migrate Deployment apiVersion from extensions/v1beta1 to apps/v1 to support k8s 1.16 (#5159)

* migrate Deployment apiVersion from extensions/v1beta1 to apps/v1 to support k8s 1.16

* migrate Deployment, PodSecurityPolicy apiVersion to support k8s 1.16
This commit is contained in:
Naoki Oketani 2019-10-16 02:56:21 +09:00 committed by Istio Automation
parent 612d10c921
commit 31d21ffbb4
11 changed files with 20 additions and 20 deletions

View File

@ -124,7 +124,7 @@ The configuration changes above (by Helm or by the configuration map) effect all
Rather than install Istio with different Helm option, you can annotate Pod with `sidecar.istio.io/rewriteAppHTTPProbers: "true"`. Rather than install Istio with different Helm option, you can annotate Pod with `sidecar.istio.io/rewriteAppHTTPProbers: "true"`.
{{< text yaml >}} {{< text yaml >}}
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: liveness-http name: liveness-http

View File

@ -29,7 +29,7 @@ metadata:
app: istio-galley app: istio-galley
name: istio-galley name: istio-galley
ownerReferences: ownerReferences:
- apiVersion: extensions/v1beta1 - apiVersion: apps/v1
blockOwnerDeletion: true blockOwnerDeletion: true
controller: true controller: true
kind: Deployment kind: Deployment

View File

@ -128,7 +128,7 @@ components:
galley: galley:
k8s: k8s:
overlays: overlays:
- apiVersion: extensions/v1beta1 - apiVersion: apps/v1
kind: Deployment kind: Deployment
name: istio-galley name: istio-galley
patches: patches:

View File

@ -171,7 +171,7 @@ value `false` to the pod template spec to override the default and disable injec
The following example uses the `sidecar.istio.io/inject` annotation to disable sidecar injection. The following example uses the `sidecar.istio.io/inject` annotation to disable sidecar injection.
{{< text yaml >}} {{< text yaml >}}
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: ignored name: ignored

View File

@ -94,7 +94,7 @@ spec:
app: elasticsearch app: elasticsearch
--- ---
# Elasticsearch Deployment # Elasticsearch Deployment
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: elasticsearch name: elasticsearch
@ -157,7 +157,7 @@ spec:
app: fluentd-es app: fluentd-es
--- ---
# Fluentd Deployment # Fluentd Deployment
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: fluentd-es name: fluentd-es
@ -242,7 +242,7 @@ spec:
app: kibana app: kibana
--- ---
# Kibana Deployment # Kibana Deployment
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: kibana name: kibana

View File

@ -104,7 +104,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | kubectl apply -f - $ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1 apiVersion: policy/v1beta1
kind: PodSecurityPolicy kind: PodSecurityPolicy
metadata: metadata:
name: istio-nodeagent name: istio-nodeagent
@ -164,7 +164,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | kubectl apply -f - $ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1 apiVersion: policy/v1beta1
kind: PodSecurityPolicy kind: PodSecurityPolicy
metadata: metadata:
name: istio-sds-uds name: istio-sds-uds
@ -249,7 +249,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | kubectl apply -f - $ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: normal name: normal
@ -281,7 +281,7 @@ To enable the pod security policy, perform the following steps:
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | kubectl apply -f - $ cat <<EOF | kubectl apply -f -
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: malicious name: malicious

View File

@ -537,7 +537,7 @@ to hold the configuration of the NGINX server:
selector: selector:
app: sleep app: sleep
--- ---
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: sleep name: sleep

View File

@ -64,7 +64,7 @@ This example uses [Squid](http://www.squid-cache.org) but you can use any HTTPS
{{< text bash >}} {{< text bash >}}
$ kubectl apply -f - <<EOF $ kubectl apply -f - <<EOF
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: squid name: squid

View File

@ -80,7 +80,7 @@ spec:
selector: selector:
app: helloworld app: helloworld
--- ---
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: helloworld name: helloworld
@ -100,7 +100,7 @@ spec:
ports: ports:
- containerPort: 5000 - containerPort: 5000
--- ---
apiVersion: extensions/v1beta1 apiVersion: networking.k8s.io/v1beta1
kind: Ingress kind: Ingress
metadata: metadata:
annotations: annotations:

View File

@ -143,7 +143,7 @@ need to create secrets for multiple hosts and update the gateway definitions.
selector: selector:
app: httpbin app: httpbin
--- ---
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: httpbin name: httpbin
@ -328,7 +328,7 @@ retrieves unique credentials corresponding to a specific `credentialName`.
selector: selector:
app: helloworld-v1 app: helloworld-v1
--- ---
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: helloworld-v1 name: helloworld-v1

View File

@ -26,7 +26,7 @@ you will apply a rule to mirror a portion of traffic to `v2`.
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | istioctl kube-inject -f - | kubectl create -f - $ cat <<EOF | istioctl kube-inject -f - | kubectl create -f -
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: httpbin-v1 name: httpbin-v1
@ -52,7 +52,7 @@ you will apply a rule to mirror a portion of traffic to `v2`.
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | istioctl kube-inject -f - | kubectl create -f - $ cat <<EOF | istioctl kube-inject -f - | kubectl create -f -
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: httpbin-v2 name: httpbin-v2
@ -100,7 +100,7 @@ you will apply a rule to mirror a portion of traffic to `v2`.
{{< text bash >}} {{< text bash >}}
$ cat <<EOF | istioctl kube-inject -f - | kubectl create -f - $ cat <<EOF | istioctl kube-inject -f - | kubectl create -f -
apiVersion: extensions/v1beta1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
name: sleep name: sleep