Commit Graph

4508 Commits (19b5ca791c23adf6cce0175f241ab57e6cac2501)

Author SHA1 Message Date
Kubernetes Submit Queue d631d8e751 Merge pull request #34004 from wojtek-t/all_versions_in_etcd_image
Automatic merge from submit-queue

Grab different etcd versions in etcd image.

Ref #20504

@timothysc
2016-10-08 16:28:36 -07:00
Kubernetes Submit Queue c2299e403a Merge pull request #31736 from chuckbutler/dont-bootstrap-on-tests
Automatic merge from submit-queue

Juju automated charm testing shouldn't bootstrap

**What this PR does / why we need it**:


**Special notes for your reviewer**: This controls the tooling around our test automation. This is a low impact change to the k8s codebase, that will have a big impact on our CI infrastructure.

**Release note**:

```release-note
release-note-none
```

Juju bootstrapping is an act of cost. This should be an explicit action
by the tooling surrounding bundle-tester when testing a charm. Setting
bootstrap:false will allow us to get faster feedback at lower cost when
running the kubernetes charm under ci.
2016-10-08 13:12:42 -07:00
Kubernetes Submit Queue d79af8cb35 Merge pull request #33701 from ixdy/get-kube-binaries-script
Automatic merge from submit-queue

Create a get-kube-binaries script to download client/server tarballs

**What this PR does / why we need it**:
One step towards removing all server and client binary tarballs from the kubernetes.tar.gz release tarball.

If someone uses `cluster/get-kube.sh` (or https://get.k8s.io, which needs to be synced), this will automatically download the necessary client and server tarballs as part of the flow, though as of right now this will largely be a no-op. (When we remove the client/server binaries, it will have more of an effect.)

I've opted to put this script inside the release tarball (rather than in get-kube.sh), since each release probably has a better idea which platforms/architectures/etc it supports.

Further improvements would probably include omitting downloading the server tarball entirely unless needed, but this seems like a reasonable first step.

This also fixes some errors in get-kube.sh, and remove client architectures we don't officially support.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #
x-ref #28629 and #28435

**Special notes for your reviewer**
Assigning to Tim semi-arbitrarily for now, but please reassign as you feel appropriate.

**Release note**:
We probably don't need a release note yet. We'll definitely want one when we remove the server and client binaries.

cc @jbeda @luxas @david-mcmahon @zmerlynn @gajju26
2016-10-07 19:12:21 -07:00
Kubernetes Submit Queue e19e78916c Merge pull request #31727 from mbruzek/remove-storage-plugin
Automatic merge from submit-queue

Removing the Storage plugin from the juju cluster master.json manifest file

**What this PR does / why we need it**: The Juju cluster fails to bring up the apiserver. Using the docker logs I see the API server complaining about a fatal error.
```
F0830 17:04:16.922997       1 plugins.go:143] Unknown admission plugin: DefaultStorageClass
```

**Which issue this PR fixes** : fixes #31726

**Special notes for your reviewer**: This is specifically for the Juju cluster provider.

**Release note**:
```
release-note-none
```
2016-10-07 17:56:09 -07:00
Kubernetes Submit Queue 8bcb85685e Merge pull request #34156 from adityakali/gci
Automatic merge from submit-queue

Update GCI_VERSION to gci-dev-55-8866-0-0

Update GCI base image:

Change log:
* Built-in kubernetes updated to v1.4.0
* Enabled VXLAN and IP_SET config options in kernel to support some networking tools
* OpenSSL CVE fixes

```release-note
Update GCI base image:
* Enabled VXLAN and IP_SET config options in kernel to support some networking tools (ebtools)
* OpenSSL CVE fixes
```

cc/ @kubernetes/goog-image cc/ @dchen1107
2016-10-07 16:35:20 -07:00
Jeff Grafton 74991aa81d Create a get-kube-binaries script to download client/server tarballs
Also fix some errors in get-kube.sh, and remove client architectures we
don't officially support.
2016-10-07 16:01:27 -07:00
Wojciech Tyczynski 5c91ac664a Grab different etcd versions in etcd image. 2016-10-07 10:56:47 +02:00
Kubernetes Submit Queue 86c322e014 Merge pull request #33520 from vishh/33444
Automatic merge from submit-queue

Nodefs becomes imagefs on GCI

Kubelet cannot identify rootfs correctly
For #33444

```release-note
Enforce Disk based pod eviction with GCI base image in Kubelet
```

Signed-off-by: Vishnu kannan <vishnuk@google.com>
2016-10-06 17:37:33 -07:00
Aditya Kali 11397e0f6d Update GCI_VERSION to gci-dev-55-8866-0-0
Changelog:
* Built-in kubernetes updated to v1.4.0
* Enabled VXLAN and IP_SET config options in kernel to support some networking tools
* OpenSSL CVE fixes
2016-10-06 15:43:29 -07:00
Kubernetes Submit Queue 63139f937c Merge pull request #30787 from jbeda/rsync
Automatic merge from submit-queue

Speed up dockerized builds

This PR speeds up dockerized builds.  First, we make sure that we are as incremental as possible.  The bigger change is that now we use rsync to move sources into the container and get data back out.

To do yet:
* [x] Add a random password to rsync.  This is 128bit MD4, but it is better than nothing.
* [x] Lock down rsync to only come from the host.
* [x] Deal with remote docker engines -- this should be necessary for docker-machine on the mac.
* [x] Allow users to specify the port for the rsync daemon.  Perhaps randomize this or let docker pick an ephemeral port and detect the port?
* [x] Copy back generated files so that users can check them in.  This is done for `zz_generated.*` files generated by `make generated_files` 
  * [x] This should include generated proto files so that we can remove the hack-o-rama that is `hack/hack/update-*-dockerized.sh` 
* [x] Start "versioning" the build container and the data container so that the CI system doesn't have to be manually kicked.
* [x] Get some benchmarks to qualify how much faster.

This replaces #28518 and is related to #30600.

cc @thockin @spxtr @david-mcmahon @MHBauer 

Benchmarks by running `make clean ; sync ; time bash -xc 'time build/make-build-image.sh ; time sync ; time build/run.sh make ; time sync; time build/run.sh make'` on a GCE n1-standard-8 with PD-SSD.

| setup | build image | sync | first build | sync | second build | total |
|-------|-------------|----- |----------|------|--------------|------|
| baseline | 0m11.420s | 0m0.812s | 7m2.353s | 0m42.380s | 7m8.381s | 15m5.348s |
| this pr | 0m10.977s | 0m15.168s | 7m31.096s | 1m55.692s | 0m16.514s | 10m9.449s |
2016-10-05 19:51:09 -07:00
Kubernetes Submit Queue 7766b408b8 Merge pull request #31467 from vmware/fix-vsphere-cloud-provider.kerneltime
Automatic merge from submit-queue

Add support for vpshere cloud provider in kubeup

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**What this PR does / why we need it**:
vSphere cloud provider added in 1.3 was not configured when deploying via kubeup

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #

**Special notes for your reviewer**:

**Release note**:
<!--  Steps to write your release note:
1. Use the release-note-* labels to set the release note state (if you have access) 
2. Enter your extended release note in the below block; leaving it blank means using the PR title as the release note. If no release note is required, just write `NONE`. 
-->
```release-note
Add support for vSphere Cloud Provider when deploying via kubeup on vSphere.
```

When deploying on vSphere using kube up add configuration
for vSphere cloud provider.
2016-10-05 19:12:17 -07:00
Kubernetes Submit Queue cccd3b3234 Merge pull request #33147 from vishh/fix-upgrade-sh
Automatic merge from submit-queue

Fix base image pinning during upgrades via cluster/gce/upgrade.sh

Fixes #33056

cc @timstclair @maisem
2016-10-05 01:19:56 -07:00
Kubernetes Submit Queue 457d3785de Merge pull request #33862 from luxas/remove_experimental_flannel
Automatic merge from submit-queue

Remove the flannel experimental overlay

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**What this PR does / why we need it**:

It removes the deprecated flannel overlay integration in kubelet.
It's completely unnecessary now with CNI which can handle everything smoothly when flannel is running in a daemonset.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #17795, #30589

cc @kubernetes/sig-network @thockin @freehan @bprashanth @yujuhong @dchen1107
2016-10-04 21:39:20 -07:00
bprashanth 99957d2ae1 Add netexec 1.7 to whitelists 2016-10-04 14:47:33 -07:00
Lucas Käldström 950e23740b Remove the old flannel network mode in kube-up 2016-10-04 12:02:25 +03:00
Joe Beda 17454a04ac Remove support for boot2docker 2016-10-03 19:42:20 -07:00
Kubernetes Submit Queue fac54c9b22 Merge pull request #33963 from ixdy/etcd-firewall-rule-delete
Automatic merge from submit-queue

Fix condition for deleting master etcd firewall rule

Fix tiny bug in #33094.

cc @fgrzadkowski @jszczepkowski
2016-10-03 16:58:24 -07:00
Jeff Grafton ca42d7f016 Fix condition for deleting master etcd firewall rule 2016-10-03 12:40:47 -07:00
Davanum Srinivas 0304eed1af Fix URL in README
Fixes #33888
2016-10-03 15:15:45 -04:00
Kubernetes Submit Queue 8d9642e2a2 Merge pull request #33094 from jszczepkowski/ha-firewall2
Automatic merge from submit-queue

HA master: add firewall rule for etcd cluster.
2016-10-03 03:17:20 -07:00
Kubernetes Submit Queue da79e44b2e Merge pull request #33280 from bprashanth/glbc_version_bump
Automatic merge from submit-queue

Bump glbc version to 0.8.0

Picks up k8s.io godeps for v1.4 thereby fixing an int overflow bug in the upstream delayed-workqueue pkg. Without this the controller spams logs with retries in the "soft error" case, which is easy to come by when users eg: create ingresses that point to non-exist services. 

Should go into 1.4.1, because 1.4.0 is pretty much out at this point. 
https://github.com/kubernetes/kubernetes/issues/33279
2016-10-01 02:01:49 -07:00
Kubernetes Submit Queue 20e764ab5d Merge pull request #33848 from mtaufen/fix-configure-helper
Automatic merge from submit-queue

Correct env var name in configure-helper
2016-09-30 14:54:13 -07:00
Lucas Käldström a10a2d9f67 Remove flannel because now everything here is upstreamed; multiarch is a thing for official flannel now 2016-09-30 23:13:04 +03:00
Michael Taufen edcf97db1d Change --bind to -B for consistency 2016-09-30 10:59:47 -07:00
Michael Taufen 73b64e6da5 Correct env var name in configure-helper
The variable should be KUBEPROXY_TEST_ARGS, not KUBE_PROXY_TEST_ARGS.
2016-09-30 10:56:08 -07:00
Jerzy Szczepkowski b8cbac6753 HA master: add firewall rule for etcd cluster.
HA master: add firewall rule for accessing & securing etcd cluster.
2016-09-30 14:37:08 +02:00
Kubernetes Submit Queue 1ebf6e1acf Merge pull request #33829 from gmarek/stop
Automatic merge from submit-queue

Add a script to "stop" GKE cluster creation

Fix #33749
2016-09-30 05:25:29 -07:00
gmarek 0f25d5526f Add a script to "stop" GKE cluster creation 2016-09-30 13:42:48 +02:00
Kubernetes Submit Queue b71def750f Merge pull request #33774 from MrHohn/kubedns-graceful
Automatic merge from submit-queue

Bump up addon kube-dns to v20 for graceful termination

Below images are built and pushed:
- gcr.io/google_containers/kubedns-amd64:1.8
- gcr.io/google_containers/kubedns-arm:1.8
- gcr.io/google_containers/kubedns-arm64:1.8
- gcr.io/google_containers/kubedns-ppc64le:1.8

Both kubedns and dnsmasq are bumped up in the manifest files.

@thockin @bprashanth
2016-09-30 00:15:13 -07:00
Kubernetes Submit Queue f595eede2d Merge pull request #33802 from euank/the-number-of-the-spaces-shall-be-2
Automatic merge from submit-queue

cluster/gci: Minor spacing tweak

Two shall be the number thou shalt indent, and the level of the indent
shall be two. Three shalt thou not indent, neither indent thou once,
excepting that thou then proceed to two. Five is right out.

/cc @andyzheng0831 @jlowdermilk
2016-09-29 23:37:23 -07:00
MrHohn 3e55d4d6bd Bump up addon kube-dns to v20 for graceful termination 2016-09-29 18:09:20 -07:00
Euan Kemp 527932e6ad cluster/gci: Minor spacing tweak
Two shall be the number thou shalt indent, and the level of the indent
shall be two. Three shalt thou not indent, neither indent thou once,
excepting that thou then proceed to two. Five is right out.
2016-09-29 16:27:35 -07:00
Euan Kemp 22b6fd893a gce/coreos: Fix dnsmasq image name
This bug was inadvertently introduced in #32406.

The longer term plan (shouldn't be too much longer) is to remove this
file entirely and rely on the `gci-trusty` version of it, but to stop
some bleeding and allow our jenkins using kube-up + coreos to work, we
should merge this fix until we have the more complete solution.
2016-09-29 14:44:10 -07:00
deads2k 06b1a9636d promote contrib/mesos to incubator 2016-09-28 10:58:09 -04:00
Kubernetes Submit Queue 05b7ee2bee Merge pull request #33556 from wojtek-t/build_etcd_image
Automatic merge from submit-queue

Allow building experimenta etcd images

Ref #20504

Once this PR is in, I would like to build and push: "etcd:3.0.10-experimental" image to:
- start testing it
- to make it possible to build a different "3.0.10" image in the future (we will most probably built in some loging into it.

@lavalamp - FYI
2016-09-28 03:39:29 -07:00
Wojciech Tyczynski bd60e9d19c Allow building experimenta etcd images 2016-09-28 07:44:34 +02:00
Joe Beda 1b1806af56 Add jbeda to OWNERS for build, cluster, hack 2016-09-27 14:53:16 -07:00
Kubernetes Submit Queue 15daecea7f Merge pull request #33551 from wojtek-t/etcd3_in_kubemark
Automatic merge from submit-queue

Make it possible to set etcd version in kubemark
2016-09-27 05:37:59 -07:00
Kubernetes Submit Queue 9e4ba1866b Merge pull request #33146 from MrHohn/kubedns-readiness
Automatic merge from submit-queue

Tune down initialDelaySeconds for readinessProbe.

Fixed #33053.

Tuned down the `initialDelaySeconds`(original 30s) for readiness probe to 3 seconds and `periodSeconds`(default 10s) to 5 seconds to shorten the initial time before a dns server pod being exposed. This configuration passed DNS e2e tests and did not even hit any readiness failure(for kube-dns) with a GCE cluster with 4 nodes during the experiments.

For scaling out kube-dns servers, it took less than 10s for servers being exposed after they appeared as running, which is much faster than 30+s(the original cost).

`failureThreshold` is left as default(3) and it would not lead to restart because the status of readiness probe would only affect whether endpoints being exposed in service or not(in the dns service point of view). According to the implementation of [prober](https://github.com/kubernetes/kubernetes/blob/master/pkg/kubelet/prober/worker.go), the number of retries for readiness probe is unbounded. Hence there is no obvious effect if the readiness probe fail several times in the beginning. 

The state machine of prober could be illustrated with below figure:

![drawing](https://cloud.githubusercontent.com/assets/8681801/18693503/fb4466dc-7f56-11e6-8671-0a14c4835d24.jpeg)

I want to see the e2e result of this PR for further evaluation.

@thockin @bprashanth
2016-09-27 05:02:39 -07:00
Wojciech Tyczynski 8abf3c1600 Make it possible to set etcd version in kubemark 2016-09-27 13:13:29 +02:00
Kubernetes Submit Queue 869af8f5a1 Merge pull request #33437 from justinsb/typo_incremeting
Automatic merge from submit-queue

Fix typo: incremeting -> incrementing
2016-09-26 22:30:22 -07:00
Kubernetes Submit Queue 5e9bb641e1 Merge pull request #32808 from justinsb/kubelet_restart_forever
Automatic merge from submit-queue

salt: Don't stop trying to start kubelet
2016-09-26 22:30:16 -07:00
Vishnu kannan e7633d8328 nodefs becomes imagefs on GCI since kubelet cannot identify rootfs correctly
Signed-off-by: Vishnu kannan <vishnuk@google.com>
2016-09-26 15:27:49 -07:00
gmarek f7d0615e2b Wait until master IP is visible 2016-09-26 15:56:31 +02:00
Kubernetes Submit Queue 5fe2495588 Merge pull request #33122 from ixdy/upgrade-debugging
Automatic merge from submit-queue

Print a more helpful error message when failing to start rolling-updates

Hopefully this will help us track down where the 1.3 -> 1.4 upgrades are breaking down. We'll need to cherry-pick this into release-1.4 to have any effect, though.
2016-09-26 00:35:05 -07:00
MrHohn 55db76241c Tune down initialDelaySeconds for readinessProbe 2016-09-25 12:48:19 -07:00
Kubernetes Submit Queue b79c99da1b Merge pull request #32406 from MrHohn/kubedns-healthz
Automatic merge from submit-queue

Split dns healthcheck into two different urls

Attempt to fix #30633.

<s>This new kube-dns pod template creates two exechealthz processes listen on two different ports for kubedns and dnsmasq correspondingly. 

@thockin @girishkalele
2016-09-25 12:21:34 -07:00
Justin Santa Barbara a6dfaffe3f Fix typo: incremeting -> incrementing 2016-09-24 16:10:51 -04:00
Kubernetes Submit Queue 55830471ba Merge pull request #33353 from vishh/gci-default
Automatic merge from submit-queue

Switch k8s on GCE to use GCI by default
2016-09-23 17:25:35 -07:00
Kubernetes Submit Queue 1834039960 Merge pull request #32203 from dgoodwin/kubediscovery
Automatic merge from submit-queue

Alpha JWS Discovery API for locating an apiserver securely

This PR contains an early alpha prototype of the JWS discovery API outlined in proposal #30707.

CA certificate, API endpoints, and the token to be used to authenticate to this discovery API are currently passed in as secrets. If the caller provides a valid token ID, a JWS signed blob of ClusterInfo containing the API endpoints and the CA cert to use will be returned to the caller. This is used by the alpha kubeadm to allow seamless, very quick cluster setup with simple commands well suited for copy paste.

Current TODO list:

- [x] Allow the use of arbitrary strings as token ID/token, we're currently treating them as raw keys.
- [x] Integrate the building of the pod container, move to cluster/images/kube-discovery.
  - [x] Build for: amd64, arm, arm64 and ppc64le. (just replace GOARCH=)
  - [x] Rename to gcr.io/google_containers/kube-discovery-ARCH:1.0
  - [x] Cleanup rogue files in discovery sub-dir.
  - [x] Move pkg/discovery/ to cmd/discovery/app.

There is additional pending work to return a kubeconfig rather than ClusterInfo, however I believe this is slated for post-alpha.
2016-09-23 08:19:19 -07:00