Skip to content

Releases: aerospike/aerospike-kubernetes-operator

Release 2.4.0

14 Jan 06:56
3f5e1f3
Compare
Choose a tag to compare

New Features

  • [KO -117] - Support for Strong Consistency mode.
  • [KO -45] - Support for batch upgrade/downgrade for cluster nodes in a given Rack.
  • [KO -26] - Enhancing namespace management (Allows adding and removing a namespace or namespace storage devices and files).

Improvements

  • [KO -36] - Automatically set migrate-fill-delay to zero when the operator is scaling down the cluster and reset after completing the scaling down.
  • [KO -119] - Scale up all the racks in parallel and then wait for them to be ready.
  • [KO -131] - Running disk cleanup operation in parallel during initialisation and upgrade operation.

Bug fixes

  • [K0 -83] - Allow empty common storage config in aerospike cluster CR.
  • [K0 -124] - Quiesce command is failing for the last node while deleting the namespace.
  • [K0 -126] - Long-running init containers failing due to missing ConfigMap files.

Known Issues

  • Latest OLM (0.22.0) does not fully support ARM architecture.
  • Aerospike Kubernetes Operator 2.4.0 is not available in Red Hat OpenShift Marketplace
  • OLM-based installations (OperatorHub.io and on RedHat OpenShift) have a known issue with upgrading from version 2.3.0 to 2.4.0.
    This upgrade scenario revokes the RBAC privileges required to run Aerospike clusters in Kubernetes namespaces other than the aerospike namespace. If you are upgrading from 2.3.0 to 2.4.0 and are running Aerospike clusters in Kubernetes namespaces other than the aerospike namespace, follow these instructions to restore the required RBAC privileges.

Release 2.3.0

29 Nov 13:04
443e727
Compare
Choose a tag to compare

New Features

  • [KO -146] - Aerospike Server Enterprise 6.2.0.0 support (ARM)

Known Issues

  • Latest OLM (0.22.0) does not fully support ARM architecture.
  • Aerospike Kubernetes Operator 2.3.0 is not available in Red Hat OpenShift Marketplace
  • There is a known issue in OLM-based installations (OperatorHub.io and on Red Hat OpenShift), where an upgrade to version 2.2.0 from 2.1.0 causes revoking of RBAC privileges required to run Aerospike clusters in Kubernetes namespaces other than the aerospike namespace. If you are running Aerospike clusters in Kubernetes namespaces other than the aerospike namespace, re-grant the RBAC privileges following instructions here.

Release 2.2.1

07 Nov 10:41
Compare
Choose a tag to compare

Bug fixes

  • [K0-120] - Handled long-running init containers correctly without pods getting restarted again
  • [KO-116] - Default fsGroup set as root group ID(0) in pod security context to grant init containers write permission to filesystem volumes in OpenShift
  • [KO-137] - Allow Aerospike image tags to have a hyphenated prefix and suffix
  • [KO-138] - Allow PMEM in validation webhook

Known Issues

  • There is a known issue in OLM-based installations (OperatorHub.io and on Red Hat OpenShift), where an upgrade to version 2.2.0 from 2.1.0 causes revoking of RBAC privileges required to run Aerospike clusters in Kubernetes namespaces other than the aerospike namespace. If you are running Aerospike clusters in Kubernetes namespaces other than the aerospike namespace, re-grant the RBAC privileges following instructions here.

Release 2.2.0

11 Sep 12:04
Compare
Choose a tag to compare

Security

  • [KO -101] - Update vulnerable dependencies and container base images

New Features

  • [KO -108] - Aerospike Server Enterprise 6.1.0.1 support

Improvements

  • [KO -48] - Operator generates informative Kubernetes events

Bug fixes

  • [KO -82] - Fixed auto injected volumes causing continuous restart of first Aerospike pod on scale up

Known Issues

  • There is a known issue in OLM based installations (OperatorHub.io and on Red Hat OpenShift) where upgrade to version 2.2.0 from 2.1.0, causes revoking of RBAC privileges required to run Aerospike clusters in Kubernetes namespaces other than the aerospike namespace.If you are running Aerospike clusters in Kubernetes namespaces other than the aerospike namespace, re-grant the RBAC privileges following instructions here.

Release 2.1.0

29 Jul 11:57
3aea613
Compare
Choose a tag to compare

New Features

  • [KO-32] - 6.0.0.0 server release support
  • [KO-47] - Support for LDAP external authentication
  • [KO-81] - Support for data and primary index on PMEM
  • [KO-50] - Ability to pass securityContext to init-container
  • [KO-35] - Custom docker registry for init container
  • [KO-92] - Allow extra storage volumes that are not used by Aerospike namespaces
  • [KO-93] - Allow image pull secrets in Pod Spec for using images from private registries

Improvements

  • [KO-33] - Allow encryption-at-rest key rotation on a live cluster
  • [KO-12] - Allow memory resource limit without requiring CPU resource limit
  • [KO-13] - During scale down, stateful set status check failures do not exponentially backoff
  • [KO-54] - Kube-rbac-proxy & Init-Container now accept resources field

Bug fixes

  • [KO-53] - Fixed XDR list fields ship-bins and ship-sets being ignored
  • [KO-39] - Fixed incorrect custom initContainers volume mount paths

Known Issues

  • There is a known issue in OLM based installations (OperatorHub.io and on Red Hat OpenShift) where upgrade to version 2.1.0 from 2.0.0, causes revoking of RBAC privileges required to run Aerospike clusters in Kubernetes namespaces other than the aerospike namespace. If you are running Aerospike clusters in Kubernetes namespaces other than the aerospike namespace, re-grant the RBAC privileges following instructions here.

Release 2.0.0

28 Dec 15:07
Compare
Choose a tag to compare

[PROD-1783] - Allow for hostNetwork to be set for Aerospike statefulset in CR
[PROD-1902] - Create a load balancer, optionally, for clients to discover Aerospike Pods in a cluster using the load balancer
[PROD-1782] - Allow multiple secrets to be mounted on Aerospike containers
[PROD-1785] - Allow for a configurable list of TLS certs on the server (multiple values for tls-authenticate-client)
[PROD-1786] - Allow configurable non-default ports for heartbeat, fabric, and service traffic.
[PROD-1888] - Use $MY_POD_NAME instead of hostname since it is not guaranteed to be the same as the pod's name
[PROD-1910] - Allow the deployment of a cluster with any number of replicas regardless of the number of racks configured
[PROD-2213] - Control Aerospike Pod placement with configuration by allowing affinity, anti-affinity, and tolerations to be specified
[PROD-2214] - Support OLM
[PROD-2215] - Helm charts for operator 2.0
[PROD-2216] - Support Aerospike Enterprise Server 5.6.x and 5.7.x
[PROD-2217] - Support Kubernetes 1.20, 1.21 and 1.22

Breaking changes

The 2.0.0 custom resource spec has breaking changes to accommodate increased flexibility and broader coverage of deployments.

Release 1.0.1

15 Apr 09:38
Compare
Choose a tag to compare

[CLOUD-59] - Unchanged PodSpec triggers a one-time rolling restart
[CLOUD-60] - Log correct operator version
[CLOUD-61] - Cleanup dangling racks and StatefulSets
[CLOUD-62] - Ignore non-running pods scheduled to be deleted during cluster stability checks
[CLOUD-63] - Fix occasional tip-clear failures after scale down

Release 1.0.0

15 Apr 09:55
Compare
Choose a tag to compare

1.0.0 GA release of Aerospike Kubernetes Operator

Release 0.0.11-beta

15 Apr 09:56
a288b93
Compare
Choose a tag to compare

Beta release of Aerospike Kubernetes Operator