migrate Deployment apiVersion from extensions/v1beta1 to apps/v1 to support k8s 1.16 (#5159)

* migrate Deployment apiVersion from extensions/v1beta1 to apps/v1 to support k8s 1.16

* migrate Deployment, PodSecurityPolicy apiVersion to support k8s 1.16
This commit is contained in:
Naoki Oketani 2019-10-16 02:56:21 +09:00 committed by Istio Automation
parent 612d10c921
commit 31d21ffbb4
11 changed files with 20 additions and 20 deletions

View File

@ -124,7 +124,7 @@ The configuration changes above (by Helm or by the configuration map) effect all
Rather than install Istio with different Helm option, you can annotate Pod with `sidecar.istio.io/rewriteAppHTTPProbers: "true"`.
{{< text yaml >}}
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: liveness-http

View File

@ -29,7 +29,7 @@ metadata:
app: istio-galley
name: istio-galley
ownerReferences:
- apiVersion: extensions/v1beta1
- apiVersion: apps/v1
blockOwnerDeletion: true
controller: true
kind: Deployment

View File

@ -128,7 +128,7 @@ components:
galley:
k8s:
overlays:
- apiVersion: extensions/v1beta1
- apiVersion: apps/v1
kind: Deployment
name: istio-galley
patches:

View File

@ -171,7 +171,7 @@ value `false` to the pod template spec to override the default and disable injec
The following example uses the `sidecar.istio.io/inject` annotation to disable sidecar injection.
{{< text yaml >}}
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: ignored

View File

@ -94,7 +94,7 @@ spec:
app: elasticsearch
---
# Elasticsearch Deployment
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: elasticsearch
@ -157,7 +157,7 @@ spec:
app: fluentd-es
---
# Fluentd Deployment
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: fluentd-es
@ -242,7 +242,7 @@ spec:
app: kibana
---
# Kibana Deployment
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: kibana

View File

@ -104,7 +104,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}}
$ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: istio-nodeagent
@ -164,7 +164,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}}
$ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1
apiVersion: policy/v1beta1
kind: PodSecurityPolicy
metadata:
name: istio-sds-uds
@ -249,7 +249,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}}
$ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: normal
@ -281,7 +281,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}}
$ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: malicious

View File

@ -537,7 +537,7 @@ to hold the configuration of the NGINX server:
selector:
app: sleep
---
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: sleep

View File

@ -64,7 +64,7 @@ This example uses [Squid](http://www.squid-cache.org) but you can use any HTTPS
{{< text bash >}}
$ kubectl apply -f - <<EOF
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: squid

View File

@ -80,7 +80,7 @@ spec:
selector:
app: helloworld
---
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: helloworld
@ -100,7 +100,7 @@ spec:
ports:
- containerPort: 5000
---
apiVersion: extensions/v1beta1
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
annotations:

View File

@ -143,7 +143,7 @@ need to create secrets for multiple hosts and update the gateway definitions.
selector:
app: httpbin
---
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: httpbin
@ -328,7 +328,7 @@ retrieves unique credentials corresponding to a specific `credentialName`.
selector:
app: helloworld-v1
---
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: helloworld-v1

View File

@ -26,7 +26,7 @@ you will apply a rule to mirror a portion of traffic to `v2`.
{{< text bash >}}
$ cat <<EOF | istioctl kube-inject -f - | kubectl create -f -
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: httpbin-v1
@ -52,7 +52,7 @@ you will apply a rule to mirror a portion of traffic to `v2`.
{{< text bash >}}
$ cat <<EOF | istioctl kube-inject -f - | kubectl create -f -
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: httpbin-v2
@ -100,7 +100,7 @@ you will apply a rule to mirror a portion of traffic to `v2`.
{{< text bash >}}
$ cat <<EOF | istioctl kube-inject -f - | kubectl create -f -
apiVersion: extensions/v1beta1
apiVersion: apps/v1
kind: Deployment
metadata:
name: sleep