Commit Graph

15 Commits

Author SHA1 Message Date
Phil Sphicas 08906262fd Update tolerations and priority classes
* Give kube-proxy a blanket toleration
* Replace scheduler.alpha.kubernetes.io/critical-pod annotation with
    priorityClassName: system-node-critical

Change-Id: I810333913c09531eefa1ded014fe090d4cca7f7d
2021-10-18 11:33:54 -07:00
Phil Sphicas 946a28dc76 Use HostToContainer mountPropagation
For any host mounts that include /var/lib/kubelet, use HostToContainer
mountPropagation, which avoids creating extra references to mounts in
other containers.

Affects the following resources:
* haproxy-anchor daemonset
* kubernetes-apiserver-anchor daemonset
* kubernetes-controller-manager-anchor daemonset
* kubernetes-scheduler-anchor daemonset

Change-Id: Ib7fb018c4c1916d00311a73f64f77a99b682d4c8
2021-01-08 01:05:04 +00:00
KHIYANI, RAHUL (rk0850) 535e39262b promenade: Add default apparmor profile to init containers
Adding profile to promenade-util and haproxy-perms init containers

Change-Id: I46f4c6a3fe561f994860a9434d7e5cb10884e190
2020-04-30 09:42:40 -05:00
Parsons, Cliff (cp769u) c7d3dfbdfe Add resource requests/limits to HAProxy container
The resource requests/limits were missing for the HAProxy main
container, although they are there for the init container. This patchset
adds the resource clause to the main container.

Change-Id: I0441dddfbee86da7a4fa6311f6b5e4eb274601bc
2020-02-21 14:22:43 +00:00
KHIYANI, RAHUL (rk0850) 83d8616cc3 Add apparmor profile to promenade charts
adding apparmor profile to haproxy-anchor chart

Change-Id: Ifa27ac8335e9990fe9f39aa02e63835019ec6461
2020-02-07 15:58:26 +00:00
anthony.bellino a02eaa64f9 fix haproxy anchor pre-stop not working
The pre-stop script tries to touch /tmp/stop,
however because of a rofs, fails with permission denied
resulting in the anchor pod getting stuck in Terminating.

This PS adds the mount path /tmp to the anchor container to
resolve the issue.

Change-Id: I3380e4a62b20ae8fdc5da1a72e6794e7cc357218
2019-09-30 13:35:23 +00:00
BARTRA, RICK 19169bb458 Run haproxy pod with the nobody user (65534)
To be able to run with the nobody user, an init container
is used in the haproxy-anchor pod to change the ownership and
permissions of '/host/etc/promenade/haproxy'. Security conext
was included in 'etc/kubernetes/manifests/haproxy.yaml' and
'promenade/schemas/Genesis.yaml' schema was updated to included
run_as_user property for haproxy pod.

Change-Id: Id248face0be43c417284ceb781997634a9c4dd5e
2019-09-11 16:18:30 -05:00
Kumar, Nishant(nk613n) 75d3a86234 Add release uuid annotation to POD spec
Change-Id: Id4a96de7da9233589b54217e04a346281eaea68c
2019-06-25 14:55:05 +00:00
pd2839 da343eb212 Haproxy: Add pod/container security context
This updates k8s chart to include the podsecurity context
on the pod template

This also adds the container security context to set
readOnlyRootFilesystem to true

Change-Id: Ic823232fbbb3b0967047d88de81f6a2ee83dcd3e
2019-06-12 19:05:10 +00:00
Sean Eagan 184d114062 Move to tiller 2.14.0
This version fixes manifest validation [0], so a couple invalid
manifests are fixed in this patchset as well.

[0]: 32d7f1a3fc

Change-Id: I0cbdf21cf016271bef2d8a541687ce3ab28081ce
2019-05-20 14:17:46 -05:00
Sean Eagan 2e2a30515c Use apps/v1 k8s controllers and add labels
Daemonset update strategy defaults to OnDelete in v1beta1, whereas
it defaults to RollingUpdate in v1, which seems prefereable.

This also adds helm-toolkit based labels at the controller level
to match standard usage such as for example by armada as wait labels.

This change has been tested using the promenade resiliency gate.

Change-Id: I9fd1bc4caedc0a6717b779e5333640ca8dc78b7e
2019-04-23 09:24:53 -05:00
Matt McEuen eae60aba15 Add release uuid to pods and rc objects (prom)
This PS adds the ability to attach a release uuid to pods and rc
objects as desired.  This can be used, for example, to force an
artificial manifest change in CICD scenarios, for upgradability
testing purposes.

Change-Id: I8d0ffac306258f940c63799e86e7e26b5c2c5add
2018-10-16 12:43:32 -05:00
Andrey Volkov b3bc7273b2 Make haproxy-anchor pod critical
Continuation of Ia1449d188c15b71dd756e96b1ea2d4a672011a17.

This patch adds an annotation for haproxy-anchor pod to make
it critical as the presence of HAProxy config is dependent on it.

Change-Id: I5026f330cb92d57eec0f285fef98b0de3fa680bd
2018-10-01 15:18:58 -07:00
Aaron Sheffield e84939c574 Add readOnlyRootFilesystem to HAProxy and CoreDNS.
- Added security context readOnlyRootFilesystem as true.

Change-Id: I84ea5a17f84bebac795e7ed72a7dff530ef081bb
2018-08-21 13:25:47 -05:00
Mark Burnett ff3787c2ad Use HAProxy for apiserver discovery
This removes the reliance on coredns for APIserver discovery, allowing
a simpler configuration that is compatible with corednx 1.0.x

Change-Id: Ia3b7b5627c16ec47af6b0d6d5e8dee2674e9b1ee
2018-02-08 14:30:35 -06:00