- 18 Feb, 2021 2 commits
-
-
Hussein Galal authored
* Update to v1.20.4 Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com> * Update to v1.20.4 Signed-off-by:
galal-hussein <hussein.galal.ahmed.11@gmail.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> (cherry picked from commit 457daeadd63c2001e68488f4cb0a84ca7ef1c4db)
-
- 10 Feb, 2021 3 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
* Collect IPs from all pods before deciding to use internal or external addresses @Taloth correctly noted that the code that iterates over ServiceLB pods to collect IP addresses was failing to add additional internal IPs once the map contained ANY entry from a previous node. This may date back to when ServiceLB used a Deployment instead of a DaemonSet, so there was only ever a single pod. The new behavior is to collect all internal and external IPs, and then construct the address list of a single type - external if there are any, otherwise internal. https://github.com/k3s-io/k3s/issues/1652#issuecomment-774497788Signed-off-by:
Brad Davidson <brad.davidson@rancher.com> Co-authored-by:
Brian Downs <brian.downs@gmail.com>
-
Brad Davidson authored
* Improve handling of comounted cpu,cpuacct controllers Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 09 Feb, 2021 4 commits
-
-
Erik Wilson authored
Add opensuse 15 vagrant provision
-
Erik Wilson authored
-
Brad Davidson authored
* Add tests to clientaccess/token * Fix issues in clientaccess/token identified by tests * Update tests to close coverage gaps * Remove redundant check turned up by code coverage reports * Add warnings if CA hash will not be validated Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 08 Feb, 2021 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 06 Feb, 2021 1 commit
-
-
Brad Davidson authored
We also need to be more careful about setting the crictl.yaml path, as it doesn't have kubectl's nice behavior of checking multiple locations. It's not safe to assume that it's in the user's home data-dir just because we're not running as root. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 04 Feb, 2021 1 commit
-
-
Brad Davidson authored
* Update local-path-provisioner and helper busybox Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 03 Feb, 2021 5 commits
-
-
Akihiro Suda authored
Previously, k3s.service was failing when the EnvironmentFile does not exist: ``` Feb 02 17:17:30 suda-ws01 systemd[1]: k3s.service: Failed to load environment files: No such file or directory Feb 02 17:17:30 suda-ws01 systemd[1]: k3s.service: Failed to run 'start' task: No such file or directory Feb 02 17:17:30 suda-ws01 systemd[1]: k3s.service: Failed with result 'resources'. Feb 02 17:17:30 suda-ws01 systemd[1]: Failed to start Lightweight Kubernetes. ``` ref: https://unix.stackexchange.com/questions/404199/documentation-of-equals-minus-in-systemd-unit-filesSigned-off-by:
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 30 Jan, 2021 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 26 Jan, 2021 2 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Akihiro Suda authored
Fix issue 900 cgroup2 support was introduced in PR 2584, but got broken in f3de60ff It was failing with "F1210 19:13:37.305388 4955 server.go:181] cannot set feature gate SupportPodPidsLimit to false, feature is locked to true" Signed-off-by:
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
-
- 23 Jan, 2021 8 commits
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Akihiro Suda authored
Since a recent commit, rootless mode was failing with the following errors: ``` E0122 22:59:47.615567 21 kuberuntime_manager.go:755] createPodSandbox for pod "helm-install-traefik-wf8lc_kube-system(9de0a1b2-e2a2-4ea5-8fb6-22c9272a182f)" failed: rpc error: code = Unknown desc = failed to create network namespace for sandbox "285ab835609387f82d304bac1fefa5fb2a6c49a542a9921995d0c35d33c683d5": failed to setup netns: open /var/run/netns/cni-c628a228-651e-e03e-d27d-bb5e87281846: permission denied ... E0122 23:31:34.027814 21 pod_workers.go:191] Error syncing pod 1a77d21f-ff3d-4475-9749-224229ddc31a ("coredns-854c77959c-w4d7g_kube-system(1a77d21f-ff3d-4475-9749-224229ddc31a)"), skipping: failed to "CreatePodSandbox" for "coredns-854c77959c-w4d7g_kube-system(1a77d21f-ff3d-4475-9749-224229ddc31a)" with CreatePodSandboxError: "CreatePodSandbox for pod \"coredns-854c77959c-w4d7g_kube-system(1a77d21f-ff3d-4475-9749-224229ddc31a)\" failed: rpc error: code = Unknown desc = failed to create containerd task: io.containerd.runc.v2: create new shim socket: listen unix /run/containerd/s/8f0e40e11a69738407f1ebaf31ced3f08c29bb62022058813314fb004f93c422: bind: permission denied\n: exit status 1: unknown" ``` Remove symlinks to /run/{netns,containerd} so that rootless mode can create their own /run/{netns,containerd}. Signed-off-by:
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Yuriy authored
* Add functionality to bind custom IP address for Etcd metrics endpoint Signed-off-by:
yuriydzobak <yurii.dzobak@lotusflare.com>
-
Brad Davidson authored
* Replace k3s cloud provider wrangler controller with core node informer Upstream k8s has exposed an interface for cloud providers to access the cloud controller manager's node cache and shared informer since Kubernetes 1.9. This is used by all the other in-tree cloud providers; we should use it too instead of running a dedicated wrangler controller. Doing so also appears to fix an intermittent issue with the uninitialized taint not getting cleared on nodes in CI. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Brad Davidson authored
Also drop the rancher-mirrored sonobuoy image since CI has a pull-through image cache now. Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 21 Jan, 2021 2 commits
-
-
Brian Downs authored
* add ability to perform an etcd on-demand snapshot via cli
-
David Nuzik authored
mark k3s v1.20.2 as stable
-
- 20 Jan, 2021 2 commits
-
-
Waqar Ahmed authored
Problem: While using ZFS on debian and K3s with docker, I am unable to get k3s working as the snapshotter value is being validated and the validation fails. Solution: We should not validate snapshotter value if we are using docker as it's a no-op in that case. Signed-off-by:
Waqar Ahmed <waqarahmedjoyia@live.com>
-
Chin-Ya Huang authored
Signed-off-by:
Chin-Ya Huang <chin-ya.huang@suse.com>
-
- 15 Jan, 2021 1 commit
-
-
MonzElmasry authored
Signed-off-by:
MonzElmasry <menna.elmasry@rancher.com>
-
- 14 Jan, 2021 1 commit
-
-
Brad Davidson authored
Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
- 11 Jan, 2021 2 commits
-
-
Brad Davidson authored
* Update helm-controller to v0.8.3 * Update klipper-helm image Signed-off-by:
Brad Davidson <brad.davidson@rancher.com>
-
Erik Wilson authored
Bootstrap node password with local file
-
- 08 Jan, 2021 3 commits
-
-
Menna Elmasry authored
change etcd dir permission if it exists
-
MonzElmasry authored
Signed-off-by:
MonzElmasry <menna.elmasry@rancher.com>
-
JenTing Hsiao authored
Signed-off-by:
JenTing Hsiao <jenting.hsiao@suse.com>
-
- 05 Jan, 2021 1 commit
-
-
Erik Wilson authored
Add diagnostics collection
-