mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-07-27 05:27:21 +00:00
Remove the deprecated --babysit-daemons kubelet flag
This commit is contained in:
parent
b353700bfc
commit
2ee2ec5e21
@ -499,7 +499,6 @@ function start-kubelet {
|
|||||||
echo "Using kubelet binary at ${kubelet_bin}"
|
echo "Using kubelet binary at ${kubelet_bin}"
|
||||||
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
||||||
flags+=" --allow-privileged=true"
|
flags+=" --allow-privileged=true"
|
||||||
flags+=" --babysit-daemons=true"
|
|
||||||
flags+=" --cgroup-root=/"
|
flags+=" --cgroup-root=/"
|
||||||
flags+=" --cloud-provider=gce"
|
flags+=" --cloud-provider=gce"
|
||||||
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
||||||
|
@ -668,7 +668,6 @@ function start-kubelet {
|
|||||||
echo "Using kubelet binary at ${kubelet_bin}"
|
echo "Using kubelet binary at ${kubelet_bin}"
|
||||||
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
||||||
flags+=" --allow-privileged=true"
|
flags+=" --allow-privileged=true"
|
||||||
flags+=" --babysit-daemons=true"
|
|
||||||
flags+=" --cgroup-root=/"
|
flags+=" --cgroup-root=/"
|
||||||
flags+=" --cloud-provider=gce"
|
flags+=" --cloud-provider=gce"
|
||||||
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
||||||
|
@ -158,11 +158,6 @@
|
|||||||
{% set hairpin_mode = "--hairpin-mode=" + pillar['hairpin_mode'] -%}
|
{% set hairpin_mode = "--hairpin-mode=" + pillar['hairpin_mode'] -%}
|
||||||
{% endif -%}
|
{% endif -%}
|
||||||
|
|
||||||
{% set babysit_daemons = "" -%}
|
|
||||||
{% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce' ] %}
|
|
||||||
{% set babysit_daemons = "--babysit-daemons=true" -%}
|
|
||||||
{% endif -%}
|
|
||||||
|
|
||||||
{% set kubelet_port = "" -%}
|
{% set kubelet_port = "" -%}
|
||||||
{% if pillar['kubelet_port'] is defined -%}
|
{% if pillar['kubelet_port'] is defined -%}
|
||||||
{% set kubelet_port="--port=" + pillar['kubelet_port'] %}
|
{% set kubelet_port="--port=" + pillar['kubelet_port'] %}
|
||||||
@ -191,4 +186,4 @@
|
|||||||
{% set kubelet_auth = "--anonymous-auth=false --authorization-mode=Webhook --client-ca-file=" + pillar.get('ca_cert_bundle_path', '/var/lib/kubelet/ca.crt') %}
|
{% set kubelet_auth = "--anonymous-auth=false --authorization-mode=Webhook --client-ca-file=" + pillar.get('ca_cert_bundle_path', '/var/lib/kubelet/ca.crt') %}
|
||||||
|
|
||||||
# test_args has to be kept at the end, so they'll overwrite any prior configuration
|
# test_args has to be kept at the end, so they'll overwrite any prior configuration
|
||||||
DAEMON_ARGS="{{daemon_args}} {{api_servers_with_port}} {{debugging_handlers}} {{hostname_override}} {{cloud_provider}} {{cloud_config}} {{config}} {{manifest_url}} --allow-privileged={{pillar['allow_privileged']}} {{log_level}} {{cluster_dns}} {{cluster_domain}} {{docker_root}} {{kubelet_root}} {{non_masquerade_cidr}} {{cgroup_root}} {{system_container}} {{pod_cidr}} {{ master_kubelet_args }} {{cpu_cfs_quota}} {{network_plugin}} {{kubelet_port}} {{ hairpin_mode }} {{enable_custom_metrics}} {{runtime_container}} {{kubelet_container}} {{node_labels}} {{babysit_daemons}} {{eviction_hard}} {{kubelet_auth}} {{feature_gates}} {{test_args}}"
|
DAEMON_ARGS="{{daemon_args}} {{api_servers_with_port}} {{debugging_handlers}} {{hostname_override}} {{cloud_provider}} {{cloud_config}} {{config}} {{manifest_url}} --allow-privileged={{pillar['allow_privileged']}} {{log_level}} {{cluster_dns}} {{cluster_domain}} {{docker_root}} {{kubelet_root}} {{non_masquerade_cidr}} {{cgroup_root}} {{system_container}} {{pod_cidr}} {{ master_kubelet_args }} {{cpu_cfs_quota}} {{network_plugin}} {{kubelet_port}} {{ hairpin_mode }} {{enable_custom_metrics}} {{runtime_container}} {{kubelet_container}} {{node_labels}} {{eviction_hard}} {{kubelet_auth}} {{feature_gates}} {{test_args}}"
|
||||||
|
@ -259,8 +259,6 @@ func (c *kubeletConfiguration) addFlags(fs *pflag.FlagSet) {
|
|||||||
fs.StringVar(&c.RktStage1Image, "rkt-stage1-image", c.RktStage1Image, "image to use as stage1. Local paths and http/https URLs are supported. If empty, the 'stage1.aci' in the same directory as '--rkt-path' will be used.")
|
fs.StringVar(&c.RktStage1Image, "rkt-stage1-image", c.RktStage1Image, "image to use as stage1. Local paths and http/https URLs are supported. If empty, the 'stage1.aci' in the same directory as '--rkt-path' will be used.")
|
||||||
fs.MarkDeprecated("rkt-stage1-image", "Will be removed in a future version. The default stage1 image will be specified by the rkt configurations, see https://github.com/coreos/rkt/blob/master/Documentation/configuration.md for more details.")
|
fs.MarkDeprecated("rkt-stage1-image", "Will be removed in a future version. The default stage1 image will be specified by the rkt configurations, see https://github.com/coreos/rkt/blob/master/Documentation/configuration.md for more details.")
|
||||||
fs.StringVar(&c.HairpinMode, "hairpin-mode", c.HairpinMode, "How should the kubelet setup hairpin NAT. This allows endpoints of a Service to loadbalance back to themselves if they should try to access their own Service. Valid values are \"promiscuous-bridge\", \"hairpin-veth\" and \"none\".")
|
fs.StringVar(&c.HairpinMode, "hairpin-mode", c.HairpinMode, "How should the kubelet setup hairpin NAT. This allows endpoints of a Service to loadbalance back to themselves if they should try to access their own Service. Valid values are \"promiscuous-bridge\", \"hairpin-veth\" and \"none\".")
|
||||||
fs.BoolVar(&c.BabysitDaemons, "babysit-daemons", c.BabysitDaemons, "If true, the node has babysitter process monitoring docker and kubelet.")
|
|
||||||
fs.MarkDeprecated("babysit-daemons", "Will be removed in a future version.")
|
|
||||||
fs.Int32Var(&c.MaxPods, "max-pods", c.MaxPods, "Number of Pods that can run on this Kubelet.")
|
fs.Int32Var(&c.MaxPods, "max-pods", c.MaxPods, "Number of Pods that can run on this Kubelet.")
|
||||||
// TODO(#40229): Remove the docker-exec-handler flag.
|
// TODO(#40229): Remove the docker-exec-handler flag.
|
||||||
fs.StringVar(&c.DockerExecHandlerName, "docker-exec-handler", c.DockerExecHandlerName, "Handler to use when executing a command in a container. Valid values are 'native' and 'nsenter'.")
|
fs.StringVar(&c.DockerExecHandlerName, "docker-exec-handler", c.DockerExecHandlerName, "Handler to use when executing a command in a container. Valid values are 'native' and 'nsenter'.")
|
||||||
|
@ -62,7 +62,6 @@ auth-provider
|
|||||||
auth-provider-arg
|
auth-provider-arg
|
||||||
auth-provider-arg
|
auth-provider-arg
|
||||||
azure-container-registry-config
|
azure-container-registry-config
|
||||||
babysit-daemons
|
|
||||||
basic-auth-file
|
basic-auth-file
|
||||||
bench-pods
|
bench-pods
|
||||||
bench-quiet
|
bench-quiet
|
||||||
|
@ -406,8 +406,6 @@ type KubeletConfiguration struct {
|
|||||||
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
||||||
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
||||||
HairpinMode string
|
HairpinMode string
|
||||||
// The node has babysitter process monitoring docker and kubelet.
|
|
||||||
BabysitDaemons bool
|
|
||||||
// maxPods is the number of pods that can run on this Kubelet.
|
// maxPods is the number of pods that can run on this Kubelet.
|
||||||
MaxPods int32
|
MaxPods int32
|
||||||
// dockerExecHandlerName is the handler to use when executing a command
|
// dockerExecHandlerName is the handler to use when executing a command
|
||||||
|
@ -471,8 +471,6 @@ type KubeletConfiguration struct {
|
|||||||
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
||||||
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
||||||
HairpinMode string `json:"hairpinMode"`
|
HairpinMode string `json:"hairpinMode"`
|
||||||
// The node has babysitter process monitoring docker and kubelet.
|
|
||||||
BabysitDaemons bool `json:"babysitDaemons"`
|
|
||||||
// maxPods is the number of pods that can run on this Kubelet.
|
// maxPods is the number of pods that can run on this Kubelet.
|
||||||
MaxPods int32 `json:"maxPods"`
|
MaxPods int32 `json:"maxPods"`
|
||||||
// dockerExecHandlerName is the handler to use when executing a command
|
// dockerExecHandlerName is the handler to use when executing a command
|
||||||
|
@ -459,7 +459,6 @@ func autoConvert_v1alpha1_KubeletConfiguration_To_componentconfig_KubeletConfigu
|
|||||||
}
|
}
|
||||||
out.ExitOnLockContention = in.ExitOnLockContention
|
out.ExitOnLockContention = in.ExitOnLockContention
|
||||||
out.HairpinMode = in.HairpinMode
|
out.HairpinMode = in.HairpinMode
|
||||||
out.BabysitDaemons = in.BabysitDaemons
|
|
||||||
out.MaxPods = in.MaxPods
|
out.MaxPods = in.MaxPods
|
||||||
out.DockerExecHandlerName = in.DockerExecHandlerName
|
out.DockerExecHandlerName = in.DockerExecHandlerName
|
||||||
out.PodCIDR = in.PodCIDR
|
out.PodCIDR = in.PodCIDR
|
||||||
@ -656,7 +655,6 @@ func autoConvert_componentconfig_KubeletConfiguration_To_v1alpha1_KubeletConfigu
|
|||||||
}
|
}
|
||||||
out.ExitOnLockContention = in.ExitOnLockContention
|
out.ExitOnLockContention = in.ExitOnLockContention
|
||||||
out.HairpinMode = in.HairpinMode
|
out.HairpinMode = in.HairpinMode
|
||||||
out.BabysitDaemons = in.BabysitDaemons
|
|
||||||
out.MaxPods = in.MaxPods
|
out.MaxPods = in.MaxPods
|
||||||
out.DockerExecHandlerName = in.DockerExecHandlerName
|
out.DockerExecHandlerName = in.DockerExecHandlerName
|
||||||
out.PodCIDR = in.PodCIDR
|
out.PodCIDR = in.PodCIDR
|
||||||
|
@ -231,7 +231,6 @@ function load-docker-images {
|
|||||||
function compute-kubelet-params {
|
function compute-kubelet-params {
|
||||||
local params="${KUBELET_TEST_ARGS:-}"
|
local params="${KUBELET_TEST_ARGS:-}"
|
||||||
params+=" --allow-privileged=true"
|
params+=" --allow-privileged=true"
|
||||||
params+=" --babysit-daemons=true"
|
|
||||||
params+=" --cgroup-root=/"
|
params+=" --cgroup-root=/"
|
||||||
params+=" --cloud-provider=gce"
|
params+=" --cloud-provider=gce"
|
||||||
params+=" --pod-manifest-path=/etc/kubernetes/manifests"
|
params+=" --pod-manifest-path=/etc/kubernetes/manifests"
|
||||||
|
Loading…
Reference in New Issue
Block a user