-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[EKS] [request]: Release CNI Plugin 1.4 for EKS #149
Comments
Created a 1.4 Milestone |
Released on GitHub, but still not used in the default EKS AMI. |
@tabern is this the AMI default now? |
@StevenACoffman It's not yet the default. We are working on a few minor tweaks, like updating metrics to work with the new prometheus endpoints (aws/amazon-vpc-cni-k8s#413) and some Calico cleanups (aws/amazon-vpc-cni-k8s#410, aws/amazon-vpc-cni-k8s#421) before making it the default. |
Where can we track the change to AMI default, if not this issue? |
@mogren I see 1.4.1 just released with all the issues you mention merged. Is there a tracking issue for when 1.4.x will be the AMI default? |
Hey @StevenACoffman this is actually the issue for tracking 1.4.2 as the AMI default. We closed it in error last week. |
Still not the default, but we will roll it out soon. |
Starting today, CNI v1.4.1 is the default for new EKS clusters. If you were using the old |
Tell us about your request
Next CNI release with all changes since CNI 1.3.2
https://github.com/aws/amazon-vpc-cni-k8s/milestone/5
Which service(s) is this request for?
EKS team, CNI plugin https://github.com/aws/amazon-vpc-cni-k8s
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
Some major features have been added since the last release:
Are you currently working around this issue?
Some users are currently limited by not being able to use these new features.
Additional context
Tracking issue for CNI 1.4
The text was updated successfully, but these errors were encountered: