From d55cf510c27617df153698aff68e8c74e12a0eaf Mon Sep 17 00:00:00 2001 From: Arijit Ray Date: Mon, 5 Feb 2024 10:45:05 +0530 Subject: [PATCH] Releasing 1.38.27 of Ingress Controller --- canary/manifest/cic-vpx.yaml | 2 +- deployment/anthos/manifest/dual-tiered-ingress/cic.yaml | 2 +- deployment/anthos/manifest/service-type-lb/cic.yaml | 2 +- deployment/aws/manifest/citrix-ingress-controller.yaml | 4 ++-- deployment/baremetal/citrix-k8s-ingress-controller.yaml | 2 +- deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml | 2 +- deployment/dual-tier/manifest/tier-1-vpx-cic.yaml | 2 +- deployment/openshift/manifest/cic.yaml | 2 +- deployment/openshift/manifest/cpx_cic_side_car.yaml | 2 +- docs/configure/config-map.md | 2 +- docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml | 2 +- docs/configure/ipam-for-ingress.md | 2 +- docs/configure/log-levels.md | 2 +- .../sml/example/hipster-smlite-all-in-one-dual-tier.yaml | 2 +- .../example/hipster-smlite-all-in-one-unified-ingress.yaml | 2 +- .../how-to/webhook/requiredlabels/bad-example-deployment.yaml | 2 +- .../webhook/requiredlabels/good-example-deployment.yaml | 2 +- docs/network/bgp-enhancement.md | 2 +- docs/network/staticrouting.md | 2 +- docs/network/type_loadbalancer.md | 2 +- example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml | 2 +- .../dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml | 2 +- example/servicegraph-demo/cpx.yaml | 2 +- gslb/Manifest/gslb-controller.yaml | 2 +- 24 files changed, 25 insertions(+), 25 deletions(-) diff --git a/canary/manifest/cic-vpx.yaml b/canary/manifest/cic-vpx.yaml index 9a4ece15..2c46f984 100755 --- a/canary/manifest/cic-vpx.yaml +++ b/canary/manifest/cic-vpx.yaml @@ -8,7 +8,7 @@ spec: serviceAccountName: cpx containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml b/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml index b490427c..6cd696c4 100644 --- a/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml +++ b/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/anthos/manifest/service-type-lb/cic.yaml b/deployment/anthos/manifest/service-type-lb/cic.yaml index e6f7f781..7c7e52dc 100644 --- a/deployment/anthos/manifest/service-type-lb/cic.yaml +++ b/deployment/anthos/manifest/service-type-lb/cic.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/aws/manifest/citrix-ingress-controller.yaml b/deployment/aws/manifest/citrix-ingress-controller.yaml index 1012bd89..425e839b 100644 --- a/deployment/aws/manifest/citrix-ingress-controller.yaml +++ b/deployment/aws/manifest/citrix-ingress-controller.yaml @@ -78,7 +78,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller-1 - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" @@ -117,7 +117,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller-2 - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/baremetal/citrix-k8s-ingress-controller.yaml b/deployment/baremetal/citrix-k8s-ingress-controller.yaml index 19068c18..78e4eb4f 100644 --- a/deployment/baremetal/citrix-k8s-ingress-controller.yaml +++ b/deployment/baremetal/citrix-k8s-ingress-controller.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml b/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml index 018afd4d..95edf7f5 100644 --- a/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml +++ b/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml @@ -337,7 +337,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml b/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml index ea184b0c..e65d76c1 100644 --- a/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml +++ b/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml @@ -99,7 +99,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/openshift/manifest/cic.yaml b/deployment/openshift/manifest/cic.yaml index 84540a4a..349742c9 100644 --- a/deployment/openshift/manifest/cic.yaml +++ b/deployment/openshift/manifest/cic.yaml @@ -97,7 +97,7 @@ spec: serviceAccount: citrix containers: - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" securityContext: privileged: true env: diff --git a/deployment/openshift/manifest/cpx_cic_side_car.yaml b/deployment/openshift/manifest/cpx_cic_side_car.yaml index b9bbaa91..7a10753c 100644 --- a/deployment/openshift/manifest/cpx_cic_side_car.yaml +++ b/deployment/openshift/manifest/cpx_cic_side_car.yaml @@ -112,7 +112,7 @@ spec: imagePullPolicy: IfNotPresent # Add cic as a sidecar - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" volumeMounts: - mountPath: /var/deviceinfo name: shared-data diff --git a/docs/configure/config-map.md b/docs/configure/config-map.md index d6da4419..a99eeb3c 100644 --- a/docs/configure/config-map.md +++ b/docs/configure/config-map.md @@ -97,7 +97,7 @@ Perform the following to configure ConfigMap support for the Citrix ingress cont serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml b/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml index f11492ca..f90df3b6 100644 --- a/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml +++ b/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml @@ -88,7 +88,7 @@ spec: fieldRef: apiVersion: v1 fieldPath: metadata.namespace - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" imagePullPolicy: Always terminationMessagePath: /dev/termination-log terminationMessagePolicy: File diff --git a/docs/configure/ipam-for-ingress.md b/docs/configure/ipam-for-ingress.md index 08758377..8133dba3 100644 --- a/docs/configure/ipam-for-ingress.md +++ b/docs/configure/ipam-for-ingress.md @@ -57,7 +57,7 @@ Perform the following steps to deploy the Citrix ingress controller with the IPA serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: - name: "NS_IP" value: "x.x.x.x" diff --git a/docs/configure/log-levels.md b/docs/configure/log-levels.md index 6833c30e..0383f840 100644 --- a/docs/configure/log-levels.md +++ b/docs/configure/log-levels.md @@ -21,7 +21,7 @@ spec: serviceAccountName: cpx containers: - name: citrixingresscontroller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set kube api-server URL - name: "kubernetes_url" diff --git a/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml b/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml index eb13f481..5e648ecc 100644 --- a/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml +++ b/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml @@ -1350,7 +1350,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml b/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml index 5cd5011f..e86c02f5 100644 --- a/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml +++ b/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml @@ -1125,7 +1125,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml b/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml index 0a763383..be7ae302 100755 --- a/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml +++ b/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml @@ -19,4 +19,4 @@ spec: spec: containers: - name: test - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" diff --git a/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml b/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml index b4bf3f02..ed2793a9 100755 --- a/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml +++ b/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml @@ -20,4 +20,4 @@ spec: spec: containers: - name: test - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" diff --git a/docs/network/bgp-enhancement.md b/docs/network/bgp-enhancement.md index 5452a733..369281f7 100644 --- a/docs/network/bgp-enhancement.md +++ b/docs/network/bgp-enhancement.md @@ -71,7 +71,7 @@ Perform the following steps to configure BGP RHI support based on the sample top serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) diff --git a/docs/network/staticrouting.md b/docs/network/staticrouting.md index b444ef42..8ddb9337 100644 --- a/docs/network/staticrouting.md +++ b/docs/network/staticrouting.md @@ -58,7 +58,7 @@ You can specify this argument in the [citrix-k8s-ingress-controller.yaml](https: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" # feature-node-watch argument configures route(s) on the Ingress Citrix ADC # to provide connectivity to the pod network. By default, this feature is disabled. args: diff --git a/docs/network/type_loadbalancer.md b/docs/network/type_loadbalancer.md index e5e258f9..9123515e 100644 --- a/docs/network/type_loadbalancer.md +++ b/docs/network/type_loadbalancer.md @@ -105,7 +105,7 @@ Perform the following steps to deploy the Citrix ingress controller with the IPA serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set Citrix ADC NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml b/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml index ec7e6264..570f46c5 100644 --- a/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml +++ b/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml @@ -104,7 +104,7 @@ spec: name: cpx-volume2 # Add cic as a sidecar - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: - name: "EULA" value: "yes" diff --git a/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml b/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml index 294eaf8b..974566c7 100644 --- a/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml +++ b/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/example/servicegraph-demo/cpx.yaml b/example/servicegraph-demo/cpx.yaml index 1f158b7a..fe02dcba 100644 --- a/example/servicegraph-demo/cpx.yaml +++ b/example/servicegraph-demo/cpx.yaml @@ -38,7 +38,7 @@ spec: imagePullPolicy: Always # Add cic as a sidecar - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" env: - name: "EULA" value: "yes" diff --git a/gslb/Manifest/gslb-controller.yaml b/gslb/Manifest/gslb-controller.yaml index a5e61e32..d7ce4315 100644 --- a/gslb/Manifest/gslb-controller.yaml +++ b/gslb/Manifest/gslb-controller.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: gslb-k8s-role containers: - name: gslb-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.37.5" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" imagePullPolicy: Always env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)