Commit Graph

42018 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
12f8466459 Merge pull request #100267 from Jeffwan/support_arbitratry_resources
Expose resources overrides and maxPods conf in kubemark
2021-04-08 20:29:12 -07:00
Kubernetes Prow Robot
50b0211233 Merge pull request #100245 from mengjiao-liu/Update-broken-links
Update `PodSpec.Overhead` broken links
2021-04-08 20:29:03 -07:00
Kubernetes Prow Robot
42a4953c6e Merge pull request #100186 from yangjunmyfm192085/run-test28
test: fix the error case of TestAuthenticationValidate
2021-04-08 20:28:34 -07:00
Kubernetes Prow Robot
4a3e1b90c7 Merge pull request #100175 from changshuchao/testcase_utils
test case for pkg/kubelet/cri/remote/utils.go
2021-04-08 20:28:22 -07:00
Kubernetes Prow Robot
b15859b301 Merge pull request #100100 from maxlaverse/fix_pv_provisioning
fix rounding of volume storage requests
2021-04-08 17:12:04 -07:00
Kubernetes Prow Robot
611a2d9d54 Merge pull request #100088 from yangjunmyfm192085/run-test27
Fix TestGetNodeAddresses function error.
2021-04-08 17:11:56 -07:00
Kubernetes Prow Robot
39fb6282be Merge pull request #100068 from chendave/validation
Update comments for the resource weight of `RequestedToCapacityRatio` plugin
2021-04-08 17:11:31 -07:00
Kubernetes Prow Robot
f72410d4c6 Merge pull request #100067 from changshuchao/testcase_status
Add test case for state.go
2021-04-08 17:11:21 -07:00
Kubernetes Prow Robot
2b89558a1f Merge pull request #100051 from tanjing2020/nodeaffinity
implement EnqueueExtensions interface in nodeaffinity
2021-04-08 17:11:13 -07:00
Kubernetes Prow Robot
7cd73076a2 Merge pull request #100049 from Huang-Wei/basic-check-prior-to-enq
sched: support PreEnqueueChecks prior to moving Pods
2021-04-08 17:11:04 -07:00
Kubernetes Prow Robot
2159f967b4 Merge pull request #100020 from pravarag/interpodaffinity-schedule-plugin
implement EnqueueExtensions in interPodAffinity
2021-04-08 17:10:38 -07:00
Kubernetes Prow Robot
d0510aae37 Merge pull request #100004 from KofClubs/implement-EventsToRegister-nodeports
Implemented EnqueueExtensions interface for NodePorts
2021-04-08 17:10:30 -07:00
Kubernetes Prow Robot
0172cbf56c Merge pull request #99963 from alculquicondor/job_complete_active
Remove active pods past completions
2021-04-08 17:10:10 -07:00
Kubernetes Prow Robot
10ed4502f4 Merge pull request #99937 from wzshiming/fea/enq-nodelabel
Implement EnqueueExtensions interface in nodelabel
2021-04-08 16:00:51 -07:00
Kubernetes Prow Robot
adbf279bf1 Merge pull request #99936 from pacoxu/feature/taint-schedule-plugin
implement EnqueueExtensions interface in taint toleration scheduling
2021-04-08 16:00:43 -07:00
Kubernetes Prow Robot
bb0906dcb2 Merge pull request #99929 from lala123912/lint_clean
Remove unused/dead code
2021-04-08 16:00:34 -07:00
Kubernetes Prow Robot
7807bb03ba Merge pull request #99849 from jpbetz/apply-subresources
Add subresource apply support to client-go
2021-04-08 16:00:00 -07:00
Kubernetes Prow Robot
4fae6ae5d2 Merge pull request #99839 from saschagrunert/portforward-stream-cleanup
Cleanup portforward streams after their usage
2021-04-08 15:59:51 -07:00
Kubernetes Prow Robot
52e42d3ca7 Merge pull request #99702 from wzshiming/fix/http-probe
Fix HTTPProbe initialize header
2021-04-08 15:59:09 -07:00
Kubernetes Prow Robot
669016067d Merge pull request #99566 from huchengze/patch-6
migrate log in pkg/volume/volume_linux.go
2021-04-08 14:28:43 -07:00
Kubernetes Prow Robot
26fba1403b Merge pull request #99528 from pandaamanda/apiserver_validation_code_optimization
fix log message and optimize log format check logic
2021-04-08 14:28:34 -07:00
Kubernetes Prow Robot
86fdf7b56e Merge pull request #99487 from chymy/fix-staticcheck0226
Fix staticcheck failures for pkg/controller/replicaset and pkg/kubelet/dockershim
2021-04-08 14:28:17 -07:00
Kubernetes Prow Robot
016d1c1072 Merge pull request #99278 from yangjunmyfm192085/run-test21
Fix incorrect use of  klog.ErrorS
2021-04-08 14:27:58 -07:00
Kubernetes Prow Robot
6409ec97e8 Merge pull request #99165 from danielamlins/test_validate_network_policy_refactor
TestValidateNetworkPolicy refactor
2021-04-08 14:27:49 -07:00
Kubernetes Prow Robot
e7dc0df323 Merge pull request #97650 from ialidzhikov/cleanup/redundant-imports
Clean up some redundant imports
2021-04-08 14:27:22 -07:00
Kubernetes Prow Robot
4c9e55a44f Merge pull request #93260 from nckturner/return-true-for-enabled-ecr-provider
Fix ECR provider startup latency
2021-04-08 14:26:55 -07:00
David Eads
443e4ea0df include description of what kube-root-ca.crt can be used to verify 2021-04-08 10:43:41 -04:00
卢振兴10069964
9e96fe77e8 code cleanup for validation.go 2021-04-08 20:14:33 +08:00
yuzhiquan
76b68a19d7 implement register events for PodTopologySpread 2021-04-08 09:14:34 +08:00
Jack Francis
5a43067915 respect ExecProbeTimeout 2021-04-07 12:38:19 -07:00
Antonio Ojea
ef76be37de kube-proxy network programming latency on restarts
kube-proxy expose the metric network_programming_duration_seconds,
that is defined as the time it takes to program the network since
a a service or pod has changed. It uses an annotation on the endpoints
/endpointslices to calculate when the endpoint was created, however,
on restarts, kube-proxy process all the endpoints again, no matter
when those were generated, polluting the metrics.

To be safe, kube-proxy will estimate the latency only for those
endpoints that were generated after it started.
2021-04-07 19:19:02 +02:00
Bowei Du
89ebf47640 Update IP address validation message to include IPv6
Adds unit test

Change-Id: I08c46f68b164e1ea82bf40f8a1316dfc1e95a6fb
2021-04-07 08:45:29 -07:00
Monis Khan
bca4993004 Update auth OWNERS files to only use aliases
Signed-off-by: Monis Khan <mok@vmware.com>
2021-04-07 10:46:03 -04:00
卢振兴10069964
98d4bdb5d7 improve the readability of log 2021-04-07 15:10:05 +08:00
Pravar Agrawal
2cf284994f implement EnqueueExtensions in interPodAffinity 2021-04-07 08:43:49 +05:30
Mengjiao Liu
5fa7f288ce Fix nil pointer dereference by changing code order 2021-04-07 10:29:53 +08:00
Sergey Kanzhelev
4b05fe6644 podUnknown is marked as Obsolete 2021-04-06 22:43:08 +00:00
Monis Khan
5dd4c89df3 oidc authenticator: allow passing in CA via bytes
This change updates the OIDC authenticator code to use a subset of
the dynamiccertificates.CAContentProvider interface to provide the
root CA bytes.  This removes the hard dependency on a file based CA
and makes it easier to use this code as a library.

Signed-off-by: Monis Khan <mok@vmware.com>
2021-04-06 15:46:00 -04:00
Jefftree
94cf48a2d1 Promote SSA GA 2021-04-06 10:04:56 -07:00
Christian Huffman
8efa9e2f6c Updated generated dependencies 2021-04-05 16:06:17 -04:00
Christian Huffman
3bcf407d2f Addresses nitpicks for FSGroupPolicy 2021-04-05 15:45:40 -04:00
Joe Betz
29423501f0 Add apply subresource support to client-go's typed client 2021-04-05 12:27:42 -07:00
Antonio Ojea
1e1c4c5ac9 add node handlers to the metaproxier 2021-04-05 02:05:18 +02:00
chen zechun
d16d57b7d1 fix delete duplicate logs 2021-04-02 16:18:47 +08:00
dabaooline
a03db16c5f make clear PodConfigNotification's type 2021-04-01 18:53:16 +08:00
Laila Kassar
a5fdad260f Update pkg/volume/azure_file/azure_provision.go
Co-authored-by: Shiming Zhang <wzshiming@foxmail.com>
2021-03-31 22:54:21 -05:00
Mike Danese
724e760721 clarify RBAC API documentation
(Resource|Verb)All are meaningless in the context of openapi spec. I saw
ResourceAll used in an RBAC policy.

Change-Id: I8ab5f230bed23be902f77cadee3fbcdec6b24064
2021-03-31 17:21:56 -07:00
Masashi Honma
d43b8dbf4e Use simpler expressions for error messages
1. Do not describe port type in message because lp.String() already has the
information.

2. Remove duplicate error detail from event log.
Previous log is like this.

47s         Warning   listen tcp4 :30764: socket: too many open files   node/127.0.0.1   can't open port "nodePort for default/temp-svc:834" (:30764/tcp4), skipping it: listen tcp4 :30764: socket: too many open files
2021-04-01 09:13:45 +09:00
Laila Kassar
7514ad4467 Normalize share name to not include capital letters 2021-03-31 23:52:36 +00:00
Masashi Honma
3266136c1d Fire an event when failing to open NodePort
[issue]
When creating a NodePort service with the kubectl create command, the NodePort
assignment may fail.

Failure to assign a NodePort can be simulated with the following malicious
command[1].

$ kubectl create service nodeport temp-svc --tcp=`python3 <<EOF
print("1", end="")
for i in range(2, 1026):
  print("," + str(i), end="")
EOF
`

The command succeeds and shows following output.

service/temp-svc created

The service has been successfully generated and can also be referenced with the
get command.

$ kubectl get svc
NAME         TYPE        CLUSTER-IP   EXTERNAL-IP   PORT(S)
temp-svc     NodePort    10.0.0.139   <none>        1:31335/TCP,2:32367/TCP,3:30263/TCP,(omitted),1023:31821/TCP,1024:32475/TCP,1025:30311/TCP   12s

The user does not recognize failure to assign a NodePort because
create/get/describe command does not show any error. This is the issue.

[solution]
Users can notice errors by looking at the kube-proxy logs, but it may be difficult to see the kube-proxy logs of all nodes.

E0327 08:50:10.216571  660960 proxier.go:1286] "can't open port, skipping this nodePort" err="listen tcp4 :30641: socket: too many open files" port="\"nodePort for default/temp-svc:744\" (:30641/tcp4)"
E0327 08:50:10.216611  660960 proxier.go:1286] "can't open port, skipping this nodePort" err="listen tcp4 :30827: socket: too many open files" port="\"nodePort for default/temp-svc:857\" (:30827/tcp4)"
...
E0327 08:50:10.217119  660960 proxier.go:1286] "can't open port, skipping this nodePort" err="listen tcp4 :32484: socket: too many open files" port="\"nodePort for default/temp-svc:805\" (:32484/tcp4)"
E0327 08:50:10.217293  660960 proxier.go:1612] "Failed to execute iptables-restore" err="pipe2: too many open files ()"
I0327 08:50:10.217341  660960 proxier.go:1615] "Closing local ports after iptables-restore failure"

So, this patch will fire an event when NodePort assignment fails.
In fact, when the externalIP assignment fails, it is also notified by event.

The event will be displayed like this.

$ kubectl get event
LAST SEEN   TYPE      REASON                                            OBJECT           MESSAGE
...
2s          Warning   listen tcp4 :31055: socket: too many open files   node/127.0.0.1   can't open "nodePort for default/temp-svc:901" (:31055/tcp4), skipping this nodePort: listen tcp4 :31055: socket: too many open files
2s          Warning   listen tcp4 :31422: socket: too many open files   node/127.0.0.1   can't open "nodePort for default/temp-svc:474" (:31422/tcp4), skipping this nodePort: listen tcp4 :31422: socket: too many open files
...

This PR fixes iptables and ipvs proxier.
Since userspace proxier does not seem to be affected by this issue, it is not fixed.

[1] Assume that fd limit is 1024(default).
$ ulimit -n
1024
2021-04-01 08:27:51 +09:00