What this PR does / why we need it: My explanation
# -*- mode: ruby -*- | |
# vi: set ft=ruby : | |
Vagrant.configure("2") do |config| | |
config.vm.box = "generic/rocky8" | |
memory = 6144 | |
cpus = 4 | |
config.vm.provider :virtualbox do |v| | |
v.memory = memory |
#!/usr/bin/env bash | |
set -euo pipefail | |
OUTPUT=deploy.yaml | |
# Deploy cert-manager (not requried in final version because certificates | |
# should be bootstrapped by the installer) | |
kubectl apply -f https://github.com/jetstack/cert-manager/releases/download/v1.3.1/cert-manager.yaml | |
kubectl wait --for condition=ready \ | |
-n cert-manager pod -l app.kubernetes.io/instance=cert-manager |
# Before deploying this, run: | |
# oc adm policy add-scc-to-user hostnetwork -z crio-metrics -n crio-metrics | |
--- | |
# Only required for demoing purposes because the ServiceMonitor is part of the | |
# user monitoring and should move to the system level later on. | |
apiVersion: v1 | |
kind: ConfigMap | |
metadata: | |
name: cluster-monitoring-config | |
namespace: openshift-monitoring |
package main | |
// BEFORE RUNNING: | |
// --------------- | |
// 1. If not already done, enable the Cloud Resource Manager API | |
// and check the quota for your project at | |
// https://console.developers.google.com/apis/api/cloudresourcemanager | |
// 2. This sample uses Application Default Credentials for authentication. | |
// If not already done, install the gcloud CLI from | |
// https://cloud.google.com/sdk/ and run |
FROM debian:10 | |
RUN apt-get update && apt-get install -y wget gnupg | |
RUN echo 'deb http://download.opensuse.org/repositories/devel:/kubic:/libcontainers:/stable/Debian_10/ /' \ | |
> /etc/apt/sources.list.d/devel:kubic:libcontainers:stable.list | |
RUN wget -nv https://download.opensuse.org/repositories/devel:kubic:libcontainers:stable/Debian_10/Release.key -O- |\ | |
apt-key add - | |
RUN apt-get update && apt-get install -y podman | |
RUN sed -i 's/driver = ""/driver = "vfs"/' /etc/containers/storage.conf |
#!/usr/bin/env python3 | |
import json | |
from kfp.compiler import Compiler | |
from kfp.dsl import ContainerOp, ExitHandler, pipeline | |
from kubernetes import client as k8s | |
@pipeline(name='My pipeline', description='') |
First of all, we have to create a GPG key pair or select a locally available one:
> gpg --list-keys [email protected]
pub rsa2048 2018-11-26 [SC] [expires: 2020-11-25]
92836C5387398A449AF794CF8CE029DD1A866E52
uid [ultimate] Sascha Grunert <[email protected]>
-
Renamed FeatureGate RequestManagement to APIPriorityAndFairness. This feature gate is an alpha and has not yet been associated with any actual functionality. change references to feature gate RequestManagement into references to APIPriorityAndFairness (#85260, @MikeSpreitzer) [SIG API Machinery]
-
kubeadm: add a new "kubelet-finalize" phase as part of the "init" workflow and an experimental sub-phase to enable automatic kubelet client certificate rotation on primary control-plane nodes.
Prior to 1.17 and for existing nodes created by "kubeadm init" where kubelet client certificate rotation is desired, you must modify "/etc/kubernetes/kubelet.conf" to point to the PEM symlink for rotation: