diff --git a/charts/aws-ebs-csi-driver/Chart.yaml b/charts/aws-ebs-csi-driver/Chart.yaml index 4814b7f96f..c2ff64e2e4 100644 --- a/charts/aws-ebs-csi-driver/Chart.yaml +++ b/charts/aws-ebs-csi-driver/Chart.yaml @@ -2,8 +2,8 @@ apiVersion: v1 appVersion: "0.8.1" name: aws-ebs-csi-driver description: A Helm chart for AWS EBS CSI Driver -version: 0.8.2 -kubeVersion: ">=1.14.0-0" +version: 0.8.3 +kubeVersion: ">=1.17.0-0" home: https://github.com/kubernetes-sigs/aws-ebs-csi-driver sources: - https://github.com/kubernetes-sigs/aws-ebs-csi-driver diff --git a/charts/aws-ebs-csi-driver/templates/clusterrole-attacher.yaml b/charts/aws-ebs-csi-driver/templates/clusterrole-attacher.yaml index c4b766a36a..e0919cec14 100644 --- a/charts/aws-ebs-csi-driver/templates/clusterrole-attacher.yaml +++ b/charts/aws-ebs-csi-driver/templates/clusterrole-attacher.yaml @@ -18,3 +18,6 @@ rules: - apiGroups: ["storage.k8s.io"] resources: ["volumeattachments"] verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments/status" ] + verbs: [ "patch" ] diff --git a/charts/aws-ebs-csi-driver/templates/clusterrole-provisioner.yaml b/charts/aws-ebs-csi-driver/templates/clusterrole-provisioner.yaml index 84f122a039..0fb7ded0fc 100644 --- a/charts/aws-ebs-csi-driver/templates/clusterrole-provisioner.yaml +++ b/charts/aws-ebs-csi-driver/templates/clusterrole-provisioner.yaml @@ -6,30 +6,33 @@ metadata: labels: {{- include "aws-ebs-csi-driver.labels" . | nindent 4 }} rules: - - apiGroups: [""] - resources: ["persistentvolumes"] - verbs: ["get", "list", "watch", "create", "delete"] - - apiGroups: [""] - resources: ["persistentvolumeclaims"] - verbs: ["get", "list", "watch", "update"] - - apiGroups: ["storage.k8s.io"] - resources: ["storageclasses"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["events"] - verbs: ["list", "watch", "create", "update", "patch"] - - apiGroups: ["snapshot.storage.k8s.io"] - resources: ["volumesnapshots"] - verbs: ["get", "list"] - - apiGroups: ["snapshot.storage.k8s.io"] - resources: ["volumesnapshotcontents"] - verbs: ["get", "list"] - - apiGroups: ["storage.k8s.io"] - resources: ["csinodes"] - verbs: ["get", "list", "watch"] - - apiGroups: [""] - resources: ["nodes"] - verbs: ["get", "list", "watch"] - - apiGroups: ["coordination.k8s.io"] - resources: ["leases"] - verbs: ["get", "watch", "list", "delete", "update", "create"] + - apiGroups: [ "" ] + resources: [ "persistentvolumes" ] + verbs: [ "get", "list", "watch", "create", "delete" ] + - apiGroups: [ "" ] + resources: [ "persistentvolumeclaims" ] + verbs: [ "get", "list", "watch", "update" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "storageclasses" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "" ] + resources: [ "events" ] + verbs: [ "list", "watch", "create", "update", "patch" ] + - apiGroups: [ "snapshot.storage.k8s.io" ] + resources: [ "volumesnapshots" ] + verbs: [ "get", "list" ] + - apiGroups: [ "snapshot.storage.k8s.io" ] + resources: [ "volumesnapshotcontents" ] + verbs: [ "get", "list" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "csinodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "" ] + resources: [ "nodes" ] + verbs: [ "get", "list", "watch" ] + - apiGroups: [ "coordination.k8s.io" ] + resources: [ "leases" ] + verbs: [ "get", "watch", "list", "delete", "update", "create" ] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch" ] diff --git a/charts/aws-ebs-csi-driver/templates/controller.yaml b/charts/aws-ebs-csi-driver/templates/controller.yaml index c0c94060e2..43b5b082cd 100644 --- a/charts/aws-ebs-csi-driver/templates/controller.yaml +++ b/charts/aws-ebs-csi-driver/templates/controller.yaml @@ -105,8 +105,8 @@ spec: {{- if .Values.extraCreateMetadata }} - --extra-create-metadata {{- end}} - - --enable-leader-election - - --leader-election-type=leases + - --leader-election=true + - --default-fstype=ext4 env: - name: ADDRESS value: /var/lib/csi/sockets/pluginproxy/csi.sock diff --git a/charts/aws-ebs-csi-driver/templates/statefulset.yaml b/charts/aws-ebs-csi-driver/templates/statefulset.yaml index 6a904c4b35..c3925d5fbd 100644 --- a/charts/aws-ebs-csi-driver/templates/statefulset.yaml +++ b/charts/aws-ebs-csi-driver/templates/statefulset.yaml @@ -23,7 +23,7 @@ spec: serviceAccountName: {{ .Values.serviceAccount.snapshot.name }} containers: - name: snapshot-controller - image: quay.io/k8scsi/snapshot-controller:v2.1.1 + image: k8s.gcr.io/sig-storage/snapshot-controller:v3.0.3 args: - --v=5 - --leader-election=false diff --git a/charts/aws-ebs-csi-driver/values.yaml b/charts/aws-ebs-csi-driver/values.yaml index 0e746c7893..cc21073b29 100644 --- a/charts/aws-ebs-csi-driver/values.yaml +++ b/charts/aws-ebs-csi-driver/values.yaml @@ -11,23 +11,23 @@ image: sidecars: provisionerImage: - repository: quay.io/k8scsi/csi-provisioner - tag: "v1.6.0" + repository: k8s.gcr.io/sig-storage/csi-provisioner + tag: "v2.0.2" attacherImage: - repository: quay.io/k8scsi/csi-attacher - tag: "v2.2.0" + repository: k8s.gcr.io/sig-storage/csi-attacher + tag: "v3.0.0" snapshotterImage: - repository: quay.io/k8scsi/csi-snapshotter - tag: "v2.1.1" + repository: k8s.gcr.io/sig-storage/csi-snapshotter + tag: "v3.0.3" livenessProbeImage: - repository: quay.io/k8scsi/livenessprobe + repository: k8s.gcr.io/sig-storage/livenessprobe tag: "v2.1.0" resizerImage: - repository: quay.io/k8scsi/csi-resizer - tag: "v0.5.0" + repository: k8s.gcr.io/sig-storage/csi-resizer + tag: "v1.0.0" nodeDriverRegistrarImage: - repository: quay.io/k8scsi/csi-node-driver-registrar - tag: "v1.3.0" + repository: k8s.gcr.io/sig-storage/csi-node-driver-registrar + tag: "v2.0.1" imagePullSecrets: [] nameOverride: "" diff --git a/deploy/kubernetes/base/arm64/clusterrole-attacher.yaml b/deploy/kubernetes/base/arm64/clusterrole-attacher.yaml new file mode 100644 index 0000000000..5805412acb --- /dev/null +++ b/deploy/kubernetes/base/arm64/clusterrole-attacher.yaml @@ -0,0 +1,24 @@ +--- +# Source: aws-ebs-csi-driver/templates/clusterrole-attacher.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: ebs-external-attacher-role + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["csi.storage.k8s.io"] + resources: ["csinodeinfos"] + verbs: ["get", "list", "watch"] + - apiGroups: ["storage.k8s.io"] + resources: ["volumeattachments"] + verbs: ["get", "list", "watch", "update", "patch"] + - apiGroups: ["storage.k8s.io"] + resources: ["volumeattachments/status"] + verbs: ["patch"] diff --git a/deploy/kubernetes/base/arm64/clusterrole-provisioner.yaml b/deploy/kubernetes/base/arm64/clusterrole-provisioner.yaml new file mode 100644 index 0000000000..b8cf0b054e --- /dev/null +++ b/deploy/kubernetes/base/arm64/clusterrole-provisioner.yaml @@ -0,0 +1,39 @@ +--- +# Source: aws-ebs-csi-driver/templates/clusterrole-provisioner.yaml +kind: ClusterRole +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: ebs-external-provisioner-role + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +rules: + - apiGroups: [""] + resources: ["persistentvolumes"] + verbs: ["get", "list", "watch", "create", "delete"] + - apiGroups: [""] + resources: ["persistentvolumeclaims"] + verbs: ["get", "list", "watch", "update"] + - apiGroups: ["storage.k8s.io"] + resources: ["storageclasses"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["events"] + verbs: ["list", "watch", "create", "update", "patch"] + - apiGroups: ["snapshot.storage.k8s.io"] + resources: ["volumesnapshots"] + verbs: ["get", "list"] + - apiGroups: ["snapshot.storage.k8s.io"] + resources: ["volumesnapshotcontents"] + verbs: ["get", "list"] + - apiGroups: ["storage.k8s.io"] + resources: ["csinodes"] + verbs: ["get", "list", "watch"] + - apiGroups: [""] + resources: ["nodes"] + verbs: ["get", "list", "watch"] + - apiGroups: ["coordination.k8s.io"] + resources: ["leases"] + verbs: ["get", "watch", "list", "delete", "update", "create"] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch" ] diff --git a/deploy/kubernetes/base/arm64/clusterrolebinding-attacher.yaml b/deploy/kubernetes/base/arm64/clusterrolebinding-attacher.yaml new file mode 100644 index 0000000000..9a97b8efcb --- /dev/null +++ b/deploy/kubernetes/base/arm64/clusterrolebinding-attacher.yaml @@ -0,0 +1,16 @@ +--- +# Source: aws-ebs-csi-driver/templates/clusterrolebinding-attacher.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: ebs-csi-attacher-binding + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +subjects: + - kind: ServiceAccount + name: ebs-csi-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: ebs-external-attacher-role + apiGroup: rbac.authorization.k8s.io diff --git a/deploy/kubernetes/base/arm64/clusterrolebinding-provisioner.yaml b/deploy/kubernetes/base/arm64/clusterrolebinding-provisioner.yaml new file mode 100644 index 0000000000..084bed9df9 --- /dev/null +++ b/deploy/kubernetes/base/arm64/clusterrolebinding-provisioner.yaml @@ -0,0 +1,16 @@ +--- +# Source: aws-ebs-csi-driver/templates/clusterrolebinding-provisioner.yaml +kind: ClusterRoleBinding +apiVersion: rbac.authorization.k8s.io/v1 +metadata: + name: ebs-csi-provisioner-binding + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +subjects: + - kind: ServiceAccount + name: ebs-csi-controller-sa + namespace: kube-system +roleRef: + kind: ClusterRole + name: ebs-external-provisioner-role + apiGroup: rbac.authorization.k8s.io diff --git a/deploy/kubernetes/base/arm64/controller.yaml b/deploy/kubernetes/base/arm64/controller.yaml new file mode 100644 index 0000000000..009b16df29 --- /dev/null +++ b/deploy/kubernetes/base/arm64/controller.yaml @@ -0,0 +1,102 @@ +--- +# Source: aws-ebs-csi-driver/templates/controller.yaml +# Controller Service +kind: Deployment +apiVersion: apps/v1 +metadata: + name: ebs-csi-controller + namespace: kube-system + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +spec: + replicas: 2 + selector: + matchLabels: + app: ebs-csi-controller + app.kubernetes.io/name: aws-ebs-csi-driver + template: + metadata: + labels: + app: ebs-csi-controller + app.kubernetes.io/name: aws-ebs-csi-driver + spec: + nodeSelector: + kubernetes.io/os: linux + serviceAccountName: ebs-csi-controller-sa + priorityClassName: system-cluster-critical + tolerations: + - operator: Exists + containers: + - name: ebs-plugin + image: k8s.gcr.io/provider-aws/aws-ebs-csi-driver:latest + imagePullPolicy: IfNotPresent + args: + # - {all,controller,node} # specify the driver mode + - --endpoint=$(CSI_ENDPOINT) + - --logtostderr + - --v=5 + env: + - name: CSI_ENDPOINT + value: unix:///var/lib/csi/sockets/pluginproxy/csi.sock + - name: AWS_ACCESS_KEY_ID + valueFrom: + secretKeyRef: + name: aws-secret + key: key_id + optional: true + - name: AWS_SECRET_ACCESS_KEY + valueFrom: + secretKeyRef: + name: aws-secret + key: access_key + optional: true + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + ports: + - name: healthz + containerPort: 9808 + protocol: TCP + livenessProbe: + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 10 + timeoutSeconds: 3 + periodSeconds: 10 + failureThreshold: 5 + - name: csi-provisioner + image: k8s.gcr.io/sig-storage/csi-provisioner:v2.0.2 + args: + - --csi-address=$(ADDRESS) + - --v=5 + - --feature-gates=Topology=true + - --leader-election=true + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: csi-attacher + image: k8s.gcr.io/sig-storage/csi-attacher:v3.0.0 + args: + - --csi-address=$(ADDRESS) + - --v=5 + - --leader-election=true + env: + - name: ADDRESS + value: /var/lib/csi/sockets/pluginproxy/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /var/lib/csi/sockets/pluginproxy/ + - name: liveness-probe + image: k8s.gcr.io/sig-storage/livenessprobe:v2.1.0 + args: + - --csi-address=/csi/csi.sock + volumeMounts: + - name: socket-dir + mountPath: /csi + volumes: + - name: socket-dir + emptyDir: { } diff --git a/deploy/kubernetes/base/arm64/csidriver.yaml b/deploy/kubernetes/base/arm64/csidriver.yaml new file mode 100644 index 0000000000..357b3d71a2 --- /dev/null +++ b/deploy/kubernetes/base/arm64/csidriver.yaml @@ -0,0 +1,11 @@ +--- +# Source: aws-ebs-csi-driver/templates/csidriver.yaml +apiVersion: storage.k8s.io/v1beta1 +kind: CSIDriver +metadata: + name: ebs.csi.aws.com + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +spec: + attachRequired: true + podInfoOnMount: false diff --git a/deploy/kubernetes/base/arm64/kustomization.yaml b/deploy/kubernetes/base/arm64/kustomization.yaml new file mode 100644 index 0000000000..f6978d7e21 --- /dev/null +++ b/deploy/kubernetes/base/arm64/kustomization.yaml @@ -0,0 +1,12 @@ +apiVersion: kustomize.config.k8s.io/v1beta1 +kind: Kustomization +namespace: kube-system +resources: +- clusterrole-attacher.yaml +- clusterrole-provisioner.yaml +- clusterrolebinding-attacher.yaml +- clusterrolebinding-provisioner.yaml +- controller.yaml +- csidriver.yaml +- node.yaml +- serviceaccount-csi-controller.yaml diff --git a/deploy/kubernetes/base/arm64/node.yaml b/deploy/kubernetes/base/arm64/node.yaml new file mode 100644 index 0000000000..2f6c0348da --- /dev/null +++ b/deploy/kubernetes/base/arm64/node.yaml @@ -0,0 +1,113 @@ +--- +# Source: aws-ebs-csi-driver/templates/node.yaml +# Node Service +kind: DaemonSet +apiVersion: apps/v1 +metadata: + name: ebs-csi-node + namespace: kube-system + labels: + app.kubernetes.io/name: aws-ebs-csi-driver +spec: + selector: + matchLabels: + app: ebs-csi-node + app.kubernetes.io/name: aws-ebs-csi-driver + template: + metadata: + labels: + app: ebs-csi-node + app.kubernetes.io/name: aws-ebs-csi-driver + spec: + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: eks.amazonaws.com/compute-type + operator: NotIn + values: + - fargate + nodeSelector: + kubernetes.io/os: linux + hostNetwork: true + priorityClassName: system-node-critical + tolerations: + - operator: Exists + containers: + - name: ebs-plugin + securityContext: + privileged: true + image: k8s.gcr.io/provider-aws/aws-ebs-csi-driver:latest + args: + - node + - --endpoint=$(CSI_ENDPOINT) + - --logtostderr + - --v=5 + env: + - name: CSI_ENDPOINT + value: unix:/csi/csi.sock + volumeMounts: + - name: kubelet-dir + mountPath: /var/lib/kubelet + mountPropagation: "Bidirectional" + - name: plugin-dir + mountPath: /csi + - name: device-dir + mountPath: /dev + ports: + - name: healthz + containerPort: 9808 + protocol: TCP + livenessProbe: + httpGet: + path: /healthz + port: healthz + initialDelaySeconds: 10 + timeoutSeconds: 3 + periodSeconds: 10 + failureThreshold: 5 + - name: node-driver-registrar + image: k8s.gcr.io/sig-storage/csi-node-driver-registrar:v2.0.1 + args: + - --csi-address=$(ADDRESS) + - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) + - --v=5 + lifecycle: + preStop: + exec: + command: ["/bin/sh", "-c", "rm -rf /registration/ebs.csi.aws.com-reg.sock /csi/csi.sock"] + env: + - name: ADDRESS + value: /csi/csi.sock + - name: DRIVER_REG_SOCK_PATH + value: /var/lib/kubelet/plugins/ebs.csi.aws.com/csi.sock + volumeMounts: + - name: plugin-dir + mountPath: /csi + - name: registration-dir + mountPath: /registration + - name: liveness-probe + image: quay.io/k8scsi/livenessprobe:v2.1.0 + args: + - --csi-address=/csi/csi.sock + volumeMounts: + - name: plugin-dir + mountPath: /csi + volumes: + - name: kubelet-dir + hostPath: + path: /var/lib/kubelet + type: Directory + - name: plugin-dir + hostPath: + path: /var/lib/kubelet/plugins/ebs.csi.aws.com/ + type: DirectoryOrCreate + - name: registration-dir + hostPath: + path: /var/lib/kubelet/plugins_registry/ + type: Directory + - name: device-dir + hostPath: + path: /dev + type: Directory diff --git a/deploy/kubernetes/base/arm64/serviceaccount-csi-controller.yaml b/deploy/kubernetes/base/arm64/serviceaccount-csi-controller.yaml new file mode 100644 index 0000000000..529473f3a3 --- /dev/null +++ b/deploy/kubernetes/base/arm64/serviceaccount-csi-controller.yaml @@ -0,0 +1,12 @@ +--- +# Source: aws-ebs-csi-driver/templates/serviceaccount-csi-controller.yaml +apiVersion: v1 +kind: ServiceAccount +metadata: + name: ebs-csi-controller-sa + namespace: kube-system + labels: + app.kubernetes.io/name: aws-ebs-csi-driver + #Enable if EKS IAM for SA is used + #annotations: + # eks.amazonaws.com/role-arn: arn:aws:iam::586565787010:role/ebs-csi-role diff --git a/deploy/kubernetes/base/clusterrole-provisioner.yaml b/deploy/kubernetes/base/clusterrole-provisioner.yaml index 827e8f06cd..b8cf0b054e 100644 --- a/deploy/kubernetes/base/clusterrole-provisioner.yaml +++ b/deploy/kubernetes/base/clusterrole-provisioner.yaml @@ -34,3 +34,6 @@ rules: - apiGroups: ["coordination.k8s.io"] resources: ["leases"] verbs: ["get", "watch", "list", "delete", "update", "create"] + - apiGroups: [ "storage.k8s.io" ] + resources: [ "volumeattachments" ] + verbs: [ "get", "list", "watch" ] diff --git a/deploy/kubernetes/base/controller.yaml b/deploy/kubernetes/base/controller.yaml index 2c84fc0e97..24ac7cad7a 100644 --- a/deploy/kubernetes/base/controller.yaml +++ b/deploy/kubernetes/base/controller.yaml @@ -66,13 +66,13 @@ spec: periodSeconds: 10 failureThreshold: 5 - name: csi-provisioner - image: quay.io/k8scsi/csi-provisioner:v1.6.0 + image: quay.io/k8scsi/csi-provisioner:v2.0.2 args: - --csi-address=$(ADDRESS) - --v=5 - --feature-gates=Topology=true - - --enable-leader-election - - --leader-election-type=leases + - --leader-election=true + - --default-fstype=ext4 env: - name: ADDRESS value: /var/lib/csi/sockets/pluginproxy/csi.sock @@ -80,7 +80,7 @@ spec: - name: socket-dir mountPath: /var/lib/csi/sockets/pluginproxy/ - name: csi-attacher - image: quay.io/k8scsi/csi-attacher:v2.2.0 + image: quay.io/k8scsi/csi-attacher:v3.0.0 args: - --csi-address=$(ADDRESS) - --v=5 diff --git a/deploy/kubernetes/base/node.yaml b/deploy/kubernetes/base/node.yaml index 1853df522c..56e7a4f77c 100644 --- a/deploy/kubernetes/base/node.yaml +++ b/deploy/kubernetes/base/node.yaml @@ -68,7 +68,7 @@ spec: periodSeconds: 10 failureThreshold: 5 - name: node-driver-registrar - image: quay.io/k8scsi/csi-node-driver-registrar:v1.3.0 + image: quay.io/k8scsi/csi-node-driver-registrar:v2.0.1 args: - --csi-address=$(ADDRESS) - --kubelet-registration-path=$(DRIVER_REG_SOCK_PATH) diff --git a/deploy/kubernetes/overlays/alpha/controller_add_resizer.yaml b/deploy/kubernetes/overlays/alpha/controller_add_resizer.yaml index db7f8002ad..cc50a885a5 100644 --- a/deploy/kubernetes/overlays/alpha/controller_add_resizer.yaml +++ b/deploy/kubernetes/overlays/alpha/controller_add_resizer.yaml @@ -8,10 +8,11 @@ spec: spec: containers: - name: csi-resizer - image: quay.io/k8scsi/csi-resizer:v0.3.0 + image: k8s.gcr.io/sig-storage/csi-resizer:v1.0.0 args: - --csi-address=$(ADDRESS) - --v=5 + - --handle-volume-inuse-error=false env: - name: ADDRESS value: /var/lib/csi/sockets/pluginproxy/csi.sock diff --git a/deploy/kubernetes/overlays/alpha/controller_add_snapshotter.yaml b/deploy/kubernetes/overlays/alpha/controller_add_snapshotter.yaml index 166d16230e..11af8a6491 100644 --- a/deploy/kubernetes/overlays/alpha/controller_add_snapshotter.yaml +++ b/deploy/kubernetes/overlays/alpha/controller_add_snapshotter.yaml @@ -8,7 +8,7 @@ spec: spec: containers: - name: csi-snapshotter - image: quay.io/k8scsi/csi-snapshotter:v2.1.1 + image: k8s.gcr.io/sig-storage/csi-snapshotter:v3.0.3 args: - --csi-address=$(ADDRESS) - --leader-election=true diff --git a/deploy/kubernetes/overlays/alpha/snapshot_controller.yaml b/deploy/kubernetes/overlays/alpha/snapshot_controller.yaml index 5b28f4ca02..45825e0f2b 100644 --- a/deploy/kubernetes/overlays/alpha/snapshot_controller.yaml +++ b/deploy/kubernetes/overlays/alpha/snapshot_controller.yaml @@ -24,7 +24,7 @@ spec: serviceAccountName: ebs-snapshot-controller containers: - name: snapshot-controller - image: quay.io/k8scsi/snapshot-controller:v2.1.1 + image: quay.io/k8scsi/snapshot-controller:v3.0.3 args: - --v=5 - --leader-election=false diff --git a/deploy/kubernetes/overlays/stable/arm64/kustomization.yaml b/deploy/kubernetes/overlays/stable/arm64/kustomization.yaml index 099a97c4b2..bda0746760 100644 --- a/deploy/kubernetes/overlays/stable/arm64/kustomization.yaml +++ b/deploy/kubernetes/overlays/stable/arm64/kustomization.yaml @@ -1,19 +1,15 @@ apiVersion: kustomize.config.k8s.io/v1beta1 kind: Kustomization bases: - - ../../../base + - ../../../base/arm64 images: - name: k8s.gcr.io/provider-aws/aws-ebs-csi-driver newTag: v0.8.1 - - name: quay.io/k8scsi/csi-provisioner - newName: raspbernetes/csi-external-provisioner - newTag: "1.6.0" - - name: quay.io/k8scsi/csi-attacher - newName: raspbernetes/csi-external-attacher - newTag: "2.2.0" - - name: quay.io/k8scsi/livenessprobe - newName: k8s.gcr.io/sig-storage/livenessprobe - newTag: "v2.1.0" - - name: quay.io/k8scsi/csi-node-driver-registrar - newName: raspbernetes/csi-node-driver-registrar - newTag: "1.3.0" + - name: k8s.gcr.io/sig-storage/csi-provisioner + newTag: v2.0.2 + - name: k8s.gcr.io/sig-storage/csi-attacher + newTag: v3.0.0 + - name: k8s.gcr.io/sig-storage/livenessprobe + newTag: v2.1.0 + - name: k8s.gcr.io/sig-storage/csi-node-driver-registrar + newTag: v2.0.1 diff --git a/deploy/kubernetes/overlays/stable/kustomization.yaml b/deploy/kubernetes/overlays/stable/kustomization.yaml index a815e3dd30..941c57ce28 100644 --- a/deploy/kubernetes/overlays/stable/kustomization.yaml +++ b/deploy/kubernetes/overlays/stable/kustomization.yaml @@ -6,10 +6,10 @@ images: - name: k8s.gcr.io/provider-aws/aws-ebs-csi-driver newTag: v0.8.1 - name: quay.io/k8scsi/csi-provisioner - newTag: v1.5.0 + newTag: v2.0.2 - name: quay.io/k8scsi/csi-attacher - newTag: v2.2.0 + newTag: v3.0.0 - name: quay.io/k8scsi/livenessprobe newTag: v2.1.0 - name: quay.io/k8scsi/csi-node-driver-registrar - newTag: v1.3.0 + newTag: v2.0.1 diff --git a/docs/README.md b/docs/README.md index 9e3902ddce..2be387c1b9 100644 --- a/docs/README.md +++ b/docs/README.md @@ -50,7 +50,7 @@ Following sections are Kubernetes specific. If you are Kubernetes user, use foll ## Kubernetes Version Compatibility Matrix | AWS EBS CSI Driver \ Kubernetes Version| v1.12 | v1.13 | v1.14 | v1.15 | v1.16 | v1.17 | v1.18+ | |----------------------------------------|-------|-------|-------|-------|-------|-------|-------| -| master branch | no | no+ | yes | yes | yes | yes | yes | +| master branch | no | no+ | no | no | no | yes | yes | | v0.8.x | no | no+ | yes | yes | yes | yes | yes | | v0.7.1 | no | no+ | yes | yes | yes | yes | yes | | v0.6.0 | no | no+ | yes | yes | yes | yes | yes | @@ -109,6 +109,8 @@ kubectl create -f https://raw.githubusercontent.com/kubernetes/csi-api/release-1 ``` #### Deploy driver +Latest master branch only supports driver deployment on kubernetes version >= 1.17 + If you want to deploy the stable driver without alpha features: ```sh kubectl apply -k "github.com/kubernetes-sigs/aws-ebs-csi-driver/deploy/kubernetes/overlays/stable/?ref=release-0.8" @@ -141,7 +143,6 @@ helm upgrade --install aws-ebs-csi-driver \ --set enableVolumeSnapshot=true \ aws-ebs-csi-driver/aws-ebs-csi-driver ``` - ## Examples Make sure you follow the [Prerequisites](README.md#Prerequisites) before the examples: * [Dynamic Provisioning](../examples/kubernetes/dynamic-provisioning)