Commit Graph

2141 Commits

Author SHA1 Message Date
Chris Phillips f0a7fa785c allow overriding subnet tags in the NetworkSpec 2018-11-07 08:08:44 -08:00
Chris Phillips 153dd977df log when using the env var to override plugin url 2018-11-07 08:08:44 -08:00
Chris Phillips cdeeb3704b allow overriding the cni plugin download url 2018-11-07 08:08:44 -08:00
Chris Phillips 2b9a56f8e6 rename to LyftVPC. Removes all the settings from the NetworkingSpec 2018-11-07 08:08:44 -08:00
Chris Phillips 4d40090c0c adds loopback to list of cni assets. fix gofmt 2018-11-07 08:08:13 -08:00
Chris Phillips 3ec470b240 apimachinery and updated BUILD.bazel for cni-ipvlan-vpc-k8s 2018-11-07 08:08:13 -08:00
Chris Phillips 3a8078763a Adds support for Lyft's cni-ipvlan-vpc-k8s
https://github.com/lyft/cni-ipvlan-vpc-k8s

This cni solution is slightly different in that it doesn't require running a daemonset

It requires:
  * a config file in /etc/cni/net.d
  * the binaries in /opt/cni/bin
  * adding the --node-ip param to the kubelet

This code is modeled after the AmazonVPC cni bits.

I've left the setup of the required subnets as an exercise to the reader.
2018-11-07 08:08:13 -08:00
k8s-ci-robot 560a0a2a40
Merge pull request #6043 from bboreham/weave-net-2-5
Update Weave Net to version 2.5.0
2018-11-06 07:11:41 -08:00
Bryan Boreham c649312a4a Update Weave Net to version 2.5.0
This release adds support for Kubernetes `hostPort` mapping and the
`ipBlock` NetworkPolicy feature, plus many other improvements.

Release notes https://github.com/weaveworks/weave/releases/tag/v2.5.0

Signed-off-by: Bryan Boreham <bjboreham@gmail.com>
2018-11-05 17:29:03 +00:00
Kashif Saadat 1ada8a98e5 Canal v3.3.0 for Kubernetes v1.12+ 2018-11-02 15:47:37 +00:00
k8s-ci-robot bf20f4deed
Merge pull request #6004 from errordeveloper/master
Separate subnet utils into a standalone package
2018-10-27 08:37:14 -07:00
k8s-ci-robot 3ce38ca674
Merge pull request #5987 from rochacon/patch-1
cilium: Fix Prometheus serve addr flag
2018-10-27 07:52:29 -07:00
k8s-ci-robot f7a0b38610
Merge pull request #5985 from rajansandeep/1.2.4
Bump CoreDNS version to 1.2.4 and update manifest
2018-10-27 07:52:24 -07:00
k8s-ci-robot 32453888d9
Merge pull request #5950 from shrinandj/fix-calico-kube-controller
Mount etc-hosts in calico-kube-controller
2018-10-27 07:52:14 -07:00
Ilya Dmitrichenko 17a2c47495
Separate subnet utils into a standalone package 2018-10-26 12:01:47 +01:00
Rongxiang Song 3847082704 fix typo in log 2018-10-24 16:27:29 +08:00
k8s-ci-robot 9078a23561
Merge pull request #5946 from jhohertz/cni-taint-tolerations
More CNI toleration for tainted nodes.
2018-10-23 04:02:35 -07:00
Rodrigo Chacon dc2b6bef07
cilium: Fix Prometheus serve addr flag 2018-10-22 23:58:12 -03:00
Sandeep Rajan b6b6c6661c bump version to 1.2.4 and update manifest 2018-10-22 10:44:34 -04:00
k8s-ci-robot 50800d8cbf
Merge pull request #5956 from leeeboo/master
Add support for cn-northwest-1c.
2018-10-20 14:23:53 -07:00
Ariel Mashraki 7dca8a78d2 terraform: Fix resource formatting for IPv6 CIDRs
Solved #5976
2018-10-20 15:58:42 +03:00
Albert Lee a286ac49ef Add support for cn-northwest-1c. 2018-10-17 12:15:09 +08:00
Justin Santa Barbara 30e2adcf92 Mark release 1.11.0-alpha.1 2018-10-16 11:59:12 -04:00
Shri Javadekar fbad6a98df Mount etc-hosts in calico-kube-controller
Testing done:

1. Verfied that when a new cluster is created, the `calico-kube-controllers` deployment bind mounts /etc/hosts from the host.

Refs #5934
2018-10-15 14:57:52 -07:00
k8s-ci-robot 1fbc6331c6
Merge pull request #5922 from spotinst/feature-spotinst-aws
New integration: Spotinst
2018-10-15 09:26:13 -07:00
Joe Hohertz cae07120b1 More CNI toleration for tainted nodes. 2018-10-15 11:45:45 -04:00
k8s-ci-robot 09654b1189
Merge pull request #5927 from gambol99/canal_v3
Canal v3
2018-10-15 03:15:38 -07:00
Rohith 5a214c4cb6 - updating the manifest description at the top to indicate reverting to flannel v0.9.0 2018-10-15 09:43:02 +01:00
Liran Polak a8db93b7d4 fix: rename cluster_identifier field 2018-10-14 11:54:58 +03:00
Liran Polak 2faf3be960 fix: remove unnecessary fmt.Errorf call 2018-10-14 11:37:31 +03:00
Liran Polak 7ae8515a05 fix: execute gofmt using go1.10 2018-10-14 11:37:31 +03:00
Liran Polak 9f94c06e67 fix: rename spotinst's feature flag 2018-10-14 11:37:31 +03:00
Liran Polak 4c8ac60bf3 deps: vendor dependencies 2018-10-14 11:37:31 +03:00
Liran Polak 7654a923f1 feature: new integration: spotinst 2018-10-14 11:37:31 +03:00
Rohith 9f526e9074 - reverting to flannel v0.9.0 due to issue https://github.com/coreos/flannel/issues/938 2018-10-12 22:13:50 +01:00
Rohith 5cf62dcda8 - fixing the versions by removing the deprecated apis 2018-10-12 19:22:50 +01:00
Rohith 01bc597d29 - actually dropping the check on the ipvs module is feels hacky with the check in validation due to blocking, or locking the version to 1.9.3, as they might not be using ipvs anyway. I'm gonna leave it for another PR or perhaps leave kube admins to decide for now 2018-10-12 14:49:22 +01:00
Rohith 87e587fa77 - removing the need for CALICO_IPV4POOL_CIDR environment variable 2018-10-12 13:59:52 +01:00
Rohith 19f50945f8 Canal v3.2.3
Adding the manifests for kubernetes >=1.9 to move to canal version 3.2.3. Admittedly I don't like the fact the users are unable to override or select the version of canal they wish to use, but as none of the networking spec have this feature i'm reluctant to add it. The PR upgrades kops cluster running kubernetes >=1.9.0 to canal v3.2.3
2018-10-12 13:29:03 +01:00
Rohith 2a7e349917 Disable RBAC Addons
The current implementation applys the rbac addons regardless. When node authorization is enable this manifests is skipped. In regard to rollouts from RBAC -> Node, the process will be disable manifest, though the clusterrolebindings will still exist. Once all the nodes have been upgraded to use Node authorization the administrator can delete the binding maunally.
2018-10-12 10:23:26 +01:00
k8s-ci-robot 2647d3d02f
Merge pull request #5915 from rdrgmnzs/typos2
fix typo in comment
2018-10-10 18:26:42 -07:00
Rodrigo Menezes 1917448788 fix typo in comment 2018-10-10 09:52:33 -07:00
k8s-ci-robot 201e30b4d4
Merge pull request #5903 from justinsb/5845_bump_bootstrapchannel
Update weave bootstrapchannelbuilder version
2018-10-10 06:28:03 -07:00
k8s-ci-robot f4c1da63de
Merge pull request #5910 from gambol99/fix_canal_manifest
Canal Manifest Fix (Kubernetes >= v1.12.0)
2018-10-10 05:25:03 -07:00
Rohith d1ea6ad028 Canal Manifest Fix (Kubernetes >= v1.12.0)
So the current canal manifest contains a 'description' field which as far as I can tell from the API documentation never existed (in apimachinery). Previous versions probably ignored the field but while testing v1.12.1 I noticed canal no longer deployed correctly due to the validation error. I've bumped the versions and removed the field from the manifest; this shouldn't have any impact on those already deployed, but as an alternative we could copy and paste 1.8 manifest, add an exclusion in the [bootstrapchannelbuilder.go](https://github.com/kubernetes/kops/blob/master/upup/pkg/fi/cloudup/bootstrapchannelbuilder.go#L685-L699) to use >1.8.0 <=1.12.0 etc and use new manifest for >=1.12.0 (if you get what i know :-))

Post removing the `description` field the networking works again ..
2018-10-10 11:49:10 +01:00
Justin Santa Barbara 20cb6fce23 Update weave bootstrapchannelbuilder version
Follow on to #5845
2018-10-09 09:03:14 -04:00
k8s-ci-robot cd3de8ee9d
Merge pull request #5845 from bboreham/weave-241
Update Weave Net to version 2.4.1
2018-10-08 23:38:11 -07:00
k8s-ci-robot 2b0e37061a
Merge pull request #5886 from mooncak/fix_upup_issues
Fix typos issues in upup files
2018-10-08 20:02:21 -07:00
k8s-ci-robot 779d51ab4d
Merge pull request #5894 from andrewsykim/do-propagate-err
propagate error when initializing digitalocean provider
2018-10-08 16:11:24 -07:00
andrewsykim c9a12286c6 propagate error when initializing digitalocean provider 2018-10-08 13:19:04 -04:00