Skip to content

v0.8.0

Compare
Choose a tag to compare
@gardener-robot-ci-2 gardener-robot-ci-2 released this 29 Mar 19:27
· 375 commits to master since this release

[etcd-druid]

⚠️ Breaking Changes

  • [OPERATOR] The default leader election resource lock of etcd-druid has been changed from configmapsleases to leases. (gardener/etcd-druid#281, @acumino)
    • Please make sure, that you had at least [email protected] running before upgrading so that it has successfully acquired leadership with the hybrid resource lock (configmapsleases) at least once.
  • [OPERATOR] Using the etcd client service for server communication (default port 2380) has been deprecated. The port will be removed from the service in the near future. If necessary, switch to the new peer service instead. (gardener/etcd-druid#273, @timuthy)
  • [OPERATOR] The claiming logic for services has been removed from Etcd-Druid. This means that existing service objects cannot be adopted anymore but a new and dedicated object is created. Please check any usages for already adopted services and switch to the dedicated <etcd-name>-client service. (gardener/etcd-druid#273, @timuthy)
  • [DEVELOPER] Make target install-requirements was dropped. Instead, required 3rd party binaries are automatically installed to a local bin dir (./hack/tools/bin). (gardener/etcd-druid#261, @timuthy)

✨ New Features

  • [OPERATOR] To Dynamically load Iaas credentials, added support to pass the credentials through secret mount. (gardener/etcd-druid#301, @ishan16696)
  • [OPERATOR] Set File Path through Env: <ProviderName>_APPLICATION_CREDENTIALS (gardener/etcd-druid#301, @ishan16696)
  • [OPERATOR] Leader-election specifications can be configured through Etcd resource spec via .spec.backup.leaderElection. (gardener/etcd-druid#285, @ishan16696)
  • [OPERATOR] A new service (<etcd-name>-peer) for etcd peer communication (default port 2380) is now created by Etcd-Druid. (gardener/etcd-druid#273, @timuthy)
  • [OPERATOR] Etcd-Druid now creates member Lease objects which enables the heartbeat functionality for etcd members. Along the way a new flag --etcd-member-unknown-threshold was introduced. It determines the duration after which a etcd member's state is considered unknown when the member Lease is not renewed. (gardener/etcd-druid#262, @timuthy)
  • [DEVELOPER] When --disable-etcd-serviceaccount-automount is set to true then the .automountServiceAccountToken will be set to false for the ServiceAccount created for etcd. (gardener/etcd-druid#277, @rfranzke)

🐛 Bug Fixes

  • [OPERATOR] The default CPU and memory limits for etcd and backup-restore containers have been removed to enable removal of limits via the Etcd resource. (gardener/etcd-druid#312, @stoyanr)
  • [OPERATOR] A bug has been fixed which caused the etcd-druid not removing its finalizers from referenced secrets in Etcd resources when those references changed. (gardener/etcd-druid#310, @rfranzke)
  • [OPERATOR] A bug has been fix which caused the Nil pointer exception in EtcdCopyBackupsTask. (gardener/etcd-druid#306, @ishan16696)
  • [OPERATOR] A bug has been fixed that led to multiple update conflicts when the etcd resource was reconciled. (gardener/etcd-druid#263, @timuthy)
  • [OPERATOR] A bug has been fixed which caused the etcd.status.clusterSize only being set for new etcd resources (gardener/etcd-druid#260, @timuthy)

🏃 Others

  • [OPERATOR] The ETCD backup restore is now configured to support Local provider in container environment. (gardener/etcd-druid#300, @kris94)
  • [OPERATOR] The Golang version which is used to build Etcd-Druid was updated to 1.17.6. (gardener/etcd-druid#294, @timuthy)
  • [OPERATOR] Please be aware that Etcd-Druid needs to re-create the etcd StatefulSet if the etcd cluster is scaled up from 1 -> x for the first time. (gardener/etcd-druid#293, @timuthy)
  • [OPERATOR] The amount of active reconciliations has been limited to improve performance, CPU, memory and network consumption. (gardener/etcd-druid#276, @timuthy)
  • [OPERATOR] Updated labels used in compaction job to differentiate them from etcd pods. This allows for pod scheduling policies to schedule compaction jobs on predetermined nodes (gardener/etcd-druid#270, @aaronfern)
  • [OPERATOR] feature operator (gardener/etcd-druid#250, @breuerfelix)
    • Deploying and maintaining the correct PodDisruptionBudget configuration according to Etcd resource status
  • [DEVELOPER] The handling for 3rd party binaries (e.g. controller-gen), usually required for Make targets, has been improved. Instead of installing those tools to a global directory, a dedicated local directory of in the code repository is used (hack/tools/bin). (gardener/etcd-druid#261, @timuthy)

📰 Noteworthy

  • [DEVELOPER] The CA data key is now configurable under .spec.etcd.tls.tlsCASecretRef.dataKey. It still defaults to ca.crt if not provided. (gardener/etcd-druid#309, @rfranzke)

[etcd-backup-restore]

✨ New Features

🏃 Others