Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update all minor dependencies #2650

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Jun 1, 2024

This PR contains the following updates:

Package Update Change Pending
karpenter minor 0.36.1 -> 0.37.6
karpenter-crd (source) minor 0.36.1 -> 0.37.6
kube-state-metrics (source) minor 5.18.1 -> 5.27.0 5.27.1

Review

  • Updates have been tested and work
  • If updates are AWS related, versions match the infrastructure (e.g. Lambda runtime, database, etc.)

Release Notes

aws/karpenter (karpenter-crd)

v0.37.6

Compare Source

Bug Fixes

Tests

Commits

v0.37.5

Compare Source

Bug Fixes

Tests

Commits

v0.37.4

Compare Source

Continuous Integration

Chores

Commits

v0.37.3

Compare Source

Bug Fixes

Documentation

Chores

v0.37.2

Compare Source

Chores

Commits

v0.37.1

Compare Source

Features

Tests

Continuous Integration

Chores

Commits

v0.37.0

Compare Source

Note: This release adds a readiness condition to the EC2NodeClass. A CRD upgrade will be required. Please refer to the upgrade guide for more details.

Features

Bug Fixes

Documentation

Tests

Continuous Integration

Chores

Commits

  • 1f3e7cc: Stable Release updates Release v0.36.0. (jigisha620) #​6018
  • 1fbdafa: Fix the website to correctly point to the latest release (jigisha620) #​6020
  • c730713: Pinning Karpenter version for upgrade test suite (jigisha620) #​6030
  • 9a07a6d: BREAKING CHANGE: Refactor NodeClass controller (#​5949) (Amanuel Engeda) #​5949
  • bbdc07c: fix network bandwidth script and run codegen (jigisha620) [#​6099](https://

Configuration

📅 Schedule: Branch creation - "every weekend" in timezone America/Montreal, Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.

👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate bot requested a review from jimleroyer as a code owner June 1, 2024 06:58
@renovate renovate bot force-pushed the renovate/all-minor branch from a0a43a1 to d187cb7 Compare June 1, 2024 14:05
@renovate renovate bot changed the title chore(deps): update gha-runner-scale-set docker tag to v0.9.2 chore(deps): update all minor dependencies Jun 1, 2024
@renovate renovate bot changed the title chore(deps): update all minor dependencies chore(deps): update gha-runner-scale-set docker tag to v0.9.2 Jun 1, 2024
@renovate renovate bot changed the title chore(deps): update gha-runner-scale-set docker tag to v0.9.2 chore(deps): update all minor dependencies Jun 1, 2024
@renovate renovate bot changed the title chore(deps): update all minor dependencies chore(deps): update gha-runner-scale-set docker tag to v0.9.2 Jun 2, 2024
@renovate renovate bot changed the title chore(deps): update gha-runner-scale-set docker tag to v0.9.2 chore(deps): update all minor dependencies Jun 2, 2024
@renovate renovate bot changed the title chore(deps): update all minor dependencies chore(deps): update gha-runner-scale-set docker tag to v0.9.2 Jun 2, 2024
@renovate renovate bot changed the title chore(deps): update gha-runner-scale-set docker tag to v0.9.2 chore(deps): update all minor dependencies to v0.37.0 Jun 2, 2024
@renovate renovate bot changed the title chore(deps): update all minor dependencies to v0.37.0 chore(deps): update all minor dependencies Jun 2, 2024
@renovate renovate bot force-pushed the renovate/all-minor branch from d187cb7 to b4336d0 Compare June 3, 2024 14:04
Copy link

github-actions bot commented Jun 3, 2024

ingress	nginx    	2       	2024-02-12 19:08:42.93215444 +0000 UTC	deployed	nginx-ingress-1.1.2	3.4.2      

xray-daemon	xray     	1       	2024-07-29 19:45:48.684608347 +0000 UTC	deployed	aws-xray-4.0.8	3.3.12     

Comparing release=k8s-event-logger, chart=/tmp/helmfile82792783/amazon-cloudwatch/staging/k8s-event-logger/k8s-event-logger/1.1.8/k8s-event-logger
Comparing release=karpenter-crd, chart=/tmp/helmfile82792783/karpenter/staging/karpenter-crd/karpenter-crd/0.36.1/karpenter-crd
Comparing release=karpenter, chart=/tmp/helmfile82792783/karpenter/staging/karpenter/karpenter/0.37.6/karpenter
karpenter, karpenter, ClusterRole (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/clusterrole.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRole
  metadata:
    name: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  rules:
    # Read
    - apiGroups: ["karpenter.k8s.aws"]
      resources: ["ec2nodeclasses"]
      verbs: ["get", "list", "watch"]
    # Write
    - apiGroups: ["karpenter.k8s.aws"]
      resources: ["ec2nodeclasses", "ec2nodeclasses/status"]
      verbs: ["patch", "update"]
+   - apiGroups: ["admissionregistration.k8s.io"]
+     resources: ["validatingwebhookconfigurations"]
+     verbs: ["update"]
+     resourceNames: ["validation.webhook.karpenter.k8s.aws"]
+   - apiGroups: ["admissionregistration.k8s.io"]
+     resources: ["mutatingwebhookconfigurations"]
+     verbs: ["update"]
+     resourceNames: ["defaulting.webhook.karpenter.k8s.aws"]
karpenter, karpenter, ClusterRoleBinding (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/clusterrole.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRoleBinding
  metadata:
    name: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: ClusterRole
    name: karpenter
  subjects:
    - kind: ServiceAccount
      name: karpenter
      namespace: karpenter
karpenter, karpenter, Deployment (apps) has changed:
  # Source: karpenter/templates/deployment.yaml
  apiVersion: apps/v1
  kind: Deployment
  metadata:
    name: karpenter
    namespace: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  spec:
    replicas: 2
    revisionHistoryLimit: 10
    strategy:
      rollingUpdate:
        maxUnavailable: 1
    selector:
      matchLabels:
        app.kubernetes.io/name: karpenter
        app.kubernetes.io/instance: karpenter
    template:
      metadata:
        labels:
          app.kubernetes.io/name: karpenter
          app.kubernetes.io/instance: karpenter
        annotations:
      spec:
        serviceAccountName: karpenter
        securityContext:
          fsGroup: 65532
        priorityClassName: "system-cluster-critical"
        dnsPolicy: ClusterFirst
        containers:
          - name: controller
            securityContext:
              runAsUser: 65532
              runAsGroup: 65532
              runAsNonRoot: true
              seccompProfile:
                type: RuntimeDefault
              allowPrivilegeEscalation: false
              capabilities:
                drop:
                  - ALL
              readOnlyRootFilesystem: true
-           image: public.ecr.aws/karpenter/controller:0.36.1@sha256:5b245674ae0ac97558cd335ebae19c0c80e911daac2352cb74ee0ccdba7f5e2b
+           image: public.ecr.aws/karpenter/controller:0.37.6@sha256:3b06d83204d84bb03572032474d5edac25d0eed40124b81b341da024b37d95a9
            imagePullPolicy: IfNotPresent
            env:
              - name: KUBERNETES_MIN_VERSION
                value: "1.19.0-0"
              - name: KARPENTER_SERVICE
                value: karpenter
+             - name: WEBHOOK_PORT
+               value: "8443"
+             - name: WEBHOOK_METRICS_PORT
+               value: "8001"
+             - name: DISABLE_WEBHOOK
+               value: "false"
              - name: LOG_LEVEL
                value: "info"
              - name: METRICS_PORT
                value: "8000"
              - name: HEALTH_PROBE_PORT
                value: "8081"
              - name: SYSTEM_NAMESPACE
                valueFrom:
                  fieldRef:
                    fieldPath: metadata.namespace
              - name: MEMORY_LIMIT
                valueFrom:
                  resourceFieldRef:
                    containerName: controller
                    divisor: "0"
                    resource: limits.memory
              - name: FEATURE_GATES
                value: "Drift=true,SpotToSpotConsolidation=false"
              - name: BATCH_MAX_DURATION
                value: "10s"
              - name: BATCH_IDLE_DURATION
                value: "1s"
              - name: ASSUME_ROLE_DURATION
                value: "15m"
              - name: CLUSTER_NAME
                value: "notification-canada-ca-staging-eks-cluster"
              - name: VM_MEMORY_OVERHEAD_PERCENT
                value: "0.075"
              - name: RESERVED_ENIS
                value: "0"
            ports:
              - name: http-metrics
                containerPort: 8000
+               protocol: TCP
+             - name: webhook-metrics
+               containerPort: 8001
+               protocol: TCP
+             - name: https-webhook
+               containerPort: 8443
                protocol: TCP
              - name: http
                containerPort: 8081
                protocol: TCP
            livenessProbe:
              initialDelaySeconds: 30
              timeoutSeconds: 30
              httpGet:
                path: /healthz
                port: http
            readinessProbe:
              initialDelaySeconds: 5
              timeoutSeconds: 30
              httpGet:
                path: /readyz
                port: http
        nodeSelector:
          kubernetes.io/os: linux
        # The template below patches the .Values.affinity to add a default label selector where not specificed
        affinity:
          nodeAffinity:
            requiredDuringSchedulingIgnoredDuringExecution:
              nodeSelectorTerms:
              - matchExpressions:
                - key: karpenter.sh/nodepool
                  operator: DoesNotExist
          podAntiAffinity:
            requiredDuringSchedulingIgnoredDuringExecution:
            - labelSelector:
                matchLabels:
                  app.kubernetes.io/instance: karpenter
                  app.kubernetes.io/name: karpenter
              topologyKey: kubernetes.io/hostname
        # The template below patches the .Values.topologySpreadConstraints to add a default label selector where not specificed
        topologySpreadConstraints:
          - labelSelector:
              matchLabels:
                app.kubernetes.io/instance: karpenter
                app.kubernetes.io/name: karpenter
            maxSkew: 1
            topologyKey: topology.kubernetes.io/zone
            whenUnsatisfiable: ScheduleAnyway
        tolerations:
          - key: CriticalAddonsOnly
            operator: Exists
karpenter, karpenter, PodDisruptionBudget (policy) has changed:
  # Source: karpenter/templates/poddisruptionbudget.yaml
  apiVersion: policy/v1
  kind: PodDisruptionBudget
  metadata:
    name: karpenter
    namespace: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  spec:
    maxUnavailable: 1
    selector:
      matchLabels:
        app.kubernetes.io/name: karpenter
        app.kubernetes.io/instance: karpenter
karpenter, karpenter, Role (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/role.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: Role
  metadata:
    name: karpenter
    namespace: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  rules:
    # Read
    - apiGroups: ["coordination.k8s.io"]
      resources: ["leases"]
      verbs: ["get", "watch"]
+   - apiGroups: [""]
+     resources: ["configmaps", "secrets"]
+     verbs: ["get", "list", "watch"]
    # Write
+   - apiGroups: [""]
+     resources: ["secrets"]
+     verbs: ["update"]
+     resourceNames:
+       - "karpenter-cert"
    - apiGroups: ["coordination.k8s.io"]
      resources: ["leases"]
      verbs: ["patch", "update"]
      resourceNames:
        - "karpenter-leader-election"
    # Cannot specify resourceNames on create
    # https://kubernetes.io/docs/reference/access-authn-authz/rbac/#referring-to-resources
    - apiGroups: ["coordination.k8s.io"]
      resources: ["leases"]
      verbs: ["create"]
karpenter, karpenter, RoleBinding (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/rolebinding.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: RoleBinding
  metadata:
    name: karpenter
    namespace: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: Role
    name: karpenter
  subjects:
    - kind: ServiceAccount
      name: karpenter
      namespace: karpenter
karpenter, karpenter, Service (v1) has changed:
  # Source: karpenter/templates/service.yaml
  apiVersion: v1
  kind: Service
  metadata:
    name: karpenter
    namespace: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  spec:
    type: ClusterIP
    ports:
      - name: http-metrics
        port: 8000
        targetPort: http-metrics
+       protocol: TCP
+     - name: webhook-metrics
+       port: 8001
+       targetPort: webhook-metrics
+       protocol: TCP
+     - name: https-webhook
+       port: 8443
+       targetPort: https-webhook
        protocol: TCP
    selector:
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
karpenter, karpenter, ServiceAccount (v1) has changed:
  # Source: karpenter/templates/serviceaccount.yaml
  apiVersion: v1
  kind: ServiceAccount
  metadata:
    name: karpenter
    namespace: karpenter
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
    annotations:
      eks.amazonaws.com/role-arn: arn:aws:iam::239043911459:role/karpenter-controller-eks
karpenter, karpenter-admin, ClusterRole (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/aggregate-clusterrole.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRole
  metadata:
    name: karpenter-admin
    labels:
      rbac.authorization.k8s.io/aggregate-to-admin: "true"
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  rules:
    - apiGroups: ["karpenter.sh"]
      resources: ["nodepools", "nodepools/status", "nodeclaims", "nodeclaims/status"]
      verbs: ["get", "list", "watch", "create", "delete", "patch"]
    - apiGroups: ["karpenter.k8s.aws"]
      resources: ["ec2nodeclasses"]
      verbs: ["get", "list", "watch", "create", "delete", "patch"]
karpenter, karpenter-core, ClusterRole (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/clusterrole-core.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRole
  metadata:
    name: karpenter-core
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  rules:
    # Read
    - apiGroups: ["karpenter.sh"]
      resources: ["nodepools", "nodepools/status", "nodeclaims", "nodeclaims/status"]
      verbs: ["get", "list", "watch"]
    - apiGroups: [""]
      resources: ["pods", "nodes", "persistentvolumes", "persistentvolumeclaims", "replicationcontrollers", "namespaces"]
      verbs: ["get", "list", "watch"]
    - apiGroups: ["storage.k8s.io"]
      resources: ["storageclasses", "csinodes"]
      verbs: ["get", "watch", "list"]
    - apiGroups: ["apps"]
      resources: ["daemonsets", "deployments", "replicasets", "statefulsets"]
      verbs: ["list", "watch"]
+   - apiGroups: ["admissionregistration.k8s.io"]
+     resources: ["validatingwebhookconfigurations", "mutatingwebhookconfigurations"]
+     verbs: ["get", "watch", "list"]
+   - apiGroups: ["apiextensions.k8s.io"]
+     resources: ["customresourcedefinitions"]
+     verbs: ["watch", "list"]
    - apiGroups: ["policy"]
      resources: ["poddisruptionbudgets"]
      verbs: ["get", "list", "watch"]
    # Write
    - apiGroups: ["karpenter.sh"]
      resources: ["nodeclaims", "nodeclaims/status"]
      verbs: ["create", "delete", "update", "patch"]
    - apiGroups: ["karpenter.sh"]
      resources: ["nodepools", "nodepools/status"]
      verbs: ["update", "patch"]
    - apiGroups: [""]
      resources: ["events"]
      verbs: ["create", "patch"]
    - apiGroups: [""]
      resources: ["nodes"]
      verbs: ["patch", "delete"]
    - apiGroups: [""]
      resources: ["pods/eviction"]
      verbs: ["create"]
+   - apiGroups: ["admissionregistration.k8s.io"]
+     resources: ["validatingwebhookconfigurations"]
+     verbs: ["update"]
+     resourceNames: ["validation.webhook.karpenter.sh", "validation.webhook.config.karpenter.sh"]
+   - apiGroups: ["apiextensions.k8s.io"]
+     resources: ["customresourcedefinitions"]
+     resourceNames: ["ec2nodeclasses.karpenter.k8s.aws", "nodepools.karpenter.sh", "nodeclaims.karpenter.sh"]
+     verbs: ["update"]
karpenter, karpenter-core, ClusterRoleBinding (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/clusterrole-core.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRoleBinding
  metadata:
    name: karpenter-core
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: ClusterRole
    name: karpenter-core
  subjects:
    - kind: ServiceAccount
      name: karpenter
      namespace: karpenter
kube-node-lease, karpenter-lease, Role (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/role.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: Role
  metadata:
    name: karpenter-lease
    namespace: kube-node-lease
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  rules:
    # Read
    - apiGroups: ["coordination.k8s.io"]
      resources: ["leases"]
      verbs: ["get", "list", "watch"]
    # Write
    - apiGroups: ["coordination.k8s.io"]
      resources: ["leases"]
      verbs: ["delete"]
kube-node-lease, karpenter-lease, RoleBinding (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/rolebinding.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: RoleBinding
  metadata:
    name: karpenter-lease
    namespace: kube-node-lease
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: Role
    name: karpenter-lease
  subjects:
    - kind: ServiceAccount
      name: karpenter
      namespace: karpenter
kube-system, karpenter-dns, Role (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/role.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: Role
  metadata:
    name: karpenter-dns
    namespace: kube-system
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  rules:
    # Read
    - apiGroups: [""]
      resources: ["services"]
      resourceNames: ["kube-dns"]
      verbs: ["get"]
kube-system, karpenter-dns, RoleBinding (rbac.authorization.k8s.io) has changed:
  # Source: karpenter/templates/rolebinding.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: RoleBinding
  metadata:
    name: karpenter-dns
    namespace: kube-system
    labels:
-     helm.sh/chart: karpenter-0.36.1
+     helm.sh/chart: karpenter-0.37.6
      app.kubernetes.io/name: karpenter
      app.kubernetes.io/instance: karpenter
-     app.kubernetes.io/version: "0.36.1"
+     app.kubernetes.io/version: "0.37.6"
      app.kubernetes.io/managed-by: Helm
  roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: Role
    name: karpenter-dns
  subjects:
    - kind: ServiceAccount
      name: karpenter
      namespace: karpenter
karpenter, defaulting.webhook.karpenter.k8s.aws, MutatingWebhookConfiguration (admissionregistration.k8s.io) has been added:
- 
+ # Source: karpenter/templates/webhooks.yaml
+ apiVersion: admissionregistration.k8s.io/v1
+ kind: MutatingWebhookConfiguration
+ metadata:
+   name: defaulting.webhook.karpenter.k8s.aws
+   labels:
+     helm.sh/chart: karpenter-0.37.6
+     app.kubernetes.io/name: karpenter
+     app.kubernetes.io/instance: karpenter
+     app.kubernetes.io/version: "0.37.6"
+     app.kubernetes.io/managed-by: Helm
+ webhooks:
+   - name: defaulting.webhook.karpenter.k8s.aws
+     admissionReviewVersions: ["v1"]
+     clientConfig:
+       service:
+         name: karpenter
+         namespace: karpenter
+         port: 8443
+     failurePolicy: Fail
+     sideEffects: None
+     rules:
+       - apiGroups:
+           - karpenter.k8s.aws
+         apiVersions:
+           - v1beta1
+         operations:
+           - CREATE
+           - UPDATE
+         resources:
+           - ec2nodeclasses
+           - ec2nodeclasses/status
+         scope: '*'
karpenter, karpenter-cert, Secret (v1) has been added:
+ # Source: karpenter/templates/secret-webhook-cert.yaml
+ apiVersion: v1
+ kind: Secret
+ metadata:
+   labels:
+     app.kubernetes.io/instance: karpenter
+     app.kubernetes.io/managed-by: Helm
+     app.kubernetes.io/name: karpenter
+     app.kubernetes.io/version: 0.37.6
+     helm.sh/chart: karpenter-0.37.6
+   name: karpenter-cert
+   namespace: karpenter

karpenter, validation.webhook.config.karpenter.sh, ValidatingWebhookConfiguration (admissionregistration.k8s.io) has been added:
- 
+ # Source: karpenter/templates/webhooks-core.yaml
+ apiVersion: admissionregistration.k8s.io/v1
+ kind: ValidatingWebhookConfiguration
+ metadata:
+   name: validation.webhook.config.karpenter.sh
+   labels:
+     helm.sh/chart: karpenter-0.37.6
+     app.kubernetes.io/name: karpenter
+     app.kubernetes.io/instance: karpenter
+     app.kubernetes.io/version: "0.37.6"
+     app.kubernetes.io/managed-by: Helm
+ webhooks:
+   - name: validation.webhook.config.karpenter.sh
+     admissionReviewVersions: ["v1"]
+     clientConfig:
+       service:
+         name: karpenter
+         namespace: karpenter
+         port: 8443
+     failurePolicy: Fail
+     sideEffects: None
+     objectSelector:
+       matchLabels:
+         app.kubernetes.io/part-of: karpenter
karpenter, validation.webhook.karpenter.k8s.aws, ValidatingWebhookConfiguration (admissionregistration.k8s.io) has been added:
- 
+ # Source: karpenter/templates/webhooks.yaml
+ apiVersion: admissionregistration.k8s.io/v1
+ kind: ValidatingWebhookConfiguration
+ metadata:
+   name: validation.webhook.karpenter.k8s.aws
+   labels:
+     helm.sh/chart: karpenter-0.37.6
+     app.kubernetes.io/name: karpenter
+     app.kubernetes.io/instance: karpenter
+     app.kubernetes.io/version: "0.37.6"
+     app.kubernetes.io/managed-by: Helm
+ webhooks:
+   - name: validation.webhook.karpenter.k8s.aws
+     admissionReviewVersions: ["v1"]
+     clientConfig:
+       service:
+         name: karpenter
+         namespace: karpenter
+         port: 8443
+     failurePolicy: Fail
+     sideEffects: None
+     rules:
+       - apiGroups:
+           - karpenter.k8s.aws
+         apiVersions:
+           - v1beta1
+         operations:
+           - CREATE
+           - UPDATE
+         resources:
+           - ec2nodeclasses
+           - ec2nodeclasses/status
+         scope: '*'
karpenter, validation.webhook.karpenter.sh, ValidatingWebhookConfiguration (admissionregistration.k8s.io) has been added:
- 
+ # Source: karpenter/templates/webhooks-core.yaml
+ apiVersion: admissionregistration.k8s.io/v1
+ kind: ValidatingWebhookConfiguration
+ metadata:
+   name: validation.webhook.karpenter.sh
+   labels:
+     helm.sh/chart: karpenter-0.37.6
+     app.kubernetes.io/name: karpenter
+     app.kubernetes.io/instance: karpenter
+     app.kubernetes.io/version: "0.37.6"
+     app.kubernetes.io/managed-by: Helm
+ webhooks:
+   - name: validation.webhook.karpenter.sh
+     admissionReviewVersions: ["v1"]
+     clientConfig:
+       service:
+         name: karpenter
+         namespace: karpenter
+         port: 8443
+     failurePolicy: Fail
+     sideEffects: None
+     rules:
+       - apiGroups:
+           - karpenter.sh
+         apiVersions:
+           - v1beta1
+         operations:
+           - CREATE
+           - UPDATE
+         resources:
+           - nodeclaims
+           - nodeclaims/status
+         scope: '*'
+       - apiGroups:
+           - karpenter.sh
+         apiVersions:
+           - v1beta1
+         operations:
+           - CREATE
+           - UPDATE
+         resources:
+           - nodepools
+           - nodepools/status
+         scope: '*'

Comparing release=karpenter-nodepool, chart=charts/karpenter-nodepool
Comparing release=priority-classes, chart=deliveryhero/priority-class
Comparing release=secrets-store-csi-driver, chart=secrets-store-csi-driver/secrets-store-csi-driver
Comparing release=aws-secrets-provider, chart=aws-secrets-manager/secrets-store-csi-driver-provider-aws
Comparing release=kube-state-metrics, chart=prometheus-community/kube-state-metrics
kube-system, kube-state-metrics, ClusterRole (rbac.authorization.k8s.io) has changed:
  # Source: kube-state-metrics/templates/role.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRole
  metadata:
    labels:    
-     helm.sh/chart: kube-state-metrics-5.18.1
+     helm.sh/chart: kube-state-metrics-5.27.0
      app.kubernetes.io/managed-by: Helm
      app.kubernetes.io/component: metrics
      app.kubernetes.io/part-of: kube-state-metrics
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/instance: kube-state-metrics
-     app.kubernetes.io/version: "2.12.0"
+     app.kubernetes.io/version: "2.14.0"
      app.kubernetes.io/component: exporter
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/version: 2.8.2
    name: kube-state-metrics
  rules:

  - apiGroups: ["certificates.k8s.io"]
    resources:
    - certificatesigningrequests
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - configmaps
    verbs: ["list", "watch"]

  - apiGroups: ["batch"]
    resources:
    - cronjobs
    verbs: ["list", "watch"]

  - apiGroups: ["extensions", "apps"]
    resources:
    - daemonsets
    verbs: ["list", "watch"]

  - apiGroups: ["extensions", "apps"]
    resources:
    - deployments
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - endpoints
    verbs: ["list", "watch"]

  - apiGroups: ["autoscaling"]
    resources:
    - horizontalpodautoscalers
    verbs: ["list", "watch"]

  - apiGroups: ["extensions", "networking.k8s.io"]
    resources:
    - ingresses
    verbs: ["list", "watch"]

  - apiGroups: ["batch"]
    resources:
    - jobs
    verbs: ["list", "watch"]

  - apiGroups: ["coordination.k8s.io"]
    resources:
    - leases
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - limitranges
    verbs: ["list", "watch"]

  - apiGroups: ["admissionregistration.k8s.io"]
    resources:
      - mutatingwebhookconfigurations
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - namespaces
    verbs: ["list", "watch"]

  - apiGroups: ["networking.k8s.io"]
    resources:
    - networkpolicies
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - nodes
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - persistentvolumeclaims
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - persistentvolumes
    verbs: ["list", "watch"]

  - apiGroups: ["policy"]
    resources:
      - poddisruptionbudgets
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - pods
    verbs: ["list", "watch"]

  - apiGroups: ["extensions", "apps"]
    resources:
    - replicasets
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - replicationcontrollers
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - resourcequotas
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - secrets
    verbs: ["list", "watch"]

  - apiGroups: [""]
    resources:
    - services
    verbs: ["list", "watch"]

  - apiGroups: ["apps"]
    resources:
    - statefulsets
    verbs: ["list", "watch"]

  - apiGroups: ["storage.k8s.io"]
    resources:
      - storageclasses
    verbs: ["list", "watch"]

  - apiGroups: ["admissionregistration.k8s.io"]
    resources:
      - validatingwebhookconfigurations
    verbs: ["list", "watch"]

  - apiGroups: ["storage.k8s.io"]
    resources:
      - volumeattachments
    verbs: ["list", "watch"]
kube-system, kube-state-metrics, ClusterRoleBinding (rbac.authorization.k8s.io) has changed:
  # Source: kube-state-metrics/templates/clusterrolebinding.yaml
  apiVersion: rbac.authorization.k8s.io/v1
  kind: ClusterRoleBinding
  metadata:
    labels:    
-     helm.sh/chart: kube-state-metrics-5.18.1
+     helm.sh/chart: kube-state-metrics-5.27.0
      app.kubernetes.io/managed-by: Helm
      app.kubernetes.io/component: metrics
      app.kubernetes.io/part-of: kube-state-metrics
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/instance: kube-state-metrics
-     app.kubernetes.io/version: "2.12.0"
+     app.kubernetes.io/version: "2.14.0"
      app.kubernetes.io/component: exporter
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/version: 2.8.2
    name: kube-state-metrics
  roleRef:
    apiGroup: rbac.authorization.k8s.io
    kind: ClusterRole
    name: kube-state-metrics
  subjects:
  - kind: ServiceAccount
    name: kube-state-metrics
    namespace: kube-system
kube-system, kube-state-metrics, Deployment (apps) has changed:
  # Source: kube-state-metrics/templates/deployment.yaml
  apiVersion: apps/v1
  kind: Deployment
  metadata:
    name: kube-state-metrics
    namespace: kube-system
    labels:    
-     helm.sh/chart: kube-state-metrics-5.18.1
+     helm.sh/chart: kube-state-metrics-5.27.0
      app.kubernetes.io/managed-by: Helm
      app.kubernetes.io/component: metrics
      app.kubernetes.io/part-of: kube-state-metrics
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/instance: kube-state-metrics
-     app.kubernetes.io/version: "2.12.0"
+     app.kubernetes.io/version: "2.14.0"
      app.kubernetes.io/component: exporter
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/version: 2.8.2
  spec:
    selector:
      matchLabels:      
        app.kubernetes.io/name: kube-state-metrics
        app.kubernetes.io/instance: kube-state-metrics
    replicas: 1
    strategy:
      type: RollingUpdate
    revisionHistoryLimit: 10
    template:
      metadata:
        labels:        
-         helm.sh/chart: kube-state-metrics-5.18.1
+         helm.sh/chart: kube-state-metrics-5.27.0
          app.kubernetes.io/managed-by: Helm
          app.kubernetes.io/component: metrics
          app.kubernetes.io/part-of: kube-state-metrics
          app.kubernetes.io/name: kube-state-metrics
          app.kubernetes.io/instance: kube-state-metrics
-         app.kubernetes.io/version: "2.12.0"
+         app.kubernetes.io/version: "2.14.0"
          app.kubernetes.io/component: exporter
          app.kubernetes.io/name: kube-state-metrics
          app.kubernetes.io/version: 2.8.2
      spec:
+       automountServiceAccountToken: true
        hostNetwork: false
        serviceAccountName: kube-state-metrics
        securityContext:
          fsGroup: 65534
          runAsGroup: 65534
          runAsNonRoot: true
          runAsUser: 65534
          seccompProfile:
            type: RuntimeDefault
        priorityClassName: system-node-critical
        containers:
        - name: kube-state-metrics
          args:
          - --port=8080
          - --resources=certificatesigningrequests,configmaps,cronjobs,daemonsets,deployments,endpoints,horizontalpodautoscalers,ingresses,jobs,leases,limitranges,mutatingwebhookconfigurations,namespaces,networkpolicies,nodes,persistentvolumeclaims,persistentvolumes,poddisruptionbudgets,pods,replicasets,replicationcontrollers,resourcequotas,secrets,services,statefulsets,storageclasses,validatingwebhookconfigurations,volumeattachments
          imagePullPolicy: IfNotPresent
-         image: registry.k8s.io/kube-state-metrics/kube-state-metrics:v2.12.0
+         image: registry.k8s.io/kube-state-metrics/kube-state-metrics:v2.14.0
          ports:
          - containerPort: 8080
            name: "http"
          livenessProbe:
            failureThreshold: 3
            httpGet:
              httpHeaders:
-             path: /healthz
+             path: /livez
              port: 8080
              scheme: HTTP
            initialDelaySeconds: 5
            periodSeconds: 10
            successThreshold: 1
            timeoutSeconds: 5
          readinessProbe:
            failureThreshold: 3
            httpGet:
              httpHeaders:
-             path: /
-             port: 8080
+             path: /readyz
+             port: 8081
              scheme: HTTP
            initialDelaySeconds: 5
            periodSeconds: 10
            successThreshold: 1
            timeoutSeconds: 5
+         resources:
+           {}
          securityContext:
            allowPrivilegeEscalation: false
            capabilities:
              drop:
              - ALL
            readOnlyRootFilesystem: true
kube-system, kube-state-metrics, Service (v1) has changed:
  # Source: kube-state-metrics/templates/service.yaml
  apiVersion: v1
  kind: Service
  metadata:
    name: kube-state-metrics
    namespace: kube-system
    labels:    
-     helm.sh/chart: kube-state-metrics-5.18.1
+     helm.sh/chart: kube-state-metrics-5.27.0
      app.kubernetes.io/managed-by: Helm
      app.kubernetes.io/component: metrics
      app.kubernetes.io/part-of: kube-state-metrics
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/instance: kube-state-metrics
-     app.kubernetes.io/version: "2.12.0"
+     app.kubernetes.io/version: "2.14.0"
      app.kubernetes.io/component: exporter
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/version: 2.8.2
    annotations:
      prometheus.io/scrape: 'true'
  spec:
    type: "ClusterIP"
    ports:
    - name: "http"
      protocol: TCP
      port: 8080
      targetPort: 8080
    
    selector:    
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/instance: kube-state-metrics
kube-system, kube-state-metrics, ServiceAccount (v1) has changed:
  # Source: kube-state-metrics/templates/serviceaccount.yaml
  apiVersion: v1
  kind: ServiceAccount
+ automountServiceAccountToken: true
  metadata:
    labels:    
-     helm.sh/chart: kube-state-metrics-5.18.1
+     helm.sh/chart: kube-state-metrics-5.27.0
      app.kubernetes.io/managed-by: Helm
      app.kubernetes.io/component: metrics
      app.kubernetes.io/part-of: kube-state-metrics
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/instance: kube-state-metrics
-     app.kubernetes.io/version: "2.12.0"
+     app.kubernetes.io/version: "2.14.0"
      app.kubernetes.io/component: exporter
      app.kubernetes.io/name: kube-state-metrics
      app.kubernetes.io/version: 2.8.2
    name: kube-state-metrics
    namespace: kube-system

Comparing release=blazer, chart=stakater/application
Comparing release=ingress, chart=charts/nginx-ingress
Comparing release=xray-daemon, chart=okgolove/aws-xray

@renovate renovate bot force-pushed the renovate/all-minor branch 16 times, most recently from c317cf3 to 45e2e91 Compare June 5, 2024 16:04
@renovate renovate bot force-pushed the renovate/all-minor branch 20 times, most recently from e383b8e to 0069e39 Compare December 13, 2024 17:03
@renovate renovate bot force-pushed the renovate/all-minor branch 8 times, most recently from eef78f6 to 555318b Compare December 18, 2024 15:12
@renovate renovate bot force-pushed the renovate/all-minor branch from 555318b to f4586b1 Compare December 18, 2024 19:14
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants