-25 12:29:39 -05:00
Xan Manning
1f19e2b302 Updated flannel backend flag checks 2020-02-09 16:03:41 +00:00
Xan Manning
218b9d64c9 Slightly more robust selection of checksum from GitHub 2020-02-09 15:00:59 +00:00
James D. Marble
044ed5512c Use correct checksums for arm downloads
I attempted to install on arm64 and armhf. Both fail because the
[checksum filter](e07903a5cf/tasks/build/download-k3s.yml (L21))
finds the first line with "k3s". On the arm checksum files,
the first lines are for "k3s-airgap-images-arm64.tar" and "k3s-airgap-images-arm.tar"
so the wrong checksum is grabbed.

I attempted to fix this with a more specific filter:
`select('search', 'k3s'+k3s_arch_suffix)`.
This works for both arm architectures,
but fails for amd64 because the key is simply "k3s" and not "k3s-amd64".

The solution I settled on is not ideal for future proofing,
but works for now at least.
2020-01-31 21:10:55 -08:00
Xan Manning
e07903a5cf Fixed issue with SUSE docker installation 2020-01-21 22:33:11 +00:00
Xan Manning
e3ce213bc0 Testing auto-deploy on multi-master 2020-01-13 21:32:31 +00:00
Xan Manning
3ef36b841f
Merge branch 'multi_master_support' into feature/add_manifests 2020-01-13 19:09:45 +00:00
Xan Manning
3a1c7e7b35 Added workflow for Database backed and DQLite HA 2020-01-13 19:08:37 +00:00
Xan Manning
09fc37e6ec Fixed provisioning of multi-master, need to test LB with k3s_control_node_address 2020-01-11 22:42:29 +00:00
Xan Manning
c3ae2b79eb Added database container and proved connectivity. Logic needs to be changed for HA. 2020-01-11 19:20:52 +00:00