diff --git a/canary/manifest/cic-vpx.yaml b/canary/manifest/cic-vpx.yaml index 2c46f984..261b1b25 100755 --- a/canary/manifest/cic-vpx.yaml +++ b/canary/manifest/cic-vpx.yaml @@ -8,7 +8,7 @@ spec: serviceAccountName: cpx containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml b/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml index 6cd696c4..473ae825 100644 --- a/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml +++ b/deployment/anthos/manifest/dual-tiered-ingress/cic.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/anthos/manifest/service-type-lb/cic.yaml b/deployment/anthos/manifest/service-type-lb/cic.yaml index 7c7e52dc..2f4e283c 100644 --- a/deployment/anthos/manifest/service-type-lb/cic.yaml +++ b/deployment/anthos/manifest/service-type-lb/cic.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/aws/manifest/citrix-ingress-controller.yaml b/deployment/aws/manifest/citrix-ingress-controller.yaml index 425e839b..cc5632fb 100644 --- a/deployment/aws/manifest/citrix-ingress-controller.yaml +++ b/deployment/aws/manifest/citrix-ingress-controller.yaml @@ -78,7 +78,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller-1 - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" @@ -117,7 +117,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller-2 - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/baremetal/citrix-k8s-ingress-controller.yaml b/deployment/baremetal/citrix-k8s-ingress-controller.yaml index 78e4eb4f..452a8d18 100644 --- a/deployment/baremetal/citrix-k8s-ingress-controller.yaml +++ b/deployment/baremetal/citrix-k8s-ingress-controller.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml b/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml index 95edf7f5..fce8e3df 100644 --- a/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml +++ b/deployment/dual-tier/manifest/all-in-one-dual-tier-demo.yaml @@ -337,7 +337,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml b/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml index e65d76c1..9d323d7c 100644 --- a/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml +++ b/deployment/dual-tier/manifest/tier-1-vpx-cic.yaml @@ -99,7 +99,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/deployment/openshift/manifest/cic.yaml b/deployment/openshift/manifest/cic.yaml index 349742c9..f915394f 100644 --- a/deployment/openshift/manifest/cic.yaml +++ b/deployment/openshift/manifest/cic.yaml @@ -97,7 +97,7 @@ spec: serviceAccount: citrix containers: - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" securityContext: privileged: true env: diff --git a/deployment/openshift/manifest/cpx_cic_side_car.yaml b/deployment/openshift/manifest/cpx_cic_side_car.yaml index 7a10753c..3fc884ee 100644 --- a/deployment/openshift/manifest/cpx_cic_side_car.yaml +++ b/deployment/openshift/manifest/cpx_cic_side_car.yaml @@ -112,7 +112,7 @@ spec: imagePullPolicy: IfNotPresent # Add cic as a sidecar - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" volumeMounts: - mountPath: /var/deviceinfo name: shared-data diff --git a/docs/configure/config-map.md b/docs/configure/config-map.md index a99eeb3c..33965bc6 100644 --- a/docs/configure/config-map.md +++ b/docs/configure/config-map.md @@ -97,7 +97,7 @@ Perform the following to configure ConfigMap support for the Citrix ingress cont serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml b/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml index f90df3b6..de52b5a0 100644 --- a/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml +++ b/docs/configure/cpx-bgp-router/citrix-k8s-cpx-ingress.yml @@ -88,7 +88,7 @@ spec: fieldRef: apiVersion: v1 fieldPath: metadata.namespace - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" imagePullPolicy: Always terminationMessagePath: /dev/termination-log terminationMessagePolicy: File diff --git a/docs/configure/ipam-for-ingress.md b/docs/configure/ipam-for-ingress.md index 8133dba3..59cb22a6 100644 --- a/docs/configure/ipam-for-ingress.md +++ b/docs/configure/ipam-for-ingress.md @@ -57,7 +57,7 @@ Perform the following steps to deploy the Citrix ingress controller with the IPA serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: - name: "NS_IP" value: "x.x.x.x" diff --git a/docs/configure/log-levels.md b/docs/configure/log-levels.md index 0383f840..28cabce6 100644 --- a/docs/configure/log-levels.md +++ b/docs/configure/log-levels.md @@ -21,7 +21,7 @@ spec: serviceAccountName: cpx containers: - name: citrixingresscontroller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set kube api-server URL - name: "kubernetes_url" diff --git a/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml b/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml index 5e648ecc..6ea06f3a 100644 --- a/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml +++ b/docs/how-to/sml/example/hipster-smlite-all-in-one-dual-tier.yaml @@ -1350,7 +1350,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml b/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml index e86c02f5..f56684af 100644 --- a/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml +++ b/docs/how-to/sml/example/hipster-smlite-all-in-one-unified-ingress.yaml @@ -1125,7 +1125,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml b/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml index be7ae302..4f6bee20 100755 --- a/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml +++ b/docs/how-to/webhook/requiredlabels/bad-example-deployment.yaml @@ -19,4 +19,4 @@ spec: spec: containers: - name: test - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" diff --git a/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml b/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml index ed2793a9..019ed135 100755 --- a/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml +++ b/docs/how-to/webhook/requiredlabels/good-example-deployment.yaml @@ -20,4 +20,4 @@ spec: spec: containers: - name: test - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" diff --git a/docs/network/bgp-enhancement.md b/docs/network/bgp-enhancement.md index 369281f7..2cfdbd0c 100644 --- a/docs/network/bgp-enhancement.md +++ b/docs/network/bgp-enhancement.md @@ -71,7 +71,7 @@ Perform the following steps to configure BGP RHI support based on the sample top serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) diff --git a/docs/network/staticrouting.md b/docs/network/staticrouting.md index 8ddb9337..cebcafd8 100644 --- a/docs/network/staticrouting.md +++ b/docs/network/staticrouting.md @@ -58,7 +58,7 @@ You can specify this argument in the [citrix-k8s-ingress-controller.yaml](https: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" # feature-node-watch argument configures route(s) on the Ingress Citrix ADC # to provide connectivity to the pod network. By default, this feature is disabled. args: diff --git a/docs/network/type_loadbalancer.md b/docs/network/type_loadbalancer.md index 9123515e..690cfcfe 100644 --- a/docs/network/type_loadbalancer.md +++ b/docs/network/type_loadbalancer.md @@ -105,7 +105,7 @@ Perform the following steps to deploy the Citrix ingress controller with the IPA serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set Citrix ADC NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml b/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml index 570f46c5..9f5ceb6f 100644 --- a/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml +++ b/example/dsr/KubernetesConfig/citrix-k8s-cpx-ingress.yml @@ -104,7 +104,7 @@ spec: name: cpx-volume2 # Add cic as a sidecar - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: - name: "EULA" value: "yes" diff --git a/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml b/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml index 974566c7..04ad5c89 100644 --- a/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml +++ b/example/dsr/KubernetesConfig/citrix-k8s-ingress-controller.yaml @@ -91,7 +91,7 @@ spec: serviceAccountName: cic-k8s-role containers: - name: cic-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled) - name: "NS_IP" diff --git a/example/servicegraph-demo/cpx.yaml b/example/servicegraph-demo/cpx.yaml index fe02dcba..f950f74e 100644 --- a/example/servicegraph-demo/cpx.yaml +++ b/example/servicegraph-demo/cpx.yaml @@ -38,7 +38,7 @@ spec: imagePullPolicy: Always # Add cic as a sidecar - name: cic - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" env: - name: "EULA" value: "yes" diff --git a/gslb/Manifest/gslb-controller.yaml b/gslb/Manifest/gslb-controller.yaml index d7ce4315..a8fd4c39 100644 --- a/gslb/Manifest/gslb-controller.yaml +++ b/gslb/Manifest/gslb-controller.yaml @@ -17,7 +17,7 @@ spec: serviceAccountName: gslb-k8s-role containers: - name: gslb-k8s-ingress-controller - image: "quay.io/citrix/citrix-k8s-ingress-controller:1.38.27" + image: "quay.io/citrix/citrix-k8s-ingress-controller:1.39.6" imagePullPolicy: Always env: # Set NetScaler NSIP/SNIP, SNIP in case of HA (mgmt has to be enabled)