Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Upgrade istio to v1.20.6 #2744

Merged
merged 2 commits into from
Jun 5, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion .github/workflows/kserve_cni_test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ on:
- tests/gh-actions/kind-cluster.yaml
- tests/gh-actions/install_kind.sh
- tests/gh-actions/install_kustomize.sh
- common/istio-cni-1-19/**
- common/istio-cni-1-20/**
- tests/gh-actions/install_cert_manager.sh
- common/cert-manager/**
- tests/gh-actions/install_knative-cni.sh
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/notebook_controller_m2m_test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,7 @@ jobs:
run: ./tests/gh-actions/install_istio_with_ext_auth.sh*

- name: Install kubeflow-istio-resources
run: kustomize build common/istio-1-19/kubeflow-istio-resources/base | kubectl apply -f -
run: kustomize build common/istio-1-20/kubeflow-istio-resources/base | kubectl apply -f -

- name: Install KF Multi Tenancy
run: ./tests/gh-actions/install_multi_tenancy.sh
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/pipeline_test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -49,7 +49,7 @@ jobs:
run: ./tests/gh-actions/install_multi_tenancy.sh

- name: Install kubeflow-istio-resources
run: kustomize build common/istio-1-19/kubeflow-istio-resources/base | kubectl apply -f -
run: kustomize build common/istio-1-20/kubeflow-istio-resources/base | kubectl apply -f -

- name: Create KF Profile
run: kustomize build common/user-namespace/base | kubectl apply -f -
Expand Down
12 changes: 6 additions & 6 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ used from the different projects of Kubeflow:

| Component | Local Manifests Path | Upstream Revision |
| - | - | - |
| Istio | common/istio-1-19 | [1.19.10](https://github.com/istio/istio/releases/tag/1.19.10) |
| Istio | common/istio-1-20 | [1.20.6](https://github.com/istio/istio/releases/tag/1.20.6) |
| Knative | common/knative/knative-serving <br /> common/knative/knative-eventing | [v1.12.4](https://github.com/knative/serving/releases/tag/knative-v1.12.4) <br /> [v1.12.6](https://github.com/knative/eventing/releases/tag/knative-v1.12.6) |
| Cert Manager | common/cert-manager | [1.14.5](https://github.com/cert-manager/cert-manager/releases/tag/v1.12.2) |

Expand Down Expand Up @@ -208,10 +208,10 @@ Install Istio:

```sh
echo "Installing Istio configured with external authorization..."
cd common/istio-1-19
kustomize build common/istio-1-19/istio-crds/base | kubectl apply -f -
kustomize build common/istio-1-19/istio-namespace/base | kubectl apply -f -
kustomize build common/istio-1-19/istio-install/overlays/oauth2-proxy | kubectl apply -f -
cd common/istio-1-20
kustomize build common/istio-1-20/istio-crds/base | kubectl apply -f -
kustomize build common/istio-1-20/istio-namespace/base | kubectl apply -f -
kustomize build common/istio-1-20/istio-install/overlays/oauth2-proxy | kubectl apply -f -

echo "Waiting for all Istio Pods to become ready..."
kubectl wait --for=condition=Ready pods --all -n istio-system --timeout 300s
Expand Down Expand Up @@ -247,7 +247,7 @@ Install Knative Serving:

```sh
kustomize build common/knative/knative-serving/overlays/gateways | kubectl apply -f -
kustomize build common/istio-1-19/cluster-local-gateway/base | kubectl apply -f -
kustomize build common/istio-1-20/cluster-local-gateway/base | kubectl apply -f -
```

Optionally, you can install Knative Eventing which can be used for inference request logging:
Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: docker.io/istio/proxyv2:1.19.10
image: docker.io/istio/proxyv2:1.20.6
name: istio-proxy
ports:
- containerPort: 15020
Expand Down Expand Up @@ -186,7 +186,6 @@ spec:
name: ingressgateway-ca-certs
readOnly: true
securityContext:
fsGroup: 1337
runAsGroup: 1337
runAsNonRoot: true
runAsUser: 1337
Expand Down

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -583,7 +583,7 @@ data:
- "-z"
- {{ .MeshConfig.ProxyInboundListenPort | default "15006" | quote }}
- "-u"
- "1337"
- {{ .ProxyUID | default "1337" | quote }}
- "-m"
- "{{ annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode }}"
- "-i"
Expand Down Expand Up @@ -650,8 +650,8 @@ data:
runAsUser: 0
{{- else }}
readOnlyRootFilesystem: true
runAsGroup: 1337
runAsUser: 1337
runAsGroup: {{ .ProxyGID | default "1337" }}
runAsUser: {{ .ProxyUID | default "1337" }}
runAsNonRoot: true
{{- end }}
{{ end -}}
Expand Down Expand Up @@ -838,11 +838,17 @@ data:
{{- end }}
{{with .Values.global.imagePullPolicy }}imagePullPolicy: "{{.}}"{{end}}
{{ if ne (annotation .ObjectMeta `status.sidecar.istio.io/port` .Values.global.proxy.statusPort) `0` }}
{{ if $nativeSidecar }}
{{ if .Values.global.proxy.startupProbe.enabled }}
startupProbe:
{{ else }}
readinessProbe:
httpGet:
path: /healthz/ready
port: 15021
initialDelaySeconds: 0
periodSeconds: 1
timeoutSeconds: 3
failureThreshold: {{ .Values.global.proxy.startupProbe.failureThreshold }}
{{ end }}
readinessProbe:
httpGet:
path: /healthz/ready
port: 15021
Expand All @@ -861,7 +867,7 @@ data:
- ALL
privileged: true
readOnlyRootFilesystem: {{ ne (annotation .ObjectMeta `sidecar.istio.io/enableCoreDump` .Values.global.proxy.enableCoreDump) "true" }}
runAsGroup: 1337
runAsGroup: {{ .ProxyGID | default "1337" }}
runAsNonRoot: false
runAsUser: 0
{{- else }}
Expand All @@ -880,13 +886,13 @@ data:
- ALL
privileged: {{ .Values.global.proxy.privileged }}
readOnlyRootFilesystem: {{ ne (annotation .ObjectMeta `sidecar.istio.io/enableCoreDump` .Values.global.proxy.enableCoreDump) "true" }}
runAsGroup: 1337
runAsGroup: {{ .ProxyGID | default "1337" }}
{{ if or (eq (annotation .ObjectMeta `sidecar.istio.io/interceptionMode` .ProxyConfig.InterceptionMode) `TPROXY`) (eq (annotation .ObjectMeta `sidecar.istio.io/capNetBindService` .Values.global.proxy.capNetBindService) `true`) -}}
runAsNonRoot: false
runAsUser: 0
{{- else -}}
runAsNonRoot: true
runAsUser: 1337
runAsUser: {{ .ProxyUID | default "1337" }}
{{- end }}
{{- end }}
resources:
Expand Down Expand Up @@ -1040,6 +1046,10 @@ data:
{{ end }}
}
spec:
securityContext:
sysctls:
- name: net.ipv4.ip_unprivileged_port_start
value: "0"
containers:
- name: istio-proxy
{{- if contains "/" .Values.global.proxy.image }}
Expand Down Expand Up @@ -1069,6 +1079,9 @@ data:
lifecycle:
{{ toYaml .Values.global.proxy.lifecycle | indent 6 }}
{{- end }}
securityContext:
runAsUser: {{ .ProxyUID | default "1337" }}
runAsGroup: {{ .ProxyGID | default "1337" }}
env:
- name: JWT_POLICY
value: {{ .Values.global.jwtPolicy }}
Expand Down Expand Up @@ -1715,7 +1728,11 @@ data:
- containerPort: 15090
protocol: TCP
name: http-envoy-prom
image: {{.ProxyImage}}
{{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }}
image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}"
{{- else }}
image: "{{ .ProxyImage }}"
{{- end }}
{{with .Values.global.imagePullPolicy }}imagePullPolicy: "{{.}}"{{end}}
args:
- proxy
Expand Down Expand Up @@ -1789,6 +1806,11 @@ data:
resource: limits.cpu
- name: ISTIO_META_CLUSTER_ID
value: "{{ valueOrDefault .Values.global.multiCluster.clusterName `Kubernetes` }}"
{{- $network := valueOrDefault (index .Labels `topology.istio.io/network`) .Values.global.network }}
{{- if $network }}
- name: ISTIO_META_NETWORK
value: "{{ $network }}"
{{- end }}
- name: ISTIO_META_INTERCEPTION_MODE
value: REDIRECT
- name: ISTIO_META_WORKLOAD_NAME
Expand Down Expand Up @@ -1970,7 +1992,11 @@ data:
serviceAccountName: {{.ServiceAccount | quote}}
containers:
- name: istio-proxy
{{- if contains "/" (annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image) }}
image: "{{ annotation .ObjectMeta `sidecar.istio.io/proxyImage` .Values.global.proxy.image }}"
{{- else }}
image: "{{ .ProxyImage }}"
{{- end }}
{{- if .Values.global.proxy.resources }}
resources:
{{- toYaml .Values.global.proxy.resources | nindent 10 }}
Expand All @@ -1985,8 +2011,8 @@ data:
allowPrivilegeEscalation: false
privileged: false
readOnlyRootFilesystem: true
runAsUser: 1337
runAsGroup: 1337
runAsUser: {{ .ProxyUID | default "1337" }}
runAsGroup: {{ .ProxyGID | default "1337" }}
runAsNonRoot: true
{{- else }}
capabilities:
Expand Down Expand Up @@ -2299,9 +2325,9 @@ data:
"includeOutboundPorts": "",
"logLevel": "warning",
"privileged": false,
"readinessFailureThreshold": 30,
"readinessInitialDelaySeconds": 1,
"readinessPeriodSeconds": 2,
"readinessFailureThreshold": 4,
"readinessInitialDelaySeconds": 0,
"readinessPeriodSeconds": 15,
"resources": {
"limits": {
"cpu": "2000m",
Expand All @@ -2312,6 +2338,10 @@ data:
"memory": "128Mi"
}
},
"startupProbe": {
"enabled": true,
"failureThreshold": 600
},
"statusPort": 15020,
"tracer": "zipkin"
},
Expand All @@ -2327,7 +2357,7 @@ data:
"sts": {
"servicePort": 0
},
"tag": "1.19.10",
"tag": "1.20.6",
"tracer": {
"datadog": {},
"lightstep": {},
Expand Down Expand Up @@ -2631,7 +2661,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: docker.io/istio/proxyv2:1.19.10
image: docker.io/istio/proxyv2:1.20.6
name: istio-proxy
ports:
- containerPort: 15021
Expand Down Expand Up @@ -2694,7 +2724,6 @@ spec:
name: ingressgateway-ca-certs
readOnly: true
securityContext:
fsGroup: 1337
runAsGroup: 1337
runAsNonRoot: true
runAsUser: 1337
Expand Down Expand Up @@ -2812,8 +2841,6 @@ spec:
value: /var/run/secrets/remote/config
- name: PILOT_TRACE_SAMPLING
value: '1'
- name: ISTIOD_ADDR
value: istiod.istio-system.svc:15012
- name: PILOT_ENABLE_ANALYSIS
value: 'false'
- name: CLUSTER_ID
Expand All @@ -2828,7 +2855,7 @@ spec:
resource: limits.cpu
- name: PLATFORM
value: ''
image: docker.io/istio/pilot:1.19.10
image: docker.io/istio/pilot:1.20.6
name: discovery
ports:
- containerPort: 8080
Expand All @@ -2854,9 +2881,7 @@ spec:
drop:
- ALL
readOnlyRootFilesystem: true
runAsGroup: 1337
runAsNonRoot: true
runAsUser: 1337
volumeMounts:
- mountPath: /var/run/secrets/tokens
name: istio-token
Expand All @@ -2875,8 +2900,6 @@ spec:
- mountPath: /var/run/secrets/istiod/ca
name: istio-csr-ca-configmap
readOnly: true
securityContext:
fsGroup: 1337
serviceAccountName: istiod
volumes:
- emptyDir:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ spec:
proxyMetadata: {}
enablePrometheusMerge: true
profile: default
tag: 1.19.10
tag: 1.20.6
values:
base:
enableCRDTemplates: false
Expand Down Expand Up @@ -93,16 +93,19 @@ spec:
includeIPRanges: '*'
logLevel: warning
privileged: false
readinessFailureThreshold: 30
readinessInitialDelaySeconds: 1
readinessPeriodSeconds: 2
readinessFailureThreshold: 4
readinessInitialDelaySeconds: 0
readinessPeriodSeconds: 15
resources:
limits:
cpu: 2000m
memory: 1024Mi
requests:
cpu: 100m
memory: 128Mi
startupProbe:
enabled: true
failureThreshold: 600
statusPort: 15020
tracer: zipkin
proxy_init:
Expand Down
File renamed without changes.
Original file line number Diff line number Diff line change
Expand Up @@ -125,7 +125,7 @@ spec:
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: docker.io/istio/proxyv2:1.19.10
image: docker.io/istio/proxyv2:1.20.6
name: istio-proxy
ports:
- containerPort: 15020
Expand Down Expand Up @@ -186,7 +186,6 @@ spec:
name: ingressgateway-ca-certs
readOnly: true
securityContext:
fsGroup: 1337
runAsGroup: 1337
runAsNonRoot: true
runAsUser: 1337
Expand Down
Loading
Loading