Merge pull request #1736 from tkatila/prep-0.30

Prep 0.30
This commit is contained in:
Mikko Ylinen 2024-05-15 09:51:55 +03:00 committed by GitHub
commit cc0296fd0e
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
66 changed files with 171 additions and 100 deletions

View File

@ -4,9 +4,9 @@ on:
push:
branches:
- main
- release-0.27
- release-0.28
- release-0.29
- release-0.30
permissions:
contents: read
@ -44,17 +44,6 @@ jobs:
rm -rf _work/venv
make vhtml
mv _build/html/* $HOME/output/
- uses: actions/checkout@v4
with:
fetch-depth: 0
ref: release-0.27
- name: Build release-0.27
run: |
GITHUB_SHA=$(git rev-parse HEAD)
export GITHUB_SHA
rm -rf _work/venv
make vhtml
mv _build/html $HOME/output/0.27
- uses: actions/checkout@v4
with:
fetch-depth: 0
@ -77,6 +66,17 @@ jobs:
rm -rf _work/venv
make vhtml
mv _build/html $HOME/output/0.29
- uses: actions/checkout@v4
with:
fetch-depth: 0
ref: release-0.30
- name: Build release-0.30
run: |
GITHUB_SHA=$(git rev-parse HEAD)
export GITHUB_SHA
rm -rf _work/venv
make vhtml
mv _build/html $HOME/output/0.30
- name: Deploy the docs
shell: bash
env:

View File

@ -137,7 +137,7 @@ clean:
ORG?=intel
REG?=$(ORG)/
TAG?=devel
TAG?=0.30.0
export TAG
ifeq ($(E2E_LEVEL), $(filter $(E2E_LEVEL), full))

View File

@ -8,8 +8,8 @@ This repository contains a framework for developing plugins for the Kubernetes
[device plugins framework](https://kubernetes.io/docs/concepts/extend-kubernetes/compute-storage-net/device-plugins/),
along with a number of device plugin implementations utilizing that framework.
The [v0.29 release](https://github.com/intel/intel-device-plugins-for-kubernetes/releases/latest)
is the latest feature release with its documentation available [here](https://intel.github.io/intel-device-plugins-for-kubernetes/0.29/).
The [v0.30 release](https://github.com/intel/intel-device-plugins-for-kubernetes/releases/latest)
is the latest feature release with its documentation available [here](https://intel.github.io/intel-device-plugins-for-kubernetes/0.30/).
Table of Contents
@ -23,7 +23,7 @@ Table of Contents
* [DLB device plugin](#dlb-device-plugin)
* [IAA device plugin](#iaa-device-plugin)
* [Device Plugins Operator](#device-plugins-operator)
* [XeLink XPU-Manager sidecar](#xelink-xpu-manager-sidecar)
* [XeLink XPU Manager sidecar](#xelink-xpu-manager-sidecar)
* [Demos](#demos)
* [Workload Authors](#workload-authors)
* [Developers](#developers)
@ -194,11 +194,11 @@ The [Device plugins operator README](cmd/operator/README.md) gives the installat
The [Device plugins Operator for OpenShift](https://github.com/intel/intel-technology-enabling-for-openshift) gives the installation and usage details for the operator available on [Red Hat OpenShift Container Platform](https://catalog.redhat.com/software/operators/detail/61e9f2d7b9cdd99018fc5736).
## XeLink XPU-Manager Sidecar
## XeLink XPU Manager Sidecar
To support interconnected GPUs in Kubernetes, XeLink sidecar is needed.
The [XeLink XPU-Manager sidecar README](cmd/xpumanager_sidecar/README.md) gives information how the sidecar functions and how to use it.
The [XeLink XPU Manager sidecar README](cmd/xpumanager_sidecar/README.md) gives information how the sidecar functions and how to use it.
## Demos
@ -252,9 +252,10 @@ matching Kubernetes versions are listed below:
| Branch | Kubernetes branch/version | Status |
|:------------------|:-------------------------------|:------------|
| release-0.30 | Kubernetes 1.30 branch v1.30.x | supported |
| release-0.29 | Kubernetes 1.29 branch v1.29.x | supported |
| release-0.28 | Kubernetes 1.28 branch v1.28.x | supported |
| release-0.27 | Kubernetes 1.27 branch v1.27.x | supported |
| release-0.27 | Kubernetes 1.27 branch v1.27.x | unsupported |
| release-0.26 | Kubernetes 1.26 branch v1.26.x | unsupported |
| release-0.25 | Kubernetes 1.25 branch v1.25.x | unsupported |
| release-0.24 | Kubernetes 1.24 branch v1.24.x | unsupported |

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_deviceplugin_operator"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-deviceplugin-operator'
LABEL summary='Intel® device plugin operator for Kubernetes'

View File

@ -57,7 +57,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
###
FROM ${FINAL_BASE}
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
COPY --from=builder /install_root /
COPY demo/dlb-init.sh /usr/local/bin/

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_dlb_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-dlb-plugin'
LABEL summary='Intel® DLB device plugin for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_dsa_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-dsa-plugin'
LABEL summary='Intel® DSA device plugin for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_fpga_admissionwebhook"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-fpga-admissionwebhook'
LABEL summary='Intel® FPGA admission controller webhook for Kubernetes'

View File

@ -90,7 +90,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
###
FROM ${FINAL_BASE}
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-fpga-initcontainer'
LABEL summary='Intel® FPGA programming CRI hook for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_fpga_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-fpga-plugin'
LABEL summary='Intel® FPGA device plugin for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_gpu_fakedev"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-gpu-fakedev'
LABEL summary='Fake device file generator for Intel® GPU plugin'

View File

@ -73,7 +73,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
###
FROM ${FINAL_BASE}
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-gpu-initcontainer'
LABEL summary='Intel® GPU NFD hook for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_gpu_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-gpu-plugin'
LABEL summary='Intel® GPU device plugin for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_iaa_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-iaa-plugin'
LABEL summary='Intel® IAA device plugin for Kubernetes'

View File

@ -57,7 +57,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
###
FROM ${FINAL_BASE}
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-qat-initcontainer'
LABEL summary='Intel® QAT initcontainer for Kubernetes'

View File

@ -60,7 +60,7 @@ RUN install -D ${DIR}/LICENSE /install_root/licenses/intel-device-plugins-for-ku
else mkdir -p /install_root/licenses/$CMD/go-licenses/ && cd licenses/$CMD && cp -r * /install_root/licenses/$CMD/go-licenses/ ; fi
FROM debian:unstable-slim
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-qat-plugin-kerneldrv'
LABEL summary='Intel® QAT device plugin kerneldrv for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_qat_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-qat-plugin'
LABEL summary='Intel® QAT device plugin for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_sgx_admissionwebhook"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-sgx-admissionwebhook'
LABEL summary='Intel® SGX admission controller webhook for Kubernetes'

View File

@ -73,7 +73,7 @@ RUN curl -SL https://github.com/landley/toybox/archive/refs/tags/$TOYBOX_VERSION
###
FROM ${FINAL_BASE}
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-sgx-initcontainer'
LABEL summary='Intel® SGX NFD hook for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_sgx_device_plugin"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-sgx-plugin'
LABEL summary='Intel® SGX device plugin for Kubernetes'

View File

@ -59,7 +59,7 @@ FROM ${FINAL_BASE}
COPY --from=builder /install_root /
ENTRYPOINT ["/usr/local/bin/intel_xpumanager_sidecar"]
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'
LABEL name='intel-xpumanager-sidecar'
LABEL summary='Intel® xpumanager sidecar'

View File

@ -1,3 +1,3 @@
LABEL vendor='Intel®'
LABEL version='devel'
LABEL version='0.30.0'
LABEL release='1'

View File

@ -5,9 +5,10 @@ Table of Contents
* [Introduction](#introduction)
* [Modes and Configuration Options](#modes-and-configuration-options)
* [Installation](#installation)
* [Install XPU-Manager with the Sidecar](#install-xpu-manager-with-the-sidecar)
* [Install Sidecar to an Existing XPU-Manager](#install-sidecar-to-an-existing-xpu-manager)
* [Install XPU Manager with the Sidecar](#install-xpu-manager-with-the-sidecar)
* [Install Sidecar to an Existing XPU Manager](#install-sidecar-to-an-existing-xpu-manager)
* [Verify Sidecar Functionality](#verify-sidecar-functionality)
* [Use HTTPS with XPU Manager](#use-https-with-xpu-manager)
## Introduction
@ -21,14 +22,14 @@ Intel GPUs can be interconnected via an XeLink. In some workloads it is benefici
| -interval | int | 10 | Interval for XeLink topology fetching and label writing (seconds, >= 1) |
| -startup-delay | int | 10 | Startup delay before the first topology fetching (seconds, >= 0) |
| -label-namespace | string | gpu.intel.com | Namespace or prefix for the labels. i.e. **gpu.intel.com**/xe-links |
| -allow-subdeviceless-links | bool | false | Include xelinks that are not on subdevices |
| -use-https | bool | false | Use HTTPS protocol when connecting to XPU-Manager |
| -allow-subdeviceless-links | bool | false | Include xelinks also for devices that do not have subdevices |
| -use-https | bool | false | Use HTTPS protocol when connecting to XPU Manager |
The sidecar also accepts a number of other arguments. Please use the -h option to see the complete list of options.
## Installation
The following sections detail how to obtain, deploy and test the XPU-Manager XeLink sidecar.
The following sections detail how to obtain, deploy and test the XPU Manager XeLink sidecar.
### Pre-built Images
@ -44,27 +45,27 @@ Note: Replace `<RELEASE_VERSION>` with the desired [release tag](https://github.
See [the development guide](../../DEVEL.md) for details if you want to deploy a customized version of the plugin.
#### Install XPU-Manager with the Sidecar
#### Install XPU Manager with the Sidecar
Install XPU-Manager daemonset with the XeLink sidecar
Install XPU Manager daemonset with the XeLink sidecar
```bash
$ kubectl apply -k 'https://github.com/intel/intel-device-plugins-for-kubernetes/deployments/xpumanager_sidecar?ref=<RELEASE_VERSION>'
```
Please see XPU-Manager Kubernetes files for additional info on [installation](https://github.com/intel/xpumanager/tree/master/deployment/kubernetes).
Please see XPU Manager Kubernetes files for additional info on [installation](https://github.com/intel/xpumanager/tree/master/deployment/kubernetes).
#### Install Sidecar to an Existing XPU-Manager
#### Install Sidecar to an Existing XPU Manager
Use patch to add sidecar into the XPU-Manager daemonset.
Use patch to add sidecar into the XPU Manager daemonset.
```bash
$ kubectl patch daemonsets.apps intel-xpumanager --patch-file 'https://github.com/intel/intel-device-plugins-for-kubernetes/deployments/xpumanager_sidecar/kustom/kustom_xpumanager.yaml?ref=<RELEASE_VERSION>'
```
NOTE: The sidecar patch will remove other resources from the XPU-Manager container. If your XPU-Manager daemonset is using, for example, the smarter device manager resources, those will be removed.
NOTE: The sidecar patch will remove other resources from the XPU Manager container. If your XPU Manager daemonset is using, for example, the smarter device manager resources, those will be removed.
#### Verify Sidecar Functionality
### Verify Sidecar Functionality
You can verify the sidecar's functionality by checking node's xe-links labels:
@ -72,3 +73,72 @@ You can verify the sidecar's functionality by checking node's xe-links labels:
$ kubectl get nodes -A -o=jsonpath="{range .items[*]}{.metadata.name},{.metadata.labels.gpu\.intel\.com\/xe-links}{'\n'}{end}"
master,0.0-1.0_0.1-1.1
```
### Use HTTPS with XPU Manager
XPU Manager can be configured to use HTTPS on the metrics interface. For the gunicorn sidecar, cert and key files have to be added to the command:
```
- command:
- gunicorn
...
- --certfile=/certs/tls.crt
- --keyfile=/certs/tls.key
...
- xpum_rest_main:main()
```
The gunicorn container will also need the tls.crt and tls.key files within the container. For example:
```
containers:
- name: python-exporter
volumeMounts:
- mountPath: /certs
name: certs
readOnly: true
volumes:
- name: certs
secret:
defaultMode: 420
secretName: xpum-server-cert
```
In this case, the secret providing the certificate and key is called `xpum-server-cert`.
The certificate and key can be [added manually to a secret](https://kubernetes.io/docs/reference/kubectl/generated/kubectl_create/kubectl_create_secret_tls/). Another way to achieve a secret is to leverage [cert-manager](https://cert-manager.io/).
<details>
<summary>Example for the Cert-manager objects</summary>
Cert-manager will create a self-signed certificate and the private key, and store them into a secret called `xpum-server-cert`.
```
apiVersion: cert-manager.io/v1
kind: Issuer
metadata:
name: selfsigned-issuer
spec:
selfSigned: {}
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: serving-cert
spec:
dnsNames:
- xpum.svc
- xpum.svc.cluster.local
issuerRef:
kind: Issuer
name: selfsigned-issuer
secretName: xpum-server-cert
```
</details>
For the XPU Manager sidecar, `use-https` has to be added to the arguments. Then the sidecar will leverage HTTPS with the connection to the metrics interface.
```
args:
- -v=2
- -use-https
```

View File

@ -6,7 +6,7 @@ spec:
restartPolicy: Never
containers:
- name: dlb-libdlb-demo-pf-pod
image: intel/dlb-libdlb-demo:devel
image: intel/dlb-libdlb-demo:0.30.0
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@ -6,7 +6,7 @@ spec:
restartPolicy: Never
containers:
- name: pf
image: intel/dlb-libdlb-demo:devel
image: intel/dlb-libdlb-demo:0.30.0
imagePullPolicy: IfNotPresent
resources:
limits:
@ -18,7 +18,7 @@ spec:
cpu: 1
memory: 200Mi
- name: vf
image: intel/dlb-libdlb-demo:devel
image: intel/dlb-libdlb-demo:0.30.0
imagePullPolicy: IfNotPresent
resources:
limits:

View File

@ -6,7 +6,7 @@ spec:
restartPolicy: Never
containers:
- name: dlb-libdlb-demo-vf-pod
image: intel/dlb-libdlb-demo:devel
image: intel/dlb-libdlb-demo:0.30.0
command: [ "sh", "-c", "/usr/local/bin/dir_traffic -n 8 -w epoll -d $(ls /dev/dlb* | sed 's/\\/dev\\/dlb//')" ]
imagePullPolicy: IfNotPresent
resources:

View File

@ -7,7 +7,7 @@ metadata:
spec:
containers:
- name: dsa-accel-config-demo
image: intel/accel-config-demo:devel
image: intel/accel-config-demo:0.30.0
imagePullPolicy: IfNotPresent
workingDir: "/usr/libexec/accel-config/test/"
command:

View File

@ -7,7 +7,7 @@ metadata:
spec:
containers:
- name: iaa-accel-config-demo
image: intel/accel-config-demo:devel
image: intel/accel-config-demo:0.30.0
workingDir: "/usr/libexec/accel-config/test/"
command:
- "./iaa_user_test_runner.sh"

View File

@ -13,7 +13,7 @@ spec:
restartPolicy: Never
containers:
- name: intelfpga-demo-job-1
image: intel/opae-nlb-demo:devel
image: intel/opae-nlb-demo:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
capabilities:

View File

@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
image: intel/opae-nlb-demo:devel
image: intel/opae-nlb-demo:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
capabilities:

View File

@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: test-container
image: intel/opae-nlb-demo:devel
image: intel/opae-nlb-demo:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
capabilities:

View File

@ -21,7 +21,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-dlb-plugin:devel
image: intel/intel-dlb-plugin:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
readOnlyRootFilesystem: true

View File

@ -7,7 +7,7 @@ spec:
spec:
initContainers:
- name: intel-dlb-initcontainer
image: intel/intel-dlb-initcontainer:devel
image: intel/intel-dlb-initcontainer:0.30.0
securityContext:
readOnlyRootFilesystem: true
privileged: true

View File

@ -21,7 +21,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-dsa-plugin:devel
image: intel/intel-dsa-plugin:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
seLinuxOptions:

View File

@ -12,7 +12,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-idxd-config-initcontainer:devel
image: intel/intel-idxd-config-initcontainer:0.30.0
securityContext:
seLinuxOptions:
type: "container_device_plugin_init_t"

View File

@ -16,7 +16,7 @@ spec:
control-plane: controller-manager
spec:
containers:
- image: intel/intel-fpga-admissionwebhook:devel
- image: intel/intel-fpga-admissionwebhook:0.30.0
imagePullPolicy: IfNotPresent
name: manager
securityContext:

View File

@ -16,7 +16,7 @@ spec:
spec:
initContainers:
- name: intel-fpga-initcontainer
image: intel/intel-fpga-initcontainer:devel
image: intel/intel-fpga-initcontainer:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
readOnlyRootFilesystem: true
@ -33,7 +33,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-fpga-plugin:devel
image: intel/intel-fpga-plugin:0.30.0
imagePullPolicy: IfNotPresent
args:
- -mode=af

View File

@ -24,7 +24,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: status.hostIP
image: intel/intel-gpu-plugin:devel
image: intel/intel-gpu-plugin:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
seLinuxOptions:

View File

@ -6,7 +6,7 @@ spec:
restartPolicy: Never
containers:
- name: testcontainer
image: intel/intel-extension-for-tensorflow:latest
image: intel/intel-extension-for-tensorflow:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
allowPrivilegeEscalation: false

View File

@ -21,7 +21,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-iaa-plugin:devel
image: intel/intel-iaa-plugin:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
seLinuxOptions:

View File

@ -14,7 +14,7 @@ spec:
fieldPath: spec.nodeName
- name: DEVICE_TYPE
value: "iaa"
image: intel/intel-idxd-config-initcontainer:devel
image: intel/intel-idxd-config-initcontainer:0.30.0
securityContext:
seLinuxOptions:
type: "container_device_plugin_init_t"

View File

@ -27,7 +27,7 @@ spec:
manager: intel-deviceplugin-operator
spec:
containers:
- image: docker.io/intel/intel-deviceplugin-operator:devel
- image: docker.io/intel/intel-deviceplugin-operator:0.30.0
imagePullPolicy: IfNotPresent
name: manager
livenessProbe:

View File

@ -5,7 +5,7 @@ metadata:
alm-examples: '[]'
capabilities: Seamless Upgrades
categories: Drivers and plugins
containerImage: docker.io/intel/intel-deviceplugin-operator:0.25.0
containerImage: docker.io/intel/intel-deviceplugin-operator:0.30.0
createdAt: "2022-11-09"
description: This operator is a Kubernetes custom controller whose goal is to
serve the installation and lifecycle management of Intel device plugins for

View File

@ -9,8 +9,8 @@ metadata:
# annotations:
# container.apparmor.security.beta.kubernetes.io/intel-dlb-plugin: unconfined
spec:
image: intel/intel-dlb-plugin:0.29.0
initImage: intel/intel-dlb-initcontainer:0.29.0
image: intel/intel-dlb-plugin:0.30.0
initImage: intel/intel-dlb-initcontainer:0.30.0
logLevel: 4
nodeSelector:
intel.feature.node.kubernetes.io/dlb: 'true'

View File

@ -3,8 +3,8 @@ kind: DsaDevicePlugin
metadata:
name: dsadeviceplugin-sample
spec:
image: intel/intel-dsa-plugin:0.29.0
initImage: intel/intel-idxd-config-initcontainer:0.29.0
image: intel/intel-dsa-plugin:0.30.0
initImage: intel/intel-idxd-config-initcontainer:0.30.0
sharedDevNum: 10
logLevel: 4
nodeSelector:

View File

@ -3,8 +3,8 @@ kind: FpgaDevicePlugin
metadata:
name: fpgadeviceplugin-sample
spec:
image: intel/intel-fpga-plugin:0.29.0
initImage: intel/intel-fpga-initcontainer:0.29.0
image: intel/intel-fpga-plugin:0.30.0
initImage: intel/intel-fpga-initcontainer:0.30.0
mode: region
logLevel: 4
nodeSelector:

View File

@ -3,7 +3,7 @@ kind: GpuDevicePlugin
metadata:
name: gpudeviceplugin-sample
spec:
image: intel/intel-gpu-plugin:0.29.0
image: intel/intel-gpu-plugin:0.30.0
sharedDevNum: 10
logLevel: 4
enableMonitoring: true

View File

@ -3,8 +3,8 @@ kind: IaaDevicePlugin
metadata:
name: iaadeviceplugin-sample
spec:
image: intel/intel-iaa-plugin:0.29.0
initImage: intel/intel-idxd-config-initcontainer:0.29.0
image: intel/intel-iaa-plugin:0.30.0
initImage: intel/intel-idxd-config-initcontainer:0.30.0
sharedDevNum: 10
logLevel: 4
nodeSelector:

View File

@ -9,8 +9,8 @@ metadata:
# annotations:
# container.apparmor.security.beta.kubernetes.io/intel-qat-plugin: unconfined
spec:
image: intel/intel-qat-plugin:0.29.0
initImage: intel/intel-qat-initcontainer:0.29.0
image: intel/intel-qat-plugin:0.30.0
initImage: intel/intel-qat-initcontainer:0.30.0
dpdkDriver: vfio-pci
kernelVfDrivers:
- c6xxvf

View File

@ -3,7 +3,7 @@ kind: SgxDevicePlugin
metadata:
name: sgxdeviceplugin-sample
spec:
image: intel/intel-sgx-plugin:0.29.0
image: intel/intel-sgx-plugin:0.30.0
enclaveLimit: 110
provisionLimit: 110
logLevel: 4

View File

@ -5,7 +5,7 @@ metadata:
spec:
containers:
- name: crypto-perf
image: intel/crypto-perf:devel
image: intel/crypto-perf:0.30.0
imagePullPolicy: IfNotPresent
command: [ "/bin/bash", "-c", "--" ]
args: [ "while true; do sleep 300000; done;" ]

View File

@ -19,7 +19,7 @@ spec:
readOnlyRootFilesystem: true
allowPrivilegeEscalation: false
privileged: true
image: intel/intel-qat-plugin:devel
image: intel/intel-qat-plugin:0.30.0
imagePullPolicy: IfNotPresent
args: ["-mode", "kernel"]
volumeMounts:

View File

@ -25,7 +25,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-qat-plugin:devel
image: intel/intel-qat-plugin:0.30.0
securityContext:
seLinuxOptions:
type: "container_device_plugin_t"

View File

@ -12,7 +12,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: intel/intel-qat-initcontainer:devel
image: intel/intel-qat-initcontainer:0.30.0
securityContext:
readOnlyRootFilesystem: true
privileged: true

View File

@ -16,7 +16,7 @@ spec:
control-plane: controller-manager
spec:
containers:
- image: intel/intel-sgx-admissionwebhook:devel
- image: intel/intel-sgx-admissionwebhook:0.30.0
imagePullPolicy: IfNotPresent
name: manager
securityContext:

View File

@ -14,7 +14,7 @@ spec:
containers:
-
name: intelsgx-demo-job-1
image: intel/sgx-sdk-demo:devel
image: intel/sgx-sdk-demo:0.30.0
imagePullPolicy: IfNotPresent
workingDir: "/opt/intel/sgx-sample-app/"
command: ["/opt/intel/sgx-sample-app/sgx-sample-app"]

View File

@ -7,7 +7,7 @@ spec:
spec:
containers:
- name: intelsgx-demo-job-1
image: intel/sgx-sdk-demo:devel
image: intel/sgx-sdk-demo:0.30.0
volumeMounts:
- name: qplconf
mountPath: /etc/sgx_default_qcnl.conf

View File

@ -16,7 +16,7 @@ spec:
automountServiceAccountToken: false
containers:
- name: intel-sgx-plugin
image: intel/intel-sgx-plugin:devel
image: intel/intel-sgx-plugin:0.30.0
securityContext:
seLinuxOptions:
type: "container_device_plugin_t"

View File

@ -7,7 +7,7 @@ spec:
spec:
initContainers:
- name: intel-sgx-initcontainer
image: intel/intel-sgx-initcontainer:devel
image: intel/intel-sgx-initcontainer:0.30.0
imagePullPolicy: IfNotPresent
securityContext:
readOnlyRootFilesystem: true

View File

@ -16,7 +16,7 @@ spec:
serviceAccountName: sgx-plugin
containers:
- name: sgx-node-init
image: intel/intel-sgx-initcontainer:devel
image: intel/intel-sgx-initcontainer:0.30.0
imagePullPolicy: IfNotPresent
command:
- /usr/local/bin/sgx-sw/intel-sgx-epchook

View File

@ -13,7 +13,7 @@ spec:
path: "/etc/kubernetes/node-feature-discovery/features.d/"
containers:
- name: xelink-sidecar
image: intel/intel-xpumanager-sidecar:devel
image: intel/intel-xpumanager-sidecar:0.30.0
imagePullPolicy: Always
args:
- -v=2

View File

@ -181,7 +181,7 @@ func TestNewDaemonSetFPGA(t *testing.T) {
plugin := &devicepluginv1.FpgaDevicePlugin{
Spec: devicepluginv1.FpgaDevicePluginSpec{
InitImage: "intel/intel-fpga-initcontainer:devel",
InitImage: "intel/intel-fpga-initcontainer:0.30.0",
},
}
plugin.Name = "testing"

View File

@ -38,7 +38,7 @@ import (
)
var (
ImageMinVersion = versionutil.MustParseSemantic("0.29.0")
ImageMinVersion = versionutil.MustParseSemantic("0.30.0")
)
const (

View File

@ -136,7 +136,7 @@ func runDevicePlugin(ctx context.Context, fmw *framework.Framework, pluginKustom
func runTestCase(ctx context.Context, fmw *framework.Framework, pluginMode, podResource, cmd1, cmd2 string) {
resource := v1.ResourceName(podResource)
image := "intel/opae-nlb-demo:devel"
image := "intel/opae-nlb-demo:0.30.0"
ginkgo.By("submitting a pod requesting correct FPGA resources")

View File

@ -204,7 +204,7 @@ func runCpaSampleCode(ctx context.Context, f *framework.Framework, runTests int,
Containers: []v1.Container{
{
Name: "openssl-qat-engine",
Image: "intel/openssl-qat-engine:devel",
Image: "intel/openssl-qat-engine:0.30.0",
ImagePullPolicy: "IfNotPresent",
Command: []string{"cpa_sample_code", "runTests=" + strconv.Itoa(runTests), "signOfLife=1"},
SecurityContext: &v1.SecurityContext{

View File

@ -100,7 +100,7 @@ func describe() {
Containers: []v1.Container{
{
Name: "testcontainer",
Image: "intel/sgx-sdk-demo:devel",
Image: "intel/sgx-sdk-demo:0.30.0",
WorkingDir: "/opt/intel/sgx-sample-app/",
Command: []string{"/opt/intel/sgx-sample-app/sgx-sample-app"},
Resources: v1.ResourceRequirements{