Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Modifying kubelet to use config files instead of kubelet flags which are about to deprecate. #90

Merged
merged 6 commits into from
Nov 13, 2018

Conversation

nithu0115
Copy link
Contributor

Description of changes:

Changing Kubelet to use config files instead of using kubelet flags as they are deprecated.

Oct 18 00:55:14 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal systemd[1]: Starting Kubernetes Kubelet...
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --address has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.i
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --authentication-token-webhook has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --authorization-mode has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://k
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --allow-privileged has been deprecated, will be removed in a future version
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --cluster-domain has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kuber
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --cgroup-driver has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubern
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --feature-gates has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubern
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --anonymous-auth has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kuber
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --client-ca-file has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kuber
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --cluster-dns has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernet
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: Flag --max-pods has been deprecated, This parameter should be set via the config file specified by the Kubelet's --config flag. See https://kubernetes.
Oct 18 00:55:20 ip-172-31-25-244.test-sd1.stagingus-west-2.compute.internal kubelet[3718]: I1018 00:55:20.085267    3718 feature_gate.go:226] feature gates: &{{} map[RotateKubeletServerCertificate:true]}

By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.

Copy link
Member

@micahhausler micahhausler left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

@micahhausler micahhausler merged commit 67053cf into awslabs:master Nov 13, 2018
--feature-gates=RotateKubeletServerCertificate=true \
--anonymous-auth=false \
--client-ca-file=/etc/kubernetes/pki/ca.crt $KUBELET_ARGS $KUBELET_MAX_PODS $KUBELET_EXTRA_ARGS
ExecStartPre=/sbin/iptables -P FORWARD ACCEPT

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why this gets added here?

Copy link
Contributor Author

@nithu0115 nithu0115 Dec 19, 2018

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@errordeveloper - I saw many miss this iptables rule causing problem, hence I added it to ExecStartPre to enforce this command run every time kubelet starts and change the rule.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why is it part of this PR and there was no discussion about it here? Maybe a comment in the unit file would help also, but I still don't quite understand the purpose, it seems very ad-hoc and as far as I can tell redundant in the context of this AMI.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I wonder if the above questions is addressed some where else?
why is the FORWARD rule to ACCEPT?

errm added a commit to errm/ekstrap that referenced this pull request Dec 20, 2018
see: awslabs/amazon-eks-ami#90

This should fix #49 that I think is cased by relying on depricated
kubelet flags.
This pull request was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants