All notable changes to this project will be documented in this file.
The format is based on Keep a Changelog, and this project adheres to Semantic Versioning.
- Updated go to v1.23.4
- Updated k8s.io/utils digest
- Updated alpine to v3.21.0
- Updated k8s.io/utils digest
- Updated go to v1.23.3
- Update net to 0.23.0 and protobuf to 1.33.0 @ramkrishankumarN #481
- Add 1.31 support and drop 1.26 @zeitlerc #476
- Updated go to v1.23.2
- Updated alpine to v3.20.3
- Updated k8s.io/utils digest to f90d014
- Updated alpine to v3.20.2
- Updated k8s.io/utils digest
- Add 1.29 and 1.30 support and drop 1.25 and 1.24 @dbudziwojskiNR #451
- Updated alpine to v3.20.1
- Updated k8s.io/utils digest to fe8a2dd
- Updated alpine to v3.20.0
- Add linux node selector @dbudziwojskiNR #418
- Add Codecov @dbudziwojskiNR #407
- Updated alpine to v3.19.1
- Updated go to v1.21.6
- Updated k8s.io/utils digest to e7106e6
- Trigger release creation by @juanjjaramillo #390
- Updated alpine to v3.19.0
- Updated go to v1.21.5
- Update reusable workflow dependency by @juanjjaramillo in #383
- Create E2E resources Helm chart by @juanjjaramillo in #377
- Create E2E tests by @juanjjaramillo in #378
- Create E2E workflow by @juanjjaramillo in #379
- Replace k8s v1.28.0-rc.1 with k8s 1.28.3 support by @svetlanabrennan in #372
- Remove 1.23 support by @svetlanabrennan in #364
- Add k8s 1.28.0-rc.1 support by @svetlanabrennan in #366
- Updated sigs.k8s.io/yaml to v1.4.0
- Updated github.com/google/go-cmp to v0.6.0 - Changelog 🔗
- Updated k8s.io/utils digest
- Address CVE-2023-3978, CVE-2023-44487 and CVE-2023-39325 by juanjjaramillo in #354
- Update k8s versions in CI by @xqi-nr in #323
- Refactor
changelog
workflow to use reusable workflow by @juanjjaramillo in #339 - Enable automatic release by @juanjjaramillo in #341
- Updated alpine to v3.18.4
- Update CHANGELOG.md by @juanjjaramillo in #292
- Bump versions by @juanjjaramillo in #293
- chore(deps): bump aquasecurity/trivy-action from 0.10.0 to 0.11.0 by @dependabot in #294
- chore(deps): bump github.com/sirupsen/logrus from 1.9.2 to 1.9.3 by @dependabot in #295
- chore(deps): update newrelic/infrastructure-k8s docker tag to v2.13.10 by @renovate in #296
- chore(deps): bump alpine from 3.18.0 to 3.18.2 by @dependabot in #299
- chore(deps): bump k8s.io/apimachinery from 0.27.2 to 0.27.3 by @dependabot in #301
- chore(deps): bump aquasecurity/trivy-action from 0.11.0 to 0.11.2 by @dependabot in #297
- Upgrade Go Version by @xqi-nr in #302
- @xqi-nr made their first contribution in #302
Full Changelog: https://github.com/newrelic/newrelic-infra-operator/compare/v0.10.1...v0.10.2
- Bump app and chart versions by @juanjjaramillo in #284
- chore(deps): bump newrelic/infrastructure-k8s from 2.13.6-unprivileged to 2.13.7-unprivileged by @dependabot in #285
- Update Helm unit test reference by @juanjjaramillo in #286
- chore(deps): bump github.com/sirupsen/logrus from 1.9.0 to 1.9.2 by @dependabot in #288
- chore(deps): bump k8s.io/apimachinery from 0.27.1 to 0.27.2 by @dependabot in #290
- chore(deps): bump alpine from 3.17.3 to 3.18.0 by @dependabot in #287
Full Changelog: https://github.com/newrelic/newrelic-infra-operator/compare/v0.10.0...v0.10.1
- Bump chart version by @htroisi in #267
- Update Renovate configs by @htroisi in #268
- chore(deps): update helm release common-library to v1.1.1 by @renovate in #269
- Bump infrastructure-k8s version from 2.13.5 to 2.13.6 by @htroisi in #271
- chore(deps): bump helm/chart-testing-action from 2.3.1 to 2.4.0 by @dependabot in #270
- Bump chart version by @htroisi in #272
- chore(deps): bump alpine from 3.17.2 to 3.17.3 by @dependabot in #274
- chore(deps): bump sigs.k8s.io/controller-runtime from 0.14.5 to 0.14.6 by @dependabot in #275
- Fix helm unittest by @htroisi in #282
- chore(deps): bump aquasecurity/trivy-action from 0.9.2 to 0.10.0 by @dependabot in #280
- chore(deps): bump actions/github-script from 6.4.0 to 6.4.1 by @dependabot in #276
- chore(deps): bump k8s.io/apimachinery from 0.26.3 to 0.27.1 by @dependabot in #279
- chore(deps): update newrelic/infrastructure-k8s docker tag to v2.13.7 by @renovate in #281
- Bump dependencies
- Update Kubernetes image registry (#264)
- bump go version and dependencies (#229)
- Bumped dependencies
- Bumped dependencies
Adds Kubernetes 1.22 dependencies updates and some cleanups.
This change was needed in order to be able to instrument nri-kube-events.
First release packaged in the newrelic-infra-operator
chart
Policies are available in order to configure in which pods the sidecar should be injected. Each policy is evaluated independently and if at least one policy matches the operator will inject the sidecar.
Policies are composed by namespaceSelector
checking the labels of the Pod namespace, podSelector
checking
the labels of the Pod and namespace
checking the namespace name. Each of those, if specified, are ANDed.
By default, the policies are configured in order to inject the sidecar in each pod belonging to a Fargate profile.
Moreover, it is possible to add the label
infra-operator.newrelic.com/disable-injection
to Pods to exclude injection for a single Pod that otherwise would be selected by the policies.
Please make sure to configure policies correctly to avoid injecting sidecar for pods running on EC2 nodes already monitored by the infrastructure DaemonSet.
It is also possible to configure resourceRequirements
and extraEnvVars
based on the labels of the mutating Pod.
The current configuration increases the resource requirements for sidecar injected on KSM
instances. Moreover,
injectes disable the DISABLE_KUBE_STATE_METRICS
environment variable for Pods not running on KSM
instances
to decrease the load on the API server.
Right now, we hash an injected container without environment variables or resource requirements. This commit improves that and add all other configuration options to the mix, which make sense, like cluster name, resource prefix etc.
Also now, each config selector will have it's own hash, with specific value, so when config selector configuration changes, only affected pods will need to be re-created.
Alternatively, we could cache entire configuration struct, however, that would give a lot of false positives, as in any configuration change, all pods would have to be re-created.
- Moving CustomAttributes in the agentConfig
- Initial release