Commit Graph

2131 Commits

Author SHA1 Message Date
k8s-ci-robot bf20f4deed
Merge pull request #6004 from errordeveloper/master
Separate subnet utils into a standalone package
2018-10-27 08:37:14 -07:00
k8s-ci-robot 3ce38ca674
Merge pull request #5987 from rochacon/patch-1
cilium: Fix Prometheus serve addr flag
2018-10-27 07:52:29 -07:00
k8s-ci-robot f7a0b38610
Merge pull request #5985 from rajansandeep/1.2.4
Bump CoreDNS version to 1.2.4 and update manifest
2018-10-27 07:52:24 -07:00
k8s-ci-robot 32453888d9
Merge pull request #5950 from shrinandj/fix-calico-kube-controller
Mount etc-hosts in calico-kube-controller
2018-10-27 07:52:14 -07:00
Ilya Dmitrichenko 17a2c47495
Separate subnet utils into a standalone package 2018-10-26 12:01:47 +01:00
Rongxiang Song 3847082704 fix typo in log 2018-10-24 16:27:29 +08:00
k8s-ci-robot 9078a23561
Merge pull request #5946 from jhohertz/cni-taint-tolerations
More CNI toleration for tainted nodes.
2018-10-23 04:02:35 -07:00
Rodrigo Chacon dc2b6bef07
cilium: Fix Prometheus serve addr flag 2018-10-22 23:58:12 -03:00
Sandeep Rajan b6b6c6661c bump version to 1.2.4 and update manifest 2018-10-22 10:44:34 -04:00
k8s-ci-robot 50800d8cbf
Merge pull request #5956 from leeeboo/master
Add support for cn-northwest-1c.
2018-10-20 14:23:53 -07:00
Ariel Mashraki 7dca8a78d2 terraform: Fix resource formatting for IPv6 CIDRs
Solved #5976
2018-10-20 15:58:42 +03:00
Albert Lee a286ac49ef Add support for cn-northwest-1c. 2018-10-17 12:15:09 +08:00
Justin Santa Barbara 30e2adcf92 Mark release 1.11.0-alpha.1 2018-10-16 11:59:12 -04:00
Shri Javadekar fbad6a98df Mount etc-hosts in calico-kube-controller
Testing done:

1. Verfied that when a new cluster is created, the `calico-kube-controllers` deployment bind mounts /etc/hosts from the host.

Refs #5934
2018-10-15 14:57:52 -07:00
k8s-ci-robot 1fbc6331c6
Merge pull request #5922 from spotinst/feature-spotinst-aws
New integration: Spotinst
2018-10-15 09:26:13 -07:00
Joe Hohertz cae07120b1 More CNI toleration for tainted nodes. 2018-10-15 11:45:45 -04:00
k8s-ci-robot 09654b1189
Merge pull request #5927 from gambol99/canal_v3
Canal v3
2018-10-15 03:15:38 -07:00
Rohith 5a214c4cb6 - updating the manifest description at the top to indicate reverting to flannel v0.9.0 2018-10-15 09:43:02 +01:00
Liran Polak a8db93b7d4 fix: rename cluster_identifier field 2018-10-14 11:54:58 +03:00
Liran Polak 2faf3be960 fix: remove unnecessary fmt.Errorf call 2018-10-14 11:37:31 +03:00
Liran Polak 7ae8515a05 fix: execute gofmt using go1.10 2018-10-14 11:37:31 +03:00
Liran Polak 9f94c06e67 fix: rename spotinst's feature flag 2018-10-14 11:37:31 +03:00
Liran Polak 4c8ac60bf3 deps: vendor dependencies 2018-10-14 11:37:31 +03:00
Liran Polak 7654a923f1 feature: new integration: spotinst 2018-10-14 11:37:31 +03:00
Rohith 9f526e9074 - reverting to flannel v0.9.0 due to issue https://github.com/coreos/flannel/issues/938 2018-10-12 22:13:50 +01:00
Rohith 5cf62dcda8 - fixing the versions by removing the deprecated apis 2018-10-12 19:22:50 +01:00
Rohith 01bc597d29 - actually dropping the check on the ipvs module is feels hacky with the check in validation due to blocking, or locking the version to 1.9.3, as they might not be using ipvs anyway. I'm gonna leave it for another PR or perhaps leave kube admins to decide for now 2018-10-12 14:49:22 +01:00
Rohith 87e587fa77 - removing the need for CALICO_IPV4POOL_CIDR environment variable 2018-10-12 13:59:52 +01:00
Rohith 19f50945f8 Canal v3.2.3
Adding the manifests for kubernetes >=1.9 to move to canal version 3.2.3. Admittedly I don't like the fact the users are unable to override or select the version of canal they wish to use, but as none of the networking spec have this feature i'm reluctant to add it. The PR upgrades kops cluster running kubernetes >=1.9.0 to canal v3.2.3
2018-10-12 13:29:03 +01:00
Rohith 2a7e349917 Disable RBAC Addons
The current implementation applys the rbac addons regardless. When node authorization is enable this manifests is skipped. In regard to rollouts from RBAC -> Node, the process will be disable manifest, though the clusterrolebindings will still exist. Once all the nodes have been upgraded to use Node authorization the administrator can delete the binding maunally.
2018-10-12 10:23:26 +01:00
k8s-ci-robot 2647d3d02f
Merge pull request #5915 from rdrgmnzs/typos2
fix typo in comment
2018-10-10 18:26:42 -07:00
Rodrigo Menezes 1917448788 fix typo in comment 2018-10-10 09:52:33 -07:00
k8s-ci-robot 201e30b4d4
Merge pull request #5903 from justinsb/5845_bump_bootstrapchannel
Update weave bootstrapchannelbuilder version
2018-10-10 06:28:03 -07:00
k8s-ci-robot f4c1da63de
Merge pull request #5910 from gambol99/fix_canal_manifest
Canal Manifest Fix (Kubernetes >= v1.12.0)
2018-10-10 05:25:03 -07:00
Rohith d1ea6ad028 Canal Manifest Fix (Kubernetes >= v1.12.0)
So the current canal manifest contains a 'description' field which as far as I can tell from the API documentation never existed (in apimachinery). Previous versions probably ignored the field but while testing v1.12.1 I noticed canal no longer deployed correctly due to the validation error. I've bumped the versions and removed the field from the manifest; this shouldn't have any impact on those already deployed, but as an alternative we could copy and paste 1.8 manifest, add an exclusion in the [bootstrapchannelbuilder.go](https://github.com/kubernetes/kops/blob/master/upup/pkg/fi/cloudup/bootstrapchannelbuilder.go#L685-L699) to use >1.8.0 <=1.12.0 etc and use new manifest for >=1.12.0 (if you get what i know :-))

Post removing the `description` field the networking works again ..
2018-10-10 11:49:10 +01:00
Justin Santa Barbara 20cb6fce23 Update weave bootstrapchannelbuilder version
Follow on to #5845
2018-10-09 09:03:14 -04:00
k8s-ci-robot cd3de8ee9d
Merge pull request #5845 from bboreham/weave-241
Update Weave Net to version 2.4.1
2018-10-08 23:38:11 -07:00
k8s-ci-robot 2b0e37061a
Merge pull request #5886 from mooncak/fix_upup_issues
Fix typos issues in upup files
2018-10-08 20:02:21 -07:00
k8s-ci-robot 779d51ab4d
Merge pull request #5894 from andrewsykim/do-propagate-err
propagate error when initializing digitalocean provider
2018-10-08 16:11:24 -07:00
andrewsykim c9a12286c6 propagate error when initializing digitalocean provider 2018-10-08 13:19:04 -04:00
mooncake 5094996a32 fix typos issues in upup files
Signed-off-by: mooncake <xcoder@tenxcloud.com>
2018-10-07 10:28:01 +08:00
k8s-ci-robot 7b4133c823
Merge pull request #5812 from arturo-c/weave
Add no_masq_local to weave network options.
2018-10-05 16:55:53 -07:00
Arturo Contreras 3b99f81ddd Fix test for manifest kops k8s. 2018-10-04 08:08:17 -06:00
Arturo Contreras 5cbeb85ba8 Bump kops.2 for k8s 1.8. 2018-10-04 07:55:48 -06:00
k8s-ci-robot f67d6e86b2
Merge pull request #5858 from justinsb/mirror_secrets_using_api
Mirror secrets using API
2018-10-03 08:37:16 -07:00
k8s-ci-robot c81a0c64c5
Merge pull request #5868 from gambol99/fix_up_client
Node Authorizer Fixes
2018-10-03 06:12:55 -07:00
Rohith aa700961b5 - fixing up the prometheus metrics annotation to indicates a https scheme 2018-10-03 11:39:35 +01:00
Rohith 97dc2beb71 Node Authorizer Client Fix
- fixing up the client for reboots ... somewhat of a oversight on my part :-)
- added the reason to the node denial message
2018-10-03 11:39:35 +01:00
k8s-ci-robot b3d61542cd
Merge pull request #5820 from justinsb/etcd_manager_channels_step1
etcd: introduce field to specify whether we are using etcd-manager or legacy mode
2018-10-02 14:20:37 -07:00
Rodrigo Menezes a82f548ff8 Allow using existing/shared Security Groups
Verbosely log when a user overwrites LB or IG security groups

Change SecurityGroup to SecurityGroupOverride

Allow using existing/shared Security Groups

Update tests
2018-10-02 00:51:39 -07:00