Skip to content

Commit 27884b4

Browse files
Merge pull request #283236 from JnHs/jh-arck8-flux1111
Flux 1.11.1
2 parents 3ced551 + f761189 commit 27884b4

File tree

2 files changed

+37
-16
lines changed

2 files changed

+37
-16
lines changed

articles/azure-arc/kubernetes/extensions-release.md

Lines changed: 19 additions & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "Available extensions for Azure Arc-enabled Kubernetes clusters"
3-
ms.date: 06/12/2024
3+
ms.date: 08/01/2024
44
ms.topic: how-to
55
description: "See which extensions are currently available for Azure Arc-enabled Kubernetes clusters and view release notes."
66
---
@@ -132,22 +132,26 @@ The most recent version of the Flux v2 extension and the two previous versions (
132132
> [!NOTE]
133133
> When a new version of the `microsoft.flux` extension is released, it may take several days for the new version to become available in all regions.
134134
135-
### 1.10.0 (June 2024)
135+
### 1.11.1 (August 2024)
136136

137-
Flux version: [Release v2.1.2](https://github.com/fluxcd/flux2/releases/tag/v2.1.2)
137+
Flux version: [Release v2.3.0](https://github.com/fluxcd/flux2/releases/tag/v2.3.0)
138138

139-
- source-controller: v1.2.5
140-
- kustomize-controller: v1.1.1
141-
- helm-controller: v0.36.2
142-
- notification-controller: v1.1.0
143-
- image-automation-controller: v0.36.1
144-
- image-reflector-controller: v0.30.0
139+
- source-controller: v1.3.0
140+
- kustomize-controller: v1.3.0
141+
- helm-controller: v1.0.1
142+
- notification-controller: v1.3.0
143+
- image-automation-controller: v0.32.1
144+
- image-reflector-controller: v0.38.0
145145

146146
Changes made for this version:
147147

148-
- The `FluxConfig` custom resource now includes support for [OCI repositories](https://fluxcd.io/flux/components/source/ocirepositories/). This enhancement means that Flux configurations can accommodate Git repository, Buckets, Azure Blob storage, or OCI repository as valid source types.
148+
- Update flux OSS controllers.
149+
- Resolved the continuous restart issue of the Fluent Bit sidecar in `fluxconfig-agent` and `fluxconfig-controller`.
150+
- Addressed security vulnerabilities in `fluxconfig-agent` and `fluxconfig-controller` by updating the Go packages.
151+
- Enabled workload identity for the Kustomize controller. For setup instructions, see [Workload identity in AKS clusters](/azure/azure-arc/kubernetes/tutorial-use-gitops-flux2#workload-identity-in-aks-clusters).
152+
- Flux controller pods can now set the annotation `kubernetes.azure.com/set-kube-service-host-fqdn` in their pod specifications. This allows traffic to the API Server's domain name even when a Layer 7 firewall is present, facilitating deployments during extension installation. For more details, see [Configure annotation on Flux extension pods](/azure/azure-arc/kubernetes/tutorial-use-gitops-flux2#configure-annotation-on-flux-extension-pods).
149153

150-
### 1.9.1 (April 2024)
154+
### 1.10.0 (June 2024)
151155

152156
Flux version: [Release v2.1.2](https://github.com/fluxcd/flux2/releases/tag/v2.1.2)
153157

@@ -160,10 +164,9 @@ Flux version: [Release v2.1.2](https://github.com/fluxcd/flux2/releases/tag/v2.1
160164

161165
Changes made for this version:
162166

163-
- The log-level parameters for controllers (including `fluxconfig-agent` and `fluxconfig-controller`) are now customizable. For more information, see [Configurable log-level parameters](tutorial-use-gitops-flux2.md#configurable-log-level-parameters).
164-
- Helm chart changes to expose new SSH host key algorithm to connect to Azure DevOps. For more information, see [Azure DevOps SSH-RSA deprecation](tutorial-use-gitops-flux2.md#azure-devops-ssh-rsa-deprecation).
167+
- The `FluxConfig` custom resource now includes support for [OCI repositories](https://fluxcd.io/flux/components/source/ocirepositories/). This enhancement means that Flux configurations can accommodate Git repository, Buckets, Azure Blob storage, or OCI repository as valid source types.
165168

166-
### 1.8.4 (April 2024)
169+
### 1.9.1 (April 2024)
167170

168171
Flux version: [Release v2.1.2](https://github.com/fluxcd/flux2/releases/tag/v2.1.2)
169172

@@ -176,7 +179,8 @@ Flux version: [Release v2.1.2](https://github.com/fluxcd/flux2/releases/tag/v2.1
176179

177180
Changes made for this version:
178181

179-
- Updated source-controller to v1.2.5 [to address security vulnerability](https://github.com/advisories/GHSA-v554-xwgw-hc3w)
182+
- The log-level parameters for controllers (including `fluxconfig-agent` and `fluxconfig-controller`) are now customizable. For more information, see [Configurable log-level parameters](tutorial-use-gitops-flux2.md#configurable-log-level-parameters).
183+
- Helm chart changes to expose new SSH host key algorithm to connect to Azure DevOps. For more information, see [Azure DevOps SSH-RSA deprecation](tutorial-use-gitops-flux2.md#azure-devops-ssh-rsa-deprecation).
180184

181185
## Dapr extension for Azure Kubernetes Service (AKS) and Arc-enabled Kubernetes
182186

articles/azure-arc/kubernetes/tutorial-use-gitops-flux2.md

Lines changed: 18 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Tutorial: Deploy applications using GitOps with Flux v2"
33
description: "This tutorial shows how to use GitOps with Flux v2 to manage configuration and application deployment in Azure Arc and AKS clusters."
4-
ms.date: 05/29/2024
4+
ms.date: 08/01/2024
55
ms.topic: tutorial
66
ms.custom: template-tutorial, devx-track-azurecli, references_regions
77
---
@@ -618,6 +618,20 @@ az k8s-extension update --cluster-name <cluster-name> --resource-group <resource
618618

619619
For more information on Azure DevOps SSH-RSA deprecation, see [End of SSH-RSA support for Azure Repos](https://aka.ms/ado-ssh-rsa-deprecation).
620620

621+
### Configure annotation on Flux extension pods
622+
623+
When configuring a solution other than Azure Firewall, [network and FQDN/application rules](/azure/aks/outbound-rules-control-egress#required-outbound-network-rules-and-fqdns-for-aks-clusters) are required for an AKS cluster. Starting with [`microsoft.flux` v1.11.1](extensions-release.md#flux-gitops), Flux controller pods can now set the annotation `kubernetes.azure.com/set-kube-service-host-fqdn` in their pod specifications. This allows traffic to the API Server's domain name even when a Layer 7 firewall is present, facilitating deployments during extension installation. To configure this annotation when using the Flux extension, use the following commands.
624+
625+
```azurecli
626+
# Create flux extension with annotation
627+
628+
az k8s-extension create --resource-group <resource-group> --cluster-name <cluster-name> --cluster-type <cluster-type> --name flux --extension-type microsoft.flux --config setKubeServiceHostFqdn=true
629+
630+
# Update flux extension with annotation
631+
632+
az k8s-extension update --resource-group <resource-group> --cluster-name <cluster-name> --cluster-type <cluster-type> --name flux --config setKubeServiceHostFqdn=true
633+
```
634+
621635
### Workload identity in AKS clusters
622636

623637
Starting with [`microsoft.flux` v1.8.0](extensions-release.md#flux-gitops), you can create Flux configurations in [AKS clusters with workload identity enabled](/azure/aks/workload-identity-deploy-cluster). To do so, modify the flux extension as shown in the following steps.
@@ -638,6 +652,9 @@ Starting with [`microsoft.flux` v1.8.0](extensions-release.md#flux-gitops), you
638652
639653
# For image-reflector controller if you plan to enable it during extension creation, it is not deployed by default
640654
az identity federated-credential create --name ${FEDERATED_IDENTITY_CREDENTIAL_NAME} --identity-name "${USER_ASSIGNED_IDENTITY_NAME}" --resource-group "${RESOURCE_GROUP}" --issuer "${AKS_OIDC_ISSUER}" --subject system:serviceaccount:"flux-system":"image-reflector-controller" --audience api://AzureADTokenExchange
655+
656+
# For kustomize-controller
657+
az identity federated-credential create --name ${FEDERATED_IDENTITY_CREDENTIAL_NAME} --identity-name "${USER_ASSIGNED_IDENTITY_NAME}" --resource-group "${RESOURCE_GROUP}" --issuer "${AKS_OIDC_ISSUER}" --subject system:serviceaccount:"flux-system":"kustomize-controller" --audience api://AzureADTokenExchange
641658
```
642659

643660
1. Make sure the custom resource that needs to use workload identity sets `.spec.provider` value to `azure` in the manifest. For example:

0 commit comments

Comments
 (0)