Skip to content

Commit f701e88

Browse files
committed
Merge remote-tracking branch 'github/mainline' into mainline
2 parents 8a7e032 + 2ba6ccb commit f701e88

File tree

3 files changed

+7
-7
lines changed

3 files changed

+7
-7
lines changed

latest/ug/networking/vpc-add-on-create.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -62,12 +62,12 @@ kubectl get daemonset aws-node -n kube-system -o yaml > aws-k8s-cni-old.yaml
6262
. Create the add-on using the {aws} CLI. If you want to use the {aws-management-console} or `eksctl` to create the add-on, see <<creating-an-add-on>> and specify `vpc-cni` for the add-on name. Copy the command that follows to your device. Make the following modifications to the command, as needed, and then run the modified command.
6363
+
6464
** Replace [.replaceable]`my-cluster` with the name of your cluster.
65-
** Replace [.replaceable]`v1.20.0-eksbuild.1` with the latest version listed in the latest version table for your cluster version. For the latest version table, see <<vpc-cni-latest-available-version>>.
65+
** Replace [.replaceable]`v1.20.1-eksbuild.3` with the latest version listed in the latest version table for your cluster version. For the latest version table, see <<vpc-cni-latest-available-version>>.
6666
** Replace [.replaceable]`111122223333` with your account ID and [.replaceable]`AmazonEKSVPCCNIRole` with the name of an <<cni-iam-role-create-role,existing IAM role>> that you've created. Specifying a role requires that you have an IAM OpenID Connect (OIDC) provider for your cluster. To determine whether you have one for your cluster, or to create one, see <<enable-iam-roles-for-service-accounts>>.
6767
+
6868
[source,bash,subs="verbatim,attributes"]
6969
----
70-
aws eks create-addon --cluster-name my-cluster --addon-name vpc-cni --addon-version v1.20.0-eksbuild.1 \
70+
aws eks create-addon --cluster-name my-cluster --addon-name vpc-cni --addon-version v1.20.1-eksbuild.3 \
7171
--service-account-role-arn {arn-aws}iam::111122223333:role/AmazonEKSVPCCNIRole
7272
----
7373
+
@@ -85,7 +85,7 @@ An example output is as follows.
8585
+
8686
[source,bash,subs="verbatim,attributes"]
8787
----
88-
v1.20.0-eksbuild.1
88+
v1.20.1-eksbuild.3
8989
----
9090
. If you made custom settings to your original add-on, before you created the Amazon EKS add-on, use the configuration that you saved in a previous step to update the EKS add-on with your custom settings. Follow the steps in <<vpc-add-on-update>>.
9191
. (Optional) Install the `cni-metrics-helper` to your cluster. It scrapes elastic network interface and IP address information, aggregates it at a cluster level, and publishes the metrics to Amazon CloudWatch. For more information, see https://github.com/aws/amazon-vpc-cni-k8s/blob/master/cmd/cni-metrics-helper/README.md[cni-metrics-helper] on GitHub.

latest/ug/networking/vpc-add-on-self-managed-update.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -47,7 +47,7 @@ To review the available versions and familiarize yourself with the changes in th
4747
+
4848
[source,bash,subs="verbatim,attributes"]
4949
----
50-
curl -O https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/v1.20.0/config/master/aws-k8s-cni.yaml
50+
curl -O https://raw.githubusercontent.com/aws/amazon-vpc-cni-k8s/v1.20.1/config/master/aws-k8s-cni.yaml
5151
----
5252
+
5353
If necessary, modify the manifest with the custom settings from the backup you made in a previous step and then apply the modified manifest to your cluster. If your nodes don't have access to the private Amazon EKS Amazon ECR repositories that the images are pulled from (see the lines that start with `image:` in the manifest), then you'll have to download the images, copy them to your own repository, and modify the manifest to pull the images from your repository. For more information, see <<copy-image-to-repository>>.
@@ -67,6 +67,6 @@ An example output is as follows.
6767
+
6868
[source,bash,subs="verbatim,attributes"]
6969
----
70-
v1.20.0
70+
v1.20.1
7171
----
7272
. (Optional) Install the `cni-metrics-helper` to your cluster. It scrapes elastic network interface and IP address information, aggregates it at a cluster level, and publishes the metrics to Amazon CloudWatch. For more information, see https://github.com/aws/amazon-vpc-cni-k8s/blob/master/cmd/cni-metrics-helper/README.md[cni-metrics-helper] on GitHub.

latest/ug/networking/vpc-add-on-update.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -38,7 +38,7 @@ kubectl get daemonset aws-node -n kube-system -o yaml > aws-k8s-cni-old.yaml
3838
+
3939
[source,bash,subs="verbatim,attributes"]
4040
----
41-
aws eks update-addon --cluster-name my-cluster --addon-name vpc-cni --addon-version v1.20.0-eksbuild.1 \
41+
aws eks update-addon --cluster-name my-cluster --addon-name vpc-cni --addon-version v1.20.1-eksbuild.3 \
4242
--service-account-role-arn {arn-aws}iam::111122223333:role/AmazonEKSVPCCNIRole \
4343
--resolve-conflicts PRESERVE --configuration-values '{"env":{"AWS_VPC_K8S_CNI_EXTERNALSNAT":"true"}}'
4444
----
@@ -62,7 +62,7 @@ An example output is as follows.
6262
"addonName": "vpc-cni",
6363
"clusterName": "my-cluster",
6464
"status": "ACTIVE",
65-
"addonVersion": "v1.20.0-eksbuild.1",
65+
"addonVersion": "v1.20.1-eksbuild.3",
6666
"health": {
6767
"issues": []
6868
},

0 commit comments

Comments
 (0)