Commit Graph

279 Commits

Author SHA1 Message Date
Ciprian Hacman f5b72742b4
Release 1.26.0-beta.1 (#14858) 2022-12-23 01:13:27 -08:00
Kubernetes Prow Robot 424af287cf
Merge pull request #14823 from johngmyers/coredns
Upgrade coredns to v1.10.0
2022-12-20 00:11:44 -08:00
John Gardiner Myers 472a7f38b6 Upgrade coredns to v1.10.0 2022-12-19 23:26:39 -08:00
John Gardiner Myers 936790e953 Upgrade k8s-dns-node-cache to 1.22.15 2022-12-19 19:26:21 -08:00
John Gardiner Myers 4c036cb261 hack/update-expected.sh 2022-12-19 00:10:16 -08:00
Ciprian Hacman 09dc2c8455 Run hack/update-expected.sh 2022-12-09 08:01:54 +02:00
Ciprian Hacman 20805fe110 Run hack/update-expected.sh 2022-12-06 19:00:23 +02:00
John Gardiner Myers c6349285d4
Release 1.26.0-alpha.2 (#14665) 2022-11-25 09:06:04 -08:00
Denis Moiseev e7c3dee038 Add `ec2:DescribeAvailabilityZones` to the AWS CCM permissions list
To workaround the issue with subnets auto-discovery [1]
AWS ccm needs to have permission to retrieve information about
availability zones (specifically to detect outpost, wavelength, and local zones [2]).

[1] https://github.com/kubernetes/cloud-provider-aws/issues/442
[2] https://github.com/kubernetes/cloud-provider-aws/pull/499
2022-11-25 11:04:27 +01:00
John Gardiner Myers 6dd63c8e1f hack/update-expected.sh 2022-11-23 15:55:01 -08:00
John Gardiner Myers 7a2eaa2830 hack/update-expected.sh 2022-11-22 21:04:55 -08:00
John Gardiner Myers b105aa6a86 hack/update-expected.sh 2022-11-22 17:15:51 -08:00
John Gardiner Myers 294c0a3a04 hack/update-expected.sh 2022-11-16 22:06:02 -08:00
John Gardiner Myers 8473e8b2e7 Stop making MasterInternalName configurable 2022-11-16 22:06:02 -08:00
Ciprian Hacman 309b37eadf Run hack/update-expected.sh 2022-11-15 14:51:54 +02:00
John Gardiner Myers c53c3bf8f8 Update images in tests 2022-11-01 17:04:43 -07:00
Ole Markus With cd378bff72 Move setting role taints to cloudup 2022-10-18 13:42:00 +02:00
Thomas Colomb 9b28c14213 cluster-autoscaler : Add iam permission autoscaling:DescribeScalingActivities needed since 1.24 version 2022-09-23 13:20:21 +02:00
Ciprian Hacman 1eb35d9686
Release 1.26.0-alpha.1 (#14311) 2022-09-21 01:28:54 -07:00
Ole Markus With f226b03abf Add back missing permissions for legacy CCM. Again. 2022-09-10 19:54:49 +02:00
Ciprian Hacman 8b83dedf24
Release 1.25.0-beta.1 (#14210) 2022-08-31 03:43:00 -07:00
Ciprian Hacman cf5e48c912 Run hack/update-expected.sh 2022-08-31 09:21:40 +03:00
Ole Markus With 1a8236290d Bump node local dns cache to 1.22.8 2022-08-25 19:03:14 +02:00
Ciprian Hacman b9394fed18 Run hack/update-expected.sh 2022-08-12 19:40:25 +03:00
justinsb 8693164f76 Update expected output 2022-08-03 09:51:16 -04:00
Ole Markus With 8bcc640452 Make Karpenter respect IG's spec.Subnets
This will add tag all subnets with the IGs using that subnet

Update docs/operations/karpenter.md

Co-authored-by: Peter Rifel <rifelpet@users.noreply.github.com>
2022-08-01 21:06:24 +02:00
Ciprian Hacman 4dee7dd9a2
Release 1.25.0-alpha.2 (#14070) 2022-07-29 11:31:11 -07:00
Ciprian Hacman 45012d83bf Run hack/update-expected.sh 2022-07-27 21:55:34 +03:00
Ciprian Hacman 7b99594f39 Run hack/update-expected.sh 2022-07-18 06:36:23 +03:00
Peter Rifel 7ffedef3a4
./hack/update-expected.sh 2022-07-11 20:54:30 -06:00
Nicolas Sterchele 73b6ed4150
aws: introduce maximum instance lifetime in cluster
The maximum instance lifetime is an AWS only feature and specifies the
maximum amount of time (in seconds) that an instance can be in service
before it is terminated and replaced.
A common use case might be a requirement to replace your instances on a
schedule because of internal security policies or external compliance
controls.
2022-07-04 20:38:33 +02:00
Ciprian Hacman 4b637db62b
Release 1.25.0-alpha.1 (#13912)
* Release 1.25.0-alpha.1

* Squash release commit for more clarity
2022-06-29 05:32:06 -07:00
Ciprian Hacman 59c5801c94 Run hack/update-expected.sh 2022-06-28 12:38:32 +03:00
Ciprian Hacman 11870286e0 Run hack/update-expected.sh 2022-06-18 09:01:23 +03:00
Ciprian Hacman 911f4a133c Run hack/update-expected.sh 2022-06-10 14:03:16 +03:00
Kubernetes Prow Robot d56cce25d0
Merge pull request #13750 from julienperignon/master
Fix API group name for ingresses in DNS Controller
2022-06-10 02:59:46 -07:00
Ciprian Hacman 88122d67c3 Run hack/update-expected.sh 2022-06-10 09:55:15 +03:00
Julien Perignon bf825b72f1 Update after running hack/update-expected.sh 2022-06-09 01:03:57 +10:00
Ciprian Hacman 9a591b2aa7 Run hack/update-expected.sh 2022-06-07 09:16:54 +03:00
Ciprian Hacman f95ef569a1
Release 1.24.0-beta.1 (#13730) 2022-06-04 07:10:20 -07:00
Ole Markus With 7981f6fa25 Bump coredns to 1.8.6 2022-05-22 09:30:02 +02:00
Ciprian Hacman 97b5795edb
Release 1.24.0-alpha.5 (#13675) 2022-05-21 09:10:00 -07:00
Jesse Haka a5c9dddc48 fix test data 2022-05-15 23:30:41 +03:00
Ciprian Hacman 68469601cd
Release 1.24.0-alpha.4 (#13631) 2022-05-11 02:36:52 -07:00
Ciprian Hacman 007b50cc89 Run hack/update-expected.sh 2022-05-03 20:05:38 +03:00
Ciprian Hacman 75fac81273 Run hack/update-expected.sh 2022-05-02 10:33:26 +03:00
Ole Markus With 227dde3ce7 Update expected 2022-04-18 13:56:13 +02:00
justinsb 74397b2a4f Update to etcd-manager 3.0.20220417
In particular we want to pick up changes addressing the potential
corruption found in 3.5.0 - 3.5.2:

* Use etcd 3.5.3
* Pass the ETCD_EXPERIMENTAL_INITIAL_CORRUPT_CHECK for all 3.5 series
2022-04-17 10:29:01 -04:00
Ciprian Hacman 18d45a2994 Run hack/update-expected.sh 2022-04-13 16:49:09 +03:00
Bronson Mirafuentes e112d81025
Release 1.24.0-alpha.3 (#13372)
Signed-off-by: Ciprian Hacman <ciprian@hakman.dev>
2022-03-18 21:09:12 -07:00