From 750be8a5f3d2158308aa1e35cc8013f7990d1142 Mon Sep 17 00:00:00 2001 From: Stefan Reimer Date: Wed, 13 Apr 2022 16:22:03 +0200 Subject: [PATCH] chore: test markdown --- releases/v1.22/README.md | 34 ++++++++++++++++++++++++---------- 1 file changed, 24 insertions(+), 10 deletions(-) diff --git a/releases/v1.22/README.md b/releases/v1.22/README.md index 45bc064b..1aa9a083 100644 --- a/releases/v1.22/README.md +++ b/releases/v1.22/README.md @@ -1,21 +1,35 @@ --- -title: KubeZero 1.22 +title: Release notes +author: Stefan Reimer --- -# Release notes +# Custom AMIs +Starting with 1.22, all KubeZero nodes will boot from custom pre-baked AMIs. These AMIs will be provided and shared by the Zero Down Time for all customers, all sources and build pipeline are freely [available](https://git.zero-downtime.net/ZeroDownTime/alpine-zdt-images). -## Custom AMIs -Starting with 1.22.X, all KubeZero nodes will boot from custom pre-baked AMIs. These AMIs will be provided and shared by the Zero Down Time AWS account. -This change elimitates *ALL* dependencies at boot time other than container registries. Gone are the days when Ubuntu, SuSE or Github decided to ruin your morning coffee. +This eliminates *ALL* dependencies at boot time other than container registries. Gone are the days when Ubuntu, SuSE or Github decided to ruin your morning coffee. -While we are at it, KubeZero also moves from Ubuntu 20.04LTS to Alpine 3.15 as its base OS. +KubeZero also migrates from Ubuntu 20.04 LTS to [Alpine v3.15](https://www.alpinelinux.org/releases/) as its base OS, which reduces the root file system size from 8GB to 2GB. +Additionally all AMIs are encrypted, which is ensures encryption at rest even for every instance's root file system. This closes the last gaps in achieving *full encryption at rest* for every volume within a default KubeZero deployment. -## Misc +# DNS +The [external-dns](https://github.com/kubernetes-sigs/external-dns) controller got integrated and is used to provide DNS based loadbalacing for the apiserver itself. This allows high available control planes on AWS as well as bare-metal in combination with various DNS providers. + +Further usage of this controller to automate any DNS related configurations, like Ingress etc. is planned for following releases. + +# crun - container runtime +got migrated from runc to crun, which reduces the memory overhead *per pod* from 16M to 4M, details at [crun intro](https://www.redhat.com/sysadmin/introduction-crun) + +# Version upgrades +- Istio to 1.13.2 +- aws-termination-handler to 1.16 +- aws-iam-authenticator to 0.5.7 + +# Misc +- new metrics and dashboards for openEBS LVM CSI drivers - new node label `node.kubernetes.io/instance-type` for all nodes containing the EC2 instance type -- container runtime migrated from runc to crun, reduces memory overhead per pod from 16M to 4M, more info: https://www.redhat.com/sysadmin/introduction-crun -## Upgrade +# Upgrade *Ensure your Kube context points to the correct cluster !!!* @@ -40,5 +54,5 @@ Eg. by doubling `desired` for each worker ASG, once all new workers joined, drain old workers one by one, finally reset `desired` for each worker ASG which will terminate the old workers. -## Known issues +# Known issues