From 16aa9976047312f85dd3197dac395b5345b371cb Mon Sep 17 00:00:00 2001 From: Dalton Hubble Date: Tue, 14 Dec 2021 10:26:08 -0800 Subject: [PATCH] Fix Azure `backend_address_pool_id` deprecation warning * Change to `backend_address_pool_ids` list --- CHANGES.md | 19 ++++++++---- azure/fedora-coreos/kubernetes/lb.tf | 30 +++++++++---------- azure/flatcar-linux/kubernetes/lb.tf | 30 +++++++++---------- .../fedora-coreos/kubernetes/profiles.tf | 4 +-- 4 files changed, 46 insertions(+), 37 deletions(-) diff --git a/CHANGES.md b/CHANGES.md index c3e5ceef..0d4d713d 100644 --- a/CHANGES.md +++ b/CHANGES.md @@ -5,21 +5,26 @@ Notable changes between versions. ## Latest * Kubernetes [v1.23.0](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.23.md#v1230) -* Normalize CA certs mounts in static Pods and kube-proxy -* Set Kubelet resolver config to `/run/systemd/resolve/resolv.conf` -* Change `enable_aggregation` default to true ([#279](https://github.com/poseidon/terraform-render-bootstrap/pull/279)) -* Update Cilium from v1.10.5 to [v1.11.0](https://github.com/cilium/cilium/releases/tag/v1.11.0) +* Normalize CA cert mounts in static Pods and kube-proxy ([#1078](https://github.com/poseidon/typhoon/pull/1078)) +* Set Kubelet resolver config to `/run/systemd/resolve/resolv.conf` ([#1082](https://github.com/poseidon/typhoon/pull/1082)) +* Update Cilium from v1.10.5 to [v1.11.0](https://github.com/cilium/cilium/releases/tag/v1.11.0) ([#1083](https://github.com/poseidon/typhoon/pull/1083)) * With Calico, add missing `caliconodestatuses` CRD ([#289](https://github.com/poseidon/terraform-render-bootstrap/pull/289)) +* Change `enable_aggregation` default to true ([#279](https://github.com/poseidon/terraform-render-bootstrap/pull/279)) +* Remove deprecated `--port` from `kube-scheduler` ([#1078](https://github.com/poseidon/typhoon/pull/1078)) ### AWS * Change controller node default `disk_iops` to 3000 ([#1073](https://github.com/poseidon/typhoon/pull/1073)) +### Azure + +* Fix warning about deprecated `backend_address_pool_id` + ### Fedora CoreOS * Fix Fedora ARM64 workers to official Fedora CoreOS AMIs ([#1072](https://github.com/poseidon/typhoon/pull/1072)) * Should have been changed alongside controller AMIs in ([#1038](https://github.com/poseidon/typhoon/pull/1038)) - * Old Posidon built ARM64 AMIs have been deleted + * Old Poseidon built ARM64 AMIs have been deleted ### Addons @@ -28,6 +33,10 @@ Notable changes between versions. * Update node-exporter from v1.3.0 to [v1.3.1](https://github.com/prometheus/node_exporter/releases/tag/v1.3.1) * Update Grafana from v8.2.4 to [v8.3.2](https://github.com/grafana/grafana/releases/tag/v8.3.2) +### Known Issues + +* Calico does not yet support Kubernetes v1.23.0 ([calico#5011](https://github.com/projectcalico/calico/issues/5011)), use `flannel` or `cilium` + ## v1.22.4 * Kubernetes [v1.22.4](https://github.com/kubernetes/kubernetes/blob/master/CHANGELOG/CHANGELOG-1.22.md#v1224) diff --git a/azure/fedora-coreos/kubernetes/lb.tf b/azure/fedora-coreos/kubernetes/lb.tf index c0d497e8..b98949bc 100644 --- a/azure/fedora-coreos/kubernetes/lb.tf +++ b/azure/fedora-coreos/kubernetes/lb.tf @@ -59,11 +59,11 @@ resource "azurerm_lb_rule" "apiserver" { loadbalancer_id = azurerm_lb.cluster.id frontend_ip_configuration_name = "apiserver" - protocol = "Tcp" - frontend_port = 6443 - backend_port = 6443 - backend_address_pool_id = azurerm_lb_backend_address_pool.controller.id - probe_id = azurerm_lb_probe.apiserver.id + protocol = "Tcp" + frontend_port = 6443 + backend_port = 6443 + backend_address_pool_ids = [azurerm_lb_backend_address_pool.controller.id] + probe_id = azurerm_lb_probe.apiserver.id } resource "azurerm_lb_rule" "ingress-http" { @@ -74,11 +74,11 @@ resource "azurerm_lb_rule" "ingress-http" { frontend_ip_configuration_name = "ingress" disable_outbound_snat = true - protocol = "Tcp" - frontend_port = 80 - backend_port = 80 - backend_address_pool_id = azurerm_lb_backend_address_pool.worker.id - probe_id = azurerm_lb_probe.ingress.id + protocol = "Tcp" + frontend_port = 80 + backend_port = 80 + backend_address_pool_ids = [azurerm_lb_backend_address_pool.worker.id] + probe_id = azurerm_lb_probe.ingress.id } resource "azurerm_lb_rule" "ingress-https" { @@ -89,11 +89,11 @@ resource "azurerm_lb_rule" "ingress-https" { frontend_ip_configuration_name = "ingress" disable_outbound_snat = true - protocol = "Tcp" - frontend_port = 443 - backend_port = 443 - backend_address_pool_id = azurerm_lb_backend_address_pool.worker.id - probe_id = azurerm_lb_probe.ingress.id + protocol = "Tcp" + frontend_port = 443 + backend_port = 443 + backend_address_pool_ids = [azurerm_lb_backend_address_pool.worker.id] + probe_id = azurerm_lb_probe.ingress.id } # Worker outbound TCP/UDP SNAT diff --git a/azure/flatcar-linux/kubernetes/lb.tf b/azure/flatcar-linux/kubernetes/lb.tf index c0d497e8..b98949bc 100644 --- a/azure/flatcar-linux/kubernetes/lb.tf +++ b/azure/flatcar-linux/kubernetes/lb.tf @@ -59,11 +59,11 @@ resource "azurerm_lb_rule" "apiserver" { loadbalancer_id = azurerm_lb.cluster.id frontend_ip_configuration_name = "apiserver" - protocol = "Tcp" - frontend_port = 6443 - backend_port = 6443 - backend_address_pool_id = azurerm_lb_backend_address_pool.controller.id - probe_id = azurerm_lb_probe.apiserver.id + protocol = "Tcp" + frontend_port = 6443 + backend_port = 6443 + backend_address_pool_ids = [azurerm_lb_backend_address_pool.controller.id] + probe_id = azurerm_lb_probe.apiserver.id } resource "azurerm_lb_rule" "ingress-http" { @@ -74,11 +74,11 @@ resource "azurerm_lb_rule" "ingress-http" { frontend_ip_configuration_name = "ingress" disable_outbound_snat = true - protocol = "Tcp" - frontend_port = 80 - backend_port = 80 - backend_address_pool_id = azurerm_lb_backend_address_pool.worker.id - probe_id = azurerm_lb_probe.ingress.id + protocol = "Tcp" + frontend_port = 80 + backend_port = 80 + backend_address_pool_ids = [azurerm_lb_backend_address_pool.worker.id] + probe_id = azurerm_lb_probe.ingress.id } resource "azurerm_lb_rule" "ingress-https" { @@ -89,11 +89,11 @@ resource "azurerm_lb_rule" "ingress-https" { frontend_ip_configuration_name = "ingress" disable_outbound_snat = true - protocol = "Tcp" - frontend_port = 443 - backend_port = 443 - backend_address_pool_id = azurerm_lb_backend_address_pool.worker.id - probe_id = azurerm_lb_probe.ingress.id + protocol = "Tcp" + frontend_port = 443 + backend_port = 443 + backend_address_pool_ids = [azurerm_lb_backend_address_pool.worker.id] + probe_id = azurerm_lb_probe.ingress.id } # Worker outbound TCP/UDP SNAT diff --git a/bare-metal/fedora-coreos/kubernetes/profiles.tf b/bare-metal/fedora-coreos/kubernetes/profiles.tf index a961a945..a3210b4b 100644 --- a/bare-metal/fedora-coreos/kubernetes/profiles.tf +++ b/bare-metal/fedora-coreos/kubernetes/profiles.tf @@ -44,7 +44,7 @@ resource "matchbox_profile" "controllers" { kernel = local.kernel initrd = local.initrd - args = concat(local.args, var.kernel_args) + args = concat(local.args, var.kernel_args) raw_ignition = data.ct_config.controller-ignitions.*.rendered[count.index] } @@ -78,7 +78,7 @@ resource "matchbox_profile" "workers" { kernel = local.kernel initrd = local.initrd - args = concat(local.args, var.kernel_args) + args = concat(local.args, var.kernel_args) raw_ignition = data.ct_config.worker-ignitions.*.rendered[count.index] }