Skip to content

Releases: gardener/etcd-druid

v0.12.0

08 Aug 15:59
Compare
Choose a tag to compare

[etcd-druid]

⚠️ Breaking Changes

  • [OPERATOR] etcd Statefulsets are not claimed anymore based on labels. Instead, the statefulsets are fetched using Name and Namespace combination. Thus, etcd.spec.selector does not have an effect on statefulsets anymore. (gardener/etcd-druid#365, @abdasgupta)
  • [OPERATOR] The entrypoint for etcd-druid in its container image has been modified. (gardener/etcd-druid#360, @dimityrmirchev)

✨ New Features

🐛 Bug Fixes

  • [OPERATOR] A bug has been fixed that caused the etcd-backup-restore side-car to connect to the etcd cluster via the peer-service URL. The side-car is supposed to use the client-service instead since it a) exposes client port 2379 and b) redirects traffic only to members which are ready to service traffic. (gardener/etcd-druid#388, @timuthy)
  • [OPERATOR] An issue has been fixed that caused the liveness and readiness probes of etcd to always succeed even though an error was reported. This prevented defective etcd pods from being restarted automatically and caused unready candidates being considered as ready to serve traffic via the etcd service. (gardener/etcd-druid#396, @timuthy)
  • [OPERATOR] A startup probe has been added to etcd to allow 2 minutes of initialization time before checking for etcd liveness. (gardener/etcd-druid#396, @timuthy)

🏃 Others

  • [OPERATOR] The definition of the etcd.status.ready field was defined more precisely due to changed semantics of multi-node etcd clusters. etcd.status.ready is true whenever all underlying etcd replicas are ready. Please note, that the implementation for this check was not changed. (gardener/etcd-druid#389, @timuthy)
  • [OPERATOR] Fixed an issue in the release job needed to add the correct image version config/default/manager_image_patch.yaml. (gardener/etcd-druid#397, @aaronfern)
  • [OPERATOR] Added pod permission in etcd_role that now enable etcd-backup-restore to get/list/watch pods (gardener/etcd-druid#372, @aaronfern)
  • [OPERATOR] Etcd-Druid's Golang version has been update to 1.18.4.. (gardener/etcd-druid#375, @timuthy)
  • [OPERATOR] The correct image version has been set in config/default/manager_image_patch.yaml to match the current release. (gardener/etcd-druid#377, @timuthy)

[etcd-backup-restore]

⚠️ Breaking Changes

  • [OPERATOR] Dropping the feature of passing storage container credentials through ENV for the following storage provider: S3, Swift, OCS, ABS, OSS. Please switch to pass the storage container credentials through volume file mount. (gardener/etcd-backup-restore#493, @ishan16696)

🏃 Others

  • [OPERATOR] A new flag --service-endpoints has been added to the etcdbrctl server command. These (Kubernetes) service URLs ensure that etcd-backup-restore only connects to etcd member which are ready to server traffic. Especially the MemberAdd and Init steps require this. (gardener/etcd-backup-restore#512, @timuthy)
  • [OPERATOR] Fixed a bug where etcd calls related to multi node operation were used in single node operation (gardener/etcd-backup-restore#504, @aaronfern)
  • [OPERATOR] Assigned the correct Peer address to the Etcd after it restores from backup-bucket. (gardener/etcd-backup-restore#505, @ishan16696)
  • [OPERATOR] No attempt is made to update member Peer URL when trying to promote a member (gardener/etcd-backup-restore#506, @aaronfern)
  • [OPERATOR] An issue has been fixed that caused the Backup-Restore component to connect to the wrong etcd cluster for initializing and member-add procedures. (gardener/etcd-backup-restore#510, @timuthy)
  • [OPERATOR] A new flag --service-endpoints has been added to the etcdbrctl server command. These (Kubernetes) service URLs ensure that etcd-backup-restore only connects to etcd member which are ready to server traffic. Especially the MemberAdd and Init steps require this. (gardener/etcd-backup-restore#513, @timuthy)

📰 Noteworthy

v0.11.2

28 Jul 11:01
Compare
Choose a tag to compare

[etcd-backup-restore]

🏃 Others

  • [OPERATOR] An issue has been fixed that caused the Backup-Restore component to connect to the wrong etcd cluster for initializing and member-add procedures. (gardener/etcd-backup-restore#510, @timuthy)

v0.11.1

22 Jul 09:25
Compare
Choose a tag to compare

[etcd-druid]

🏃 Others

[etcd-backup-restore]

🐛 Bug Fixes

🏃 Others

v0.11.0

08 Jul 16:29
Compare
Choose a tag to compare

[etcd-druid]

🏃 Others

[etcd-backup-restore]

⚠️ Breaking Changes

  • [DEVELOPER] Added new package membergarbagecollector to remove superfluous members from the ETCD cluster. Due to this, etcd-backup-restore now needs permissions to list pods and statefulsets. (gardener/etcd-backup-restore#403, @aaronfern)

🏃 Others

📰 Noteworthy

[etcd-custom-image]

🏃 Others

v0.10.0

08 Jun 20:28
Compare
Choose a tag to compare

[etcd-druid]

🐛 Bug Fixes

  • [OPERATOR] A bug has been fixed that deleted member lease objects in all namespaces. With this release member lease renewals are enabled again. (gardener/etcd-druid#353, @timuthy)

📖 Documentation

🏃 Others

  • [OPERATOR] Fixed a bug where druid did not copy etcd labels to configmap (gardener/etcd-druid#343, @aaronfern)
  • [OPERATOR] Do not re-used resource limits from an existing etcd stateful set. This will cause a RESTART(!) of the etcd pod for existing clusters that currently have a resource limit set for the etcd stateful-set, but whose etcd resource does not specify a resource limit. (gardener/etcd-druid#342, @danielfoehrKn)
  • [OPERATOR] ETCd backups can now be successfully copied between OCS buckets. (gardener/etcd-druid#330, @Wieneo)

[etcd-backup-restore]

🐛 Bug Fixes

🏃 Others

📰 Noteworthy

[etcd-custom-image]

🏃 Others

v0.8.5

12 May 12:10
Compare
Choose a tag to compare

[etcd-druid]

🏃 Others

  • [OPERATOR] Do not re-used resource limits from an existing etcd stateful set. This will cause a RESTART(!) of the etcd pod for existing clusters that currently have a resource limit set for the etcd stateful-set, but whose etcd resource does not specify a resource limit. (#342, @danielfoehrKn)

[etcd-backup-restore]

🏃 Others

  • [OPERATOR] When the owner check fails, etcd-backup-restore will restart the etcd process right before attempting to take a final snapshot, if the owner check was previously successful. (gardener/etcd-backup-restore#478, @plkokanov)

v0.8.4

09 May 13:36
Compare
Choose a tag to compare

[etcd-backup-restore]

🏃 Others

v0.8.3

27 Apr 06:30
Compare
Choose a tag to compare

[etcd-backup-restore]

🐛 Bug Fixes

🏃 Others

v0.9.0

12 Apr 05:58
Compare
Choose a tag to compare

[etcd-druid]

⚠️ Breaking Changes

  • [OPERATOR] If Spec.Replicas in ETCD CR is greater than 0 and a even number, then no statefulset for ETCD nodes will be created and so the ETCD cluster won't be setup by Druid (gardener/etcd-druid#314, @abdasgupta)

✨ New Features

🐛 Bug Fixes

  • [OPERATOR] A bug has been fixed which prevented the ServiceAccount's automountServiceAccountToken field from being reconciled. (gardener/etcd-druid#316, @rfranzke)

🏃 Others

  • [OPERATOR] Deployed configmap programmatically as component instead of chart (gardener/etcd-druid#314, @abdasgupta)
    • configmap configures ETCD config based on the number of nodes in cluster. Number of nodes in cluster is derived from spec.Replicas of ETCD CR
    • Introduced separate TLS config for client and peer communication with ETCD cluster

[etcd-backup-restore]

📰 Noteworthy

  • [OPERATOR] Multi-node etcd bootstrapping is now supported. This is an alpha feature intended for initial use and evaluation. Please do not enable this feature for your productive workloads (gardener/etcd-backup-restore#419, @abdasgupta)
    • Multi-node etcd restoration from backup buckets is not supported
    • Intended to work only with etcd-druid v0.9.x and beyond
    • Intended to work only with etcd-custom-image v3.4.13-bootstrap-4 and beyond

v0.8.2

05 Apr 14:17
Compare
Choose a tag to compare

[etcd-backup-restore]

🐛 Bug Fixes