Skip to content

Releases: hetznercloud/hcloud-cloud-controller-manager

v1.28.0

29 Oct 14:02
a1f6de6

Choose a tag to compare

Updated ClusterRole for HCCM

We have introduced a custom ClusterRole for the HCCM component, based on the upstream recommendation from sig-cloud-provider.

To ensure a smooth transition, we renamed the ClusterRoleBinding by adding the :restricted suffix. This change was necessary because the roleRef field in a ClusterRoleBinding is immutable, which would otherwise cause errors during a Helm upgrade.

As a result, users who deploy HCCM using the provided Kubernetes manifests must manually delete the old ClusterRoleBinding after applying the updated manifests. Users deploying via the Helm chart do not need to take any action.

kubectl delete clusterrolebindings.rbac.authorization.k8s.io system:hcloud-cloud-controller-manager

Features

  • helm: use custom ClusterRole
  • configurable metrics address (#1055)

Bug Fixes

  • add client-side timeouts to hcloud and robot clients (#1058)

v1.28.0-rc.1

28 Oct 16:21
28815b3

Choose a tag to compare

Updated ClusterRole for HCCM

We have introduced a custom ClusterRole for the HCCM component, based on the upstream recommendation from sig-cloud-provider.

Due to this change, users who deploy HCCM using the provided Kubernetes manifests must manually remove the old ClusterRoleBinding after applying the updated manifests. Users deploying via the Helm chart do not need to perform any migration steps.

kubectl delete clusterrolebindings.rbac.authorization.k8s.io system:hcloud-cloud-controller-manager

v1.28.0-rc.0

28 Oct 13:36
fb201c8

Choose a tag to compare

Updated ClusterRole for HCCM

We have introduced a custom ClusterRole for the HCCM component, based on the upstream recommendation from sig-cloud-provider.

Because of this change, a simple helm upgrade may fail due to immutable fields in the existing ClusterRoleBinding. To ensure a successful upgrade, you must delete the existing ClusterRoleBinding before upgrading. This will make HCCM temporarily unavailable until the new version is deployed. Please avoid making any changes to the clusters, especially node- or service-related modifications, during this time.

kubectl delete clusterrolebindings.rbac.authorization.k8s.io system:hcloud-cloud-controller-manager

Features

  • helm: use custom ClusterRole
  • configurable metrics address (#1055)

Bug Fixes

  • add client-side timeouts to hcloud and robot clients (#1058)

v1.27.0

01 Oct 15:17
f5345d1

Choose a tag to compare

Attach Load Balancer to a Subnet

If your CCM is configured for a Private Network, Load Balancers can now join one of its subnets. To place a Load Balancer in a specific subnet, use the new load-balancer.hetzner.cloud/private-subnet-ip-range annotation. Learn more about this feature here.

Watch-Based Route Reconciliation (Experimental)

Currently, route reconciliation is performed at a fixed interval of 30s. This leads to unnecessary API requests, as a GET /v1/networks/{id} call is triggered every 30s, even when no changes have occurred.

Upstream we have proposed an event-driven approach, similar to the mechanism used by other controllers such as the Load Balancer Controller. With this new approach, route reconciliation is triggered on node additions, node deletions, or when the PodCIDRs or Addresses of nodes change. Additionally, to ensure consistency, reconciliation will still occur periodically at a randomized interval between 12 and 24 hours.

We are close to merging a Kubernetes Enhancement Proposal (KEP). Furthermore, a pull request containing the implementation is already open in the Kubernetes repository.

Forked Upstream Libraries

In this release, we replaced the upstream controller-manager and cloud-provider libraries with our own forks. These forks are based on the upstream v0.34.1 release (aligned with Kubernetes v1.34.1) and include our patches on top.

Enabling the Feature

This feature is disabled by default and will not affect existing deployments unless explicitly enabled. We recommend testing it in a non-production environment before considering use in production.

As the KEP has not yet been reviewed for production readiness, the feature gate name may change in an upcoming release. Since this feature is marked as experimental, such changes will not be considered breaking.

To enable the feature, set the following Helm value:

args.feature-gates=CloudControllerManagerWatchBasedRoutesReconciliation=true

Features

  • watch-based route reconciliation (#970)
  • set dns config via helm chart values (#1027)
  • support Kubernetes v1.34 and drop v1.30 (#1037)
  • load-balancer: attach load balancer to specific subnetwork (#1031)

Bug Fixes

  • feature gate cannot be enabled (#980)

v1.27.0-alpha.1

18 Jul 08:06
7e69452

Choose a tag to compare

This release introduces an experimental feature to address #395.

Watch-Based Route Reconciliation (Experimental)

Currently, route reconciliation is performed at a fixed interval of 30s. This leads to unnecessary API requests, as a GET /v1/networks/{id} call is triggered every 30s, even when no changes have occurred.

Upstream we have proposed an event-driven approach, similar to the mechanism used by other controllers such as the Load Balancer Controller. With this new approach, route reconciliation is triggered on node additions, node deletions, or when the PodCIDRs or Addresses of nodes change. Additionally, to ensure consistency, reconciliation will still occur periodically at a randomized interval between 12 and 24 hours.

We are close to merging a Kubernetes Enhancement Proposal (KEP). Furthermore, a work-in-progress pull request containing the implementation is already open in the Kubernetes repository.

Forked Upstream Libraries

In this release, we replaced the upstream controller-manager and cloud-provider libraries with our own forks. These forks are based on the upstream v0.33.2 release (aligned with Kubernetes v1.33.2) and include our patches on top.

Enabling the Feature

This feature is disabled by default and will not impact existing deployments unless explicitly enabled. We do not recommend running this feature in production environments at this stage. However, we welcome early testers who can try it in non-critical setups. Running with this feature active is enough for us to analyze its impact. No additional feedback is required.

To enable the feature, set the following Helm value:

args.feature-gates=CloudControllerManagerWatchBasedRoutesReconciliation=true

Bug Fixes

  • feature gate cannot be enabled (#980)

v1.27.0-alpha.0

11 Jul 13:33
298e05e

Choose a tag to compare

🛑 Broken release

🛑 This release is broken due to an issue in the release config. Please use v1.27.0-alpha.1.

This release introduces an experimental feature to address #395.

Watch-Based Route Reconciliation (Experimental)

Currently, route reconciliation is performed at a fixed interval of 30 seconds. This leads to unnecessary API requests, as a GET /v1/networks/{id} call is triggered every 30 seconds, even when no changes have occurred.

Upstream we have proposed an event-driven approach, similar to the mechanism used by other controllers such as the Load Balancer Controller. With this new approach, route reconciliation is triggered on node additions, node deletions, or when the PodCIDRs or Addresses of nodes change. Additionally, to ensure consistency, reconciliation will still occur periodically at a randomized interval between 12 and 24 hours.

We are close to merging a Kubernetes Enhancement Proposal (KEP). Furthermore, a work-in-progress pull request containing the implementation is already open in the Kubernetes repository.

Forked Upstream Libraries

In this release, we replaced the upstream controller-manager and cloud-provider libraries with our own forks. These forks are based on the upstream v0.33.2 release (aligned with Kubernetes v1.33.2) and include our patches on top.

Enabling the Feature

This feature is disabled by default and will not impact existing deployments unless explicitly enabled. We do not recommend running this feature in production environments at this stage. However, we welcome early testers who can try it in non-critical setups. Running with this feature active is enough for us to analyze its impact. No additional feedback is required.

To enable the feature, set the following Helm value:

args.feature-gates=CloudControllerManagerWatchBasedRoutesReconciliation=true

Features

  • watch-based route reconciliation (#970)

v1.26.0

02 Jul 14:20
419d814

Choose a tag to compare

Features

  • add Kubernetes v1.33 and remove EOL version v1.29 (#934)
  • helm: add value to disable ClusterRoleBinding for out-of-cluster install (#962)

v1.25.1-rc.0

21 May 07:30
2662f92

Choose a tag to compare

Bug Fixes

  • binaries are missing in the release (#930)

v1.25.1

21 May 07:47
05b0975

Choose a tag to compare

Bug Fixes

  • binaries are missing in the release (#930)

v1.25.0

20 May 14:03
a05344c

Choose a tag to compare

Features

  • helm: support custom priorityClassName (#908)
  • helm: support imagePullSecrets (#907)