k8s-ci-robot
bf20f4deed
Merge pull request #6004 from errordeveloper/master
...
Separate subnet utils into a standalone package
2018-10-27 08:37:14 -07:00
k8s-ci-robot
3ce38ca674
Merge pull request #5987 from rochacon/patch-1
...
cilium: Fix Prometheus serve addr flag
2018-10-27 07:52:29 -07:00
k8s-ci-robot
f7a0b38610
Merge pull request #5985 from rajansandeep/1.2.4
...
Bump CoreDNS version to 1.2.4 and update manifest
2018-10-27 07:52:24 -07:00
k8s-ci-robot
32453888d9
Merge pull request #5950 from shrinandj/fix-calico-kube-controller
...
Mount etc-hosts in calico-kube-controller
2018-10-27 07:52:14 -07:00
Ilya Dmitrichenko
17a2c47495
Separate subnet utils into a standalone package
2018-10-26 12:01:47 +01:00
Rongxiang Song
3847082704
fix typo in log
2018-10-24 16:27:29 +08:00
k8s-ci-robot
9078a23561
Merge pull request #5946 from jhohertz/cni-taint-tolerations
...
More CNI toleration for tainted nodes.
2018-10-23 04:02:35 -07:00
Rodrigo Chacon
dc2b6bef07
cilium: Fix Prometheus serve addr flag
2018-10-22 23:58:12 -03:00
Sandeep Rajan
b6b6c6661c
bump version to 1.2.4 and update manifest
2018-10-22 10:44:34 -04:00
k8s-ci-robot
50800d8cbf
Merge pull request #5956 from leeeboo/master
...
Add support for cn-northwest-1c.
2018-10-20 14:23:53 -07:00
Ariel Mashraki
7dca8a78d2
terraform: Fix resource formatting for IPv6 CIDRs
...
Solved #5976
2018-10-20 15:58:42 +03:00
Albert Lee
a286ac49ef
Add support for cn-northwest-1c.
2018-10-17 12:15:09 +08:00
Justin Santa Barbara
30e2adcf92
Mark release 1.11.0-alpha.1
2018-10-16 11:59:12 -04:00
Shri Javadekar
fbad6a98df
Mount etc-hosts in calico-kube-controller
...
Testing done:
1. Verfied that when a new cluster is created, the `calico-kube-controllers` deployment bind mounts /etc/hosts from the host.
Refs #5934
2018-10-15 14:57:52 -07:00
k8s-ci-robot
1fbc6331c6
Merge pull request #5922 from spotinst/feature-spotinst-aws
...
New integration: Spotinst
2018-10-15 09:26:13 -07:00
Joe Hohertz
cae07120b1
More CNI toleration for tainted nodes.
2018-10-15 11:45:45 -04:00
k8s-ci-robot
09654b1189
Merge pull request #5927 from gambol99/canal_v3
...
Canal v3
2018-10-15 03:15:38 -07:00
Rohith
5a214c4cb6
- updating the manifest description at the top to indicate reverting to flannel v0.9.0
2018-10-15 09:43:02 +01:00
Liran Polak
a8db93b7d4
fix: rename cluster_identifier field
2018-10-14 11:54:58 +03:00
Liran Polak
2faf3be960
fix: remove unnecessary fmt.Errorf call
2018-10-14 11:37:31 +03:00
Liran Polak
7ae8515a05
fix: execute gofmt using go1.10
2018-10-14 11:37:31 +03:00
Liran Polak
9f94c06e67
fix: rename spotinst's feature flag
2018-10-14 11:37:31 +03:00
Liran Polak
4c8ac60bf3
deps: vendor dependencies
2018-10-14 11:37:31 +03:00
Liran Polak
7654a923f1
feature: new integration: spotinst
2018-10-14 11:37:31 +03:00
Rohith
9f526e9074
- reverting to flannel v0.9.0 due to issue https://github.com/coreos/flannel/issues/938
2018-10-12 22:13:50 +01:00
Rohith
5cf62dcda8
- fixing the versions by removing the deprecated apis
2018-10-12 19:22:50 +01:00
Rohith
01bc597d29
- actually dropping the check on the ipvs module is feels hacky with the check in validation due to blocking, or locking the version to 1.9.3, as they might not be using ipvs anyway. I'm gonna leave it for another PR or perhaps leave kube admins to decide for now
2018-10-12 14:49:22 +01:00
Rohith
87e587fa77
- removing the need for CALICO_IPV4POOL_CIDR environment variable
2018-10-12 13:59:52 +01:00
Rohith
19f50945f8
Canal v3.2.3
...
Adding the manifests for kubernetes >=1.9 to move to canal version 3.2.3. Admittedly I don't like the fact the users are unable to override or select the version of canal they wish to use, but as none of the networking spec have this feature i'm reluctant to add it. The PR upgrades kops cluster running kubernetes >=1.9.0 to canal v3.2.3
2018-10-12 13:29:03 +01:00
Rohith
2a7e349917
Disable RBAC Addons
...
The current implementation applys the rbac addons regardless. When node authorization is enable this manifests is skipped. In regard to rollouts from RBAC -> Node, the process will be disable manifest, though the clusterrolebindings will still exist. Once all the nodes have been upgraded to use Node authorization the administrator can delete the binding maunally.
2018-10-12 10:23:26 +01:00
k8s-ci-robot
2647d3d02f
Merge pull request #5915 from rdrgmnzs/typos2
...
fix typo in comment
2018-10-10 18:26:42 -07:00
Rodrigo Menezes
1917448788
fix typo in comment
2018-10-10 09:52:33 -07:00
k8s-ci-robot
201e30b4d4
Merge pull request #5903 from justinsb/5845_bump_bootstrapchannel
...
Update weave bootstrapchannelbuilder version
2018-10-10 06:28:03 -07:00
k8s-ci-robot
f4c1da63de
Merge pull request #5910 from gambol99/fix_canal_manifest
...
Canal Manifest Fix (Kubernetes >= v1.12.0)
2018-10-10 05:25:03 -07:00
Rohith
d1ea6ad028
Canal Manifest Fix (Kubernetes >= v1.12.0)
...
So the current canal manifest contains a 'description' field which as far as I can tell from the API documentation never existed (in apimachinery). Previous versions probably ignored the field but while testing v1.12.1 I noticed canal no longer deployed correctly due to the validation error. I've bumped the versions and removed the field from the manifest; this shouldn't have any impact on those already deployed, but as an alternative we could copy and paste 1.8 manifest, add an exclusion in the [bootstrapchannelbuilder.go](https://github.com/kubernetes/kops/blob/master/upup/pkg/fi/cloudup/bootstrapchannelbuilder.go#L685-L699 ) to use >1.8.0 <=1.12.0 etc and use new manifest for >=1.12.0 (if you get what i know :-))
Post removing the `description` field the networking works again ..
2018-10-10 11:49:10 +01:00
Justin Santa Barbara
20cb6fce23
Update weave bootstrapchannelbuilder version
...
Follow on to #5845
2018-10-09 09:03:14 -04:00
k8s-ci-robot
cd3de8ee9d
Merge pull request #5845 from bboreham/weave-241
...
Update Weave Net to version 2.4.1
2018-10-08 23:38:11 -07:00
k8s-ci-robot
2b0e37061a
Merge pull request #5886 from mooncak/fix_upup_issues
...
Fix typos issues in upup files
2018-10-08 20:02:21 -07:00
k8s-ci-robot
779d51ab4d
Merge pull request #5894 from andrewsykim/do-propagate-err
...
propagate error when initializing digitalocean provider
2018-10-08 16:11:24 -07:00
andrewsykim
c9a12286c6
propagate error when initializing digitalocean provider
2018-10-08 13:19:04 -04:00
mooncake
5094996a32
fix typos issues in upup files
...
Signed-off-by: mooncake <xcoder@tenxcloud.com>
2018-10-07 10:28:01 +08:00
k8s-ci-robot
7b4133c823
Merge pull request #5812 from arturo-c/weave
...
Add no_masq_local to weave network options.
2018-10-05 16:55:53 -07:00
Arturo Contreras
3b99f81ddd
Fix test for manifest kops k8s.
2018-10-04 08:08:17 -06:00
Arturo Contreras
5cbeb85ba8
Bump kops.2 for k8s 1.8.
2018-10-04 07:55:48 -06:00
k8s-ci-robot
f67d6e86b2
Merge pull request #5858 from justinsb/mirror_secrets_using_api
...
Mirror secrets using API
2018-10-03 08:37:16 -07:00
k8s-ci-robot
c81a0c64c5
Merge pull request #5868 from gambol99/fix_up_client
...
Node Authorizer Fixes
2018-10-03 06:12:55 -07:00
Rohith
aa700961b5
- fixing up the prometheus metrics annotation to indicates a https scheme
2018-10-03 11:39:35 +01:00
Rohith
97dc2beb71
Node Authorizer Client Fix
...
- fixing up the client for reboots ... somewhat of a oversight on my part :-)
- added the reason to the node denial message
2018-10-03 11:39:35 +01:00
k8s-ci-robot
b3d61542cd
Merge pull request #5820 from justinsb/etcd_manager_channels_step1
...
etcd: introduce field to specify whether we are using etcd-manager or legacy mode
2018-10-02 14:20:37 -07:00
Rodrigo Menezes
a82f548ff8
Allow using existing/shared Security Groups
...
Verbosely log when a user overwrites LB or IG security groups
Change SecurityGroup to SecurityGroupOverride
Allow using existing/shared Security Groups
Update tests
2018-10-02 00:51:39 -07:00