Skip to content

Latest commit

 

History

History
216 lines (167 loc) · 9.55 KB

File metadata and controls

216 lines (167 loc) · 9.55 KB

Change log:

All notable changes to this project will be documented in this file. The format is based on Keep a Changelog.

AKO-0.9.1

Changed:

  • SNI naming. Requires full deletion of the SNI VS names in beta-1.
  • Retry for status updates for ingress.
  • Log levels. Transitioned some logs from INFO —> DEBUG.
  • Logging mechanism. Uses Uber-zap now.
  • Removed SDK logging.
  • Caching improvements. Fixes in race conditions.
  • Reduction of controller API calls during full sync.
  • Full sync fixes.
  • Enchanced Retry logic.
  • Removal of regular object cache syncs - only periodic refresh of cloud config parameters.

Added:

  • Dynamic logging on the fly by editing the ConfigMap.
  • AKO API server - for liveness probe and basic controller debugging.
  • SNI VS sharing on the basis of hostnames. Same hostname will create only 1 VS across namespaces.
  • Option to disable full sync. Change fullSyncFrequency to 0.
  • Unused shared VS deletion on reboot of AKO.
  • Multiple sub-domain support with a specification of default sub-domain in values.yaml for service of type LB.

Removed:

  • VRF context is now removed from values.yaml and instead is read from the network subnet.

AKO-1.1.1

Added:

  • HostRule/HTTPRule support for Kubernetes

AKO-1.2.1

Changed:

  • Liveness probe enhancements.
  • Stability fixes around pod restarts.
  • Retry layer improvements.
  • Cleanup fixes.
  • SDK bug fixes.
  • Logging improvements.

Added:

  • Full OpenShift 4.x support for NodePort and ClusterIP
  • Per Cluster SE group support. Label based routing support.
  • NodePort Support for Kubernetes.
  • HostRule/HTTPRule support for Openshift.
  • Minimal public cloud support.

Removed:

  • VRF context support deprecated.

AKO-1.3.1

Changed:

  • AKO support for IPAM without specification of networkName.
  • AKO support for controller credential change.

Added:

  • AKO tenancy support.
  • AKO operator feature.
  • AKO public cloud with ClusterIP support for GCP/Azure.
  • AKO support for GKE/AKS/EKS.
  • AKO selective namespace sync for Ingress/Route.
  • AKO support for static IP using LoadbalancerIP for L4.
  • OpenShift wildcard certificate support.
  • Global RHI support.
  • AKO support for avi controller object deletion updates via statefulset conditions.
  • AKO support for multiple new fields in HTTPRule/HostRule CRD.
  • Tolerance support for networking/v1 Ingress in k8s 1.19

AKO-1.3.3

Changed:

  • DNS IPAM configuration not required for L4.
  • Ingress class related fixes.
  • RHI knob related changes.

Added:

  • Added auto-fqdn support

AKO-1.3.4

Added:

  • Option to use AKO as pure L7 ingress controller without L4 functionalities.
  • Option to enable/disable hostname addition for Services of type LB.

AKO-1.4.1

Added:

  • AviInfraSetting CRD for selecting specific Avi controller infra attributes.
  • Support for shared L4 VIP across multiple service of type loadbalancer.
  • Selective namespace sync for L4 objects including GatewayAPI and Services of type LB.
  • Option to add global fqdn for a hostname via Host Rule.
  • Temporary support for HTTP Caching for secure ingresses/routes via Pool objects.
  • Option to use dedicated Virtual Service per Ingress hostname.
  • Support for Node Port Local with Antrea CNI.(Supported from Antrea 0.13 onwards)
  • Persistence profile in HTTPRule CRD.
  • Option to use a default secret for Ingresses via annotation.
  • AWS mult-vip support.
  • Enhanced Virtual Hosting support for Avi Enterprise License. (Tech preview)

Changed:

  • networkName field in values.yaml is changed to vipNetworkList.
  • AKO qualification for Kubernetes 1.19, 1.20, 1.21.

Removed:

  • namespace sharding is deprecated starting from this release.

AKO-1.4.2

Bugs fixed:

  • Fix: AKO removes LB status if annotations removal hits a snag
  • Fix: Failure in lb-service obtaining ip after expanding ipam range which is previously exhausted
  • Fix: EVH broken with SSL certs specified in HostRule
  • Fix: Multi-vip with AWS always assigns IP address from a single subnet
  • Fix: enable_rhi Error in ESSENTIALS license
  • Fix: AKO 1.4.1 Doesn't Watch Endpoints Object in NodePort mode
  • Fix: stale entries in httppolicysets cause AKO to panic
  • Fix: Unpredictable behavior in AKO for ingresses/routes with same FQDN and overlapping paths
  • Fix: Uncertain behavior of AKO for ingresses/routes with same FQDN but different paths and one of the path is "/"

AKO-1.4.3

Added:

  • Support for allowing AKO to get installed in user-provided namespace (other than avi-system).

Bugs fixed:

  • Skip status updates on Service of type LoadBalancer during bootup when layer7Only flag is set to true.
  • Fix multi-host Ingress status updates during bootup.
  • Unblock AKO run if CRDs are not installed in cluster.
  • Fixed incorrect virtual service uuid annotation update for openshift secure routes with InsecureEdgeTermination set to Allow.

AKO-1.5.1

Added:

  • Add support for programming FQDN for L4 services via Gateway object when servicesAPI is set to true.
  • Multi-Protocol (TCP/UDP) support in gateway VS (shared VIP).
  • Make Service of type LoadBalancer work together with Gateways when using serviceAPI is set to true.
  • Public IP support for AKO on public clouds.
  • Support for passthrough hosts in Ingress.
  • Support for SAML based authentication for AKO using AuthToken as an alternative to usernme and password based authentication.
  • EVH support for Openshift.
  • NSX-T cloud support for VLAN and overlay based segments.
  • Support label based BGP peering for VSes.
  • Add markers to AVI objects.
  • Add length restriction on Avi object name upto 255 characters in SNI deployment.

Changed:

  • Deprecate subnetIP and subnetPrefix in values.yaml, in favor of cidr field within vipNetworkList.
  • Update spec.network to include networkName and cidr information in AviInfraSetting CRD.
  • Encode Avi object names in EVH deployment.

Known Issues

  • AKO update ingress status with VIP instead of public IP when public IP is enabled in public cloud deployments.

AKO-1.5.2

Added:

  • Bootup optimizations improves AKO’s boot time in scaled environments.
  • Support for HTTPRule CRD for Routes without paths.
  • Support for Service with multiple ports in EVH.

Changed

  • In SNI deployment, Host rule CRD with sslkeycertificate reference would get applied successfully to virtual service. However, upon deletion of this CRD, this virtual service would loose all cert configuration and get default cert. This issue is fixed.
  • In EVH deployment, existing certificate references on parent VS are overwritten if ingress (with host and secret) and Host rule CRD (with sslkeyandcertificate reference and different host) would get applied to same parent VS. Expected behaviour is to append all cert references belongs to different hosts that maps to same parent. This issue is fixed.

Known Issues

  • Due to the use of Informers for Secrets, there is an adverse effect on bootup time in OpenShift based setups. AKO can further optimize bootup time on openshift setup by filtering out the Secrets on avi-system namespace. This feature will be added in 1.6.1
  • ServiceType of NodePort does not support multi-port Services with port number.

AKO-1.6.1

Added:

  • AKO now claims support for Kubernetes 1.22.
  • Support multi-port Services with port number for ServiceType of NodePort and NodePortLocal.
  • AKO introduces support for broadcasting kubernetes Events in order to enhance the observability and monitoring aspects.
  • Support custom port numbers for dedicated and shared virtual services through HostRule CRD.
  • Support for enabling/disabling non-significant logs through HostRule CRD.
  • Add autoFQDN to shared virtual services.
  • Support for Analytics Profile for virtual service through HostRule CRD.
  • Support for Static IP for Shared and Dedicated virtual service through HostRule CRD.
  • Tenant context support for SE group.
  • Support for multiple alias FQDNs for a host through HostRule CRD.
  • Support to configure Pool Placement Setting for child ingresses/routes/svclb through AviInfraSetting CRD.
  • Allow programming static routes by adding custom Pod CIDR to Node mapping via annotation.

Changed:

  • Update annotation instead of status field of AKO statefulset after avi object deletion through deleteConfig flag.
  • AKO will create single HTTP Policyset object at Avi Controller side for all paths of same host.

Known Issues:

  • AviInfraSetting CR can not be applied to passthrough ingress/route.
  • AKO is not updating the ingress status when annotation passthrough.ako.vmware.com/enabled: "true" is added to the ingress.
  • There are issues when shardVS size changed through AviInfra CR or values.yaml. Recommended workflow is to first delete existing config using deleteConfig flag as described here and then change shardVS size through AviInfraSetting.

AKO-1.6.2

Bugs fixed

  • Problem in creating VSVip for Passthrough routes.
  • Problem in correctly saving ipamType in AKO when no DNS providers are set in the Cloud.
  • Fixes around fqdnType Contains/Wildcard settings in HostRules.
  • Fix validations related to tcpSettings listener ports in HostRules.
  • Issue #611: AKO must not sync service fqdn via External DNS if autoFqdn is disabled.
  • Fix for attaching applicationProfile, datascripts, httpPolicies to Parent VS via HostRule.
  • Set non-significant log duration to infinite, when configuring analyticsPolicy via HostRule.
  • Fix for auth-token renewal after token expiration.