Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Script for collecting window and ubuntu worker logs #354

Merged
merged 7 commits into from
Jan 10, 2020

Conversation

arun-amzn
Copy link
Contributor

*Issue #, if available: NA

*Description of changes: Script for collecting logs required for debugging Windows worker nodes

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

@mogren
Copy link

mogren commented Oct 13, 2019

@nithu0115 👀

@nithu0115
Copy link
Contributor

@arun-amzn, could you please create new directory for windows instead of updating existing one to make it less cumbersome ?

@arun-amzn
Copy link
Contributor Author

arun-amzn commented Oct 13, 2019

@arun-amzn, could you please create new directory for windows instead of updating existing one to make it less cumbersome ?

Should I go with creating a sub-directory for windows in log-collector-script and keep the script and readme over there. I think it better to have SSM document supports both OS. Or new directory for window log collector (log-collector-script-windows) and maintainer everything there. Please suggest @nithu0115

@nithu0115
Copy link
Contributor

@arun-amzn, could you please create new directory for windows instead of updating existing one to make it less cumbersome ?

Should I go with creating a sub-directory for windows in log-collector-script and keep the script and readme over there. I think it better to have SSM document supports both OS. Or new directory for window log collector (log-collector-script-windows) and maintainer everything there. Please suggest @nithu0115

@arun-amzn, to provide better code readability and maintainability, please create 2 new sub-directories under log-collector-script - for-linux, for-windows and move the existing/new scripts, SSM documents, Readme into the respective directories.

--log-collector-script
       |--for-linux
       |--for-windows

@arun-amzn arun-amzn changed the title Script for collecting window worker logs Script for collecting window and ubuntu worker logs Oct 17, 2019
@mogren
Copy link

mogren commented Dec 31, 2019

@arun-amzn Thanks for adding the snap support.

Just a question though, why adding so many empty lines between every sentence in the READMEs? The looked fine before, all the empty lines do not improve the readability.

@arun-amzn
Copy link
Contributor Author

@arun-amzn Thanks for adding the snap support.

Just a question though, why adding so many empty lines between every sentence in the READMEs? The looked fine before, all the empty lines do not improve the readability.

I think my editor were causing the issue. I have updated the READMEs now.

snap)
timeout 75 snap logs kubelet-eks -n all > "${COLLECT_DIR}"/kubelet/kubelet.log

timeout 75 snap get kubelet-eks > "${COLLECT_DIR}"/kubelet/"${entry}"_service.txt 2>&1
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think this line has been a bit mixed up compared to the the previous switch statement. I assume we want both kubelet and kube-proxy logs here as well, and the systemctl output? Or is kube-proxy started some other way?

      timeout 75 snap logs kubelet-eks -n all > "${COLLECT_DIR}"/kubelet/kubelet.log
      timeout 75 snap logs kube-proxy -n all > "${COLLECT_DIR}"/kubelet/kubeproxy.log

      for entry in kubelet-eks kube-proxy; do
        systemctl cat "${entry}" > "${COLLECT_DIR}"/kubelet/"${entry}"_service.txt 2>&1
      done

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

kube-proxy is configured as daemon-set . So, there wouldn't be any logs from systemd or snap. i think we need to remove those from systemd as well. What you say ?

systemd)
      timeout 75 journalctl --unit=kubelet --since "${DAYS_10}" > "${COLLECT_DIR}"/kubelet/kubelet.log
      timeout 75 journalctl --unit=kubeproxy --since "${DAYS_10}" > "${COLLECT_DIR}"/kubelet/kubeproxy.log

      for entry in kubelet kube-proxy; do
        systemctl cat "${entry}" > "${COLLECT_DIR}"/kubelet/"${entry}"_service.txt 2>&1
      done

Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes, that sounds right. Also that you can't use "${entry}" in the output file path for the snap get command.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Update the kubelet service details for snap and systemd. Also, changed the way we collect the kubeconfig when kubectl is not available.

Copy link

@mogren mogren left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks a lot @arun-amzn for iterating on this PR! LGTM, but I'll ask @nithu0115 to take a look as well, since he wrote the initial version of this script.

The project can be used in normal or Enable/Disable Debug(**Caution: Enable/Disable Debug will restart Docker daemon which would kill running containers**).

```
# sudo bash eks-log-collector.sh --help
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should be .ps1 ?

Copy link
Contributor

@nithu0115 nithu0115 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Overall, this looks good! But, few things, please see comments inline.


```
# sudo bash eks-log-collector.sh --help
USAGE: eks-log-collector --help [ --mode=collect|enable_debug --ignore_introspection=true|false --ignore_metrics=true|false ]
Copy link
Contributor

@nithu0115 nithu0115 Jan 7, 2020

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I don't see ignore_introspection, ignore_metrics functions in the script. Can you update the readme section to match help from the script.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I have updated the readme for the same.

@mogren
Copy link

mogren commented Jan 10, 2020

@arun-amzn Thanks for all your work. Just needs a rebase because of the Docker-in-Docker fix adding -o to pgrep that got merged in #389.

@arunbhagyanath
Copy link

@arun-amzn Thanks for all your work. Just needs a rebase because of the Docker-in-Docker fix adding -o to pgrep that got merged in #389.

@mogren Rebased.

@nithu0115
Copy link
Contributor

nithu0115 commented Jan 10, 2020

LGTM! Thanks for your efforts on this. One last minor thing @arun-amzn, can you squash all these changes to single commit ?

@mogren mogren merged commit b425e43 into awslabs:master Jan 10, 2020
shabir61 added a commit to OpenGov/amazon-eks-ami that referenced this pull request Apr 20, 2020
* Moving log collector script to Amazon eks ami repo (awslabs#243)

* Moving log collector script to this repo

* Added changes according to 1.4.1

* Update eks-log-collector.sh URL on readme

The instructions on readme were still pointing at the original repository. Updating to reflect the new location

* remove kubectl dependency (awslabs#295)

* Added CHANGELOG for v20190701

* Install ec2-instance-connect

* refactor packer variables

* Add c5.12xlarge and c5.24xlarge instances

* Add new m5 and r5 instances

* Fix t3a.small limit

* add support for ap-east-1 region (awslabs#305)

* 2107 allow private ssh when building (awslabs#303)

* added a set of variables to allow private ssh to non-default vpc

* make filepaths of ./files/ and install-worker relative to packer template dir

* updated ami_description to a variable

* change the amiName pattern to use minor version (awslabs#307)

* update S3_URL_BASE environment variable in install-worker.sh

* v20190814 release (awslabs#316)

* Update list of instance types (awslabs#320)

* Add all new instance types already added to the CNI

* Add support for the u-*tb1.metal instances (Fix awslabs#319)

* add support for me-south-1 region (awslabs#322)

* Adding new directory and file for 1.14 and above by removing --allow-privileged=true flag (awslabs#327)

* Add Change log for AMI Release v20190906 (awslabs#329)

* sync nodegroup template to latest available (awslabs#335)

* sync eks node group template to be latest available
1. add support to use ssm parameter for amiID
2. add support for all instance types supported by cni
3. formatted with rain(https://github.com/aws-cloudformation/rain)

* add new CFN version 2019-09-17

* Add support for g4 instance family

* Add G4DN instance family to node group template

* Add change log for AMI Release v20190927 (awslabs#345)

* Add 1.14 to the EKS Makefile and update older versions (awslabs#336)

Add 1.14 to the list of Makefile targets.

Remove 1.10 as it's no longer a supported version

Update versions and build dates for older EKS versions

* Add support for m5n/m5dn/r5n/r5dn instances

* Remove snowflake for kubelet secret-polling config (awslabs#352)

* Set a minimum evictionHard and kubeReserved

* Output the autoscaling group name

This name of the AutoScaling Group is useful for things like the Cluster Autoscaler so that it can manage automatic cluster scaling.

* awslabs#361 - custom pause container image support (awslabs#362)

* awslabs#361 - custom pause container image support

* Set kubeReserved dynamically and evictionHard statically (awslabs#367)

* Updating Docker version (awslabs#373)

* Remove the ec2-net-utils package (awslabs#368)

* Remove the ec2-net-utils package

* Add code comment to describe the ec2-net-utils change

* Make 'kube-bench' happy.

Signed-off-by: Bruno Miguel Custódio <brunomcustodio@gmail.com>

* add support for c5d.12x/c5d.24x/c5d.metal

* Adding new instance types (m6g) (awslabs#378)

* Revert "Make 'kube-bench' happy." since there are changes being concerned (awslabs#381)

This reverts commit 593691e.

* Fixed setting of DNS_CLUSTER_IP in bootstrap.sh (awslabs#226)

* Replaced API calls for deciding DNS_CLUSTER_IP with arg
* Bypass the metadata calls to avoid 404 errors
* Fall back to MAC logic if --dns-cluster-ip is absent
* Updated comment for --dns-cluster-ip

* Support docker-in-docker by only returning the oldest dockerd process

* TLS Ciphersuite: restrict to TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

See section 2.1.14 of the CIS benchmark:

> [2.1.14] Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers
> If using a Kubelet config file, edit the file to set TLSCipherSuites: to TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256
> If using executable arguments, edit the kubelet service file /etc/systemd/system/kubelet.service on each worker node and set the below parameter.
> --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256

Note that this is a regression, this had been set previously in PR awslabs#276
but got lost in awslabs#352.

* Script for collecting window and ubuntu worker logs (awslabs#354)

* Script for collecting window worker logs
* Ubuntu support and directory re-org
* Collect files from EKS logs folder
* Updates to kubelet svc and kubeconfig
* Updated Readme for Windows

* add ability to specify aws_region & binary_bucket_region & source_ami_owners (awslabs#396)

* adding support for china regions (awslabs#398)

* kubelet.service should wait for iptables lock (awslabs#401)

This commit makes kubelet.service wait up to 5 seconds for an iptables lock in the `ExecStartPre` step, instead of failing immediately if something else is holding the lock.

* fix tls suit to be recommended by cis bench (awslabs#403)

* Fix retries in bootstrap.sh

If `aws eks describe-cluster` fails the first time, the retries never work because the `rc` value is never able to be set back to zero

* update binaries to use latest ones (awslabs#408)

* validate_yum (awslabs#411)

* add ability to use precreated security group (awslabs#412)

* add scripts folder (awslabs#413)

* Remove invalid target 1.11 (awslabs#421)

Currently, AWS EKS is no longer support Kubernetes 1.11

* Update install-worker.sh and eks-worker-al2.json (awslabs#402)

* Update install-worker.sh and eks-worker-al2.json

* Update kubelet.service

* added ability to share amis in builder

* added ability to share amis in builder

* Rebasing from master

* Added remote_folder to cleanup_additional_repos.sh provisioner

* Added remote_folder to install_additional_repos.sh provisioner

* Added remote_folder to validate.sh provisioner

* adding support for 1.14 and updating cni

* cni to v0.6.0 back - as v.0.7.1 has no binary

* reverting back to plugins version

* Remove mutating calls and ignore collection of unknown logs

* Added 1.15 support and removed --allow-privileged flag from all EKS supported versions (1.12+). (awslabs#428)

* Fix URL for 1.15 binaries (awslabs#429)

* Fixed amazon-eks-nodegroup.yaml lint issues

* Consistent Docker GID version in Image (awslabs#430)

* Docker install across versions change GID for docker, this causes problems for consistency. This commit solves it by adding same GID to docker install

* Docker install across versions change GID for docker, this causes problems for consistency. This commit solves it by adding same GID to docker install

Co-authored-by: Janis Orlovs <janis.orlovs@fino.tech>

* Move compressed file to /var/log (awslabs#436)

* Force create the group id (awslabs#437)

"the -f is force, -o is overwrite, meaning if there is an existing group with number 1950, it will create a new one with the name docker"

* Fix useradd to run with privileges

* Removing dependency on Authenticator binary (awslabs#440)

* Reducing memory allocated in kubeReserved (awslabs#419)

* Revert "Removing dependency on Authenticator binary (awslabs#440)" (awslabs#446)

This reverts commit 4e0e916.

* Adding support to upgrade kernel while building AMI (awslabs#447)

* fix(amazon-eks-nodegroup): add ec2 service principals for isolated regions

* Add inf1 instance family in EKS AMI packer configuration

* Removed AssociatePublicIpAddress setting from NodeLaunchCongig and added NodeSecurityGroup dependency to SG Ingress/Egress (awslabs#450)

Co-authored-by: Vishal Gupta <guvishl@amazon.com>

* added 1.15

* updated Jenkinsfile

* updated kubelet latest from main source

* typo

* make kubelet service matches original master branch

* Makefile updated

* updated a few more

* newline - yea newline

* revert back to 1.15.10

* updated install-worker.sh

Co-authored-by: Nithish <nithu0115@gmail.com>
Co-authored-by: Hugo Ribeiro <33881233+huribeir@users.noreply.github.com>
Co-authored-by: M00nF1sh <yyyng@amazon.com>
Co-authored-by: Micah Hausler <mhausler@amazon.com>
Co-authored-by: Matthew Wong <mattwon@amazon.com>
Co-authored-by: Claes Mogren <mogren@amazon.com>
Co-authored-by: wong yan yee <houdinisparks@gmail.com>
Co-authored-by: blakeroberts-wk <blake.roberts@workiva.com>
Co-authored-by: josselin-c <thecr3pe@gmail.com>
Co-authored-by: Bhagwat kumar Singh <bhagwat0709@gmail.com>
Co-authored-by: Jiaxin Shan <seedjeffwan@gmail.com>
Co-authored-by: Will Thames <will@thames.id.au>
Co-authored-by: Shyam JVS <jeedigv@amazon.com>
Co-authored-by: Dwayne Bailey <dwayne@translate.org.za>
Co-authored-by: Andrew Johnstone <andrew@ajohnstone.com>
Co-authored-by: natherz97 <55205932+natherz97@users.noreply.github.com>
Co-authored-by: Kausheel Kumar <kausheelkumar@gmail.com>
Co-authored-by: Bruno Miguel Custódio <brunomcustodio@gmail.com>
Co-authored-by: ajayk <ajaykemparaj@gmail.com>
Co-authored-by: sramabad1 <53882229+sramabad1@users.noreply.github.com>
Co-authored-by: Cheng Pan <chengpan@amazon.com>
Co-authored-by: Andrew Hemming <drewhemm@users.noreply.github.com>
Co-authored-by: Eric Webster <sophomeric@gmail.com>
Co-authored-by: Florent Delannoy <florent.delannoy.external@ynap.com>
Co-authored-by: Arun Bhagyanath <45223433+arun-amzn@users.noreply.github.com>
Co-authored-by: Justin Owen <justinowen@asana.com>
Co-authored-by: Aaron Ackerman <theron17@gmail.com>
Co-authored-by: Tam Mach <sayboras@yahoo.com>
Co-authored-by: zadowsmash <ashrohde@gmail.com>
Co-authored-by: Shabir Ahmed <shabirahmed@OSX-0591.local>
Co-authored-by: Abeer Sethi <38733827+abeer91@users.noreply.github.com>
Co-authored-by: Will Thames <wthames@skedulo.com>
Co-authored-by: Octavio Martin <octavio.martin.montenegro@verizonmedia.com>
Co-authored-by: Jānis Orlovs <janis.orlovs@gmail.com>
Co-authored-by: Janis Orlovs <janis.orlovs@fino.tech>
Co-authored-by: Divyesh Khandeshi <dkhandeshi@users.noreply.github.com>
Co-authored-by: cmdallas <self@chrisdallas.tech>
Co-authored-by: gaogilb <gaogilb@amazon.com>
Co-authored-by: Vishal Gupta <vishal.gupta4081@gmail.com>
Co-authored-by: Vishal Gupta <guvishl@amazon.com>
sakomws pushed a commit to OpenGov/amazon-eks-ami that referenced this pull request May 13, 2020
* Moving log collector script to Amazon eks ami repo (awslabs#243)

* Moving log collector script to this repo

* Added changes according to 1.4.1

* Update eks-log-collector.sh URL on readme

The instructions on readme were still pointing at the original repository. Updating to reflect the new location

* remove kubectl dependency (awslabs#295)

* Added CHANGELOG for v20190701

* Install ec2-instance-connect

* refactor packer variables

* Add c5.12xlarge and c5.24xlarge instances

* Add new m5 and r5 instances

* Fix t3a.small limit

* add support for ap-east-1 region (awslabs#305)

* 2107 allow private ssh when building (awslabs#303)

* added a set of variables to allow private ssh to non-default vpc

* make filepaths of ./files/ and install-worker relative to packer template dir

* updated ami_description to a variable

* change the amiName pattern to use minor version (awslabs#307)

* update S3_URL_BASE environment variable in install-worker.sh

* v20190814 release (awslabs#316)

* Update list of instance types (awslabs#320)

* Add all new instance types already added to the CNI

* Add support for the u-*tb1.metal instances (Fix awslabs#319)

* add support for me-south-1 region (awslabs#322)

* Adding new directory and file for 1.14 and above by removing --allow-privileged=true flag (awslabs#327)

* Add Change log for AMI Release v20190906 (awslabs#329)

* sync nodegroup template to latest available (awslabs#335)

* sync eks node group template to be latest available
1. add support to use ssm parameter for amiID
2. add support for all instance types supported by cni
3. formatted with rain(https://github.com/aws-cloudformation/rain)

* add new CFN version 2019-09-17

* Add support for g4 instance family

* Add G4DN instance family to node group template

* Add change log for AMI Release v20190927 (awslabs#345)

* Add 1.14 to the EKS Makefile and update older versions (awslabs#336)

Add 1.14 to the list of Makefile targets.

Remove 1.10 as it's no longer a supported version

Update versions and build dates for older EKS versions

* Add support for m5n/m5dn/r5n/r5dn instances

* Remove snowflake for kubelet secret-polling config (awslabs#352)

* Set a minimum evictionHard and kubeReserved

* Output the autoscaling group name

This name of the AutoScaling Group is useful for things like the Cluster Autoscaler so that it can manage automatic cluster scaling.

* awslabs#361 - custom pause container image support (awslabs#362)

* awslabs#361 - custom pause container image support

* Set kubeReserved dynamically and evictionHard statically (awslabs#367)

* Updating Docker version (awslabs#373)

* Remove the ec2-net-utils package (awslabs#368)

* Remove the ec2-net-utils package

* Add code comment to describe the ec2-net-utils change

* Make 'kube-bench' happy.

Signed-off-by: Bruno Miguel Custódio <brunomcustodio@gmail.com>

* add support for c5d.12x/c5d.24x/c5d.metal

* Adding new instance types (m6g) (awslabs#378)

* Revert "Make 'kube-bench' happy." since there are changes being concerned (awslabs#381)

This reverts commit 593691e.

* Fixed setting of DNS_CLUSTER_IP in bootstrap.sh (awslabs#226)

* Replaced API calls for deciding DNS_CLUSTER_IP with arg
* Bypass the metadata calls to avoid 404 errors
* Fall back to MAC logic if --dns-cluster-ip is absent
* Updated comment for --dns-cluster-ip

* Support docker-in-docker by only returning the oldest dockerd process

* TLS Ciphersuite: restrict to TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256

See section 2.1.14 of the CIS benchmark:

> [2.1.14] Ensure that the Kubelet only makes use of Strong Cryptographic Ciphers
> If using a Kubelet config file, edit the file to set TLSCipherSuites: to TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256
> If using executable arguments, edit the kubelet service file /etc/systemd/system/kubelet.service on each worker node and set the below parameter.
> --tls-cipher-suites=TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_128_GCM_SHA256

Note that this is a regression, this had been set previously in PR awslabs#276
but got lost in awslabs#352.

* Script for collecting window and ubuntu worker logs (awslabs#354)

* Script for collecting window worker logs
* Ubuntu support and directory re-org
* Collect files from EKS logs folder
* Updates to kubelet svc and kubeconfig
* Updated Readme for Windows

* add ability to specify aws_region & binary_bucket_region & source_ami_owners (awslabs#396)

* adding support for china regions (awslabs#398)

* kubelet.service should wait for iptables lock (awslabs#401)

This commit makes kubelet.service wait up to 5 seconds for an iptables lock in the `ExecStartPre` step, instead of failing immediately if something else is holding the lock.

* fix tls suit to be recommended by cis bench (awslabs#403)

* Fix retries in bootstrap.sh

If `aws eks describe-cluster` fails the first time, the retries never work because the `rc` value is never able to be set back to zero

* update binaries to use latest ones (awslabs#408)

* validate_yum (awslabs#411)

* add ability to use precreated security group (awslabs#412)

* add scripts folder (awslabs#413)

* Remove invalid target 1.11 (awslabs#421)

Currently, AWS EKS is no longer support Kubernetes 1.11

* Update install-worker.sh and eks-worker-al2.json (awslabs#402)

* Update install-worker.sh and eks-worker-al2.json

* Update kubelet.service

* added ability to share amis in builder

* added ability to share amis in builder

* Rebasing from master

* Added remote_folder to cleanup_additional_repos.sh provisioner

* Added remote_folder to install_additional_repos.sh provisioner

* Added remote_folder to validate.sh provisioner

* Remove mutating calls and ignore collection of unknown logs

* Added 1.15 support and removed --allow-privileged flag from all EKS supported versions (1.12+). (awslabs#428)

* Fix URL for 1.15 binaries (awslabs#429)

* Fixed amazon-eks-nodegroup.yaml lint issues

* Consistent Docker GID version in Image (awslabs#430)

* Docker install across versions change GID for docker, this causes problems for consistency. This commit solves it by adding same GID to docker install

* Docker install across versions change GID for docker, this causes problems for consistency. This commit solves it by adding same GID to docker install

Co-authored-by: Janis Orlovs <janis.orlovs@fino.tech>

* Move compressed file to /var/log (awslabs#436)

* Force create the group id (awslabs#437)

"the -f is force, -o is overwrite, meaning if there is an existing group with number 1950, it will create a new one with the name docker"

* Fix useradd to run with privileges

* Removing dependency on Authenticator binary (awslabs#440)

* Reducing memory allocated in kubeReserved (awslabs#419)

* Revert "Removing dependency on Authenticator binary (awslabs#440)" (awslabs#446)

This reverts commit 4e0e916.

* Adding support to upgrade kernel while building AMI (awslabs#447)

* fix(amazon-eks-nodegroup): add ec2 service principals for isolated regions

* Add inf1 instance family in EKS AMI packer configuration

* Removed AssociatePublicIpAddress setting from NodeLaunchCongig and added NodeSecurityGroup dependency to SG Ingress/Egress (awslabs#450)

Co-authored-by: Vishal Gupta <guvishl@amazon.com>

* Add a flag that allows CNI packages to be pulled from S3 instead of Github. (awslabs#457)

The default behavior is unchanged and will still pull assets from
Github.

* update source AMI owner and ECR repo for govcloud (awslabs#458)

* updated ipamd information files extension to json (awslabs#451)

* updated ipamd data file extension to json

* updated ipamd metrics file extension

* Adding 1.16 to Makefile (awslabs#459)

* downgrade

* Add a new manifest containing the AMI name (awslabs#471)

This commit adds a new manifest which contains AMI name in the manifest filename so that parallel builds can be triggered. Even though the new manifest is now generated along with the current one for backwards compatibility, eventually the old manifest (manifest.json) will be deprecated.

* changelog updated

* added udev setting

* small updates

* some fix

* added udev again

Co-authored-by: Nithish <nithu0115@gmail.com>
Co-authored-by: Hugo Ribeiro <33881233+huribeir@users.noreply.github.com>
Co-authored-by: M00nF1sh <yyyng@amazon.com>
Co-authored-by: Micah Hausler <mhausler@amazon.com>
Co-authored-by: Matthew Wong <mattwon@amazon.com>
Co-authored-by: Claes Mogren <mogren@amazon.com>
Co-authored-by: wong yan yee <houdinisparks@gmail.com>
Co-authored-by: blakeroberts-wk <blake.roberts@workiva.com>
Co-authored-by: josselin-c <thecr3pe@gmail.com>
Co-authored-by: Bhagwat kumar Singh <bhagwat0709@gmail.com>
Co-authored-by: Jiaxin Shan <seedjeffwan@gmail.com>
Co-authored-by: Will Thames <will@thames.id.au>
Co-authored-by: Shyam JVS <jeedigv@amazon.com>
Co-authored-by: Dwayne Bailey <dwayne@translate.org.za>
Co-authored-by: Andrew Johnstone <andrew@ajohnstone.com>
Co-authored-by: natherz97 <55205932+natherz97@users.noreply.github.com>
Co-authored-by: Kausheel Kumar <kausheelkumar@gmail.com>
Co-authored-by: Bruno Miguel Custódio <brunomcustodio@gmail.com>
Co-authored-by: ajayk <ajaykemparaj@gmail.com>
Co-authored-by: sramabad1 <53882229+sramabad1@users.noreply.github.com>
Co-authored-by: Cheng Pan <chengpan@amazon.com>
Co-authored-by: Andrew Hemming <drewhemm@users.noreply.github.com>
Co-authored-by: Eric Webster <sophomeric@gmail.com>
Co-authored-by: Florent Delannoy <florent.delannoy.external@ynap.com>
Co-authored-by: Arun Bhagyanath <45223433+arun-amzn@users.noreply.github.com>
Co-authored-by: Justin Owen <justinowen@asana.com>
Co-authored-by: Aaron Ackerman <theron17@gmail.com>
Co-authored-by: Tam Mach <sayboras@yahoo.com>
Co-authored-by: zadowsmash <ashrohde@gmail.com>
Co-authored-by: Abeer Sethi <38733827+abeer91@users.noreply.github.com>
Co-authored-by: Will Thames <wthames@skedulo.com>
Co-authored-by: Octavio Martin <octavio.martin.montenegro@verizonmedia.com>
Co-authored-by: Jānis Orlovs <janis.orlovs@gmail.com>
Co-authored-by: Janis Orlovs <janis.orlovs@fino.tech>
Co-authored-by: Divyesh Khandeshi <dkhandeshi@users.noreply.github.com>
Co-authored-by: cmdallas <self@chrisdallas.tech>
Co-authored-by: gaogilb <gaogilb@amazon.com>
Co-authored-by: Vishal Gupta <vishal.gupta4081@gmail.com>
Co-authored-by: Vishal Gupta <guvishl@amazon.com>
Co-authored-by: Bronson Mirafuentes <heybronson@gmail.com>
Co-authored-by: Sai Teja Penugonda <saiteja313@gmail.com>
Co-authored-by: Shabir Ahmed <shabirahmed@OSX-0591.local>
Co-authored-by: Saurav Agarwalla <saurav-agarwalla@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants