mirror of
https://github.com/k3s-io/kubernetes.git
synced 2025-08-03 17:30:00 +00:00
Merge pull request #44230 from mtaufen/remove-babysit-daemons
Automatic merge from submit-queue Remove the deprecated --babysit-daemons kubelet flag ```release-note Removes the deprecated kubelet flag --babysit-daemons ``` This flag has been deprecated for over a year (git blame says marked deprecated on March 1, 2016). Relatively easy removal - nothing in the Kubelet relies on it anymore. There was still some stuff in the provisioning scripts. It was easy to rip out, but in general we probably need to be more disciplined about updating the provisioning scripts at the same time that we initially mark things deprecated.
This commit is contained in:
commit
ac62748480
@ -499,7 +499,6 @@ function start-kubelet {
|
|||||||
echo "Using kubelet binary at ${kubelet_bin}"
|
echo "Using kubelet binary at ${kubelet_bin}"
|
||||||
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
||||||
flags+=" --allow-privileged=true"
|
flags+=" --allow-privileged=true"
|
||||||
flags+=" --babysit-daemons=true"
|
|
||||||
flags+=" --cgroup-root=/"
|
flags+=" --cgroup-root=/"
|
||||||
flags+=" --cloud-provider=gce"
|
flags+=" --cloud-provider=gce"
|
||||||
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
||||||
|
@ -668,7 +668,6 @@ function start-kubelet {
|
|||||||
echo "Using kubelet binary at ${kubelet_bin}"
|
echo "Using kubelet binary at ${kubelet_bin}"
|
||||||
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
local flags="${KUBELET_TEST_LOG_LEVEL:-"--v=2"} ${KUBELET_TEST_ARGS:-}"
|
||||||
flags+=" --allow-privileged=true"
|
flags+=" --allow-privileged=true"
|
||||||
flags+=" --babysit-daemons=true"
|
|
||||||
flags+=" --cgroup-root=/"
|
flags+=" --cgroup-root=/"
|
||||||
flags+=" --cloud-provider=gce"
|
flags+=" --cloud-provider=gce"
|
||||||
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
flags+=" --cluster-dns=${DNS_SERVER_IP}"
|
||||||
|
@ -158,11 +158,6 @@
|
|||||||
{% set hairpin_mode = "--hairpin-mode=" + pillar['hairpin_mode'] -%}
|
{% set hairpin_mode = "--hairpin-mode=" + pillar['hairpin_mode'] -%}
|
||||||
{% endif -%}
|
{% endif -%}
|
||||||
|
|
||||||
{% set babysit_daemons = "" -%}
|
|
||||||
{% if grains['cloud'] is defined and grains.cloud in [ 'aws', 'gce' ] %}
|
|
||||||
{% set babysit_daemons = "--babysit-daemons=true" -%}
|
|
||||||
{% endif -%}
|
|
||||||
|
|
||||||
{% set kubelet_port = "" -%}
|
{% set kubelet_port = "" -%}
|
||||||
{% if pillar['kubelet_port'] is defined -%}
|
{% if pillar['kubelet_port'] is defined -%}
|
||||||
{% set kubelet_port="--port=" + pillar['kubelet_port'] %}
|
{% set kubelet_port="--port=" + pillar['kubelet_port'] %}
|
||||||
@ -191,4 +186,4 @@
|
|||||||
{% set kubelet_auth = "--anonymous-auth=false --authorization-mode=Webhook --client-ca-file=" + pillar.get('ca_cert_bundle_path', '/var/lib/kubelet/ca.crt') %}
|
{% set kubelet_auth = "--anonymous-auth=false --authorization-mode=Webhook --client-ca-file=" + pillar.get('ca_cert_bundle_path', '/var/lib/kubelet/ca.crt') %}
|
||||||
|
|
||||||
# test_args has to be kept at the end, so they'll overwrite any prior configuration
|
# test_args has to be kept at the end, so they'll overwrite any prior configuration
|
||||||
DAEMON_ARGS="{{daemon_args}} {{api_servers_with_port}} {{debugging_handlers}} {{hostname_override}} {{cloud_provider}} {{cloud_config}} {{config}} {{manifest_url}} --allow-privileged={{pillar['allow_privileged']}} {{log_level}} {{cluster_dns}} {{cluster_domain}} {{docker_root}} {{kubelet_root}} {{non_masquerade_cidr}} {{cgroup_root}} {{system_container}} {{pod_cidr}} {{ master_kubelet_args }} {{cpu_cfs_quota}} {{network_plugin}} {{kubelet_port}} {{ hairpin_mode }} {{enable_custom_metrics}} {{runtime_container}} {{kubelet_container}} {{node_labels}} {{babysit_daemons}} {{eviction_hard}} {{kubelet_auth}} {{feature_gates}} {{test_args}}"
|
DAEMON_ARGS="{{daemon_args}} {{api_servers_with_port}} {{debugging_handlers}} {{hostname_override}} {{cloud_provider}} {{cloud_config}} {{config}} {{manifest_url}} --allow-privileged={{pillar['allow_privileged']}} {{log_level}} {{cluster_dns}} {{cluster_domain}} {{docker_root}} {{kubelet_root}} {{non_masquerade_cidr}} {{cgroup_root}} {{system_container}} {{pod_cidr}} {{ master_kubelet_args }} {{cpu_cfs_quota}} {{network_plugin}} {{kubelet_port}} {{ hairpin_mode }} {{enable_custom_metrics}} {{runtime_container}} {{kubelet_container}} {{node_labels}} {{eviction_hard}} {{kubelet_auth}} {{feature_gates}} {{test_args}}"
|
||||||
|
@ -259,8 +259,6 @@ func (c *kubeletConfiguration) addFlags(fs *pflag.FlagSet) {
|
|||||||
fs.StringVar(&c.RktStage1Image, "rkt-stage1-image", c.RktStage1Image, "image to use as stage1. Local paths and http/https URLs are supported. If empty, the 'stage1.aci' in the same directory as '--rkt-path' will be used.")
|
fs.StringVar(&c.RktStage1Image, "rkt-stage1-image", c.RktStage1Image, "image to use as stage1. Local paths and http/https URLs are supported. If empty, the 'stage1.aci' in the same directory as '--rkt-path' will be used.")
|
||||||
fs.MarkDeprecated("rkt-stage1-image", "Will be removed in a future version. The default stage1 image will be specified by the rkt configurations, see https://github.com/coreos/rkt/blob/master/Documentation/configuration.md for more details.")
|
fs.MarkDeprecated("rkt-stage1-image", "Will be removed in a future version. The default stage1 image will be specified by the rkt configurations, see https://github.com/coreos/rkt/blob/master/Documentation/configuration.md for more details.")
|
||||||
fs.StringVar(&c.HairpinMode, "hairpin-mode", c.HairpinMode, "How should the kubelet setup hairpin NAT. This allows endpoints of a Service to loadbalance back to themselves if they should try to access their own Service. Valid values are \"promiscuous-bridge\", \"hairpin-veth\" and \"none\".")
|
fs.StringVar(&c.HairpinMode, "hairpin-mode", c.HairpinMode, "How should the kubelet setup hairpin NAT. This allows endpoints of a Service to loadbalance back to themselves if they should try to access their own Service. Valid values are \"promiscuous-bridge\", \"hairpin-veth\" and \"none\".")
|
||||||
fs.BoolVar(&c.BabysitDaemons, "babysit-daemons", c.BabysitDaemons, "If true, the node has babysitter process monitoring docker and kubelet.")
|
|
||||||
fs.MarkDeprecated("babysit-daemons", "Will be removed in a future version.")
|
|
||||||
fs.Int32Var(&c.MaxPods, "max-pods", c.MaxPods, "Number of Pods that can run on this Kubelet.")
|
fs.Int32Var(&c.MaxPods, "max-pods", c.MaxPods, "Number of Pods that can run on this Kubelet.")
|
||||||
// TODO(#40229): Remove the docker-exec-handler flag.
|
// TODO(#40229): Remove the docker-exec-handler flag.
|
||||||
fs.StringVar(&c.DockerExecHandlerName, "docker-exec-handler", c.DockerExecHandlerName, "Handler to use when executing a command in a container. Valid values are 'native' and 'nsenter'.")
|
fs.StringVar(&c.DockerExecHandlerName, "docker-exec-handler", c.DockerExecHandlerName, "Handler to use when executing a command in a container. Valid values are 'native' and 'nsenter'.")
|
||||||
|
@ -62,7 +62,6 @@ auth-provider
|
|||||||
auth-provider-arg
|
auth-provider-arg
|
||||||
auth-provider-arg
|
auth-provider-arg
|
||||||
azure-container-registry-config
|
azure-container-registry-config
|
||||||
babysit-daemons
|
|
||||||
basic-auth-file
|
basic-auth-file
|
||||||
bench-pods
|
bench-pods
|
||||||
bench-quiet
|
bench-quiet
|
||||||
|
@ -406,8 +406,6 @@ type KubeletConfiguration struct {
|
|||||||
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
||||||
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
||||||
HairpinMode string
|
HairpinMode string
|
||||||
// The node has babysitter process monitoring docker and kubelet.
|
|
||||||
BabysitDaemons bool
|
|
||||||
// maxPods is the number of pods that can run on this Kubelet.
|
// maxPods is the number of pods that can run on this Kubelet.
|
||||||
MaxPods int32
|
MaxPods int32
|
||||||
// dockerExecHandlerName is the handler to use when executing a command
|
// dockerExecHandlerName is the handler to use when executing a command
|
||||||
|
@ -471,8 +471,6 @@ type KubeletConfiguration struct {
|
|||||||
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
// Generally, one must set --hairpin-mode=veth-flag to achieve hairpin NAT,
|
||||||
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
// because promiscous-bridge assumes the existence of a container bridge named cbr0.
|
||||||
HairpinMode string `json:"hairpinMode"`
|
HairpinMode string `json:"hairpinMode"`
|
||||||
// The node has babysitter process monitoring docker and kubelet.
|
|
||||||
BabysitDaemons bool `json:"babysitDaemons"`
|
|
||||||
// maxPods is the number of pods that can run on this Kubelet.
|
// maxPods is the number of pods that can run on this Kubelet.
|
||||||
MaxPods int32 `json:"maxPods"`
|
MaxPods int32 `json:"maxPods"`
|
||||||
// dockerExecHandlerName is the handler to use when executing a command
|
// dockerExecHandlerName is the handler to use when executing a command
|
||||||
|
@ -459,7 +459,6 @@ func autoConvert_v1alpha1_KubeletConfiguration_To_componentconfig_KubeletConfigu
|
|||||||
}
|
}
|
||||||
out.ExitOnLockContention = in.ExitOnLockContention
|
out.ExitOnLockContention = in.ExitOnLockContention
|
||||||
out.HairpinMode = in.HairpinMode
|
out.HairpinMode = in.HairpinMode
|
||||||
out.BabysitDaemons = in.BabysitDaemons
|
|
||||||
out.MaxPods = in.MaxPods
|
out.MaxPods = in.MaxPods
|
||||||
out.DockerExecHandlerName = in.DockerExecHandlerName
|
out.DockerExecHandlerName = in.DockerExecHandlerName
|
||||||
out.PodCIDR = in.PodCIDR
|
out.PodCIDR = in.PodCIDR
|
||||||
@ -656,7 +655,6 @@ func autoConvert_componentconfig_KubeletConfiguration_To_v1alpha1_KubeletConfigu
|
|||||||
}
|
}
|
||||||
out.ExitOnLockContention = in.ExitOnLockContention
|
out.ExitOnLockContention = in.ExitOnLockContention
|
||||||
out.HairpinMode = in.HairpinMode
|
out.HairpinMode = in.HairpinMode
|
||||||
out.BabysitDaemons = in.BabysitDaemons
|
|
||||||
out.MaxPods = in.MaxPods
|
out.MaxPods = in.MaxPods
|
||||||
out.DockerExecHandlerName = in.DockerExecHandlerName
|
out.DockerExecHandlerName = in.DockerExecHandlerName
|
||||||
out.PodCIDR = in.PodCIDR
|
out.PodCIDR = in.PodCIDR
|
||||||
|
@ -231,7 +231,6 @@ function load-docker-images {
|
|||||||
function compute-kubelet-params {
|
function compute-kubelet-params {
|
||||||
local params="${KUBELET_TEST_ARGS:-}"
|
local params="${KUBELET_TEST_ARGS:-}"
|
||||||
params+=" --allow-privileged=true"
|
params+=" --allow-privileged=true"
|
||||||
params+=" --babysit-daemons=true"
|
|
||||||
params+=" --cgroup-root=/"
|
params+=" --cgroup-root=/"
|
||||||
params+=" --cloud-provider=gce"
|
params+=" --cloud-provider=gce"
|
||||||
params+=" --pod-manifest-path=/etc/kubernetes/manifests"
|
params+=" --pod-manifest-path=/etc/kubernetes/manifests"
|
||||||
|
Loading…
Reference in New Issue
Block a user