Added
- Add KSM metrics for Gateway API resources.
Updates on Giant Swarm workload cluster releases, apps, UI improvements and documentation changes.
helm/mimir/gateway/route.yaml file + values to also define a BackendTrafficPolicy.fix-dns-nic-allocation.sh Ignition script to attach DNS servers to correct network interfaces./run/metadata/coreos.ntpd unit.tl;dr: Please first upgrade your existing cluster to Giant Swarm Release v33.1.4 for CAPA or newer before upgrading to this release! Otherwise, you risk service outage and severe issues.
Giant Swarm Release v34.0.0 for CAPA comes with Kubernetes v1.34. This version contains etcd v3.6, which makes use of the so-called v3 store by default. Before, with etcd v3.5, the v2 store was used by default and synchronized to the already existing v3 store.
Different flaws could lead to an inconsistency between the old v2 store and the already present but unused standby v3 store in etcd v3.5 and before. Because of this, new etcd v3.6 members, which first start to use this v3 store, might suffer from these inconsistencies.
This can come into play when upgrading a cluster to this and future releases from any release older than Giant Swarm Release v33.1.4 for CAPA. For this reason, we require you to first upgrade your cluster to Giant Swarm Release v33.1.4 for CAPA or newer before upgrading to this or future releases.
This release introduces optional support for Kubernetes Structured Authentication Configuration for OIDC providers. We recommend testing this feature on a non-production cluster first.
global:
controlPlane:
oidc:
structuredAuthentication:
enabled: true
issuers:
- issuerUrl: https://your-idp.example.com
clientId: kubernetes
global:
controlPlane:
oidc:
structuredAuthentication:
enabled: true
issuers:
- issuerUrl: https://your-idp.example.com
clientId: kubernetes
usernameClaim: email # Optional: use 'email' instead of 'sub'
groupsClaim: roles # Optional: use 'roles' instead of 'groups'
usernamePrefix: "oidc:" # Optional: prefix usernames
groupsPrefix: "oidc:" # Optional: prefix groups
If you already use OIDC with the legacy configuration, add structuredAuthentication.enabled: true to migrate:
global:
controlPlane:
oidc:
issuerUrl: https://your-idp.example.com
clientId: kubernetes
structuredAuthentication:
enabled: true
This will automatically convert your legacy configuration to the new structured format.
Additional configuration options are available for more complex setups, including:
audiences, audienceMatchPolicy)discoveryUrl)caPem)claimValidationRules, userValidationRules)claimMappings)Refer to the Kubernetes Structured Authentication documentation for details.
global.providerSpecific.reducedInstanceProfileIamPermissionsForWorkers value, as that’s the default behavior now. It cannot be overridden anymore.kubernetes.io/cluster/$clusterName: "owned" and sigs.k8s.io/cluster-api-provider-aws/cluster/$clusterName: "owned" tags to the IRSAClaim CR so that resources created by Crossplane contain the expected tags. This also allows to find the S3 buckets that need to be deleted when removing a cluster.preKubeadmCommand to wait for the API server load balancer DNS to be resolvable before running kubeadm on control plane nodes. This prevents kubeadm from failing when the ELB DNS record hasn’t propagated yet.priority-classes default app, enabled by default. This app provides standardised PriorityClass resources like giantswarm-critical and giantswarm-high, which should replace the previous inconsistent per-app priority classes.lb Security Group to Karpenter nodes.cluster to v5.1.2.cluster to v5.1.1.cluster to v5.1.0.cluster to v5.0.0.nodeCidrMaskSizeapp schema to helmRelease schema to correctly reflect that Karpenter is deployed as a HelmRelease resource. This fixes incorrect field definitions in extraConfigs (capitalized enum values ConfigMap/Secret and optional field instead of priority).subnetTags, the default giantswarm.io/role: "nodes" filter is no longer applied, allowing full control over subnet selection. The cluster ownership tag (sigs.k8s.io/cluster-api-provider-aws/cluster/<cluster-name>: owned) is still enforced for security.valuesFrom parent field for extraConfigs, enabling customers to use custom ConfigMaps and Secrets for Karpenter configuration.AWSCluster.spec.network.subnets.tags is not rendered as nullmaxHealthyPercentage since Helm does not use the default from the schemaRolePolicyAttachment crossplane custom resources as they are not needed when using Role and RolePolicy.1.19.0.discovery.k8s.io/endpointslices permission only when using service source.Service source to support EndpointSlices.automountServiceAccountToken and serviceAccount.automountServiceAccountToken to true in Helm chart values.txtPrefix and txtSuffix arguments when both are provided.helm plugin schema.imagePullSecrets via helm global value.labelFilter and managedRecordTypes via dedicated helm values.serviceaccount.annotations keys and values, by rendering them using the tpl built-in function.extraContainers argument.excludeDomains argument.dnsConfig.default instead of playground catalog as this app will be fully supported in productionkube_servicemonitor_info and kube_podmonitor_info for ServiceMonitor and PodMonitor resourceskube_podlog_info for PodLog resourcekube-prometheus-stack-app to 19.0.0edgedb to gel.cloudnative-pg (app) to v0.0.12.gel (app) to v1.0.1.v0.1.95 and Zot v2.11.13.