Commit Graph

100078 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
75b846dee4
Merge pull request #101313 from BinacsLee/binacs-scheduler-fwk-types-cleanup
code cleanup: scheduler / framework use `max` function instead of if-cond…
2021-04-21 17:04:13 -07:00
Kubernetes Prow Robot
4cf9658a3e
Merge pull request #101152 from tkashem/add-httplog
controller-manager: restore http logging filter in the chain
2021-04-21 17:04:05 -07:00
Kubernetes Prow Robot
5779fec3c4
Merge pull request #99959 from AliceZhang2016/nodeaffinity-cleanup
Move nodeaffinity helpers to component-helpers package
2021-04-21 17:03:53 -07:00
Kubernetes Prow Robot
232d93037c
Merge pull request #99336 from neolit123/1.21-kublet-node-sync-fix
pkg/kubelet: improve the node informer sync check
2021-04-21 17:03:40 -07:00
Gabe Rosenhouse
176c07dfdd fix up test for setting default namespace labels 2021-04-21 23:50:58 +00:00
Gabe Rosenhouse
b5d4551ac7 Promote NamespaceDefaultLabelName to GA
Lock to default for 1.22

Co-authored-by: Jay Vyas <jvyas@vmware.com>
2021-04-21 22:29:30 +00:00
Kubernetes Prow Robot
9e8506eb1f
Merge pull request #101337 from damemi/remove-limits-from-balancedpodfornodes
Remove Limits from scheduling e2e balanced pod resources
2021-04-21 14:03:51 -07:00
Mike Dame
07029c941a Remove Limits from scheduling e2e balanced pod resources
The purpose of the pod created by `createBalancedPodForNodes()` is to ensure
that all nodes have equal resource requests (as seen by the scheduler). This
prevents the default scheduling behavior (which attempts to balance resource requests)
from interfering with e2e's which test other priorities/score plugins.

Because the scheduler only worries about requests, specifying `Limits` in this pod
is unnecessary. In fact, if the calculated "balancing" limit is too low, it can cause
the balancing pod to never start due to OOMKill errors, leading to flakes and failures.
2021-04-21 15:58:00 -04:00
Lubomir I. Ivanov
7deac5e697 pkg/kubelet: improve the node informer sync check
GetNode() is called in a lot of places including a hot loop in
fastStatusUpdateOnce. Having a poll in it is delaying
the kubelet /readyz status=200 report.

If a client is available attempt to wait for the sync to happen,
before starting the list watch for pods at the apiserver.
2021-04-21 22:46:27 +03:00
Kubernetes Prow Robot
1e4388964e
Merge pull request #101293 from ehashman/issue-93480
Remove unmaintained elasticsearch tests
2021-04-21 12:20:12 -07:00
Kubernetes Prow Robot
ba5ec40d41
Merge pull request #101277 from wangyx1992/capatial-log-scheduler
cleanup: fix log capitalization in scheduler
2021-04-21 12:20:03 -07:00
Kubernetes Prow Robot
d3fbbfab5f
Merge pull request #101162 from ihcsim/fix-malformed-request-logs
Fix Client-Side Request Throttling Malformed Logs
2021-04-21 12:19:51 -07:00
Christian Huffman
21ea9af37f Force NodeUnstageVolume to finish for all distros 2021-04-21 15:01:41 -04:00
Katrina Verey
8ad6fd6ddb Add --chunk-size support to kubectl describe 2021-04-21 11:44:15 -07:00
David Eads
b1ce579517 apply test for manager limit to only use v1 apis 2021-04-21 14:38:24 -04:00
Andrea Nodari
5b666a61a1 Add nil path to mapping when a CR has no "scale" subresource
This is to prevent the ScaleHandler to drop the entry. In this way
entries just get ignored.
2021-04-21 20:27:47 +02:00
Andrea Nodari
c10dd884c4 Drop managed fields entries with unknown fields
This is aligned to the behaviour of server-side apply on main resources.
2021-04-21 20:27:47 +02:00
Andrea Nodari
8e4b5c849b Do not add managed fields if a scale entry doesn't own replicas
This happens when a request changes the .status.replicas but not
.spec.replicas
2021-04-21 20:27:45 +02:00
Andrea Nodari
09649e58b5 Check request info when updating managed fields during scale
- Test all versions to make sure each resource version is in the
  mappings
- Fail when request info contains an unrecognized version. We have tests
  that guarantee that all known versions are in the mappings. If we
  get a version in request info that is not there we should fail fast to
  prevent inconsistent behaviour (e.g. for some reason the mappings is
  not up to date).

Ensure all known versions are in mappings
2021-04-21 20:27:02 +02:00
Kubernetes Prow Robot
6aa683e9cf
Merge pull request #100639 from zshihang/proxy
dnat to 169.254.169.252 for metadata server traffic
2021-04-21 11:15:51 -07:00
Antoine Pelisse
816e80206c Use ScaleHandler for all scalable resources 2021-04-21 18:41:40 +02:00
Andrea Nodari
a9ea98b3b9 Track ownership of deployments scale subresource 2021-04-21 18:41:40 +02:00
Kubernetes Prow Robot
032007e007
Merge pull request #101312 from harche/ContainerLogPath_fix
Add SELinux security context to ContainerLogPath test
2021-04-21 09:31:17 -07:00
Kubernetes Prow Robot
b204b1ecdc
Merge pull request #101306 from joelsmith/master
Additional CVE-2021-3121 fix
2021-04-21 09:31:05 -07:00
Kubernetes Prow Robot
eda3faaf44
Merge pull request #101317 from BinacsLee/binacs-scheduler-fwk-plugins-nodelabel-cleanup
code cleanup: scheduler simplify the check function in NodeLabel.Filter
2021-04-21 08:26:11 -07:00
Surya Seetharaman
d3fe48e848 Kube-proxy: perf-enhancement: Reduce NAT table KUBE-SERVICES/NODEPORTS chain rules
The nat KUBE-SERVICES chain is called from OUTPUT and PREROUTING stages. In
clusters with large number of services, the nat-KUBE-SERVICES chain is the largest
chain with for eg: 33k rules. This patch aims to move the KubeMarkMasq rules from
the kubeServicesChain into the respective KUBE-SVC-* chains. This way during each
packet-rule matching we won't have to traverse the MASQ rules of all services which
get accumulated in the KUBE-SERVICES and/or KUBE-NODEPORTS chains. Since the
jump to KUBE-MARK-MASQ ultimately sets the 0x400 mark for nodeIP SNAT, it should not
matter whether the jump is made from KUBE-SERVICES or KUBE-SVC-* chains.

Specifically we change:

1) For ClusterIP svc, we move the KUBE-MARK-MASQ jump rule from KUBE-SERVICES
chain into KUBE-SVC-* chain.
2) For ExternalIP svc, we move the KUBE-MARK-MASQ jump rule in the case of
non-ServiceExternalTrafficPolicyTypeLocal from KUBE-SERVICES
chain into KUBE-SVC-* chain.
3) For NodePorts svc, we move the KUBE-MARK-MASQ jump rule in case of
non-ServiceExternalTrafficPolicyTypeLocal from KUBE-NODEPORTS chain to
KUBE-SVC-* chain.
4) For load-balancer svc, we don't change anything since it is already svc specific
due to creation of KUBE-FW-* chains per svc.

This would cut the rules per svc in KUBE-SERVICES and KUBE-NODEPORTS in half.
2021-04-21 16:41:03 +02:00
Surya Seetharaman
667e50abc8 Add TestOverallIPTablesRulesWithMultipleServices 2021-04-21 16:41:03 +02:00
Kubernetes Prow Robot
565d5f4562
Merge pull request #101234 from gautierdelorme/rm-go-openapi-spec
eliminate dependency on go-openapi/spec
2021-04-21 06:18:10 -07:00
BinacsLee
9ff1419511 code cleanup: scheduler simplify the check function in NodeLabel.Filter 2021-04-21 20:30:02 +08:00
BinacsLee
8f57233a3a code cleanup: scheduler/framework use max function instead of if-condition in types.go 2021-04-21 17:40:35 +08:00
Gautier Delorme
34b0fcef5f remove go-openapi/spec
Signed-off-by: Gautier Delorme <gautier.delorme@gmail.com>
2021-04-21 11:31:49 +02:00
Gautier Delorme
bcdde6bf75 bump k8s.io/kube-openapi
Signed-off-by: Gautier Delorme <gautier.delorme@gmail.com>
2021-04-21 10:42:17 +02:00
elbehery
848ae095c8 fix_change_error_to_info 2021-04-21 10:35:23 +02:00
Jihoon Seo
c91482b237 Add missing heading in CHANGELOG 2021-04-21 17:18:45 +09:00
Harshal Patil
df13eebfd0 Add SELinux security context to ContainerLogPath test
Signed-off-by: Harshal Patil <harpatil@redhat.com>
2021-04-21 13:48:32 +05:30
Kubernetes Prow Robot
43a32c14f5
Merge pull request #100686 from hasheddan/azure-credential-client
Add timeout to Azure ACR credential provider
2021-04-21 01:10:11 -07:00
Patrick Ohly
c794b5c442 storage e2e: patch in RBAC rules for secrets
In one mock test, the snapshotter needs permission to read
secrets. That was disabled in the RBAC files of recent releases. We
need to patch it back in during deployment.
2021-04-21 09:57:54 +02:00
Kubernetes Prow Robot
90e599f56a
Merge pull request #100964 from njuptlzf/SelectionPredicateUT
Add more unit tests for SelectionPredicate
2021-04-20 23:24:10 -07:00
Joel Smith
9b54a72bb8 Additional CVE-2021-3121 fix 2021-04-20 23:31:33 -06:00
Kubernetes Prow Robot
3cc043cfd2
Merge pull request #101262 from spencer-p/master
Upgrade addon-manager baseimage to debian-base v1.0.1
2021-04-20 20:36:22 -07:00
Kubernetes Prow Robot
0d97d55339
Merge pull request #101173 from BinacsLee/binacs-scheduler-opts-remove-return-value
code cleanup: modify kube-scheduler, remove useless return value
2021-04-20 20:36:10 -07:00
Kubernetes Prow Robot
425859b7d6
Merge pull request #101269 from 3Xpl0it3r/master
remove duplicatd description in comment
2021-04-20 19:24:17 -07:00
Kubernetes Prow Robot
497e7c0c1e
Merge pull request #101233 from pohly/e2e-suite-cleanup
storage e2e: remove obsolete function
2021-04-20 19:24:10 -07:00
njuptlzf
5468db05f0 Add more test code for SelectionPredicate 2021-04-21 09:58:01 +08:00
houjun
d3a355d6dc Remove redundant checks 2021-04-21 09:55:45 +08:00
Kubernetes Prow Robot
6a7572e4ad
Merge pull request #101287 from soltysh/replace_with_default
Fail fast when image is specified without tag
2021-04-20 17:38:24 -07:00
Kubernetes Prow Robot
badb5730d1
Merge pull request #101276 from BinacsLee/binacs-pkg-scheduler-fwk-types-cleanup
code cleanup: pkg/scheduler modify framework/types.go
2021-04-20 17:38:12 -07:00
Kubernetes Prow Robot
2c1b0573c4
Merge pull request #101174 from lojies/cleanupcertificate_manager_test
code cleanup:remove repeated package import in client-go
2021-04-20 15:02:34 -07:00
Elana Hashman
ac5ba850c1
Remove unused elasticsearch tests 2021-04-20 13:34:59 -07:00
Maciej Szulik
3edabfb460
Switch to a proper busybox test image 2021-04-20 22:05:31 +02:00