Commit Graph

2067 Commits

Author SHA1 Message Date
hriships 05e76883eb added liveness probes to mysql deployment 2018-08-30 00:09:47 +05:30
k8s-ci-robot 2f69166cb6
Merge pull request #253 from bgiorgini/patch-1
Update README.md
2018-08-23 14:03:15 -07:00
k8s-ci-robot f783b7a177
Merge pull request #262 from wangxy518/patch-1
Update jvm.options
2018-08-17 04:10:12 -07:00
wangxy518 9f51ba5514
Update jvm.options 2018-08-17 15:00:37 +08:00
k8s-ci-robot ce7fce7c49
Merge pull request #261 from fqsghostcloud/fix-README.md
fix README.md
2018-08-16 16:47:08 -07:00
fqsghostcloud dc243bdc0a
fix README.md
fix README.md
2018-08-14 09:41:15 +08:00
k8s-ci-robot 5a618dd3b4
Merge pull request #259 from dims/remove-stray-debug-echo-from-makefile
Remove stray debug echo from Makefile
2018-08-02 19:56:00 -07:00
Davanum Srinivas 2ab975dd4e
Remove stray debug echo from Makefile
oops #2

Change-Id: Ief434608f87afeb956a471ae35217b106a763739
2018-08-02 22:15:30 -04:00
k8s-ci-robot cfbc441ba6
Merge pull request #258 from dims/fix-oops-in-docker-push-parameter
oops! fix the image name when we run docker push
2018-08-02 16:02:27 -07:00
Davanum Srinivas 594d5df197
oops! fix the image name when we push
Change-Id: I1533e8be7a6292830c0a9eacc545d8fddd897b26
2018-08-02 18:26:52 -04:00
k8s-ci-robot fed0c13e04
Merge pull request #257 from dims/build-and-push-manifests-for-container-images
Build and push manifests for container images
2018-08-02 13:51:28 -07:00
Davanum Srinivas dc35258e19
Build and push manifests for container images
We build and push images for various architectures, but are not
publishing a single manifest that can be used to look up the images.
test/images in main k/k repository and kube images in k/release already
publish manifests for all the image we need for e2e testing, so we
should do the same as the 2 images in this repository are part of the
conformance e2e test suite.

Bumping version numbers as well.

Change-Id: I5f87af9e5ad15da86b9e99bcb7a60a81870d0836
2018-08-02 16:39:39 -04:00
k8s-ci-robot c4ca96d76f
Merge pull request #255 from dims/guest-book-remove-explicit-install-for-php-pear
guestbook : Remove explicit install for php-pear
2018-07-30 08:54:58 -07:00
Davanum Srinivas cd651b9ea6
guestbook : Remove explicit install for php-pear
Change-Id: I663a86a972ae3ccd2c774921bbe19f950a6938f5
2018-07-30 11:17:18 -04:00
Bruno Giorgini f333458ba7
Update README.md
Include the `staging` folder in the paths.
2018-07-24 20:29:54 -07:00
k8s-ci-robot 8a0052f080
Merge pull request #252 from nikhita/contributing.md
Add CONTRIBUTING.md
2018-07-19 02:13:42 -07:00
Nikhita Raghunath 6959764261 Add CONTRIBUTING.md 2018-07-19 10:59:43 +05:30
k8s-ci-robot 0227266562
Merge pull request #248 from HuiWang0025/patch-3
Update README.md
2018-07-07 09:18:17 -07:00
HuiWang0025 d90efa9968
Update README.md
content mistake
2018-07-07 00:21:38 +08:00
sebgoa 4a199c0a49
Merge pull request #244 from comxd/patch-1
fix README links
2018-07-04 09:34:23 +02:00
David 2bf515f9af
fix README links 2018-07-04 01:43:13 +02:00
k8s-ci-robot bdda4f31e6
Merge pull request #243 from hosungsmsft/azure-nfs-pv
Add Azure Disk-based NFS volume option
2018-06-29 22:16:20 -07:00
Hosung Song b942227428 Add Azure Disk-based NFS volume option 2018-06-28 17:32:20 -07:00
k8s-ci-robot c9c7fda1ad
Merge pull request #242 from AdamDang/patch-1
Typo fix: Endpont->Endpoint
2018-06-22 03:41:06 -07:00
AdamDang 66c566da40
Typo fix: Endpont->Endpoint
Line 28: Endpont->Endpoint
2018-06-22 17:02:28 +08:00
k8s-ci-robot 29ef5a922a
Merge pull request #239 from idvoretskyi/idvoretskyi-SECURITY_CONTACTS
SECURITY_CONTACTS added
2018-06-19 11:09:32 -07:00
Ihor Dvoretskyi 55c487ee3c SECURITY_CONTACTS added
Signed-off-by: Ihor Dvoretskyi <ihor@linux.com>
2018-06-19 14:47:47 +00:00
k8s-ci-robot 90145b4f11
Merge pull request #232 from adelton/create_psp_policy
Creation of PSP by hack/local-up-cluster.sh is not as automatic as the README suggests.
2018-05-24 09:16:35 -07:00
Jan Pazdziora 03857d63df Creation of PSP by hack/local-up-cluster.sh is not as automatic as the README suggests.
Without the symlinks, hack/local-up-cluster.sh reports

Create podsecuritypolicy policies for RBAC.
error: the path "/home/test/kubernetes/examples/podsecuritypolicy/rbac/policies.yaml" does not exist
error: the path "/home/test/kubernetes/examples/podsecuritypolicy/rbac/roles.yaml" does not exist
error: the path "/home/test/kubernetes/examples/podsecuritypolicy/rbac/bindings.yaml" does not exist
2018-05-03 22:08:46 +02:00
foo0x29a 12cff4b7a5 fix cloud-dns README links (#227) 2018-05-02 10:53:57 +02:00
Carlos Castro 3d540a32a9 Update New Relic Infrastructure Readme (#229)
We noticed a deprecated link on this doc to the old server monitor.

Did a few other small changes to align the verbiage with New Relic naming conventions.
2018-05-02 10:52:28 +02:00
k8s-ci-robot 071dd48dee
Merge pull request #228 from humblec/snap-options
Add `snapfactor` readme for glusterfs provisioner examples.
2018-04-27 12:11:20 -07:00
Humble Chirammal 5c3e8ca048 Add `snapfactor` readme for glusterfs provisioner examples.
Ref PR# https://github.com/kubernetes/kubernetes/pull/62378

Signed-off-by: Humble Chirammal <hchiramm@redhat.com>
2018-04-18 23:01:57 +05:30
k8s-ci-robot b71ca8222d
Merge pull request #222 from DonMartin76/master
Add a sample for using azureFile for PVs
2018-04-13 19:26:59 -07:00
Martin Danielsson 758e8eb0ac Gave kubectl create secret as first alternative to create the secret for azureFile 2018-04-13 17:35:42 +02:00
k8s-ci-robot 93e3760d2a
Merge pull request #201 from aledbf/docker
Use docker to build cassandra jar file
2018-04-12 09:26:55 -07:00
k8s-ci-robot 7ac4ceb28b
Merge pull request #224 from mindprince/patch-1
Provide a more ideal example for scheduler extender policy.
2018-04-09 15:26:08 -07:00
Rohit Agarwal 37631d5f2f Provide a more ideal example for scheduler extender policy.
We now use default predicates/priorities if they are unspecified in the policy
config (kubernetes/kubernetes#59363).

The other example in ./scheduler-policy-config.json shows how to use priorities
and predicates.

Let's use this example to show how to use extenders. When you are using
extenders you don't necessarily want to mess with priorities and predicates
(kubernetes/kubernetes#45188).

Also remove duplicate file.
2018-04-09 15:21:21 -07:00
k8s-ci-robot 9e7cedb1c6
Merge pull request #205 from resouer/preemption
Add preempt verb for scheduler
2018-04-09 09:39:08 -07:00
k8s-ci-robot 59bc6cdd49
Merge pull request #219 from ilievlad/master
Update selenium examples to use deployments and newer selenium
2018-04-04 01:01:07 -07:00
Martin Danielsson 50fb40fa5e Minor mix up in names 2018-04-03 16:13:31 +02:00
Martin Danielsson 939a021ab3 Added azureFile mounting via PV/PVC, elaborated documentation slightly 2018-04-03 16:11:36 +02:00
k8s-ci-robot 11aa742952
Merge pull request #212 from noelbundick/azure-managed-disk
Add details on mounting existing Azure Managed Disks
2018-04-02 13:38:16 -07:00
chenpengdev 42210cb4f6 fix typo (#221) 2018-03-28 10:29:17 -07:00
Rob Harrigan ab928797eb Fix NFS tutorial README links (#215)
* fix NFS tutorial paths

* a few more link fixes

* remove IP change
2018-03-28 07:41:55 +03:00
Vlad Ilie cd409d6f3e Update selenium examples to use deployments and newer selenium 2018-03-23 16:37:37 +02:00
Vyacheslav Semushin 1404d1a02b staging/podsecuritypolicy/rbac/README.md: update to use PSP from policy API group. (#208) 2018-03-21 13:46:02 -07:00
Ahmet Alp Balkan cca6ae38bb
https-nginx: Correct tls.[crt|key] mount (#217)
Fixes #194.
2018-03-20 13:00:47 -07:00
Marek Siarkowicz 188c3d9b92 [guestbook-go] Use multi-stage build (#211) 2018-03-20 09:10:35 -07:00
Marek Siarkowicz e4cc298ab6 Import kubernetes updates (#210)
* Admin Can Specify in Which GCE Availability Zone(s) a PV Shall Be Created

An admin wants to specify in which GCE availability zone(s) users may create persistent volumes using dynamic provisioning.

That's why the admin can now configure in StorageClass object a comma separated list of zones. Dynamically created PVs for PVCs that use the StorageClass are created in one of the configured zones.

* Admin Can Specify in Which AWS Availability Zone(s) a PV Shall Be Created

An admin wants to specify in which AWS availability zone(s) users may create persistent volumes using dynamic provisioning.

That's why the admin can now configure in StorageClass object a comma separated list of zones. Dynamically created PVs for PVCs that use the StorageClass are created in one of the configured zones.

* move hardPodAffinitySymmetricWeight to scheduler policy config

* Added Bind method to Scheduler Extender

- only one extender can support the bind method
- if an extender supports bind, scheduler delegates the pod binding to the extender

* examples/podsecuritypolicy/rbac: allow to use projected volumes in restricted PSP.

* fix typo

* SPBM policy ID support in vsphere cloud provider

* fix the invalid link

* DeamonSet-DaemonSet

* Update GlusterFS examples readme.

Signed-off-by: Humble Chirammal <hchiramm@redhat.com>

* fix some typo in example/volumes

* Fix  spelling in example/spark

* Correct spelling in quobyte

* Support custom domains in the cockroachdb example's init container

This switches from using v0.1 of the peer-finder image to a version that
includes https://github.com/kubernetes/contrib/pull/2013

While I'm here, switch the version of cockroachdb from 1.0 to 1.0.1

* Update docs/ URLs to point to proper locations

* Adds --insecure to cockroachdb client command

Cockroach errors out when using said command:

```shell
▶  kubectl run -it --rm cockroach-client --image=cockroachdb/cockroach --restart=Never --command -- ./cockroach sql --host cockroachdb-public
Waiting for pod default/cockroach-client to be running, status is Pending, pod ready: false
Waiting for pod default/cockroach-client to be running, status is Pending, pod ready: false
Waiting for pod default/cockroach-client to be running, status is Pending, pod ready: false
If you don't see a command prompt, try pressing enter.
                                                      Error attaching, falling back to logs: unable to upgrade connection: container cockroach-client not found in pod cockroach-client_default
Error: problem using security settings, did you mean to use --insecure?: problem with CA certificate: not found
Failed running "sql"
Waiting for pod default/cockroach-client to terminate, status is Running
pod "cockroach-client" deleted
```

This PR updates the README.md to include --insecure in the client command

* Add StorageOS volume plugin

* examples/volumes/flexvolume/nfs: check for jq and simplify quoting.

* Remove broken getvolumename and pass PV or volume name to attach call

* Remove controller node plugin driver dependency for non-attachable flex volume drivers (Ex: NFS).

* Add `imageFeatures` parameter for RBD volume plugin, which is used to
customize RBD image format 2 features.
Update RBD docs in examples/persistent-volume-provisioning/README.md.

* Only `layering` RBD image format 2 feature should be supported for now.

* Formatted Dockerfile to be cleaner and precise

* Update docs for user-guide

* Make the Quota creation optional

* Remove duplicated line from ceph-secret-admin.yaml

* Update CockroachDB tag to v1.0.3

* Correct the comment in PSP examples.

* Update wordpress to 4.8.0

* Cassandra example, use nodetool drain in preStop

* Add termination gracePeriod

* Use buildozer to remove deprecated automanaged tags

* Use buildozer to delete licenses() rules except under third_party/

* NR Infrastructure agent example daemonset

Copy of previous newrelic example, then modified to use the new agent
"newrelic-infra" instead of "nrsysmond".

Also maps all of host node's root fs into /host in the container (ro,
but still exposes underlying node info into a container).

Updates to README

* Reduce one time url direction

Reduce one time url direction

* update to rbac v1 in yaml file

* Replicate the persistent volume label admission plugin in a controller in
the cloud-controller-manager

* update related files

* Paramaterize stickyMaxAgeMinutes for service in API

* Update example to CockroachDB v1.0.5

* Remove storage-class annotations in examples

* PodSecurityPolicy.allowedCapabilities: add support for using * to allow to request any capabilities.

Also modify "privileged" PSP to use it and allow privileged users to use
any capabilities.

* Add examples pods to demonstrate CPU manager.

* Tag broken examples test as manual

* bazel: use autogenerated all-srcs rules instead of manually-curated sources rules

* Update CockroachDB tag to v1.1.0

* update BUILD files

* pkg/api/legacyscheme: fixup imports

* Update bazel

* [examples.storage/minio] update deploy config version

* Volunteer to help review examples

I would like to do some code review for examples about how to run real applications with Kubernetes

* examples/podsecuritypolicy/rbac: fix names in comments and sync with examples repository.

* Update storageclass version to v1 in examples

* pkg/apis/core: mechanical import fixes in dependencies

* Use k8s.gcr.io vanity domain for container images

* Update generated files

* gcloud docker now auths k8s.gcr.io by default

* -Add scheduler optimization options, short circuit all predicates if one predicate fails

* Revert k8s.gcr.io vanity domain

This reverts commit eba5b6092afcae27a7c925afea76b85d903e87a9.

Fixes https://github.com/kubernetes/kubernetes/issues/57526

* Autogenerate BUILD files

* Move scheduler code out of plugin directory.

This moves plugin/pkg/scheduler to pkg/scheduler and
plugin/cmd/kube-scheduler to cmd/kube-scheduler.

Bulk of the work was done with gomvpkg, except for kube-scheduler main
package.

* Fix scheduler refs in BUILD files.

Update references to moved scheduler code.

* Switch to k8s.gcr.io vanity domain

This is the 2nd attempt.  The previous was reverted while we figured out
the regional mirrors (oops).

New plan: k8s.gcr.io is a read-only facade that auto-detects your source
region (us, eu, or asia for now) and pulls from the closest.  To publish
an image, push k8s-staging.gcr.io and it will be synced to the regionals
automatically (similar to today).  For now the staging is an alias to
gcr.io/google_containers (the legacy URL).

When we move off of google-owned projects (working on it), then we just
do a one-time sync, and change the google-internal config, and nobody
outside should notice.

We can, in parallel, change the auto-sync into a manual sync - send a PR
to "promote" something from staging, and a bot activates it.  Nice and
visible, easy to keep track of.

* Remove apiVersion from scheduler extender example configuration

* Update examples to use PSPs from the policy API group.

* fix all the typos across the project

* Autogenerated: hack/update-bazel.sh

* Modify PodSecurityPolicy admission plugin to additionally allow authorizing via "use" verb in policy API group.

* fix todo: add validate method for &schedulerapi.Policy

* examples/podsecuritypolicy: add owners.

* Adding dummy and dummy-attachable example Flexvolume drivers; adding DaemonSet deployment example

* Fix relative links in README
2018-03-14 11:26:26 -07:00