Skip to content

Releases: elastic/cloud-on-k8s

1.4.1

10 Mar 06:44
512d543
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.4.1

Bug fixes

  • Set webhook matchPolicy to Exact #4271 (issue: #4270)
  • [Helm] Unify role bindings #4262

1.4.0

10 Feb 08:14
4aff0b9
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.4.0

New features

  • Add Elastic Agent CRD (standalone mode) #4010
  • Add support for multi-arch container images #3897 (issue: #3504)

Enhancements

  • Add support for a user-defined transport CA certificate and key #4053 (issue: #2812)
  • Add support for DaemonSetUpdateStrategy #4049 (issue: #3839)
  • [Helm] Use ValidatingWebhookConfiguration v1 on supported Kubernetes versions #3963 (issues: #3886, #3958)
  • Include Beats daemonsets in the diagnostic bundle #3908
  • Add support for webhook constraints #3876 (issue: #3431)
  • Remove unnecessary metrics from _nodes ES API request #3860 (issue: #3249)
  • Allow automatic Elasticsearch nodes discovery #3837 (issues: #3182, #3723)
  • Enable webhook dry run on supported Kubernetes versions #3834 (issue: #1233)
  • Create one transport certificates Secret per StatefulSet #3828 (issue: #3734)

Bug fixes

  • Update client-go to 0.18.14 #4097 (issue: #4087)
  • Don't duplicate user-provided Enterprise Search encryption keys when reusing them #4052 (issue: #4051)
  • Add a replacement mechanism to work around nil handling in ucfg #4041 (issue: #3718)
  • Avoid touching root filesystem in Kibana init script #4023 (issue: #4022)
  • Don't allow downscales if some shards are unassigned #3883 (issue: #3867)
  • Include secret token in APM Server config checksum #3858 (issue: #523)
  • Do not set the default elasticsearch-data volume if claims are provided in the Elasticsearch manifest #3806 (issue: #2574)

1.3.2

10 Feb 10:22
cd7cb18
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.3.2

Enhancements

  • Adjust init container script for Elastic License 2.0 #4191

1.2.2

10 Feb 10:21
5ce0eca
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.2.2

Enhancements

  • Adjust init container script for Elastic License 2.0 #4191

1.3.1

09 Dec 15:14
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.3.1

Bug fixes

  • [Helm] Honour serviceAccount.create value #4003 (issue: #4002)
  • Use the public transport CA as remote CA if the remote CA list is empty #3993
  • Don't set an ownerRef on secrets users are susceptible to copy around #3992 (issue: #3986)
  • Use a custom version of JSON marshalling for license verification #3977
  • Use new node_names query param for voting exclusions as of 7.8.0 #3950 (issue: #2951)

1.3.0

11 Nov 15:40
6db1914
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.3.0

New features

  • Make timeouts configurable #3782 (issue: #684)
  • Support Elasticsearch volumes expansion #3752 (issues: #325, #3757, #3767)
  • Refactor Helm chart for public usage #3711
  • Add DeploymentStrategy to Beats CRDs #3633 (issue: #3485)
  • Add operator election support #3632 (issue: #709)

Enhancements

  • Add license info to telemetry #3859
  • Validate whether the storage class allows volume expansion before resizing volumes #3795 (issue: #3767)
  • Add external IP addresses to certificate #3791 (issue: #910)
  • Support a UBI-only mode in the operator #3789
  • Add CRD usage reporting #3784
  • Refactor node configuration and add role validation #3694 (issue: #3409)
  • Add support for configuration changes under OLM #3639 (issue: #3591)
  • Remove unnecessary memory leak mitigation patch #3585
  • Add a container suffix flag to the operator #3582 (issue: #3552)
  • Allow the operator to be configured from a file #3570 (issue: #3401)
  • Reflect currently running version from status.version in additionalPrinterColumns #3549
  • Report the lowest running version in the status of each resource #3489 (issue: #2600)
  • Add WebhookConfigurationName Flag (#3424) #3425
  • Add metadata for transform node role #3411
  • Add support for the node.roles setting #3387 (issue: #3324)
  • Add node shard allocation awareness by default #3380 (issue: #2827)
  • Add metadata for transform node role #3361

Bug fixes

  • Don't allow downscales if some shards are unassigned #3883 (issue: #3867)
  • Support new authentication configuration format starting EnterpriseSearch 8.x #3728 (issue: #3725)
  • Do not reset trial state once a license has been issued. #3662 (issue: #3659)
  • Support user provided encrypted keys #3651 (issue: #3650)
  • Garbage collect orphaned Beat users #3589
  • Update owner references in reconcile resource util function #3574 (issue: #3470)
  • Fix volume slice initialization in beat pod builder #3555 (issue: #3554)
  • Ensure status.version is reconciled by watching Pods #3534 (issue: #3533)
  • Init containers image defaulting #3525 (issue: #3453)

1.2.1

11 Aug 13:41
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.2.1

Enhancements

  • Add support for keystore with Kibana 7.9.0 #3566 (issue: #3528)

Bug fixes

  • Avoid pollution of map constants via defensive copy #3599
  • Fix filebeat securityContext in recipes #3596
  • Check if CA Secret is expected before validating its name #3527 (issue: #3523)
  • Fix memory corruption from pod template validation #3524 (issue: #3421)

1.2.0

21 Jul 06:01
51ae5fd
Compare
Choose a tag to compare

Elastic Cloud on Kubernetes 1.2.0

New features

Enhancements

  • Add additional Kibana encryption keys #3285 (issue: #2279)
  • Name transport service port #3233
  • Use _cluster/health API during rolling upgrades #3195 (issue: #3070)
  • Set resource limits for the keystore init container #3193 (issue: #2660)
  • Relax pod disruption budget for single node clusters #3167
  • Switch operator base image to Distroless #3161
  • Introduce a restricted role for APM agent configuration #3155
  • Do not stop running trial even when ECK is not in trial mode #3150 (issue: #3141)
  • Add licence usage metrics #3145 (issue: #3140)
  • Add manifest generator #3124 (issue: #2406)
  • Add support for APM Agent Config Management #3043 (issue: #1264)
  • Add PodTemplate semantic validation for Elasticsearch #3020 (issue: #2266)
  • Add port to nodeSet headless service #3011 (issue: #2843)
  • Name the webhook service port #2829 (issue: #2771)
  • Restrict APM Server user role #2777 (issue: #2661)

Bug fixes

  • Do not manage keystore if already initialized #3295 (issue: #3294)
  • Only provision Enterprise licenses as of 7.8.1 #3273 (issue: #3272)
  • Replace the license observer by a sync call in the reconciliation #3165 (issue: #3163)
  • Preserve extra annotations and labels on StatefulSet updates #3149 (issue: #3147)
  • Fix APM Server user role #3010 (issue: #2977)
  • Fix user http tls certificate watch leak #2975 (issue: #249)

1.1.2

28 May 23:57
f13b6d2
Compare
Choose a tag to compare

New and notable

This release contains bug fixes especially relevant for

  • users with custom certificates configured
  • users deploying ECK into dual-stack Kubernetes clusters

as well as some minor bug fixes.

Upgrade notes

In ECK 1.1.0, users using custom certificates would be required to specify a certificate authority (CA), even if the CA was present in the system certificates. This was a regression in 1.1.0 and has been fixed in 1.1.2. Users with custom certificates that are signed by a well-known CA will now function without the user specifying the CA explicitly.

In dual-stack (IPv4 and IPv6) clusters, the ipFamily field of any Service is defaulted and immutable. Previous versions of ECK would try to reset this field and fail. ECK 1.1.2 resolves this behavior and will leave the ipFamily field intact. Note that at this time ECK does not support running on IPv6, this simply allows it to run in Kubernetes clusters with the IPv6DualStack feature flag enabled.

1.1.1

14 May 21:13
b6f69fc
Compare
Choose a tag to compare

Breaking changes

  • Revert readiness probes independent of the host/container... (#2528) #3060

Enhancements

  • Increase the operator default memory requirements #3046 (issue: #3025)

Bug fixes

  • Restore transport certs public secret naming scheme from 1.0 #3035 (issue: #3034)