Skip to content

Instantly share code, notes, and snippets.

@taegyunkim
Created May 13, 2020 05:57
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save taegyunkim/dc00a34934968bd6adf13fb2b5ec1ff9 to your computer and use it in GitHub Desktop.
Save taegyunkim/dc00a34934968bd6adf13fb2b5ec1ff9 to your computer and use it in GitHub Desktop.
Control Plane - citadel pod - istio-citadel-bc69f964d-5gq5d - version: 1.4.6
Control Plane - galley pod - istio-galley-57d74676f6-xkqhb - version: 1.4.6
Control Plane - ingressgateway pod - istio-ingressgateway-6855988795-9dlnk - version: 1.4.6
Control Plane - pilot pod - istio-pilot-b6866b4d9-qqzjc - version: 1.4.6
Control Plane - policy pod - istio-policy-698f74bc98-clj7d - version: 1.4.6
Control Plane - sidecar-injector pod - istio-sidecar-injector-d5485f495-xvt2c - version: 1.4.6
Control Plane - telemetry pod - istio-telemetry-58769bf595-htrtf - version: 1.4.6
Upgrade version check passed: 1.4.6 -> 1.5.2.
proto: tag has too few fields: "-"
Upgrade check: Warning!!! The following IOPS will be changed as part of upgrade. Please double check they are correct:
addonComponents:
certManager: map[enabled:false] ->
grafana:
k8s: -> map[replicaCount:1]
istiocoredns: -> map[enabled:false]
kiali:
k8s: -> map[replicaCount:1]
prometheus:
k8s: -> map[replicaCount:1]
components:
base: -> map[enabled:true]
citadel:
enabled: true -> false
egressGateways:
'[#0]':
k8s:
env: -> [map[name:ISTIO_META_ROUTER_MODE value:sni-dnat]]
service: -> map[ports:[map[name:http2 port:80] map[name:https port:443] map[name:tls
port:15443 targetPort:15443]]]
galley:
enabled: true -> false
ingressGateways:
'[#0]':
k8s:
env: -> [map[name:ISTIO_META_ROUTER_MODE value:sni-dnat]]
service: -> map[ports:[map[name:status-port port:15020 targetPort:15020] map[name:http2
port:80 targetPort:80] map[name:https port:443] map[name:kiali port:15029
targetPort:15029] map[name:prometheus port:15030 targetPort:15030] map[name:grafana
port:15031 targetPort:15031] map[name:tracing port:15032 targetPort:15032]
map[name:tls port:15443 targetPort:15443] map[name:tcp port:31400]]]
pilot:
k8s:
hpaSpec: map[maxReplicas:5 metrics:[map[resource:map[name:cpu targetAverageUtilization:80]
type:Resource]] minReplicas:1 scaleTargetRef:map[apiVersion:apps/v1 kind:Deployment
name:istio-pilot]] ->
readinessProbe:
periodSeconds: 30 -> 5
policy:
enabled: true -> false
sidecarInjector:
enabled: true -> false
telemetry:
enabled: true -> false
installPackagePath: /var/folders/q_/ckq1cjln1m5ftxwslzwrdq0w0000gn/T/istio-install-packages/istio-1.4.6/install/kubernetes/operator
->
values:
certmanager: map[hub:quay.io/jetstack image:cert-manager-controller tag:v0.6.2]
->
gateways:
istio-egressgateway:
env: map[ISTIO_META_ROUTER_MODE:sni-dnat] ->
name: -> istio-egressgateway
ports: '[map[name:http2 port:80] map[name:https port:443] map[name:tls port:15443
targetPort:15443]] ->'
zvpn: map[enabled:true suffix:global] ->
istio-ingressgateway:
env: map[ISTIO_META_ROUTER_MODE:sni-dnat] ->
meshExpansionPorts:
'[?->1]': -> map[name:tcp-istiod port:15012 targetPort:15012]
name: -> istio-ingressgateway
ports: '[map[name:status-port port:15020 targetPort:15020] map[name:http2 port:80
targetPort:80] map[name:https port:443] map[name:kiali port:15029 targetPort:15029]
map[name:prometheus port:15030 targetPort:15030] map[name:grafana port:15031
targetPort:15031] map[name:tracing port:15032 targetPort:15032] map[name:tls
port:15443 targetPort:15443]] ->'
zvpn:
enabled: true -> false
global:
istioNamespace: -> istio-system
istiod: -> map[enabled:true]
jwtPolicy: -> third-party-jwt
mountMtlsCerts: -> false
mtls:
auto: false -> true
pilotCertProvider: -> istiod
sts: -> map[servicePort:0]
tracer:
stackdriver: -> map[debug:false maxNumberOfAnnotations:200 maxNumberOfAttributes:200
maxNumberOfMessageEvents:200]
useMCP: true -> false
grafana:
enabled: false ->
image:
tag: 6.4.3 -> 6.5.2
replicaCount: 1 ->
istiocoredns:
enabled: false ->
kiali:
dashboard:
grafanaInClusterURL: -> http://grafana:3000
jaegerInClusterURL: -> http://tracing/jaeger
enabled: false ->
replicaCount: 1 ->
tag: v1.9 -> v1.15
mixer:
telemetry:
useMCP: true ->
pilot:
ingress:
ingressControllerMode: OFF -> STRICT
useMCP: true ->
prometheus:
enabled: true ->
provisionPrometheusCert: -> true
replicaCount: 1 ->
tag: v2.12.0 -> v2.15.1
security:
trustDomain: cluster.local ->
sidecarInjectorWebhook:
rewriteAppHTTPProbe: false -> true
telemetry:
v1:
enabled: true -> false
v2:
enabled: false -> true
tracing:
enabled: false ->
jaeger:
tag: 1.14 -> 1.16
Confirm to proceed [y/N]? y
2020-05-13T04:27:45.075844Z info Running the following hooks which match source->target versions 1.4.6->1.5.2: istio.io/istio/operator/pkg/hooks.checkInitCrdJobs
2020-05-13T04:27:45.075895Z info Running hook istio.io/istio/operator/pkg/hooks.checkInitCrdJobs
- Applying manifest for component Base...
✔ Finished applying manifest for component Base.
- Applying manifest for component Pilot...
✔ Finished applying manifest for component Pilot.
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
Waiting for resources to become ready...
- Applying manifest for component IngressGateways...
- Applying manifest for component AddonComponents...
✔ Finished applying manifest for component AddonComponents.
✔ Finished applying manifest for component IngressGateways.
✔ Installation complete
Upgrade submitted. Please use `istioctl version` to check the current versions.
To upgrade the Istio data plane, you will need to re-inject it.
If you’re using automatic sidecar injection, you can upgrade the sidecar by doing a rolling update for all the pods:
kubectl rollout restart deployment --namespace <namespace with auto injection>
If you’re using manual injection, you can upgrade the sidecar by executing:
kubectl apply -f < (istioctl kube-inject -f <original application deployment yaml>)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment