Why wouldn't the node app start? I don't follow. And if the node up doesn't start, Kubernetes will restart it.
The doc just says it is not guaranteed (like when mounting a volume) that the hook will be executed and finished before starting the container. It may or it may not happen, no guarantees. And this was a docker limitation some time ago, at least. On Friday, September 29, 2017, Simone D'Andreta <simone.dandr...@gmail.com> wrote: > Thanks a lot, I will try with the postStart first and then I will retry > with the volumeMount. One question on the postStart though. The doc says > that there is no guarantee the hook will execute before the entrypoint. > Does it mean that if I have i.e. a nodejs app which has an entrypoint 'npm > start' defined in the Dockerfile and the hook will execute at the end, my > nodeapp won't start? > Cheers > Simone > > > Il giorno giovedì 28 settembre 2017 00:04:01 UTC+2, Rodrigo Campos ha > scritto: >> >> Not sure that will work, try step by step. >> >> Start creating the file in some dir in /etc/ and then try to just have >> the file in /etc/ (probably with subpath or something like that), and then >> ten try to use it mount it as /etc/resolv.conf >> >> Any example of mounting the configmap as a volume will do the first step. >> I'd start like that. >> >> Another hack you can try, if this is only for a POC and not will be used >> in the final solution, is using postStart hook that just overrides/appends >> to /etc/resolv.conf. >> >> This las option might be more hackish but easier to just try. >> >> On Wednesday, September 27, 2017, Simone D'Andreta <simone....@gmail.com> >> wrote: >> >>> I can't try today unfortunately but that's definitely the issue, I will >>> have to test it to an environment where I can reach the consul subnets. >>> As per what I am trying to achieve (and that's perfectly fine if we >>> cannot find a viable solution, it is a proof of concept after all) I need a >>> way to have different nameservers per namespace or pod. It was suggested >>> before that I could do it via volumeMounts, by creating a new resolv.conf >>> and copying it over the resolv.conf of the pod. I tried but I couldn't get >>> it working, but I believe I am doing something wrong when mounting.. do you >>> have any example I can use and adapt to my needs? >>> Thanks >>> Simone >>> >>> Il giorno mercoledì 27 settembre 2017 15:14:59 UTC+2, Rodrigo Campos ha >>> scritto: >>>> >>>> Can you ping the IP? There might not be any route to that subnet? Have >>>> you tried/checked that? >>>> >>>> And as far as I know, there is no way. Im not 100% sure what problem >>>> you are trying to solve, exactly, though. You can have a service type >>>> external, configure kube dns stub domains, but having **the same stub >>>> domains** resolve to different NS servers according to the kubernetes >>>> namespace the query is executed doesn't seem supported. Not sure it's >>>> something useful besides your setup, either :-/ >>>> >>>> You can probably patch kubedns or something, but not sure it's worth >>>> the effort. >>>> >>>> On Wednesday, September 27, 2017, Simone D'Andreta < >>>> simone....@gmail.com> wrote: >>>> >>>>> Ah yeah that's a typo.. it's setup as consul.service.domain.io but I >>>>> don't know why I cannot ping it - are the service and the endpoint >>>>> properly >>>>> declared? >>>>> As per the link you provided - I used the stubDomain and gave the >>>>> domain.io name a list of Consul IPs - all good, but this will >>>>> overwrite the kube-dns configmap in the kube-system namespace so the new >>>>> dns resolution will be per node. I need that per namespace or pod. >>>>> Is there anyway I can do that? >>>>> Hope it's clear and thanks a lot for your help. >>>>> Simone >>>>> >>>>> Il giorno martedì 26 settembre 2017 22:30:12 UTC+2, Rodrigo Campos ha >>>>> scritto: >>>>>> >>>>>> What I tried to say is using this: http://blog.kubernetes.i >>>>>> o/2017/04/configuring-private-dns-zones-upstream-nameservers >>>>>> -kubernetes.html?m=1 >>>>>> >>>>>> in kube-dns configuration. Not sure how your consul name is and, with >>>>>> all you said in the previous mail, a service type external will help. >>>>>> >>>>>> As not even able to ping, not sure what you mean. The service has >>>>>> nothing to do with the domain you want to ping, right? Or is that a typo? >>>>>> >>>>>> On Tuesday, September 26, 2017, Simone D'Andreta < >>>>>> simone....@gmail.com> wrote: >>>>>> >>>>>>> It creates records such as myservice.service.domain.io, so your >>>>>>> application must be able to contact a dns forwarder which has the zone >>>>>>> for >>>>>>> that domain.io. >>>>>>> What I am using at the moment are stubdomains to include the >>>>>>> domain.io but it's at cluster level. What I need to do is to solve >>>>>>> different consul names per namespace or pod. >>>>>>> I tried to use a service definition as follows: >>>>>>> >>>>>>> kind: Service >>>>>>> apiVersion: v1 >>>>>>> metadata: >>>>>>> name: consul-resolution >>>>>>> namespace: default >>>>>>> spec: >>>>>>> type: ExternalName >>>>>>> externalName: consul.service.domain.io >>>>>>> >>>>>>> And an endpoint: >>>>>>> kind: Endpoints >>>>>>> apiVersion: v1 >>>>>>> metadata: >>>>>>> name: consulresolution >>>>>>> subsets: >>>>>>> - addresses: >>>>>>> - ip: 10.24.7.26 >>>>>>> ports: >>>>>>> - port: 8300 >>>>>>> >>>>>>> But I am not even able to ping consul.service.cnqr.io.. any idea? >>>>>>> Thanks >>>>>>> >>>>>>> Il giorno martedì 26 settembre 2017 16:03:16 UTC+2, Rodrigo Campos >>>>>>> ha scritto: >>>>>>>> >>>>>>>> Sorry, never used consul and I don't follow what you said. >>>>>>>> >>>>>>>> Does it create records like <service name>.k8s-service that won't >>>>>>>> work with just a k8s external type service? >>>>>>>> >>>>>>>> Then it might be possible to say to kube dns to use some upstream >>>>>>>> to some domains, probably? I've not played with it, as I don't need >>>>>>>> it. But >>>>>>>> I'd guess something like that might be possible to do. And use >>>>>>>> different >>>>>>>> domains on apps that need to query different consul clusters? >>>>>>>> >>>>>>>> On Tuesday, September 26, 2017, Simone D'Andreta < >>>>>>>> simone....@gmail.com> wrote: >>>>>>>> >>>>>>>>> I am afraid it won't work. I will be able to solve >>>>>>>>> consul.service.domain but I won't be able to solve external services >>>>>>>>> registered within consul, such as mydatabase.service.domain because I >>>>>>>>> need >>>>>>>>> a NS record.. unless I can use that CNAME as a NS record, but I don't >>>>>>>>> think >>>>>>>>> it's the right approach.. >>>>>>>>> >>>>>>>>> >>>>>>>>> Il giorno martedì 26 settembre 2017 10:21:13 UTC+2, Simone >>>>>>>>> D'Andreta ha scritto: >>>>>>>>>> >>>>>>>>>> Hi Rodrigo, >>>>>>>>>> ideally we would need this per pod, but I can give it a try with >>>>>>>>>> creating a service per namespace. >>>>>>>>>> Thanks for the hint, I will let you know how it goes. >>>>>>>>>> Simone >>>>>>>>>> >>>>>>>>>> Il giorno lunedì 25 settembre 2017 18:34:07 UTC+2, Rodrigo Campos >>>>>>>>>> ha scritto: >>>>>>>>>>> >>>>>>>>>>> Sorry, I must be missing something. But if you want to resolve >>>>>>>>>>> to different consul clusters in different kubernetes namespaces, >>>>>>>>>>> can't you >>>>>>>>>>> just use a service type external on each? >>>>>>>>>>> >>>>>>>>>>> You create a service, named as you want them to contact, and is >>>>>>>>>>> per ns and returns a CNAME. >>>>>>>>>>> >>>>>>>>>>> Wouldn't that do the trick? >>>>>>>>>>> >>>>>>>>>>> On Monday, September 25, 2017, Simone D'Andreta < >>>>>>>>>>> simone....@gmail.com> wrote: >>>>>>>>>>> >>>>>>>>>>>> I need to be able to overwrite the resolv.conf per pods. If I >>>>>>>>>>>> tweak the kube-dns configmap, I will have additional nameservers >>>>>>>>>>>> per node, >>>>>>>>>>>> not per pods. >>>>>>>>>>>> The scenario is: I have a kubernetes cluster which is shared >>>>>>>>>>>> between different teams, and each team has his own namespace to >>>>>>>>>>>> deploy >>>>>>>>>>>> pods. Anyway these pods must be able to communicate with different >>>>>>>>>>>> consul >>>>>>>>>>>> clusters which are in different environments. Since they are in >>>>>>>>>>>> different >>>>>>>>>>>> envs, we need to point to different DNS. Since pods get dns >>>>>>>>>>>> resolutions >>>>>>>>>>>> from the nodes, but the nodes are shared, we need a way to >>>>>>>>>>>> overwrite the >>>>>>>>>>>> dns settings per pods. >>>>>>>>>>>> I know this is a bad practice - I get what Tim said above in >>>>>>>>>>>> this thread - but this is just a proof of concept and we'd like to >>>>>>>>>>>> know >>>>>>>>>>>> whether there is a way to do this (the cleaner the better :D) >>>>>>>>>>>> Thanks >>>>>>>>>>>> Simone >>>>>>>>>>>> >>>>>>>>>>>> Il giorno lunedì 25 settembre 2017 15:15:43 UTC+2, Rodrigo >>>>>>>>>>>> Campos ha scritto: >>>>>>>>>>>>> >>>>>>>>>>>>> Can you explain what do you what to achieve? >>>>>>>>>>>>> >>>>>>>>>>>>> Maybe changing the configmap kube-dns uses it's enough (and is >>>>>>>>>>>>> prepared to be changed easily, now). >>>>>>>>>>>>> >>>>>>>>>>>>> On Monday, September 25, 2017, Simone D'Andreta < >>>>>>>>>>>>> simone....@gmail.com> wrote: >>>>>>>>>>>>> >>>>>>>>>>>>>> Hi Tim, >>>>>>>>>>>>>> I know what you mean and that's definitely a big issue on our >>>>>>>>>>>>>> side. This is for us more a proof of concept to understand if we >>>>>>>>>>>>>> can go >>>>>>>>>>>>>> this way. Since I am not a big expert with Kubernetes, I wanted >>>>>>>>>>>>>> to know if >>>>>>>>>>>>>> there are solutions I haven't considered that might solve my >>>>>>>>>>>>>> problem. >>>>>>>>>>>>>> That said, I thank you a lot for your explanations here. I >>>>>>>>>>>>>> found something that can help me, though it sets dns names at >>>>>>>>>>>>>> node level - >>>>>>>>>>>>>> not per pod: >>>>>>>>>>>>>> https://kubernetes.io/docs/tasks/administer-cluster/dns-cust >>>>>>>>>>>>>> om-nameservers/ >>>>>>>>>>>>>> If I include the different IPs in the stub domains I >>>>>>>>>>>>>> definitely should get an answer for the service discovery part. >>>>>>>>>>>>>> Not ideal, >>>>>>>>>>>>>> but I think better than mounting and overriding the resolv.conf. >>>>>>>>>>>>>> Cheers >>>>>>>>>>>>>> Simone >>>>>>>>>>>>>> >>>>>>>>>>>>>> Il giorno venerdì 22 settembre 2017 19:10:01 UTC+2, Tim >>>>>>>>>>>>>> Hockin ha scritto: >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> you're trying to mount a directory (emptyDir) onto a file >>>>>>>>>>>>>>> (/etc/resolv.conf). Without seeing the error that is a wild >>>>>>>>>>>>>>> guess. I >>>>>>>>>>>>>>> can't stop you from doing this, but I strongly encourage you >>>>>>>>>>>>>>> to >>>>>>>>>>>>>>> re-read and internalize what I wrote about multiple >>>>>>>>>>>>>>> nameserver >>>>>>>>>>>>>>> records. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> On Fri, Sep 22, 2017 at 6:19 AM, Simone D'Andreta >>>>>>>>>>>>>>> <simone....@gmail.com> wrote: >>>>>>>>>>>>>>> > I am trying to mount that volume but my container won't >>>>>>>>>>>>>>> start. I guess I am >>>>>>>>>>>>>>> > doing something wrong. This is the yaml >>>>>>>>>>>>>>> > apiVersion: extensions/v1beta1 >>>>>>>>>>>>>>> > kind: Deployment >>>>>>>>>>>>>>> > metadata: >>>>>>>>>>>>>>> > name: {{ template "fullname" . }} >>>>>>>>>>>>>>> > namespace: code >>>>>>>>>>>>>>> > labels: >>>>>>>>>>>>>>> > chart: "{{ .Chart.Name }}-{{ .Chart.Version | replace >>>>>>>>>>>>>>> "+" "_" }}" >>>>>>>>>>>>>>> > annotations: >>>>>>>>>>>>>>> > commitSHA: {{ .Chart.AppVersion }} >>>>>>>>>>>>>>> > isNotifiable : "true" >>>>>>>>>>>>>>> > spec: >>>>>>>>>>>>>>> > replicas: {{ .Values.replicaCount }} >>>>>>>>>>>>>>> > template: >>>>>>>>>>>>>>> > metadata: >>>>>>>>>>>>>>> > labels: >>>>>>>>>>>>>>> > app: {{ template "fullname" . }} >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > spec: >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > containers: >>>>>>>>>>>>>>> > - name: {{ .Chart.Name }} >>>>>>>>>>>>>>> > image: "{{ .Values.image.repository }}:{{ >>>>>>>>>>>>>>> .Values.image.tag }}" >>>>>>>>>>>>>>> > imagePullPolicy: {{ .Values.image.pullPolicy }} >>>>>>>>>>>>>>> > volumeMounts: >>>>>>>>>>>>>>> > - name: new-resolv >>>>>>>>>>>>>>> > mountPath: /etc/resolv.conf >>>>>>>>>>>>>>> > command: ["/bin/sh"] >>>>>>>>>>>>>>> > args: ["-c", "echo nameserver 10.24.26.102 > >>>>>>>>>>>>>>> /etc/resolv.conf"] >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > ports: >>>>>>>>>>>>>>> > - name: frontend >>>>>>>>>>>>>>> > containerPort: {{ .Values.port}} >>>>>>>>>>>>>>> > readinessProbe: >>>>>>>>>>>>>>> > httpGet: >>>>>>>>>>>>>>> > path: {{ .Values.lifecheck }} >>>>>>>>>>>>>>> > port: {{ .Values.port}} >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > volumes: >>>>>>>>>>>>>>> > - name: new-resolv >>>>>>>>>>>>>>> > emptyDir: {} >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > I am using helm to deploy so the variables get expanded >>>>>>>>>>>>>>> via Values.yaml or >>>>>>>>>>>>>>> > other template files. >>>>>>>>>>>>>>> > I think I am just not able to mount that volume properly.. >>>>>>>>>>>>>>> > Thanks >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > Il giorno giovedì 21 settembre 2017 19:21:39 UTC+2, Tim >>>>>>>>>>>>>>> Hockin ha scritto: >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> >> You'd have to craft a new file and mount it onto your >>>>>>>>>>>>>>> resolv.conf, >>>>>>>>>>>>>>> >> which makes it harder to "just add another line" because >>>>>>>>>>>>>>> you don't >>>>>>>>>>>>>>> >> have the base. >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> >> But more than that, what you're asking for is really >>>>>>>>>>>>>>> non-standard >>>>>>>>>>>>>>> >> behavior. You can't safely add a nameserver record to >>>>>>>>>>>>>>> resolv.conf >>>>>>>>>>>>>>> >> that produces different results. The behavior of DNS >>>>>>>>>>>>>>> resolvers varies >>>>>>>>>>>>>>> >> widely, and this will cause you pain eventually >>>>>>>>>>>>>>> (kubernetes used to do >>>>>>>>>>>>>>> >> this, it was bad). >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> >> Consider this - some resolvers ask all DNS servers in >>>>>>>>>>>>>>> parallel, and >>>>>>>>>>>>>>> >> take the first response. If one resolver can answer a >>>>>>>>>>>>>>> query and >>>>>>>>>>>>>>> >> another can't (NXDOMAIN), your app will sometimes get an >>>>>>>>>>>>>>> address and >>>>>>>>>>>>>>> >> will sometimes fail. This actually happens. >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> >> >>>>>>>>>>>>>>> >> On Thu, Sep 21, 2017 at 6:33 AM, Simone D'Andreta >>>>>>>>>>>>>>> >> <simone....@gmail.com> wrote: >>>>>>>>>>>>>>> >> > Bad news, my idea doesn't work. Could you explain me >>>>>>>>>>>>>>> more about the >>>>>>>>>>>>>>> >> > volumeMount? I know how to mount but I don't know how I >>>>>>>>>>>>>>> can effectively >>>>>>>>>>>>>>> >> > add >>>>>>>>>>>>>>> >> > a nameserver on that file. >>>>>>>>>>>>>>> >> > >>>>>>>>>>>>>>> >> > Thanks >>>>>>>>>>>>>>> >> > Simone >>>>>>>>>>>>>>> >> > >>>>>>>>>>>>>>> >> > >>>>>>>>>>>>>>> >> > Il giorno giovedì 21 settembre 2017 10:26:48 UTC+2, >>>>>>>>>>>>>>> Simone D'Andreta ha >>>>>>>>>>>>>>> >> > scritto: >>>>>>>>>>>>>>> >> >> >>>>>>>>>>>>>>> >> >> Hi Tim, >>>>>>>>>>>>>>> >> >> thanks for your answer. I don't actually need to >>>>>>>>>>>>>>> override all the >>>>>>>>>>>>>>> >> >> settings >>>>>>>>>>>>>>> >> >> in the resolv.conf, I just need to add another >>>>>>>>>>>>>>> nameserver at the top of >>>>>>>>>>>>>>> >> >> the >>>>>>>>>>>>>>> >> >> file. How about if I run a command in the pod such as: >>>>>>>>>>>>>>> >> >> >>>>>>>>>>>>>>> >> >> command: ['/bin/sh', '-c', 'echo 'nameserver x.y.z.w' >>>>>>>>>>>>>>> | cat - >>>>>>>>>>>>>>> >> >> /etc/resolv.conf > temp && mv temp /etc/resolv.conf'] >>>>>>>>>>>>>>> >> >> would it work? >>>>>>>>>>>>>>> >> >> Thanks >>>>>>>>>>>>>>> >> >> >>>>>>>>>>>>>>> >> >> Il giorno mercoledì 20 settembre 2017 17:29:16 UTC+2, >>>>>>>>>>>>>>> Tim Hockin ha >>>>>>>>>>>>>>> >> >> scritto: >>>>>>>>>>>>>>> >> >>> >>>>>>>>>>>>>>> >> >>> There's no supported way to do that, in part because >>>>>>>>>>>>>>> it would give up >>>>>>>>>>>>>>> >> >>> all of the Service names that kubernetes provides. I >>>>>>>>>>>>>>> don't know what >>>>>>>>>>>>>>> >> >>> would happen if you tried to volumeMount a file over >>>>>>>>>>>>>>> /etc/resolv.conf >>>>>>>>>>>>>>> >> >>> - might be worth a shot. >>>>>>>>>>>>>>> >> >>> >>>>>>>>>>>>>>> >> >>> On Wed, Sep 20, 2017 at 3:15 AM, Simone D'Andreta >>>>>>>>>>>>>>> >> >>> <simone....@gmail.com> wrote: >>>>>>>>>>>>>>> >> >>> > Hello, >>>>>>>>>>>>>>> >> >>> > I wanted to know if there is a way to override DNS >>>>>>>>>>>>>>> settings for pods >>>>>>>>>>>>>>> >> >>> > (not >>>>>>>>>>>>>>> >> >>> > per cluster). I tried to use HostAliases but it >>>>>>>>>>>>>>> only creates an A >>>>>>>>>>>>>>> >> >>> > record for >>>>>>>>>>>>>>> >> >>> > that entry. I basically need a NS record cause I >>>>>>>>>>>>>>> need to point to >>>>>>>>>>>>>>> >> >>> > different >>>>>>>>>>>>>>> >> >>> > Consul clusters and then Consul must be able to do >>>>>>>>>>>>>>> service >>>>>>>>>>>>>>> >> >>> > discovery. >>>>>>>>>>>>>>> >> >>> > So I >>>>>>>>>>>>>>> >> >>> > was thinking to change the resolv.conf for the pod >>>>>>>>>>>>>>> to use Consul for >>>>>>>>>>>>>>> >> >>> > specific requests. Any idea? >>>>>>>>>>>>>>> >> >>> > Thank you, >>>>>>>>>>>>>>> >> >>> > Simone >>>>>>>>>>>>>>> >> >>> > >>>>>>>>>>>>>>> >> >>> > -- >>>>>>>>>>>>>>> >> >>> > You received this message because you are >>>>>>>>>>>>>>> subscribed to the Google >>>>>>>>>>>>>>> >> >>> > Groups >>>>>>>>>>>>>>> >> >>> > "Kubernetes user discussion and Q&A" group. >>>>>>>>>>>>>>> >> >>> > To unsubscribe from this group and stop receiving >>>>>>>>>>>>>>> emails from it, >>>>>>>>>>>>>>> >> >>> > send >>>>>>>>>>>>>>> >> >>> > an >>>>>>>>>>>>>>> >> >>> > email to kubernetes-use...@googlegroups.com. >>>>>>>>>>>>>>> >> >>> > To post to this group, send email to >>>>>>>>>>>>>>> kubernet...@googlegroups.com. >>>>>>>>>>>>>>> >> >>> > Visit this group at >>>>>>>>>>>>>>> >> >>> > https://groups.google.com/group/kubernetes-users. >>>>>>>>>>>>>>> >> >>> > For more options, visit >>>>>>>>>>>>>>> https://groups.google.com/d/optout. >>>>>>>>>>>>>>> >> > >>>>>>>>>>>>>>> >> > -- >>>>>>>>>>>>>>> >> > You received this message because you are subscribed to >>>>>>>>>>>>>>> the Google >>>>>>>>>>>>>>> >> > Groups >>>>>>>>>>>>>>> >> > "Kubernetes user discussion and Q&A" group. >>>>>>>>>>>>>>> >> > To unsubscribe from this group and stop receiving >>>>>>>>>>>>>>> emails from it, send >>>>>>>>>>>>>>> >> > an >>>>>>>>>>>>>>> >> > email to kubernetes-use...@googlegroups.com. >>>>>>>>>>>>>>> >> > To post to this group, send email to >>>>>>>>>>>>>>> kubernet...@googlegroups.com. >>>>>>>>>>>>>>> >> > Visit this group at https://groups.google.com/grou >>>>>>>>>>>>>>> p/kubernetes-users. >>>>>>>>>>>>>>> >> > For more options, visit https://groups.google.com/d/op >>>>>>>>>>>>>>> tout. >>>>>>>>>>>>>>> > >>>>>>>>>>>>>>> > -- >>>>>>>>>>>>>>> > You received this message because you are subscribed to >>>>>>>>>>>>>>> the Google Groups >>>>>>>>>>>>>>> > "Kubernetes user discussion and Q&A" group. >>>>>>>>>>>>>>> > To unsubscribe from this group and stop receiving emails >>>>>>>>>>>>>>> from it, send an >>>>>>>>>>>>>>> > email to kubernetes-use...@googlegroups.com. >>>>>>>>>>>>>>> > To post to this group, send email to >>>>>>>>>>>>>>> kubernet...@googlegroups.com. >>>>>>>>>>>>>>> > Visit this group at https://groups.google.com/grou >>>>>>>>>>>>>>> p/kubernetes-users. >>>>>>>>>>>>>>> > For more options, visit https://groups.google.com/d/optout. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> >>>>>>>>>>>>>> -- >>>>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>>>> Google Groups "Kubernetes user discussion and Q&A" group. >>>>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>>>> it, send an email to kubernetes-users+unsubscribe@g >>>>>>>>>>>>>> ooglegroups.com. >>>>>>>>>>>>>> To post to this group, send email to >>>>>>>>>>>>>> kubernetes-users@googlegroups.com. >>>>>>>>>>>>>> Visit this group at https://groups.google.com/grou >>>>>>>>>>>>>> p/kubernetes-users. >>>>>>>>>>>>>> For more options, visit https://groups.google.com/d/optout. >>>>>>>>>>>>>> >>>>>>>>>>>>> -- >>>>>>>>>>>> You received this message because you are subscribed to the >>>>>>>>>>>> Google Groups "Kubernetes user discussion and Q&A" group. >>>>>>>>>>>> To unsubscribe from this group and stop receiving emails from >>>>>>>>>>>> it, send an email to kubernetes-users+unsubscribe@g >>>>>>>>>>>> ooglegroups.com. >>>>>>>>>>>> To post to this group, send email to >>>>>>>>>>>> kubernetes-users@googlegroups.com. >>>>>>>>>>>> Visit this group at https://groups.google.com/grou >>>>>>>>>>>> p/kubernetes-users. >>>>>>>>>>>> For more options, visit https://groups.google.com/d/optout. >>>>>>>>>>>> >>>>>>>>>>> -- >>>>>>>>> You received this message because you are subscribed to the Google >>>>>>>>> Groups "Kubernetes user discussion and Q&A" group. >>>>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>>>> send an email to kubernetes-users+unsubscr...@googlegroups.com. >>>>>>>>> To post to this group, send email to >>>>>>>>> kubernetes-users@googlegroups.com. >>>>>>>>> Visit this group at https://groups.google.com/grou >>>>>>>>> p/kubernetes-users. >>>>>>>>> For more options, visit https://groups.google.com/d/optout. >>>>>>>>> >>>>>>>> -- >>>>>>> You received this message because you are subscribed to the Google >>>>>>> Groups "Kubernetes user discussion and Q&A" group. >>>>>>> To unsubscribe from this group and stop receiving emails from it, >>>>>>> send an email to kubernetes-users+unsubscr...@googlegroups.com. >>>>>>> To post to this group, send email to kubernetes-users@googlegroups. >>>>>>> com. >>>>>>> Visit this group at https://groups.google.com/group/kubernetes-users >>>>>>> . >>>>>>> For more options, visit https://groups.google.com/d/optout. >>>>>>> >>>>>> -- >>>>> You received this message because you are subscribed to the Google >>>>> Groups "Kubernetes user discussion and Q&A" group. >>>>> To unsubscribe from this group and stop receiving emails from it, send >>>>> an email to kubernetes-users+unsubscr...@googlegroups.com. >>>>> To post to this group, send email to kubernetes-users@googlegroups.com >>>>> . >>>>> Visit this group at https://groups.google.com/group/kubernetes-users. >>>>> For more options, visit https://groups.google.com/d/optout. >>>>> >>>> -- >>> You received this message because you are subscribed to the Google >>> Groups "Kubernetes user discussion and Q&A" group. >>> To unsubscribe from this group and stop receiving emails from it, send >>> an email to kubernetes-users+unsubscr...@googlegroups.com. >>> To post to this group, send email to kubernetes-users@googlegroups.com. >>> Visit this group at https://groups.google.com/group/kubernetes-users. >>> For more options, visit https://groups.google.com/d/optout. >>> >> -- > You received this message because you are subscribed to the Google Groups > "Kubernetes user discussion and Q&A" group. > To unsubscribe from this group and stop receiving emails from it, send an > email to kubernetes-users+unsubscr...@googlegroups.com > <javascript:_e(%7B%7D,'cvml','kubernetes-users%2bunsubscr...@googlegroups.com');> > . > To post to this group, send email to kubernetes-users@googlegroups.com > <javascript:_e(%7B%7D,'cvml','kubernetes-users@googlegroups.com');>. > Visit this group at https://groups.google.com/group/kubernetes-users. > For more options, visit https://groups.google.com/d/optout. > -- You received this message because you are subscribed to the Google Groups "Kubernetes user discussion and Q&A" group. To unsubscribe from this group and stop receiving emails from it, send an email to kubernetes-users+unsubscr...@googlegroups.com. To post to this group, send email to kubernetes-users@googlegroups.com. Visit this group at https://groups.google.com/group/kubernetes-users. For more options, visit https://groups.google.com/d/optout.