Skip to content

Latest commit

 

History

History
258 lines (168 loc) · 10.4 KB

CHANGELOG.md

File metadata and controls

258 lines (168 loc) · 10.4 KB

Changelog

All notable changes to this project will be documented in this file.

The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.

Unreleased

v0.19.1 - 2024-07-29

⛓️ Dependencies

  • Updated alpine to v3.20.2
  • Updated k8s.io/utils digest

v0.19.0 - 2024-06-24

🚀 Enhancements

  • Add 1.29 and 1.30 support and drop 1.25 and 1.24 @dbudziwojskiNR #451

⛓️ Dependencies

  • Updated alpine to v3.20.1

v0.18.1 - 2024-05-27

⛓️ Dependencies

  • Updated k8s.io/utils digest to fe8a2dd
  • Updated alpine to v3.20.0

v0.18.0 - 2024-02-26

🚀 Enhancements

  • Add linux node selector @dbudziwojskiNR #418

v0.17.0 - 2024-02-05

🚀 Enhancements

  • Add Codecov @dbudziwojskiNR #407

v0.16.3 - 2024-01-29

⛓️ Dependencies

  • Updated alpine to v3.19.1

v0.16.2 - 2024-01-22

⛓️ Dependencies

  • Updated go to v1.21.6

v0.16.1 - 2024-01-08

⛓️ Dependencies

  • Updated k8s.io/utils digest to e7106e6

v0.16.0 - 2023-12-09

🚀 Enhancements

  • Trigger release creation by @juanjjaramillo #390

⛓️ Dependencies

  • Updated alpine to v3.19.0
  • Updated go to v1.21.5

v0.15.0 - 2023-12-06

🚀 Enhancements

  • Update reusable workflow dependency by @juanjjaramillo in #383

v0.14.0 - 2023-11-20

🚀 Enhancements

  • Create E2E resources Helm chart by @juanjjaramillo in #377
  • Create E2E tests by @juanjjaramillo in #378
  • Create E2E workflow by @juanjjaramillo in #379

v0.13.0 - 2023-11-13

🚀 Enhancements

  • Replace k8s v1.28.0-rc.1 with k8s 1.28.3 support by @svetlanabrennan in #372

v0.12.0 - 2023-10-30

🚀 Enhancements

  • Remove 1.23 support by @svetlanabrennan in #364
  • Add k8s 1.28.0-rc.1 support by @svetlanabrennan in #366

⛓️ Dependencies

  • Updated sigs.k8s.io/yaml to v1.4.0

v0.11.3 - 2023-10-23

⛓️ Dependencies

  • Updated github.com/google/go-cmp to v0.6.0 - Changelog 🔗
  • Updated k8s.io/utils digest

v0.11.2 - 2023-10-16

🐞 Bug fixes

  • Address CVE-2023-3978, CVE-2023-44487 and CVE-2023-39325 by juanjjaramillo in #354

v0.11.1 - 2023-10-03

🐞 Bug fixes

  • Update k8s versions in CI by @xqi-nr in #323
  • Refactor changelog workflow to use reusable workflow by @juanjjaramillo in #339
  • Enable automatic release by @juanjjaramillo in #341

⛓️ Dependencies

  • Updated alpine to v3.18.4

[0.10.2]

What's Changed

  • Update CHANGELOG.md by @juanjjaramillo in #292
  • Bump versions by @juanjjaramillo in #293
  • chore(deps): bump aquasecurity/trivy-action from 0.10.0 to 0.11.0 by @dependabot in #294
  • chore(deps): bump github.com/sirupsen/logrus from 1.9.2 to 1.9.3 by @dependabot in #295
  • chore(deps): update newrelic/infrastructure-k8s docker tag to v2.13.10 by @renovate in #296
  • chore(deps): bump alpine from 3.18.0 to 3.18.2 by @dependabot in #299
  • chore(deps): bump k8s.io/apimachinery from 0.27.2 to 0.27.3 by @dependabot in #301
  • chore(deps): bump aquasecurity/trivy-action from 0.11.0 to 0.11.2 by @dependabot in #297
  • Upgrade Go Version by @xqi-nr in #302

New Contributors

  • @xqi-nr made their first contribution in #302

Full Changelog: https://github.com/newrelic/newrelic-infra-operator/compare/v0.10.1...v0.10.2

[0.10.1]

What's Changed

  • Bump app and chart versions by @juanjjaramillo in #284
  • chore(deps): bump newrelic/infrastructure-k8s from 2.13.6-unprivileged to 2.13.7-unprivileged by @dependabot in #285
  • Update Helm unit test reference by @juanjjaramillo in #286
  • chore(deps): bump github.com/sirupsen/logrus from 1.9.0 to 1.9.2 by @dependabot in #288
  • chore(deps): bump k8s.io/apimachinery from 0.27.1 to 0.27.2 by @dependabot in #290
  • chore(deps): bump alpine from 3.17.3 to 3.18.0 by @dependabot in #287

Full Changelog: https://github.com/newrelic/newrelic-infra-operator/compare/v0.10.0...v0.10.1

[0.10.0]

Changed

  • Bump chart version by @htroisi in #267
  • Update Renovate configs by @htroisi in #268
  • chore(deps): update helm release common-library to v1.1.1 by @renovate in #269
  • Bump infrastructure-k8s version from 2.13.5 to 2.13.6 by @htroisi in #271
  • chore(deps): bump helm/chart-testing-action from 2.3.1 to 2.4.0 by @dependabot in #270
  • Bump chart version by @htroisi in #272
  • chore(deps): bump alpine from 3.17.2 to 3.17.3 by @dependabot in #274
  • chore(deps): bump sigs.k8s.io/controller-runtime from 0.14.5 to 0.14.6 by @dependabot in #275
  • Fix helm unittest by @htroisi in #282
  • chore(deps): bump aquasecurity/trivy-action from 0.9.2 to 0.10.0 by @dependabot in #280
  • chore(deps): bump actions/github-script from 6.4.0 to 6.4.1 by @dependabot in #276
  • chore(deps): bump k8s.io/apimachinery from 0.26.3 to 0.27.1 by @dependabot in #279
  • chore(deps): update newrelic/infrastructure-k8s docker tag to v2.13.7 by @renovate in #281

[0.9.0]

Changed

  • Bump dependencies
  • Update Kubernetes image registry (#264)

[0.8.0]

Changed

  • bump go version and dependencies (#229)

[0.7.0]

Changed

  • Bumped dependencies

[0.6.0]

Changed

  • Bumped dependencies

[0.5.0]

Changed

Adds Kubernetes 1.22 dependencies updates and some cleanups.

[0.4.0]

Changed

Modified the volumes names in order to avoid collisions

This change was needed in order to be able to instrument nri-kube-events.

[0.3.0]

Changed

First release packaged in the newrelic-infra-operator chart

Configure in which pods the sidecar should be injected

Policies are available in order to configure in which pods the sidecar should be injected. Each policy is evaluated independently and if at least one policy matches the operator will inject the sidecar.

Policies are composed by namespaceSelector checking the labels of the Pod namespace, podSelector checking the labels of the Pod and namespace checking the namespace name. Each of those, if specified, are ANDed.

By default, the policies are configured in order to inject the sidecar in each pod belonging to a Fargate profile.

Moreover, it is possible to add the label infra-operator.newrelic.com/disable-injection to Pods to exclude injection for a single Pod that otherwise would be selected by the policies.

Please make sure to configure policies correctly to avoid injecting sidecar for pods running on EC2 nodes already monitored by the infrastructure DaemonSet.

Configure the sidecar with labelsSelectors

It is also possible to configure resourceRequirements and extraEnvVars based on the labels of the mutating Pod.

The current configuration increases the resource requirements for sidecar injected on KSM instances. Moreover, injectes disable the DISABLE_KUBE_STATE_METRICS environment variable for Pods not running on KSM instances to decrease the load on the API server.

Hash computed for each configWithSelectors

Right now, we hash an injected container without environment variables or resource requirements. This commit improves that and add all other configuration options to the mix, which make sense, like cluster name, resource prefix etc.

Also now, each config selector will have it's own hash, with specific value, so when config selector configuration changes, only affected pods will need to be re-created.

Alternatively, we could cache entire configuration struct, however, that would give a lot of false positives, as in any configuration change, all pods would have to be re-created.

[0.2.0]

Changed

  • Moving CustomAttributes in the agentConfig

[0.1.0]

Added

  • Initial release