Commit graph

145 commits

Author SHA1 Message Date
6916f7e244 app/toot: start implementing redis 2019-04-04 16:54:00 +02:00
242152f65e cluster/kube/lib/metallb: bump memory hoping to prevent crashes 2019-04-04 16:54:00 +02:00
ac38d5aeb1 app/registry: oauth2 authentication 2019-04-03 08:41:20 +02:00
6dc4839d74 app/registry: initial docker registry setup 2019-04-02 18:59:37 +02:00
0f78cea802 Merge branch 'master' of hackerspace.pl:hscloud 2019-04-02 14:45:23 +02:00
2fd5861d24 cluster: some doc updates 2019-04-02 14:45:17 +02:00
3187c59a86 cluster/kube: ceph dashboard tls certificates 2019-04-02 14:44:04 +02:00
2afe604595 cluster/kube: minor cert-manager cleanups, disable webhooks by default 2019-04-02 14:43:34 +02:00
79ddbc57d9 cluster/kube: initial cert-manager implementation 2019-04-02 13:20:15 +02:00
5f2dc8530d toot: wip 2019-04-02 02:36:22 +02:00
65f3b1d8ab cluster/kube: add waw-hdd-redundant-1 pool/storageclass 2019-04-02 01:05:38 +02:00
c6da127d3f cluster/kube: ceph-waw1 up 2019-04-02 00:06:13 +02:00
cdfafaf91e cluster/kube: finish rook operator 2019-04-01 19:16:18 +02:00
b7fcc67f42 cluster/kube: start implementing rook 2019-04-01 18:40:50 +02:00
14cbacb81a cluster/kube/metallb: parametrize address pools 2019-04-01 18:00:44 +02:00
a9c7e86687 cluster: fix metallb, add nginx ingress controller 2019-04-01 17:56:28 +02:00
eeed6fb6da recertify all certs 2019-04-01 16:19:28 +02:00
11603cb9fd cmc-proxy: logout properly to prevent session exhaustion
Multiple calls to GetKVMData in a short timespan would make iDRAC refuse
all authentications because of dangling sessions... (and 5 concurrent
sessions limit)
2019-02-10 15:34:01 +01:00
1e565dc4a5 cluster: start implementing metallb 2019-01-18 09:40:59 +01:00
e3af1eb852 cluster: autodetect IP address
This is so that Calico starts with the proper subnet. Feeding it just an
IP from the node status will mean it parses it as /32 and uses IPIP
tunnels for all connectivity.
2019-01-18 09:39:57 +01:00
2afe3e46fd tool/calicoctl: add secretstore to data 2019-01-18 01:37:45 +01:00
a305bc9fb5 tool: add calicoctl wrapper 2019-01-18 01:34:20 +01:00
0752971f8a tools: add calicoctl 2019-01-18 01:24:38 +01:00
74d278384e README: mention purpose of k0 2019-01-18 00:28:28 +01:00
144f92160d README: mention k0 API host 2019-01-18 00:24:13 +01:00
98691e9e5e tools: add python future module 2019-01-18 00:22:50 +01:00
41bd2b52c2 cluster/secrets: add implr 2019-01-17 23:37:36 +01:00
ed4675004c README: add admincreds invocation 2019-01-17 21:38:15 +01:00
117a43c955 .: remove old README 2019-01-17 21:36:28 +01:00
f3010ee1cb cluster/secrets: add cz2 2019-01-17 21:35:52 +01:00
dc9c29ac90 cluster: add calico key 2019-01-17 21:35:28 +01:00
5c75574464 cluster/coredns: allow resolving via <svc>.<namespace>.svc.k0.hswaw.net 2019-01-17 21:35:10 +01:00
af3be426ad cluster: deploy calico and metrics service 2019-01-17 18:57:19 +01:00
49b9a13d28 cluster: deploy coredns 2019-01-14 00:02:59 +01:00
5bebbebe3e cluster/kube: fix typo 2019-01-13 22:08:05 +01:00
4d9e72cb8c cluster/kube: init 2019-01-13 22:06:33 +01:00
d89e1203d9 ca: bump srl 2019-01-13 22:06:11 +01:00
4c186db2c1 clustercfg: do not use SAN section if no SAN names 2019-01-13 21:48:47 +01:00
ae56b6a6a5 clustercfg: create .kubectl 2019-01-13 21:39:16 +01:00
cd23740185 cluster/secrets: keep plain/ dir for scripting 2019-01-13 21:37:35 +01:00
8a32c90c25 bazel: fix http_archive for bazel 0.21 2019-01-13 21:27:44 +01:00
af09169920 docker: nuke 2019-01-13 21:15:44 +01:00
be980523ae *: remove old CSRs 2019-01-13 21:15:19 +01:00
de061801db *: k0.hswaw.net somewhat working 2019-01-13 21:14:02 +01:00
f2a812b9fd *: bazelify 2019-01-13 17:51:34 +01:00
60b19af41e *: reorganize 2019-01-13 14:15:09 +01:00
b0b0f3f278 k8s: regenerate kube-node certs with FQDN SAN 2019-01-13 13:32:19 +01:00
711c4a9c1a secrets: re-encode for inf, nuke secrets/plain 2019-01-13 00:02:10 +01:00
ee7c1aa389 k8s: add apiserver and serviceaccounts certs 2019-01-12 23:56:17 +01:00
5b3b18041a secrets: gitignore unencrypted secrtes 2019-01-12 22:37:03 +01:00