Kubernetes Prow Robot
68dcc7ad48
Merge pull request #15125 from justinsb/node_challenge
...
Perform challenge callbacks into a node
2023-05-07 09:13:16 -07:00
justinsb
bd956f2226
Update expected test output
2023-05-06 08:03:21 -04:00
Ciprian Hacman
bf749010ee
hack/update-expected.sh
2023-05-06 13:04:47 +03:00
Bronson Mirafuentes
d819068026
run ./hack/update-expected.sh
2023-05-03 09:00:40 -07:00
Bronson Mirafuentes
b25432314f
run ./hack/update-expected.sh
2023-05-02 14:21:30 -07:00
Ole Markus With
5d82e52c48
Use external ECR credential provider as of Kubernetes 1.27
2023-04-29 10:21:57 +02:00
Leïla MARABESE
1e20a4c629
unique instance names to comply with CCM
2023-04-25 16:01:42 +02:00
Leïla MARABESE
499cc1be95
downgrade CCM
2023-04-25 14:31:37 +02:00
Leïla MARABESE
c2654188b0
added noprefix to tags
2023-04-25 14:31:37 +02:00
Anthony Hausman
a28b11f4aa
hack/update-expected.sh
2023-04-16 12:37:26 +02:00
Jesse Haka
225e3f4b3f
Upgrade k8s-dns-node-cache to 1.22.20
2023-04-13 16:23:46 +03:00
Felix Friedrich
c5847054db
./hack/update-expected.sh
2023-04-12 10:46:47 +02:00
Steven E. Harris
9595c833ee
Allow Cluster Autoscaler to ignore daemon pods
...
By default the cluster autoscaler takes DaemonSet-managed pods'
resource requests into consideration when computing a node's resource
utilization. Allow toggling its "--ignore-daemonsets-utilization"
command-line flag via a new field in the Cluster
spec—"clusterAutoscaler.ignoreDaemonSetsUtilization." Setting that
field to true causes the autoscaler to ignore such daemon pods'
requests, such that it will more likely judge a node running only
daemon pods as being underutilized and shut down its hosting machine.
2023-04-05 10:03:24 -04:00
justinsb
8738f97ca7
Update test output for GCE IPv6 support
2023-03-31 09:55:28 -04:00
Leïla MARABESE
b4d230f8c2
scaleway integration test
2023-03-28 16:58:54 +02:00
Moshe Shitrit
9477463655
hack/update-expected
2023-03-18 15:55:55 +02:00
Ciprian Hacman
88fd444987
gcp: Update terraform rendering for Target Pool
2023-03-16 08:55:15 +02:00
Ciprian Hacman
1db17ab949
gcp: Update terraform rendering for HTTP Health Check
2023-03-16 08:10:25 +02:00
Ciprian Hacman
dc5fa01b02
gcp: Switch placeholder integration test from Internal to Public LB
2023-03-16 07:49:47 +02:00
Ciprian Hacman
dc92df3643
gcp: Add placeholder integration test for public load balancer
2023-03-16 07:49:47 +02:00
Kubernetes Prow Robot
995bdda158
Merge pull request #15197 from rifelpet/k127awsmigration
...
Don't set CSIMigrationAWS in k8s 1.27
2023-03-10 21:28:40 -08:00
Peter Rifel
e63cb44bd0
Update integration tests
2023-03-10 21:19:25 -06:00
Ciprian Hacman
5ec74216d8
hack/update-expected.sh
2023-03-09 09:07:04 +02:00
Ciprian Hacman
b935907ace
hack/update-expected.sh
2023-03-09 06:52:14 +02:00
Justin SB
77f6be7475
Update expected output for GCP CCM changes
2023-03-03 10:07:53 -05:00
Kubernetes Prow Robot
e8f704a855
Merge pull request #15036 from johngmyers/addlcidr-subnet
...
Improve support for AdditionalNetworkCIDRs
2023-02-24 06:33:34 -08:00
Ciprian Hacman
6b73f91b32
hack/update-expected.sh
2023-02-18 04:38:08 +02:00
Rafael da Fonseca
bc37c7408c
Add terraform target support for configuring Warm Pool
2023-02-14 14:27:46 +00:00
Kubernetes Prow Robot
ca3b53c00a
Merge pull request #15095 from infonova/use-clustername-in-cinder-csi-plugin
...
Pass actual cluster name to cinder-csi-plugin
2023-02-13 09:33:29 -08:00
ederst
30495063a3
Update expected
2023-02-13 17:45:51 +01:00
Kubernetes Prow Robot
9ec9d42910
Merge pull request #15131 from hakman/containerd-v1.6.17
...
Update containerd to v1.6.17
2023-02-13 02:27:29 -08:00
Jesse Haka
e7c4506e36
hack/update-expected.sh
2023-02-12 21:57:45 +02:00
Jesse Haka
dca3b8c832
./hack/update-expected.sh
2023-02-12 17:24:00 +02:00
Ciprian Hacman
56900bcbad
hack/update-expected.sh
2023-02-12 13:48:44 +02:00
Ciprian Hacman
466ed04506
hack/update-expected.sh
2023-02-12 12:31:37 +02:00
Kubernetes Prow Robot
165e4c6935
Merge pull request #15109 from moshevayner/aws-cni-1-12-2
...
Bump AWS CNI to 1.12.2
2023-02-10 15:15:29 -08:00
Justin SB
8f7ef492bf
gce: Always apply the metadata-proxy-ready node label
...
This restores the behaviour before #14127 , which wasn't documented /
intended.
2023-02-05 13:40:02 -05:00
Moshe Shitrit
8081c28823
hack/update-expected
2023-02-04 08:07:15 -05:00
Ciprian Hacman
884fded69e
hack/update-expected.sh
2023-02-01 09:37:37 +02:00
Kubernetes Prow Robot
ebebbe8b76
Merge pull request #15068 from hakman/etcd-v3.5.7
...
Update etcd to v3.5.7
2023-01-31 01:54:49 -08:00
Kubernetes Prow Robot
94affad3a4
Merge pull request #15050 from anthonyhaussman/feat/tone/cilium_unreachable_routes_pod_deletion
...
Cilium: Add unreachable route for pod IP on deletion option
2023-01-30 05:26:51 -08:00
Kubernetes Prow Robot
aa4386b0ca
Merge pull request #15072 from hakman/containerd-v1.6.16
...
Update containerd to v1.6.16
2023-01-29 02:26:32 -08:00
Ciprian Hacman
22d2c154f6
hack/update-expected.sh
2023-01-29 08:03:26 +02:00
Moshe Shitrit
402df6111f
hack/update-expected
2023-01-28 11:47:36 -05:00
Ciprian Hacman
4ebc882a70
hack/update-expected.sh
2023-01-28 16:29:53 +02:00
John Gardiner Myers
b47babf808
Upgrade AWS CCM to 1.25.3
2023-01-24 12:35:24 -08:00
Moshe Shitrit
fb10f001f0
hack/update-expected
2023-01-24 13:05:25 -05:00
Anthony Hausman
484bde5b9b
cilium: Add unreachable route for pod IP on deletion option
...
When a pod is deleted, the route to its IP is replaced with an unreachable route.
When a pod is created, the route is replaced with a route to the pod veth (so if an unreachable existed, it's replaced).
Ref:
- https://github.com/cilium/cilium/pull/18505
2023-01-24 14:08:24 +01:00
Ciprian Hacman
5d712cbaac
Run hack/update-expected.sh
2023-01-23 09:43:09 +02:00
Kubernetes Prow Robot
b64cded2a9
Merge pull request #14785 from hakman/etcd-manager_init-containers
...
Load etcd binaries dynamically from container images
2023-01-22 11:56:02 -08:00