Akhilesh Sarda
3649836054
add ACI CNI 6043 variables
2024-09-10 16:20:43 -07:00
Akhilesh Sarda
fa0bb70bef
Add ACI CNI 6.0.4.2 variables
2024-07-08 09:33:05 -07:00
Krunal Hingu
3da4365485
removal of podsecuritypolicy code
2024-05-17 22:32:40 +05:30
JeffinKottaram
92d946b1e1
Add ACI CNI 6041 variables
2024-03-01 04:27:27 -08:00
JeffinKottaram
275242b912
Added new varibales for ACI-CNI-6.0.3.2
2024-01-09 20:24:08 +05:30
Akhilesh Sarda
5648c7f457
Add ACI-CNI 6.0.3.1 variables
2024-01-02 13:39:08 -08:00
Kinara Shah
1584d37ede
add logic for external aws cloud provider
2023-10-18 14:23:30 -07:00
Jiaqi Luo
e4bf783a1a
set the default PodSecurityConfiguration value only if the cluster's k8s version is at least 1.23
2023-07-10 17:13:46 -07:00
Kinara Shah
10a094b0f5
Revert "set the default PodSecurityConfiguration value only if the cluster's k8s version is at least 1.23 ( #3261 )"
...
This reverts commit 914d4cb027
.
2023-06-21 08:56:15 -07:00
Jiaqi Luo
914d4cb027
set the default PodSecurityConfiguration value only if the cluster's k8s version is at least 1.23 ( #3261 )
2023-06-20 16:56:05 -07:00
siva-muni
5e67f76f45
Added ACI-CNI 5.2.7.1 variables
2023-06-14 09:50:38 +05:30
siva-muni
b4d94d541e
Add new variables for ACI-CNI 5.2.3.6
2023-06-06 09:56:55 -07:00
Kinara Shah
113f305b35
changes around hostname-override
2023-01-12 09:21:21 -08:00
siva-muni
91e00a3f30
Added new variables for ACI-CNI 5.2.3.5
2022-12-28 13:32:34 -07:00
Sergey Nasovich
7cee9af171
Merge pull request #3039 from noironetworks/aci-5.2.3.3
2022-11-29 11:34:14 -05:00
Jiaqi Luo
5fcf75db40
add the support for PodSecurity on cluster at least v1.23
2022-11-22 12:03:45 -07:00
Jiaqi Luo
f5e18110b6
add the parsing for eventRateLimit
2022-11-22 12:03:45 -07:00
Jiaqi Luo
c4a521de08
bump the API used for api-server from v1alpha1 to v1
2022-11-22 12:03:45 -07:00
vardhaman
27cbb91271
added check for empty updatestrategy while setting dns addon defaults
2022-11-04 10:40:44 +05:30
siva-muni
710892a58c
Add new variables for ACI-CNI 5.2.3.3
2022-09-14 12:22:04 +05:30
siva-muni
49977444ef
Added new variables
2022-07-04 18:42:21 +05:30
Jiaqi Luo
9f5ecdb801
1. enable cri-dockerd when the cluster version >= 1.24 AND the option enable_cri_dockerd is not configured; 2. drop the flag --address when the cluster version >= 1.24 in the DinD case
2022-06-28 17:22:47 -07:00
Sebastiaan van Steenis
546a61b24a
Add compatibility with k8s v1.22
2021-11-04 16:50:58 +01:00
Sebastiaan van Steenis
0f9d7911b1
Set ingress to hostport in k8s 1.21 and up
2021-07-30 20:15:07 +02:00
Sebastiaan van Steenis
97c4b102ce
Validate Ingress Webhook and pass to template
2021-07-06 12:11:59 +02:00
Kinara Shah
b2a9ebee75
set ingress default backend to false for k8s 1.21+
2021-05-14 16:58:25 -07:00
Steven Crespo
68453acb6e
Add priority class name to addons
2021-02-06 16:46:39 -08:00
rawmind0
1880404fc3
Added etcd snapshot timeout parameter
2021-01-22 18:35:13 +01:00
Nick Gerace
da6d9dcf9e
Set default http backend to be optional
...
Set default http backend to be optional for ingress nginx. It will be
enabled by default.
2020-12-03 14:53:51 -05:00
Kiran Shastri
4f062997bb
Introduce ACI CNI network provider
...
ACI CNI supports k8s versions 1.18+
Added template and arguments for ACI CNI
Disable cloud options for ACI.
Separate generated code into another commit
Signed-off-by: Kiran Shastri <shastrinator@gmail.com>
(cherry picked from commit e94c54005e
)
2020-11-17 15:29:03 -05:00
Jacob Payne
04ea70ee3b
updated NodeUpgradeStrategy.Drain to use pointer
2020-10-26 09:59:49 -07:00
kinarashah
8c3c618b63
set default ingress network mode for both rancher and rke
...
Problem:
Setting defaults for ingress in parse logic works only for
rke standalone but not when rancher calls rke using ClusterUp.
Solution:
Setting them during the cluster defaults logic
2020-10-24 13:09:38 +02:00
Gaurav Mehta
5a63de09bc
Updated cluster/addons.go to allow it to parse and send new http_port and https_ports to the ingress template
...
Fixed up yaml import package
Updated rke ingress addon to support a new field hostNetwork. Users can use this now to run ingress controller on overlay network only
Ported additional ingress types changes into types/rke_types
Fixed linting errors related to variable names in addons.go and rke_types
Changed types for hostNetwork and http/https ports
Added validation to check http/https ports are different
Changed rke_types for additional spec in ingressConfig. Changed validation and default logic accordingly
2020-10-21 19:00:04 +11:00
Chris Kim
526ac7b065
Add CanalControllers to the systemImagesDefaultsMap
...
Signed-off-by: Chris Kim <oats87g@gmail.com>
2020-09-08 16:17:30 -07:00
Sebastiaan van Steenis
6761a1a3e1
Add restore flag to use local state
2020-08-04 13:13:43 +02:00
Darren Shepherd
c405e6ea1b
Remove references to rancher/types
2020-07-11 23:29:33 -07:00
rawmind0
8ff29b617f
Updated api bool fields with default=true to *bool. Go files
2020-06-02 20:15:53 +02:00
Arvind Iyengar
6e194ab1a6
Revert "Add support for k8s 1.18"
...
This reverts commit 763a896380
.
2020-05-27 12:48:10 -07:00
Arvind Iyengar
763a896380
Add support for k8s 1.18
...
This commit changes default settings for k8s 1.18 to have encryption at rest by default: https://github.com/rancherlabs/rancher-security/issues/412
2020-05-12 14:13:11 -07:00
rajashree
00f6567714
Use v3 type for addons updateStrategy
2020-03-26 15:52:57 -07:00
Sebastiaan van Steenis
d65d72ae6d
Enable kube-api audit log for new k8s versions
2020-03-15 13:55:47 +01:00
rajashree
6b94c4a3fb
Retain user-configured dnsConfig fields when provider is not set
2020-03-12 23:56:11 -07:00
rajashree
bb6873ce48
Addresses following issues:
...
1. Compare maxUnavailable with powered off hosts before attempting to reconcile
NotReady hosts
2. Include powered off hosts as failed hosts for controlplane upgrade to return error
3. Change coredns upgrade strategy. With addons changes it was changed to have the k8s
default value for a deployment of 25% maxUnavailable and maxSurge. This commit changes it
back to maxUnavailable of 1 to avoid dns addon upgrade issues
2020-03-07 14:22:35 -08:00
Chris Kim
97371fe82d
Add custom flexvolume capabilities to canal and calico
2020-03-05 08:18:40 -08:00
Sebastiaan van Steenis
31a3005733
Add support for nodelocal DNS
2020-03-03 18:09:18 +01:00
rajashree
e27a05f8b1
Attempt upgrade on NotReady hosts
2020-02-26 14:14:42 -08:00
Dax McDonald
d7a4f2d2c3
Fix formatting
2020-02-26 12:08:10 -07:00
Rajashree Mandaogane
6664be5e3b
Merge pull request #1912 from mrajashree/zero_downtime_bugfixes
...
Accept label to ignore nodes during upgrade
2020-02-24 10:06:57 -08:00
rajashree
968a399f26
Accept label to ignore nodes during upgrade
...
RKE does a cluster scan to find the unreachable hosts, and if that number
is same as or exceeds maxUnavailable, upgrade won't proceed.
This commit introduces a label users can provide for their nodes so they
don't get counted as unavailable and are excluded from upgrade.
This commit also includes a couple of bug fixes
2020-02-22 14:23:47 -08:00
rajashree
4e38cdf825
Parse updateStrategy, replicas and autoscaler fields
2020-02-18 09:01:29 -08:00