Commit Graph

166 Commits

Author SHA1 Message Date
Marcin Wielgus
4c467e1017 Update underscore flag exceptions 2016-06-01 13:54:28 +02:00
Daniel Wang
3d95151971 Replace containervm with GCI as default master image for GCE clusters 2016-05-24 17:28:17 -05:00
Andy Zheng
f31c4f6d69 Revert "Revert "Add support for running GCI on the GCE cloud provider""
This reverts commit 40f53b1765.
2016-05-23 00:52:08 -07:00
Vishnu kannan
a64fe6572a satisfy flags check script by including a few files
Signed-off-by: Vishnu kannan <vishnuk@google.com>
2016-05-20 15:03:26 -07:00
mqliang
17d5a302bb make podcidr mask size configurable 2016-05-20 20:44:40 +08:00
chrislovecnm
98cafe64ac More updates to docker, including more env overrides. For example you can now set cluster name.
someone tell me if this is wrong, but I do not think "examples/cassandra/image/run.sh:    cluster_name \" should have been found
2016-05-18 17:03:46 -06:00
Wojciech Tyczynski
03268e44c0 Test storage upgrade to protobufs 2016-05-17 15:53:34 +02:00
k8s-merge-robot
f46f35a9df Merge pull request #23600 from mikedanese/addon-manager
Automatic merge from submit-queue

run kube-addon-manager in a static pod

Depends on https://github.com/kubernetes/kubernetes/pull/23605 and https://github.com/kubernetes/kubernetes/pull/24108

Ref #23233
2016-05-08 11:30:44 -07:00
Mike Danese
3e1c0b5951 run kube-addon-manager in a pod 2016-05-06 11:01:06 -07:00
Mikaël Cluseau
06900a934d Introduce subPath in VolumeMount 2016-05-06 15:08:41 +11:00
CJ Cullen
3253739505 Use ABAC authz instead of AllowAll. 2016-04-27 11:38:15 -07:00
k8s-merge-robot
3fa84134cd Merge pull request #24124 from vmware/photon-controller
Automatic merge from submit-queue

Initial kube-up support for VMware's Photon Controller

This is for: https://github.com/kubernetes/kubernetes/issues/24121

Photon Controller is an open-source cloud management platform. More
information is available at:
http://vmware.github.io/photon-controller/

This commit provides initial support for Photon Controller. The
following features are tested and working:
- kube-up and kube-down
- Basic pod and service management
- Networking within the Kubernetes cluster
- UI and DNS addons

It has been tested with a Kubernetes cluster of up to 10
nodes. Further work on scaling is planned for the near future.

Internally we have implemented continuous integration testing and will
run it multiple times per day against the Kubernetes master branch
once this is integrated so we can quickly react to problems.

A few things have not yet been implemented, but are planned:
- Support for kube-push
- Support for test-build-release, test-setup, test-teardown

Assuming this is accepted for inclusion, we will write documentation
for the kubernetes.io site.

We have included a script to help users configure Photon Controller
for use with Kubernetes. While not required, it will help some
users get started more quickly. It will be documented.

We are aware of the kube-deploy efforts and will track them and
support them as appropriate.
2016-04-27 01:02:03 -07:00
Alain Roy
fa9d79df75 Initial kube-up support for VMware's Photon Controller
This is for: https://github.com/kubernetes/kubernetes/issues/24121

Photon Controller is an open-source cloud management platform. More
information is available at:
http://vmware.github.io/photon-controller/

This commit provides initial support for Photon Controller. The
following features are tested and working:
- kube-up and kube-down
- Basic pod and service management
- Networking within the Kubernetes cluster
- UI and DNS addons

It has been tested with a Kubernetes cluster of up to 10
nodes. Further work on scaling is planned for the near future.

Internally we have implemented continuous integration testing and will
run it multiple times per day against the Kubernetes master branch
once this is integrated so we can quickly react to problems.

A few things have not yet been implemented, but are planned:
- Support for kube-push
- Support for test-build-release, test-setup, test-teardown

Assuming this is accepted for inclusion, we will write documentation
for the kubernetes.io site.

We have included a script to help users configure Photon Controller
for use with Kubernetes. While not required, it will help some
users get started more quickly. It will be documented.

We are aware of the kube-deploy efforts and will track them and
support them as appropriate.
2016-04-25 13:24:16 -07:00
CJ Cullen
760568796f Masquerade traffic from off-cluster going through kube-proxy. 2016-04-19 21:39:34 -07:00
Tim St. Clair
b0d3f32e88 Update test/e2e for test/e2e/framework refactoring 2016-04-13 10:50:17 -07:00
k8s-merge-robot
f8bb10b479 Merge pull request #22818 from andyzheng0831/enhance
Auto commit by PR queue bot
2016-03-23 16:19:31 -07:00
Andy Zheng
0a8e68fb49 Trusty: Avoid reaching GCE custom metadata size limit 2016-03-20 10:22:50 -07:00
Charles Butler
b8b54ac3cf Updating the flag exceptions list per CI instructions 2016-03-16 14:25:26 -04:00
Justin Santa Barbara
e0caa1e559 non_masquerade_cidr: verify-flags exception, salt syntax
Cope is non_masquerade_cidr value is empty; add exception for
verify-flags.
2016-03-15 11:05:55 -04:00
k8s-merge-robot
d869dd0121 Merge pull request #22357 from ncdc/job-hpa-update-storage-test
Auto commit by PR queue bot
2016-03-05 05:45:33 -08:00
Andy Goldstein
156c1f3c5d Test jobs/hpas in storage update 2016-03-04 17:05:39 -05:00
Andy Zheng
242b9977c7 Remove manifest copies from Trusty support
This change revises the way to provide kube-system manifests for clusters on Trusty. Originally, we maintained copies of some manifests under cluster/gce/trusty/kube-manifests, which is not scalable and hard to maintain. With this change, clusters on Trusty will use the same source of manifests as ContainerVM. This change also fixes some minor problems such as shell variables and comments to meet the style guidance better.
2016-03-04 11:16:49 -08:00
HAI HUANG
15ffe5746d added kubelet-api-servers flag to km scheduler 2016-03-02 08:18:58 -05:00
Joe Finney
eff5a9c14d Add cluster/log-dump.sh. 2016-03-01 17:13:18 -08:00
k8s-merge-robot
47986aa018 Merge pull request #21163 from pmorie/downward-api-e2e-time
Auto commit by PR queue bot
2016-02-25 03:08:44 -08:00
Jeff Lowdermilk
c406665b2b Plumb node labels through salt
Expose node-labels flag on kubelet for gce via a startup script
env var.
2016-02-22 15:31:34 -08:00
Prashanth Balasubramanian
2e8ff81de1 Teach the kubelet about --hairpin-mode=promiscuous-bridge. 2016-02-20 22:40:54 -08:00
Daniel Smith
a8b943dddd Revert "Put the container bridge in promiscuous mode." 2016-02-19 23:14:53 -08:00
Prashanth Balasubramanian
a694a7ae4b Teach the kubelet about --hairpin-mode=promiscuous-bridge. 2016-02-19 14:59:16 -08:00
Paul Morie
6cc1ba4158 Make downward API volume test run faster 2016-02-18 17:20:09 -05:00
Paul Morie
d1dc259ef2 ConfigMap volume source 2016-02-14 16:19:17 -05:00
Janet Kuo
2874f30c05 Enable Deployments by default 2016-02-12 12:29:14 -08:00
Marcin
b7d72ef36d Startup scripts for custom metrics 2016-02-10 12:32:04 +01:00
Justin Santa Barbara
899e61ef3c Update verify-flags exceptions 2016-02-07 11:11:38 -05:00
YuviPanda
1751bcf1e1 Update hack/verify-flags/exceptions.txt 2016-01-22 00:19:01 -08:00
Justin Santa Barbara
43cbfb74fe Ubernetes Lite GCE: Support multiple zones in GCE cloud provider
We adapt the existing code to work across all zones in a region.

We require a feature-flag to enable Ubernetes-Lite

Reasons:

* There are some behavioural changes if users create volumes with
the same name in two zones.
* We don't want to make one API call per zone if we're not running
Ubernetes-Lite.
* Ubernetes-Lite is still experimental.

There isn't a parallel flag implemented for AWS, because at the moment
there would be no behaviour changes from this.
2016-01-20 23:04:53 -05:00
Mike Danese
22cfa5ea7e build: move some of hack/lib/ into a new cluster/lib/
Some functionality in hack/lib is currently depended on by
cluster/common.sh so kube-up from the full release tar (which
does not include hack/) is currently broken. With this PR we
create cluster/lib/ and move the necessary bits from hack/
over to get kube-up working again.

Fixes: 96d1b8d1b2
Signed-off-by: Mike Danese <mikedanese@google.com>
2016-01-11 17:10:26 -08:00
Clayton Coleman
7edbe09e59 Add new known flags and sort them 2016-01-06 21:09:20 -05:00
Joe Finney
ca3524639d Add .md and .yaml exceptions to verify-flags-underscore.py.
Also removed duplicated exception checks for file extensions.
2015-12-07 16:33:27 -08:00
Joe Finney
47250d8b1b Add exception for hack/jenkins/README.md 2015-12-07 15:32:18 -08:00
Janet Kuo
8105aa44a0 Implement kubectl autoscale 2015-10-19 09:59:22 -07:00
Ananth Suryanarayana
d50d7763da Add opencontrail networking provisioning support in kubernetes salt based provisioning
OpenContrail is an open-source based networking software which provides virtualization support for the cloud.

This change-set adds ability to install and provision opencontrail software for networking in kubernetes based cloud environment.

There are basically 3 components

o kube-network-manager -- plugin between contrail components and kubernets components
o provision_master.sh -- OpenContrail software installer and provisioner in master node
o provision_minion.sh -- OpenContrail software installer and provisioner in minion node(s)

These are driven via salt configuration files

One can provision opencontrail by just setting "export NETWORK_PROVIDER=opencontrail"
Optionally, OPENCONTRAIL_TAG, and OPENCONTRAIL_KUBERNETES_TAG can be used to
specify opencontrail and contrail-kubernetes software versions to install and provision.

Public-IP Subnet provided by contrail can be configured via OPENCONTRAIL_PUBLIC_SUBNET
environment variable

At this moment, plan is to add support for aws, gce and vagrant based platforms

For more information on contrail-kubernetes, please visit https://github.com/juniper/contrail-kubernetes For more information on opencontrail, please visit http://www.opencontrail.org
2015-10-03 08:03:02 -07:00
liguangbo
12299087da Change Oom to OOM 2015-09-28 18:18:04 +08:00
nikhiljindal
ed5d24ed52 Allow enabling deployment controller on GCE and GKE 2015-09-24 11:37:16 -07:00
Jerzy Szczepkowski
5be8817315 Turning on pod autoscaler on GCE.
Implemented optional turning on of pod autoscaler in kube-up script for GCE.
2015-09-11 12:03:41 +02:00
Jeff Lowdermilk
08442974bb Revert "Turning on pod autoscaler on GCE." 2015-09-10 11:46:37 -07:00
Jerzy Szczepkowski
b41862b670 Turning on pod autoscaler on GCE.
Implemented optional turning on of pod autoscaler in kube-up script for GCE.
2015-09-10 16:10:01 +02:00
Maciej Szulik
08aae94dea Fixed passing RUNTIME_CONFIG flag, since currently it fails passing eg.
RUNTIME_CONFIG="experimental/v1=true" to the server.
2015-09-09 21:55:57 +02:00
Quinton Hoole
e4fbfa9777 Merge pull request #13025 from pires/example_elasticsearch
Revamped Elasticsearch example
2015-09-04 12:28:17 -07:00
Paulo Pires
0a64995b7b Revamped Elasticsearch example that now uses an Alpine Linux container with JRE 8u51 and Elasticsearch 1.7.1.
Replaced Go discovery mechanism for Elasticsearch discovery plug-in that supports Kubernetes.
2015-09-04 09:39:14 +01:00
qiaolei
d2a0f2b66f Fix a typo -cadvisor_port to --cadvisor-port
Where `-cadvisor_port` should be `--cadvisor-port`
2015-09-02 17:52:52 +00:00
Maciej Szulik
4caa5e80b1 Updated deprecated flags (address and port). Added an option to pass runtime-config. 2015-08-26 13:28:40 +02:00
Eric Paris
03f4e52812 Make verify-flags-underscore.py return error on failure
We were running it in shippable and travis, but since it didn't return
an error it wasn't actually catching things.
2015-08-24 22:12:17 -05:00
Eric Paris
ca310ffdac Sort output from hack/verify-flag-underscore.py
So we get some consistency and readability to the exceptions.txt
2015-08-17 11:32:18 -07:00
Eric Paris
b432f036db verify-flags-underscore.py: ignore juju variables 2015-08-17 11:19:32 -07:00
Eric Paris
f3fd2e1028 verify-flags-underscore.py: ignore if trailed by :
These are often yaml definitions, and thus not usages of kubernetes
flags.  Not necessarily always, but usually.
2015-08-17 11:19:32 -07:00
Eric Paris
d1ba0bb692 verify-flags-underscore.py: ignore salt grains 2015-08-17 11:19:31 -07:00
Eric Paris
d7f9477a94 verify-flags-underscore.py: exclude salt variable which look like flags 2015-08-17 11:19:31 -07:00
Eric Paris
7f96f9312b verify-flags-underscore.py: ignore 'flags' that look like bash variables
We ignore bad 'flags' if they are proceeded by $ or { as these are
likely bash variables and not in fact bad flag usage.
2015-08-17 11:19:31 -07:00
Eric Paris
c560f41a4b Update docs which were incorrectly using _ in flag names
Each of these was verified that the actual flag declaration correctly
used -
2015-08-17 11:18:43 -07:00
Eric Paris
68716c7712 verify-flags-underscore.py: Remove contrib/ exceptions
As contrib was removed.
2015-08-17 11:08:24 -07:00
Mike Danese
fa40ced8f8 move contrib/for-tests to test/images 2015-08-14 20:42:46 -07:00
Eric Paris
56f6ad0c01 Specifically exclude some flag definitions in verify-flag-underscore.sh
We know there are some flags (declared with an _) which we wish to
ignore. These flags are used by container definitions, e2e, etc. By
explicitly ignoring those flags we can cut the amount of noise in the
whitelist.
2015-08-14 14:11:02 -04:00
Eric Paris
30d34d0e59 Reduce false positives with verify-flag-underscore.sh by updating regex
Check to make sure there is not an alphanumeric character immeditely
before or after the 'flag'.  It there is an alphanumeric character then
this is obviously not actually the flag we care about.  For example if
the project declares a flag "valid-name" but the regex finds something
like "invalid_name" we should not match.  Clearly this "invalid_name" is
not actually a wrong usage of the "valid-name" flag.
2015-08-13 21:06:39 -04:00
Eric Paris
c6a5b43df1 Update flag-dash whitelist
PRs older than the verifier landed in HEAD.  So update the whitelist
2015-08-13 17:43:00 -04:00
Eric Paris
f54098fe00 Verify all flag usage does not use _
This works by defining two 'static' lists in hack. The first is the list
of all flags in the project which use a `-` or an `_` in their name. All
files being processed by verify-flags-underscore.py (or all files in the
repo if no filename arguments are given) will be searched for flag
declaration using a simple regex. Its not super smart. If a flag is
found which is not in the static list it will complain/reject the commit
until a human adds it to the list. If we do not keep a static list of
flags it takes >.2 seconds to find them 'all' at runtime. Since this is
run in pre-commit saving every part of a second helps.

After it finds all of the flags it runs all of the arguments (or all
files in repo if no arguments) looking for usage of those flags which
includes an `_`. There are lots of places where these are false
positives. For example we have a flag named oom-adj-score but the kernel
calls it oom_adj_score. To handle this we keep a second 'whitelist' of
lines which are allowed to use these flag names with an `_`.

Running the entire git repo looking for flags in every golang file and
looking in every single file for bad usage takes about 8.75 seconds.

Running it in the precommit hook where we only check things that changed
takes about .06 seconds.
2015-08-12 16:17:02 -04:00