-
Notifications
You must be signed in to change notification settings - Fork 40k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Revamp CoreOS getting started guides #9178
Comments
From a starting point of a working CoreOS cluster which includes etcd and flannel, it would be a small step to run containers for kubernetes and import manifests. The current situation of cross-machine waiting scripts is fragile. Looking forward to testing and providing feedback. |
Yes.
This is a tricky one since it depends on how you provision your VM. For now, I think it's safe to keep current behavior. Do you have a better suggestion?
The idea is to deploy DNS as per Kubernetes DNS add-on. Other than that, I've never used the manifests thing.
My personal take on this is that Kubernetes is a distributed framework for distributed apps. Running it on a single machine may eventually make sense for development purposes, but not for staging or production.
Good question. I've never tried containerized components before but I'd say that for CoreOS it won't matter much, since everything is a
My question then is, how would you do it with run containers for kubernetes and import manifests? @hobti01 final question. Would you take on this? I'm just doing it because I want to help, but right now it's become quite a burden eheh, and you seem much more interested about this than I am. |
/cc @bakins |
+1 |
+1 |
@chanezon Heh. If I'm being asked to comment on the below, then +1.
|
@chanezon @squillace @errordeveloper what I need from you guys, the maintainers of CoreOS on Azure, is to work with me or anyone else to get things tested before opening PR. I don't have an Azure account or experience with it, so that's why. |
@pires I can test on azure, and I can get you a test account on azure if you would like to test as well. I'm unlikely to be able to test, however, until Monday. But I'm happy to do it. |
Removing Yes, add DNS integration. It is basically required. |
DNS is required in pretty much every way. On Wed, Jun 3, 2015 at 5:49 PM, Eric Tune notifications@github.com wrote:
|
@pires it's a great goal, however there should a well-defined extend to which we should go. For example, the Azure example uses this JS wrapper around the CLI which does a number of things like generating SSH config file and some other state files, as well as generating cloud-config manifests from template in a kind of nice way (I find). I think the best we could get to would be around systemd unit names and paths of binaries, as well as other cosmetic things like etcd port that had been mentioned. After that, we could also start reducing duplication of unit definitions in some way. |
I agree with @errordeveloper that there should be a common setup. Each example could complete or extend the common templates for environment specific requirements. In order to achieve a template-based approach for any CoreOS install, is it sensible to use @crawford 's two-phase cloud-init approach? https://gist.github.com/crawford/ed7e954bfddd3394c775 @pires Until our lawyers accept the CLA I cannot contribute directly, unfortunately. |
@errordeveloper I'm only concerned about reproduce the following in all set-ups:
Of course, how this is achieved will depend on each provider own tools ( I agree we should aim for something simpler and cleaner now and work towards a common base in the future, like launching |
Just want to point out that a fully automated setup is great, but there also needs to be corresponding documentation on manual setup for those with custom environments (or who do not trust third party scripts). |
@bkeroackdsc while this is an official repo, a lot of the scripts you see here were/are created and maintained by people outside of Google, RedHat and all other Kubernetes official supporters. So good luck with that! |
@pires we might consider a document for this on azure.com. I won't have headspace to consider what's necessary until next week, but I'm happy to respond then. |
@squillace there's time before 1.0 so one week time is more than good. @AntonioMeireles will probably get on this as well. |
1 and 2 are done by #10344. |
@pires Do you need help on this? |
@kelseyhightower definitely! Thank you.
|
Can we update the config to support 1.0.1 too? |
@feelobot as fair as I'm concerned it's just a matter of updating the versions on both cloud-config files, |
@pires I think some of the api options that are passed no longer exist in 1.0.1 but I'm not sure. |
@feelobot from 0.21.x to 1.x no flags have changed. At least, the ones used in the current CoreOS documents. |
ok ill give it a go with the modified .yml files and if it works ill submit a PR |
made the PR #12295 |
…eos/coreos_multinode_cluster.md. Refs kubernetes#11975 Removed deprecated and unmaintained fork of pires/kubernetes-vagrant-coreos-cluster linked in the docs. Removed deprecated and unmaintained VMware + CoreOS section of coreos/coreos_multinode_cluster.md. Refs kubernetes#13143 Refs kubernetes#9178
After #13151 is merged, we're only missing DNS integration and API authentication. |
Note to anyone interested: some people also want the UI, since this is part of the Kubernetes official release. |
DNS is a big deal since it's basically required for service discovery. I was having some issues getting it to work on CoreOS via the official docs pre-1.0. Haven't tried recently. |
@bkeroackdsc after #13151 is merged, I'll add DNS integration. |
If it's helpful, I'll have to tweak it a little, but I can provide an alternate CloudFormation intended for launching into an existing VPC, as well. |
@mariomarin it has been deleted, so add it once more, if you're able to maintain it in the future. |
Ok. From a prior comment, I was under the impression that your CF made a new VPC, but going back and reading the full threads in question, I see you were actually talking about The only non-stylistic difference in my CF is:
These allow my master to be ephemeral. My nodes just point to the hostname of the ELB to access |
@jcderr I like your approach. However, I want to match kube-up as close as possible and it seems to be using static clustering for etcd, right? |
Correct. I would say leave it the way you have it, and maybe call out a more robust production suggestion for standalone etcd, similar to how the CoreOS talks about their clustering setups here. |
Fixed by #14387 |
Refs #9075 as @thockin wants (we all do) CoreOS documentation to be sober on 1.0 release.
@thockin @erictune @AntonioMeireles I have questions.
hyperkube
.master.yaml
needs instrumentation to generate service-account private key file, so it will depend onopenssl
. Any objections?aws
folder fromgetting-started-guides
folder, togetting-started-guides/coreos
, in order to match how it's done withazure
.Speaking of which @errordeveloper @squillace @chanezon @crossorigin do you agree with questions 1, 2 and 3? Also, can we sync effort to get it homogeneous on all different CoreOS approaches?
The text was updated successfully, but these errors were encountered: