Commit Graph

931 Commits

Author SHA1 Message Date
justinsb 6bdbbc4fd4 nodeup: Use functional options pattern for HostPathMapping
This means that the object is not mutated after construction, making
it easier to do validity checks (such as whether we have mounted the
same path twice).
2023-05-11 10:16:30 -04:00
Ciprian Hacman 0e37112f46 hack/update-expected.sh 2023-05-09 12:28:06 +03:00
Ciprian Hacman 81b4fbf8ac Add kubescheduler.config.k8s.io/v1 for K8s 1.25+ 2023-05-09 12:26:57 +03:00
Ciprian Hacman abba0261e8 Update containerd to v1.6.21 2023-05-08 07:55:23 +03:00
Bronson Mirafuentes de171be079 set default runc version to 1.1.5 2023-05-03 08:55:32 -07:00
Bronson Mirafuentes f11fd88020 update runc to 1.1.7 2023-05-02 13:48:02 -07:00
Anthony Hausman 5af9c30f32
Update containerd to v1.6.20 2023-04-16 12:32:49 +02:00
Jesse Haka 225e3f4b3f Upgrade k8s-dns-node-cache to 1.22.20 2023-04-13 16:23:46 +03:00
Kubernetes Prow Robot 69691eea23
Merge pull request #15266 from infonova/os-implement-etcd-manager-networkcidr
OpenStack: Add network-cidr config for etcd-manager
2023-04-13 02:48:36 -07:00
Steven E. Harris 9595c833ee
Allow Cluster Autoscaler to ignore daemon pods
By default the cluster autoscaler takes DaemonSet-managed pods'
resource requests into consideration when computing a node's resource
utilization. Allow toggling its "--ignore-daemonsets-utilization"
command-line flag via a new field in the Cluster
spec—"clusterAutoscaler.ignoreDaemonSetsUtilization." Setting that
field to true causes the autoscaler to ignore such daemon pods'
requests, such that it will more likely judge a node running only
daemon pods as being underutilized and shut down its hosting machine.
2023-04-05 10:03:24 -04:00
ederst 3ccb8746cf OpenStack: Add network-cidr config for etcd-manager 2023-03-27 11:14:25 +02:00
Peter Rifel 3ce30fff48
Don't set CSIMigrationAWS for k8s >=1.27 2023-03-10 21:19:21 -06:00
Justin SB 03af1c7272 gce: Don't reconcile routes when running with "gce" networking.
If running with GCE "native" networking, we do not need the route
controller (and it causes problems); we turn it off by setting
--configure-cloud-routes=false.

In general we do not need the gkenetworkparams controller (and it
complains about missing CRDs).  We will turn it off in future, but it
isn't in the images we are using currently.
2023-03-03 10:07:09 -05:00
Jesse Haka 3f9a1b6462 set node status update freq to 60min in OpenStack 2023-02-27 20:38:30 +02:00
Ciprian Hacman 8d6a809d10 Update containerd to v1.6.18 2023-02-18 04:38:08 +02:00
Ciprian Hacman 0d39e0920e Update containerd to v1.6.17 2023-02-12 12:27:24 +02:00
Ciprian Hacman 884fded69e hack/update-expected.sh 2023-02-01 09:37:37 +02:00
Ciprian Hacman bdd7ff49da Update etcd-manager to v3.0.20230201 2023-02-01 09:35:32 +02:00
Kubernetes Prow Robot ebebbe8b76
Merge pull request #15068 from hakman/etcd-v3.5.7
Update etcd to v3.5.7
2023-01-31 01:54:49 -08:00
Kubernetes Prow Robot 94affad3a4
Merge pull request #15050 from anthonyhaussman/feat/tone/cilium_unreachable_routes_pod_deletion
Cilium: Add unreachable route for pod IP on deletion option
2023-01-30 05:26:51 -08:00
Ciprian Hacman ae042e7499 Update containerd to v1.6.16 2023-01-29 08:01:37 +02:00
Ciprian Hacman 4ebc882a70 hack/update-expected.sh 2023-01-28 16:29:53 +02:00
Ciprian Hacman 1d8114dd8c Update etcd to v3.5.7 2023-01-28 16:28:07 +02:00
John Gardiner Myers b47babf808 Upgrade AWS CCM to 1.25.3 2023-01-24 12:35:24 -08:00
Anthony Hausman 484bde5b9b
cilium: Add unreachable route for pod IP on deletion option
When a pod is deleted, the route to its IP is replaced with an unreachable route.
When a pod is created, the route is replaced with a route to the pod veth (so if an unreachable existed, it's replaced).

Ref:
 - https://github.com/cilium/cilium/pull/18505
2023-01-24 14:08:24 +01:00
Ciprian Hacman b1ef66f136 etcd-manager: Add option to set backup retention 2023-01-23 09:43:09 +02:00
Ciprian Hacman fef8eb4a9b Run hack/update-expected.sh 2023-01-21 09:24:33 +02:00
Ciprian Hacman 61acbe72fa Update etcd-manager to v3.0.20230119 2023-01-21 09:24:33 +02:00
Ciprian Hacman 971c655ecb Run hack/update-expected.sh 2023-01-21 09:24:33 +02:00
Ciprian Hacman 40bf0b9f52 Load etcd binaries dynamically from container images 2023-01-21 09:24:33 +02:00
Kubernetes Prow Robot ddd1583244
Merge pull request #15022 from Mia-Cross/scw_refacto_instance_and_tags
scaleway: refactoring: instance and tags
2023-01-18 21:50:34 -08:00
Kubernetes Prow Robot 6b04c3e9f5
Merge pull request #15020 from johngmyers/nth
Upgrade Node Termination Handler to 1.18.3
2023-01-18 10:12:34 -08:00
John Gardiner Myers 56092cd2b7 Upgrade Node Termination Handler to 1.18.3 2023-01-18 08:12:59 -08:00
Leïla MARABESE e52af91e34 scaleway: refactoring: instance and tags 2023-01-18 15:50:37 +01:00
Kubernetes Prow Robot e88fbf5d7d
Merge pull request #15016 from johngmyers/nodeup-network2
Move more networking settings into nodeup.Config
2023-01-18 02:04:35 -08:00
John Gardiner Myers 0c323445fb Move UsesKubenet to nodeup.Config 2023-01-15 23:12:00 -08:00
John Gardiner Myers aec9075087 Upgrade AWS CCM to 1.25.2 2023-01-15 21:46:24 -08:00
John Gardiner Myers f6debfd658 Move ServiceClusterIPRange to nodeup.Config 2023-01-15 17:19:18 -08:00
Ciprian Hacman 0f7bd5dc5e Infer the dns suffix from the cluster name for etcd-manager 2023-01-12 12:45:33 +02:00
Grégory SANCHEZ 6fdf54ff34 feat(cluster-autoscaler): autogenerate priority-expander configMap 2023-01-11 08:26:33 +01:00
Ciprian Hacman 086d74605f Update containerd to v1.6.15 2023-01-11 06:32:22 +02:00
Kubernetes Prow Robot 0b8ccf2c9e
Merge pull request #14951 from johngmyers/kube-dns
Upgrade k8s-dns-node-cache to 1.22.16
2023-01-09 08:21:29 -08:00
Ole Markus With 07c77b1e5f Bump EBS CSI driver to 1.14.1 2023-01-09 13:01:23 +01:00
justinsb cca919dcde gce: KCM should not allocate IPs when CCM is in use.
When the GCE cloud-controller-controlller is in use, it allocates node
IPs, and so the kube-controller-manager should not allocate node IPs.
2023-01-07 17:24:24 -05:00
justinsb 132a805972 Allow built-in manifests to be replaced by external addons
We identify the external manifests by checking for our labels.
Currently that label is kOps specific, and we'll likely have to evolve
that to something ecosystem-netural.

We only support the GCE CCM addon and the kopeio-networking addon at
first.

For the GCE CCM addon, we need to replace the arguments, in particular
we likely need the Pod CIDR.  Here we need to work with the GCE CCM to
find a mechanism that can allow some of these flags to be communicated
via a more extensible mechanism (env vars or config maps, likely,
though possibly CRDs).

This is all behind the ClusterAddons feature flag at the moment, so we
can figure this out with other projects safely.

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2023-01-05 20:29:56 -05:00
Ole Markus With 517da72ff5 Bump cluster autoscaler to 1.26.1 2023-01-05 13:40:26 +01:00
John Gardiner Myers c55cc836db Upgrade k8s-dns-node-cache to 1.22.16 2023-01-04 17:49:50 -08:00
justinsb b7d9319fff EnsureTask should panic on error
This means that we automatically check the error code.  A linter could
detect errors here (maybe), but in practice we can't recover from
errors here anyway.
2023-01-04 08:29:20 -05:00
John Gardiner Myers c68be498c6 Refactor NewAssetBuilder to not take a Cluster 2023-01-01 13:37:52 -08:00
Ciprian Hacman b3a07ee83e Use short service name with discovery labels 2022-12-26 13:21:43 +02:00