Skip to content

Commit 3136c3c

Browse files
Update breaking changes in 1.1.0 (#3061) (#3071)
* Update breaking changes in 1.1.0 * Update docs/release-notes/highlights-1.1.0.asciidoc Co-authored-by: Anya Sabo <[email protected]> Co-authored-by: Anya Sabo <[email protected]> Co-authored-by: Anya Sabo <[email protected]>
1 parent 3b746c5 commit 3136c3c

File tree

2 files changed

+53
-1
lines changed

2 files changed

+53
-1
lines changed

docs/release-notes/1.1.0.asciidoc

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,6 +9,7 @@
99
=== Breaking changes
1010

1111
* Remove operator roles {pull}2530[#2530]
12+
* Make readiness probes independent of the host/container network {pull}2528[#2528]
1213
* Name container ports according to protocol {pull}2498[#2498] (issue: {issue}2483[#2483])
1314

1415

@@ -40,7 +41,6 @@
4041
* ECK dump: export controller revisions {pull}2538[#2538]
4142
* Add operator flag to define default container registry {pull}2537[#2537]
4243
* Rename log.logger to event.dataset as recommended in ECS {pull}2534[#2534]
43-
* Make readiness probes independent of the host/container network {pull}2528[#2528]
4444
* Bump controller-tools {pull}2497[#2497] (issue: {issue}2490[#2490])
4545
* Extend cluster-wide rbac roles for elastic crds {pull}2495[#2495]
4646
* Control associations across namespaces with ServiceAccount and RBAC {pull}2482[#2482]

docs/release-notes/highlights-1.1.0.asciidoc

+52
Original file line numberDiff line numberDiff line change
@@ -65,6 +65,58 @@ The concept of `global` and `namespace` operator roles no longer exists, and as
6565

6666
Container ports of managed resources are now named according to the protocol (`https` for TLS enabled ports and `http` for TLS disabled ports). Previously they were named `http` regardless of the protocol being used. If you have any configurations that refer to the container ports by name (Ingress configurations, for example), review those to ensure that they use the correct name. One option may be to temporarily change to targeting the port number (e.g. `9200` for Elasticsearch), rather than the name, before updating ECK. Once the container port is updated to the new name, you can change to targeting the port name again.
6767

68+
[float]
69+
[id="{p}-110-breaking-readiness-probe"]
70+
==== Readiness probe change for Kibana and APM Server
71+
72+
Default readiness probes generated by the operator for Kibana and APM Server resources have changed from HTTP GET actions to exec actions. This is to accommodate environments where host-to-pod communication is restricted for security reasons. This change will affect ingress resources that are used to expose Kibana or APM Server, as some ingress controllers re-purpose the pod readiness probe as a health check. If you are unable to access Kibana or APM Server through the ingress after upgrading to ECK 1.1.0, override the readiness probe definitions as follows:
73+
74+
.Kibana
75+
[source,yaml,subs="attributes"]
76+
----
77+
apiVersion: kibana.k8s.elastic.co/{eck_crd_version}
78+
kind: Kibana
79+
metadata:
80+
name: quickstart
81+
spec:
82+
version: {version}
83+
count: 1
84+
elasticsearchRef:
85+
name: quickstart
86+
podTemplate:
87+
spec:
88+
containers:
89+
- name: kibana
90+
readinessProbe:
91+
httpGet:
92+
scheme: HTTPS
93+
path: "/login"
94+
port: 5601
95+
----
96+
97+
.APM Server
98+
[source,yaml,subs="attributes"]
99+
----
100+
apiVersion: apm.k8s.elastic.co/{eck_crd_version}
101+
kind: ApmServer
102+
metadata:
103+
name: quickstart
104+
spec:
105+
version: {version}
106+
count: 1
107+
elasticsearchRef:
108+
name: quickstart
109+
podTemplate:
110+
spec:
111+
containers:
112+
- name: apm-server
113+
readinessProbe:
114+
httpGet:
115+
scheme: HTTPS
116+
path: "/"
117+
port: 8200
118+
----
119+
68120
[float]
69121
[id="{p}-110-security"]
70122
=== Security Advisory

0 commit comments

Comments
 (0)