Commit Graph

2551 Commits

Author SHA1 Message Date
Anthony Hausman 4a01fc30c4
feat(karpenter): Variabilize Image, logFormat and logLevel 2023-07-17 13:13:37 +02:00
John Gardiner Myers bbff6298e7 Remove support for bootstrap tokens 2023-07-16 12:12:00 -07:00
Kubernetes Prow Robot bb4dbdce90
Merge pull request #15646 from johngmyers/prune-dead
Remove dead code for non-kops-controller bootstrap
2023-07-16 11:37:06 -07:00
Kubernetes Prow Robot 61fb95d8c4
Merge pull request #15645 from johngmyers/nodeup-clusterdomain
Remove references to more ClusterSpec fields from nodeup
2023-07-16 08:35:08 -07:00
John Gardiner Myers 977aacc356 Remove dead code for non-kops-controller bootstrap 2023-07-16 07:40:25 -07:00
Kubernetes Prow Robot 2a0cc8a7dc
Merge pull request #15627 from hakman/azure_dns_none
azure: Add support for dns=none
2023-07-16 04:27:05 -07:00
John Gardiner Myers 56a8f46952 hack/update-expected.sh 2023-07-15 21:27:02 -07:00
John Gardiner Myers 62f7faa4da Remove references to ClusterSpec.API from nodeup 2023-07-15 14:55:38 -07:00
Kubernetes Prow Robot 141a040aec
Merge pull request #15607 from hakman/gce_cloud-init
gce: Use `user-data` instead of `startup-script` metadata key
2023-07-15 11:47:05 -07:00
Ciprian Hacman 80944323f3 azure: Allow full load balancer access only when public 2023-07-15 19:16:59 +03:00
Kubernetes Prow Robot 5613a12027
Merge pull request #15635 from zetaab/hubblerules
open hubble port 4244 for openstack
2023-07-15 01:33:04 -07:00
Jesse Haka cbe1666012 open hubble port 4244 2023-07-15 09:40:28 +03:00
Ciprian Hacman 15b44bad52 azure: Remove permissions for nodes when dns=none 2023-07-14 13:46:26 +03:00
Ciprian Hacman 36b119d599 aws: Allow using the same instance ID as egress for multiple subnets 2023-07-13 09:12:26 +03:00
Ciprian Hacman 83d14d4343 azure: Add support for dns=none 2023-07-13 09:04:06 +03:00
John Gardiner Myers aef6fbdd29 Refactor UseKopsControllerForNodeBootstrap() 2023-07-11 09:45:45 -07:00
Kubernetes Prow Robot 4b79e04b6f
Merge pull request #15614 from hakman/gce_bastion_ssh_rules
gce: Rename firewall SSH rules for bastion
2023-07-10 09:31:17 -07:00
Kubernetes Prow Robot 4ad116ec78
Merge pull request #15611 from justinsb/gce_lb_firewall
gce: Set firewall rules for Internal LBs also
2023-07-10 09:31:05 -07:00
Ciprian Hacman 53e45886f3 gce: Rename firewall SSH rules for bastion 2023-07-10 07:06:07 +03:00
John Gardiner Myers d926989600 v1alpha3: Rename GCE networking to GCP 2023-07-09 16:48:26 -07:00
justinsb 3613f586c8 GCE: Set firewall rules for Internal LBs also
It seems we can use the exact same rules.
2023-07-09 19:25:42 -04:00
Kubernetes Prow Robot 114ac311c1
Merge pull request #15332 from hakman/gce_internal_lb
gce: Update logic for internal LB
2023-07-09 14:11:04 -07:00
Ciprian Hacman fb66f1770f gce: Use `user-data` instead of `startup-script` metadata key 2023-07-09 13:50:00 +03:00
Ciprian Hacman 4656743c22 gce: Add support for bastions 2023-07-08 18:19:40 +03:00
Ciprian Hacman 04a4e02920 gce: Update logic for internal LB 2023-07-08 04:34:43 +03:00
Justin SB cf9134489c kops-controller: create IPAM controller for GCE
We observe the IPv6 CIDRs assigned to nodes, and reflect them into the node.

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-07-05 12:34:55 -04:00
Ciprian Hacman 7d68ee9eb7 hetzner: Update CCM to v1.16.0 2023-07-02 08:29:56 +03:00
Kubernetes Prow Robot 49a6ed4188
Merge pull request #15570 from hakman/azure_network_security
azure: Add support for network security groups
2023-07-01 06:54:48 -07:00
Ciprian Hacman 4fe84705a5 azure: Add support for network security groups 2023-07-01 10:06:25 +03:00
Ciprian Hacman 4085da870f hack/update-expected.sh 2023-07-01 09:51:22 +03:00
Ciprian Hacman 015c80f950 Update etcd-manager to v3.0.20230630 2023-07-01 09:48:40 +03:00
Kubernetes Prow Robot bda5e9e63d
Merge pull request #15564 from hakman/revert_remove_obsolete_versions
Revert "Remove obsolete etcd versions"
2023-06-30 21:24:44 -07:00
Ciprian Hacman df97b95972 azure: Hardcode DiskControllerType to SCSI 2023-06-30 21:29:06 +03:00
Ciprian Hacman 67f0abb541 hack/update-expected.sh 2023-06-30 21:24:44 +03:00
Ciprian Hacman be69b25221 Revert "Remove obsolete etcd versions"
This reverts commit 76cacc5c6f.
2023-06-30 21:20:30 +03:00
Ciprian Hacman e8980bc21a Add option for specifying the list of etcd metrics urls 2023-06-27 19:50:05 +03:00
John Gardiner Myers cad5b69446
Release 1.28.0-alpha.1 (#15548) 2023-06-24 20:45:09 -07:00
John Gardiner Myers 0dfac69d83 Remove support for Weave networking 2023-06-22 23:03:24 -07:00
justinsb 476f1661f7 etcd-manager: set environment variables once
Previously we were setting the env variable up to 3 times in an HA
control-plane, because we were adding to the etcd-manager
configuration once for each replica.
2023-06-22 17:14:51 +03:00
Kubernetes Prow Robot dcdbec93e1
Merge pull request #15526 from justinsb/remove_duplicate_cluster
Remove duplicate Cluster field in BootstrapScriptBuilder
2023-06-20 04:26:22 -07:00
Ciprian Hacman cbddb4a9fd Remove duplicate Cluster field from tests 2023-06-20 12:19:04 +03:00
Ciprian Hacman 59b7653cc3 Update min versions for kOps v1.28 2023-06-20 08:11:21 +03:00
justinsb 2f0a94c34b Remove duplicate Cluster field in BootstrapScriptBuilder
We had an identically named Cluster field in the "base class" (the
unnamed embedded objects we inherit), causing shadowing and the
potential for a nil-pointer panic.
2023-06-19 14:34:02 -04:00
Kubernetes Prow Robot b5adab4d53
Merge pull request #15520 from hakman/fix-kops-utils-cp
Fix promotion of `kops-utils-cp`
2023-06-19 10:54:22 -07:00
Kubernetes Prow Robot b4c5a75829
Merge pull request #15487 from jsafrane/add-selinux
Add optional SELinux support to RHEL clusters
2023-06-19 08:54:22 -07:00
Kubernetes Prow Robot 0546addf29
Merge pull request #15515 from justinsb/strict_node_label_checking
node labeling: don't ignore unknown roles
2023-06-19 07:48:21 -07:00
Ciprian Hacman 60b14823bd hack/update-expected.sh 2023-06-19 16:52:28 +03:00
Ciprian Hacman 1d0fbfc4f1 Fix promotion of `kops-utils-cp` 2023-06-19 16:40:40 +03:00
Jan Safranek 0d03095fda Add SELinux support to containerd
Add cluster.Spec.Containerd.SELinuxEnabled field that enables SELinux in
containerd.

With SELinux enabled, all pods that use HostPath volumes must run with
SELinux label `spc_t`, otherwise SELinux denies the pods to touch the host
filesystem.
2023-06-19 15:20:08 +02:00
Ciprian Hacman cd1c7434e8 hack/update-expected.sh 2023-06-19 15:12:11 +03:00