Releases: aws/eks-anywhere
Releases ยท aws/eks-anywhere
v0.10.0
EKS Anywhere v0.10.0 Release
Added
- Added support for EKS Anywhere on bare metal with provider tinkerbell. EKS Anywhere on bare metal supports complete provisioning cycle, including power on/off and PXE boot for standing up a cluster with the given hardware data.
- Support for node CIDR mask config exposed via the cluster spec. #488
Changed
Fixed
- Fix issue using self-signed certificates for registry mirror #1857
v0.9.2
EKS Anywhere v0.9.2 Release
Fixed
- Fix issue by avoiding processing Snow images when URI is empty
v0.9.1
EKS Anywhere v0.9.1 Release
v0.9.0
EKS Anywhere v0.9.0 Release
Added
- Adding support to EKS Anywhere for a generic git provider as the source of truth for GitOps configuration management. #9
- Allow users to configure Cloud Provider and CSI Driver with different credentials. #1730
- Support to install, configure and maintain operational components that are secure and tested by Amazon on EKS Anywhere clusters.#2083
- A new Workshop section has been added to EKS Anywhere documentation.
- Added support for curated packages behind a feature flag #1893
Fixed
- Fix issue specifying proxy configuration for helm template command #2009
v0.8.2
v0.8.1
v0.8.0
v0.7.2
v0.7.1
v0.7.0
EKS Anywhere v0.7.0 Release
Added
- Support for
aws-iam-authenticator
as an authentication option in EKS-A clusters #90 - Support for multiple worker node groups in EKS-A clusters #840
- Support for IAM Role for Service Account (IRSA) #601
- New command
upgrade plan cluster
lists core component changes affected byupgrade cluster
#499 - Support for workload cluster's control plane and etcd upgrade through GitOps #1007
- Upgrading a Flux managed cluster previously required manual steps. These steps have now been automated.
#759, #1019 - Cilium CNI will now be upgraded by the
upgrade cluster
command #326
Changed
- EKS-A now uses Cluster API (CAPI) v1.0.1 and v1beta1 manifests, upgrading from v0.3.23 and v1alpha3 manifests.
- Kubernetes components and etcd now use TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 as the
configured TLS cipher suite #657,
#759 - Automated git repository structure changes during Flux component
upgrade
workflow #577