5245 lines
173 KiB
Markdown
5245 lines
173 KiB
Markdown
# Change Log
|
||
|
||
## 20.5.3  
|
||
|
||
**Release date:** 2022-11-25
|
||
|
||
* 🐛 Fix template issue with obsolete helm version + add helm version requirement (#743)
|
||
|
||
|
||
## 20.5.2  
|
||
|
||
**Release date:** 2022-11-24
|
||
|
||
* ⬆️Update Traefik to v2.9.5 (#740)
|
||
|
||
|
||
## 20.5.1  
|
||
|
||
**Release date:** 2022-11-23
|
||
|
||
* 🐛 Fix namespaceSelector on ServiceMonitor (#737)
|
||
|
||
|
||
## 20.5.0  
|
||
|
||
**Release date:** 2022-11-23
|
||
|
||
* 🚀 Add complete support on metrics options (#735)
|
||
* 🐛 make tests use fixed version
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e49d02d..15f1682 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -12,7 +12,7 @@ hub:
|
||
## Enabling Hub will:
|
||
# * enable Traefik Hub integration on Traefik
|
||
# * add `traefikhub-tunl` endpoint
|
||
- # * enable addRoutersLabels on prometheus metrics
|
||
+ # * enable Prometheus metrics with addRoutersLabels
|
||
# * enable allowExternalNameServices on KubernetesIngress provider
|
||
# * enable allowCrossNamespace on KubernetesCRD provider
|
||
# * add an internal (ClusterIP) Service, dedicated for Traefik Hub
|
||
@@ -254,16 +254,96 @@ logs:
|
||
# Content-Type: keep
|
||
|
||
metrics:
|
||
- # datadog:
|
||
- # address: 127.0.0.1:8125
|
||
- # influxdb:
|
||
- # address: localhost:8089
|
||
- # protocol: udp
|
||
+ ## Prometheus is enabled by default.
|
||
+ ## It can be disabled by setting "prometheus: null"
|
||
prometheus:
|
||
+ ## Entry point used to expose metrics.
|
||
entryPoint: metrics
|
||
- # addRoutersLabels: true
|
||
- # statsd:
|
||
- # address: localhost:8125
|
||
+ ## Enable metrics on entry points. Default=true
|
||
+ # addEntryPointsLabels: false
|
||
+ ## Enable metrics on routers. Default=false
|
||
+ # addRoutersLabels: true
|
||
+ ## Enable metrics on services. Default=true
|
||
+ # addServicesLabels: false
|
||
+ ## Buckets for latency metrics. Default="0.1,0.3,1.2,5.0"
|
||
+ # buckets: "0.5,1.0,2.5"
|
||
+ ## When manualRouting is true, it disables the default internal router in
|
||
+ ## order to allow creating a custom router for prometheus@internal service.
|
||
+ # manualRouting: true
|
||
+# datadog:
|
||
+# ## Address instructs exporter to send metrics to datadog-agent at this address.
|
||
+# address: "127.0.0.1:8125"
|
||
+# ## The interval used by the exporter to push metrics to datadog-agent. Default=10s
|
||
+# # pushInterval: 30s
|
||
+# ## The prefix to use for metrics collection. Default="traefik"
|
||
+# # prefix: traefik
|
||
+# ## Enable metrics on entry points. Default=true
|
||
+# # addEntryPointsLabels: false
|
||
+# ## Enable metrics on routers. Default=false
|
||
+# # addRoutersLabels: true
|
||
+# ## Enable metrics on services. Default=true
|
||
+# # addServicesLabels: false
|
||
+# influxdb:
|
||
+# ## Address instructs exporter to send metrics to influxdb at this address.
|
||
+# address: localhost:8089
|
||
+# ## InfluxDB's address protocol (udp or http). Default="udp"
|
||
+# protocol: udp
|
||
+# ## InfluxDB database used when protocol is http. Default=""
|
||
+# # database: ""
|
||
+# ## InfluxDB retention policy used when protocol is http. Default=""
|
||
+# # retentionPolicy: ""
|
||
+# ## InfluxDB username (only with http). Default=""
|
||
+# # username: ""
|
||
+# ## InfluxDB password (only with http). Default=""
|
||
+# # password: ""
|
||
+# ## The interval used by the exporter to push metrics to influxdb. Default=10s
|
||
+# # pushInterval: 30s
|
||
+# ## Additional labels (influxdb tags) on all metrics.
|
||
+# # additionalLabels:
|
||
+# # env: production
|
||
+# # foo: bar
|
||
+# ## Enable metrics on entry points. Default=true
|
||
+# # addEntryPointsLabels: false
|
||
+# ## Enable metrics on routers. Default=false
|
||
+# # addRoutersLabels: true
|
||
+# ## Enable metrics on services. Default=true
|
||
+# # addServicesLabels: false
|
||
+# influxdb2:
|
||
+# ## Address instructs exporter to send metrics to influxdb v2 at this address.
|
||
+# address: localhost:8086
|
||
+# ## Token with which to connect to InfluxDB v2.
|
||
+# token: xxx
|
||
+# ## Organisation where metrics will be stored.
|
||
+# org: ""
|
||
+# ## Bucket where metrics will be stored.
|
||
+# bucket: ""
|
||
+# ## The interval used by the exporter to push metrics to influxdb. Default=10s
|
||
+# # pushInterval: 30s
|
||
+# ## Additional labels (influxdb tags) on all metrics.
|
||
+# # additionalLabels:
|
||
+# # env: production
|
||
+# # foo: bar
|
||
+# ## Enable metrics on entry points. Default=true
|
||
+# # addEntryPointsLabels: false
|
||
+# ## Enable metrics on routers. Default=false
|
||
+# # addRoutersLabels: true
|
||
+# ## Enable metrics on services. Default=true
|
||
+# # addServicesLabels: false
|
||
+# statsd:
|
||
+# ## Address instructs exporter to send metrics to statsd at this address.
|
||
+# address: localhost:8125
|
||
+# ## The interval used by the exporter to push metrics to influxdb. Default=10s
|
||
+# # pushInterval: 30s
|
||
+# ## The prefix to use for metrics collection. Default="traefik"
|
||
+# # prefix: traefik
|
||
+# ## Enable metrics on entry points. Default=true
|
||
+# # addEntryPointsLabels: false
|
||
+# ## Enable metrics on routers. Default=false
|
||
+# # addRoutersLabels: true
|
||
+# ## Enable metrics on services. Default=true
|
||
+# # addServicesLabels: false
|
||
+
|
||
+
|
||
##
|
||
## enable optional CRDs for Prometheus Operator
|
||
##
|
||
```
|
||
|
||
## 20.4.1  
|
||
|
||
**Release date:** 2022-11-21
|
||
|
||
* 🐛 fix namespace references to support namespaceOverride
|
||
|
||
|
||
## 20.4.0  
|
||
|
||
**Release date:** 2022-11-21
|
||
|
||
* Add (optional) dedicated metrics service (#727)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ca15f6a..e49d02d 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -267,6 +267,12 @@ metrics:
|
||
##
|
||
## enable optional CRDs for Prometheus Operator
|
||
##
|
||
+ ## Create a dedicated metrics service for use with ServiceMonitor
|
||
+ ## When hub.enabled is set to true, it's not needed: it will use hub service.
|
||
+ # service:
|
||
+ # enabled: false
|
||
+ # labels: {}
|
||
+ # annotations: {}
|
||
# serviceMonitor:
|
||
# metricRelabelings: []
|
||
# - sourceLabels: [__name__]
|
||
```
|
||
|
||
## 20.3.1  
|
||
|
||
**Release date:** 2022-11-21
|
||
|
||
* 🐛 Fix namespace override which was missing on `ServiceAccount` (#731)
|
||
|
||
|
||
## 20.3.0  
|
||
|
||
**Release date:** 2022-11-17
|
||
|
||
* Add overwrite option for instance label value (#725)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index c7f84a7..ca15f6a 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -731,3 +731,6 @@ extraObjects: []
|
||
# This will override the default Release Namespace for Helm.
|
||
# It will not affect optional CRDs such as `ServiceMonitor` and `PrometheusRules`
|
||
# namespaceOverride: traefik
|
||
+#
|
||
+## This will override the default app.kubernetes.io/instance label for all Objects.
|
||
+# instanceLabelOverride: traefik
|
||
```
|
||
|
||
## 20.2.1  
|
||
|
||
**Release date:** 2022-11-17
|
||
|
||
* 🙈 do not namespace ingress class (#723)
|
||
* ✨ copy LICENSE and README.md on release
|
||
|
||
|
||
## 20.2.0  
|
||
|
||
**Release date:** 2022-11-15
|
||
|
||
* ✨ add support for namespace overrides (#718)
|
||
* Document recent changes in the README (#717)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 97a1b71..c7f84a7 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -725,5 +725,9 @@ podSecurityContext:
|
||
# Extra objects to deploy (value evaluated as a template)
|
||
#
|
||
# In some cases, it can avoid the need for additional, extended or adhoc deployments.
|
||
-# See #595 for more details and traefik/tests/extra.yaml for example.
|
||
+# See #595 for more details and traefik/tests/values/extra.yaml for example.
|
||
extraObjects: []
|
||
+
|
||
+# This will override the default Release Namespace for Helm.
|
||
+# It will not affect optional CRDs such as `ServiceMonitor` and `PrometheusRules`
|
||
+# namespaceOverride: traefik
|
||
```
|
||
|
||
## 20.1.1  
|
||
|
||
**Release date:** 2022-11-10
|
||
|
||
* fix: use consistent appVersion with Traefik Proxy
|
||
|
||
|
||
## 20.1.0  
|
||
|
||
**Release date:** 2022-11-09
|
||
|
||
* 🔧 Adds more settings for dashboard ingressRoute (#710)
|
||
* 🐛 fix chart releases
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 2ec3736..97a1b71 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -129,10 +129,14 @@ ingressRoute:
|
||
annotations: {}
|
||
# Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels)
|
||
labels: {}
|
||
+ # The router match rule used for the dashboard ingressRoute
|
||
+ matchRule: PathPrefix(`/dashboard`) || PathPrefix(`/api`)
|
||
# Specify the allowed entrypoints to use for the dashboard ingress route, (e.g. traefik, web, websecure).
|
||
# By default, it's using traefik entrypoint, which is not exposed.
|
||
# /!\ Do not expose your dashboard without any protection over the internet /!\
|
||
entryPoints: ["traefik"]
|
||
+ # Additional ingressRoute middlewares (e.g. for authentication)
|
||
+ middlewares: []
|
||
|
||
# Customize updateStrategy of traefik pods
|
||
updateStrategy:
|
||
```
|
||
|
||
## 20.0.0  
|
||
|
||
**Release date:** 2022-11-08
|
||
|
||
* Allow updateStrategy to be configurable
|
||
* 🐛 remove old deployment workflow
|
||
* ✨ migrate to centralised helm repository
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 413aa88..2ec3736 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -134,9 +134,12 @@ ingressRoute:
|
||
# /!\ Do not expose your dashboard without any protection over the internet /!\
|
||
entryPoints: ["traefik"]
|
||
|
||
-rollingUpdate:
|
||
- maxUnavailable: 0
|
||
- maxSurge: 1
|
||
+# Customize updateStrategy of traefik pods
|
||
+updateStrategy:
|
||
+ type: RollingUpdate
|
||
+ rollingUpdate:
|
||
+ maxUnavailable: 0
|
||
+ maxSurge: 1
|
||
|
||
# Customize liveness and readiness probe values.
|
||
readinessProbe:
|
||
```
|
||
|
||
## 19.0.4  
|
||
|
||
**Release date:** 2022-11-08
|
||
|
||
* 🔧 Adds more settings & rename (wrong) scrapeInterval to (valid) interval on ServiceMonitor (#703)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index b24c1cb..413aa88 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -261,10 +261,6 @@ metrics:
|
||
## enable optional CRDs for Prometheus Operator
|
||
##
|
||
# serviceMonitor:
|
||
- # additionalLabels:
|
||
- # foo: bar
|
||
- # namespace: "another-namespace"
|
||
- # namespaceSelector: {}
|
||
# metricRelabelings: []
|
||
# - sourceLabels: [__name__]
|
||
# separator: ;
|
||
@@ -279,9 +275,17 @@ metrics:
|
||
# replacement: $1
|
||
# action: replace
|
||
# jobLabel: traefik
|
||
- # scrapeInterval: 30s
|
||
- # scrapeTimeout: 5s
|
||
+ # interval: 30s
|
||
# honorLabels: true
|
||
+ # # (Optional)
|
||
+ # # scrapeTimeout: 5s
|
||
+ # # honorTimestamps: true
|
||
+ # # enableHttp2: true
|
||
+ # # followRedirects: true
|
||
+ # # additionalLabels:
|
||
+ # # foo: bar
|
||
+ # # namespace: "another-namespace"
|
||
+ # # namespaceSelector: {}
|
||
# prometheusRule:
|
||
# additionalLabels: {}
|
||
# namespace: "another-namespace"
|
||
```
|
||
|
||
## 19.0.3  
|
||
|
||
**Release date:** 2022-11-03
|
||
|
||
* 🎨 Don't require exposed Ports when enabling Hub (#700)
|
||
|
||
|
||
## 19.0.2  
|
||
|
||
**Release date:** 2022-11-03
|
||
|
||
* :speech_balloon: Support volume secrets with '.' in name (#695)
|
||
|
||
|
||
## 19.0.1  
|
||
|
||
**Release date:** 2022-11-03
|
||
|
||
* 🐛 Fix IngressClass install on EKS (#699)
|
||
|
||
|
||
## 19.0.0  
|
||
|
||
**Release date:** 2022-11-02
|
||
|
||
* ✨ Provides Default IngressClass for Traefik by default (#693)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 69190f1..b24c1cb 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -100,11 +100,10 @@ podDisruptionBudget:
|
||
# minAvailable: 0
|
||
# minAvailable: 25%
|
||
|
||
-# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x
|
||
+# Create a default IngressClass for Traefik
|
||
ingressClass:
|
||
- # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
||
- enabled: false
|
||
- isDefaultClass: false
|
||
+ enabled: true
|
||
+ isDefaultClass: true
|
||
|
||
# Enable experimental features
|
||
experimental:
|
||
```
|
||
|
||
## 18.3.0  
|
||
|
||
**Release date:** 2022-10-31
|
||
|
||
* ⬆️ Update Traefik appVersion to 2.9.4 (#696)
|
||
|
||
|
||
## 18.2.0  
|
||
|
||
**Release date:** 2022-10-31
|
||
|
||
* 🚩 Add an optional "internal" service (#683)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 8033a87..69190f1 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -416,7 +416,7 @@ ports:
|
||
# The port protocol (TCP/UDP)
|
||
protocol: TCP
|
||
# Use nodeport if set. This is useful if you have configured Traefik in a
|
||
- # LoadBalancer
|
||
+ # LoadBalancer.
|
||
# nodePort: 32080
|
||
# Port Redirections
|
||
# Added in 2.2, you can make permanent redirects via entrypoints.
|
||
@@ -549,13 +549,24 @@ service:
|
||
# - 172.16.0.0/16
|
||
externalIPs: []
|
||
# - 1.2.3.4
|
||
- # One of SingleStack, PreferDualStack, or RequireDualStack.
|
||
+ ## One of SingleStack, PreferDualStack, or RequireDualStack.
|
||
# ipFamilyPolicy: SingleStack
|
||
- # List of IP families (e.g. IPv4 and/or IPv6).
|
||
- # ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
|
||
+ ## List of IP families (e.g. IPv4 and/or IPv6).
|
||
+ ## ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
|
||
# ipFamilies:
|
||
# - IPv4
|
||
# - IPv6
|
||
+ ##
|
||
+ ## An additionnal and optional internal Service.
|
||
+ ## Same parameters as external Service
|
||
+ # internal:
|
||
+ # type: ClusterIP
|
||
+ # # labels: {}
|
||
+ # # annotations: {}
|
||
+ # # spec: {}
|
||
+ # # loadBalancerSourceRanges: []
|
||
+ # # externalIPs: []
|
||
+ # # ipFamilies: [ "IPv4","IPv6" ]
|
||
|
||
## Create HorizontalPodAutoscaler object.
|
||
##
|
||
```
|
||
|
||
## 18.1.0  
|
||
|
||
**Release date:** 2022-10-27
|
||
|
||
* 🚀 Add native support for Traefik Hub (#676)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index acce704..8033a87 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -5,6 +5,27 @@ image:
|
||
tag: ""
|
||
pullPolicy: IfNotPresent
|
||
|
||
+#
|
||
+# Configure integration with Traefik Hub
|
||
+#
|
||
+hub:
|
||
+ ## Enabling Hub will:
|
||
+ # * enable Traefik Hub integration on Traefik
|
||
+ # * add `traefikhub-tunl` endpoint
|
||
+ # * enable addRoutersLabels on prometheus metrics
|
||
+ # * enable allowExternalNameServices on KubernetesIngress provider
|
||
+ # * enable allowCrossNamespace on KubernetesCRD provider
|
||
+ # * add an internal (ClusterIP) Service, dedicated for Traefik Hub
|
||
+ enabled: false
|
||
+ ## Default port can be changed
|
||
+ # tunnelPort: 9901
|
||
+ ## TLS is optional. Insecure is mutually exclusive with any other options
|
||
+ # tls:
|
||
+ # insecure: false
|
||
+ # ca: "/path/to/ca.pem"
|
||
+ # cert: "/path/to/cert.pem"
|
||
+ # key: "/path/to/key.pem"
|
||
+
|
||
#
|
||
# Configure the deployment
|
||
#
|
||
@@ -505,6 +526,8 @@ tlsStore: {}
|
||
# from.
|
||
service:
|
||
enabled: true
|
||
+ ## Single service is using `MixedProtocolLBService` feature gate.
|
||
+ ## When set to false, it will create two Service, one for TCP and one for UDP.
|
||
single: true
|
||
type: LoadBalancer
|
||
# Additional annotations applied to both TCP and UDP services (e.g. for cloud provider specific config)
|
||
```
|
||
|
||
## 18.0.0  
|
||
|
||
**Release date:** 2022-10-26
|
||
|
||
* Refactor http3 and merge TCP with UDP ports into a single service (#656)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 807bd09..acce704 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -87,8 +87,6 @@ ingressClass:
|
||
|
||
# Enable experimental features
|
||
experimental:
|
||
- http3:
|
||
- enabled: false
|
||
plugins:
|
||
enabled: false
|
||
kubernetesGateway:
|
||
@@ -421,12 +419,19 @@ ports:
|
||
# The port protocol (TCP/UDP)
|
||
protocol: TCP
|
||
# nodePort: 32443
|
||
- # Enable HTTP/3.
|
||
- # Requires enabling experimental http3 feature and tls.
|
||
- # Note that you cannot have a UDP entrypoint with the same port.
|
||
- # http3: true
|
||
- # Set TLS at the entrypoint
|
||
- # https://doc.traefik.io/traefik/routing/entrypoints/#tls
|
||
+ #
|
||
+ ## Enable HTTP/3 on the entrypoint
|
||
+ ## Enabling it will also enable http3 experimental feature
|
||
+ ## https://doc.traefik.io/traefik/routing/entrypoints/#http3
|
||
+ ## There are known limitations when trying to listen on same ports for
|
||
+ ## TCP & UDP (Http3). There is a workaround in this chart using dual Service.
|
||
+ ## https://github.com/kubernetes/kubernetes/issues/47249#issuecomment-587960741
|
||
+ http3:
|
||
+ enabled: false
|
||
+ # advertisedPort: 4443
|
||
+ #
|
||
+ ## Set TLS at the entrypoint
|
||
+ ## https://doc.traefik.io/traefik/routing/entrypoints/#tls
|
||
tls:
|
||
enabled: true
|
||
# this is the name of a TLSOption definition
|
||
@@ -500,6 +505,7 @@ tlsStore: {}
|
||
# from.
|
||
service:
|
||
enabled: true
|
||
+ single: true
|
||
type: LoadBalancer
|
||
# Additional annotations applied to both TCP and UDP services (e.g. for cloud provider specific config)
|
||
annotations: {}
|
||
```
|
||
|
||
## 17.0.5  
|
||
|
||
**Release date:** 2022-10-21
|
||
|
||
* 📝 Add annotations changelog for artifacthub.io & update Maintainers
|
||
|
||
|
||
## 17.0.4  
|
||
|
||
**Release date:** 2022-10-21
|
||
|
||
* :art: Add helper function for label selector
|
||
|
||
|
||
## 17.0.3  
|
||
|
||
**Release date:** 2022-10-20
|
||
|
||
* 🐛 fix changing label selectors
|
||
|
||
|
||
## 17.0.2  
|
||
|
||
**Release date:** 2022-10-20
|
||
|
||
* fix: setting ports.web.proxyProtocol.insecure=true
|
||
|
||
|
||
## 17.0.1  
|
||
|
||
**Release date:** 2022-10-20
|
||
|
||
* :bug: Unify all labels selector with traefik chart labels (#681)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 6a90bc6..807bd09 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -639,7 +639,7 @@ affinity: {}
|
||
# - labelSelector:
|
||
# matchLabels:
|
||
# app.kubernetes.io/name: '{{ template "traefik.name" . }}'
|
||
-# app.kubernetes.io/instance: '{{ .Release.Name }}'
|
||
+# app.kubernetes.io/instance: '{{ .Release.Name }}-{{ .Release.Namespace }}'
|
||
# topologyKey: kubernetes.io/hostname
|
||
|
||
nodeSelector: {}
|
||
```
|
||
|
||
## 17.0.0  
|
||
|
||
**Release date:** 2022-10-20
|
||
|
||
* :bug: Fix `ClusterRole`, `ClusterRoleBinding` names and `app.kubernetes.io/instance` label (#662)
|
||
|
||
|
||
## 16.2.0  
|
||
|
||
**Release date:** 2022-10-20
|
||
|
||
* Add forwardedHeaders and proxyProtocol config (#673)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 9b5afc4..6a90bc6 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -403,6 +403,16 @@ ports:
|
||
# Added in 2.2, you can make permanent redirects via entrypoints.
|
||
# https://docs.traefik.io/routing/entrypoints/#redirection
|
||
# redirectTo: websecure
|
||
+ #
|
||
+ # Trust forwarded headers information (X-Forwarded-*).
|
||
+ # forwardedHeaders:
|
||
+ # trustedIPs: []
|
||
+ # insecure: false
|
||
+ #
|
||
+ # Enable the Proxy Protocol header parsing for the entry point
|
||
+ # proxyProtocol:
|
||
+ # trustedIPs: []
|
||
+ # insecure: false
|
||
websecure:
|
||
port: 8443
|
||
# hostPort: 8443
|
||
@@ -428,6 +438,16 @@ ports:
|
||
# - foo.example.com
|
||
# - bar.example.com
|
||
#
|
||
+ # Trust forwarded headers information (X-Forwarded-*).
|
||
+ # forwardedHeaders:
|
||
+ # trustedIPs: []
|
||
+ # insecure: false
|
||
+ #
|
||
+ # Enable the Proxy Protocol header parsing for the entry point
|
||
+ # proxyProtocol:
|
||
+ # trustedIPs: []
|
||
+ # insecure: false
|
||
+ #
|
||
# One can apply Middlewares on an entrypoint
|
||
# https://doc.traefik.io/traefik/middlewares/overview/
|
||
# https://doc.traefik.io/traefik/routing/entrypoints/#middlewares
|
||
```
|
||
|
||
## 16.1.0  
|
||
|
||
**Release date:** 2022-10-19
|
||
|
||
* ✨ add optional ServiceMonitor & PrometheusRules CRDs (#425)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7e335b5..9b5afc4 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -237,8 +237,46 @@ metrics:
|
||
prometheus:
|
||
entryPoint: metrics
|
||
# addRoutersLabels: true
|
||
- # statsd:
|
||
- # address: localhost:8125
|
||
+ # statsd:
|
||
+ # address: localhost:8125
|
||
+##
|
||
+## enable optional CRDs for Prometheus Operator
|
||
+##
|
||
+ # serviceMonitor:
|
||
+ # additionalLabels:
|
||
+ # foo: bar
|
||
+ # namespace: "another-namespace"
|
||
+ # namespaceSelector: {}
|
||
+ # metricRelabelings: []
|
||
+ # - sourceLabels: [__name__]
|
||
+ # separator: ;
|
||
+ # regex: ^fluentd_output_status_buffer_(oldest|newest)_.+
|
||
+ # replacement: $1
|
||
+ # action: drop
|
||
+ # relabelings: []
|
||
+ # - sourceLabels: [__meta_kubernetes_pod_node_name]
|
||
+ # separator: ;
|
||
+ # regex: ^(.*)$
|
||
+ # targetLabel: nodename
|
||
+ # replacement: $1
|
||
+ # action: replace
|
||
+ # jobLabel: traefik
|
||
+ # scrapeInterval: 30s
|
||
+ # scrapeTimeout: 5s
|
||
+ # honorLabels: true
|
||
+ # prometheusRule:
|
||
+ # additionalLabels: {}
|
||
+ # namespace: "another-namespace"
|
||
+ # rules:
|
||
+ # - alert: TraefikDown
|
||
+ # expr: up{job="traefik"} == 0
|
||
+ # for: 5m
|
||
+ # labels:
|
||
+ # context: traefik
|
||
+ # severity: warning
|
||
+ # annotations:
|
||
+ # summary: "Traefik Down"
|
||
+ # description: "{{ $labels.pod }} on {{ $labels.nodename }} is down"
|
||
|
||
tracing: {}
|
||
# instana:
|
||
```
|
||
|
||
## 16.0.0  
|
||
|
||
**Release date:** 2022-10-19
|
||
|
||
* :fire: Remove `Pilot` and `fallbackApiVersion` (#665)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 03fdaed..7e335b5 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -84,15 +84,6 @@ ingressClass:
|
||
# true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
||
enabled: false
|
||
isDefaultClass: false
|
||
- # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1"
|
||
- fallbackApiVersion: ""
|
||
-
|
||
-# Activate Pilot integration
|
||
-pilot:
|
||
- enabled: false
|
||
- token: ""
|
||
- # Toggle Pilot Dashboard
|
||
- # dashboard: false
|
||
|
||
# Enable experimental features
|
||
experimental:
|
||
```
|
||
|
||
## 15.3.1  
|
||
|
||
**Release date:** 2022-10-18
|
||
|
||
* :art: Improve `IngressRoute` structure (#674)
|
||
|
||
|
||
## 15.3.0  
|
||
|
||
**Release date:** 2022-10-18
|
||
|
||
* 📌 Add capacity to enable User-facing role
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 76aac93..03fdaed 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -553,10 +553,12 @@ hostNetwork: false
|
||
# Whether Role Based Access Control objects like roles and rolebindings should be created
|
||
rbac:
|
||
enabled: true
|
||
-
|
||
# If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces.
|
||
# If set to true, installs Role and RoleBinding. Providers will only watch target namespace.
|
||
namespaced: false
|
||
+ # Enable user-facing roles
|
||
+ # https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
|
||
+ # aggregateTo: [ "admin" ]
|
||
|
||
# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding
|
||
podSecurityPolicy:
|
||
```
|
||
|
||
## 15.2.2  
|
||
|
||
**Release date:** 2022-10-17
|
||
|
||
* Fix provider namespace changes
|
||
|
||
|
||
## 15.2.1  
|
||
|
||
**Release date:** 2022-10-17
|
||
|
||
* 🐛 fix provider namespace changes
|
||
|
||
|
||
## 15.2.0  
|
||
|
||
**Release date:** 2022-10-17
|
||
|
||
* :bug: Allow to watch on specific namespaces without using rbac.namespaced (#666)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 781ac15..76aac93 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -555,7 +555,7 @@ rbac:
|
||
enabled: true
|
||
|
||
# If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces.
|
||
- # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace
|
||
+ # If set to true, installs Role and RoleBinding. Providers will only watch target namespace.
|
||
namespaced: false
|
||
|
||
# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding
|
||
```
|
||
|
||
## 15.1.1  
|
||
|
||
**Release date:** 2022-10-17
|
||
|
||
* :goal_net: Fail gracefully when http3 is not enabled correctly (#667)
|
||
|
||
|
||
## 15.1.0  
|
||
|
||
**Release date:** 2022-10-14
|
||
|
||
* :sparkles: add optional topologySpreadConstraints (#663)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index fc2c371..781ac15 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -593,6 +593,15 @@ affinity: {}
|
||
|
||
nodeSelector: {}
|
||
tolerations: []
|
||
+topologySpreadConstraints: []
|
||
+# # This example topologySpreadConstraints forces the scheduler to put traefik pods
|
||
+# # on nodes where no other traefik pods are scheduled.
|
||
+# - labelSelector:
|
||
+# matchLabels:
|
||
+# app: '{{ template "traefik.name" . }}'
|
||
+# maxSkew: 1
|
||
+# topologyKey: kubernetes.io/hostname
|
||
+# whenUnsatisfiable: DoNotSchedule
|
||
|
||
# Pods can have priority.
|
||
# Priority indicates the importance of a Pod relative to other Pods.
|
||
```
|
||
|
||
## 15.0.0  
|
||
|
||
**Release date:** 2022-10-13
|
||
|
||
* :rocket: Enable TLS by default on `websecure` port (#657)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 400a29a..fc2c371 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -389,7 +389,7 @@ ports:
|
||
# Set TLS at the entrypoint
|
||
# https://doc.traefik.io/traefik/routing/entrypoints/#tls
|
||
tls:
|
||
- enabled: false
|
||
+ enabled: true
|
||
# this is the name of a TLSOption definition
|
||
options: ""
|
||
certResolver: ""
|
||
```
|
||
|
||
## 14.0.2  
|
||
|
||
**Release date:** 2022-10-13
|
||
|
||
* :memo: Add Changelog (#661)
|
||
|
||
|
||
## 14.0.1  
|
||
|
||
**Release date:** 2022-10-11
|
||
|
||
* :memo: Update workaround for permissions 660 on acme.json
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index a4e4ff2..400a29a 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -45,10 +45,10 @@ deployment:
|
||
# Additional initContainers (e.g. for setting file permission as shown below)
|
||
initContainers: []
|
||
# The "volume-permissions" init container is required if you run into permission issues.
|
||
- # Related issue: https://github.com/traefik/traefik/issues/6972
|
||
+ # Related issue: https://github.com/traefik/traefik/issues/6825
|
||
# - name: volume-permissions
|
||
- # image: busybox:1.31.1
|
||
- # command: ["sh", "-c", "chmod -Rv 600 /data/*"]
|
||
+ # image: busybox:1.35
|
||
+ # command: ["sh", "-c", "touch /data/acme.json && chmod -Rv 600 /data/* && chown 65532:65532 /data/acme.json"]
|
||
# volumeMounts:
|
||
# - name: data
|
||
# mountPath: /data
|
||
```
|
||
|
||
## 14.0.0  
|
||
|
||
**Release date:** 2022-10-11
|
||
|
||
* Limit rbac to only required resources for Ingress and CRD providers
|
||
|
||
|
||
## 13.0.1  
|
||
|
||
**Release date:** 2022-10-11
|
||
|
||
* Add helper function for common labels
|
||
|
||
|
||
## 13.0.0  
|
||
|
||
**Release date:** 2022-10-11
|
||
|
||
* Moved list object to individual objects
|
||
|
||
|
||
## 12.0.7  
|
||
|
||
**Release date:** 2022-10-10
|
||
|
||
* :lipstick: Affinity templating and example (#557)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 4431c36..a4e4ff2 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -578,19 +578,19 @@ resources: {}
|
||
# limits:
|
||
# cpu: "300m"
|
||
# memory: "150Mi"
|
||
+
|
||
+# This example pod anti-affinity forces the scheduler to put traefik pods
|
||
+# on nodes where no other traefik pods are scheduled.
|
||
+# It should be used when hostNetwork: true to prevent port conflicts
|
||
affinity: {}
|
||
-# # This example pod anti-affinity forces the scheduler to put traefik pods
|
||
-# # on nodes where no other traefik pods are scheduled.
|
||
-# # It should be used when hostNetwork: true to prevent port conflicts
|
||
-# podAntiAffinity:
|
||
-# requiredDuringSchedulingIgnoredDuringExecution:
|
||
-# - labelSelector:
|
||
-# matchExpressions:
|
||
-# - key: app.kubernetes.io/name
|
||
-# operator: In
|
||
-# values:
|
||
-# - {{ template "traefik.name" . }}
|
||
-# topologyKey: kubernetes.io/hostname
|
||
+# podAntiAffinity:
|
||
+# requiredDuringSchedulingIgnoredDuringExecution:
|
||
+# - labelSelector:
|
||
+# matchLabels:
|
||
+# app.kubernetes.io/name: '{{ template "traefik.name" . }}'
|
||
+# app.kubernetes.io/instance: '{{ .Release.Name }}'
|
||
+# topologyKey: kubernetes.io/hostname
|
||
+
|
||
nodeSelector: {}
|
||
tolerations: []
|
||
|
||
```
|
||
|
||
## 12.0.6  
|
||
|
||
**Release date:** 2022-10-10
|
||
|
||
* :bug: Ignore kustomization file used for CRDs update (#653)
|
||
|
||
|
||
## 12.0.5  
|
||
|
||
**Release date:** 2022-10-10
|
||
|
||
* :memo: Establish Traefik & CRD update process
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 3526729..4431c36 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -342,6 +342,7 @@ ports:
|
||
|
||
# Override the liveness/readiness port. This is useful to integrate traefik
|
||
# with an external Load Balancer that performs healthchecks.
|
||
+ # Default: ports.traefik.port
|
||
# healthchecksPort: 9000
|
||
|
||
# Override the liveness/readiness scheme. Useful for getting ping to
|
||
```
|
||
|
||
## 12.0.4  
|
||
|
||
**Release date:** 2022-10-10
|
||
|
||
* Allows ingressClass to be used without semver-compatible image tag
|
||
|
||
|
||
## 12.0.3  
|
||
|
||
**Release date:** 2022-10-10
|
||
|
||
* :bug: Should check hostNetwork when hostPort != containerPort
|
||
|
||
|
||
## 12.0.2  
|
||
|
||
**Release date:** 2022-10-07
|
||
|
||
* :goal_net: Fail gracefully when hostNetwork is enabled and hostPort != containerPort
|
||
|
||
|
||
## 12.0.1  
|
||
|
||
**Release date:** 2022-10-07
|
||
|
||
* :bug: Fix a typo on `behavior` for HPA v2
|
||
|
||
|
||
## 12.0.0  
|
||
|
||
**Release date:** 2022-10-06
|
||
|
||
* Update default HPA API Version to `v2` and add support for behavior (#518)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 2bd51f8..3526729 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -488,11 +488,22 @@ autoscaling:
|
||
# - type: Resource
|
||
# resource:
|
||
# name: cpu
|
||
-# targetAverageUtilization: 60
|
||
+# target:
|
||
+# type: Utilization
|
||
+# averageUtilization: 60
|
||
# - type: Resource
|
||
# resource:
|
||
# name: memory
|
||
-# targetAverageUtilization: 60
|
||
+# target:
|
||
+# type: Utilization
|
||
+# averageUtilization: 60
|
||
+# behavior:
|
||
+# scaleDown:
|
||
+# stabilizationWindowSeconds: 300
|
||
+# policies:
|
||
+# - type: Pods
|
||
+# value: 1
|
||
+# periodSeconds: 60
|
||
|
||
# Enable persistence using Persistent Volume Claims
|
||
# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||
```
|
||
|
||
## 11.1.1  
|
||
|
||
**Release date:** 2022-10-05
|
||
|
||
* 🔊 add failure message when using maxUnavailable 0 and hostNetwork
|
||
|
||
|
||
## 11.1.0  
|
||
|
||
**Release date:** 2022-10-04
|
||
|
||
* Update Traefik to v2.9.1
|
||
|
||
|
||
## 11.0.0  
|
||
|
||
**Release date:** 2022-10-04
|
||
|
||
* tweak default values to avoid downtime when updating
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 844cadc..2bd51f8 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -126,20 +126,20 @@ ingressRoute:
|
||
entryPoints: ["traefik"]
|
||
|
||
rollingUpdate:
|
||
- maxUnavailable: 1
|
||
+ maxUnavailable: 0
|
||
maxSurge: 1
|
||
|
||
# Customize liveness and readiness probe values.
|
||
readinessProbe:
|
||
failureThreshold: 1
|
||
- initialDelaySeconds: 10
|
||
+ initialDelaySeconds: 2
|
||
periodSeconds: 10
|
||
successThreshold: 1
|
||
timeoutSeconds: 2
|
||
|
||
livenessProbe:
|
||
failureThreshold: 3
|
||
- initialDelaySeconds: 10
|
||
+ initialDelaySeconds: 2
|
||
periodSeconds: 10
|
||
successThreshold: 1
|
||
timeoutSeconds: 2
|
||
```
|
||
|
||
## 10.33.0  
|
||
|
||
**Release date:** 2022-10-04
|
||
|
||
* :rocket: Add `extraObjects` value that allows creating adhoc resources
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index c926bd9..844cadc 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -598,3 +598,10 @@ securityContext:
|
||
|
||
podSecurityContext:
|
||
fsGroup: 65532
|
||
+
|
||
+#
|
||
+# Extra objects to deploy (value evaluated as a template)
|
||
+#
|
||
+# In some cases, it can avoid the need for additional, extended or adhoc deployments.
|
||
+# See #595 for more details and traefik/tests/extra.yaml for example.
|
||
+extraObjects: []
|
||
```
|
||
|
||
## 10.32.0  
|
||
|
||
**Release date:** 2022-10-03
|
||
|
||
* Add support setting middleware on entrypoint
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 3957448..c926bd9 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -397,6 +397,16 @@ ports:
|
||
# sans:
|
||
# - foo.example.com
|
||
# - bar.example.com
|
||
+ #
|
||
+ # One can apply Middlewares on an entrypoint
|
||
+ # https://doc.traefik.io/traefik/middlewares/overview/
|
||
+ # https://doc.traefik.io/traefik/routing/entrypoints/#middlewares
|
||
+ # /!\ It introduces here a link between your static configuration and your dynamic configuration /!\
|
||
+ # It follows the provider naming convention: https://doc.traefik.io/traefik/providers/overview/#provider-namespace
|
||
+ # middlewares:
|
||
+ # - namespace-name1@kubernetescrd
|
||
+ # - namespace-name2@kubernetescrd
|
||
+ middlewares: []
|
||
metrics:
|
||
# When using hostNetwork, use another port to avoid conflict with node exporter:
|
||
# https://github.com/prometheus/prometheus/wiki/Default-port-allocations
|
||
```
|
||
|
||
## 10.31.0  
|
||
|
||
**Release date:** 2022-10-03
|
||
|
||
* Support setting dashboard entryPoints for ingressRoute resource
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index c9feb76..3957448 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -120,6 +120,10 @@ ingressRoute:
|
||
annotations: {}
|
||
# Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels)
|
||
labels: {}
|
||
+ # Specify the allowed entrypoints to use for the dashboard ingress route, (e.g. traefik, web, websecure).
|
||
+ # By default, it's using traefik entrypoint, which is not exposed.
|
||
+ # /!\ Do not expose your dashboard without any protection over the internet /!\
|
||
+ entryPoints: ["traefik"]
|
||
|
||
rollingUpdate:
|
||
maxUnavailable: 1
|
||
```
|
||
|
||
## 10.30.2  
|
||
|
||
**Release date:** 2022-10-03
|
||
|
||
* :test_tube: Fail gracefully when asked to provide a service without ports
|
||
|
||
|
||
## 10.30.1  
|
||
|
||
**Release date:** 2022-09-30
|
||
|
||
* :arrow_up: Upgrade helm, ct & unittest (#638)
|
||
|
||
|
||
## 10.30.0  
|
||
|
||
**Release date:** 2022-09-30
|
||
|
||
* Add support HTTPS scheme for healthcheks
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index fed4a8a..c9feb76 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -340,6 +340,10 @@ ports:
|
||
# with an external Load Balancer that performs healthchecks.
|
||
# healthchecksPort: 9000
|
||
|
||
+ # Override the liveness/readiness scheme. Useful for getting ping to
|
||
+ # respond on websecure entryPoint.
|
||
+ # healthchecksScheme: HTTPS
|
||
+
|
||
# Defines whether the port is exposed if service.type is LoadBalancer or
|
||
# NodePort.
|
||
#
|
||
```
|
||
|
||
## 10.29.0  
|
||
|
||
**Release date:** 2022-09-29
|
||
|
||
* Add missing tracing options
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d1708cc..fed4a8a 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -247,12 +247,45 @@ metrics:
|
||
|
||
tracing: {}
|
||
# instana:
|
||
- # enabled: true
|
||
+ # localAgentHost: 127.0.0.1
|
||
+ # localAgentPort: 42699
|
||
+ # logLevel: info
|
||
+ # enableAutoProfile: true
|
||
# datadog:
|
||
# localAgentHostPort: 127.0.0.1:8126
|
||
# debug: false
|
||
# globalTag: ""
|
||
# prioritySampling: false
|
||
+ # jaeger:
|
||
+ # samplingServerURL: http://localhost:5778/sampling
|
||
+ # samplingType: const
|
||
+ # samplingParam: 1.0
|
||
+ # localAgentHostPort: 127.0.0.1:6831
|
||
+ # gen128Bit: false
|
||
+ # propagation: jaeger
|
||
+ # traceContextHeaderName: uber-trace-id
|
||
+ # disableAttemptReconnecting: true
|
||
+ # collector:
|
||
+ # endpoint: ""
|
||
+ # user: ""
|
||
+ # password: ""
|
||
+ # zipkin:
|
||
+ # httpEndpoint: http://localhost:9411/api/v2/spans
|
||
+ # sameSpan: false
|
||
+ # id128Bit: true
|
||
+ # sampleRate: 1.0
|
||
+ # haystack:
|
||
+ # localAgentHost: 127.0.0.1
|
||
+ # localAgentPort: 35000
|
||
+ # globalTag: ""
|
||
+ # traceIDHeaderName: ""
|
||
+ # parentIDHeaderName: ""
|
||
+ # spanIDHeaderName: ""
|
||
+ # baggagePrefixHeaderName: ""
|
||
+ # elastic:
|
||
+ # serverURL: http://localhost:8200
|
||
+ # secretToken: ""
|
||
+ # serviceEnvironment: ""
|
||
|
||
globalArguments:
|
||
- "--global.checknewversion"
|
||
```
|
||
|
||
## 10.28.0  
|
||
|
||
**Release date:** 2022-09-29
|
||
|
||
* feat: add lifecycle for prestop and poststart
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 19a133c..d1708cc 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -59,6 +59,17 @@ deployment:
|
||
# Additional imagePullSecrets
|
||
imagePullSecrets: []
|
||
# - name: myRegistryKeySecretName
|
||
+ # Pod lifecycle actions
|
||
+ lifecycle: {}
|
||
+ # preStop:
|
||
+ # exec:
|
||
+ # command: ["/bin/sh", "-c", "sleep 40"]
|
||
+ # postStart:
|
||
+ # httpGet:
|
||
+ # path: /ping
|
||
+ # port: 9000
|
||
+ # host: localhost
|
||
+ # scheme: HTTP
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
```
|
||
|
||
## 10.27.0  
|
||
|
||
**Release date:** 2022-09-29
|
||
|
||
* feat: add create gateway option
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d9c745e..19a133c 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -91,6 +91,8 @@ experimental:
|
||
enabled: false
|
||
kubernetesGateway:
|
||
enabled: false
|
||
+ gateway:
|
||
+ enabled: true
|
||
# certificate:
|
||
# group: "core"
|
||
# kind: "Secret"
|
||
```
|
||
|
||
## 10.26.1  
|
||
|
||
**Release date:** 2022-09-28
|
||
|
||
* 🐛 fix rbac templating (#636)
|
||
|
||
|
||
## 10.26.0  
|
||
|
||
**Release date:** 2022-09-28
|
||
|
||
* :bug: Fix ingressClass support when rbac.namespaced=true (#499)
|
||
|
||
|
||
## 10.25.1  
|
||
|
||
**Release date:** 2022-09-28
|
||
|
||
* Add ingressclasses to traefik role
|
||
|
||
|
||
## 10.25.0  
|
||
|
||
**Release date:** 2022-09-27
|
||
|
||
* Add TLSStore resource to chart
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d4011c3..d9c745e 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -373,6 +373,15 @@ ports:
|
||
# - CurveP384
|
||
tlsOptions: {}
|
||
|
||
+# TLS Store are created as TLSStore CRDs. This is useful if you want to set a default certificate
|
||
+# https://doc.traefik.io/traefik/https/tls/#default-certificate
|
||
+# Example:
|
||
+# tlsStore:
|
||
+# default:
|
||
+# defaultCertificate:
|
||
+# secretName: tls-cert
|
||
+tlsStore: {}
|
||
+
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
# from.
|
||
service:
|
||
```
|
||
|
||
## 10.24.5  
|
||
|
||
**Release date:** 2022-09-27
|
||
|
||
* Suggest an alternative port for metrics
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 81f2e85..d4011c3 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -344,6 +344,8 @@ ports:
|
||
# - foo.example.com
|
||
# - bar.example.com
|
||
metrics:
|
||
+ # When using hostNetwork, use another port to avoid conflict with node exporter:
|
||
+ # https://github.com/prometheus/prometheus/wiki/Default-port-allocations
|
||
port: 9100
|
||
# hostPort: 9100
|
||
# Defines whether the port is exposed if service.type is LoadBalancer or
|
||
```
|
||
|
||
## 10.24.4  
|
||
|
||
**Release date:** 2022-09-26
|
||
|
||
* Update Traefik to v2.8.7
|
||
|
||
|
||
## 10.24.3  
|
||
|
||
**Release date:** 2022-09-14
|
||
|
||
* Update Traefik version to v2.8.5
|
||
|
||
|
||
## 10.24.2  
|
||
|
||
**Release date:** 2022-09-05
|
||
|
||
* Update Traefik version to v2.8.4
|
||
|
||
|
||
## 10.24.1  
|
||
|
||
**Release date:** 2022-08-29
|
||
|
||
* Update PodDisruptionBudget apiVersion to policy/v1
|
||
|
||
|
||
## 10.24.0  
|
||
|
||
**Release date:** 2022-06-30
|
||
|
||
* Update Traefik version to v2.8.0
|
||
|
||
|
||
## 10.23.0  
|
||
|
||
**Release date:** 2022-06-27
|
||
|
||
* Support environment variable usage for Datadog
|
||
|
||
|
||
## 10.22.0  
|
||
|
||
**Release date:** 2022-06-22
|
||
|
||
* Allow setting revisionHistoryLimit for Deployment and DaemonSet
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d5785ab..81f2e85 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -14,6 +14,8 @@ deployment:
|
||
kind: Deployment
|
||
# Number of pods of the deployment (only applies when kind == Deployment)
|
||
replicas: 1
|
||
+ # Number of old history to retain to allow rollback (If not set, default Kubernetes value is set to 10)
|
||
+ # revisionHistoryLimit: 1
|
||
# Amount of time (in seconds) before Kubernetes will send the SIGKILL signal if Traefik does not shut down
|
||
terminationGracePeriodSeconds: 60
|
||
# The minimum number of seconds Traefik needs to be up and running before the DaemonSet/Deployment controller considers it available
|
||
```
|
||
|
||
## 10.21.1  
|
||
|
||
**Release date:** 2022-06-15
|
||
|
||
* Update Traefik version to 2.7.1
|
||
|
||
|
||
## 10.21.0  
|
||
|
||
**Release date:** 2022-06-15
|
||
|
||
* Support allowEmptyServices config for KubernetesCRD
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e141e29..d5785ab 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -133,6 +133,7 @@ providers:
|
||
enabled: true
|
||
allowCrossNamespace: false
|
||
allowExternalNameServices: false
|
||
+ allowEmptyServices: false
|
||
# ingressClass: traefik-internal
|
||
# labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
```
|
||
|
||
## 10.20.1  
|
||
|
||
**Release date:** 2022-06-01
|
||
|
||
* Add Acme certificate resolver configuration
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index a16b107..e141e29 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -433,6 +433,27 @@ persistence:
|
||
annotations: {}
|
||
# subPath: "" # only mount a subpath of the Volume into the pod
|
||
|
||
+certResolvers: {}
|
||
+# letsencrypt:
|
||
+# # for challenge options cf. https://doc.traefik.io/traefik/https/acme/
|
||
+# email: email@example.com
|
||
+# dnsChallenge:
|
||
+# # also add the provider's required configuration under env
|
||
+# # or expand then from secrets/configmaps with envfrom
|
||
+# # cf. https://doc.traefik.io/traefik/https/acme/#providers
|
||
+# provider: digitalocean
|
||
+# # add futher options for the dns challenge as needed
|
||
+# # cf. https://doc.traefik.io/traefik/https/acme/#dnschallenge
|
||
+# delayBeforeCheck: 30
|
||
+# resolvers:
|
||
+# - 1.1.1.1
|
||
+# - 8.8.8.8
|
||
+# tlsChallenge: true
|
||
+# httpChallenge:
|
||
+# entryPoint: "web"
|
||
+# # match the path to persistence
|
||
+# storage: /data/acme.json
|
||
+
|
||
# If hostNetwork is true, runs traefik in the host network namespace
|
||
# To prevent unschedulabel pods due to port collisions, if hostNetwork=true
|
||
# and replicas>1, a pod anti-affinity is recommended and will be set if the
|
||
```
|
||
|
||
## 10.20.0  
|
||
|
||
**Release date:** 2022-05-25
|
||
|
||
* Update Traefik Proxy to v2.7.0
|
||
|
||
|
||
## 10.19.5  
|
||
|
||
**Release date:** 2022-05-04
|
||
|
||
* Upgrade Traefik to 2.6.6
|
||
|
||
|
||
## 10.19.4  
|
||
|
||
**Release date:** 2022-03-31
|
||
|
||
* Update Traefik dependency version to 2.6.3
|
||
|
||
|
||
## 10.19.3  
|
||
|
||
**Release date:** 2022-03-30
|
||
|
||
* Update CRDs to match the ones defined in the reference documentation
|
||
|
||
|
||
## 10.19.2  
|
||
|
||
**Release date:** 2022-03-30
|
||
|
||
* Revert Traefik version to 2.6.2
|
||
|
||
|
||
## 10.19.1  
|
||
|
||
**Release date:** 2022-03-30
|
||
|
||
* Update Traefik version to 2.6.3
|
||
|
||
|
||
## 10.19.0  
|
||
|
||
**Release date:** 2022-03-28
|
||
|
||
* Support ingressClass option for KubernetesIngress provider
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 02ab704..a16b107 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -142,6 +142,7 @@ providers:
|
||
enabled: true
|
||
allowExternalNameServices: false
|
||
allowEmptyServices: false
|
||
+ # ingressClass: traefik-internal
|
||
# labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
# - "default"
|
||
```
|
||
|
||
## 10.18.0  
|
||
|
||
**Release date:** 2022-03-28
|
||
|
||
* Support liveness and readyness probes customization
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 15f1103..02ab704 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -110,6 +110,20 @@ rollingUpdate:
|
||
maxUnavailable: 1
|
||
maxSurge: 1
|
||
|
||
+# Customize liveness and readiness probe values.
|
||
+readinessProbe:
|
||
+ failureThreshold: 1
|
||
+ initialDelaySeconds: 10
|
||
+ periodSeconds: 10
|
||
+ successThreshold: 1
|
||
+ timeoutSeconds: 2
|
||
+
|
||
+livenessProbe:
|
||
+ failureThreshold: 3
|
||
+ initialDelaySeconds: 10
|
||
+ periodSeconds: 10
|
||
+ successThreshold: 1
|
||
+ timeoutSeconds: 2
|
||
|
||
#
|
||
# Configure providers
|
||
```
|
||
|
||
## 10.17.0  
|
||
|
||
**Release date:** 2022-03-28
|
||
|
||
* Support Datadog tracing
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 4dccd1a..15f1103 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -217,6 +217,11 @@ metrics:
|
||
tracing: {}
|
||
# instana:
|
||
# enabled: true
|
||
+ # datadog:
|
||
+ # localAgentHostPort: 127.0.0.1:8126
|
||
+ # debug: false
|
||
+ # globalTag: ""
|
||
+ # prioritySampling: false
|
||
|
||
globalArguments:
|
||
- "--global.checknewversion"
|
||
```
|
||
|
||
## 10.16.1  
|
||
|
||
**Release date:** 2022-03-28
|
||
|
||
* Update Traefik version to 2.6.2
|
||
|
||
|
||
## 10.16.0  
|
||
|
||
**Release date:** 2022-03-28
|
||
|
||
* Support allowEmptyServices for KubernetesIngress provider
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 1f9dbbe..4dccd1a 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -127,6 +127,7 @@ providers:
|
||
kubernetesIngress:
|
||
enabled: true
|
||
allowExternalNameServices: false
|
||
+ allowEmptyServices: false
|
||
# labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
# - "default"
|
||
```
|
||
|
||
## 10.15.0  
|
||
|
||
**Release date:** 2022-03-08
|
||
|
||
* Add metrics.prometheus.addRoutersLabels option
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index cd4d49b..1f9dbbe 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -209,6 +209,7 @@ metrics:
|
||
# protocol: udp
|
||
prometheus:
|
||
entryPoint: metrics
|
||
+ # addRoutersLabels: true
|
||
# statsd:
|
||
# address: localhost:8125
|
||
|
||
```
|
||
|
||
## 10.14.2  
|
||
|
||
**Release date:** 2022-02-18
|
||
|
||
* Update Traefik to v2.6.1
|
||
|
||
|
||
## 10.14.1  
|
||
|
||
**Release date:** 2022-02-09
|
||
|
||
* Add missing inFlightConn TCP middleware CRD
|
||
|
||
|
||
## 10.14.0  
|
||
|
||
**Release date:** 2022-02-03
|
||
|
||
* Add experimental HTTP/3 support
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d49122f..cd4d49b 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -83,6 +83,8 @@ pilot:
|
||
|
||
# Enable experimental features
|
||
experimental:
|
||
+ http3:
|
||
+ enabled: false
|
||
plugins:
|
||
enabled: false
|
||
kubernetesGateway:
|
||
@@ -300,6 +302,10 @@ ports:
|
||
# The port protocol (TCP/UDP)
|
||
protocol: TCP
|
||
# nodePort: 32443
|
||
+ # Enable HTTP/3.
|
||
+ # Requires enabling experimental http3 feature and tls.
|
||
+ # Note that you cannot have a UDP entrypoint with the same port.
|
||
+ # http3: true
|
||
# Set TLS at the entrypoint
|
||
# https://doc.traefik.io/traefik/routing/entrypoints/#tls
|
||
tls:
|
||
```
|
||
|
||
## 10.13.0  
|
||
|
||
**Release date:** 2022-02-01
|
||
|
||
* Add support for ipFamilies
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 32fce6f..d49122f 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -366,6 +366,11 @@ service:
|
||
# - 1.2.3.4
|
||
# One of SingleStack, PreferDualStack, or RequireDualStack.
|
||
# ipFamilyPolicy: SingleStack
|
||
+ # List of IP families (e.g. IPv4 and/or IPv6).
|
||
+ # ref: https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services
|
||
+ # ipFamilies:
|
||
+ # - IPv4
|
||
+ # - IPv6
|
||
|
||
## Create HorizontalPodAutoscaler object.
|
||
##
|
||
```
|
||
|
||
## 10.12.0  
|
||
|
||
**Release date:** 2022-02-01
|
||
|
||
* Add shareProcessNamespace option to podtemplate
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ab25456..32fce6f 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -50,6 +50,8 @@ deployment:
|
||
# volumeMounts:
|
||
# - name: data
|
||
# mountPath: /data
|
||
+ # Use process namespace sharing
|
||
+ shareProcessNamespace: false
|
||
# Custom pod DNS policy. Apply if `hostNetwork: true`
|
||
# dnsPolicy: ClusterFirstWithHostNet
|
||
# Additional imagePullSecrets
|
||
```
|
||
|
||
## 10.11.1  
|
||
|
||
**Release date:** 2022-01-31
|
||
|
||
* Fix anti-affinity example
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 8c72905..ab25456 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -438,13 +438,13 @@ affinity: {}
|
||
# # It should be used when hostNetwork: true to prevent port conflicts
|
||
# podAntiAffinity:
|
||
# requiredDuringSchedulingIgnoredDuringExecution:
|
||
-# - labelSelector:
|
||
-# matchExpressions:
|
||
-# - key: app
|
||
-# operator: In
|
||
-# values:
|
||
-# - {{ template "traefik.name" . }}
|
||
-# topologyKey: failure-domain.beta.kubernetes.io/zone
|
||
+# - labelSelector:
|
||
+# matchExpressions:
|
||
+# - key: app.kubernetes.io/name
|
||
+# operator: In
|
||
+# values:
|
||
+# - {{ template "traefik.name" . }}
|
||
+# topologyKey: kubernetes.io/hostname
|
||
nodeSelector: {}
|
||
tolerations: []
|
||
|
||
```
|
||
|
||
## 10.11.0  
|
||
|
||
**Release date:** 2022-01-31
|
||
|
||
* Add setting to enable Instana tracing
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7fe4a2c..8c72905 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -208,6 +208,10 @@ metrics:
|
||
# statsd:
|
||
# address: localhost:8125
|
||
|
||
+tracing: {}
|
||
+ # instana:
|
||
+ # enabled: true
|
||
+
|
||
globalArguments:
|
||
- "--global.checknewversion"
|
||
- "--global.sendanonymoususage"
|
||
```
|
||
|
||
## 10.10.0  
|
||
|
||
**Release date:** 2022-01-31
|
||
|
||
* Update Traefik to v2.6
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 8ae4bd8..7fe4a2c 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -85,9 +85,8 @@ experimental:
|
||
enabled: false
|
||
kubernetesGateway:
|
||
enabled: false
|
||
- appLabelSelector: "traefik"
|
||
- certificates: []
|
||
- # - group: "core"
|
||
+ # certificate:
|
||
+ # group: "core"
|
||
# kind: "Secret"
|
||
# name: "mysecret"
|
||
# By default, Gateway would be created to the Namespace you are deploying Traefik to.
|
||
```
|
||
|
||
## 10.9.1  
|
||
|
||
**Release date:** 2021-12-24
|
||
|
||
* Bump traefik version to 2.5.6
|
||
|
||
|
||
## 10.9.0  
|
||
|
||
**Release date:** 2021-12-20
|
||
|
||
* feat: add allowExternalNameServices to KubernetesIngress provider
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 79df205..8ae4bd8 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -123,6 +123,7 @@ providers:
|
||
|
||
kubernetesIngress:
|
||
enabled: true
|
||
+ allowExternalNameServices: false
|
||
# labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
# - "default"
|
||
```
|
||
|
||
## 10.8.0  
|
||
|
||
**Release date:** 2021-12-20
|
||
|
||
* Add support to specify minReadySeconds on Deployment/DaemonSet
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7e9186b..79df205 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -16,6 +16,8 @@ deployment:
|
||
replicas: 1
|
||
# Amount of time (in seconds) before Kubernetes will send the SIGKILL signal if Traefik does not shut down
|
||
terminationGracePeriodSeconds: 60
|
||
+ # The minimum number of seconds Traefik needs to be up and running before the DaemonSet/Deployment controller considers it available
|
||
+ minReadySeconds: 0
|
||
# Additional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
annotations: {}
|
||
# Additional deployment labels (e.g. for filtering deployment by custom labels)
|
||
```
|
||
|
||
## 10.7.1  
|
||
|
||
**Release date:** 2021-12-06
|
||
|
||
* Fix pod disruption when using percentages
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e0655c8..7e9186b 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -52,13 +52,15 @@ deployment:
|
||
# dnsPolicy: ClusterFirstWithHostNet
|
||
# Additional imagePullSecrets
|
||
imagePullSecrets: []
|
||
- # - name: myRegistryKeySecretName
|
||
+ # - name: myRegistryKeySecretName
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
enabled: false
|
||
# maxUnavailable: 1
|
||
+ # maxUnavailable: 33%
|
||
# minAvailable: 0
|
||
+ # minAvailable: 25%
|
||
|
||
# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x
|
||
ingressClass:
|
||
```
|
||
|
||
## 10.7.0  
|
||
|
||
**Release date:** 2021-12-06
|
||
|
||
* Add support for ipFamilyPolicy
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 3ec7105..e0655c8 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -343,8 +343,8 @@ service:
|
||
annotationsUDP: {}
|
||
# Additional service labels (e.g. for filtering Service by custom labels)
|
||
labels: {}
|
||
- # Additional entries here will be added to the service spec. Cannot contains
|
||
- # type, selector or ports entries.
|
||
+ # Additional entries here will be added to the service spec.
|
||
+ # Cannot contain type, selector or ports entries.
|
||
spec: {}
|
||
# externalTrafficPolicy: Cluster
|
||
# loadBalancerIP: "1.2.3.4"
|
||
@@ -354,6 +354,8 @@ service:
|
||
# - 172.16.0.0/16
|
||
externalIPs: []
|
||
# - 1.2.3.4
|
||
+ # One of SingleStack, PreferDualStack, or RequireDualStack.
|
||
+ # ipFamilyPolicy: SingleStack
|
||
|
||
## Create HorizontalPodAutoscaler object.
|
||
##
|
||
```
|
||
|
||
## 10.6.2  
|
||
|
||
**Release date:** 2021-11-15
|
||
|
||
* Bump Traefik version to 2.5.4
|
||
|
||
|
||
## 10.6.1  
|
||
|
||
**Release date:** 2021-11-05
|
||
|
||
* Add missing Gateway API resources to ClusterRole
|
||
|
||
|
||
## 10.6.0  
|
||
|
||
**Release date:** 2021-10-13
|
||
|
||
* feat: allow termination grace period to be configurable
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index f06ebc6..3ec7105 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -14,6 +14,8 @@ deployment:
|
||
kind: Deployment
|
||
# Number of pods of the deployment (only applies when kind == Deployment)
|
||
replicas: 1
|
||
+ # Amount of time (in seconds) before Kubernetes will send the SIGKILL signal if Traefik does not shut down
|
||
+ terminationGracePeriodSeconds: 60
|
||
# Additional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
annotations: {}
|
||
# Additional deployment labels (e.g. for filtering deployment by custom labels)
|
||
```
|
||
|
||
## 10.5.0  
|
||
|
||
**Release date:** 2021-10-13
|
||
|
||
* feat: add allowExternalNameServices to Kubernetes CRD provider
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 3bcb350..f06ebc6 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -109,6 +109,7 @@ providers:
|
||
kubernetesCRD:
|
||
enabled: true
|
||
allowCrossNamespace: false
|
||
+ allowExternalNameServices: false
|
||
# ingressClass: traefik-internal
|
||
# labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
```
|
||
|
||
## 10.4.2  
|
||
|
||
**Release date:** 2021-10-13
|
||
|
||
* fix(crd): add permissionsPolicy to headers middleware
|
||
|
||
|
||
## 10.4.1  
|
||
|
||
**Release date:** 2021-10-13
|
||
|
||
* fix(crd): add peerCertURI option to ServersTransport
|
||
|
||
|
||
## 10.4.0  
|
||
|
||
**Release date:** 2021-10-12
|
||
|
||
* Add Kubernetes CRD labelSelector and ingressClass options
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index f54f5fe..3bcb350 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -109,8 +109,11 @@ providers:
|
||
kubernetesCRD:
|
||
enabled: true
|
||
allowCrossNamespace: false
|
||
+ # ingressClass: traefik-internal
|
||
+ # labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
# - "default"
|
||
+
|
||
kubernetesIngress:
|
||
enabled: true
|
||
# labelSelector: environment=production,method=traefik
|
||
```
|
||
|
||
## 10.3.6  
|
||
|
||
**Release date:** 2021-09-24
|
||
|
||
* Fix missing RequireAnyClientCert value to TLSOption CRD
|
||
|
||
|
||
## 10.3.5  
|
||
|
||
**Release date:** 2021-09-23
|
||
|
||
* Bump Traefik version to 2.5.3
|
||
|
||
|
||
## 10.3.4  
|
||
|
||
**Release date:** 2021-09-17
|
||
|
||
* Add allowCrossNamespace option on kubernetesCRD provider
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7e3a579..f54f5fe 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -108,6 +108,7 @@ rollingUpdate:
|
||
providers:
|
||
kubernetesCRD:
|
||
enabled: true
|
||
+ allowCrossNamespace: false
|
||
namespaces: []
|
||
# - "default"
|
||
kubernetesIngress:
|
||
```
|
||
|
||
## 10.3.3  
|
||
|
||
**Release date:** 2021-09-17
|
||
|
||
* fix(crd): missing alpnProtocols in TLSOption
|
||
|
||
|
||
## 10.3.2  
|
||
|
||
**Release date:** 2021-08-23
|
||
|
||
* Releasing 2.5.1
|
||
|
||
|
||
## 10.3.1  
|
||
|
||
**Release date:** 2021-08-20
|
||
|
||
* Fix Ingress RBAC for namespaced scoped deployment
|
||
|
||
|
||
## 10.3.0  
|
||
|
||
**Release date:** 2021-08-18
|
||
|
||
* Releasing Traefik 2.5.0
|
||
|
||
|
||
## 10.2.0  
|
||
|
||
**Release date:** 2021-08-18
|
||
|
||
* Allow setting TCP and UDP service annotations separately
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 72a01ea..7e3a579 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -328,8 +328,12 @@ tlsOptions: {}
|
||
service:
|
||
enabled: true
|
||
type: LoadBalancer
|
||
- # Additional annotations (e.g. for cloud provider specific config)
|
||
+ # Additional annotations applied to both TCP and UDP services (e.g. for cloud provider specific config)
|
||
annotations: {}
|
||
+ # Additional annotations for TCP service only
|
||
+ annotationsTCP: {}
|
||
+ # Additional annotations for UDP service only
|
||
+ annotationsUDP: {}
|
||
# Additional service labels (e.g. for filtering Service by custom labels)
|
||
labels: {}
|
||
# Additional entries here will be added to the service spec. Cannot contains
|
||
```
|
||
|
||
## 10.1.6  
|
||
|
||
**Release date:** 2021-08-17
|
||
|
||
* fix: missing service labels
|
||
|
||
|
||
## 10.1.5  
|
||
|
||
**Release date:** 2021-08-17
|
||
|
||
* fix(pvc-annotaions): see traefik/traefik-helm-chart#471
|
||
|
||
|
||
## 10.1.4  
|
||
|
||
**Release date:** 2021-08-17
|
||
|
||
* fix(ingressclass): fallbackApiVersion default shouldn't be `nil`
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 04d336c..72a01ea 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -64,7 +64,7 @@ ingressClass:
|
||
enabled: false
|
||
isDefaultClass: false
|
||
# Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1"
|
||
- fallbackApiVersion:
|
||
+ fallbackApiVersion: ""
|
||
|
||
# Activate Pilot integration
|
||
pilot:
|
||
```
|
||
|
||
## 10.1.3  
|
||
|
||
**Release date:** 2021-08-16
|
||
|
||
* Move Prometheus annotations to Pods
|
||
|
||
|
||
## 10.1.2  
|
||
|
||
**Release date:** 2021-08-10
|
||
|
||
* Version bumped 2.4.13
|
||
|
||
|
||
## 10.1.1  
|
||
|
||
**Release date:** 2021-07-20
|
||
|
||
* Fixing Prometheus.io/port annotation
|
||
|
||
|
||
## 10.1.0  
|
||
|
||
**Release date:** 2021-07-20
|
||
|
||
* Add metrics framework, and prom annotations
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index f6e370a..04d336c 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -186,6 +186,17 @@ logs:
|
||
# Authorization: drop
|
||
# Content-Type: keep
|
||
|
||
+metrics:
|
||
+ # datadog:
|
||
+ # address: 127.0.0.1:8125
|
||
+ # influxdb:
|
||
+ # address: localhost:8089
|
||
+ # protocol: udp
|
||
+ prometheus:
|
||
+ entryPoint: metrics
|
||
+ # statsd:
|
||
+ # address: localhost:8125
|
||
+
|
||
globalArguments:
|
||
- "--global.checknewversion"
|
||
- "--global.sendanonymoususage"
|
||
@@ -284,6 +295,20 @@ ports:
|
||
# sans:
|
||
# - foo.example.com
|
||
# - bar.example.com
|
||
+ metrics:
|
||
+ port: 9100
|
||
+ # hostPort: 9100
|
||
+ # Defines whether the port is exposed if service.type is LoadBalancer or
|
||
+ # NodePort.
|
||
+ #
|
||
+ # You may not want to expose the metrics port on production deployments.
|
||
+ # If you want to access it from outside of your cluster,
|
||
+ # use `kubectl port-forward` or create a secure ingress
|
||
+ expose: false
|
||
+ # The exposed port for this service
|
||
+ exposedPort: 9100
|
||
+ # The port protocol (TCP/UDP)
|
||
+ protocol: TCP
|
||
|
||
# TLS Options are created as TLSOption CRDs
|
||
# https://doc.traefik.io/traefik/https/tls/#tls-options
|
||
```
|
||
|
||
## 10.0.2  
|
||
|
||
**Release date:** 2021-07-14
|
||
|
||
* feat(gateway): introduces param / pick Namespace installing Gateway
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 9bf90ea..f6e370a 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -84,6 +84,9 @@ experimental:
|
||
# - group: "core"
|
||
# kind: "Secret"
|
||
# name: "mysecret"
|
||
+ # By default, Gateway would be created to the Namespace you are deploying Traefik to.
|
||
+ # You may create that Gateway in another namespace, setting its name below:
|
||
+ # namespace: default
|
||
|
||
# Create an IngressRoute for the dashboard
|
||
ingressRoute:
|
||
```
|
||
|
||
## 10.0.1  
|
||
|
||
**Release date:** 2021-07-14
|
||
|
||
* Add RBAC for middlewaretcps
|
||
|
||
|
||
## 10.0.0  
|
||
|
||
**Release date:** 2021-07-07
|
||
|
||
* Update CRD versions
|
||
|
||
|
||
## 9.20.1  
|
||
|
||
**Release date:** 2021-07-05
|
||
|
||
* Revert CRD templating
|
||
|
||
|
||
## 9.20.0  
|
||
|
||
**Release date:** 2021-07-05
|
||
|
||
* Add support for apiextensions v1 CRDs
|
||
|
||
|
||
## 9.19.2  
|
||
|
||
**Release date:** 2021-06-16
|
||
|
||
* Add name-metadata for service "List" object
|
||
|
||
|
||
## 9.19.1  
|
||
|
||
**Release date:** 2021-05-13
|
||
|
||
* fix simple typo
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index b30afac..9bf90ea 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -363,7 +363,7 @@ rbac:
|
||
# If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace
|
||
namespaced: false
|
||
|
||
-# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBindin or ClusterRoleBinding
|
||
+# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBinding or ClusterRoleBinding
|
||
podSecurityPolicy:
|
||
enabled: false
|
||
|
||
```
|
||
|
||
## 9.19.0  
|
||
|
||
**Release date:** 2021-04-29
|
||
|
||
* Fix IngressClass api version
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 0aa2d6b..b30afac 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -63,6 +63,8 @@ ingressClass:
|
||
# true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
||
enabled: false
|
||
isDefaultClass: false
|
||
+ # Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1"
|
||
+ fallbackApiVersion:
|
||
|
||
# Activate Pilot integration
|
||
pilot:
|
||
```
|
||
|
||
## 9.18.3  
|
||
|
||
**Release date:** 2021-04-26
|
||
|
||
* Fix: ignore provider namespace args on disabled
|
||
|
||
|
||
## 9.18.2  
|
||
|
||
**Release date:** 2021-04-02
|
||
|
||
* Fix pilot dashboard deactivation
|
||
|
||
|
||
## 9.18.1  
|
||
|
||
**Release date:** 2021-03-29
|
||
|
||
* Do not disable Traefik Pilot in the dashboard by default
|
||
|
||
|
||
## 9.18.0  
|
||
|
||
**Release date:** 2021-03-24
|
||
|
||
* Add an option to toggle the pilot dashboard
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 017f771..0aa2d6b 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -68,6 +68,8 @@ ingressClass:
|
||
pilot:
|
||
enabled: false
|
||
token: ""
|
||
+ # Toggle Pilot Dashboard
|
||
+ # dashboard: false
|
||
|
||
# Enable experimental features
|
||
experimental:
|
||
```
|
||
|
||
## 9.17.6  
|
||
|
||
**Release date:** 2021-03-24
|
||
|
||
* Bump Traefik to 2.4.8
|
||
|
||
|
||
## 9.17.5  
|
||
|
||
**Release date:** 2021-03-17
|
||
|
||
* feat(labelSelector): option matching Ingresses based on labelSelectors
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 868a985..017f771 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -105,6 +105,7 @@ providers:
|
||
# - "default"
|
||
kubernetesIngress:
|
||
enabled: true
|
||
+ # labelSelector: environment=production,method=traefik
|
||
namespaces: []
|
||
# - "default"
|
||
# IP used for Kubernetes Ingress endpoints
|
||
```
|
||
|
||
## 9.17.4  
|
||
|
||
**Release date:** 2021-03-17
|
||
|
||
* Add helm resource-policy annotation on PVC
|
||
|
||
|
||
## 9.17.3  
|
||
|
||
**Release date:** 2021-03-17
|
||
|
||
* Throw error with explicit latest tag
|
||
|
||
|
||
## 9.17.2  
|
||
|
||
**Release date:** 2021-03-10
|
||
|
||
* fix(keywords): removed by mistake
|
||
|
||
|
||
## 9.17.1  
|
||
|
||
**Release date:** 2021-03-10
|
||
|
||
* feat(healthchecksPort): Support for overriding the liveness/readiness probes port
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 56abb93..868a985 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -120,6 +120,8 @@ providers:
|
||
# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
# additionalArguments:
|
||
# - "--providers.file.filename=/config/dynamic.toml"
|
||
+# - "--ping"
|
||
+# - "--ping.entrypoint=web"
|
||
volumes: []
|
||
# - name: public-cert
|
||
# mountPath: "/certs"
|
||
@@ -225,6 +227,10 @@ ports:
|
||
# only.
|
||
# hostIP: 192.168.100.10
|
||
|
||
+ # Override the liveness/readiness port. This is useful to integrate traefik
|
||
+ # with an external Load Balancer that performs healthchecks.
|
||
+ # healthchecksPort: 9000
|
||
+
|
||
# Defines whether the port is exposed if service.type is LoadBalancer or
|
||
# NodePort.
|
||
#
|
||
```
|
||
|
||
## 9.16.2  
|
||
|
||
**Release date:** 2021-03-09
|
||
|
||
* Bump Traefik to 2.4.7
|
||
|
||
|
||
## 9.16.1  
|
||
|
||
**Release date:** 2021-03-09
|
||
|
||
* Adding custom labels to deployment
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ba24be7..56abb93 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -16,6 +16,8 @@ deployment:
|
||
replicas: 1
|
||
# Additional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
annotations: {}
|
||
+ # Additional deployment labels (e.g. for filtering deployment by custom labels)
|
||
+ labels: {}
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
# Additional Pod labels (e.g. for filtering Pod by custom labels)
|
||
```
|
||
|
||
## 9.15.2  
|
||
|
||
**Release date:** 2021-03-02
|
||
|
||
* Upgrade Traefik to 2.4.6
|
||
|
||
|
||
## 9.15.1  
|
||
|
||
**Release date:** 2021-03-02
|
||
|
||
* Configurable PVC name
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 1e0e5a9..ba24be7 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -327,6 +327,7 @@ autoscaling:
|
||
# It will persist TLS certificates.
|
||
persistence:
|
||
enabled: false
|
||
+ name: data
|
||
# existingClaim: ""
|
||
accessMode: ReadWriteOnce
|
||
size: 128Mi
|
||
```
|
||
|
||
## 9.14.4  
|
||
|
||
**Release date:** 2021-03-02
|
||
|
||
* fix typo
|
||
|
||
|
||
## 9.14.3  
|
||
|
||
**Release date:** 2021-02-19
|
||
|
||
* Bump Traefik to 2.4.5
|
||
|
||
|
||
## 9.14.2  
|
||
|
||
**Release date:** 2021-02-03
|
||
|
||
* docs: indent nit for dsdsocket example
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 56485ad..1e0e5a9 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -33,7 +33,7 @@ deployment:
|
||
additionalVolumes: []
|
||
# - name: dsdsocket
|
||
# hostPath:
|
||
- # path: /var/run/statsd-exporter
|
||
+ # path: /var/run/statsd-exporter
|
||
# Additional initContainers (e.g. for setting file permission as shown below)
|
||
initContainers: []
|
||
# The "volume-permissions" init container is required if you run into permission issues.
|
||
```
|
||
|
||
## 9.14.1  
|
||
|
||
**Release date:** 2021-02-03
|
||
|
||
* Update Traefik to 2.4.2
|
||
|
||
|
||
## 9.14.0  
|
||
|
||
**Release date:** 2021-02-01
|
||
|
||
* Enable Kubernetes Gateway provider with an experimental flag
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 50cab94..56485ad 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -71,6 +71,13 @@ pilot:
|
||
experimental:
|
||
plugins:
|
||
enabled: false
|
||
+ kubernetesGateway:
|
||
+ enabled: false
|
||
+ appLabelSelector: "traefik"
|
||
+ certificates: []
|
||
+ # - group: "core"
|
||
+ # kind: "Secret"
|
||
+ # name: "mysecret"
|
||
|
||
# Create an IngressRoute for the dashboard
|
||
ingressRoute:
|
||
```
|
||
|
||
## 9.13.0  
|
||
|
||
**Release date:** 2021-01-22
|
||
|
||
* Update Traefik to 2.4 and add resources
|
||
|
||
|
||
## 9.12.3  
|
||
|
||
**Release date:** 2020-12-31
|
||
|
||
* Revert API Upgrade
|
||
|
||
|
||
## 9.12.2  
|
||
|
||
**Release date:** 2020-12-31
|
||
|
||
* Bump Traefik to 2.3.6
|
||
|
||
|
||
## 9.12.1  
|
||
|
||
**Release date:** 2020-12-30
|
||
|
||
* Resolve #303, change CRD version from v1beta1 to v1
|
||
|
||
|
||
## 9.12.0  
|
||
|
||
**Release date:** 2020-12-30
|
||
|
||
* Implement support for DaemonSet
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 60a721d..50cab94 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -10,7 +10,9 @@ image:
|
||
#
|
||
deployment:
|
||
enabled: true
|
||
- # Number of pods of the deployment
|
||
+ # Can be either Deployment or DaemonSet
|
||
+ kind: Deployment
|
||
+ # Number of pods of the deployment (only applies when kind == Deployment)
|
||
replicas: 1
|
||
# Additional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
annotations: {}
|
||
```
|
||
|
||
## 9.11.0  
|
||
|
||
**Release date:** 2020-11-20
|
||
|
||
* add podLabels - custom labels
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index a187df7..60a721d 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -16,6 +16,8 @@ deployment:
|
||
annotations: {}
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
+ # Additional Pod labels (e.g. for filtering Pod by custom labels)
|
||
+ podLabels: {}
|
||
# Additional containers (e.g. for metric offloading sidecars)
|
||
additionalContainers: []
|
||
# https://docs.datadoghq.com/developers/dogstatsd/unix_socket/?tab=host
|
||
```
|
||
|
||
## 9.10.2  
|
||
|
||
**Release date:** 2020-11-20
|
||
|
||
* Bump Traefik to 2.3.3
|
||
|
||
|
||
## 9.10.1  
|
||
|
||
**Release date:** 2020-11-04
|
||
|
||
* Specify IngressClass resource when checking for cluster capability
|
||
|
||
|
||
## 9.10.0  
|
||
|
||
**Release date:** 2020-11-03
|
||
|
||
* Add list of watched provider namespaces
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e6b85ca..a187df7 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -88,8 +88,12 @@ rollingUpdate:
|
||
providers:
|
||
kubernetesCRD:
|
||
enabled: true
|
||
+ namespaces: []
|
||
+ # - "default"
|
||
kubernetesIngress:
|
||
enabled: true
|
||
+ namespaces: []
|
||
+ # - "default"
|
||
# IP used for Kubernetes Ingress endpoints
|
||
publishedService:
|
||
enabled: false
|
||
```
|
||
|
||
## 9.9.0  
|
||
|
||
**Release date:** 2020-11-03
|
||
|
||
* Add additionalVolumeMounts for traefik container
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 37dd151..e6b85ca 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -111,6 +111,12 @@ volumes: []
|
||
# mountPath: "/config"
|
||
# type: configMap
|
||
|
||
+# Additional volumeMounts to add to the Traefik container
|
||
+additionalVolumeMounts: []
|
||
+ # For instance when using a logshipper for access logs
|
||
+ # - name: traefik-logs
|
||
+ # mountPath: /var/log/traefik
|
||
+
|
||
# Logs
|
||
# https://docs.traefik.io/observability/logs/
|
||
logs:
|
||
```
|
||
|
||
## 9.8.4  
|
||
|
||
**Release date:** 2020-11-03
|
||
|
||
* fix: multiple ImagePullSecrets
|
||
|
||
|
||
## 9.8.3  
|
||
|
||
**Release date:** 2020-10-30
|
||
|
||
* Add imagePullSecrets
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 87f60c0..37dd151 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -42,6 +42,9 @@ deployment:
|
||
# mountPath: /data
|
||
# Custom pod DNS policy. Apply if `hostNetwork: true`
|
||
# dnsPolicy: ClusterFirstWithHostNet
|
||
+ # Additional imagePullSecrets
|
||
+ imagePullSecrets: []
|
||
+ # - name: myRegistryKeySecretName
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
```
|
||
|
||
## 9.8.2  
|
||
|
||
**Release date:** 2020-10-28
|
||
|
||
* Add chart repo to source
|
||
|
||
|
||
## 9.8.1  
|
||
|
||
**Release date:** 2020-10-23
|
||
|
||
* fix semver compare
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 4ca1f8f..87f60c0 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,8 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.3.1
|
||
+ # defaults to appVersion
|
||
+ tag: ""
|
||
pullPolicy: IfNotPresent
|
||
|
||
#
|
||
```
|
||
|
||
## 9.8.0  
|
||
|
||
**Release date:** 2020-10-20
|
||
|
||
* feat: Enable entrypoint tls config + TLSOption
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index eee3622..4ca1f8f 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -231,6 +231,31 @@ ports:
|
||
# The port protocol (TCP/UDP)
|
||
protocol: TCP
|
||
# nodePort: 32443
|
||
+ # Set TLS at the entrypoint
|
||
+ # https://doc.traefik.io/traefik/routing/entrypoints/#tls
|
||
+ tls:
|
||
+ enabled: false
|
||
+ # this is the name of a TLSOption definition
|
||
+ options: ""
|
||
+ certResolver: ""
|
||
+ domains: []
|
||
+ # - main: example.com
|
||
+ # sans:
|
||
+ # - foo.example.com
|
||
+ # - bar.example.com
|
||
+
|
||
+# TLS Options are created as TLSOption CRDs
|
||
+# https://doc.traefik.io/traefik/https/tls/#tls-options
|
||
+# Example:
|
||
+# tlsOptions:
|
||
+# default:
|
||
+# sniStrict: true
|
||
+# preferServerCipherSuites: true
|
||
+# foobar:
|
||
+# curvePreferences:
|
||
+# - CurveP521
|
||
+# - CurveP384
|
||
+tlsOptions: {}
|
||
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
# from.
|
||
```
|
||
|
||
## 9.7.0  
|
||
|
||
**Release date:** 2020-10-15
|
||
|
||
* Add a configuration option for an emptyDir as plugin storage
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index b7153a1..eee3622 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -54,10 +54,16 @@ ingressClass:
|
||
enabled: false
|
||
isDefaultClass: false
|
||
|
||
+# Activate Pilot integration
|
||
pilot:
|
||
enabled: false
|
||
token: ""
|
||
|
||
+# Enable experimental features
|
||
+experimental:
|
||
+ plugins:
|
||
+ enabled: false
|
||
+
|
||
# Create an IngressRoute for the dashboard
|
||
ingressRoute:
|
||
dashboard:
|
||
```
|
||
|
||
## 9.6.0  
|
||
|
||
**Release date:** 2020-10-15
|
||
|
||
* Add additional volumes for init and additional containers
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 9bac45e..b7153a1 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -17,6 +17,18 @@ deployment:
|
||
podAnnotations: {}
|
||
# Additional containers (e.g. for metric offloading sidecars)
|
||
additionalContainers: []
|
||
+ # https://docs.datadoghq.com/developers/dogstatsd/unix_socket/?tab=host
|
||
+ # - name: socat-proxy
|
||
+ # image: alpine/socat:1.0.5
|
||
+ # args: ["-s", "-u", "udp-recv:8125", "unix-sendto:/socket/socket"]
|
||
+ # volumeMounts:
|
||
+ # - name: dsdsocket
|
||
+ # mountPath: /socket
|
||
+ # Additional volumes available for use with initContainers and additionalContainers
|
||
+ additionalVolumes: []
|
||
+ # - name: dsdsocket
|
||
+ # hostPath:
|
||
+ # path: /var/run/statsd-exporter
|
||
# Additional initContainers (e.g. for setting file permission as shown below)
|
||
initContainers: []
|
||
# The "volume-permissions" init container is required if you run into permission issues.
|
||
```
|
||
|
||
## 9.5.2  
|
||
|
||
**Release date:** 2020-10-15
|
||
|
||
* Replace extensions with policy because of deprecation
|
||
|
||
|
||
## 9.5.1  
|
||
|
||
**Release date:** 2020-10-14
|
||
|
||
* Template custom volume name
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 5a8d8ea..9bac45e 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -76,7 +76,7 @@ providers:
|
||
# pathOverride: ""
|
||
|
||
#
|
||
-# Add volumes to the traefik pod.
|
||
+# Add volumes to the traefik pod. The volume name will be passed to tpl.
|
||
# This can be used to mount a cert pair or a configmap that holds a config.toml file.
|
||
# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
# additionalArguments:
|
||
@@ -85,7 +85,7 @@ volumes: []
|
||
# - name: public-cert
|
||
# mountPath: "/certs"
|
||
# type: secret
|
||
-# - name: configs
|
||
+# - name: '{{ printf "%s-configs" .Release.Name }}'
|
||
# mountPath: "/config"
|
||
# type: configMap
|
||
|
||
```
|
||
|
||
## 9.5.0  
|
||
|
||
**Release date:** 2020-10-02
|
||
|
||
* Create PodSecurityPolicy and RBAC when needed.
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 8c4d866..5a8d8ea 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -281,6 +281,10 @@ rbac:
|
||
# If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace
|
||
namespaced: false
|
||
|
||
+# Enable to create a PodSecurityPolicy and assign it to the Service Account via RoleBindin or ClusterRoleBinding
|
||
+podSecurityPolicy:
|
||
+ enabled: false
|
||
+
|
||
# The service account the pods will use to interact with the Kubernetes API
|
||
serviceAccount:
|
||
# If set, an existing service account is used
|
||
```
|
||
|
||
## 9.4.3  
|
||
|
||
**Release date:** 2020-10-02
|
||
|
||
* Update traefik to v2.3.1
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 3df75a4..8c4d866 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.3.0
|
||
+ tag: 2.3.1
|
||
pullPolicy: IfNotPresent
|
||
|
||
#
|
||
```
|
||
|
||
## 9.4.2  
|
||
|
||
**Release date:** 2020-10-02
|
||
|
||
* Add Artifact Hub repository metadata file
|
||
|
||
|
||
## 9.4.1  
|
||
|
||
**Release date:** 2020-10-01
|
||
|
||
* Fix broken chart icon url
|
||
|
||
|
||
## 9.4.0  
|
||
|
||
**Release date:** 2020-10-01
|
||
|
||
* Allow to specify custom labels on Service
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index a6175ff..3df75a4 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -221,6 +221,8 @@ service:
|
||
type: LoadBalancer
|
||
# Additional annotations (e.g. for cloud provider specific config)
|
||
annotations: {}
|
||
+ # Additional service labels (e.g. for filtering Service by custom labels)
|
||
+ labels: {}
|
||
# Additional entries here will be added to the service spec. Cannot contains
|
||
# type, selector or ports entries.
|
||
spec: {}
|
||
```
|
||
|
||
## 9.3.0  
|
||
|
||
**Release date:** 2020-09-24
|
||
|
||
* Release Traefik 2.3
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index fba955d..a6175ff 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.2.8
|
||
+ tag: 2.3.0
|
||
pullPolicy: IfNotPresent
|
||
|
||
#
|
||
@@ -36,6 +36,16 @@ podDisruptionBudget:
|
||
# maxUnavailable: 1
|
||
# minAvailable: 0
|
||
|
||
+# Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x
|
||
+ingressClass:
|
||
+ # true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
||
+ enabled: false
|
||
+ isDefaultClass: false
|
||
+
|
||
+pilot:
|
||
+ enabled: false
|
||
+ token: ""
|
||
+
|
||
# Create an IngressRoute for the dashboard
|
||
ingressRoute:
|
||
dashboard:
|
||
```
|
||
|
||
## 9.2.1  
|
||
|
||
**Release date:** 2020-09-18
|
||
|
||
* Add new helm url
|
||
|
||
|
||
## 9.2.0  
|
||
|
||
**Release date:** 2020-09-16
|
||
|
||
* chore: move to new organization.
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 9f52c39..fba955d 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -20,7 +20,7 @@ deployment:
|
||
# Additional initContainers (e.g. for setting file permission as shown below)
|
||
initContainers: []
|
||
# The "volume-permissions" init container is required if you run into permission issues.
|
||
- # Related issue: https://github.com/containous/traefik/issues/6972
|
||
+ # Related issue: https://github.com/traefik/traefik/issues/6972
|
||
# - name: volume-permissions
|
||
# image: busybox:1.31.1
|
||
# command: ["sh", "-c", "chmod -Rv 600 /data/*"]
|
||
```
|
||
|
||
## 9.1.1  
|
||
|
||
**Release date:** 2020-09-04
|
||
|
||
* Update reference to using kubectl proxy to kubectl port-forward
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7b74a39..9f52c39 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -175,7 +175,7 @@ ports:
|
||
#
|
||
# You SHOULD NOT expose the traefik port on production deployments.
|
||
# If you want to access it from outside of your cluster,
|
||
- # use `kubectl proxy` or create a secure ingress
|
||
+ # use `kubectl port-forward` or create a secure ingress
|
||
expose: false
|
||
# The exposed port for this service
|
||
exposedPort: 9000
|
||
```
|
||
|
||
## 9.1.0  
|
||
|
||
**Release date:** 2020-08-24
|
||
|
||
* PublishedService option
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e161a14..7b74a39 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -58,6 +58,12 @@ providers:
|
||
enabled: true
|
||
kubernetesIngress:
|
||
enabled: true
|
||
+ # IP used for Kubernetes Ingress endpoints
|
||
+ publishedService:
|
||
+ enabled: false
|
||
+ # Published Kubernetes Service to copy status from. Format: namespace/servicename
|
||
+ # By default this Traefik service
|
||
+ # pathOverride: ""
|
||
|
||
#
|
||
# Add volumes to the traefik pod.
|
||
```
|
||
|
||
## 9.0.0  
|
||
|
||
**Release date:** 2020-08-21
|
||
|
||
* feat: Move Chart apiVersion: v2
|
||
|
||
|
||
## 8.13.3   
|
||
|
||
**Release date:** 2020-08-21
|
||
|
||
* bug: Check for port config
|
||
|
||
|
||
## 8.13.2   
|
||
|
||
**Release date:** 2020-08-19
|
||
|
||
* Fix log level configuration
|
||
|
||
|
||
## 8.13.1   
|
||
|
||
**Release date:** 2020-08-18
|
||
|
||
* Dont redirect to websecure by default
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 67276f7..e161a14 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -188,7 +188,7 @@ ports:
|
||
# Port Redirections
|
||
# Added in 2.2, you can make permanent redirects via entrypoints.
|
||
# https://docs.traefik.io/routing/entrypoints/#redirection
|
||
- redirectTo: websecure
|
||
+ # redirectTo: websecure
|
||
websecure:
|
||
port: 8443
|
||
# hostPort: 8443
|
||
```
|
||
|
||
## 8.13.0   
|
||
|
||
**Release date:** 2020-08-18
|
||
|
||
* Add logging, and http redirect config
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 6f79580..67276f7 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -73,6 +73,48 @@ volumes: []
|
||
# mountPath: "/config"
|
||
# type: configMap
|
||
|
||
+# Logs
|
||
+# https://docs.traefik.io/observability/logs/
|
||
+logs:
|
||
+ # Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on).
|
||
+ general:
|
||
+ # By default, the logs use a text format (common), but you can
|
||
+ # also ask for the json format in the format option
|
||
+ # format: json
|
||
+ # By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO.
|
||
+ level: ERROR
|
||
+ access:
|
||
+ # To enable access logs
|
||
+ enabled: false
|
||
+ # By default, logs are written using the Common Log Format (CLF).
|
||
+ # To write logs in JSON, use json in the format option.
|
||
+ # If the given format is unsupported, the default (CLF) is used instead.
|
||
+ # format: json
|
||
+ # To write the logs in an asynchronous fashion, specify a bufferingSize option.
|
||
+ # This option represents the number of log lines Traefik will keep in memory before writing
|
||
+ # them to the selected output. In some cases, this option can greatly help performances.
|
||
+ # bufferingSize: 100
|
||
+ # Filtering https://docs.traefik.io/observability/access-logs/#filtering
|
||
+ filters: {}
|
||
+ # statuscodes: "200,300-302"
|
||
+ # retryattempts: true
|
||
+ # minduration: 10ms
|
||
+ # Fields
|
||
+ # https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers
|
||
+ fields:
|
||
+ general:
|
||
+ defaultmode: keep
|
||
+ names: {}
|
||
+ # Examples:
|
||
+ # ClientUsername: drop
|
||
+ headers:
|
||
+ defaultmode: drop
|
||
+ names: {}
|
||
+ # Examples:
|
||
+ # User-Agent: redact
|
||
+ # Authorization: drop
|
||
+ # Content-Type: keep
|
||
+
|
||
globalArguments:
|
||
- "--global.checknewversion"
|
||
- "--global.sendanonymoususage"
|
||
@@ -143,6 +185,10 @@ ports:
|
||
# Use nodeport if set. This is useful if you have configured Traefik in a
|
||
# LoadBalancer
|
||
# nodePort: 32080
|
||
+ # Port Redirections
|
||
+ # Added in 2.2, you can make permanent redirects via entrypoints.
|
||
+ # https://docs.traefik.io/routing/entrypoints/#redirection
|
||
+ redirectTo: websecure
|
||
websecure:
|
||
port: 8443
|
||
# hostPort: 8443
|
||
```
|
||
|
||
## 8.12.0   
|
||
|
||
**Release date:** 2020-08-14
|
||
|
||
* Add image pull policy
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 10b3949..6f79580 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -2,6 +2,7 @@
|
||
image:
|
||
name: traefik
|
||
tag: 2.2.8
|
||
+ pullPolicy: IfNotPresent
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 8.11.0   
|
||
|
||
**Release date:** 2020-08-12
|
||
|
||
* Add dns policy option
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 80ddaaa..10b3949 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -26,6 +26,8 @@ deployment:
|
||
# volumeMounts:
|
||
# - name: data
|
||
# mountPath: /data
|
||
+ # Custom pod DNS policy. Apply if `hostNetwork: true`
|
||
+ # dnsPolicy: ClusterFirstWithHostNet
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
```
|
||
|
||
## 8.10.0   
|
||
|
||
**Release date:** 2020-08-11
|
||
|
||
* Add hostIp to port configuration
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 936ab92..80ddaaa 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -112,6 +112,12 @@ ports:
|
||
port: 9000
|
||
# Use hostPort if set.
|
||
# hostPort: 9000
|
||
+ #
|
||
+ # Use hostIP if set. If not set, Kubernetes will default to 0.0.0.0, which
|
||
+ # means it's listening on all your interfaces and all your IPs. You may want
|
||
+ # to set this value if you need traefik to listen on specific interface
|
||
+ # only.
|
||
+ # hostIP: 192.168.100.10
|
||
|
||
# Defines whether the port is exposed if service.type is LoadBalancer or
|
||
# NodePort.
|
||
```
|
||
|
||
## 8.9.2   
|
||
|
||
**Release date:** 2020-08-10
|
||
|
||
* Bump Traefik to 2.2.8
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 42ee893..936ab92 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.2.5
|
||
+ tag: 2.2.8
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 8.9.1   
|
||
|
||
**Release date:** 2020-07-15
|
||
|
||
* Upgrade traefik version
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index a7fb668..42ee893 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.2.1
|
||
+ tag: 2.2.5
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 8.9.0   
|
||
|
||
**Release date:** 2020-07-08
|
||
|
||
* run init container to set proper permissions on volume
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 62e3a77..a7fb668 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -16,6 +16,16 @@ deployment:
|
||
podAnnotations: {}
|
||
# Additional containers (e.g. for metric offloading sidecars)
|
||
additionalContainers: []
|
||
+ # Additional initContainers (e.g. for setting file permission as shown below)
|
||
+ initContainers: []
|
||
+ # The "volume-permissions" init container is required if you run into permission issues.
|
||
+ # Related issue: https://github.com/containous/traefik/issues/6972
|
||
+ # - name: volume-permissions
|
||
+ # image: busybox:1.31.1
|
||
+ # command: ["sh", "-c", "chmod -Rv 600 /data/*"]
|
||
+ # volumeMounts:
|
||
+ # - name: data
|
||
+ # mountPath: /data
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
```
|
||
|
||
## 8.8.1   
|
||
|
||
**Release date:** 2020-07-02
|
||
|
||
* Additional container fix
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 85df29c..62e3a77 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -15,7 +15,7 @@ deployment:
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
# Additional containers (e.g. for metric offloading sidecars)
|
||
- additionalContainers: {}
|
||
+ additionalContainers: []
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
```
|
||
|
||
## 8.8.0   
|
||
|
||
**Release date:** 2020-07-01
|
||
|
||
* added additionalContainers option to chart
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 6a9dfd8..85df29c 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -14,6 +14,8 @@ deployment:
|
||
annotations: {}
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
+ # Additional containers (e.g. for metric offloading sidecars)
|
||
+ additionalContainers: {}
|
||
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
```
|
||
|
||
## 8.7.2   
|
||
|
||
**Release date:** 2020-06-30
|
||
|
||
* Update image
|
||
|
||
|
||
## 8.7.1   
|
||
|
||
**Release date:** 2020-06-26
|
||
|
||
* Update values.yaml
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 05f9eab..6a9dfd8 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -196,7 +196,7 @@ rbac:
|
||
# If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace
|
||
namespaced: false
|
||
|
||
-# The service account the pods will use to interact with the Kubernates API
|
||
+# The service account the pods will use to interact with the Kubernetes API
|
||
serviceAccount:
|
||
# If set, an existing service account is used
|
||
# If not set, a service account is created automatically using the fullname template
|
||
```
|
||
|
||
## 8.7.0   
|
||
|
||
**Release date:** 2020-06-23
|
||
|
||
* Add option to disable providers
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 102ae00..05f9eab 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -34,6 +34,16 @@ rollingUpdate:
|
||
maxUnavailable: 1
|
||
maxSurge: 1
|
||
|
||
+
|
||
+#
|
||
+# Configure providers
|
||
+#
|
||
+providers:
|
||
+ kubernetesCRD:
|
||
+ enabled: true
|
||
+ kubernetesIngress:
|
||
+ enabled: true
|
||
+
|
||
#
|
||
# Add volumes to the traefik pod.
|
||
# This can be used to mount a cert pair or a configmap that holds a config.toml file.
|
||
```
|
||
|
||
## 8.6.1   
|
||
|
||
**Release date:** 2020-06-18
|
||
|
||
* Fix read-only /tmp
|
||
|
||
|
||
## 8.6.0   
|
||
|
||
**Release date:** 2020-06-17
|
||
|
||
* Add existing PVC support(#158)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index b2f4fc3..102ae00 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -164,6 +164,7 @@ autoscaling:
|
||
# It will persist TLS certificates.
|
||
persistence:
|
||
enabled: false
|
||
+# existingClaim: ""
|
||
accessMode: ReadWriteOnce
|
||
size: 128Mi
|
||
# storageClass: ""
|
||
```
|
||
|
||
## 8.5.0   
|
||
|
||
**Release date:** 2020-06-16
|
||
|
||
* UDP support
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 9a9b668..b2f4fc3 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -100,11 +100,15 @@ ports:
|
||
expose: false
|
||
# The exposed port for this service
|
||
exposedPort: 9000
|
||
+ # The port protocol (TCP/UDP)
|
||
+ protocol: TCP
|
||
web:
|
||
port: 8000
|
||
# hostPort: 8000
|
||
expose: true
|
||
exposedPort: 80
|
||
+ # The port protocol (TCP/UDP)
|
||
+ protocol: TCP
|
||
# Use nodeport if set. This is useful if you have configured Traefik in a
|
||
# LoadBalancer
|
||
# nodePort: 32080
|
||
@@ -113,6 +117,8 @@ ports:
|
||
# hostPort: 8443
|
||
expose: true
|
||
exposedPort: 443
|
||
+ # The port protocol (TCP/UDP)
|
||
+ protocol: TCP
|
||
# nodePort: 32443
|
||
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
```
|
||
|
||
## 8.4.1   
|
||
|
||
**Release date:** 2020-06-10
|
||
|
||
* Fix PDB with minAvailable set
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e812b98..9a9b668 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -18,7 +18,7 @@ deployment:
|
||
# Pod disruption budget
|
||
podDisruptionBudget:
|
||
enabled: false
|
||
- maxUnavailable: 1
|
||
+ # maxUnavailable: 1
|
||
# minAvailable: 0
|
||
|
||
# Create an IngressRoute for the dashboard
|
||
```
|
||
|
||
## 8.4.0   
|
||
|
||
**Release date:** 2020-06-09
|
||
|
||
* Add pod disruption budget (#192)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 5f44e5c..e812b98 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -15,6 +15,12 @@ deployment:
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
|
||
+# Pod disruption budget
|
||
+podDisruptionBudget:
|
||
+ enabled: false
|
||
+ maxUnavailable: 1
|
||
+ # minAvailable: 0
|
||
+
|
||
# Create an IngressRoute for the dashboard
|
||
ingressRoute:
|
||
dashboard:
|
||
```
|
||
|
||
## 8.3.0   
|
||
|
||
**Release date:** 2020-06-08
|
||
|
||
* Add option to disable RBAC and ServiceAccount
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 96bba18..5f44e5c 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -165,6 +165,20 @@ persistence:
|
||
# affinity is left as default.
|
||
hostNetwork: false
|
||
|
||
+# Whether Role Based Access Control objects like roles and rolebindings should be created
|
||
+rbac:
|
||
+ enabled: true
|
||
+
|
||
+ # If set to false, installs ClusterRole and ClusterRoleBinding so Traefik can be used across namespaces.
|
||
+ # If set to true, installs namespace-specific Role and RoleBinding and requires provider configuration be set to that same namespace
|
||
+ namespaced: false
|
||
+
|
||
+# The service account the pods will use to interact with the Kubernates API
|
||
+serviceAccount:
|
||
+ # If set, an existing service account is used
|
||
+ # If not set, a service account is created automatically using the fullname template
|
||
+ name: ""
|
||
+
|
||
# Additional serviceAccount annotations (e.g. for oidc authentication)
|
||
serviceAccountAnnotations: {}
|
||
|
||
```
|
||
|
||
## 8.2.1   
|
||
|
||
**Release date:** 2020-05-25
|
||
|
||
* Remove suggested providers.kubernetesingress value
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e35bdf9..96bba18 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -50,9 +50,9 @@ globalArguments:
|
||
# Configure Traefik static configuration
|
||
# Additional arguments to be passed at Traefik's binary
|
||
# All available options available on https://docs.traefik.io/reference/static-configuration/cli/
|
||
-## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--log.level=DEBUG}"`
|
||
+## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"`
|
||
additionalArguments: []
|
||
-# - "--providers.kubernetesingress"
|
||
+# - "--providers.kubernetesingress.ingressclass=traefik-internal"
|
||
# - "--log.level=DEBUG"
|
||
|
||
# Environment variables to be passed to Traefik's binary
|
||
```
|
||
|
||
## 8.2.0   
|
||
|
||
**Release date:** 2020-05-18
|
||
|
||
* Add kubernetes ingress by default
|
||
|
||
|
||
## 8.1.5   
|
||
|
||
**Release date:** 2020-05-18
|
||
|
||
* Fix example log params in values.yml
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index abe2334..e35bdf9 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -50,10 +50,10 @@ globalArguments:
|
||
# Configure Traefik static configuration
|
||
# Additional arguments to be passed at Traefik's binary
|
||
# All available options available on https://docs.traefik.io/reference/static-configuration/cli/
|
||
-## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--logs.level=DEBUG}"`
|
||
+## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--log.level=DEBUG}"`
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
-# - "--logs.level=DEBUG"
|
||
+# - "--log.level=DEBUG"
|
||
|
||
# Environment variables to be passed to Traefik's binary
|
||
env: []
|
||
```
|
||
|
||
## 8.1.4   
|
||
|
||
**Release date:** 2020-04-30
|
||
|
||
* Update Traefik to v2.2.1
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 57cc7e1..abe2334 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.2.0
|
||
+ tag: 2.2.1
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 8.1.3   
|
||
|
||
**Release date:** 2020-04-29
|
||
|
||
* Clarify additionnal arguments log
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d639f72..57cc7e1 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -50,9 +50,10 @@ globalArguments:
|
||
# Configure Traefik static configuration
|
||
# Additional arguments to be passed at Traefik's binary
|
||
# All available options available on https://docs.traefik.io/reference/static-configuration/cli/
|
||
-## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--global.checknewversion=true}"`
|
||
+## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--logs.level=DEBUG}"`
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
+# - "--logs.level=DEBUG"
|
||
|
||
# Environment variables to be passed to Traefik's binary
|
||
env: []
|
||
```
|
||
|
||
## 8.1.2   
|
||
|
||
**Release date:** 2020-04-23
|
||
|
||
* Remove invalid flags. (#161)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 0e7aaef..d639f72 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -34,8 +34,6 @@ rollingUpdate:
|
||
# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
# additionalArguments:
|
||
# - "--providers.file.filename=/config/dynamic.toml"
|
||
-# - "--tls.certificates.certFile=/certs/tls.crt"
|
||
-# - "--tls.certificates.keyFile=/certs/tls.key"
|
||
volumes: []
|
||
# - name: public-cert
|
||
# mountPath: "/certs"
|
||
```
|
||
|
||
## 8.1.1   
|
||
|
||
**Release date:** 2020-04-23
|
||
|
||
* clarify project philosophy and guidelines
|
||
|
||
|
||
## 8.1.0   
|
||
|
||
**Release date:** 2020-04-22
|
||
|
||
* Add priorityClassName & securityContext
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index d55a40a..0e7aaef 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -191,3 +191,20 @@ affinity: {}
|
||
# topologyKey: failure-domain.beta.kubernetes.io/zone
|
||
nodeSelector: {}
|
||
tolerations: []
|
||
+
|
||
+# Pods can have priority.
|
||
+# Priority indicates the importance of a Pod relative to other Pods.
|
||
+priorityClassName: ""
|
||
+
|
||
+# Set the container security context
|
||
+# To run the container with ports below 1024 this will need to be adjust to run as root
|
||
+securityContext:
|
||
+ capabilities:
|
||
+ drop: [ALL]
|
||
+ readOnlyRootFilesystem: true
|
||
+ runAsGroup: 65532
|
||
+ runAsNonRoot: true
|
||
+ runAsUser: 65532
|
||
+
|
||
+podSecurityContext:
|
||
+ fsGroup: 65532
|
||
```
|
||
|
||
## 8.0.4   
|
||
|
||
**Release date:** 2020-04-20
|
||
|
||
* Possibility to bind environment variables via envFrom
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7f8092e..d55a40a 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -71,6 +71,12 @@ env: []
|
||
# name: secret-name
|
||
# key: secret-key
|
||
|
||
+envFrom: []
|
||
+# - configMapRef:
|
||
+# name: config-map-name
|
||
+# - secretRef:
|
||
+# name: secret-name
|
||
+
|
||
# Configure ports
|
||
ports:
|
||
# The name of this one can't be changed as it is used for the readiness and
|
||
```
|
||
|
||
## 8.0.3   
|
||
|
||
**Release date:** 2020-04-15
|
||
|
||
* Add support for data volume subPath. (#147)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 152339b..7f8092e 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -152,6 +152,7 @@ persistence:
|
||
# storageClass: ""
|
||
path: /data
|
||
annotations: {}
|
||
+ # subPath: "" # only mount a subpath of the Volume into the pod
|
||
|
||
# If hostNetwork is true, runs traefik in the host network namespace
|
||
# To prevent unschedulabel pods due to port collisions, if hostNetwork=true
|
||
```
|
||
|
||
## 8.0.2   
|
||
|
||
**Release date:** 2020-04-10
|
||
|
||
* Ability to add custom labels to dashboard's IngressRoute
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 5d294b7..152339b 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -21,6 +21,8 @@ ingressRoute:
|
||
enabled: true
|
||
# Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
|
||
annotations: {}
|
||
+ # Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels)
|
||
+ labels: {}
|
||
|
||
rollingUpdate:
|
||
maxUnavailable: 1
|
||
```
|
||
|
||
## 8.0.1   
|
||
|
||
**Release date:** 2020-04-10
|
||
|
||
* rbac does not need "pods" per documentation
|
||
|
||
|
||
## 8.0.0   
|
||
|
||
**Release date:** 2020-04-07
|
||
|
||
* follow helm best practices
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index e61a9fd..5d294b7 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -10,7 +10,7 @@ deployment:
|
||
enabled: true
|
||
# Number of pods of the deployment
|
||
replicas: 1
|
||
- # Addtional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
+ # Additional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
annotations: {}
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
@@ -19,7 +19,7 @@ deployment:
|
||
ingressRoute:
|
||
dashboard:
|
||
enabled: true
|
||
- # Addtional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
|
||
+ # Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
|
||
annotations: {}
|
||
|
||
rollingUpdate:
|
||
```
|
||
|
||
## 7.2.1   
|
||
|
||
**Release date:** 2020-04-07
|
||
|
||
* add annotations to ingressRoute
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 15d1c25..e61a9fd 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -19,6 +19,8 @@ deployment:
|
||
ingressRoute:
|
||
dashboard:
|
||
enabled: true
|
||
+ # Addtional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
|
||
+ annotations: {}
|
||
|
||
rollingUpdate:
|
||
maxUnavailable: 1
|
||
```
|
||
|
||
## 7.2.0   
|
||
|
||
**Release date:** 2020-04-03
|
||
|
||
* Add support for helm 2
|
||
|
||
|
||
## 7.1.0  
|
||
|
||
**Release date:** 2020-03-31
|
||
|
||
* Add support for externalIPs
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 6d6d13f..15d1c25 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -116,6 +116,8 @@ service:
|
||
loadBalancerSourceRanges: []
|
||
# - 192.168.0.1/32
|
||
# - 172.16.0.0/16
|
||
+ externalIPs: []
|
||
+ # - 1.2.3.4
|
||
|
||
## Create HorizontalPodAutoscaler object.
|
||
##
|
||
```
|
||
|
||
## 7.0.0  
|
||
|
||
**Release date:** 2020-03-27
|
||
|
||
* Remove secretsEnv value key
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 1ac720d..6d6d13f 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -52,18 +52,20 @@ globalArguments:
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
|
||
-# Secret to be set as environment variables to be passed to Traefik's binary
|
||
-secretEnv: []
|
||
- # - name: SOME_VAR
|
||
- # secretName: my-secret-name
|
||
- # secretKey: my-secret-key
|
||
-
|
||
# Environment variables to be passed to Traefik's binary
|
||
env: []
|
||
- # - name: SOME_VAR
|
||
- # value: some-var-value
|
||
- # - name: SOME_OTHER_VAR
|
||
- # value: some-other-var-value
|
||
+# - name: SOME_VAR
|
||
+# value: some-var-value
|
||
+# - name: SOME_VAR_FROM_CONFIG_MAP
|
||
+# valueFrom:
|
||
+# configMapRef:
|
||
+# name: configmap-name
|
||
+# key: config-key
|
||
+# - name: SOME_SECRET
|
||
+# valueFrom:
|
||
+# secretKeyRef:
|
||
+# name: secret-name
|
||
+# key: secret-key
|
||
|
||
# Configure ports
|
||
ports:
|
||
```
|
||
|
||
## 6.4.0  
|
||
|
||
**Release date:** 2020-03-27
|
||
|
||
* Add ability to set serviceAccount annotations
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 85abe42..1ac720d 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -151,6 +151,9 @@ persistence:
|
||
# affinity is left as default.
|
||
hostNetwork: false
|
||
|
||
+# Additional serviceAccount annotations (e.g. for oidc authentication)
|
||
+serviceAccountAnnotations: {}
|
||
+
|
||
resources: {}
|
||
# requests:
|
||
# cpu: "100m"
|
||
```
|
||
|
||
## 6.3.0  
|
||
|
||
**Release date:** 2020-03-27
|
||
|
||
* hpa
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 2f5d132..85abe42 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -115,6 +115,22 @@ service:
|
||
# - 192.168.0.1/32
|
||
# - 172.16.0.0/16
|
||
|
||
+## Create HorizontalPodAutoscaler object.
|
||
+##
|
||
+autoscaling:
|
||
+ enabled: false
|
||
+# minReplicas: 1
|
||
+# maxReplicas: 10
|
||
+# metrics:
|
||
+# - type: Resource
|
||
+# resource:
|
||
+# name: cpu
|
||
+# targetAverageUtilization: 60
|
||
+# - type: Resource
|
||
+# resource:
|
||
+# name: memory
|
||
+# targetAverageUtilization: 60
|
||
+
|
||
# Enable persistence using Persistent Volume Claims
|
||
# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||
# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
```
|
||
|
||
## 6.2.0  
|
||
|
||
**Release date:** 2020-03-26
|
||
|
||
* Update to v2.2 (#96)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ebd2fde..2f5d132 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.1.8
|
||
+ tag: 2.2.0
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 6.1.2  
|
||
|
||
**Release date:** 2020-03-20
|
||
|
||
* Upgrade traefik version
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 65c7665..ebd2fde 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.1.4
|
||
+ tag: 2.1.8
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 6.1.1  
|
||
|
||
**Release date:** 2020-03-20
|
||
|
||
* Upgrade traefik version
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 89c7ac1..65c7665 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.1.3
|
||
+ tag: 2.1.4
|
||
|
||
#
|
||
# Configure the deployment
|
||
```
|
||
|
||
## 6.1.0  
|
||
|
||
**Release date:** 2020-03-20
|
||
|
||
* Add ability to add annotations to deployment
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 8d66111..89c7ac1 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -10,6 +10,8 @@ deployment:
|
||
enabled: true
|
||
# Number of pods of the deployment
|
||
replicas: 1
|
||
+ # Addtional deployment annotations (e.g. for jaeger-operator sidecar injection)
|
||
+ annotations: {}
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
|
||
```
|
||
|
||
## 6.0.2  
|
||
|
||
**Release date:** 2020-03-16
|
||
|
||
* Correct storage class key name
|
||
|
||
|
||
## 6.0.1  
|
||
|
||
**Release date:** 2020-03-16
|
||
|
||
* Change default values of arrays from objects to actual arrays
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 490b2b6..8d66111 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -51,13 +51,13 @@ additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
|
||
# Secret to be set as environment variables to be passed to Traefik's binary
|
||
-secretEnv: {}
|
||
+secretEnv: []
|
||
# - name: SOME_VAR
|
||
# secretName: my-secret-name
|
||
# secretKey: my-secret-key
|
||
|
||
# Environment variables to be passed to Traefik's binary
|
||
-env: {}
|
||
+env: []
|
||
# - name: SOME_VAR
|
||
# value: some-var-value
|
||
# - name: SOME_OTHER_VAR
|
||
@@ -109,7 +109,7 @@ service:
|
||
# externalTrafficPolicy: Cluster
|
||
# loadBalancerIP: "1.2.3.4"
|
||
# clusterIP: "2.3.4.5"
|
||
- loadBalancerSourceRanges: {}
|
||
+ loadBalancerSourceRanges: []
|
||
# - 192.168.0.1/32
|
||
# - 172.16.0.0/16
|
||
|
||
```
|
||
|
||
## 6.0.0  
|
||
|
||
**Release date:** 2020-03-15
|
||
|
||
* Cleanup
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7aebefe..490b2b6 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -18,15 +18,10 @@ ingressRoute:
|
||
dashboard:
|
||
enabled: true
|
||
|
||
-additional:
|
||
- checkNewVersion: true
|
||
- sendAnonymousUsage: true
|
||
-
|
||
rollingUpdate:
|
||
maxUnavailable: 1
|
||
maxSurge: 1
|
||
|
||
-
|
||
#
|
||
# Add volumes to the traefik pod.
|
||
# This can be used to mount a cert pair or a configmap that holds a config.toml file.
|
||
@@ -43,9 +38,14 @@ volumes: []
|
||
# mountPath: "/config"
|
||
# type: configMap
|
||
|
||
+globalArguments:
|
||
+ - "--global.checknewversion"
|
||
+ - "--global.sendanonymoususage"
|
||
+
|
||
#
|
||
-# Configure Traefik entry points
|
||
+# Configure Traefik static configuration
|
||
# Additional arguments to be passed at Traefik's binary
|
||
+# All available options available on https://docs.traefik.io/reference/static-configuration/cli/
|
||
## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--global.checknewversion=true}"`
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
@@ -63,7 +63,7 @@ env: {}
|
||
# - name: SOME_OTHER_VAR
|
||
# value: some-other-var-value
|
||
|
||
-#
|
||
+# Configure ports
|
||
ports:
|
||
# The name of this one can't be changed as it is used for the readiness and
|
||
# liveness probes, but you can adjust its config to your liking
|
||
@@ -94,7 +94,7 @@ ports:
|
||
# hostPort: 8443
|
||
expose: true
|
||
exposedPort: 443
|
||
- # nodePort: 32443
|
||
+ # nodePort: 32443
|
||
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
# from.
|
||
@@ -113,9 +113,6 @@ service:
|
||
# - 192.168.0.1/32
|
||
# - 172.16.0.0/16
|
||
|
||
-logs:
|
||
- loglevel: WARN
|
||
-
|
||
# Enable persistence using Persistent Volume Claims
|
||
# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||
# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
```
|
||
|
||
## 5.6.0  
|
||
|
||
**Release date:** 2020-03-12
|
||
|
||
* Add field enabled for resources
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 38bb263..7aebefe 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -7,11 +7,17 @@ image:
|
||
# Configure the deployment
|
||
#
|
||
deployment:
|
||
+ enabled: true
|
||
# Number of pods of the deployment
|
||
replicas: 1
|
||
# Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
podAnnotations: {}
|
||
|
||
+# Create an IngressRoute for the dashboard
|
||
+ingressRoute:
|
||
+ dashboard:
|
||
+ enabled: true
|
||
+
|
||
additional:
|
||
checkNewVersion: true
|
||
sendAnonymousUsage: true
|
||
@@ -93,6 +99,7 @@ ports:
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
# from.
|
||
service:
|
||
+ enabled: true
|
||
type: LoadBalancer
|
||
# Additional annotations (e.g. for cloud provider specific config)
|
||
annotations: {}
|
||
```
|
||
|
||
## 5.5.0  
|
||
|
||
**Release date:** 2020-03-12
|
||
|
||
* expose hostnetwork option
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ecb2833..38bb263 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -123,6 +123,12 @@ persistence:
|
||
path: /data
|
||
annotations: {}
|
||
|
||
+# If hostNetwork is true, runs traefik in the host network namespace
|
||
+# To prevent unschedulabel pods due to port collisions, if hostNetwork=true
|
||
+# and replicas>1, a pod anti-affinity is recommended and will be set if the
|
||
+# affinity is left as default.
|
||
+hostNetwork: false
|
||
+
|
||
resources: {}
|
||
# requests:
|
||
# cpu: "100m"
|
||
@@ -131,5 +137,17 @@ resources: {}
|
||
# cpu: "300m"
|
||
# memory: "150Mi"
|
||
affinity: {}
|
||
+# # This example pod anti-affinity forces the scheduler to put traefik pods
|
||
+# # on nodes where no other traefik pods are scheduled.
|
||
+# # It should be used when hostNetwork: true to prevent port conflicts
|
||
+# podAntiAffinity:
|
||
+# requiredDuringSchedulingIgnoredDuringExecution:
|
||
+# - labelSelector:
|
||
+# matchExpressions:
|
||
+# - key: app
|
||
+# operator: In
|
||
+# values:
|
||
+# - {{ template "traefik.name" . }}
|
||
+# topologyKey: failure-domain.beta.kubernetes.io/zone
|
||
nodeSelector: {}
|
||
tolerations: []
|
||
```
|
||
|
||
## 5.4.0  
|
||
|
||
**Release date:** 2020-03-12
|
||
|
||
* Add support for hostport
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ec1d619..ecb2833 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -63,6 +63,9 @@ ports:
|
||
# liveness probes, but you can adjust its config to your liking
|
||
traefik:
|
||
port: 9000
|
||
+ # Use hostPort if set.
|
||
+ # hostPort: 9000
|
||
+
|
||
# Defines whether the port is exposed if service.type is LoadBalancer or
|
||
# NodePort.
|
||
#
|
||
@@ -74,6 +77,7 @@ ports:
|
||
exposedPort: 9000
|
||
web:
|
||
port: 8000
|
||
+ # hostPort: 8000
|
||
expose: true
|
||
exposedPort: 80
|
||
# Use nodeport if set. This is useful if you have configured Traefik in a
|
||
@@ -81,6 +85,7 @@ ports:
|
||
# nodePort: 32080
|
||
websecure:
|
||
port: 8443
|
||
+ # hostPort: 8443
|
||
expose: true
|
||
exposedPort: 443
|
||
# nodePort: 32443
|
||
```
|
||
|
||
## 5.3.3  
|
||
|
||
**Release date:** 2020-03-12
|
||
|
||
* Fix replica check
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 7f31548..ec1d619 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -40,7 +40,7 @@ volumes: []
|
||
#
|
||
# Configure Traefik entry points
|
||
# Additional arguments to be passed at Traefik's binary
|
||
-## Use curly braces to pass values: `helm install --set="{--providers.kubernetesingress,--global.checknewversion=true}" ."
|
||
+## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress,--global.checknewversion=true}"`
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
|
||
```
|
||
|
||
## 5.3.2  
|
||
|
||
**Release date:** 2020-03-11
|
||
|
||
* Fixed typo in README
|
||
|
||
|
||
## 5.3.1  
|
||
|
||
**Release date:** 2020-03-11
|
||
|
||
* Production ready
|
||
|
||
|
||
## 5.3.0  
|
||
|
||
**Release date:** 2020-03-11
|
||
|
||
* Not authorise acme if replica > 1
|
||
|
||
|
||
## 5.2.1  
|
||
|
||
**Release date:** 2020-03-11
|
||
|
||
* Fix volume mount
|
||
|
||
|
||
## 5.2.0  
|
||
|
||
**Release date:** 2020-03-11
|
||
|
||
* Add secret as env var
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index ccea845..7f31548 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -44,12 +44,18 @@ volumes: []
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
|
||
+# Secret to be set as environment variables to be passed to Traefik's binary
|
||
+secretEnv: {}
|
||
+ # - name: SOME_VAR
|
||
+ # secretName: my-secret-name
|
||
+ # secretKey: my-secret-key
|
||
+
|
||
# Environment variables to be passed to Traefik's binary
|
||
env: {}
|
||
-# - name: SOME_VAR
|
||
-# value: some-var-value
|
||
-# - name: SOME_OTHER_VAR
|
||
-# value: some-other-var-value
|
||
+ # - name: SOME_VAR
|
||
+ # value: some-var-value
|
||
+ # - name: SOME_OTHER_VAR
|
||
+ # value: some-other-var-value
|
||
|
||
#
|
||
ports:
|
||
```
|
||
|
||
## 5.1.0  
|
||
|
||
**Release date:** 2020-03-10
|
||
|
||
* Enhance security by add loadBalancerSourceRanges to lockdown ip address.
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 78bbee0..ccea845 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -91,6 +91,9 @@ service:
|
||
# externalTrafficPolicy: Cluster
|
||
# loadBalancerIP: "1.2.3.4"
|
||
# clusterIP: "2.3.4.5"
|
||
+ loadBalancerSourceRanges: {}
|
||
+ # - 192.168.0.1/32
|
||
+ # - 172.16.0.0/16
|
||
|
||
logs:
|
||
loglevel: WARN
|
||
```
|
||
|
||
## 5.0.0  
|
||
|
||
**Release date:** 2020-03-10
|
||
|
||
* Expose dashboard by default but only on traefik entrypoint
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index a442fca..78bbee0 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -92,15 +92,6 @@ service:
|
||
# loadBalancerIP: "1.2.3.4"
|
||
# clusterIP: "2.3.4.5"
|
||
|
||
-dashboard:
|
||
- # Enable the dashboard on Traefik
|
||
- enable: true
|
||
-
|
||
- # Expose the dashboard and api through an ingress route at /dashboard
|
||
- # and /api This is not secure and SHOULD NOT be enabled on production
|
||
- # deployments
|
||
- ingressRoute: false
|
||
-
|
||
logs:
|
||
loglevel: WARN
|
||
|
||
```
|
||
|
||
## 4.1.3  
|
||
|
||
**Release date:** 2020-03-10
|
||
|
||
* Add annotations for PVC (#98)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 8b2f4db..a442fca 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -116,6 +116,7 @@ persistence:
|
||
size: 128Mi
|
||
# storageClass: ""
|
||
path: /data
|
||
+ annotations: {}
|
||
|
||
resources: {}
|
||
# requests:
|
||
```
|
||
|
||
## 4.1.2  
|
||
|
||
**Release date:** 2020-03-10
|
||
|
||
* Added persistent volume support. (#86)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 2a2554f..8b2f4db 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -103,7 +103,20 @@ dashboard:
|
||
|
||
logs:
|
||
loglevel: WARN
|
||
-#
|
||
+
|
||
+# Enable persistence using Persistent Volume Claims
|
||
+# ref: http://kubernetes.io/docs/user-guide/persistent-volumes/
|
||
+# After the pvc has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
+# additionalArguments:
|
||
+# - "--certificatesresolvers.le.acme.storage=/data/acme.json"
|
||
+# It will persist TLS certificates.
|
||
+persistence:
|
||
+ enabled: false
|
||
+ accessMode: ReadWriteOnce
|
||
+ size: 128Mi
|
||
+ # storageClass: ""
|
||
+ path: /data
|
||
+
|
||
resources: {}
|
||
# requests:
|
||
# cpu: "100m"
|
||
```
|
||
|
||
## 4.1.1  
|
||
|
||
**Release date:** 2020-03-10
|
||
|
||
* Add values to mount secrets or configmaps as volumes to the traefik pod (#84)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 5401832..2a2554f 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -20,6 +20,23 @@ rollingUpdate:
|
||
maxUnavailable: 1
|
||
maxSurge: 1
|
||
|
||
+
|
||
+#
|
||
+# Add volumes to the traefik pod.
|
||
+# This can be used to mount a cert pair or a configmap that holds a config.toml file.
|
||
+# After the volume has been mounted, add the configs into traefik by using the `additionalArguments` list below, eg:
|
||
+# additionalArguments:
|
||
+# - "--providers.file.filename=/config/dynamic.toml"
|
||
+# - "--tls.certificates.certFile=/certs/tls.crt"
|
||
+# - "--tls.certificates.keyFile=/certs/tls.key"
|
||
+volumes: []
|
||
+# - name: public-cert
|
||
+# mountPath: "/certs"
|
||
+# type: secret
|
||
+# - name: configs
|
||
+# mountPath: "/config"
|
||
+# type: configMap
|
||
+
|
||
#
|
||
# Configure Traefik entry points
|
||
# Additional arguments to be passed at Traefik's binary
|
||
```
|
||
|
||
## 4.1.0  
|
||
|
||
**Release date:** 2020-03-10
|
||
|
||
* Add podAnnotations to the deployment (#83)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 5eab74b..5401832 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -9,6 +9,8 @@ image:
|
||
deployment:
|
||
# Number of pods of the deployment
|
||
replicas: 1
|
||
+ # Additional pod annotations (e.g. for mesh injection or prometheus scraping)
|
||
+ podAnnotations: {}
|
||
|
||
additional:
|
||
checkNewVersion: true
|
||
```
|
||
|
||
## 4.0.0  
|
||
|
||
**Release date:** 2020-03-06
|
||
|
||
* Migrate to helm v3 (#94)
|
||
|
||
|
||
## 3.5.0   
|
||
|
||
**Release date:** 2020-02-18
|
||
|
||
* Publish helm chart (#81)
|
||
|
||
|
||
## 3.4.0   
|
||
|
||
**Release date:** 2020-02-13
|
||
|
||
* Enable configuration of global checknewversion and sendanonymoususage (#80)
|
||
* fix: tests.
|
||
* feat: bump traefik to v2.1.3
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index bcc42f8..5eab74b 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -1,7 +1,7 @@
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
- tag: 2.1.1
|
||
+ tag: 2.1.3
|
||
|
||
#
|
||
# Configure the deployment
|
||
@@ -10,6 +10,10 @@ deployment:
|
||
# Number of pods of the deployment
|
||
replicas: 1
|
||
|
||
+additional:
|
||
+ checkNewVersion: true
|
||
+ sendAnonymousUsage: true
|
||
+
|
||
rollingUpdate:
|
||
maxUnavailable: 1
|
||
maxSurge: 1
|
||
```
|
||
|
||
## 3.3.3   
|
||
|
||
**Release date:** 2020-02-05
|
||
|
||
* fix: chart version.
|
||
* fix: deployment environment variables.
|
||
|
||
|
||
## 3.3.2   
|
||
|
||
**Release date:** 2020-02-03
|
||
|
||
* ix: deployment environment variables.
|
||
|
||
|
||
## 3.3.1   
|
||
|
||
**Release date:** 2020-01-27
|
||
|
||
* fix: deployment environment variables.
|
||
|
||
|
||
## 3.3.0   
|
||
|
||
**Release date:** 2020-01-24
|
||
|
||
* Enable configuration of environment variables in traefik deployment (#71)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index 4462359..bcc42f8 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -21,6 +21,13 @@ rollingUpdate:
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
|
||
+# Environment variables to be passed to Traefik's binary
|
||
+env: {}
|
||
+# - name: SOME_VAR
|
||
+# value: some-var-value
|
||
+# - name: SOME_OTHER_VAR
|
||
+# value: some-other-var-value
|
||
+
|
||
#
|
||
ports:
|
||
# The name of this one can't be changed as it is used for the readiness and
|
||
```
|
||
|
||
## 3.2.1   
|
||
|
||
**Release date:** 2020-01-22
|
||
|
||
* Add Unit Tests for the chart (#60)
|
||
|
||
|
||
## 3.2.0   
|
||
|
||
**Release date:** 2020-01-22
|
||
|
||
* Make NodePort configurable (#67)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
diff --git a/traefik/values.yaml b/traefik/values.yaml
|
||
index b1fe42a..4462359 100644
|
||
--- a/traefik/values.yaml
|
||
+++ b/traefik/values.yaml
|
||
@@ -40,10 +40,14 @@ ports:
|
||
port: 8000
|
||
expose: true
|
||
exposedPort: 80
|
||
+ # Use nodeport if set. This is useful if you have configured Traefik in a
|
||
+ # LoadBalancer
|
||
+ # nodePort: 32080
|
||
websecure:
|
||
port: 8443
|
||
expose: true
|
||
exposedPort: 443
|
||
+ # nodePort: 32443
|
||
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
# from.
|
||
```
|
||
|
||
## 3.1.0   
|
||
|
||
**Release date:** 2020-01-20
|
||
|
||
* Switch Chart linting to ct (#59)
|
||
|
||
### Default value changes
|
||
|
||
```diff
|
||
# Default values for Traefik
|
||
image:
|
||
name: traefik
|
||
tag: 2.1.1
|
||
|
||
#
|
||
# Configure the deployment
|
||
#
|
||
deployment:
|
||
# Number of pods of the deployment
|
||
replicas: 1
|
||
|
||
rollingUpdate:
|
||
maxUnavailable: 1
|
||
maxSurge: 1
|
||
|
||
#
|
||
# Configure Traefik entry points
|
||
# Additional arguments to be passed at Traefik's binary
|
||
## Use curly braces to pass values: `helm install --set="{--providers.kubernetesingress,--global.checknewversion=true}" ."
|
||
additionalArguments: []
|
||
# - "--providers.kubernetesingress"
|
||
|
||
#
|
||
ports:
|
||
# The name of this one can't be changed as it is used for the readiness and
|
||
# liveness probes, but you can adjust its config to your liking
|
||
traefik:
|
||
port: 9000
|
||
# Defines whether the port is exposed if service.type is LoadBalancer or
|
||
# NodePort.
|
||
#
|
||
# You SHOULD NOT expose the traefik port on production deployments.
|
||
# If you want to access it from outside of your cluster,
|
||
# use `kubectl proxy` or create a secure ingress
|
||
expose: false
|
||
# The exposed port for this service
|
||
exposedPort: 9000
|
||
web:
|
||
port: 8000
|
||
expose: true
|
||
exposedPort: 80
|
||
websecure:
|
||
port: 8443
|
||
expose: true
|
||
exposedPort: 443
|
||
|
||
# Options for the main traefik service, where the entrypoints traffic comes
|
||
# from.
|
||
service:
|
||
type: LoadBalancer
|
||
# Additional annotations (e.g. for cloud provider specific config)
|
||
annotations: {}
|
||
# Additional entries here will be added to the service spec. Cannot contains
|
||
# type, selector or ports entries.
|
||
spec: {}
|
||
# externalTrafficPolicy: Cluster
|
||
# loadBalancerIP: "1.2.3.4"
|
||
# clusterIP: "2.3.4.5"
|
||
|
||
dashboard:
|
||
# Enable the dashboard on Traefik
|
||
enable: true
|
||
|
||
# Expose the dashboard and api through an ingress route at /dashboard
|
||
# and /api This is not secure and SHOULD NOT be enabled on production
|
||
# deployments
|
||
ingressRoute: false
|
||
|
||
logs:
|
||
loglevel: WARN
|
||
#
|
||
resources: {}
|
||
# requests:
|
||
# cpu: "100m"
|
||
# memory: "50Mi"
|
||
# limits:
|
||
# cpu: "300m"
|
||
# memory: "150Mi"
|
||
affinity: {}
|
||
nodeSelector: {}
|
||
tolerations: []
|
||
```
|
||
|
||
---
|
||
Autogenerated from Helm Chart and git history using [helm-changelog](https://github.com/mogensen/helm-changelog)
|