This repository was archived by the owner on Dec 4, 2024. It is now read-only.
Releases: d2iq-archive/kubernetes-base-addons
Releases · d2iq-archive/kubernetes-base-addons
stable-1.16-2.2.1
Release Notes
stable-1.15-2.2.1, stable-1.16-2.2.1, stable-1.17-2.2.1
- Helm's
stable
chart repository will no longer be hosted by the CNCF at Google. This release only changes the chart repo url to use our fork of the upstream charts hosted at GitHub.
stable-1.15-2.2.1
Release Notes
stable-1.15-2.2.1, stable-1.16-2.2.1, stable-1.17-2.2.1
- Helm's
stable
chart repository will no longer be hosted by the CNCF at Google. This release only changes the chart repo url to use our fork of the upstream charts hosted at GitHub.
stable-1.18-2.5.0
stable-1.16-2.5.0, stable-1.17-2.5.0, stable-1.18-2.5.0
- Cert-manager
- use
delete
upgrade-strategy.
- use
- Fluent-bit:
- bump the fluent-bit app version to 1.5.6
- aws: utils: fix mem leak in flb_imds_request
- fix double free when destroying connections if the endpoint in unavailable
- remove noisy error introduced in v1.5.5
- fix deletion of pending connections in the destroy_queue (#538, @d2iq-dispatch)
- changes the update strategy to
delete
. (#574, @dkoshkin) - Upgrades fluent-bit to v1.5.7. See https://fluentbit.io/announcements/v1.5.7.
- Adds chart value
podLabels
. - Fix fluentbit configuration to unblock output buffer. (#590, @branden)
- bump the fluent-bit app version to 1.5.6
- Nvidia
- No need to specify nvidia-driver tag when using the default AMI for GPU nodes.
- Kibana
Preview
- Istio
- Bug Fixes
- Fixed HTTP match request without headers conflict
- Fixed Istio operator to watch multiple namespaces (Istio #26317)
- Fixed EDS cache when an endpoint appears after its service resource (Istio #26983)
- Fixed istioctl remove-from-mesh not removing init containers on CNI installations.
- Fixed istioctl add-to-mesh and remove-from-mesh commands from affecting OwnerReferences (Istio #26720)
- Fixed cleaning up of service information when the cluster secret is deleted
- Fixed egress gateway ports binding to 80⁄443 due to user permissions
- Fixed gateway listeners created with traffic direction outbound to be drained properly on exit
- Fixed headless services not updating listeners (Istio #26617)
- Fixed inaccurate endpointsPendingPodUpdate metric
- Fixed ingress SDS from not getting secret update (Istio #18912)
- Fixed ledger capacity size
- Fixed operator to update service monitor due to invalid permissions (Istio #26961)
- Fixed regression in gateway name resolution (Istio 26264)
- Fixed rotated certificates not being stored to /etc/istio-certs VolumeMount (Istio #26821)
- Fixed trust domain validation in transport socket level (Istio #26435)
- Improvements
- Added istioctl analyzer to detect when Destination Rules do not specify caCertificates (Istio #25652)
- Added missing telemetry.loadshedding.- options to mixer container arguments
- Improved specifying network for a cluster without meshNetworks also being configured
- Improved the cache readiness state with TTL (Istio #26418)
- Updated SDS timeout to fetch workload certificates to 0s
- Updated app_containers to use comma separated values for container specification
- Updated default protocol sniffing timeout to 5s (Istio #24379) (#516, @shaneutt)
- Bug Fixes
stable-1.17-2.5.0
stable-1.16-2.5.0, stable-1.17-2.5.0, stable-1.18-2.5.0
- Cert-manager
- use
delete
upgrade-strategy.
- use
- Fluent-bit:
- bump the fluent-bit app version to 1.5.6
- aws: utils: fix mem leak in flb_imds_request
- fix double free when destroying connections if the endpoint in unavailable
- remove noisy error introduced in v1.5.5
- fix deletion of pending connections in the destroy_queue (#538, @d2iq-dispatch)
- changes the update strategy to
delete
. (#574, @dkoshkin) - Upgrades fluent-bit to v1.5.7. See https://fluentbit.io/announcements/v1.5.7.
- Adds chart value
podLabels
. - Fix fluentbit configuration to unblock output buffer. (#590, @branden)
- bump the fluent-bit app version to 1.5.6
- Nvidia
- No need to specify nvidia-driver tag when using the default AMI for GPU nodes.
- Kibana
Preview
- Istio
- Bug Fixes
- Fixed HTTP match request without headers conflict
- Fixed Istio operator to watch multiple namespaces (Istio #26317)
- Fixed EDS cache when an endpoint appears after its service resource (Istio #26983)
- Fixed istioctl remove-from-mesh not removing init containers on CNI installations.
- Fixed istioctl add-to-mesh and remove-from-mesh commands from affecting OwnerReferences (Istio #26720)
- Fixed cleaning up of service information when the cluster secret is deleted
- Fixed egress gateway ports binding to 80⁄443 due to user permissions
- Fixed gateway listeners created with traffic direction outbound to be drained properly on exit
- Fixed headless services not updating listeners (Istio #26617)
- Fixed inaccurate endpointsPendingPodUpdate metric
- Fixed ingress SDS from not getting secret update (Istio #18912)
- Fixed ledger capacity size
- Fixed operator to update service monitor due to invalid permissions (Istio #26961)
- Fixed regression in gateway name resolution (Istio 26264)
- Fixed rotated certificates not being stored to /etc/istio-certs VolumeMount (Istio #26821)
- Fixed trust domain validation in transport socket level (Istio #26435)
- Improvements
- Added istioctl analyzer to detect when Destination Rules do not specify caCertificates (Istio #25652)
- Added missing telemetry.loadshedding.- options to mixer container arguments
- Improved specifying network for a cluster without meshNetworks also being configured
- Improved the cache readiness state with TTL (Istio #26418)
- Updated SDS timeout to fetch workload certificates to 0s
- Updated app_containers to use comma separated values for container specification
- Updated default protocol sniffing timeout to 5s (Istio #24379) (#516, @shaneutt)
- Bug Fixes
stable-1.16-2.5.0
stable-1.16-2.5.0, stable-1.17-2.5.0, stable-1.18-2.5.0
- Cert-manager
- use
delete
upgrade-strategy.
- use
- Fluent-bit:
- bump the fluent-bit app version to 1.5.6
- aws: utils: fix mem leak in flb_imds_request
- fix double free when destroying connections if the endpoint in unavailable
- remove noisy error introduced in v1.5.5
- fix deletion of pending connections in the destroy_queue (#538, @d2iq-dispatch)
- changes the update strategy to
delete
. (#574, @dkoshkin) - Upgrades fluent-bit to v1.5.7. See https://fluentbit.io/announcements/v1.5.7.
- Adds chart value
podLabels
. - Fix fluentbit configuration to unblock output buffer. (#590, @branden)
- bump the fluent-bit app version to 1.5.6
- Nvidia
- No need to specify nvidia-driver tag when using the default AMI for GPU nodes.
- Kibana
Preview
- Istio
- Bug Fixes
- Fixed HTTP match request without headers conflict
- Fixed Istio operator to watch multiple namespaces (Istio #26317)
- Fixed EDS cache when an endpoint appears after its service resource (Istio #26983)
- Fixed istioctl remove-from-mesh not removing init containers on CNI installations.
- Fixed istioctl add-to-mesh and remove-from-mesh commands from affecting OwnerReferences (Istio #26720)
- Fixed cleaning up of service information when the cluster secret is deleted
- Fixed egress gateway ports binding to 80⁄443 due to user permissions
- Fixed gateway listeners created with traffic direction outbound to be drained properly on exit
- Fixed headless services not updating listeners (Istio #26617)
- Fixed inaccurate endpointsPendingPodUpdate metric
- Fixed ingress SDS from not getting secret update (Istio #18912)
- Fixed ledger capacity size
- Fixed operator to update service monitor due to invalid permissions (Istio #26961)
- Fixed regression in gateway name resolution (Istio 26264)
- Fixed rotated certificates not being stored to /etc/istio-certs VolumeMount (Istio #26821)
- Fixed trust domain validation in transport socket level (Istio #26435)
- Improvements
- Added istioctl analyzer to detect when Destination Rules do not specify caCertificates (Istio #25652)
- Added missing telemetry.loadshedding.- options to mixer container arguments
- Improved specifying network for a cluster without meshNetworks also being configured
- Improved the cache readiness state with TTL (Istio #26418)
- Updated SDS timeout to fetch workload certificates to 0s
- Updated app_containers to use comma separated values for container specification
- Updated default protocol sniffing timeout to 5s (Istio #24379) (#516, @shaneutt)
- Bug Fixes
stable-1.17-2.4.0
Release Notes
stable-1.15-2.4.0, stable-1.16-2.4.0, stable-1.17-2.4.0
-
Istio:
-
The "kubernetes-service-monitor" service monitor has been removed. (#481, @gracedo)
-
Bumped Istio to v1.6.8:
- Fixed security issues:
- CVE-2020-12603: By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
- CVE-2020-12605: An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
- CVE-2020-8663: An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
- CVE-2020-12604: An attacker could cause increased memory usage when processing specially crafted packets.
- CVE-2020-15104: When validating TLS certificates, Envoy incorrectly allows a wildcard DNS Subject Alternative Name to apply to multiple subdomains. For example, with a SAN of .example.com, Envoy incorrectly allows nested.subdomain.example.com, when it should only allow subdomain.example.com.
- CVE-2020-16844: Callers to TCP services that have a defined Authorization Policies with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields will never be denied access.
- Other changes:
- Fixed return the proper source name after Mixer does a lookup by IP if multiple pods have the same IP.
- Improved the sidecar injection control based on revision at a per-pod level (Issue 24801)
- Improved istioctl validate to disallow unknown fields not included in the Open API specification (Issue 24860)
- Changed stsPort to sts_port in Envoy’s bootstrap file.
- Preserved existing WASM state schema for state objects to reference it later as needed.
- Added targetUri to stackdriver_grpc_service.
- Updated WASM state to log for Access Log Service.
- Increased default protocol detection timeout from 100 ms to 5 s (Issue 24379)
- Removed UDP port 53 from Istiod.
- Allowed setting status.sidecar.istio.io/port to zero (Issue 24722)
- Fixed EDS endpoint selection for subsets with no or empty label selector. (Issue 24969)
- Allowed k8s.overlays on BaseComponentSpec. (Issue 24476)
- Fixed istio-agent to create elliptical curve CSRs when ECC_SIGNATURE_ALGORITHM is set.
- Improved mapping of gRPC status codes into HTTP domain for telemetry.
- Fixed scaleTargetRef naming in HorizontalPodAutoscaler for Istiod (Issue 24809)
- Optimized performance in scenarios with large numbers of gateways. (Issue 25116)
- Fixed an issue where out of order events may cause the Istiod update queue to get stuck. This resulted in proxies with stale configuration.
- Fixed istioctl upgrade so that it no longer checks remote component versions when using --dry-run. (Issue 24865)
- Fixed long log messages for clusters with many gateways.
- Fixed outlier detection to only fire on user configured errors and not depend on success rate. (Issue 25220)
- Fixed demo profile to use port 15021 as the status port. (Issue #25626)
- Fixed Galley to properly handle errors from Kubernetes tombstones.
- Fixed an issue where manually enabling TLS/mTLS for communication between a sidecar and an egress gateway did not work. (Issue 23910)
- Fixed Bookinfo demo application to verify if a specified namespace exists and if not, use the default namespace.
- Added a label to the pilot_xds metric in order to give more information on data plane versions without scraping the data plane.
- Added CA_ADDR field to allow configuring the certificate authority address on the egress gateway configuration and fixed the istio-certs mount secret name.
- Updated Bookinfo demo application to latest versions of libraries.
- Updated Istio to disable auto mTLS when sending traffic to headless services without a sidecar.
- Fixed an issue which prevented endpoints not associated with pods from working. (Issue #25974) (#489, @shaneutt)
- Fixed security issues:
-
-
Traefik-forward-auth:
- Update traefik-foward-auth to 0.2.14
- Add an option to bypass tfa deployment (#456, @d2iq-dispatch)
-
Fixed an upgrade issue for several addons which would cause them to not be properly targeted for upgrade (#492, @shaneutt)
stable-1.16-2.4.0
Release Notes
stable-1.15-2.4.0, stable-1.16-2.4.0, stable-1.17-2.4.0
-
Istio:
-
The "kubernetes-service-monitor" service monitor has been removed. (#481, @gracedo)
-
Bumped Istio to v1.6.8:
- Fixed security issues:
- CVE-2020-12603: By sending a specially crafted packet, an attacker could cause Envoy to consume excessive amounts of memory when proxying HTTP/2 requests or responses.
- CVE-2020-12605: An attacker could cause Envoy to consume excessive amounts of memory when processing specially crafted HTTP/1.1 packets.
- CVE-2020-8663: An attacker could cause Envoy to exhaust file descriptors when accepting too many connections.
- CVE-2020-12604: An attacker could cause increased memory usage when processing specially crafted packets.
- CVE-2020-15104: When validating TLS certificates, Envoy incorrectly allows a wildcard DNS Subject Alternative Name to apply to multiple subdomains. For example, with a SAN of .example.com, Envoy incorrectly allows nested.subdomain.example.com, when it should only allow subdomain.example.com.
- CVE-2020-16844: Callers to TCP services that have a defined Authorization Policies with DENY actions using wildcard suffixes (e.g. *-some-suffix) for source principals or namespace fields will never be denied access.
- Other changes:
- Fixed return the proper source name after Mixer does a lookup by IP if multiple pods have the same IP.
- Improved the sidecar injection control based on revision at a per-pod level (Issue 24801)
- Improved istioctl validate to disallow unknown fields not included in the Open API specification (Issue 24860)
- Changed stsPort to sts_port in Envoy’s bootstrap file.
- Preserved existing WASM state schema for state objects to reference it later as needed.
- Added targetUri to stackdriver_grpc_service.
- Updated WASM state to log for Access Log Service.
- Increased default protocol detection timeout from 100 ms to 5 s (Issue 24379)
- Removed UDP port 53 from Istiod.
- Allowed setting status.sidecar.istio.io/port to zero (Issue 24722)
- Fixed EDS endpoint selection for subsets with no or empty label selector. (Issue 24969)
- Allowed k8s.overlays on BaseComponentSpec. (Issue 24476)
- Fixed istio-agent to create elliptical curve CSRs when ECC_SIGNATURE_ALGORITHM is set.
- Improved mapping of gRPC status codes into HTTP domain for telemetry.
- Fixed scaleTargetRef naming in HorizontalPodAutoscaler for Istiod (Issue 24809)
- Optimized performance in scenarios with large numbers of gateways. (Issue 25116)
- Fixed an issue where out of order events may cause the Istiod update queue to get stuck. This resulted in proxies with stale configuration.
- Fixed istioctl upgrade so that it no longer checks remote component versions when using --dry-run. (Issue 24865)
- Fixed long log messages for clusters with many gateways.
- Fixed outlier detection to only fire on user configured errors and not depend on success rate. (Issue 25220)
- Fixed demo profile to use port 15021 as the status port. (Issue #25626)
- Fixed Galley to properly handle errors from Kubernetes tombstones.
- Fixed an issue where manually enabling TLS/mTLS for communication between a sidecar and an egress gateway did not work. (Issue 23910)
- Fixed Bookinfo demo application to verify if a specified namespace exists and if not, use the default namespace.
- Added a label to the pilot_xds metric in order to give more information on data plane versions without scraping the data plane.
- Added CA_ADDR field to allow configuring the certificate authority address on the egress gateway configuration and fixed the istio-certs mount secret name.
- Updated Bookinfo demo application to latest versions of libraries.
- Updated Istio to disable auto mTLS when sending traffic to headless services without a sidecar.
- Fixed an issue which prevented endpoints not associated with pods from working. (Issue #25974) (#489, @shaneutt)
- Fixed security issues:
-
-
Traefik-forward-auth:
- Update traefik-foward-auth to 0.2.14
- Add an option to bypass tfa deployment (#456, @d2iq-dispatch)
-
Fixed an upgrade issue for several addons which would cause them to not be properly targeted for upgrade (#492, @shaneutt)
stable-1.17-2.3.0
stable-1.15-2.3.0, stable-1.16-2.3.0, stable-1.17-2.3.0
- Azuredisk-csi-driver:
- Cert-manager:
Issuer
namespace setableCertificate
namespace setable (#378, @sebbrandt87)
- Dex-k8s-authenticator:
- Elasticsearch-curator:
- version 5.8.1 (#374, @sebbrandt87)
- Added value
cronjob.startingDeadlineSeconds
: Amount of time to try reschedule job if we can't run on time (#447, @d2iq-dispatch)
- Elasticsearch-exporter:
- updated from 2.11 to 3.7.0
- Add a parameter for the elasticsearch-exporter: es.indices_settings as it is supported since version 1.0.4 (the elasticsearch-exporter chart is supporting the version 1.1.0)
- Update description for envFromSecret parameter in readme
- Feature flap the flag es.uri to allow fallback to env var ES_URI
- Allow setting environment variables with k8s secret information to support referencing already existing sensitive parameters.
- Add es.ssl.client.enabled value for better functionality readability
- Add option to disable client cert auth in Elasticsearch exporter
- Add the serviceMonitor targetLabels key as documented in the Prometheus Operator API
- Add log.level and log.format configs
- Add the ServiceMonitor metricRelabelings key as documented in the Prometheus Operator API
- Add sampleLimit configuration option (#449, @d2iq-dispatch)
- updated from 2.11 to 3.7.0
- Fluent-bit:
- Three different elasticsearch indicies created
- kubernetes_cluster-- (for container logs)
- kubernetes_audit-- (for audit logs from kube-apiserver)
- kubernetes_host-- (for all systemd host logs)
- version 1.5.2
- Kernel messages forwarded (#375, @sebbrandt87)
- apply meaningful aliases to plugins and their metrics. (#432, @branden)
- Three different elasticsearch indicies created
- Istio:
- Traefik-foward-auth:
- update to 0.2.14
- Add an option to bypass tfa deployment (#456, @d2iq-dispatch)
- update to 0.2.14
- Kibana:
- version 6.8.10 (#373, @sebbrandt87)
- Ops-portal:
- Fix: Unable to change ops-portal password (#379, @GoelDeepak)
- Prometheus:
- chore: bump chart to v9.3.1
- refactor!: (breaking change) version 9 of the helm chart removes the existing
additionalScrapeConfigsExternal
in favor ofadditionalScrapeConfigsSecret
. This change lets users specify the secret name and secret key to use for the additional scrape configuration of prometheus. - feat: add ingress configuration for Thanos sidecar, enabling external access from a centralized thanos querier running in another cluster
- feat: add scrape timeout config to service monitor to avoid timeouts on slow kubelets
- feat: add docker checksum option to improve security for deployed containers
- feat: add option to disable availability rules
- feat: enable scraping /metrics/resource for kubelet service
- feat: [prometheus] enable namespace overrides
- feat: [prometheus] allow additional volumes and volumeMounts
- feat: [alertmanager] add volume and volume mounts to spec
- feat: [alertmanager] add support for serviceAccount.annotations
- feat: [grafana] enable adding annotations to all default dashboard configmaps
- chore: bump prometheus to v2.18.2
- chore: bump alertmanager to v0.21.0
- chore: bump hyperkube to v1.16.12
- chore: bump grafana to v5.3.0
- fix: add missing grafana annotations to k8s-coredns dashboard
- fix: reduced CPU utilization and time lag for code_verb:apiserver_request_total:increase30d scrape
- fix: invalid image pull policy for the admission webhook patch
- fix: alert "KubeNodeUnreachable" no longer fires on an autoscaling scale-down event (#444, @samvantran)
- refactor!: (breaking change) version 9 of the helm chart removes the existing
- disable ServiceMonitors for kube-controller-manager and kube-scheduler. kubernetes has determined the ports that were used for these tests was insecure and has limited it to localhost only. This causes these specific tests to fail. The state of the controller-manager and scheduler pods are still tracked in general as pods. (#474, @dkoshkin)
- chore: bump chart to v9.3.1
stable-1.16-2.3.0
stable-1.15-2.3.0, stable-1.16-2.3.0, stable-1.17-2.3.0
- Azuredisk-csi-driver:
- Cert-manager:
Issuer
namespace setableCertificate
namespace setable (#378, @sebbrandt87)
- Dex-k8s-authenticator:
- Elasticsearch-curator:
- version 5.8.1 (#374, @sebbrandt87)
- Added value
cronjob.startingDeadlineSeconds
: Amount of time to try reschedule job if we can't run on time (#447, @d2iq-dispatch)
- Elasticsearch-exporter:
- updated from 2.11 to 3.7.0
- Add a parameter for the elasticsearch-exporter: es.indices_settings as it is supported since version 1.0.4 (the elasticsearch-exporter chart is supporting the version 1.1.0)
- Update description for envFromSecret parameter in readme
- Feature flap the flag es.uri to allow fallback to env var ES_URI
- Allow setting environment variables with k8s secret information to support referencing already existing sensitive parameters.
- Add es.ssl.client.enabled value for better functionality readability
- Add option to disable client cert auth in Elasticsearch exporter
- Add the serviceMonitor targetLabels key as documented in the Prometheus Operator API
- Add log.level and log.format configs
- Add the ServiceMonitor metricRelabelings key as documented in the Prometheus Operator API
- Add sampleLimit configuration option (#449, @d2iq-dispatch)
- updated from 2.11 to 3.7.0
- Fluent-bit:
- Three different elasticsearch indicies created
- kubernetes_cluster-- (for container logs)
- kubernetes_audit-- (for audit logs from kube-apiserver)
- kubernetes_host-- (for all systemd host logs)
- version 1.5.2
- Kernel messages forwarded (#375, @sebbrandt87)
- apply meaningful aliases to plugins and their metrics. (#432, @branden)
- Three different elasticsearch indicies created
- Istio:
- Traefik-foward-auth:
- update to 0.2.14
- Add an option to bypass tfa deployment (#456, @d2iq-dispatch)
- update to 0.2.14
- Kibana:
- version 6.8.10 (#373, @sebbrandt87)
- Ops-portal:
- Fix: Unable to change ops-portal password (#379, @GoelDeepak)
- Prometheus:
- chore: bump chart to v9.3.1
- refactor!: (breaking change) version 9 of the helm chart removes the existing
additionalScrapeConfigsExternal
in favor ofadditionalScrapeConfigsSecret
. This change lets users specify the secret name and secret key to use for the additional scrape configuration of prometheus. - feat: add ingress configuration for Thanos sidecar, enabling external access from a centralized thanos querier running in another cluster
- feat: add scrape timeout config to service monitor to avoid timeouts on slow kubelets
- feat: add docker checksum option to improve security for deployed containers
- feat: add option to disable availability rules
- feat: enable scraping /metrics/resource for kubelet service
- feat: [prometheus] enable namespace overrides
- feat: [prometheus] allow additional volumes and volumeMounts
- feat: [alertmanager] add volume and volume mounts to spec
- feat: [alertmanager] add support for serviceAccount.annotations
- feat: [grafana] enable adding annotations to all default dashboard configmaps
- chore: bump prometheus to v2.18.2
- chore: bump alertmanager to v0.21.0
- chore: bump hyperkube to v1.16.12
- chore: bump grafana to v5.3.0
- fix: add missing grafana annotations to k8s-coredns dashboard
- fix: reduced CPU utilization and time lag for code_verb:apiserver_request_total:increase30d scrape
- fix: invalid image pull policy for the admission webhook patch
- fix: alert "KubeNodeUnreachable" no longer fires on an autoscaling scale-down event (#444, @samvantran)
- refactor!: (breaking change) version 9 of the helm chart removes the existing
- disable ServiceMonitors for kube-controller-manager and kube-scheduler. kubernetes has determined the ports that were used for these tests was insecure and has limited it to localhost only. This causes these specific tests to fail. The state of the controller-manager and scheduler pods are still tracked in general as pods. (#474, @dkoshkin)
- chore: bump chart to v9.3.1
stable-1.15-2.3.0
stable-1.15-2.3.0, stable-1.16-2.3.0, stable-1.17-2.3.0
- Azuredisk-csi-driver:
- Cert-manager:
Issuer
namespace setableCertificate
namespace setable (#378, @sebbrandt87)
- Dex-k8s-authenticator:
- Elasticsearch-curator:
- version 5.8.1 (#374, @sebbrandt87)
- Added value
cronjob.startingDeadlineSeconds
: Amount of time to try reschedule job if we can't run on time (#447, @d2iq-dispatch)
- Elasticsearch-exporter:
- updated from 2.11 to 3.7.0
- Add a parameter for the elasticsearch-exporter: es.indices_settings as it is supported since version 1.0.4 (the elasticsearch-exporter chart is supporting the version 1.1.0)
- Update description for envFromSecret parameter in readme
- Feature flap the flag es.uri to allow fallback to env var ES_URI
- Allow setting environment variables with k8s secret information to support referencing already existing sensitive parameters.
- Add es.ssl.client.enabled value for better functionality readability
- Add option to disable client cert auth in Elasticsearch exporter
- Add the serviceMonitor targetLabels key as documented in the Prometheus Operator API
- Add log.level and log.format configs
- Add the ServiceMonitor metricRelabelings key as documented in the Prometheus Operator API
- Add sampleLimit configuration option (#449, @d2iq-dispatch)
- updated from 2.11 to 3.7.0
- Fluent-bit:
- Three different elasticsearch indicies created
- kubernetes_cluster-- (for container logs)
- kubernetes_audit-- (for audit logs from kube-apiserver)
- kubernetes_host-- (for all systemd host logs)
- version 1.5.2
- Kernel messages forwarded (#375, @sebbrandt87)
- apply meaningful aliases to plugins and their metrics. (#432, @branden)
- Three different elasticsearch indicies created
- Istio:
- Traefik-foward-auth:
- update to 0.2.14
- Add an option to bypass tfa deployment (#456, @d2iq-dispatch)
- update to 0.2.14
- Kibana:
- version 6.8.10 (#373, @sebbrandt87)
- Ops-portal:
- Fix: Unable to change ops-portal password (#379, @GoelDeepak)
- Prometheus:
- chore: bump chart to v9.3.1
- refactor!: (breaking change) version 9 of the helm chart removes the existing
additionalScrapeConfigsExternal
in favor ofadditionalScrapeConfigsSecret
. This change lets users specify the secret name and secret key to use for the additional scrape configuration of prometheus. - feat: add ingress configuration for Thanos sidecar, enabling external access from a centralized thanos querier running in another cluster
- feat: add scrape timeout config to service monitor to avoid timeouts on slow kubelets
- feat: add docker checksum option to improve security for deployed containers
- feat: add option to disable availability rules
- feat: enable scraping /metrics/resource for kubelet service
- feat: [prometheus] enable namespace overrides
- feat: [prometheus] allow additional volumes and volumeMounts
- feat: [alertmanager] add volume and volume mounts to spec
- feat: [alertmanager] add support for serviceAccount.annotations
- feat: [grafana] enable adding annotations to all default dashboard configmaps
- chore: bump prometheus to v2.18.2
- chore: bump alertmanager to v0.21.0
- chore: bump hyperkube to v1.16.12
- chore: bump grafana to v5.3.0
- fix: add missing grafana annotations to k8s-coredns dashboard
- fix: reduced CPU utilization and time lag for code_verb:apiserver_request_total:increase30d scrape
- fix: invalid image pull policy for the admission webhook patch
- fix: alert "KubeNodeUnreachable" no longer fires on an autoscaling scale-down event (#444, @samvantran)
- refactor!: (breaking change) version 9 of the helm chart removes the existing
- disable ServiceMonitors for kube-controller-manager and kube-scheduler. kubernetes has determined the ports that were used for these tests was insecure and has limited it to localhost only. This causes these specific tests to fail. The state of the controller-manager and scheduler pods are still tracked in general as pods. (#474, @dkoshkin)
- chore: bump chart to v9.3.1