Not sure that will work, try step by step.

Start creating the file in some dir in /etc/ and then try to just have the
file in /etc/ (probably with subpath or something like that), and then ten
try to use it mount it as /etc/resolv.conf

Any example of mounting the configmap as a volume will do the first step.
I'd start like that.

Another hack you can try, if this is only for a POC and not will be used in
the final solution, is using postStart hook that just overrides/appends to
/etc/resolv.conf.

This las option might be more hackish but easier to just try.

On Wednesday, September 27, 2017, Simone D'Andreta <
simone.dandr...@gmail.com> wrote:

> I can't try today unfortunately but that's definitely the issue, I will
> have to test it to an environment where I can reach the consul subnets.
> As per what I am trying to achieve (and that's perfectly fine if we cannot
> find a viable solution, it is a proof of concept after all) I need a way to
> have different nameservers per namespace or pod. It was suggested before
> that I could do it via volumeMounts, by creating a new resolv.conf and
> copying it over the resolv.conf of the pod. I tried but I couldn't get it
> working, but I believe I am doing something wrong when mounting.. do you
> have any example I can use and adapt to my needs?
> Thanks
> Simone
>
> Il giorno mercoledì 27 settembre 2017 15:14:59 UTC+2, Rodrigo Campos ha
> scritto:
>>
>> Can you ping the IP? There might not be any route to that subnet? Have
>> you tried/checked that?
>>
>> And as far as I know, there is no way. Im not 100% sure what problem you
>> are trying to solve, exactly, though. You can have a service type external,
>> configure kube dns stub domains, but having **the same stub domains**
>> resolve to different NS servers according to the kubernetes namespace the
>> query is executed doesn't seem supported. Not sure it's something useful
>> besides your setup, either :-/
>>
>> You can probably patch kubedns or something, but not sure it's worth the
>> effort.
>>
>> On Wednesday, September 27, 2017, Simone D'Andreta <simone....@gmail.com>
>> wrote:
>>
>>> Ah yeah that's a typo.. it's setup as consul.service.domain.io but I
>>> don't know why I cannot ping it - are the service and the endpoint properly
>>> declared?
>>> As per the link you provided - I used the stubDomain and gave the
>>> domain.io name a list of Consul IPs - all good, but this will overwrite
>>> the kube-dns configmap in the kube-system namespace so the new dns
>>> resolution will be per node. I need that per namespace or pod.
>>> Is there anyway I can do that?
>>> Hope it's clear and thanks a lot for your help.
>>> Simone
>>>
>>> Il giorno martedì 26 settembre 2017 22:30:12 UTC+2, Rodrigo Campos ha
>>> scritto:
>>>>
>>>> What I tried to say is using this: http://blog.kubernetes.i
>>>> o/2017/04/configuring-private-dns-zones-upstream-nameservers
>>>> -kubernetes.html?m=1
>>>>
>>>> in kube-dns configuration. Not sure how your consul name is and, with
>>>> all you said in the previous mail, a service type external will help.
>>>>
>>>> As not even able to ping, not sure what you mean. The service has
>>>> nothing to do with the domain you want to ping, right? Or is that a typo?
>>>>
>>>> On Tuesday, September 26, 2017, Simone D'Andreta <simone....@gmail.com>
>>>> wrote:
>>>>
>>>>> It creates records such as myservice.service.domain.io, so your
>>>>> application must be able to contact a dns forwarder which has the zone for
>>>>> that domain.io.
>>>>> What I am using at the moment are stubdomains to include the domain.io
>>>>> but it's at cluster level. What I need to do is to solve different consul
>>>>> names per namespace or pod.
>>>>> I tried to use a service definition as follows:
>>>>>
>>>>> kind: Service
>>>>> apiVersion: v1
>>>>> metadata:
>>>>>   name: consul-resolution
>>>>>   namespace: default
>>>>> spec:
>>>>>   type: ExternalName
>>>>>   externalName: consul.service.domain.io
>>>>>
>>>>> And an endpoint:
>>>>> kind: Endpoints
>>>>> apiVersion: v1
>>>>> metadata:
>>>>>   name: consulresolution
>>>>> subsets:
>>>>>   - addresses:
>>>>>       - ip: 10.24.7.26
>>>>>     ports:
>>>>>       - port: 8300
>>>>>
>>>>> But I am not even able to ping consul.service.cnqr.io.. any idea?
>>>>> Thanks
>>>>>
>>>>> Il giorno martedì 26 settembre 2017 16:03:16 UTC+2, Rodrigo Campos ha
>>>>> scritto:
>>>>>>
>>>>>> Sorry, never used consul and I don't follow what you said.
>>>>>>
>>>>>> Does it create records like <service name>.k8s-service that won't
>>>>>> work with just a k8s external type service?
>>>>>>
>>>>>> Then it might be possible to say to kube dns to use some upstream to
>>>>>> some domains, probably? I've not played with it, as I don't need it. But
>>>>>> I'd guess something like that might be possible to do. And use different
>>>>>> domains on apps that need to query different consul clusters?
>>>>>>
>>>>>> On Tuesday, September 26, 2017, Simone D'Andreta <
>>>>>> simone....@gmail.com> wrote:
>>>>>>
>>>>>>> I am afraid it won't work. I will be able to solve
>>>>>>> consul.service.domain but I won't be able to solve external services
>>>>>>> registered within consul, such as mydatabase.service.domain because I 
>>>>>>> need
>>>>>>> a NS record.. unless I can use that CNAME as a NS record, but I don't 
>>>>>>> think
>>>>>>> it's the right approach..
>>>>>>>
>>>>>>>
>>>>>>> Il giorno martedì 26 settembre 2017 10:21:13 UTC+2, Simone D'Andreta
>>>>>>> ha scritto:
>>>>>>>>
>>>>>>>> Hi Rodrigo,
>>>>>>>> ideally we would need this per pod, but I can give it a try with
>>>>>>>> creating a service per namespace.
>>>>>>>> Thanks for the hint, I will let you know how it goes.
>>>>>>>> Simone
>>>>>>>>
>>>>>>>> Il giorno lunedì 25 settembre 2017 18:34:07 UTC+2, Rodrigo Campos
>>>>>>>> ha scritto:
>>>>>>>>>
>>>>>>>>> Sorry, I must be missing something. But if you want to resolve to
>>>>>>>>> different consul clusters in different kubernetes namespaces, can't 
>>>>>>>>> you
>>>>>>>>> just use a service type external on each?
>>>>>>>>>
>>>>>>>>> You create a service, named as you want them to contact, and is
>>>>>>>>> per ns and returns a CNAME.
>>>>>>>>>
>>>>>>>>> Wouldn't that do the trick?
>>>>>>>>>
>>>>>>>>> On Monday, September 25, 2017, Simone D'Andreta <
>>>>>>>>> simone....@gmail.com> wrote:
>>>>>>>>>
>>>>>>>>>> I need to be able to overwrite the resolv.conf per pods. If I
>>>>>>>>>> tweak the kube-dns configmap, I will have additional nameservers per 
>>>>>>>>>> node,
>>>>>>>>>> not per pods.
>>>>>>>>>> The scenario is: I have a  kubernetes cluster which is shared
>>>>>>>>>> between different teams, and each team has his own namespace to 
>>>>>>>>>> deploy
>>>>>>>>>> pods. Anyway these pods must be able to communicate with different 
>>>>>>>>>> consul
>>>>>>>>>> clusters which are in different environments. Since they are in 
>>>>>>>>>> different
>>>>>>>>>> envs, we need to point to different DNS. Since pods get dns 
>>>>>>>>>> resolutions
>>>>>>>>>> from the nodes, but the nodes are shared, we need a way to overwrite 
>>>>>>>>>> the
>>>>>>>>>> dns settings per pods.
>>>>>>>>>> I know this is a bad practice - I get what Tim said above in this
>>>>>>>>>> thread - but this is just a proof of concept and we'd like to know 
>>>>>>>>>> whether
>>>>>>>>>> there is a way to do this (the cleaner the better :D)
>>>>>>>>>> Thanks
>>>>>>>>>> Simone
>>>>>>>>>>
>>>>>>>>>> Il giorno lunedì 25 settembre 2017 15:15:43 UTC+2, Rodrigo Campos
>>>>>>>>>> ha scritto:
>>>>>>>>>>>
>>>>>>>>>>> Can you explain what do you what to achieve?
>>>>>>>>>>>
>>>>>>>>>>> Maybe changing the configmap kube-dns uses it's enough (and is
>>>>>>>>>>> prepared to be changed easily, now).
>>>>>>>>>>>
>>>>>>>>>>> On Monday, September 25, 2017, Simone D'Andreta <
>>>>>>>>>>> simone....@gmail.com> wrote:
>>>>>>>>>>>
>>>>>>>>>>>> Hi Tim,
>>>>>>>>>>>> I know what you mean and that's definitely a big issue on our
>>>>>>>>>>>> side. This is for us more a proof of concept to understand if we 
>>>>>>>>>>>> can go
>>>>>>>>>>>> this way. Since I am not a big expert with Kubernetes, I wanted to 
>>>>>>>>>>>> know if
>>>>>>>>>>>> there are solutions I haven't considered that might solve my 
>>>>>>>>>>>> problem.
>>>>>>>>>>>> That said, I thank you a lot for your explanations here. I
>>>>>>>>>>>>  found something that can help me, though it sets dns names at 
>>>>>>>>>>>> node level -
>>>>>>>>>>>> not per pod:
>>>>>>>>>>>> https://kubernetes.io/docs/tasks/administer-cluster/dns-cust
>>>>>>>>>>>> om-nameservers/
>>>>>>>>>>>> If I include the different IPs in the stub domains I definitely
>>>>>>>>>>>> should get an answer for the service discovery part. Not ideal, 
>>>>>>>>>>>> but I think
>>>>>>>>>>>> better than mounting and overriding the resolv.conf.
>>>>>>>>>>>> Cheers
>>>>>>>>>>>> Simone
>>>>>>>>>>>>
>>>>>>>>>>>> Il giorno venerdì 22 settembre 2017 19:10:01 UTC+2, Tim Hockin
>>>>>>>>>>>> ha scritto:
>>>>>>>>>>>>>
>>>>>>>>>>>>> you're trying to mount a directory (emptyDir) onto a file
>>>>>>>>>>>>> (/etc/resolv.conf).  Without seeing the error that is a wild
>>>>>>>>>>>>> guess.  I
>>>>>>>>>>>>> can't stop you from doing this, but I strongly encourage you
>>>>>>>>>>>>> to
>>>>>>>>>>>>> re-read and internalize what I wrote about multiple nameserver
>>>>>>>>>>>>> records.
>>>>>>>>>>>>>
>>>>>>>>>>>>> On Fri, Sep 22, 2017 at 6:19 AM, Simone D'Andreta
>>>>>>>>>>>>> <simone....@gmail.com> wrote:
>>>>>>>>>>>>> > I am trying to mount that volume but my container won't
>>>>>>>>>>>>> start. I guess I am
>>>>>>>>>>>>> > doing something wrong. This is the yaml
>>>>>>>>>>>>> > apiVersion: extensions/v1beta1
>>>>>>>>>>>>> > kind: Deployment
>>>>>>>>>>>>> > metadata:
>>>>>>>>>>>>> >   name: {{ template "fullname" . }}
>>>>>>>>>>>>> >   namespace: code
>>>>>>>>>>>>> >   labels:
>>>>>>>>>>>>> >     chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace
>>>>>>>>>>>>> "+" "_" }}"
>>>>>>>>>>>>> >   annotations:
>>>>>>>>>>>>> >     commitSHA: {{ .Chart.AppVersion }}
>>>>>>>>>>>>> >     isNotifiable : "true"
>>>>>>>>>>>>> > spec:
>>>>>>>>>>>>> >   replicas: {{ .Values.replicaCount }}
>>>>>>>>>>>>> >   template:
>>>>>>>>>>>>> >     metadata:
>>>>>>>>>>>>> >       labels:
>>>>>>>>>>>>> >         app: {{ template "fullname" . }}
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >     spec:
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >       containers:
>>>>>>>>>>>>> >       - name: {{ .Chart.Name }}
>>>>>>>>>>>>> >         image: "{{ .Values.image.repository }}:{{
>>>>>>>>>>>>> .Values.image.tag }}"
>>>>>>>>>>>>> >         imagePullPolicy: {{ .Values.image.pullPolicy }}
>>>>>>>>>>>>> >         volumeMounts:
>>>>>>>>>>>>> >         - name: new-resolv
>>>>>>>>>>>>> >           mountPath: /etc/resolv.conf
>>>>>>>>>>>>> >         command: ["/bin/sh"]
>>>>>>>>>>>>> >         args: ["-c", "echo nameserver 10.24.26.102 >
>>>>>>>>>>>>> /etc/resolv.conf"]
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >         ports:
>>>>>>>>>>>>> >           - name: frontend
>>>>>>>>>>>>> >             containerPort: {{ .Values.port}}
>>>>>>>>>>>>> >         readinessProbe:
>>>>>>>>>>>>> >           httpGet:
>>>>>>>>>>>>> >             path: {{ .Values.lifecheck }}
>>>>>>>>>>>>> >             port: {{ .Values.port}}
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >       volumes:
>>>>>>>>>>>>> >       - name: new-resolv
>>>>>>>>>>>>> >         emptyDir: {}
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > I am using helm to deploy so the variables get expanded via
>>>>>>>>>>>>> Values.yaml or
>>>>>>>>>>>>> > other template files.
>>>>>>>>>>>>> > I think I am just not able to mount that volume properly..
>>>>>>>>>>>>> > Thanks
>>>>>>>>>>>>> >
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > Il giorno giovedì 21 settembre 2017 19:21:39 UTC+2, Tim
>>>>>>>>>>>>> Hockin ha scritto:
>>>>>>>>>>>>> >>
>>>>>>>>>>>>> >> You'd have to craft a new file and mount it onto your
>>>>>>>>>>>>> resolv.conf,
>>>>>>>>>>>>> >> which makes it harder to "just add another line" because
>>>>>>>>>>>>> you don't
>>>>>>>>>>>>> >> have the base.
>>>>>>>>>>>>> >>
>>>>>>>>>>>>> >> But more than that, what you're asking for is really
>>>>>>>>>>>>> non-standard
>>>>>>>>>>>>> >> behavior.  You can't safely add a nameserver record to
>>>>>>>>>>>>> resolv.conf
>>>>>>>>>>>>> >> that produces different results.  The behavior of DNS
>>>>>>>>>>>>> resolvers varies
>>>>>>>>>>>>> >> widely, and this will cause you pain eventually (kubernetes
>>>>>>>>>>>>> used to do
>>>>>>>>>>>>> >> this, it was bad).
>>>>>>>>>>>>> >>
>>>>>>>>>>>>> >> Consider this - some resolvers ask all DNS servers in
>>>>>>>>>>>>> parallel, and
>>>>>>>>>>>>> >> take the first response.  If one resolver can answer a
>>>>>>>>>>>>> query and
>>>>>>>>>>>>> >> another can't (NXDOMAIN), your app will sometimes get an
>>>>>>>>>>>>> address and
>>>>>>>>>>>>> >> will sometimes fail.  This actually happens.
>>>>>>>>>>>>> >>
>>>>>>>>>>>>> >>
>>>>>>>>>>>>> >> On Thu, Sep 21, 2017 at 6:33 AM, Simone D'Andreta
>>>>>>>>>>>>> >> <simone....@gmail.com> wrote:
>>>>>>>>>>>>> >> > Bad news, my idea doesn't work. Could you explain me more
>>>>>>>>>>>>> about the
>>>>>>>>>>>>> >> > volumeMount? I know how to mount but I don't know how I
>>>>>>>>>>>>> can effectively
>>>>>>>>>>>>> >> > add
>>>>>>>>>>>>> >> > a nameserver on that file.
>>>>>>>>>>>>> >> >
>>>>>>>>>>>>> >> > Thanks
>>>>>>>>>>>>> >> > Simone
>>>>>>>>>>>>> >> >
>>>>>>>>>>>>> >> >
>>>>>>>>>>>>> >> > Il giorno giovedì 21 settembre 2017 10:26:48 UTC+2,
>>>>>>>>>>>>> Simone D'Andreta ha
>>>>>>>>>>>>> >> > scritto:
>>>>>>>>>>>>> >> >>
>>>>>>>>>>>>> >> >> Hi Tim,
>>>>>>>>>>>>> >> >> thanks for your answer. I don't actually need to
>>>>>>>>>>>>> override all the
>>>>>>>>>>>>> >> >> settings
>>>>>>>>>>>>> >> >> in the resolv.conf, I just need to add another
>>>>>>>>>>>>> nameserver at the top of
>>>>>>>>>>>>> >> >> the
>>>>>>>>>>>>> >> >> file. How about if I run a command in the pod such as:
>>>>>>>>>>>>> >> >>
>>>>>>>>>>>>> >> >> command: ['/bin/sh', '-c', 'echo 'nameserver x.y.z.w' |
>>>>>>>>>>>>> cat -
>>>>>>>>>>>>> >> >> /etc/resolv.conf > temp && mv temp /etc/resolv.conf']
>>>>>>>>>>>>> >> >> would it work?
>>>>>>>>>>>>> >> >> Thanks
>>>>>>>>>>>>> >> >>
>>>>>>>>>>>>> >> >> Il giorno mercoledì 20 settembre 2017 17:29:16 UTC+2,
>>>>>>>>>>>>> Tim Hockin ha
>>>>>>>>>>>>> >> >> scritto:
>>>>>>>>>>>>> >> >>>
>>>>>>>>>>>>> >> >>> There's no supported way to do that, in part because it
>>>>>>>>>>>>> would give up
>>>>>>>>>>>>> >> >>> all of the Service names that kubernetes provides.  I
>>>>>>>>>>>>> don't know what
>>>>>>>>>>>>> >> >>> would happen if you tried to volumeMount a file over
>>>>>>>>>>>>> /etc/resolv.conf
>>>>>>>>>>>>> >> >>> - might be worth a shot.
>>>>>>>>>>>>> >> >>>
>>>>>>>>>>>>> >> >>> On Wed, Sep 20, 2017 at 3:15 AM, Simone D'Andreta
>>>>>>>>>>>>> >> >>> <simone....@gmail.com> wrote:
>>>>>>>>>>>>> >> >>> > Hello,
>>>>>>>>>>>>> >> >>> > I wanted to know if there is a way to override DNS
>>>>>>>>>>>>> settings for pods
>>>>>>>>>>>>> >> >>> > (not
>>>>>>>>>>>>> >> >>> > per cluster). I tried to use HostAliases but it only
>>>>>>>>>>>>> creates an A
>>>>>>>>>>>>> >> >>> > record for
>>>>>>>>>>>>> >> >>> > that entry. I basically need a NS record cause I need
>>>>>>>>>>>>> to point to
>>>>>>>>>>>>> >> >>> > different
>>>>>>>>>>>>> >> >>> > Consul clusters and then Consul must be able to do
>>>>>>>>>>>>> service
>>>>>>>>>>>>> >> >>> > discovery.
>>>>>>>>>>>>> >> >>> > So I
>>>>>>>>>>>>> >> >>> > was thinking to change the resolv.conf for the pod to
>>>>>>>>>>>>> use Consul for
>>>>>>>>>>>>> >> >>> > specific requests. Any idea?
>>>>>>>>>>>>> >> >>> > Thank you,
>>>>>>>>>>>>> >> >>> > Simone
>>>>>>>>>>>>> >> >>> >
>>>>>>>>>>>>> >> >>> > --
>>>>>>>>>>>>> >> >>> > You received this message because you are subscribed
>>>>>>>>>>>>> to the Google
>>>>>>>>>>>>> >> >>> > Groups
>>>>>>>>>>>>> >> >>> > "Kubernetes user discussion and Q&A" group.
>>>>>>>>>>>>> >> >>> > To unsubscribe from this group and stop receiving
>>>>>>>>>>>>> emails from it,
>>>>>>>>>>>>> >> >>> > send
>>>>>>>>>>>>> >> >>> > an
>>>>>>>>>>>>> >> >>> > email to kubernetes-use...@googlegroups.com.
>>>>>>>>>>>>> >> >>> > To post to this group, send email to
>>>>>>>>>>>>> kubernet...@googlegroups.com.
>>>>>>>>>>>>> >> >>> > Visit this group at
>>>>>>>>>>>>> >> >>> > https://groups.google.com/group/kubernetes-users.
>>>>>>>>>>>>> >> >>> > For more options, visit
>>>>>>>>>>>>> https://groups.google.com/d/optout.
>>>>>>>>>>>>> >> >
>>>>>>>>>>>>> >> > --
>>>>>>>>>>>>> >> > You received this message because you are subscribed to
>>>>>>>>>>>>> the Google
>>>>>>>>>>>>> >> > Groups
>>>>>>>>>>>>> >> > "Kubernetes user discussion and Q&A" group.
>>>>>>>>>>>>> >> > To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>> from it, send
>>>>>>>>>>>>> >> > an
>>>>>>>>>>>>> >> > email to kubernetes-use...@googlegroups.com.
>>>>>>>>>>>>> >> > To post to this group, send email to
>>>>>>>>>>>>> kubernet...@googlegroups.com.
>>>>>>>>>>>>> >> > Visit this group at https://groups.google.com/grou
>>>>>>>>>>>>> p/kubernetes-users.
>>>>>>>>>>>>> >> > For more options, visit https://groups.google.com/d/op
>>>>>>>>>>>>> tout.
>>>>>>>>>>>>> >
>>>>>>>>>>>>> > --
>>>>>>>>>>>>> > You received this message because you are subscribed to the
>>>>>>>>>>>>> Google Groups
>>>>>>>>>>>>> > "Kubernetes user discussion and Q&A" group.
>>>>>>>>>>>>> > To unsubscribe from this group and stop receiving emails
>>>>>>>>>>>>> from it, send an
>>>>>>>>>>>>> > email to kubernetes-use...@googlegroups.com.
>>>>>>>>>>>>> > To post to this group, send email to
>>>>>>>>>>>>> kubernet...@googlegroups.com.
>>>>>>>>>>>>> > Visit this group at https://groups.google.com/grou
>>>>>>>>>>>>> p/kubernetes-users.
>>>>>>>>>>>>> > For more options, visit https://groups.google.com/d/optout.
>>>>>>>>>>>>>
>>>>>>>>>>>> --
>>>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>>>> Google Groups "Kubernetes user discussion and Q&A" group.
>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from
>>>>>>>>>>>> it, send an email to kubernetes-users+unsubscribe@g
>>>>>>>>>>>> ooglegroups.com.
>>>>>>>>>>>> To post to this group, send email to
>>>>>>>>>>>> kubernetes-users@googlegroups.com.
>>>>>>>>>>>> Visit this group at https://groups.google.com/grou
>>>>>>>>>>>> p/kubernetes-users.
>>>>>>>>>>>> For more options, visit https://groups.google.com/d/optout.
>>>>>>>>>>>>
>>>>>>>>>>> --
>>>>>>>>>> You received this message because you are subscribed to the
>>>>>>>>>> Google Groups "Kubernetes user discussion and Q&A" group.
>>>>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>>>>> send an email to kubernetes-users+unsubscr...@googlegroups.com.
>>>>>>>>>> To post to this group, send email to
>>>>>>>>>> kubernetes-users@googlegroups.com.
>>>>>>>>>> Visit this group at https://groups.google.com/grou
>>>>>>>>>> p/kubernetes-users.
>>>>>>>>>> For more options, visit https://groups.google.com/d/optout.
>>>>>>>>>>
>>>>>>>>> --
>>>>>>> You received this message because you are subscribed to the Google
>>>>>>> Groups "Kubernetes user discussion and Q&A" group.
>>>>>>> To unsubscribe from this group and stop receiving emails from it,
>>>>>>> send an email to kubernetes-users+unsubscr...@googlegroups.com.
>>>>>>> To post to this group, send email to kubernetes-users@googlegroups.
>>>>>>> com.
>>>>>>> Visit this group at https://groups.google.com/group/kubernetes-users
>>>>>>> .
>>>>>>> For more options, visit https://groups.google.com/d/optout.
>>>>>>>
>>>>>> --
>>>>> You received this message because you are subscribed to the Google
>>>>> Groups "Kubernetes user discussion and Q&A" group.
>>>>> To unsubscribe from this group and stop receiving emails from it, send
>>>>> an email to kubernetes-users+unsubscr...@googlegroups.com.
>>>>> To post to this group, send email to kubernetes-users@googlegroups.com
>>>>> .
>>>>> Visit this group at https://groups.google.com/group/kubernetes-users.
>>>>> For more options, visit https://groups.google.com/d/optout.
>>>>>
>>>> --
>>> You received this message because you are subscribed to the Google
>>> Groups "Kubernetes user discussion and Q&A" group.
>>> To unsubscribe from this group and stop receiving emails from it, send
>>> an email to kubernetes-users+unsubscr...@googlegroups.com.
>>> To post to this group, send email to kubernetes-users@googlegroups.com.
>>> Visit this group at https://groups.google.com/group/kubernetes-users.
>>> For more options, visit https://groups.google.com/d/optout.
>>>
>> --
> You received this message because you are subscribed to the Google Groups
> "Kubernetes user discussion and Q&A" group.
> To unsubscribe from this group and stop receiving emails from it, send an
> email to kubernetes-users+unsubscr...@googlegroups.com
> <javascript:_e(%7B%7D,'cvml','kubernetes-users%2bunsubscr...@googlegroups.com');>
> .
> To post to this group, send email to kubernetes-users@googlegroups.com
> <javascript:_e(%7B%7D,'cvml','kubernetes-users@googlegroups.com');>.
> Visit this group at https://groups.google.com/group/kubernetes-users.
> For more options, visit https://groups.google.com/d/optout.
>

-- 
You received this message because you are subscribed to the Google Groups 
"Kubernetes user discussion and Q&A" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to kubernetes-users+unsubscr...@googlegroups.com.
To post to this group, send email to kubernetes-users@googlegroups.com.
Visit this group at https://groups.google.com/group/kubernetes-users.
For more options, visit https://groups.google.com/d/optout.

Reply via email to