Skip to content

Commit

Permalink
Merge pull request #670 from arijitr-citrix/master
Browse files Browse the repository at this point in the history
Release 2.1.4
  • Loading branch information
subashd authored Sep 11, 2024
2 parents 35f2ec8 + 3cb8d0f commit 69d33b2
Show file tree
Hide file tree
Showing 47 changed files with 70 additions and 58 deletions.
2 changes: 1 addition & 1 deletion canary/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ GitHub has many utilities available for integrating with other tools that form p

Following Citrix software versions are required for Citrix-Integrated Canary Deployment Solution:

- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6`.
- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4`.
- Netscaler CPX version: `quay.io/netscaler/netscaler-cpx:14.1-25.111`.
- Netscaler Metrics Exporter version: `quay.io/netscaler/netscaler-adc-metrics-exporter:1.4.9`.

Expand Down
2 changes: 1 addition & 1 deletion canary/manifest/cic-vpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ spec:
serviceAccountName: cpx
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion canary/manifest/cpx-with-cic-sidecar.yml
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ spec:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
imagePullPolicy: Always
name: cic-k8s-ingress-controller
- args:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -291,7 +291,7 @@ The following table lists the mandatory and optional parameters that you can con
| Parameters | Mandatory or Optional | Default value | Description |
| --------- | --------------------- | ------------- | ----------- |
| license.accept | Mandatory | no | Set `yes` to accept the CIC end user license agreement. |
| image | Mandatory | `quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6` | The CIC image. |
| image | Mandatory | `quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4` | The CIC image. |
| pullPolicy | Mandatory | IfNotPresent | The CIC image pull policy. |
| adcCredentialSecret | Mandatory | N/A | The secret key to log on to the Netscaler VPX or MPX. For information on how to create the secret keys, see [Prerequisites](#prerequistes). |
| nsIP | Mandatory | N/A | The IP address of the Netscaler device. For details, see [Prerequisites](#prerequistes). |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# Declare variables to be passed into your templates.

# Netscaler ingress controller config details
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
pullPolicy: IfNotPresent
openshift: false
adcCredentialSecret:
Expand Down
2 changes: 1 addition & 1 deletion deployment/anthos/manifest/dual-tiered-ingress/cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/anthos/manifest/service-type-lb/cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion deployment/anthos/manifest/service-type-lb/cpx-cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/aws/manifest/all-in-one.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -164,7 +164,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
4 changes: 2 additions & 2 deletions deployment/aws/manifest/citrix-ingress-controller.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller-1
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down Expand Up @@ -117,7 +117,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller-2
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion deployment/aws/manifest/standalone_cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/azure/manifest/all-in-one.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -166,7 +166,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/azure/manifest/standalone_cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -130,7 +130,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/baremetal/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -242,7 +242,7 @@ Perform the following steps to deploy the Netscaler ingress controller as a stan
This command pulls the latest image and brings up the Netscaler ingress controller.
The official Netscaler ingress controller docker image is available at: <span style="color:red"> `quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6` </span>
The official Netscaler ingress controller docker image is available at: <span style="color:red"> `quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4` </span>
2. Configure reachability to the pod network using one of the following.
Expand Down
2 changes: 1 addition & 1 deletion deployment/baremetal/citrix-k8s-cpx-ingress.yml
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/baremetal/citrix-k8s-ingress-controller.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ spec:
name: cpx-volume2
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
args:
- --ingress-classes
citrix
Expand Down
4 changes: 2 additions & 2 deletions deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down Expand Up @@ -346,7 +346,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion deployment/dual-tier/manifest/tier-1-vpx-cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -99,7 +99,7 @@ spec:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion deployment/dual-tier/manifest/tier-2-cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -115,7 +115,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/gcp/manifest/all-in-one.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -165,7 +165,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/gcp/manifest/standalone_cpx.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -134,7 +134,7 @@ spec:
name: cpx-volume-conf
# Add cic as a sidecar
- name: cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion deployment/openshift/manifest/cic.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ spec:
serviceAccount: citrix
containers:
- name: cic
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
securityContext:
privileged: true
env:
Expand Down
2 changes: 1 addition & 1 deletion deployment/openshift/manifest/cpx_cic_side_car.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -112,7 +112,7 @@ spec:
imagePullPolicy: IfNotPresent
# Add cic as a sidecar
- name: cic
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
volumeMounts:
- mountPath: /var/deviceinfo
name: shared-data
Expand Down
2 changes: 1 addition & 1 deletion docs/canary/canary.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ GitHub has many utilities available for integrating with other tools that form p

Following Citrix software versions are required for Citrix-Integrated Canary Deployment Solution:

- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6`.
- Netscaler ingress controller build/version: `quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4`.
- Netscaler CPX version: `quay.io/netscaler/netscaler-cpx:14.1-25.111`.
- Netscaler Metrics Exporter version: `quay.io/netscaler/netscaler-adc-metrics-exporter:1.4.9`.

Expand Down
2 changes: 1 addition & 1 deletion docs/configure/config-map.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,7 +97,7 @@ Perform the following to configure ConfigMap support for the Netscaler ingress c
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
2 changes: 1 addition & 1 deletion docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml
Original file line number Diff line number Diff line change
Expand Up @@ -88,7 +88,7 @@ spec:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
imagePullPolicy: Always
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
Expand Down
2 changes: 1 addition & 1 deletion docs/configure/ipam-for-ingress.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ Perform the following steps to deploy the Netscaler ingress controller with the
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
- name: "NS_IP"
value: "x.x.x.x"
Expand Down
2 changes: 1 addition & 1 deletion docs/configure/log-levels.md
Original file line number Diff line number Diff line change
Expand Up @@ -21,7 +21,7 @@ spec:
serviceAccountName: cpx
containers:
- name: citrixingresscontroller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set kube api-server URL
- name: "kubernetes_url"
Expand Down
2 changes: 1 addition & 1 deletion docs/how-to/hpa/values.sh
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
VPX_IP="VPX_IP"
CPX_IMAGE="quay.io/netscaler/netscaler-cpx:14.1-25.111"
CIC_IMAGE="quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
CIC_IMAGE="quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
EXPORTER="quay.io/citrix/citrix-adc-metrics-exporter:1.4.9"
VPX_PASSWORD="VPX_PASSWORD"
VPX_VIP="VIRTUAL_IP_VPX"
Original file line number Diff line number Diff line change
Expand Up @@ -1297,7 +1297,7 @@ spec:
fieldRef:
apiVersion: v1
fieldPath: metadata.namespace
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
imagePullPolicy: Always
name: cic
serviceAccountName: citrix
Expand Down Expand Up @@ -1547,7 +1547,7 @@ spec:
secretKeyRef:
key: password
name: <citrix-adc-vpx-credential-secret>
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
imagePullPolicy: Always
name: cic-k8s-ingress-controller
serviceAccountName: cic-k8s-role
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -1313,7 +1313,7 @@ spec:
name: <citrix-adc-vpx-credential-secret>
- name: EULA
value: 'yes'
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
imagePullPolicy: Always
name: cic-k8s-ingress-controller
serviceAccountName: cic-k8s-role
Expand Down
2 changes: 1 addition & 1 deletion docs/how-to/sml/manifestCreator.py
Original file line number Diff line number Diff line change
Expand Up @@ -148,7 +148,7 @@ def __init__(self, cpxCicInput={}):
self.cicContainerName = "cic"
self.cpxContainerName = "cpx"
self.cpxImage = "quay.io/netscaler/netscaler-cpx:14.1-25.111"
self.cicImage = "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
self.cicImage = "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
self.imagePullPolicy = "Always"
self.readinessProbe = True
self.serviceAccountName = "citrix"
Expand Down
2 changes: 1 addition & 1 deletion docs/how-to/webhook/allowedrepos/good-example.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,4 +6,4 @@ metadata:
spec:
containers:
- name: test-cic
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6
image: quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4
Original file line number Diff line number Diff line change
Expand Up @@ -19,4 +19,4 @@ spec:
spec:
containers:
- name: test
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
Original file line number Diff line number Diff line change
Expand Up @@ -20,4 +20,4 @@ spec:
spec:
containers:
- name: test
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
2 changes: 1 addition & 1 deletion docs/network/bgp-enhancement.md
Original file line number Diff line number Diff line change
Expand Up @@ -71,7 +71,7 @@ Perform the following steps to configure BGP RHI support based on the sample top
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"

env:
# Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
Expand Down
2 changes: 1 addition & 1 deletion docs/network/staticrouting.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,7 +58,7 @@ You can specify this argument in the [citrix-k8s-ingress-controller.yaml](https:
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
# feature-node-watch argument configures route(s) on the Ingress Netscaler
# to provide connectivity to the pod network. By default, this feature is disabled.
args:
Expand Down
2 changes: 1 addition & 1 deletion docs/network/type_loadbalancer.md
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ Perform the following steps to deploy the Netscaler ingress controller with the
serviceAccountName: cic-k8s-role
containers:
- name: cic-k8s-ingress-controller
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6"
image: "quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4"
env:
# Set Netscaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)
- name: "NS_IP"
Expand Down
4 changes: 2 additions & 2 deletions docs/upgrade.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ If you want to upgrade by modifying the **YAML** definition file, perform the fo

1. Change the version of the Netscaler ingress controller and Netscaler CPX image under `containers` section to the following:
- Netscaler CPX version: 14.1-25.111 (`quay.io/netscaler/netscaler-cpx:14.1-25.111`)
- Netscaler ingress controller version: 2.0.6 (`quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6`)
- Netscaler ingress controller version: 2.1.4 (`quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4`)

2. Update the `CluterRole` as follows:

Expand Down Expand Up @@ -71,7 +71,7 @@ If you want to upgrade Netscaler ingress controller to version 1.5.25 by modifyi
env: ...
args: ...

You should change the version of the image to version 1.5.25. For example, `quay.io/netscaler/netscaler-k8s-ingress-controller:2.0.6`.
You should change the version of the image to version 1.5.25. For example, `quay.io/netscaler/netscaler-k8s-ingress-controller:2.1.4`.

2. Update the `ClusterRole` as follows:

Expand Down
Loading

0 comments on commit 69d33b2

Please sign in to comment.