Commit Graph

88 Commits

Author SHA1 Message Date
Kubernetes Prow Robot f28b11cd4b
Merge pull request #17519 from sats-23/sup-image-tag
Add support for passing image for nvidia-k8s-device-plugin
2025-07-29 06:42:27 -07:00
Rafael da Fonseca 1794614c19 Add support for using ECR as pull-through image cache
Signed-off-by: Rafael da Fonseca <rafael.fonseca@wildlifestudios.com>
2025-07-28 12:45:53 +01:00
Sathvik 98090bc10a Add support for passing image for nvidia-k8s-device-plugin 2025-07-27 17:22:47 +05:30
Ciprian Hacman 271a2dd1b4 Update dependencies 2025-06-27 13:53:05 +03:00
Peter Rifel 298e771e29
Update dependencies (#17333)
* Update dependencies

* make gomod

* make crds

* Bump RSA private key size to meet new minimum

* Fix scaleway type change

* Bump k8s.io/kops in tests/e2e module

* Bump containerd

* Bump golang-jwt/jwt

* Bump golang.org/x/net
2025-03-29 23:30:56 +00:00
Arnaud Meukam 685f4fe646
Bump CI tools
Signed-off-by: Arnaud Meukam <ameukam@gmail.com>
2025-02-26 16:08:29 +01:00
Ciprian Hacman 8b843856e7 Update deps to K8s v0.31.0 2024-08-25 17:48:14 +03:00
Ciprian Hacman aa2e3e1be1 make crds 2024-03-23 13:58:47 +02:00
Tobias Trabelsi 311f40245f
added image minimum and maximum gc age
Signed-off-by: Tobias Trabelsi <lerentis@uploadfilter24.eu>
2024-02-03 12:30:46 +01:00
Ciprian Hacman 7a1af66152 Add option to provide additional config entries for containerd 2023-10-27 08:56:34 +03:00
Ciprian Hacman 730a520706 Update controller-gen to v0.13.0 2023-10-25 07:31:41 +03:00
Feruzjon Muyassarov 0aeab5e523 containerd: introduce a new field containerd.nri to enable NRI
Node Resource Interface (NRI) is a common framework for plugging
domain or vendor-specific custom logic into container runtime like
containerd. This commit introduces a new congiguration field
`containerd.nri`, providing cluster admins the flexibility to opt
in for this feature in containerd and tune some of its parameters.
By default, NRI is disabled here in accordance with the containerd's
default config file.

Signed-off-by: Feruzjon Muyassarov <feruzjon.muyassarov@intel.com>
2023-10-21 00:26:54 +03:00
Colin Hoglund 2167dd8d82 Update kubelet API with SeccompDefault option. 2023-09-15 21:11:50 -07:00
Ciprian Hacman 120c0b65aa hack/update-expected.sh 2023-09-05 12:34:20 +03:00
Ciprian Hacman c291190674 Add support for --experimental-allocatable-ignore-eviction kubelet flag 2023-08-26 06:01:27 +03:00
Ciprian Hacman 80afaaead2 Add support for using swap memory 2023-07-14 07:50:48 +03:00
Jan Safranek 134727a2e7 Generate API 2023-06-19 15:20:08 +02:00
Grégory SANCHEZ 6fdf54ff34 feat(cluster-autoscaler): autogenerate priority-expander configMap 2023-01-11 08:26:33 +01:00
Bronson Mirafuentes 4929ef3e65 update CapacityRebalance comments 2022-11-21 08:47:42 -08:00
Bronson Mirafuentes 85898cba0b add capacityRebalance flag for ASGs 2022-11-21 08:47:40 -08:00
Ole Markus With 98cd242673 Add support for installing dcgm exporter 2022-08-30 14:54:13 +02:00
Ciprian Hacman 11a0f64cd8 Add option to configure runc version for containerd 2022-08-04 09:48:46 +03:00
Ivan Volynkin 329c60cc62 Adding GCE SPOT support 2022-07-14 20:19:50 +03:00
Nicolas Sterchele 73b6ed4150
aws: introduce maximum instance lifetime in cluster
The maximum instance lifetime is an AWS only feature and specifies the
maximum amount of time (in seconds) that an instance can be in service
before it is terminated and replaced.
A common use case might be a requirement to replace your instances on a
schedule because of internal security policies or external compliance
controls.
2022-07-04 20:38:33 +02:00
Ivan Volynkin 4264d78839 Adding GuestAccelerators to InstanceTemplate 2022-06-23 10:00:02 +03:00
Eric Bailey 34caed893b Add support for setting mode field on file assets 2022-06-09 10:37:29 -05:00
Ciprian Hacman 0b095068f3 Add support for installing additional packages 2022-05-03 06:47:44 +03:00
Jesse Haka 28caf02878 Support GPU in OpenStack 2022-03-11 09:19:09 +02:00
Ole Markus With 2625264fe5 Add support for graceful node shutdown
Update docs/cluster_spec.md

Co-authored-by: Ciprian Hacman <ciprianhacman@gmail.com>
2022-02-11 20:51:02 +01:00
Ole Markus With b09241122f Support specifying instance requirements per IG
Update docs/instance_groups.md

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2021-12-24 21:19:58 +01:00
Ole Markus With b785965c50 Rename InstanceManager to Manager 2021-12-13 09:14:24 +01:00
Ole Markus With 794cb72112 Karpenter addon
Constrain the instance types to what is supported by the AMI

Add taints and label to karpenter provisioner

Add instance types to karpenter provisioner
2021-12-12 19:33:41 +01:00
John Gardiner Myers 8fed76c8b2 Rename fields in v1alpha3 instancegroup API to fit acronym convention 2021-11-22 08:07:55 -08:00
John Gardiner Myers d0a33f2b2f Remove unused instancegroup field from v1alpha3 API 2021-10-10 18:59:18 -07:00
Ciprian Hacman b594eb6ece Add support --kernel-memcg-notification Kubelet flag 2021-09-04 11:36:01 +03:00
Peter Rifel a0a6e3c974
Cleanup various references to LaunchConfigurations 2021-07-29 22:25:01 -04:00
Oleg Atamanenko 7d013d5dc6 Add podPidsLimit / --pod-max-pids support 2021-07-06 11:06:49 -07:00
dntosas 43dc375ced
Add support for logging-format option (text/json)
Signed-off-by: dntosas <ntosas@gmail.com>
2021-06-21 10:10:56 +03:00
John Gardiner Myers 5ad32230bb Fix typo 2021-04-25 13:42:12 -07:00
Ole Markus With 1ec0bd18e8 Enable support for the ASG WarmPool lifecycle hook
Update pkg/model/iam/iam_builder.go

Co-authored-by: Ciprian Hacman <ciprianhacman@gmail.com>
2021-04-24 09:40:52 +02:00
Ole Markus With 020652e096 Add ability to enable/configure warm pool for ASG
Apply suggestions from code review

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>

Apply suggestions from code review

Co-authored-by: John Gardiner Myers <jgmyers@proofpoint.com>
2021-04-20 09:02:09 +02:00
Barry Melbourne e30bf1cf35 Update Go modules to latest versions 2021-03-14 15:08:27 +00:00
Kubernetes Prow Robot ad7c793050
Merge pull request #10913 from seh/scope-os-update-policy-to-instance-group-too
Honor OS update policy at InstanceGroup level too
2021-03-12 22:03:03 -08:00
Bharath Vedartham 0c0767c0c9 Remove support for launch configurations 2021-03-09 09:04:15 +02:00
Steven E. Harris 70e95fccf5 Copyedit the InstanceGroup-related documentation 2021-03-05 08:53:08 -05:00
Steven E. Harris e39c985ee7 Honor OS update policy at InstanceGroup level too
As with the Cluster-level "spec.updatePolicy" field, add a similar
field at the InstanceGroup level, allowing overriding of the
cluster-level choice in each InstanceGroup.

Introduce a new value for the field ("automatic") as equivalent to the
default value applied when the field is absent. Honoring this new
value allows disabling automatic updates at the cluster level, but
then enabling them again for particular InstanceGroups. Without such a
positive affirmation, it's not possible to override a cluster-level
"external" policy at the InstanceGroup level, as there's no way to
specify positively that you want to recover the default
value. Instead, expressing the explicit "automatic" value is clear and
unambiguous.
2021-03-05 08:53:07 -05:00
Kubernetes Prow Robot 83e1424280
Merge pull request #10957 from adrianmoisey/add_kubelet_arg_enable_cadvisor_json_endpoints
Add support for enable-cadvisor-json-endpoints with Kubelet
2021-03-02 23:47:19 -08:00
Adrian Moisey 9e18928fb3
Add support for enable-cadvisor-json-endpoints with Kubelet
Kubernetes 1.18 disables this by default.
For backwards compatibility with monitoring tools, it would be nice to
be able to re-enable this.

https://github.com/kubernetes/kubernetes/issues/68522
2021-03-03 09:06:06 +02:00
Peter Rifel bfd3d8a96b
Add new CPUCredits field to instance group spec 2021-03-01 23:01:20 -06:00
Kubernetes Prow Robot 1b42286cfe
Merge pull request #10832 from rifelpet/aws-sdk
Add Tagging to Instance Profiles and OIDC Providers
2021-02-24 05:40:50 -08:00