634 Commits

Author SHA1 Message Date
Kubernetes Prow Robot
42088269f3 Merge pull request #2901 from fedepaol/newmetallb
Suggest a more updated metallb version
2022-09-07 08:04:37 -07:00
Federico Paolinelli
f1db4acf0d Suggest a more updated metallb version
The latest metallb version is configurable via CRs instead of configmap.
Here we suggest using the latest version and we change the configuration
from configmap to CRs.

Signed-off-by: Federico Paolinelli <fedepaol@gmail.com>
2022-09-07 16:15:00 +02:00
Kubernetes Prow Robot
1923aca290 Merge pull request #2912 from BenTheElder/less-cruft
Drop support for Kubernetes < 1.15
2022-09-07 00:08:36 -07:00
Benjamin Elder
c637a27997 alphabetize maintainers and drop inactive 2022-09-06 22:09:35 -07:00
Benjamin Elder
4bef5b906c add a note to known issue that probably no longer applies 2022-09-06 21:42:47 -07:00
Benjamin Elder
03a0b45c8f update docs to point to v0.15.0 2022-09-01 18:31:29 -07:00
Kubernetes Prow Robot
74a8ae82b3 Merge pull request #2877 from Benny-Git/main
Add extra labels section for per-node options
2022-08-18 10:20:22 -07:00
Benny
ad7f1ce980 Add extra labels section for per-node options
This feature was introduced with https://github.com/kubernetes-sigs/kind/pull/1926
2022-08-13 07:31:43 +02:00
Bryan A. S
bccdb8536a doc: fix kong ingress https port
From 43/tcp/host to 443/tcp/host.
2022-08-13 02:21:21 -03:00
Xin Ren
8f34b0ffc0 Distinguish usage of local registry for cluster and in-cluster app. (#2622)
* Update local-registry.md

Distinguish usage of local registry for cluster and in-cluster app.

* make it as explicit reg name
2022-08-08 15:32:24 -07:00
Rewanth Tammana
8d258b546a Updates quick installation linux command 2022-08-04 20:59:36 +04:00
Rewanth Tammana
7110140aa9 Updates linux default installation 2022-08-03 15:25:45 +04:00
Domenico Andreoli
d8b8f4236b Add resouce for developing k8s with Kind on Gitlab 2022-06-23 13:42:02 +02:00
Dan Winship
8fc1ad0944 clarify the impact of Delegate=true when using rootless 2022-06-14 09:38:24 -04:00
Domenico Andreoli
d27a162e0a Improve the grammar 2022-05-31 15:42:23 +02:00
Domenico Andreoli
c097dbe3b9 Add resource for connecting macOS host to Kind nodes 2022-05-31 15:27:52 +02:00
Domenico Andreoli
26855d4fb5 Add known issue "Docker Desktop for macOS and Windows" 2022-05-31 14:10:19 +02:00
Benjamin Elder
80836a7ecb Merge pull request #2588 from lepistone/brokenlink
Fix broken link in known issues
2022-05-19 20:45:10 -07:00
Benjamin Elder
3e5988c25b update install to v0.14.0 2022-05-19 13:04:26 -07:00
Kubernetes Prow Robot
9bef8e9a54 Merge pull request #2773 from fidelity/update-kong-ingess-documentation-section-with-correct-service-name-issue-#2727
Fix kong ingress name in documentation
2022-05-17 08:44:27 -07:00
AppalaKarthik
ec3dc26e02 Fix kong ingress name in documentation 2022-05-17 09:40:38 -04:00
Benjamin Elder
f80d692928 handle M1 vs intel macs in install directions 2022-05-10 18:30:07 -07:00
Benjamin Elder
5a92de59ce update install directions to v0.13.0 2022-05-10 18:25:31 -07:00
Paco Xu
90162a32e5 fix todo: remove docs/_index.md, now that we have navigation 2022-03-31 20:34:32 +08:00
John McBride
93cafd3739 Moves the documentation of setting node images to Per-Node Options
Signed-off-by: John McBride <jmcbride@vmware.com>
2022-03-26 09:45:00 -06:00
Sean McGinnis
86873c4812 Add workarounds for Docker Desktop cgroupv2
This adds some detail to the known issues for those using Docker Desktop
and trying to deploy a k8s version prior to 1.19. Newer Docker Desktop
releases instantiate a VM that defaults to cgroupv2, which was not
supported by those k8s releases.

This gives the user the options of either downgrading their Docker
Desktop to an older release that still used cgroupv1, or using the newer
configuration option introduced in Docker Desktop 4.4.2 for forcing the
VM back to cgroupv1.

Signed-off-by: Sean McGinnis <sean.mcginnis@gmail.com>
2022-03-23 14:51:55 -05:00
Federico Paolinelli
a96317dc70 Pin metallb to the last stable version
We are in the process of transitioning metallb's configuration from
configmap to crds, and the main branch is just half way through it.
Here we instruct users to consume the latest stable release that uses
the configmap for configuring it.

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
2022-03-21 10:49:56 +01:00
Yu.Bozhong
c7676df40b docs: revert description 2022-03-17 13:23:28 +00:00
Yu.Bozhong
67dad84166 docs: update "stableVersion" to 0.12.0 2022-03-16 06:42:23 +00:00
iamtodor
c91a736e7f issue #2669: improve note visibility 2022-03-12 15:40:16 +01:00
Kubernetes Prow Robot
b4ab02cffb Merge pull request #2660 from NikhilSharmaWe/issuesDoc
updated doc for known issues
2022-03-08 05:58:33 -08:00
Nikhil Sharma
c05ba45806 updated doc for known issues 2022-03-08 18:38:50 +05:30
Benjamin Elder
94f892adb7 update banner to support humanitarian aid for ukraine 2022-03-07 12:24:44 -08:00
Benjamin Elder
21d6d4d00c Merge pull request #2646 from stmcginnis/delete-nonexistent
Add note to quick start about idempotent deletes
2022-03-04 11:25:11 -08:00
Tim Geoghegan
a237e3d07d Remove obsolete step from metallb guide
According to the [metallb 0.10.0 release notes](https://metallb.universe.tf/release-notes/#version-0-10-0), it is no longer necessary to manually create the secret `metallb-system/memberlist` if deploying from the manifests linked to in this guide.
2022-03-03 16:14:29 -08:00
Sean McGinnis
c085ec14f4 Add note to quick start about idempotent deletes
While reviewing kind issues, I noticed there seems to be a regularly
recurring problem with users expecting `kind delete cluster foo` to
fail if there is not a cluster named `foo` present.

We intentionally do not fail in this case. The delete command is
idempotent, and should be able to be run repeatedly without erroring.
This is very useful in clean up scripts, and many users rely on this
behavior.

It also makes things somewhat declarative in that you are saying "I
don't want a cluster named foo", and `kind` helpfully confirms that
there is no cluster named "foo".

To try to avoid some of these repeated issues being filed, this adds a
note to the quick start docs in the "Deleting a Cluster" section to
point out that this is the expected behavior. This also helps new users
to know that they can depend on this behavior if they are scripting
things with kind.

Signed-off-by: Sean McGinnis <sean.mcginnis@gmail.com>
2022-02-24 15:54:37 -06:00
Kubernetes Prow Robot
676f31dd58 Merge pull request #2584 from simon-geard/patch-1
Document known issue around BTRFS
2022-02-06 08:16:50 -08:00
Chao Dai
bfce9c8ec2 Local registry example uses port 5001 to be more mac friendly 2022-02-04 16:52:04 -08:00
Kubernetes Prow Robot
666b3368ea Merge pull request #2603 from gAmUssA/docs/ingress-kong
added Kong ingress example
2022-01-28 06:48:30 -08:00
Viktor Gamov
18dbede261 added Kong ingress example 2022-01-27 11:17:36 -05:00
Benjamin Elder
fef94ad4fe minor follow-up tweaks to kind-with-registry.sh 2022-01-25 10:27:02 -08:00
Sean McGinnis
90eef3afb4 Local registry: only attach network if missing
The example script for creating a kind cluster with a local registry
will connect the container to the "kind" network. The first time the
local registry is created, this is fine and is what is needed. On
subsequent runs to create new clusters, if the local registry container
has already been set up, the command to attach to the "kind" network
will emit an error message to the create output that can be confusing.

This updates the example script to do a basic check of the registry
containers network configuration. If the kind network appears to be
already connected, then the script will not attempt to connect it again.

Signed-off-by: Sean McGinnis <sean.mcginnis@gmail.com>
2022-01-24 16:29:06 -06:00
Lubomir I. Ivanov
26de74a756 handle "master" label/taint changes for kubeadm 1.24
As per the kubeadm KEP for "master" label/taint changes:
- kubeadm 1.24 nodes will only have the "control-plane" label.
- kubeadm 1.24 nodes will have both the "master"
and "control-plane" taints.
- kubeadm 1.25 nodes will have only the "control-plane" taint

Adapt kind to these changes and add TODOs with links
for the tracking issue in k-sigs/kind.
2022-01-17 16:04:33 +02:00
Leonardo Pistone
f9e5788ced Fix broken link in known issues 2022-01-12 13:01:24 +01:00
Simon Geard
749e30e3e7 Improved wording for "Failed to get rootfs info"
Added a little more explanation about identifying the device to be mounted, since some variations need to deal with symlinked device names.
2022-01-12 20:46:23 +13:00
Simon Geard
bcba1113d1 Document known issue around BTRFS
Following discussions under issue #2411, documenting problem with finding rootfs
device with BTRFS (and maybe other unrecognised filesystems), along with the
workaround of adding devices as extra mounts.

Also threw in a quick reminder at the top of the page about how to obtain logs
if cluster creation fails.
2022-01-11 19:56:22 +13:00
Kris Johnstone
80b3021fc5 Fixed install command on index and readme. 2021-12-09 22:29:07 +10:00
Hu Shuai
1c729cc907 Fix a small typo
Signed-off-by: Hu Shuai <hus.fnst@fujitsu.com>
2021-11-18 16:51:02 +08:00
Benjamin Elder
fe36fad651 re-organize install guide and add more details 2021-11-15 14:12:30 -08:00
Peter Valdemar Mørch
90097e282a examples/kind-with-registry.sh now also works with other than reg_port='5000'
kind-registry is accessed from inside docker, so
regardless of what port is used when starting it with:

    -p "127.0.0.1:${reg_port}:5000"

It must always be accessed as kind-registry:5000 and not
kind-registry:${reg_port}
2021-09-30 01:51:32 +02:00