Releases: gardener/etcd-druid
Releases · gardener/etcd-druid
v0.11.1
[etcd-druid]
🏃 Others
- [OPERATOR] Added pod permission in etcd_role that now enable
etcd-backup-restore
to get/list/watch pods (gardener/etcd-druid#372, @aaronfern)
[etcd-backup-restore]
🐛 Bug Fixes
- [OPERATOR] Temp fix: skip the single member restoration if data-dir found to be invalid. (gardener/etcd-backup-restore#501, @ishan16696)
- [OPERATOR] Fixed a bug in Scaleup feature in func:
IsMemberInCluster()
which can cause Scaleup feature to get fail. (gardener/etcd-backup-restore#501, @ishan16696)
🏃 Others
- [OPERATOR] Fixed a bug where etcd calls related to multi node operation were used in single node operation (gardener/etcd-backup-restore#504, @aaronfern)
- [OPERATOR] Assigned the correct Peer address to the Etcd after it restores from backup-bucket. (gardener/etcd-backup-restore#505, @ishan16696)
- [OPERATOR] No attempt is made to update member Peer URL when trying to promote a member (gardener/etcd-backup-restore#506, @aaronfern)
v0.11.0
[etcd-druid]
🏃 Others
- [OPERATOR] livenessProbe of etcd container has been updated to
ETCDCTL_API=3 etcdctl get foo --consistency=s
making the consistencyserializable
. (gardener/etcd-druid#357, @ishan16696) - [OPERATOR] failureThreshold has been updated to
5
for both livenessProbe and readinessProbe of etcd. (gardener/etcd-druid#357, @ishan16696) - [OPERATOR] The
etcd-druid
now usesdistroless
instead ofalpine
as a base image. (gardener/etcd-druid#360, @dimityrmirchev) - [OPERATOR]
etcd-druid
will now also add statefulset permissions to the etcd role (gardener/etcd-druid#366, @aaronfern) - [OPERATOR] Published docker images for Etcd-Druid are now multi-arch ready. They support
linux/amd64
andlinux/arm64
. (gardener/etcd-druid#367, @timuthy) - [OPERATOR] Added a new condition
BackupReady
to the etcd status (gardener/etcd-druid#271, @aaronfern)
[etcd-backup-restore]
⚠️ Breaking Changes
- [DEVELOPER] Added new package
membergarbagecollector
to remove superfluous members from the ETCD cluster. Due to this, etcd-backup-restore now needs permissions to listpods
andstatefulsets
. (gardener/etcd-backup-restore#403, @aaronfern)
🏃 Others
- [OPERATOR] Added new package
membergarbagecollector
to remove superfluous members from the ETCD cluster. (gardener/etcd-backup-restore#403, @aaronfern)
📰 Noteworthy
- [OPERATOR] Published docker images for Etcd-Backup-Restore are now multi-arch ready. They support
linux/amd64
andlinux/arm64
. (gardener/etcd-backup-restore#499, @timuthy) - [OPERATOR] The Etcd-Backup-Restore image has been updated to
Alpine 3.15.4
. (gardener/etcd-backup-restore#499, @timuthy) - [OPERATOR] Etcd can now scale up itself from a single member cluster to a multi member cluster (gardener/etcd-backup-restore#487, @aaronfern)
[etcd-custom-image]
🏃 Others
- [OPERATOR] Published docker images for Etcd-Custom-Image are now multi-arch ready. They support linux/amd64 and linux/arm64. (gardener/etcd-custom-image#19, @timuthy)
v0.10.0
[etcd-druid]
🐛 Bug Fixes
- [OPERATOR] A bug has been fixed that deleted member
lease
objects in all namespaces. With this release member lease renewals are enabled again. (gardener/etcd-druid#353, @timuthy)
📖 Documentation
- [DEPENDENCY] Paths transformations in .docforge/manifest.yaml for simplification (gardener/etcd-druid#302, @Kostov6)
🏃 Others
- [OPERATOR] Fixed a bug where druid did not copy etcd labels to configmap (gardener/etcd-druid#343, @aaronfern)
- [OPERATOR] Do not re-used resource limits from an existing etcd stateful set. This will cause a RESTART(!) of the etcd pod for existing clusters that currently have a resource limit set for the etcd stateful-set, but whose etcd resource does not specify a resource limit. (gardener/etcd-druid#342, @danielfoehrKn)
- [OPERATOR] ETCd backups can now be successfully copied between OCS buckets. (gardener/etcd-druid#330, @Wieneo)
[etcd-backup-restore]
🐛 Bug Fixes
- [OPERATOR] Throw Fatal error to avoid edge case potential deadlocks. (gardener/etcd-backup-restore#471, @ishan16696)
🏃 Others
- [OPERATOR] Introducing a timeout
timeoutToOpenBoltDB
to open boltDB within a given time, so backup-restore won't have to wait for ever. (gardener/etcd-backup-restore#480, @ishan16696) - [OPERATOR] When the owner check fails,
etcd-backup-restore
will restart theetcd
process right before attempting to take a final snapshot, if the owner check was previously successful. (gardener/etcd-backup-restore#478, @plkokanov) - [OPERATOR] Fixed retrieval of credentials during copy operation for backups stored in Swift snapstore. (gardener/etcd-backup-restore#476, @plkokanov)
- [OPERATOR] ETCD won't restart from the PVC if it is wrongly mounted to the pod (gardener/etcd-backup-restore#468, @abdasgupta)
- [OPERATOR] OCS S3 Snapstore now supports supplying access information via a mounted secret. (gardener/etcd-backup-restore#465, @Wieneo)
📰 Noteworthy
- [OPERATOR] An initial-cluster field is now expected in the ETCD config (gardener/etcd-backup-restore#482, @abdasgupta)
[etcd-custom-image]
🏃 Others
- [OPERATOR] The base image of etcd has been set to Alpine 3.15.4. (gardener/etcd-custom-image#18, @timuthy)
v0.8.5
[etcd-druid]
🏃 Others
- [OPERATOR] Do not re-used resource limits from an existing etcd stateful set. This will cause a RESTART(!) of the etcd pod for existing clusters that currently have a resource limit set for the etcd stateful-set, but whose etcd resource does not specify a resource limit. (#342, @danielfoehrKn)
[etcd-backup-restore]
🏃 Others
- [OPERATOR] When the owner check fails,
etcd-backup-restore
will restart theetcd
process right before attempting to take a final snapshot, if the owner check was previously successful. (gardener/etcd-backup-restore#478, @plkokanov)
v0.8.4
[etcd-backup-restore]
🏃 Others
- [OPERATOR] Fixed retrieval of credentials during copy operation for backups stored in Swift snapstore. (gardener/etcd-backup-restore#476, @plkokanov)
v0.8.3
[etcd-backup-restore]
🐛 Bug Fixes
- [OPERATOR] Throw Fatal error to avoid edge case potential deadlocks. (gardener/etcd-backup-restore#467, @ishan16696)
🏃 Others
- [OPERATOR] ETCD won't restart from the PVC if it is wrongly mounted to the pod (gardener/etcd-backup-restore#470, @abdasgupta)
v0.9.0
[etcd-druid]
⚠️ Breaking Changes
- [OPERATOR] If Spec.Replicas in ETCD CR is greater than 0 and a even number, then no statefulset for ETCD nodes will be created and so the ETCD cluster won't be setup by Druid (gardener/etcd-druid#314, @abdasgupta)
✨ New Features
- [USER] Add
SchedulingConstraints
field to Etcd spec. The currently supported constraints areAffinity
andTopologySpreadConstraints
. (gardener/etcd-druid#329, @shreyas-s-rao)
🐛 Bug Fixes
- [OPERATOR] A bug has been fixed which prevented the
ServiceAccount
'sautomountServiceAccountToken
field from being reconciled. (gardener/etcd-druid#316, @rfranzke)
🏃 Others
- [OPERATOR] Deployed configmap programmatically as component instead of chart (gardener/etcd-druid#314, @abdasgupta)
- configmap configures ETCD config based on the number of nodes in cluster. Number of nodes in cluster is derived from spec.Replicas of ETCD CR
- Introduced separate TLS config for client and peer communication with ETCD cluster
[etcd-backup-restore]
📰 Noteworthy
- [OPERATOR] Multi-node etcd bootstrapping is now supported. This is an alpha feature intended for initial use and evaluation. Please do not enable this feature for your productive workloads (gardener/etcd-backup-restore#419, @abdasgupta)
- Multi-node etcd restoration from backup buckets is not supported
- Intended to work only with etcd-druid v0.9.x and beyond
- Intended to work only with etcd-custom-image v3.4.13-bootstrap-4 and beyond
v0.8.2
[etcd-backup-restore]
🐛 Bug Fixes
- [OPERATOR] Fix defragmentation fail issue which occurs due to x509: failed to validate certificate for 0.0.0.0 because it doesn't contain any IP SANs. (gardener/etcd-backup-restore#459, @ishan16696)
v0.8.1
[etcd-druid]
🐛 Bug Fixes
- [OPERATOR] A bug has been fixed which prevented the
ServiceAccount
'sautomountServiceAccountToken
field from being reconciled. (gardener/etcd-druid#317, @rfranzke)
v0.8.0
[etcd-druid]
⚠️ Breaking Changes
- [OPERATOR] The default leader election resource lock of
etcd-druid
has been changed fromconfigmapsleases
toleases
. (gardener/etcd-druid#281, @acumino)- Please make sure, that you had at least
[email protected]
running before upgrading so that it has successfully acquired leadership with the hybrid resource lock (configmapsleases
) at least once.
- Please make sure, that you had at least
- [OPERATOR] Using the etcd
client
service for server communication (default port2380
) has been deprecated. The port will be removed from the service in the near future. If necessary, switch to the newpeer
service instead. (gardener/etcd-druid#273, @timuthy) - [OPERATOR] The claiming logic for services has been removed from Etcd-Druid. This means that existing
service
objects cannot be adopted anymore but a new and dedicated object is created. Please check any usages for already adoptedservices
and switch to the dedicated<etcd-name>-client
service. (gardener/etcd-druid#273, @timuthy) - [DEVELOPER] Make target
install-requirements
was dropped. Instead, required 3rd party binaries are automatically installed to a local bin dir (./hack/tools/bin). (gardener/etcd-druid#261, @timuthy)
✨ New Features
- [OPERATOR] To Dynamically load Iaas credentials, added support to pass the credentials through secret mount. (gardener/etcd-druid#301, @ishan16696)
- [OPERATOR] Set File Path through Env:
<ProviderName>_APPLICATION_CREDENTIALS
(gardener/etcd-druid#301, @ishan16696) - [OPERATOR] Leader-election specifications can be configured through Etcd resource spec via
.spec.backup.leaderElection
. (gardener/etcd-druid#285, @ishan16696) - [OPERATOR] A new service (
<etcd-name>-peer
) for etcd peer communication (default port2380
) is now created by Etcd-Druid. (gardener/etcd-druid#273, @timuthy) - [OPERATOR] Etcd-Druid now creates member
Lease
objects which enables the heartbeat functionality for etcd members. Along the way a new flag--etcd-member-unknown-threshold
was introduced. It determines the duration after which a etcd member's state is consideredunknown
when the memberLease
is not renewed. (gardener/etcd-druid#262, @timuthy) - [DEVELOPER] When
--disable-etcd-serviceaccount-automount
is set totrue
then the.automountServiceAccountToken
will be set tofalse
for theServiceAccount
created for etcd. (gardener/etcd-druid#277, @rfranzke)
🐛 Bug Fixes
- [OPERATOR] The default CPU and memory limits for
etcd
andbackup-restore
containers have been removed to enable removal of limits via theEtcd
resource. (gardener/etcd-druid#312, @stoyanr) - [OPERATOR] A bug has been fixed which caused the
etcd-druid
not removing its finalizers from referenced secrets inEtcd
resources when those references changed. (gardener/etcd-druid#310, @rfranzke) - [OPERATOR] A bug has been fix which caused the Nil pointer exception in EtcdCopyBackupsTask. (gardener/etcd-druid#306, @ishan16696)
- [OPERATOR] A bug has been fixed that led to multiple update conflicts when the
etcd
resource was reconciled. (gardener/etcd-druid#263, @timuthy) - [OPERATOR] A bug has been fixed which caused the
etcd.status.clusterSize
only being set for newetcd
resources (gardener/etcd-druid#260, @timuthy)
🏃 Others
- [OPERATOR] The ETCD backup restore is now configured to support Local provider in container environment. (gardener/etcd-druid#300, @kris94)
- [OPERATOR] The Golang version which is used to build Etcd-Druid was updated to
1.17.6
. (gardener/etcd-druid#294, @timuthy) - [OPERATOR] Please be aware that Etcd-Druid needs to re-create the etcd
StatefulSet
if the etcd cluster is scaled up from1 -> x
for the first time. (gardener/etcd-druid#293, @timuthy) - [OPERATOR] The amount of active reconciliations has been limited to improve performance, CPU, memory and network consumption. (gardener/etcd-druid#276, @timuthy)
- [OPERATOR] Updated labels used in compaction job to differentiate them from etcd pods. This allows for pod scheduling policies to schedule compaction jobs on predetermined nodes (gardener/etcd-druid#270, @aaronfern)
- [OPERATOR] feature operator (gardener/etcd-druid#250, @breuerfelix)
- Deploying and maintaining the correct PodDisruptionBudget configuration according to Etcd resource status
- [DEVELOPER] The handling for 3rd party binaries (e.g.
controller-gen
), usually required for Make targets, has been improved. Instead of installing those tools to a global directory, a dedicated local directory of in the code repository is used (hack/tools/bin
). (gardener/etcd-druid#261, @timuthy)
📰 Noteworthy
- [DEVELOPER] The CA data key is now configurable under
.spec.etcd.tls.tlsCASecretRef.dataKey
. It still defaults toca.crt
if not provided. (gardener/etcd-druid#309, @rfranzke)
[etcd-backup-restore]
✨ New Features
- [OPERATOR] To Dynamically load Iaas credentials, added support to pass the credentials through file mount. (gardener/etcd-backup-restore#435, @ishan16696)
- [OPERATOR] The support to pass the credentials through environment variables will get deprecated by
etcd-backup-restore
v0.18.0 (gardener/etcd-backup-restore#435, @ishan16696) - [OPERATOR] Added the leader-election to the backup-restore. Added support to allow only backup-restore Leader to take/upload the snapshots and trigger the defragmentation. (gardener/etcd-backup-restore#353, @ishan16696)
🏃 Others
- [OPERATOR] The used Golang version was updated to
1.17
. (gardener/etcd-backup-restore#445, @timuthy) - [OPERATOR] Fixed etcd-backup-restore exiting immediately on SIGTERM without proper context cancellation (gardener/etcd-backup-restore#440, @sibucan)
- [OPERATOR] Added support for non-AWS S3-compatible providers by specifying a custom endpoint. (gardener/etcd-backup-restore#431, @sibucan)
- [OPERATOR] Failed backups won't fail the readinessProbe thus etcd is allowed to keep serving the incoming traffic. (gardener/etcd-backup-restore#411, @ishan16696)
- [OPERATOR] Added CLI flags
--backoff-multiplier
,--backoff-attempt-limit
and--backoff-threshold-time
to configure the exponential-backoff mechanism. (gardener/etcd-backup-restore#411, @ishan16696) - [OPERATOR] Upgrade the Go from v1.14 to v1.16 (gardener/etcd-backup-restore#405, @ishan16696)