- Sep 13, 2022
-
-
Ho Kim authored
* Add optional NAT support in calico router mode * Add a blank line in front of lists * Remove mutual exclusivity: NAT and router mode * Ignore router mode from NAT * Update calico doc
-
rptaylor authored
-
cleverhu authored
Signed-off-by: cleverhu <shouping.hu@daocloud.io> Signed-off-by: cleverhu <shouping.hu@daocloud.io>
-
- Sep 09, 2022
-
-
Samuel Liu authored
* WIP: sometimes,we not run etcd * fix ansible lint * like calico(kdd) cni, no need run etcd
-
Mohamed Zaian authored
-
- Sep 08, 2022
-
-
Kenichi Omichi authored
Since the commit fad29661 cri_dockerd_enabled has not been used. But the packet_ubuntu22-aio-docker.yml still contains the configuration and causes confusions. This removes the configuration for cleanup.
-
ghostloda authored
-
Krystian Młynek authored
* add retries for restart of kube-apiserver * change var name
-
- Sep 06, 2022
- Sep 05, 2022
-
-
Kay Yan authored
-
- Sep 04, 2022
-
-
Michael Schmitz authored
-
- Sep 02, 2022
-
-
lou-lan authored
-
ERIK authored
Signed-off-by: bo.jiang <bo.jiang@daocloud.io> Signed-off-by: bo.jiang <bo.jiang@daocloud.io>
-
- Sep 01, 2022
-
-
Kay Yan authored
-
- Aug 31, 2022
-
-
Cristian Calin authored
-
Florian Ruynat authored
-
蒋航 authored
Signed-off-by: hang.jiang <hang.jiang@daocloud.io> Signed-off-by: hang.jiang <hang.jiang@daocloud.io>
-
- Aug 30, 2022
-
-
Alessio Greggi authored
* feat: add kubelet systemd service hardening option * refactor: move variable name to kubelet_secure_addresses Co-authored-by: Cristian Calin <6627509+cristicalin@users.noreply.github.com> * docs: add diagram about kubelet_secure_addresses variable Co-authored-by: Cristian Calin <6627509+cristicalin@users.noreply.github.com>
-
tasekida authored
-
Florian Ruynat authored
-
Florian Ruynat authored
-
lijin-union authored
-
kakkotetsu authored
-
Kay Yan authored
* fix-kube-vip-strict-arp * fix-kube-vip-strict-arp
-
Chad Swenson authored
It seems that PR #8839 broke `calico_datastore: etcd` when it removed ipamconfig support for etcd mode. This PR fixes some failing tasks when `calico_datastore == etcd`, but it does not restore ipamconfig support for calico in etcd mode. If someone wants to restore ipamconfig support for `calico_datastore: etcd` please submit a follow up PR for that.
-
- Aug 29, 2022
-
-
Cristian Calin authored
-
- Aug 24, 2022
-
-
Cristian Calin authored
* add pre-commit hook configuration * add tmp.md to .gitignore * describe the use of pre-commit hook in CONTRIBUTING.md * fix docs/integration.md errors identified by markdownlint * fix docs/<file>.md errors identified by markdownlint * docs/azure-csi.md * docs/azure.md * docs/bootstrap-os.md * docs/calico.md * docs/debian.md * docs/fcos.md * docs/vagrant.md * docs/gcp-lb.md * docs/kubernetes-apps/registry.md * docs/setting-up-your-first-cluster.md * docs/vagrant.md * docs/vars.md * fix contrib/<file>.md errors identified by markdownlint
-
Krystian Młynek authored
* cri-dockerd: add restart of docker.service * remove enabling of cri-dockerd.socket
-
Sergey authored
-
- Aug 23, 2022
-
-
Shelming.Song authored
-
Bishal das authored
-
Shelming.Song authored
-
Pavel Chekin authored
For the following configuration ``` containerd_insecure_registries: docker.io: - dockerhubcache.example.com ``` the rendered /etc/containerd/config.toml contains ``` [plugins."io.containerd.grpc.v1.cri".registry.configs."docker.io".tls] insecure_skip_verify = true ``` but it needs to be ``` [plugins."io.containerd.grpc.v1.cri".registry.configs."dockerhubcache.example.com".tls] insecure_skip_verify = true ```
-
- Aug 22, 2022
-
-
Mostafa Ghadimi authored
*
🌱 Enable cri-dockerd service *🔨 Fix the task name in order to pass the CI tests -
Bishal das authored
-
Tristan authored
See #9035
-
Mohamed Zaian authored
-
- Aug 19, 2022
-
-
Ho Kim authored
-
- Aug 18, 2022
-
-
Tomas Zvala authored
* Add the option to enable default Pod Security Configuration Enable Pod Security in all namespaces by default with the option to exempt some namespaces. Without the change only namespaces explicitly configured will receive the admission plugin treatment. * Fix the PR according to code review comments * Revert the latest changes - leave the empty file when kube_pod_security_use_default, but add comment explaining the empty file - don't attempt magic at conditionally adding PodSecurity to kube_apiserver_admission_plugins_needs_configuration
-