Commit Graph

1721 Commits

Author SHA1 Message Date
Kubernetes Prow Robot 68dcc7ad48
Merge pull request #15125 from justinsb/node_challenge
Perform challenge callbacks into a node
2023-05-07 09:13:16 -07:00
justinsb bd956f2226 Update expected test output 2023-05-06 08:03:21 -04:00
Ciprian Hacman bf749010ee hack/update-expected.sh 2023-05-06 13:04:47 +03:00
Bronson Mirafuentes d819068026 run ./hack/update-expected.sh 2023-05-03 09:00:40 -07:00
Bronson Mirafuentes b25432314f run ./hack/update-expected.sh 2023-05-02 14:21:30 -07:00
Ole Markus With 5d82e52c48 Use external ECR credential provider as of Kubernetes 1.27 2023-04-29 10:21:57 +02:00
Leïla MARABESE 1e20a4c629 unique instance names to comply with CCM 2023-04-25 16:01:42 +02:00
Leïla MARABESE 499cc1be95 downgrade CCM 2023-04-25 14:31:37 +02:00
Leïla MARABESE c2654188b0 added noprefix to tags 2023-04-25 14:31:37 +02:00
Anthony Hausman a28b11f4aa
hack/update-expected.sh 2023-04-16 12:37:26 +02:00
Jesse Haka 225e3f4b3f Upgrade k8s-dns-node-cache to 1.22.20 2023-04-13 16:23:46 +03:00
Felix Friedrich c5847054db
./hack/update-expected.sh 2023-04-12 10:46:47 +02:00
Steven E. Harris 9595c833ee
Allow Cluster Autoscaler to ignore daemon pods
By default the cluster autoscaler takes DaemonSet-managed pods'
resource requests into consideration when computing a node's resource
utilization. Allow toggling its "--ignore-daemonsets-utilization"
command-line flag via a new field in the Cluster
spec—"clusterAutoscaler.ignoreDaemonSetsUtilization." Setting that
field to true causes the autoscaler to ignore such daemon pods'
requests, such that it will more likely judge a node running only
daemon pods as being underutilized and shut down its hosting machine.
2023-04-05 10:03:24 -04:00
justinsb 8738f97ca7 Update test output for GCE IPv6 support 2023-03-31 09:55:28 -04:00
Leïla MARABESE b4d230f8c2 scaleway integration test 2023-03-28 16:58:54 +02:00
Moshe Shitrit 9477463655 hack/update-expected 2023-03-18 15:55:55 +02:00
Ciprian Hacman 88fd444987 gcp: Update terraform rendering for Target Pool 2023-03-16 08:55:15 +02:00
Ciprian Hacman 1db17ab949 gcp: Update terraform rendering for HTTP Health Check 2023-03-16 08:10:25 +02:00
Ciprian Hacman dc5fa01b02 gcp: Switch placeholder integration test from Internal to Public LB 2023-03-16 07:49:47 +02:00
Ciprian Hacman dc92df3643 gcp: Add placeholder integration test for public load balancer 2023-03-16 07:49:47 +02:00
Kubernetes Prow Robot 995bdda158
Merge pull request #15197 from rifelpet/k127awsmigration
Don't set CSIMigrationAWS in k8s 1.27
2023-03-10 21:28:40 -08:00
Peter Rifel e63cb44bd0
Update integration tests 2023-03-10 21:19:25 -06:00
Ciprian Hacman 5ec74216d8 hack/update-expected.sh 2023-03-09 09:07:04 +02:00
Ciprian Hacman b935907ace hack/update-expected.sh 2023-03-09 06:52:14 +02:00
Justin SB 77f6be7475 Update expected output for GCP CCM changes 2023-03-03 10:07:53 -05:00
Kubernetes Prow Robot e8f704a855
Merge pull request #15036 from johngmyers/addlcidr-subnet
Improve support for AdditionalNetworkCIDRs
2023-02-24 06:33:34 -08:00
Ciprian Hacman 6b73f91b32 hack/update-expected.sh 2023-02-18 04:38:08 +02:00
Rafael da Fonseca bc37c7408c Add terraform target support for configuring Warm Pool 2023-02-14 14:27:46 +00:00
Kubernetes Prow Robot ca3b53c00a
Merge pull request #15095 from infonova/use-clustername-in-cinder-csi-plugin
Pass actual cluster name to cinder-csi-plugin
2023-02-13 09:33:29 -08:00
ederst 30495063a3 Update expected 2023-02-13 17:45:51 +01:00
Kubernetes Prow Robot 9ec9d42910
Merge pull request #15131 from hakman/containerd-v1.6.17
Update containerd to v1.6.17
2023-02-13 02:27:29 -08:00
Jesse Haka e7c4506e36 hack/update-expected.sh 2023-02-12 21:57:45 +02:00
Jesse Haka dca3b8c832 ./hack/update-expected.sh 2023-02-12 17:24:00 +02:00
Ciprian Hacman 56900bcbad hack/update-expected.sh 2023-02-12 13:48:44 +02:00
Ciprian Hacman 466ed04506 hack/update-expected.sh 2023-02-12 12:31:37 +02:00
Kubernetes Prow Robot 165e4c6935
Merge pull request #15109 from moshevayner/aws-cni-1-12-2
Bump AWS CNI to 1.12.2
2023-02-10 15:15:29 -08:00
Justin SB 8f7ef492bf gce: Always apply the metadata-proxy-ready node label
This restores the behaviour before #14127, which wasn't documented /
intended.
2023-02-05 13:40:02 -05:00
Moshe Shitrit 8081c28823 hack/update-expected 2023-02-04 08:07:15 -05:00
Ciprian Hacman 884fded69e hack/update-expected.sh 2023-02-01 09:37:37 +02:00
Kubernetes Prow Robot ebebbe8b76
Merge pull request #15068 from hakman/etcd-v3.5.7
Update etcd to v3.5.7
2023-01-31 01:54:49 -08:00
Kubernetes Prow Robot 94affad3a4
Merge pull request #15050 from anthonyhaussman/feat/tone/cilium_unreachable_routes_pod_deletion
Cilium: Add unreachable route for pod IP on deletion option
2023-01-30 05:26:51 -08:00
Kubernetes Prow Robot aa4386b0ca
Merge pull request #15072 from hakman/containerd-v1.6.16
Update containerd to v1.6.16
2023-01-29 02:26:32 -08:00
Ciprian Hacman 22d2c154f6 hack/update-expected.sh 2023-01-29 08:03:26 +02:00
Moshe Shitrit 402df6111f hack/update-expected 2023-01-28 11:47:36 -05:00
Ciprian Hacman 4ebc882a70 hack/update-expected.sh 2023-01-28 16:29:53 +02:00
John Gardiner Myers b47babf808 Upgrade AWS CCM to 1.25.3 2023-01-24 12:35:24 -08:00
Moshe Shitrit fb10f001f0 hack/update-expected 2023-01-24 13:05:25 -05:00
Anthony Hausman 484bde5b9b
cilium: Add unreachable route for pod IP on deletion option
When a pod is deleted, the route to its IP is replaced with an unreachable route.
When a pod is created, the route is replaced with a route to the pod veth (so if an unreachable existed, it's replaced).

Ref:
 - https://github.com/cilium/cilium/pull/18505
2023-01-24 14:08:24 +01:00
Ciprian Hacman 5d712cbaac Run hack/update-expected.sh 2023-01-23 09:43:09 +02:00
Kubernetes Prow Robot b64cded2a9
Merge pull request #14785 from hakman/etcd-manager_init-containers
Load etcd binaries dynamically from container images
2023-01-22 11:56:02 -08:00