Commit Graph

82 Commits

Author SHA1 Message Date
Peter Rifel 3ce30fff48
Don't set CSIMigrationAWS for k8s >=1.27 2023-03-10 21:19:21 -06:00
justinsb cca919dcde gce: KCM should not allocate IPs when CCM is in use.
When the GCE cloud-controller-controlller is in use, it allocates node
IPs, and so the kube-controller-manager should not allocate node IPs.
2023-01-07 17:24:24 -05:00
John Gardiner Myers dec7d33be6 v1alpha3: Move AWS EBS CSI spec under CloudProvider.AWS 2022-12-19 00:10:16 -08:00
Kubernetes Prow Robot e5a835d287
Merge pull request #14706 from johngmyers/v1alpha3-networking
v1alpha3: move networking fields under networking
2022-12-05 21:34:38 -08:00
Leïla MARABESE af19c467e8 added scaleway to all switches for cluster creation 2022-12-05 14:38:08 +01:00
John Gardiner Myers 235aa61594 v1alpha3: move networking fields under networking 2022-12-02 19:19:59 -08:00
Ciprian Hacman d29812fc6e Replace fi.Bool/Float*/Int*/StringValue() with fi.ValueOf 2022-11-19 03:45:23 +02:00
Ciprian Hacman 8f79c9bd68 Replace fi.Bool/Float*/Int*/String() with fi.PtrTo() 2022-11-19 03:45:22 +02:00
Ole Markus With 74afb7aed0 Remove checks for k8s < 1.21 2022-09-19 19:12:53 +02:00
Ciprian Hacman b5f14b589b Add initial support for Hetzner Cloud 2022-05-09 06:12:15 +03:00
John Gardiner Myers 70f7d9bdb2 Use function to get cloud provider from cluster spec 2022-03-02 21:59:47 -08:00
Ole Markus With 65c3a63d5d KCM should not run with leader migraton when aws ccm is enabled
AWS CCM is enabled by default in k8s 1.24, and KCM builder is now aware of that
2022-02-12 11:35:30 +01:00
Kubernetes Prow Robot 147052818b
Merge pull request #13203 from olemarkus/csi-featuregates
Fix CSI migration feature gates
2022-02-07 21:36:53 -08:00
Jiahui Feng c57ed0c053 fix KCM logLevel not honored. 2022-02-07 14:34:35 -08:00
Ole Markus With 66e3202f34 Fix CSI migration feature gates
We had a bug for KCM feature gate, and the scheuler and apiserver gate was missing entirely.
2022-02-04 15:29:28 +01:00
John Gardiner Myers dae281d30e Migrate to GCE CCM in k8s 1.24 2021-12-28 19:33:07 -08:00
John Gardiner Myers a0736b3c29 Remove support for Aliyun/Alibaba Cloud 2021-12-11 21:49:13 -08:00
Ciprian Hacman ea7df00719 Run hack/update-gofmt.sh 2021-12-01 22:39:50 +02:00
John Gardiner Myers 80a03c6aad Fix enabling of AWS CCM 2021-11-25 19:31:29 -08:00
John Gardiner Myers 9d8cade672 Migrate to AWS CCM in k8s 1.24 2021-11-24 17:46:00 -08:00
John Gardiner Myers 46e226d1ee Revert "Migrate to AWS CCM in k8s 1.24"
This reverts commit 56c054cda7.
2021-11-12 22:07:18 -08:00
John Gardiner Myers 56c054cda7 Migrate to AWS CCM in k8s 1.24 2021-11-02 23:08:03 -07:00
John Gardiner Myers 7cb4fbe91e Never masquerade IPv6 with Cilium 2021-10-27 23:40:02 -07:00
justinsb 345f3d85f1 Fix controller defaults for both bootstrap tokens and ipv6
The previous logic would override the controller slice in each
condition, instead of building it up.
2021-09-18 13:12:26 -04:00
Ole Markus With dc4c559d41 Set some needed defaults for cloud ipam 2021-09-16 21:11:09 +02:00
John Gardiner Myers 2f71fb2cf4 Default the NodeCIDRMaskSize appropriately for IPv6 2021-06-14 20:43:09 -07:00
John Gardiner Myers 51d0697dc3 Set default ClusterCIDR through the PodCIDR 2021-06-13 22:46:32 -07:00
Ole Markus With 4ee43a849c k/k changed the feature gate for disabling in-tree CSI 2021-02-18 21:12:51 +01:00
Ole Markus With a86abcfd3e CSIMigrationAWSComplete feature gate does not work unless also CSIMigrationAWS is enabled 2021-02-11 12:41:50 +01:00
Ole Markus With f5ae5f8808 AWS CSI driver 2021-01-12 07:09:10 +01:00
Kenji Kaneda a61caea8d2 Add Azure support
This commit contains all changes required to support Azure
(https://github.com/kubernetes/kops/issues/3957).
2020-12-21 08:27:54 -08:00
Nick Turner c9feb36f3f Add aws-cloud-controller-manager config to addons
- Config at aws-cloud-controller.addons.k8s.io/k8s-1.18.yaml.template
- AWSCCMTag function for CCM image tag
2020-11-30 01:35:07 -08:00
Peter Rifel 4d9f0128a3
Upgrade to klog2
This splits up the kubernetes 1.19 PR to make it easier to keep up to date until we get it sorted out.
2020-08-16 20:56:48 -05:00
John Gardiner Myers 8258dcd395 Exempt OpenStack from the EnableExternalCloudController feature flag 2020-07-25 13:12:25 -07:00
John Gardiner Myers 479b4860e8 Remove deprecated function 2020-07-06 22:48:01 -07:00
John Gardiner Myers 0d74344a43 Remove the baremetal cloud provider 2020-06-14 10:38:29 -07:00
Kubernetes Prow Robot 9e4bf1699a
Merge pull request #9216 from hakman/prepare-multi-arch
Prepare Kops for multi-architecture support
2020-06-04 21:35:43 -07:00
John Gardiner Myers e88e0cf7ec Remove code supporting dropped k8s versions 2020-06-04 12:11:51 -07:00
Ciprian Hacman d049862cff Make architecture related decisions to nodeup 2020-06-03 17:24:01 +03:00
Ole Markus With 7342525872 Remove vsphere from kops files 2020-05-30 13:36:55 +02:00
Ole Markus With eebb605c9c Remove as much of the classic networking logic as we can 2020-05-22 08:08:58 +02:00
Ole Markus With d1ff25bb4e Remove some rather long networking nil checks 2020-05-22 08:08:58 +02:00
John Gardiner Myers 83bdb3ef88 Remove code for unsupported k8s versions from pkg/model/components 2020-01-12 16:05:00 -08:00
tanjunchen 8acb51e061 pkg/apis/ pkg/commands/ pkg/model/ staticcheck 2019-12-30 21:13:40 +08:00
Michael Wagner bfe9b21213 fix(external-ccm): prevent core components to be misconfigured
Previously when setting the external cloud controller manager
configuration the core components `kubelet`, `apiserver` and
`kubecontroller-manager` were configured to use the external cloud
controller manager. Without setting the feature flag
EnableExternalCloudController this lead to a cluster in which the
masters had the cloud controller taint
`node.cloudprovider.kubernetes.io/uninitialized` which prevents
essential pods, like dns-controller to not be scheduled and leaves a
cluster where worker nodes can't connect to the api server because they
cannot resolve its hostname.
2019-10-10 21:38:50 +02:00
Justin SB 71fed5e6ff
Fix for tarball image names after 1.16
Image names from 1.16 on include an architecture suffix,
e.g. "-amd64"; the generic alias continues to work when pulling, but
when loading from a tarball (i.e. running in CI) we must use the
per-architecture name.
2019-09-26 10:20:54 -04:00
Justin SB 62f7c26f98
Support "gce" networking mode, which uses ip aliases 2019-07-19 07:54:13 -04:00
Justin SB 3e33ac7682
Change code from glog to klog
We don't call klog.InitFlags yet, because that will cause a flag
redefinition error until we get everyone to stop using glog.  That
will happen when we update to k8s 1.13.
2019-05-06 12:54:51 -04:00
Lily e4cbd3c17c add ALI flags 2019-03-16 17:26:44 +08:00
Chris Phillips 2b9a56f8e6 rename to LyftVPC. Removes all the settings from the NetworkingSpec 2018-11-07 08:08:44 -08:00