Skip to content

Commit

Permalink
Merge pull request #659 from arijitr-citrix/master
Browse files Browse the repository at this point in the history
Releasing NSIC "1.41.5"
  • Loading branch information
subashd authored Apr 24, 2024
2 parents d7875e9 + 28b7072 commit 024c7b7
Show file tree
Hide file tree
Showing 49 changed files with 76 additions and 76 deletions.
4 changes: 2 additions & 2 deletions canary/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,8 +40,8 @@ GitHub has many utilities available for integrating with other tools that form p

Following Citrix software versions are required for Citrix-Integrated Canary Deployment Solution:

- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12`.
- Netscaler CPX version: `quay.io/netscaler/netscaler-cpx:14.1-17.38`.
- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5`.
- Netscaler CPX version: `quay.io/netscaler/netscaler-cpx:14.1-17.101`.
- Netscaler Metrics Exporter version: `quay.io/netscaler/netscaler-adc-metrics-exporter:1.4.9`.

### Workflow of a Spinnaker pipeline for Netscaler-Integrated Canary Deployment Solution
Expand Down
2 changes: 1 addition & 1 deletion canary/manifest/cic-vpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion canary/manifest/cpx-exporter.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ spec:
- name: EULA
value: "YES"
- name: KUBERNETES_TASK_ID
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
imagePullPolicy: Always
name: cpx-ingress
ports:
Expand Down
4 changes: 2 additions & 2 deletions canary/manifest/cpx-with-cic-sidecar.yml
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ spec:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
imagePullPolicy: Always
name: cic-k8s-ingress-controller
- args:
Expand All @@ -65,7 +65,7 @@ spec:
- name: EULA
value: "YES"
- name: KUBERNETES_TASK_ID
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
imagePullPolicy: Always
name: cpx-ingress
ports:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -291,7 +291,7 @@ The following table lists the mandatory and optional parameters that you can con
| Parameters | Mandatory or Optional | Default value | Description |
| --------- | --------------------- | ------------- | ----------- |
| license.accept | Mandatory | no | Set `yes` to accept the CIC end user license agreement. |
| image | Mandatory | `quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12` | The CIC image. |
| image | Mandatory | `quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5` | The CIC image. |
| pullPolicy | Mandatory | IfNotPresent | The CIC image pull policy. |
| adcCredentialSecret | Mandatory | N/A | The secret key to log on to the Netscaler VPX or MPX. For information on how to create the secret keys, see [Prerequisites](#prerequistes). |
| nsIP | Mandatory | N/A | The IP address of the Netscaler device. For details, see [Prerequisites](#prerequistes). |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# Declare variables to be passed into your templates.

# Netscaler ingress controller config details
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
pullPolicy: IfNotPresent
openshift: false
adcCredentialSecret:
Expand Down
2 changes: 1 addition & 1 deletion deployment/anthos/manifest/dual-tiered-ingress/cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
4 changes: 2 additions & 2 deletions deployment/anthos/manifest/dual-tiered-ingress/cpx-cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/anthos/manifest/service-type-lb/cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
4 changes: 2 additions & 2 deletions deployment/anthos/manifest/service-type-lb/cpx-cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions deployment/aws/manifest/all-in-one.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -129,7 +129,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -164,7 +164,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions deployment/aws/manifest/citrix-ingress-controller.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller-1
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down Expand Up @@ -117,7 +117,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller-2
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
4 changes: 2 additions & 2 deletions deployment/aws/manifest/standalone_cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
6 changes: 3 additions & 3 deletions deployment/aws/quick-deploy-cpx/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,7 +12,7 @@ This guide provides the step-by-step approach to deploy a Netscaler CPX on docke
Use the following command to pull the CPX image from quay

```
docker pull quay.io/netscaler/netscaler-cpx:14.1-17.38
docker pull quay.io/netscaler/netscaler-cpx:14.1-17.101
```

Use the following command to verify if CPX image is installed in docker images
Expand All @@ -26,14 +26,14 @@ quay.io/citrix/citrix-k8s-cpx-ingress 13.0-83.27 952a0
Use the following command to create a CPX container instance running in bridge mode

```
docker run -dt -P --privileged=true -e EULA=yes --ulimit core=-1 --name cpx-hello-world quay.io/netscaler/netscaler-cpx:14.1-17.38
docker run -dt -P --privileged=true -e EULA=yes --ulimit core=-1 --name cpx-hello-world quay.io/netscaler/netscaler-cpx:14.1-17.101
```

Use the following command to verify if the CPX container is created successfully

```
root@ubuntu:~# docker ps | grep cpx-hello-world
00d58f020a9e quay.io/netscaler/netscaler-cpx:14.1-17.38 "/var/netscaler/bi..." 5 seconds ago Up 3 seconds 0.0.0.0:33122->22/tcp, 0.0.0.0:32770->161/udp, 0.0.0.0:33121->9080/tcp, 0.0.0.0:33120->9443/tcp cpx-hello-world
00d58f020a9e quay.io/netscaler/netscaler-cpx:14.1-17.101 "/var/netscaler/bi..." 5 seconds ago Up 3 seconds 0.0.0.0:33122->22/tcp, 0.0.0.0:32770->161/udp, 0.0.0.0:33121->9080/tcp, 0.0.0.0:33120->9443/tcp cpx-hello-world
```

If the above verification fails, please check container logs for the error logs
Expand Down
4 changes: 2 additions & 2 deletions deployment/azure/manifest/all-in-one.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -131,7 +131,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -166,7 +166,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions deployment/azure/manifest/standalone_cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/baremetal/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -242,7 +242,7 @@ Perform the following steps to deploy the Netscaler ingress controller as a stan
This command pulls the latest image and brings up the Netscaler ingress controller.
The official Netscaler ingress controller docker image is available at: <span style="color:red"> `quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12` </span>
The official Netscaler ingress controller docker image is available at: <span style="color:red"> `quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5` </span>
2. Configure reachability to the pod network using one of the following.
Expand Down
4 changes: 2 additions & 2 deletions deployment/baremetal/citrix-k8s-cpx-ingress.yml
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ spec:
serviceAccountName: cpx-ingress-k8s-role
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
tty: true
securityContext:
privileged: true
Expand All @@ -115,7 +115,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/baremetal/citrix-k8s-ingress-controller.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ spec:
name: cpx-volume2
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
args:
- --ingress-classes
citrix
Expand Down
6 changes: 3 additions & 3 deletions deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ spec:
serviceAccountName: cpx-ingress-k8s-role
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
tty: true
securityContext:
privileged: true
Expand All @@ -163,7 +163,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down Expand Up @@ -346,7 +346,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion deployment/dual-tier/manifest/tier-1-vpx-cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
4 changes: 2 additions & 2 deletions deployment/dual-tier/manifest/tier-2-cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -96,7 +96,7 @@ spec:
serviceAccountName: cpx-ingress-k8s-role
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
tty: true
securityContext:
privileged: true
Expand All @@ -115,7 +115,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions deployment/gcp/manifest/all-in-one.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -165,7 +165,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions deployment/gcp/manifest/standalone_cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cpx-ingress
image: quay.io/netscaler/netscaler-cpx:14.1-17.38
image: quay.io/netscaler/netscaler-cpx:14.1-17.101
securityContext:
privileged: true
env:
Expand Down Expand Up @@ -134,7 +134,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12
image: quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/openshift/manifest/cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ spec:
serviceAccount: citrix
containers:
- name: cic
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
securityContext:
privileged: true
env:
Expand Down
2 changes: 1 addition & 1 deletion deployment/openshift/manifest/cpx_cic_side_car.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ spec:
imagePullPolicy: IfNotPresent
# Add cic as a sidecar
- name: cic
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5"
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions docs/canary/canary.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,8 +40,8 @@ GitHub has many utilities available for integrating with other tools that form p

Following Citrix software versions are required for Citrix-Integrated Canary Deployment Solution:

- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:1.40.12`.
- Netscaler CPX version: `quay.io/netscaler/netscaler-cpx:14.1-17.38`.
- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:1.41.5`.
- Netscaler CPX version: `quay.io/netscaler/netscaler-cpx:14.1-17.101`.
- Netscaler Metrics Exporter version: `quay.io/netscaler/netscaler-adc-metrics-exporter:1.4.9`.

### Workflow of a Spinnaker pipeline for Netscaler-Integrated Canary Deployment Solution
Expand Down
Loading

0 comments on commit 024c7b7

Please sign in to comment.