Connectivity
Added
- Add ability to extend
nginx-ingress-controller
with specific values from appcatalog. - User value validation through a values.schema.json file based on the current values.yaml.
Changed
- Update image to
v0.41.2
. (#133)
- Add ability to extend
Added
- Add minReadySeconds to deployment template as optional parameter
Updated
- architect-orb 0.11.0 -> 0.14.0
- github workflow
Breaking changes
- Kong Ingress Controller 1.0 removes support for several deprecated flags and
the KongCredential custom resource. Please see the controller changelog
for details. Note that Helm 3 will not remove the KongCredential CRD by
default: you should delete it manually after converting KongCredentials to
credential Secrets.
If you manage CRDs using Helm (check to see if your KongCredential CRD has a
app.kubernetes.io/managed-by: Helm
label), perform the credential Secret conversion before upgrading to chart 1.11.0 to avoid losing credential configuration. - The chart no longer uses the
extensions
API for PodSecurityPolicy, and now uses the modernpolicy
API. This breaks compatibility with Kubernetes versions 1.11 and older. (#195)
Updated
- Update architect-orb to 0.11.0
- Sync with upstream chart 1.11.0
- Please check the upstream CHANGELOG.md
Changed
- Change upstream default branch in upstream-sync script
- Kong Ingress Controller 1.0 removes support for several deprecated flags and
the KongCredential custom resource. Please see the controller changelog
for details. Note that Helm 3 will not remove the KongCredential CRD by
default: you should delete it manually after converting KongCredentials to
credential Secrets.
If you manage CRDs using Helm (check to see if your KongCredential CRD has a
Changed
- Upgrade upstream external-dns from v0.7.3 to v0.7.4.
Changed
- Upgrade ingress-nginx-controller from v0.35.0 to v0.40.2.
Important upstream changes to pay special attention to:
- App/chart requires Kubernetes 1.16+ based platform release
- It is recommended to change API group of Ingress resources from
extensions/v1beta1
tonetworking.k8s.io/v1beta1
(available since Kubernetes 1.14)
- It is recommended to change API group of Ingress resources from
- Default configuration changes:
gzip-level
default changed from5
to1
ssl-session-tickets
default changed fromtrue
tofalse
use-gzip
default changed fromtrue
tofalse
upstream-keepalive-connections
changed from32
to320
upstream-keepalive-requests
changed from100
to10000
- App/chart requires Kubernetes 1.16+ based platform release
- Support and enable by default mimalloc as a drop-in malloc replacement to reduce nginx memory utilization.
- Support configuring additional environment variables for NGINX Ingress Controller container, to support configuring additional mimalloc options.
- Adjust Helm
hook-delete-policy
andhook-weight
to make admission webhook management more reliable.
- Upgrade ingress-nginx-controller from v0.35.0 to v0.40.2.
Important upstream changes to pay special attention to:
Changed
- Split registry value to allow switching registry.
Added
giantswarm.io/monitoring
label (in addition to existing annotation) for the new sharded TC Prometheus to pick up the service.
Changed
- Upgrade to ingress-nginx v0.35.0.
Updated
- Upgraded architect-orb to 0.10.0
- Add github workflows for release automation
- Sync with upstream chart v1.8.0
- Update busybox 1.31.0 -> 1.32.0
Improvements
From upstream CHANGELOG:
- Update default Kong version to 2.1.
- Update Kong Enterprise images to 1.5.0.4 (kong-enterprise-edition) and 2.0.4.2 (kong-enterprise-k8s).
- Updated default controller version to 0.9.1. (#150)
- Added support for ServiceMonitor targetLabels (for use with the Prometheus Operator). (#162)
- Automatically handle the new port_maps setting for the proxy service. (#169)
- Add support for hybrid mode deployments. (#160)
Fixed
- Uses fix from upstream-branch next to resolve issue “CONTROLLER_ADMISSION_WEBHOOK_LISTEN” which overwrites our fix below.
- Force cast to string for Admission Webhook port #59
Added
- Monitoring headless Service.
- More Giant Swarm custom monitoring annotations.
- Explicitly expose metrics container port.
Changed
- Use default external-dns metrics port 7979.