Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
36 commits
Select commit Hold shift + click to select a range
e2bb9b0
skipper-internal: Update to version v0.22.77-1184
k8s-on-aws-manager-app[bot] Jul 28, 2025
4f82ec3
skipper-internal: Update to version
k8s-on-aws-manager-app[bot] Jul 29, 2025
2fce34b
skipper-internal: Update to version v0.22.78-1185
k8s-on-aws-manager-app[bot] Jul 30, 2025
11a4248
skipper-internal: Update to version v0.22.79-1186
k8s-on-aws-manager-app[bot] Jul 31, 2025
fb5bf7b
skipper-internal: Update to version v0.22.80-1187
k8s-on-aws-manager-app[bot] Aug 4, 2025
23f8a31
skipper-internal: Update to version v0.22.81-1188
k8s-on-aws-manager-app[bot] Aug 4, 2025
db4260c
skipper-internal: Update to version v0.22.82-1189
k8s-on-aws-manager-app[bot] Aug 4, 2025
2857d2b
skipper-internal: Update to version v0.22.83-1190
k8s-on-aws-manager-app[bot] Aug 4, 2025
8c3d169
skipper-internal: Update to version v0.22.84-1191
k8s-on-aws-manager-app[bot] Aug 8, 2025
87b7582
skipper-internal: Update to version v0.22.85-1192
k8s-on-aws-manager-app[bot] Aug 8, 2025
52f20f0
skipper-internal: Update to version v0.22.86-1193
k8s-on-aws-manager-app[bot] Aug 11, 2025
0ec0885
skipper-internal: Update to version v0.22.87-1194
k8s-on-aws-manager-app[bot] Aug 11, 2025
a8f2b86
skipper-internal: Update to version v0.22.88-1195
k8s-on-aws-manager-app[bot] Aug 12, 2025
eef735f
kube-ingress-aws-controller: Update to version v0.18.8
k8s-on-aws-manager-app[bot] Aug 14, 2025
59ec3f4
Merge pull request #9767 from zalando-incubator/926694233939.dkr.ecr.…
linki Aug 19, 2025
3df9b13
Merge dev to dev-to-alpha
k8s-on-aws-manager-app[bot] Aug 19, 2025
e30f838
Merge branch 'dev' into container-registry.zalando.net/teapot/skipper…
vlktna Aug 19, 2025
73f4f57
Merge pull request #9710 from zalando-incubator/container-registry.za…
szuecs Aug 19, 2025
45d7e49
Merge dev to dev-to-alpha
k8s-on-aws-manager-app[bot] Aug 19, 2025
89febaa
Add Log Group with expiring retention period for Control Plane logging
zaklawrencea Aug 21, 2025
3cce1d3
Add dependency for EKS cluster on Contorl Plane log group
zaklawrencea Aug 22, 2025
40ec7ac
Add migration config item to control plane logging depedency
zaklawrencea Aug 22, 2025
a70f7d7
Merge pull request #9777 from zalando-incubator/control-plane-logging…
zaklawrencea Aug 22, 2025
fb8f41b
Merge dev to dev-to-alpha
k8s-on-aws-manager-app[bot] Aug 22, 2025
8d94eca
deploy: polarsignals to skipper-ingress nodes
szuecs Aug 26, 2025
1fedc70
add: privileged serviceaccount for the agent
szuecs Aug 26, 2025
2e389fa
change: labels to application component
szuecs Aug 26, 2025
c1a8e30
fix: image to internal build
szuecs Aug 26, 2025
d12f8b1
Adding playground poweruser policy to deployment services
Aug 26, 2025
b3063ec
updating condition to check only playground cluster
Aug 26, 2025
2e8fb43
Merge pull request #9784 from zalando-incubator/playground-poweruser-…
Anupama-P Aug 26, 2025
0aafd84
Merge dev to dev-to-alpha
k8s-on-aws-manager-app[bot] Aug 26, 2025
7ecfd80
Merge pull request #9783 from zalando-incubator/deploy/polarsignals
szuecs Aug 27, 2025
06b9a3d
Merge dev to dev-to-alpha
k8s-on-aws-manager-app[bot] Aug 27, 2025
5f270e9
Merge pull request #9772 from zalando-incubator/dev-to-alpha
katyanna Aug 27, 2025
ffff3d1
Merge alpha to alpha-to-beta
k8s-on-aws-manager-app[bot] Aug 27, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
21 changes: 21 additions & 0 deletions cluster/cluster.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -158,6 +158,11 @@ Resources:
Type: 'AWS::EC2::SecurityGroup'
EKSCluster:
Type: AWS::EKS::Cluster
{{- if eq .Cluster.ConfigItems.eks_control_plane_logging "true" }}
{{- if eq .Cluster.ConfigItems.eks_control_plane_logging_migration "true" }}
DependsOn: ControlPlaneLogGroup
{{- end }}
{{- end }}
Properties:
Name: "{{.Cluster.Name}}"
Version: "1.32"
Expand Down Expand Up @@ -1535,6 +1540,9 @@ Resources:
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-DenyDefault"
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-AllowPowerUser"
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-AllowPowerUserCustom"
{{- if eq .Cluster.Name "playground" }}
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-AllowPowerUser-Playground"
{{- end }}
RoleName: "{{.Cluster.LocalID}}-deployment"
Type: 'AWS::IAM::Role'
DeploymentServiceBucket:
Expand Down Expand Up @@ -1686,6 +1694,9 @@ Resources:
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-DenyDefault"
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-AllowPowerUser"
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-AllowPowerUserCustom"
{{- if eq .Cluster.Name "playground" }}
- !Sub "arn:aws:iam::${AWS::AccountId}:policy/ZalandoCloud-AllowPowerUser-Playground"
{{- end }}
{{- if eq .Cluster.ConfigItems.deployment_service_ml_experiments_enabled "true"}}
DeploymentControllerMLExperimentDeploymentRole:
Type: AWS::IAM::Role
Expand Down Expand Up @@ -3023,6 +3034,16 @@ Resources:
- BucketArn: !GetAtt AuditTrailBucket.Arn
{{- end }}

{{- if eq .Cluster.ConfigItems.eks_control_plane_logging "true" }}
{{- if eq .Cluster.ConfigItems.eks_control_plane_logging_migration "true" }}
ControlPlaneLogGroup:
Type: AWS::Logs::LogGroup
Properties:
LogGroupName: "/aws/eks/{{.Cluster.LocalID}}/cluster"
RetentionInDays: 545
{{- end }}
{{- end }}

{{- if index .Cluster.ConfigItems "session_manager_destination_arn" }}
SessionManagerLogGroup:
Type: AWS::Logs::LogGroup
Expand Down
7 changes: 6 additions & 1 deletion cluster/config-defaults.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -258,8 +258,12 @@ skipper_pod_deletion_cost_controller_poll_timeout: "60s"
skipper_pod_deletion_cost_controller_resync_enable: "true"
skipper_pod_deletion_cost_controller_resync_interval: "1h"

# polarsignals - only enabled for testing teapot
# polarsignals - only enabled for some clusters
# right now only installed on skipper-ingress nodes
polarsignals_enabled: "false"
polarsignals_apikey: ""
polarsignals_memory: 200Mi
polarsignals_cpu: 50m

# Kube-Metrics-Adapter
## Scheduled scaling metrics: ramp up/down over this period of time
Expand Down Expand Up @@ -1283,6 +1287,7 @@ wiz_node_feature_rollout : "false"

# EKS specific configuration
eks_control_plane_logging: "true"
eks_control_plane_logging_migration: "false"
eks_ip_family: "ipv4"
eks_zalando_iam_aws_proxy_cpu: "100m"
eks_zalando_iam_aws_proxy_memory: "512Mi"
Expand Down
3 changes: 3 additions & 0 deletions cluster/manifests/02-admission-control/config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -125,6 +125,9 @@ data:
{{- if eq .Cluster.ConfigItems.wiz_enable_runtime_sensor "true" }}
pod.pod-security-policy.privileged-service-accounts.wiz_wiz-sensor: ""
{{- end }}
{{- if eq .Cluster.ConfigItems.polarsignals_enabled "true" }}
pod.pod-security-policy.privileged-service-accounts.polarsignals_polarsignals-agent: ""
{{- end }}

pod.pod-security-policy.allowed-restricted-capabilities.AUDIT_WRITE: ""
pod.pod-security-policy.allowed-restricted-capabilities.CHOWN: ""
Expand Down
17 changes: 17 additions & 0 deletions cluster/manifests/deletions.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -30,6 +30,23 @@ post_apply:
namespace: cron
kind: LimitRange
{{ end }}
{{ if ne .Cluster.ConfigItems.polarsignals_enabled "true" }}
- name: polarsignals
namespace: polarsignals
kind: Secret
- name: polarsignals-agent
namespace: polarsignals
kind: DaemonSet
- name: polarsignals-agent
namespace: polarsignals
kind: ServiceAccount
- name: polarsignals-agent
kind: ClusterRole
- name: polarsignals-agent
kind: ClusterRoleBinding
- name: polarsignals
kind: Namespace
{{ end }}
{{ if ne .Cluster.ConfigItems.downscaler_enabled "true" }}
- name: kube-downscaler
namespace: kube-system
Expand Down
2 changes: 1 addition & 1 deletion cluster/manifests/ingress-controller/deployment.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# {{ $image := "926694233939.dkr.ecr.eu-central-1.amazonaws.com/production_namespace/teapot/kube-ingress-aws-controller:v0.18.7" }}
# {{ $image := "926694233939.dkr.ecr.eu-central-1.amazonaws.com/production_namespace/teapot/kube-ingress-aws-controller:v0.18.8" }}
# {{ $version := index (split $image ":") 1 }}

apiVersion: apps/v1
Expand Down
11 changes: 11 additions & 0 deletions cluster/manifests/polarsignals/01-namespace.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
{{ if eq .Cluster.ConfigItems.polarsignals_enabled "true" }}
---
apiVersion: v1
kind: Namespace
metadata:
labels:
pod-security.kubernetes.io/audit: privileged
pod-security.kubernetes.io/enforce: privileged
pod-security.kubernetes.io/warn: privileged
name: polarsignals
{{ end }}
52 changes: 52 additions & 0 deletions cluster/manifests/polarsignals/02-rbac.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,52 @@
{{ if eq .Cluster.ConfigItems.polarsignals_enabled "true" }}
---
apiVersion: v1
kind: ServiceAccount
metadata:
labels:
component: agent
application: polarsignals
name: polarsignals-agent
namespace: polarsignals
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
component: agent
application: polarsignals
name: polarsignals-agent
namespace: polarsignals
rules:
- apiGroups:
- ""
resources:
- pods
verbs:
- list
- watch
- apiGroups:
- ""
resources:
- nodes
verbs:
- get
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
component: agent
application: polarsignals
name: polarsignals-agent
namespace: polarsignals
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: polarsignals-agent
subjects:
- kind: ServiceAccount
name: polarsignals-agent
namespace: polarsignals
---
{{ end }}
117 changes: 117 additions & 0 deletions cluster/manifests/polarsignals/daemonset.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,117 @@
{{ if eq .Cluster.ConfigItems.polarsignals_enabled "true" }}
---
apiVersion: apps/v1
kind: DaemonSet
metadata:
labels:
component: agent
application: polarsignals
name: polarsignals-agent
namespace: polarsignals
annotations:
node-ready.cluster.zalando.org/exclude: "true"
spec:
selector:
matchLabels:
component: agent
application: polarsignals
template:
metadata:
labels:
component: agent
application: polarsignals
spec:
containers:
- args:
- /bin/parca-agent
- --log-level=info
- --node=$(NODE_NAME)
- --http-address=:7071
- --remote-store-address=grpc.polarsignals.com:443
- --remote-store-bearer-token-file=/var/polarsignals-agent/token
- --debuginfo-strip
- --debuginfo-temp-dir=/tmp
- --debuginfo-upload-cache-duration=5m
env:
- name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
image: container-registry.zalando.net/gwproxy/parca-agent:v0.41.0
name: polarsignals-agent
ports:
- containerPort: 7071
name: http
readinessProbe:
httpGet:
path: /ready
port: http
resources:
limits:
cpu: "{{ .Cluster.ConfigItems.polarsignals_cpu}}"
memory: "{{ .Cluster.ConfigItems.polarsignals_memory}}"
requests:
cpu: "{{ .Cluster.ConfigItems.polarsignals_cpu}}"
memory: "{{ .Cluster.ConfigItems.polarsignals_memory}}"
securityContext:
privileged: true
readOnlyRootFilesystem: true
volumeMounts:
- mountPath: /tmp
name: tmp
- mountPath: /run
name: run
- mountPath: /boot
name: boot
readOnly: true
- mountPath: /lib/modules
name: modules
- mountPath: /sys/kernel/debug
name: debugfs
- mountPath: /sys/fs/cgroup
name: cgroup
- mountPath: /sys/fs/bpf
name: bpffs
- mountPath: /var/run/dbus/system_bus_socket
name: dbus-system
- mountPath: /var/polarsignals-agent
name: token
hostPID: true
serviceAccountName: polarsignals-agent
nodeSelector:
kubernetes.io/os: linux
dedicated: skipper-ingress
tolerations:
- effect: NoSchedule
key: dedicated
value: skipper-ingress
- effect: NoExecute
operator: Exists
volumes:
- emptyDir: {}
name: tmp
- hostPath:
path: /run
name: run
- hostPath:
path: /boot
name: boot
- hostPath:
path: /sys/fs/cgroup
name: cgroup
- hostPath:
path: /lib/modules
name: modules
- hostPath:
path: /sys/fs/bpf
name: bpffs
- hostPath:
path: /sys/kernel/debug
name: debugfs
- hostPath:
path: /var/run/dbus/system_bus_socket
name: dbus-system
- secret:
secretName: polarsignals-agent
name: token
{{ end }}
13 changes: 13 additions & 0 deletions cluster/manifests/polarsignals/secret.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
{{ if eq .Cluster.ConfigItems.polarsignals_enabled "true" }}
---
apiVersion: v1
kind: Secret
metadata:
name: polarsignals-agent
namespace: polarsignals
labels:
component: agent
application: polarsignals
stringData:
token: {{ .Cluster.ConfigItems.polarsignals_apikey }}
{{ end }}
2 changes: 1 addition & 1 deletion cluster/manifests/skipper/deployment.yaml
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
{{/* image-updater-bot detects *image variables so use print to disable it for main image */}}

{{ $main_image := print "container-registry.zalando.net/teapot/skipper-internal:" "v0.22.76-1183" }}
{{ $canary_image := "container-registry.zalando.net/teapot/skipper-internal:v0.22.76-1183" }}
{{ $canary_image := "container-registry.zalando.net/teapot/skipper-internal:v0.22.88-1195" }}

{{/* Optional canary arguments separated by "[cf724afc]" to allow whitespaces, e.g. "-foo=has a whitespace[cf724afc]-baz=qux" */}}
{{ $canary_args := "" }}
Expand Down