Skip to content

Releases: gardener/etcd-druid

v0.11.1

22 Jul 09:25
Compare
Choose a tag to compare

[etcd-druid]

🏃 Others

[etcd-backup-restore]

🐛 Bug Fixes

🏃 Others

v0.11.0

08 Jul 16:29
Compare
Choose a tag to compare

[etcd-druid]

🏃 Others

[etcd-backup-restore]

⚠️ Breaking Changes

  • [DEVELOPER] Added new package membergarbagecollector to remove superfluous members from the ETCD cluster. Due to this, etcd-backup-restore now needs permissions to list pods and statefulsets. (gardener/etcd-backup-restore#403, @aaronfern)

🏃 Others

📰 Noteworthy

[etcd-custom-image]

🏃 Others

v0.10.0

08 Jun 20:28
Compare
Choose a tag to compare

[etcd-druid]

🐛 Bug Fixes

  • [OPERATOR] A bug has been fixed that deleted member lease objects in all namespaces. With this release member lease renewals are enabled again. (gardener/etcd-druid#353, @timuthy)

📖 Documentation

🏃 Others

  • [OPERATOR] Fixed a bug where druid did not copy etcd labels to configmap (gardener/etcd-druid#343, @aaronfern)
  • [OPERATOR] Do not re-used resource limits from an existing etcd stateful set. This will cause a RESTART(!) of the etcd pod for existing clusters that currently have a resource limit set for the etcd stateful-set, but whose etcd resource does not specify a resource limit. (gardener/etcd-druid#342, @danielfoehrKn)
  • [OPERATOR] ETCd backups can now be successfully copied between OCS buckets. (gardener/etcd-druid#330, @Wieneo)

[etcd-backup-restore]

🐛 Bug Fixes

🏃 Others

📰 Noteworthy

[etcd-custom-image]

🏃 Others

v0.8.5

12 May 12:10
Compare
Choose a tag to compare

[etcd-druid]

🏃 Others

  • [OPERATOR] Do not re-used resource limits from an existing etcd stateful set. This will cause a RESTART(!) of the etcd pod for existing clusters that currently have a resource limit set for the etcd stateful-set, but whose etcd resource does not specify a resource limit. (#342, @danielfoehrKn)

[etcd-backup-restore]

🏃 Others

  • [OPERATOR] When the owner check fails, etcd-backup-restore will restart the etcd process right before attempting to take a final snapshot, if the owner check was previously successful. (gardener/etcd-backup-restore#478, @plkokanov)

v0.8.4

09 May 13:36
Compare
Choose a tag to compare

[etcd-backup-restore]

🏃 Others

v0.8.3

27 Apr 06:30
Compare
Choose a tag to compare

[etcd-backup-restore]

🐛 Bug Fixes

🏃 Others

v0.9.0

12 Apr 05:58
Compare
Choose a tag to compare

[etcd-druid]

⚠️ Breaking Changes

  • [OPERATOR] If Spec.Replicas in ETCD CR is greater than 0 and a even number, then no statefulset for ETCD nodes will be created and so the ETCD cluster won't be setup by Druid (gardener/etcd-druid#314, @abdasgupta)

✨ New Features

🐛 Bug Fixes

  • [OPERATOR] A bug has been fixed which prevented the ServiceAccount's automountServiceAccountToken field from being reconciled. (gardener/etcd-druid#316, @rfranzke)

🏃 Others

  • [OPERATOR] Deployed configmap programmatically as component instead of chart (gardener/etcd-druid#314, @abdasgupta)
    • configmap configures ETCD config based on the number of nodes in cluster. Number of nodes in cluster is derived from spec.Replicas of ETCD CR
    • Introduced separate TLS config for client and peer communication with ETCD cluster

[etcd-backup-restore]

📰 Noteworthy

  • [OPERATOR] Multi-node etcd bootstrapping is now supported. This is an alpha feature intended for initial use and evaluation. Please do not enable this feature for your productive workloads (gardener/etcd-backup-restore#419, @abdasgupta)
    • Multi-node etcd restoration from backup buckets is not supported
    • Intended to work only with etcd-druid v0.9.x and beyond
    • Intended to work only with etcd-custom-image v3.4.13-bootstrap-4 and beyond

v0.8.2

05 Apr 14:17
Compare
Choose a tag to compare

[etcd-backup-restore]

🐛 Bug Fixes

v0.8.1

30 Mar 15:13
Compare
Choose a tag to compare

[etcd-druid]

🐛 Bug Fixes

  • [OPERATOR] A bug has been fixed which prevented the ServiceAccount's automountServiceAccountToken field from being reconciled. (gardener/etcd-druid#317, @rfranzke)

v0.8.0

29 Mar 19:27
Compare
Choose a tag to compare

[etcd-druid]

⚠️ Breaking Changes

  • [OPERATOR] The default leader election resource lock of etcd-druid has been changed from configmapsleases to leases. (gardener/etcd-druid#281, @acumino)
    • Please make sure, that you had at least [email protected] running before upgrading so that it has successfully acquired leadership with the hybrid resource lock (configmapsleases) at least once.
  • [OPERATOR] Using the etcd client service for server communication (default port 2380) has been deprecated. The port will be removed from the service in the near future. If necessary, switch to the new peer service instead. (gardener/etcd-druid#273, @timuthy)
  • [OPERATOR] The claiming logic for services has been removed from Etcd-Druid. This means that existing service objects cannot be adopted anymore but a new and dedicated object is created. Please check any usages for already adopted services and switch to the dedicated <etcd-name>-client service. (gardener/etcd-druid#273, @timuthy)
  • [DEVELOPER] Make target install-requirements was dropped. Instead, required 3rd party binaries are automatically installed to a local bin dir (./hack/tools/bin). (gardener/etcd-druid#261, @timuthy)

✨ New Features

  • [OPERATOR] To Dynamically load Iaas credentials, added support to pass the credentials through secret mount. (gardener/etcd-druid#301, @ishan16696)
  • [OPERATOR] Set File Path through Env: <ProviderName>_APPLICATION_CREDENTIALS (gardener/etcd-druid#301, @ishan16696)
  • [OPERATOR] Leader-election specifications can be configured through Etcd resource spec via .spec.backup.leaderElection. (gardener/etcd-druid#285, @ishan16696)
  • [OPERATOR] A new service (<etcd-name>-peer) for etcd peer communication (default port 2380) is now created by Etcd-Druid. (gardener/etcd-druid#273, @timuthy)
  • [OPERATOR] Etcd-Druid now creates member Lease objects which enables the heartbeat functionality for etcd members. Along the way a new flag --etcd-member-unknown-threshold was introduced. It determines the duration after which a etcd member's state is considered unknown when the member Lease is not renewed. (gardener/etcd-druid#262, @timuthy)
  • [DEVELOPER] When --disable-etcd-serviceaccount-automount is set to true then the .automountServiceAccountToken will be set to false for the ServiceAccount created for etcd. (gardener/etcd-druid#277, @rfranzke)

🐛 Bug Fixes

  • [OPERATOR] The default CPU and memory limits for etcd and backup-restore containers have been removed to enable removal of limits via the Etcd resource. (gardener/etcd-druid#312, @stoyanr)
  • [OPERATOR] A bug has been fixed which caused the etcd-druid not removing its finalizers from referenced secrets in Etcd resources when those references changed. (gardener/etcd-druid#310, @rfranzke)
  • [OPERATOR] A bug has been fix which caused the Nil pointer exception in EtcdCopyBackupsTask. (gardener/etcd-druid#306, @ishan16696)
  • [OPERATOR] A bug has been fixed that led to multiple update conflicts when the etcd resource was reconciled. (gardener/etcd-druid#263, @timuthy)
  • [OPERATOR] A bug has been fixed which caused the etcd.status.clusterSize only being set for new etcd resources (gardener/etcd-druid#260, @timuthy)

🏃 Others

  • [OPERATOR] The ETCD backup restore is now configured to support Local provider in container environment. (gardener/etcd-druid#300, @kris94)
  • [OPERATOR] The Golang version which is used to build Etcd-Druid was updated to 1.17.6. (gardener/etcd-druid#294, @timuthy)
  • [OPERATOR] Please be aware that Etcd-Druid needs to re-create the etcd StatefulSet if the etcd cluster is scaled up from 1 -> x for the first time. (gardener/etcd-druid#293, @timuthy)
  • [OPERATOR] The amount of active reconciliations has been limited to improve performance, CPU, memory and network consumption. (gardener/etcd-druid#276, @timuthy)
  • [OPERATOR] Updated labels used in compaction job to differentiate them from etcd pods. This allows for pod scheduling policies to schedule compaction jobs on predetermined nodes (gardener/etcd-druid#270, @aaronfern)
  • [OPERATOR] feature operator (gardener/etcd-druid#250, @breuerfelix)
    • Deploying and maintaining the correct PodDisruptionBudget configuration according to Etcd resource status
  • [DEVELOPER] The handling for 3rd party binaries (e.g. controller-gen), usually required for Make targets, has been improved. Instead of installing those tools to a global directory, a dedicated local directory of in the code repository is used (hack/tools/bin). (gardener/etcd-druid#261, @timuthy)

📰 Noteworthy

  • [DEVELOPER] The CA data key is now configurable under .spec.etcd.tls.tlsCASecretRef.dataKey. It still defaults to ca.crt if not provided. (gardener/etcd-druid#309, @rfranzke)

[etcd-backup-restore]

✨ New Features

🏃 Others