chore(deps): update dependency linkerd/linkerd2 to edge-23.12.4 #421
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
edge-23.9.4
->edge-23.12.4
edge-23.9.3
->edge-23.12.4
Release Notes
linkerd/linkerd2 (linkerd/linkerd2)
vedge-23.12.4
Compare Source
This edge release includes fixes and improvements to the destination
controller's endpoint resolution API.
hang indefinitely (#11815)
that proxies more naturally distribute load over control plane replicas
(#11837)
and metrics have informative values (#11842)
vedge-23.12.3
Compare Source
This edge release contains improvements to the logging and diagnostics of the
destination controller.
(#11774)
profile lookups on unmeshed pods with port in default opaque list (#11550)
vedge-23.12.2
Compare Source
This edge release includes a restructuring of the proxy's balancer along with
accompanying new metrics. The new minimum supported Kubernetes version is 1.22.
independently of request processing. Fail-fast circuit breaking is enforced on
the balancer's queue so that requests can't get stuck in a queue indefinitely.
This new balancer is instrumented with new metrics: request (in-queue) latency
histograms, failfast states, discovery updates counts, and balancer endpoint
pool sizes.
affect statuses from other non-linkerd controllers (#11705; fixes #11659)
vedge-23.12.1
Compare Source
This edge release introduces new configuration values in the identity
controller for client-go's
QPS
andBurst
settings. Default values for thesesettings have also been raised from
5
(QPS) and10
(Burst) to100
and200
respectively.namespaceSelector
fields for the tap-injector and jaeger-injectorwebhooks. The webhooks are now configured to skip
kube-system
by default(#11649; fixes #11647) (thanks @mikutas!)
QPS
andBurst
settings in theidentity controller (#11644)
components (#11632)
PodDisruptionBudgets
in the linkerd-viz Helm chart for tap andtap-injector (#11628; fixes #11248) (thanks @mcharriere!)
vedge-23.11.4
Compare Source
This edge release introduces support for the native sidecar containers entering
beta support in Kubernetes 1.29. This improves the startup and shutdown ordering
for the proxy relative to other containers, fixing the long-standing
shutdown issue with injected
Job
s. Furthermore, traffic from otherinitContainer
s can now be proxied by Linkerd.In addition, this edge release includes Helm chart improvements, and improvements
to the multicluster extension.
config.alpha.linkerd.io/proxy-enable-native-sidecar
annotationand
Proxy.NativeSidecar
Helm option that causes the proxy container to runas an init-container (thanks @teejaded!) (#11465; fixes #11461)
service-mirror
when runningin HA mode (#11609; fixes #11603)
linkerd check
that ensures all extension namespaces areconfigured properly (#11629; fixes #11509)
linkerd-viz
extension tov2.48.0, resolving a number of CVEs in older Prometheus versions (#11633)
nodeAffinity
todeployment
templates in thelinkerd-viz
andlinkerd-jaeger
Helm charts (thanks @naing2victor!) (#11464; fixes#10680)
vedge-23.11.3
Compare Source
This edge release fixes a bug where Linkerd could cause EOF errors during bursts
of TCP connections.
linkerd multicluster link
command's--gateway-addresses
flag was not respected when a remote gateway exists(#11564)
during bursts of TCP connections
vedge-23.11.2
Compare Source
This edge release contains observability improvements and bug fixes to the
Destination controller, and a refinement to the multicluster gateway resolution
logic.
profile updates, if a proxy subscribed to those updates stops reading them;
this is a followup to the issue [#11491] fixed in edge-23.10.3 (#11546)
whenever the Kubernetes objects watched by the controller are falling behind
the state in the kube-apiserver (#11534)
logic to take into account all the possible IPs a hostname might resolve to,
rather than just the first one (thanks @MrFreezeex!) (#11499)
for all containers (#11308)
vedge-23.11.1
Compare Source
This edge release fixes two bugs in the Destination controller that could cause
outbound connections to hang indefinitely.
vedge-23.10.4
Compare Source
This edge release includes a fix for the
ServiceProfile
CRD resource schema.The schema incorrectly required
not
response matches to be arrays, while thein-cluster validator parsed
not
response matches as objects. In addition, anissues has been fixed in
linkerd profile
. When used with the--open-api
flag, it would not strip trailing slashes when generating a resource from
swagger specifications.
ServiceProfile
resources throughlinkerd profile --open-api
(#11519)ServiceProfile
CRD schema. The schema incorrectlyrequired that a
not
response match should be an array, which the serviceprofile validator rejected since it expected an object. The schema has been
updated to properly indicate that
not
values should be an object (#11510;fixes #11483)
name to the logging context. This will improve visibility into the messages
sent and received by the control plane from a specific proxy (#11532)
initialize a
Job
informer. The destination controller uses the metadata APIto retrieve
Job
metadata, and relies mostly on informers. Without aninitialized informer, an error message would be logged, and the controller
relied on direct API calls (#11541; fixes #11531)
vedge-23.10.3
Compare Source
This edge release fixes issues in the proxy and Destination controller which can
result in Linkerd proxies sending traffic to stale endpoints. In addition, it
contains other bugfixes and updates dependencies to include patches for the
security advisories CVE-2023-44487/GHSA-qppj-fm5r-hxr3 and GHSA-c827-hfw6-qwvm.
changes in the endpoints of a destination, if a proxy subscribed to that
destination stops reading service discovery updates. This issue results in
proxies attempting to send traffic for that destination to stale endpoints
(#11491, fixes #11480, #11279, and #10590)
terminate unused service discovery watches, exerting backpressure on the
Destination controller which could cause it to become stuck
(linkerd2-proxy#2484 and linkerd2-proxy#2486)
INFO
-level logging to the proxy when endpoints are added or removedfrom a load balancer. These logs are enabled by default, and can be disabled
by setting the proxy log level to
warn,linkerd=info,linkerd_proxy_balance=warn
or similar(linkerd2-proxy#2486)
grpc_status
metric labels as astring rather than as the numeric status code (linkerd2-proxy#2480; fixes
#11449)
linkerd-jaeger
'simagePullSecrets
Helm value to also apply tothe
namespace-metadata
ServiceAccount (#11504)golang.google.org/grpc
Gopackage to include patches for CVE-2023-44487/GHSA-qppj-fm5r-hxr3 ([#11496])
rustix
to include patches for GHSA-c827-hfw6-qwvm(linkerd2-proxy#2488 and #11512).
vedge-23.10.2
Compare Source
This edge release includes a fix addressing an issue during upgrades for
instances not relying on automated webhook certificate management (like
cert-manager provides).
checksum/config
annotation to the destination and proxy injectordeployment manifests, to force restarting those workloads whenever their
webhook secrets change during upgrade (thanks @iAnomaly!) (#11440)
(#11471)
vedge-23.10.1
Compare Source
This edge release adds additional configurability to Linkerd's viz and
multicluster extensions.
podAnnotations
Helm value to allow adding additional annotations tothe Linkerd-Viz Prometheus Deployment (#11365) (thanks @cemenson)
imagePullSecrets
Helm values to the multicluster chart so that it canbe installed in an air-gapped environment. (#11285) (thanks @lhaussknecht)
Configuration
📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about these updates again.
This PR was generated by Mend Renovate. View the repository job log.