Commit Graph

5048 Commits (d9b75ed82bf5b80716d9d1c4682a725b165314b3)

Author SHA1 Message Date
Mik Vyatskov 4a7b3d7528 Make fluentd pods critical 2016-12-21 19:56:46 +01:00
deads2k 2e2a2e4b94 update gce for RBAC, controllers, proxy, kubelet (p1) 2016-12-21 13:51:49 -05:00
Mik Vyatskov a3940ba874 Add liveness probe for fluentd-gcp 2016-12-21 17:32:28 +01:00
Kubernetes Submit Queue ecd251b2b7 Merge pull request #39079 from jszczepkowski/ha-validation-fix
Automatic merge from submit-queue (batch tested with PRs 39061, 39079)

Fixed cluster validation: added -q flag to gcloud.

Fixed cluster validation in multi-zone mode: added -q flag to gcloud.
2016-12-21 07:26:42 -08:00
Kubernetes Submit Queue 45d2449f13 Merge pull request #39061 from xulike666/fix-typo-assistant
Automatic merge from submit-queue

Fix typo for federation/*

**What this PR does / why we need it**:
 Increase code readability for this new member in v1.5

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: 

**Special notes for your reviewer**: 
Could we develop a typo-fix bot along with a k8s terminology dictionary ? 

**Release note**:

```release-note
```
2016-12-21 07:07:29 -08:00
Wojciech Tyczynski 17e3063226 Extend logging in restore-from-backup script 2016-12-21 15:10:47 +01:00
Jerzy Szczepkowski 7a9ad66924 Fixed cluster validation: added -q and project flags to gcloud.
Fixed cluster validation in multi-zone mode: added -q and project flags to gcloud.
2016-12-21 14:13:14 +01:00
Aaron.L.Xu 3964aae385 revert some unwanted changes 2016-12-21 00:36:38 -08:00
Kubernetes Submit Queue d4bad94461 Merge pull request #36751 from sdminonne/libvirt_local_registry
Automatic merge from submit-queue

To add local registry to libvirt_coreos

`libvirt_coreos` is quick way to have a multi-node cluster on a linux laptop for development purpouse.
This PR adds local registry to libvirt_coreos cluster. Mind have a look?

@roberthbailey since you reviewed my last PR on dns for libvirt_coreos
2016-12-20 23:08:02 -08:00
Kubernetes Submit Queue e150a6e383 Merge pull request #38992 from bowei/remove-dns-exec-healthz
Automatic merge from submit-queue

Update reference to dns sidecar (was dnsmasq-metrics); remove exec-healthz

-The image path is wrong -- I am waiting for the CI to pass here before pushing to google_containers-
2016-12-20 17:32:50 -08:00
Bowei Du 4177639d34 Update reference to dns sidecar (was dnsmasq-metrics); remove exec-healthz
k8s-dns-sidecar --probe will be used to maintain a health check
of the DNS related daemons. This removes the need for exec-healthz.
2016-12-20 14:56:26 -08:00
deads2k 8360bc1a9f create kubelet client cert with correct group 2016-12-20 14:18:17 -05:00
Zihong Zheng 9eb2d073bf Adds kubernetes.io link for dns autoscaler addon 2016-12-20 10:43:24 -08:00
Mik Vyatskov 5105102940 Try parse golang logs by default 2016-12-20 17:31:13 +01:00
Aaron.L.Xu b3b9bcc04c fix typo for cluster/* 2016-12-20 04:56:45 -08:00
Wojciech Tyczynski 498a893fa3 Switch to etcd v3 API by default 2016-12-20 11:57:46 +01:00
Wojciech Tyczynski 76f115a8ee Bump etcd to 3.0.14 2016-12-20 11:57:45 +01:00
Kubernetes Submit Queue 149bb3059f Merge pull request #39010 from jszczepkowski/ha-validation-fix
Automatic merge from submit-queue (batch tested with PRs 37477, 39010)

Added extra logging in validate cluster.
2016-12-20 02:50:18 -08:00
Kubernetes Submit Queue 3994845f11 Merge pull request #33965 from euank/coreos-kube-up-now-with-less-cloud-init
Automatic merge from submit-queue

Coreos kube-up now with less cloud init

This update includes significant refactoring. It moves almost all of the
logic into bash scripts, modeled after the `gci` cluster scripts.

The reason to do this is:
1. Avoid duplicating the saltbase manifests by reusing gci's parsing logic (easier maintenance)
2. Take an incremental step towards sharing more code between gci/trusty/coreos, again for better maintenance
3. Pave the way for making future changes (e.g. improved rkt support, kubelet support) easier to share

The primary differences from the gci scripts are the following:
1. Use of the `/opt/kubernetes` directory over `/home/kubernetes`
2. Support for rkt as a runtime
3. No use of logrotate
4. No use of `/etc/default/`
5. No logic related to noexec mounts or gci-specific firewall-stuff

It will make sense to move 2 over to gci, as well as perhaps a few other small improvements. That will be a separate PR for ease of review.

Ref #29720, this is a part of that because it removes a copy of them.

Fixes #24165

cc @yifan-gu 

Since this logic largely duplicates logic from the gci folder, it would be nice if someone closely familiar with that gave an OK or made sure I didn't fall into any gotchas related to that, so cc @andyzheng0831
2016-12-20 01:13:45 -08:00
Jerzy Szczepkowski 134e91e379 Added extra logging in validate cluster.
Added extra logging in validate cluster to help debug HA e2e tests.
2016-12-20 09:48:26 +01:00
Kubernetes Submit Queue 8e888a7671 Merge pull request #38616 from shyamjvs/kubemark-gci-master
Automatic merge from submit-queue

Moved kubemark master from Debian to GCI

This PR fixes issue #37484
Kubemark master now runs on GCI instead of Debian, taking it one step closer to a real cluster master.
Primary changes:
1. changing master VM image/OS in kubemark's config-default.sh to debian
2. moving kubelet to systemd from supervisord
3. changing directory for cert/key/csv files from /srv/kubernetes to /etc/srv/kubernetes

cc @kubernetes/sig-scalability-misc  @wojtek-t @gmarek
2016-12-20 00:36:21 -08:00
Kubernetes Submit Queue 9925b68038 Merge pull request #36515 from apelisse/owners-cluster-juju
Automatic merge from submit-queue

Curating Owners: cluster/juju

cc @castrojo @mbruzek @chuckbutler @marcoceppi

In an effort to expand the existing pool of reviewers and establish a
two-tiered review process (first someone lgtms and then someone
experienced in the project approves), we are adding new reviewers to
existing owners files.


If You Care About the Process:
------------------------------

We did this by algorithmically figuring out who’s contributed code to
the project and in what directories.  Unfortunately, that doesn’t work
well: people that have made mechanical code changes (e.g change the
copyright header across all directories) end up as reviewers in lots of
places.

Instead of using pure commit data, we generated an excessively large
list of reviewers and pruned based on all time commit data, recent
commit data and review data (number of PRs commented on).

At this point we have a decent list of reviewers, but it needs one last
pass for fine tuning.

Also, see https://github.com/kubernetes/contrib/issues/1389.

TLDR:
-----

As an owner of a sig/directory and a leader of the project, here’s what
we need from you:

1. Use PR https://github.com/kubernetes/kubernetes/pull/35715 as an example.

2. The pull-request is made editable, please edit the `OWNERS` file to
remove the names of people that shouldn't be reviewing code in the
future in the **reviewers** section. You probably do NOT need to modify
the **approvers** section. Names asre sorted by relevance, using some
secret statistics.

3. Notify me if you want some OWNERS file to be removed.  Being an
approver or reviewer of a parent directory makes you a reviewer/approver
of the subdirectories too, so not all OWNERS files may be necessary.

4. Please use ALIAS if you want to use the same list of people over and
over again (don't hesitate to ask me for help, or use the pull-request
above as an example)
2016-12-19 14:46:43 -08:00
Kubernetes Submit Queue def8022729 Merge pull request #37100 from apatil/master
Automatic merge from submit-queue

Adding NAMESPACE to elasticsearch pod environment from downward API

**What this PR does / why we need it**:

The elasticsearch cluster addon references the `NAMESPACE` environmental variable here: https://github.com/kubernetes/kubernetes/blob/master/cluster/addons/fluentd-elasticsearch/es-image/elasticsearch_logging_discovery.go#L56 but, on k8s 1.3.7 at least, it is not automatically set. This PR gets it from the downward API.

**Release note**:

```NONE
```
2016-12-19 09:38:42 -08:00
Shyam Jeedigunta 9051462497 Migrated kubemark master to GCI from Debian. 2016-12-19 13:51:56 +01:00
Kubernetes Submit Queue 2b0a1f2b11 Merge pull request #38945 from du2016/change-source-common
Automatic merge from submit-queue

common.sh should load before kube-down/kube-up function called

#38921 common.sh should load before kube-down/kube-up function called,now it load in  kube-down/kube-up function,so can't find verify-kube-binaries command
2016-12-19 02:35:25 -08:00
Kubernetes Submit Queue 16f7cd189c Merge pull request #38394 from xiang90/fix_rollback
Automatic merge from submit-queue

rollback: use 237 wal pkg

/cc @wojtek-t @mml
2016-12-19 00:30:21 -08:00
du2016 39a25edb71 common.sh should load before kube-down/kube-up function called 2016-12-19 02:50:33 -05:00
Salvatore Dario Minonne 3e1b88800e adding local registry to libvirt_coreos 2016-12-19 07:51:46 +01:00
Euan Kemp 028a0140d0 cluster/coreos: delete mounter
We don't use this bit of gci currently.
2016-12-17 21:36:32 -08:00
Euan Kemp 13afe18ab4 cluster/coreos: update to gci based implementation
This update includes significant refactoring. It moves almost all of the
logic into bash scripts, modeled after the `gci` cluster scripts.

The primary differences between the two are the following:
1. Use of the `/opt/kubernetes` directory over `/home/kubernetes`
2. Support for rkt as a runtime
3. No use of logrotate
4. No use of `/etc/default/`
5. No logic related to noexec mounts or gci-specific firewall-stuff
2016-12-17 21:36:31 -08:00
Euan Kemp e2644bb442 cluster/gce: copy gci -> coreos
This is for reviewing ease as the following commits introduce changes
to make the coreos kube-up deployment share significant code with the
gci code.
2016-12-17 21:36:30 -08:00
Lucas Käldström 3c5b5f5963 Remove all MAINTAINER statements in the codebase as they aren't very useful and now deprecated 2016-12-17 20:34:10 +02:00
Kubernetes Submit Queue a4577e70ab Merge pull request #38808 from du2016/change-heapster-version
Automatic merge from submit-queue (batch tested with PRs 38906, 38808)

change the version in the yaml file

change the version in heapster-controller.yaml with image version
2016-12-17 00:41:24 -08:00
Kubernetes Submit Queue f45fa0b76e Merge pull request #38906 from euank/coreos-owners
Automatic merge from submit-queue

cluster/gce/coreos: add OWNERS

See #33965 for context.

The code in `cluster/gce/coreos` has mostly been written/maintained by @yifan-gu and myself thusfar, so I added our names to the owner list.

@ethernetdan has also volunteered as well (thanks!).

**Release note**:
```release-note
NONE
```

cc @roberthbailey
2016-12-17 00:22:54 -08:00
Kubernetes Submit Queue 699964c972 Merge pull request #38836 from bprashanth/kubelet_critical
Automatic merge from submit-queue

Admit critical pods in the kubelet

Haven't verified in a live cluster yet, just unittested, so applying do-not-merge label.
2016-12-16 17:21:46 -08:00
Xiang Li b6939b288a rollback: use 237 wal pkg 2016-12-16 16:27:25 -08:00
Euan Kemp 9a8c6ac41e cluster/gce/coreos: add OWNERS 2016-12-16 14:08:54 -08:00
Kubernetes Submit Queue e3c6ab1c8f Merge pull request #35582 from surajssd/use-daemonset-registry-proxy
Automatic merge from submit-queue

Use daemonset in docker registry add on

When using registry add on with kubernetes cluster it will be right to use `daemonset` to bring up a pod on each node of cluster, right now the docs suggests to bring up a pod on each node manually by dropping the pod manifests into directory `/etc/kubernetes/manifests`.
2016-12-16 12:29:46 -08:00
Kubernetes Submit Queue 46e5f21676 Merge pull request #38730 from ixdy/download-kube-binaries-if-needed
Automatic merge from submit-queue

Automatically download missing kube binaries in kube-up/kube-down.

**What this PR does / why we need it**: some users extract `kubernetes.tar.gz` and then immediately call `cluster/kube-up.sh` without first calling the new `cluster/get-kube-binaries.sh` script. As a result, the cluster fails to start, but it's not immediately clear why binaries are missing.

This PR streamlines this workflow by detecting this condition and prompting the user to download necessary binaries (using `cluster/get-kube-binaries.sh`).

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #38725

cc @arun-gupta @christian-posta
2016-12-16 10:07:22 -08:00
Kubernetes Submit Queue 1eb9176455 Merge pull request #38814 from jszczepkowski/ha-validation-fix
Automatic merge from submit-queue

Fixed infinite loop in cluster validation.
2016-12-16 08:06:14 -08:00
Jerzy Szczepkowski 3dbfa94798 Fixed infinite loop in cluster validation.
Fixed infinite loop in cluster validation when getting nodes failed.
2016-12-16 12:07:26 +01:00
Kubernetes Submit Queue aa454ec740 Merge pull request #37215 from shashidharatd/fed-ci
Automatic merge from submit-queue

[Federation][init-11.2] use USE_KUBEFED env var to choose bw old and new federation deployment

This is continuation of #35961
USE_KUBEFED variable is used for deploying federation control plane. if not defined, federation will be brought up using old method i.e scripts.

Have verified that federation comes up using the old method, using following steps
```
$ export FEDERATION=true
$ export E2E_ZONES="asia-east1-c"
$ export FEDERATION_PUSH_REPO_BASE=gcr.io/<my-project>
$ KUBE_RELEASE_RUN_TESTS=n KUBE_FASTBUILD=true go run hack/e2e.go -v -build
$ build-tools/push-federation-images.sh
$ go run hack/e2e.go -v --up
```
Should merge #35961 before this PR

@madhusudancs
2016-12-16 00:33:35 -08:00
Madhusudan.C.S 5a7644c502 [Federation][init-11] Switch federation e2e tests to use the new federation control plane bootstrap via the `kubefed init` command. 2016-12-16 11:22:44 +05:30
bprashanth 4fff49bb93 Make kube-proxy a critical pod 2016-12-15 18:58:13 -08:00
Piotr Szczesniak c00e57789d Added upgrade story from manifest pod to ds 2016-12-15 13:48:32 +01:00
Piotr Szczesniak a52637f09f Migrated fluentd to daemon set 2016-12-15 13:48:32 +01:00
du2016 90e2c31fa7 change the version in the yaml file 2016-12-15 07:14:19 -05:00
Patrick Baxter c8115baa48 cluster/images/hyperkube: add jq for some volume plugins 2016-12-14 16:16:02 -08:00
Jeff Grafton 27d096d27d Rename build-tools/ back to build/ 2016-12-14 13:42:15 -08:00
Kubernetes Submit Queue 14e7b85b18 Merge pull request #38213 from Crassirostris/fluentd-gcp-logging-loop
Automatic merge from submit-queue (batch tested with PRs 38760, 38213)

Avoid exporting fluentd-gcp own logs

To prevent fluentd from exporting its own logs, redirect the output to a file. Ability to read fluentd logs remains, but because these logs will not be exported, we can increase the verbosity of these logs.

Same change should be made for fluentd-es image.

CC @piosz
2016-12-14 07:09:48 -08:00
Kubernetes Submit Queue 6c627eaeb1 Merge pull request #38760 from jszczepkowski/ha-validation-fix
Automatic merge from submit-queue

Fixed region in cluster validation.
2016-12-14 07:05:02 -08:00
Suraj Deshmukh 9afdfa2b74 Use daemonset in docker registry add on
Using daemonset to bring up a pod on each node of cluster,
right now the docs suggests to bring up a pod on each node by
manually dropping the pod manifests into directory /etc/kubernetes/manifests.
2016-12-14 19:22:03 +05:30
Mik Vyatskov e52c3e77e2 Avoid exporting fluentd-gcp own logs 2016-12-14 14:43:05 +01:00
Jerzy Szczepkowski 512c06c267 Fixed region in cluster validation.
Fixed region in cluster validation.
2016-12-14 14:34:47 +01:00
Kubernetes Submit Queue 911d10654c Merge pull request #38638 from madhusudancs/fed-bootstrap-e2e-logs-firewall
Automatic merge from submit-queue

Use the cluster name in the names of the firewall rules that allow cluster-internal traffic to disambiguate the rules belonging to different clusters.

Also dropping the network name from these firewall rule names.

Network name was used to disambiguate firewall rules in a given network.
However, since two clusters cannot share a name in a GCE project, this
sufficiently disambiguates the firewall rule names. A potential confusion
arises when someone tries to create a firewall rule with the same name
in a different network, but that's also an indication that they shouldn't
be doing that.


@jszczepkowski due to PR #33094
@ixdy for test-infra

cc @kubernetes/sig-federation @nikhiljindal
2016-12-13 22:07:04 -08:00
Kubernetes Submit Queue 92dae03816 Merge pull request #38726 from MrHohn/kube-dns-rename2
Automatic merge from submit-queue (batch tested with PRs 38727, 38726, 38347, 38348)

Second pass of renaming kube-dns configure files

Continue work of #38523.

Not sure why cluster/centos/deployAddons.sh was omitted in previous PR. Also deletes the non-use `DNS_REPLICAS` var and changes `-rc` suffix in hack/local-up-cluster.sh.

@thockin @bowei @deads2k
2016-12-13 17:31:49 -08:00
Zihong Zheng 7921764b0f Second pass of renaming kube-dns configure files 2016-12-13 15:16:34 -08:00
Jeff Grafton cbee65a6d2 Automatically download missing kube binaries in kube-up/kube-down. 2016-12-13 14:59:13 -08:00
Amey Deshpande 5ec42e6a25 Ensure the GCI metadata files do not have whitespace at the end
Fixes #36708
2016-12-13 13:41:54 -08:00
Kubernetes Submit Queue a9c5f67509 Merge pull request #38668 from bprashanth/glbc_version
Automatic merge from submit-queue

Bump glbc version, cleanup test

Matches https://github.com/kubernetes/ingress/pull/55
2016-12-13 13:27:01 -08:00
Madhusudan.C.S 174856509e Dropping the network name from the internal master and node firewall rules.
Network name was used to disambiguate firewall rules in a given network.
However, since two clusters cannot share a name in a GCE project, this
sufficiently disambiguates the firewall rule names. A potential confusion
arises when someone tries to create a firewall rule with the same name
in a different network, but that's also an indication that they shouldn't
be doing that.
2016-12-13 11:21:14 -08:00
Kubernetes Submit Queue 18d05c7d56 Merge pull request #38640 from mtaufen/gci-version-env
Automatic merge from submit-queue

Allow GCI_VERSION to come from env

This is to facilitate GCI tip vs. K8s tip testing; we need to
dynamically set the version of GCI to stay current with their
latest canary (latest of the "gci-base" prefixed images).
2016-12-13 09:54:45 -08:00
Kubernetes Submit Queue 765700da3b Merge pull request #38661 from calebamiles/wip-remove-karlkfi
Automatic merge from submit-queue

cluster/mesos lives in the incubator now

**What this PR does / why we need it**:

Removes `cluster/mesos` which has been subsumed by https://github.com/kubernetes-incubator/kube-mesos-framework. As `@karlkfi` is the only maintainer listed in an `OWNERS` file and taking into account https://github.com/kubernetes/kubernetes/issues/38392, this code is dead and should be removed.

**Release note**:

 `NONE`
2016-12-13 07:30:51 -08:00
Kubernetes Submit Queue bb41d7706f Merge pull request #38695 from jszczepkowski/ha-validation-fix
Automatic merge from submit-queue

Fixed validation of multizone cluster for GCE.

```release-note
Fixed validation of multizone cluster for GCE
```

Fixed validation of multizone cluster for GCE: taking actual number of worker nodes.
2016-12-13 06:49:19 -08:00
Jerzy Szczepkowski 0f60aba7c1 Fixed validation of multizone cluster for GCE.
Fixed validation of multizone cluster for GCE: taking actual number of worker nodes.
2016-12-13 14:13:44 +01:00
Kubernetes Submit Queue 527d502b9a Merge pull request #38617 from jszczepkowski/multizone-fix
Automatic merge from submit-queue

Fixed detection of master during creation of multizone nodes cluster.

```release-note
Fixed detection of master during creation of multizone nodes cluster by kube-up.
```

Fixed detection of master during creation of multizone nodes cluster by kube-up.
2016-12-13 02:54:32 -08:00
bprashanth e4302a2b41 Bump up glbc version 2016-12-12 19:08:37 -08:00
caleb miles ea5d43504a Remove cluster/mesos.
The only person listed in cluster/mesos/docker/OWNERS has left the
project according to https://github.com/kubernetes/kubernetes/issues/38392
and the work to run Kubernetes as a Mesos framework has now been
[incubated](https://github.com/kubernetes-incubator/kube-mesos-framework).
Cleaning out the cruft from the main tree.
2016-12-12 16:44:14 -08:00
Kubernetes Submit Queue d766e397e2 Merge pull request #36514 from apelisse/owners-cluster-vagrant
Automatic merge from submit-queue

Curating Owners: cluster/vagrant

cc @derekwaynecarr

In an effort to expand the existing pool of reviewers and establish a
two-tiered review process (first someone lgtms and then someone
experienced in the project approves), we are adding new reviewers to
existing owners files.


If You Care About the Process:
------------------------------

We did this by algorithmically figuring out who’s contributed code to
the project and in what directories.  Unfortunately, that doesn’t work
well: people that have made mechanical code changes (e.g change the
copyright header across all directories) end up as reviewers in lots of
places.

Instead of using pure commit data, we generated an excessively large
list of reviewers and pruned based on all time commit data, recent
commit data and review data (number of PRs commented on).

At this point we have a decent list of reviewers, but it needs one last
pass for fine tuning.

Also, see https://github.com/kubernetes/contrib/issues/1389.

TLDR:
-----

As an owner of a sig/directory and a leader of the project, here’s what
we need from you:

1. Use PR https://github.com/kubernetes/kubernetes/pull/35715 as an example.

2. The pull-request is made editable, please edit the `OWNERS` file to
remove the names of people that shouldn't be reviewing code in the
future in the **reviewers** section. You probably do NOT need to modify
the **approvers** section. Names asre sorted by relevance, using some
secret statistics.

3. Notify me if you want some OWNERS file to be removed.  Being an
approver or reviewer of a parent directory makes you a reviewer/approver
of the subdirectories too, so not all OWNERS files may be necessary.

4. Please use ALIAS if you want to use the same list of people over and
over again (don't hesitate to ask me for help, or use the pull-request
above as an example)
2016-12-12 16:44:12 -08:00
Zach Loafman 3e8598373a cluster/aws: Clean up dhcp-options
After adding the aws janitor, the thing we're consistently sweeping is
the DhcpOptionSets created by cluster/aws/util.sh (and there were
thousands on the first run). Fix it!
2016-12-12 14:18:47 -08:00
Michael Taufen fe4552057e Allow GCI_VERSION to come from env
This is to facilitate GCI tip vs. K8s tip testing; we need to
dynamically set the version of GCI to stay current with their
latest canary (latest of the "gci-base" prefixed images).
2016-12-12 11:19:56 -08:00
Madhusudan.C.S d92cf4df5e Use the cluster name in the names of the firewall rules that allow cluster-internal traffic to disambiguate the rules belonging to different clusters. 2016-12-12 10:58:53 -08:00
Jerzy Szczepkowski b01e3c1e17 Fixed detection of master during creation of multizone nodes.
Fixed detection of master during creation of multizone nodes.
2016-12-12 15:46:39 +01:00
Kubernetes Submit Queue 37cd01dc8c Merge pull request #38438 from MrHohn/addon-manager-coreos
Automatic merge from submit-queue

Keeps addon manager yamls in sync

From #38437.

We should have kept all addon manager YAML files in sync. This does not fix the release scripts issue, but we should still have this.

@mikedanese @ixdy
2016-12-11 11:41:35 -08:00
Kubernetes Submit Queue d8c925319a Merge pull request #38523 from MrHohn/kube-dns-rename
Automatic merge from submit-queue (batch tested with PRs 38058, 38523)

Renames kube-dns configure files from skydns* to kubedns*

`skydns-` prefix and `-rc` suffix are confusing and misleading. Renaming it to `kubedns` in existing yaml files and scripts.

@bowei @thockin
2016-12-10 17:04:53 -08:00
Kubernetes Submit Queue c2aaac9178 Merge pull request #34002 from xiaoping378/fix-broken-cluster/centos4
Automatic merge from submit-queue

fix broken cluster/centos and enhance the style

replace the PR #33818
2016-12-09 17:50:30 -08:00
Kubernetes Submit Queue 9e3fc8de9e Merge pull request #36050 from linux-on-ibm-z/master
Automatic merge from submit-queue (batch tested with PRs 37860, 38429, 38451, 36050, 38463)

[Part 2] Adding s390x cross-compilation support for gcr.io images in this repo

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**What this PR does / why we need it**: This PR enables s390x support to kube-dns , pause, addon-manager, etcd, hyperkube, kube-discovery etc. This PR also includes the changes due to which it can be cross compiled on x86 host architecture.

**Which issue this PR fixes #34328

**Special notes for your reviewer**:  In existing file "build-tools/build-image/cross/Dockerfile" the repository mentioned for installing cross build tool chains for supporting architecture does not have a tool chain for s390x hence in my PR I am changing the repository so that it will be cross compiled for s390x.

**Release note**:
<!--  Steps to write your release note:
1. Use the release-note-* labels to set the release note state (if you have access) 
2. Enter your extended release note in the below block; leaving it blank means using the PR title as the release note. If no release note is required, just write `NONE`. 
-->
```
Allows cross compilation of Kubernetes on x86 host for s390x also enables s390x support to kube-dns , pause, addon-manager, etcd, hyperkube, kube-discovery etc  
```
2016-12-09 13:22:18 -08:00
Kubernetes Submit Queue e6050f1865 Merge pull request #36692 from ikatson/fix-osx-hyperkube-packaging
Automatic merge from submit-queue

Fix OSX hyperkube packaging with updated "mktemp -d" usage

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**What this PR does / why we need it**:

Before this patch, the ```make release``` command does not finish successfully. The reason is the ```kube::release::package_hyperkube``` can't succeed, because the usage of ```mktemp -d``` needs to be updated for OSX version of ```mktemp```

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, #<issue_number>, ...)` format, will close that issue when PR gets merged)*:
didn't find any existing issues

**Special notes for your reviewer**:

**Release note**:
<!--  Steps to write your release note:
1. Use the release-note-* labels to set the release note state (if you have access) 
2. Enter your extended release note in the below block; leaving it blank means using the PR title as the release note. If no release note is required, just write `NONE`. 
-->
```release-note
```
The PR title sounds good enough for the release note
2016-12-09 10:49:41 -08:00
Kubernetes Submit Queue 3d47fcc8ac Merge pull request #38286 from Crassirostris/fluentd-es-logging-loop
Automatic merge from submit-queue

Avoid exporting fluentd-es own logs

Follow-up of https://github.com/kubernetes/kubernetes/pull/38213 for fluentd-es version

CC @piosz
2016-12-09 05:27:05 -08:00
gajju26 70b92aab45 PR-2 Making docker images availabe for s390x on gcr.io repository and enables s390x support to kube-dns , pause, addon-manager, etcd, hyperkube, kube-discovery modules 2016-12-09 14:38:02 +05:30
Kubernetes Submit Queue 7ab35e2a2f Merge pull request #38397 from hoffin/master
Automatic merge from submit-queue

Correct docs

<!--  Thanks for sending a pull request!  Here are some tips for you:
1. If this is your first time, read our contributor guidelines https://github.com/kubernetes/kubernetes/blob/master/CONTRIBUTING.md and developer guide https://github.com/kubernetes/kubernetes/blob/master/docs/devel/development.md
2. If you want *faster* PR reviews, read how: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/faster_reviews.md
3. Follow the instructions for writing a release note: https://github.com/kubernetes/kubernetes/blob/master/docs/devel/pull-requests.md#release-notes
-->

**What this PR does / why we need it**:
There was a change to the registry-proxy but the documentaiton wasn't completely updated to reflect change made.

**Which issue this PR fixes** *(optional, in `fixes #<issue number>(, fixes #<issue_number>, ...)` format, will close that issue when PR gets merged)*: fixes #
Linked to [contribute deis/registry-proxy as a replacement for kube-registry-proxy](https://github.com/kubernetes/kubernetes/pull/35797)

**Special notes for your reviewer**:
First time contributing.
**Release note**:
<!--  Steps to write your release note:
1. Use the release-note-* labels to set the release note state (if you have access) 
2. Enter your extended release note in the below block; leaving it blank means using the PR title as the release note. If no release note is required, just write `NONE`. 
-->
```release-note
Updated the kube-registry-proxy readme example.
```
2016-12-08 22:49:20 -08:00
Kubernetes Submit Queue bb8958a0d8 Merge pull request #38432 from timstclair/cvm-bump
Automatic merge from submit-queue (batch tested with PRs 38432, 36887, 38415)

Bump Container VM to latest version

- Enables kernel softlockup detection (for https://github.com/kubernetes/kubernetes/issues/37853)
- Removes iSCSI support

```release-note
Bump GCE debian image to container-vm-v20161208 ([release notes](https://cloud.google.com/compute/docs/containers/container_vms#changelog))
```
2016-12-08 20:37:53 -08:00
Zihong Zheng 4ad06df18f Renames kube-dns configure files from skydns* to kubedns* 2016-12-08 20:01:19 -08:00
Zihong Zheng 95910cc40b Keeps addon manager yamls in sync 2016-12-08 19:54:14 -08:00
Kubernetes Submit Queue 7a1e8133e8 Merge pull request #38316 from alejandroEsc/ae/fix2
Automatic merge from submit-queue (batch tested with PRs 36736, 35956, 35655, 37713, 38316)

Ae/fix2

**What this PR does / why we need it**: Fixes some kubelet typos

**Release note**:
`None`
2016-12-08 19:52:00 -08:00
Tim St. Clair 759e9f5370
Bump Container VM to latest version
- Enables kernel softlockup detection
- Removes iSCSI support
2016-12-08 18:25:18 -08:00
OTSUKA, Yuanying d5e039c947 Remove needless env var in OpenStack provider
Since `TENANT_NAME` is unique if we use keystone v2 api,
so `TENANT_ID` is not needed if `TENANT_NAME` is provided
to configure OpenStack provider.
And also to set `TENANT_ID` is annoying to develop, because
`TENANT_ID` is not static by each environment.
This patch remove dependency of `TENANT_ID` and simply use
`TENANT_NAME`.
2016-12-09 11:09:58 +09:00
xiaoping378 ae1c0e6d38 fix broken cluster/centos and enhance the style
run hack/verify-boilerplate.sh, fix the Copyright
2016-12-09 09:55:52 +08:00
Kubernetes Submit Queue 1a3d2e50a4 Merge pull request #36419 from zreigz/translate-published-version
Automatic merge from submit-queue (batch tested with PRs 36419, 38330, 37718, 38244, 38375)

Translate a published version like 'release/stable' to version number

This PR adds new functionality to `cluster/get-kube.sh` script. It translates a published version like 'release/stable' to version number.

 Fixes: https://github.com/kubernetes/kubernetes/issues/35351
2016-12-08 17:13:53 -08:00
Igor Katson 5758039059 Cross-platform "mktemp" in hyperkube makefile.
Before this change, make failed on OSX.
2016-12-08 13:17:00 -08:00
David Michael bfba2f0e6c Correct docs
Updated kube-registry-proxy example to match functionality of proxy.
2016-12-08 18:16:45 +00:00
Lukasz Zajaczkowski 0ea13c6495 Translate a published version like 'release/stable' to version number 2016-12-08 09:11:56 +01:00
Kubernetes Submit Queue 1b30c411f3 Merge pull request #36626 from chentao1596/ubuntu-install-change-attr
Automatic merge from submit-queue

kubelet-run-parameter: change config to pod-manifest-path

What this PR does / why we need it:
     "--config" will be removed in a future version of kubelet, in order to prevent failure in the new version, use "pod-manifest-path" instead of it
2016-12-07 23:59:33 -08:00
Kubernetes Submit Queue aa8a03ef07 Merge pull request #35797 from bacongobbler/registry-proxy
Automatic merge from submit-queue (batch tested with PRs 32663, 35797)

contribute deis/registry-proxy as a replacement for kube-registry-proxy

This PR is a proposal to replace the `kube-registry-proxy` addon code with [deis/registry-proxy](https://github.com/deis/registry-proxy). We have been running this component in production for several months ([since Workflow v2.3.0](15d4c1c298/workflow-v2.3.0/tpl/deis-registry-proxy-daemon.yaml)) without any issues.

There are several benefits that this proxy provides over the current implementation:
- it's the same code that is provided in [docker/distribution's contrib dir](https://github.com/docker/distribution/tree/master/contrib/compose) which I have personally used for both Docker v1 and v2 engine deployments without any issues
- the ability to [disable old Docker clients](https://github.com/deis/registry-proxy/blob/master/rootfs/etc/nginx/conf.d/default.conf.in#L19-L23) that are incompatible with the v2 registry
- better default connection timeouts, using best practices from the Docker community as a whole
- workarounds for bugs like https://github.com/docker/docker/issues/1486 (see https://github.com/deis/registry-proxy/blob/master/rootfs/etc/nginx/conf.d/default.conf.in#L15-L16)

Things that this PR differs from the current implementation:
- it's not HAProxy.

I'm not sure how the release process goes for this component, but I bumped the version to v0.4 and changed the maintainer to myself considering this is a massive overhaul. Please let me know if this is acceptable as a replacement or if we should perhaps consider this as an alternative implementation.

Happy Friday!
2016-12-07 21:59:11 -08:00
Kubernetes Submit Queue 7f2622e668 Merge pull request #32663 from anguslees/extraroutes
Automatic merge from submit-queue

openstack: Implement the `Routes` provider API

``` release-note

Implement the Routes provider API for OpenStack using Neutron extraroute extension.  This removes the need for flannel/etc where supported.  To use, ensure all your nodes are on the same Neutron (private) network and specify the router ID in new `[Route]` section of provider config:

    [Route]
    router-id = <router UUID>
```
2016-12-07 21:36:13 -08:00
Kubernetes Submit Queue 258971002f Merge pull request #37850 from MrHohn/gke-dns-autoscale
Automatic merge from submit-queue (batch tested with PRs 37092, 37850)

Turns on dns horizontal scaling tests for GKE

Seems like the dns-autoscaler is already enabled in [this recent gke build](https://k8s-gubernator.appspot.com/build/kubernetes-jenkins/logs/ci-kubernetes-e2e-gci-gke/769/).
Turning on the corresponding e2e tests to increase test coverage.

Probably better to wait for this fix #37261 to go in first.

@bowei @bprashanth 
cc @maisem @roberthbailey
2016-12-07 18:13:11 -08:00
Zihong Zheng 69dc74bab3 Turns on dns horizontal scaling tests for GKE 2016-12-07 16:05:22 -08:00
Euan Kemp b8d2099b3f cluster: bindmount more cert paths
/etc/ssl/certs is currently mounted through in a number of places.
However, on Gentoo and CoreOS (and probably others), the files in
/etc/ssl/certs are just symlinks to files in /usr/share/ca-certificates.

For these components to correclty work, the target of the symlinks needs
to be available as well.

This is especially important for kube-controller-manager, where this
issue was noticed.

This change was originally part of #33965, but was split out for ease of
review.
2016-12-07 15:21:53 -08:00
Kubernetes Submit Queue debed6fa56 Merge pull request #38318 from MrHohn/dns-autoscale-doc
Automatic merge from submit-queue

Adds docs for dns-horizontal-autoscaler and kube-dns

Although we have separate docs on kubernetes.io, we should have a short description about the dns-horizontal-autoscaler addon in folder.

Also updates kube-dns README with example command to scale kube-dns Deployment. This is needed because Addon Manager v6 has stricter reconcile behavior.

@bowei @bprashanth @thockin
2016-12-07 14:22:21 -08:00
Kubernetes Submit Queue cafba0b94e Merge pull request #38291 from justinsb/fix_38920
Automatic merge from submit-queue (batch tested with PRs 36543, 38189, 38289, 38291, 36724)

kube-up: Only specify ETCD_QUORUM_READ if non-empty
2016-12-07 11:40:19 -08:00