Commit Graph

1321 Commits

Author SHA1 Message Date
Davanum Srinivas 29408196ca
Add support for AL2023 AMI to use Amazon VPC CNI
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
2024-02-12 23:13:33 -05:00
Davanum Srinivas e1d696ab00
Set LimitNOFILE to 1048576 instead of `infinity`
Signed-off-by: Davanum Srinivas <davanum@gmail.com>
2024-02-08 09:50:19 -05:00
Moshe Vayner 1342fd1afa fix(nodeup): set `MACAddressPolicy` to `none` when using AWS CNI and Ubuntu 22.04 2024-02-02 23:03:30 -05:00
Jesse Haka f445dfc456
Revert "Don't set LimitNoFile for containerd systemd unit file" 2024-01-30 17:35:47 +02:00
Dmytro Kozlovskyi d9075f1d18 aws: fix maxPods when cilium ipam is used
Co-authored-by: Ciprian Hacman <ciprian@hakman.dev>
2024-01-17 16:12:09 +02:00
Ciprian Hacman 3c7e05f335 aws: Set provider ID when starting kubelet 2024-01-05 10:18:48 +02:00
Ciprian Hacman 91b261c86d aws: Use IMDS to retrieve certificate names 2024-01-04 18:02:01 +02:00
Ciprian Hacman f0376b7b2f aws: Retrieve instance info only when max pods is not set 2024-01-04 12:37:31 +02:00
Ciprian Hacman 62f9d4df6d Update k8s.io/* to v0.29.0 2024-01-02 08:46:39 +02:00
Ciprian Hacman 0be02417df gce: Remove custom resolver 2023-12-23 08:17:47 +02:00
upodroid 275c948cb6 stop specifying LimitNoFILE 2023-12-03 21:57:46 +00:00
justinsb 010a0d5e4c feat: Support PKI bootstrap
Similar to the TPM bootstrapping on GCE (indeed, a lot of the code is
modified from there), but we verify the PKI signature against a public
key in a Host CRD object.
2023-11-30 18:35:58 -05:00
Ciprian Hacman 3597bddeaf Fix vet error 2023-11-04 05:57:08 +02:00
Ciprian Hacman 7a1af66152 Add option to provide additional config entries for containerd 2023-10-27 08:56:34 +03:00
Kubernetes Prow Robot f7bd516b79
Merge pull request #15994 from fmuyassarov/add-nri-support
containerd: introduce a new field to enable NRI
2023-10-21 04:52:02 +02:00
Feruzjon Muyassarov 0aeab5e523 containerd: introduce a new field containerd.nri to enable NRI
Node Resource Interface (NRI) is a common framework for plugging
domain or vendor-specific custom logic into container runtime like
containerd. This commit introduces a new congiguration field
`containerd.nri`, providing cluster admins the flexibility to opt
in for this feature in containerd and tune some of its parameters.
By default, NRI is disabled here in accordance with the containerd's
default config file.

Signed-off-by: Feruzjon Muyassarov <feruzjon.muyassarov@intel.com>
2023-10-21 00:26:54 +03:00
upodroid 2b056b9b17 add support for auth-provider-gcp cred provider 2023-10-10 10:29:16 +01:00
upodroid 587233bddc fix cos mounter url 2023-09-14 21:31:36 +01:00
Ciprian Hacman 6e6a2a4e7b Address review comments 2023-09-05 12:34:20 +03:00
Ciprian Hacman c43b48a8d8 Remove Docker config option 2023-09-05 07:22:33 +03:00
John Gardiner Myers 1ea0fd3004 AWS always uses resource-based names 2023-09-04 16:08:48 -07:00
John Gardiner Myers b3908e592c Remove support for Kubernetes 1.23 2023-09-03 16:22:18 -07:00
Peter Rifel e8ede32ae7
Stop installing misc utils on RHEL distros 2023-08-17 21:24:49 -05:00
John Gardiner Myers ed9883651c Remove references to Openstack ClusterSpec fields from nodeup 2023-07-29 04:42:07 -07:00
John Gardiner Myers 63aa25aa8c Remove references to Azure ClusterSpec fields from nodeup 2023-07-29 04:42:01 -07:00
John Gardiner Myers e317648d57 Remove references to control-plane-specific ClusterSpec fields from nodeup 2023-07-28 08:20:43 -07:00
John Gardiner Myers 683761a816 Remove references to Gossip-specific ClusterSpec fields from nodeup 2023-07-28 08:20:43 -07:00
John Gardiner Myers 9b64707159 Ignore no-longer-used topology fields in ClusterSpec 2023-07-19 08:48:38 -07:00
John Gardiner Myers 2420991954 Determine default API access method by IG subnet type 2023-07-18 22:21:05 -07:00
John Gardiner Myers 1358851c7d Get VFSContext from caller in NewAssetBuilder() 2023-07-18 08:49:06 -07:00
John Gardiner Myers 245cd64a3a Get VFSContext from caller in LoadChannel() 2023-07-17 21:45:43 -07:00
John Gardiner Myers bbff6298e7 Remove support for bootstrap tokens 2023-07-16 12:12:00 -07:00
Kubernetes Prow Robot bb4dbdce90
Merge pull request #15646 from johngmyers/prune-dead
Remove dead code for non-kops-controller bootstrap
2023-07-16 11:37:06 -07:00
Kubernetes Prow Robot 61fb95d8c4
Merge pull request #15645 from johngmyers/nodeup-clusterdomain
Remove references to more ClusterSpec fields from nodeup
2023-07-16 08:35:08 -07:00
John Gardiner Myers 977aacc356 Remove dead code for non-kops-controller bootstrap 2023-07-16 07:40:25 -07:00
Kubernetes Prow Robot 2a0cc8a7dc
Merge pull request #15627 from hakman/azure_dns_none
azure: Add support for dns=none
2023-07-16 04:27:05 -07:00
John Gardiner Myers 9368470fc4 Remove references to ClusterSpec.EtcdClusters from nodeup 2023-07-15 21:34:31 -07:00
John Gardiner Myers 75db4d76a9 Remove references to api-server-specific ClusterSpec fields from nodeup 2023-07-15 21:27:02 -07:00
John Gardiner Myers 62f7faa4da Remove references to ClusterSpec.API from nodeup 2023-07-15 14:55:38 -07:00
Kubernetes Prow Robot ef284b11e5
Merge pull request #14960 from johngmyers/vfscontext
Add VFSContext to various clientsets
2023-07-15 14:55:05 -07:00
Ciprian Hacman 80afaaead2 Add support for using swap memory 2023-07-14 07:50:48 +03:00
Ciprian Hacman 83d14d4343 azure: Add support for dns=none 2023-07-13 09:04:06 +03:00
John Gardiner Myers a56e8eb049 Refactor UsesExternalECRCredentialsProvider() 2023-07-11 09:46:01 -07:00
John Gardiner Myers aef6fbdd29 Refactor UseKopsControllerForNodeBootstrap() 2023-07-11 09:45:45 -07:00
Kubernetes Prow Robot 65fe676967
Merge pull request #15613 from johngmyers/nodeup-sysctls
Remove references to ClusterSpec from nodeup sysctls.go
2023-07-10 01:23:05 -07:00
John Gardiner Myers f5fc710d6c Remove references to ClusterSpec from nodeup sysctls.go 2023-07-09 21:11:54 -07:00
John Gardiner Myers d926989600 v1alpha3: Rename GCE networking to GCP 2023-07-09 16:48:26 -07:00
John Gardiner Myers 11304807f2 Hold reference to VFSContext from simple.Clientset 2023-07-06 19:41:45 -07:00
justinsb 62e2b9690b ipv6: containerd routes support for IPv6
If using IPv6 and a kubenet-style CNI (which is more common with
IPv6), we need to support an IPv6 route on the pod, or else Pods will
be unable to reach other Pods.

Co-authored-by: Ciprian Hacman <ciprian@hakman.dev>
2023-07-05 22:53:16 -04:00
Ciprian Hacman 3a4e0717a7 hack/update-expected.sh 2023-06-20 08:11:21 +03:00