c6da127d3f
cluster/kube: ceph-waw1 up
2019-04-02 00:06:13 +02:00
cdfafaf91e
cluster/kube: finish rook operator
2019-04-01 19:16:18 +02:00
b7fcc67f42
cluster/kube: start implementing rook
2019-04-01 18:40:50 +02:00
14cbacb81a
cluster/kube/metallb: parametrize address pools
2019-04-01 18:00:44 +02:00
a9c7e86687
cluster: fix metallb, add nginx ingress controller
2019-04-01 17:56:28 +02:00
eeed6fb6da
recertify all certs
2019-04-01 16:19:28 +02:00
11603cb9fd
cmc-proxy: logout properly to prevent session exhaustion
...
Multiple calls to GetKVMData in a short timespan would make iDRAC refuse
all authentications because of dangling sessions... (and 5 concurrent
sessions limit)
2019-02-10 15:34:01 +01:00
1e565dc4a5
cluster: start implementing metallb
2019-01-18 09:40:59 +01:00
e3af1eb852
cluster: autodetect IP address
...
This is so that Calico starts with the proper subnet. Feeding it just an
IP from the node status will mean it parses it as /32 and uses IPIP
tunnels for all connectivity.
2019-01-18 09:39:57 +01:00
2afe3e46fd
tool/calicoctl: add secretstore to data
2019-01-18 01:37:45 +01:00
a305bc9fb5
tool: add calicoctl wrapper
2019-01-18 01:34:20 +01:00
0752971f8a
tools: add calicoctl
2019-01-18 01:24:38 +01:00
74d278384e
README: mention purpose of k0
2019-01-18 00:28:28 +01:00
144f92160d
README: mention k0 API host
2019-01-18 00:24:13 +01:00
98691e9e5e
tools: add python future module
2019-01-18 00:22:50 +01:00
41bd2b52c2
cluster/secrets: add implr
2019-01-17 23:37:36 +01:00
ed4675004c
README: add admincreds invocation
2019-01-17 21:38:15 +01:00
117a43c955
.: remove old README
2019-01-17 21:36:28 +01:00
f3010ee1cb
cluster/secrets: add cz2
2019-01-17 21:35:52 +01:00
dc9c29ac90
cluster: add calico key
2019-01-17 21:35:28 +01:00
5c75574464
cluster/coredns: allow resolving via <svc>.<namespace>.svc.k0.hswaw.net
2019-01-17 21:35:10 +01:00
af3be426ad
cluster: deploy calico and metrics service
2019-01-17 18:57:19 +01:00
49b9a13d28
cluster: deploy coredns
2019-01-14 00:02:59 +01:00
5bebbebe3e
cluster/kube: fix typo
2019-01-13 22:08:05 +01:00
4d9e72cb8c
cluster/kube: init
2019-01-13 22:06:33 +01:00
d89e1203d9
ca: bump srl
2019-01-13 22:06:11 +01:00
4c186db2c1
clustercfg: do not use SAN section if no SAN names
2019-01-13 21:48:47 +01:00
ae56b6a6a5
clustercfg: create .kubectl
2019-01-13 21:39:16 +01:00
cd23740185
cluster/secrets: keep plain/ dir for scripting
2019-01-13 21:37:35 +01:00
8a32c90c25
bazel: fix http_archive for bazel 0.21
2019-01-13 21:27:44 +01:00
af09169920
docker: nuke
2019-01-13 21:15:44 +01:00
be980523ae
*: remove old CSRs
2019-01-13 21:15:19 +01:00
de061801db
*: k0.hswaw.net somewhat working
2019-01-13 21:14:02 +01:00
f2a812b9fd
*: bazelify
2019-01-13 17:51:34 +01:00
60b19af41e
*: reorganize
2019-01-13 14:15:09 +01:00
b0b0f3f278
k8s: regenerate kube-node certs with FQDN SAN
2019-01-13 13:32:19 +01:00
711c4a9c1a
secrets: re-encode for inf, nuke secrets/plain
2019-01-13 00:02:10 +01:00
ee7c1aa389
k8s: add apiserver and serviceaccounts certs
2019-01-12 23:56:17 +01:00
5b3b18041a
secrets: gitignore unencrypted secrtes
2019-01-12 22:37:03 +01:00
dffcb581bc
k8s: deploy certs to n02, n03
2019-01-12 22:36:02 +01:00
52c87186fa
k8s: deploy k8s certs
2019-01-12 22:30:41 +01:00
Serge Bazanski
492e91aca1
env.sh: fix certs
2018-12-23 02:24:36 +01:00
Serge Bazanski
9ec50e360e
env.sh: nicer niceness
2018-12-23 01:40:28 +01:00
Serge Bazanski
a5be0d8384
env.sh: implement prod cert generation
2018-12-23 01:35:07 +01:00
c6fd662d4b
begin docker-composing
2018-11-01 22:39:01 +01:00
8fab2beab9
statusz: fix executable sha256
2018-10-25 23:37:37 +02:00
f311e26c93
statusz: make our own copy
2018-10-25 23:26:57 +02:00
2c5d876d9a
add dockerfile for prod/dev
2018-10-25 15:14:50 +02:00
477ffe775b
topo: fix proto path
2018-10-25 05:36:18 -07:00
fad1a80fba
isc license
2018-10-25 14:25:36 +02:00