Skip to content

Commit

Permalink
Merge pull request #881 from M00nF1sh/v1.1.2
Browse files Browse the repository at this point in the history
cut v1.1.2 release
  • Loading branch information
k8s-ci-robot committed Mar 1, 2019
2 parents e1b352e + 1f8c35f commit cc1c597
Show file tree
Hide file tree
Showing 7 changed files with 15 additions and 15 deletions.
2 changes: 1 addition & 1 deletion Makefile
Expand Up @@ -17,7 +17,7 @@

all: container

TAG?=v1.1.1
TAG?=v1.1.2
PREFIX?=amazon/aws-alb-ingress-controller
ARCH?=amd64
OS?=linux
Expand Down
2 changes: 1 addition & 1 deletion README.md
Expand Up @@ -5,7 +5,7 @@

# AWS ALB Ingress Controller

**NOTE:** The current image version is `v1.1.0`. Please file any issues you find and note the version used.
**NOTE:** The current image version is `v1.1.2`. Please file any issues you find and note the version used.

The AWS ALB Ingress Controller satisfies Kubernetes [ingress resources](https://kubernetes.io/docs/user-guide/ingress) by provisioning [Application Load Balancers](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/introduction.html).

Expand Down
2 changes: 1 addition & 1 deletion docs/examples/alb-ingress-controller.yaml
Expand Up @@ -66,5 +66,5 @@ spec:
#- name: AWS_SECRET_ACCESS_KEY
# value: SECRETVALUE
# Repository location of the ALB Ingress Controller.
image: docker.io/amazon/aws-alb-ingress-controller:v1.1.1
image: docker.io/amazon/aws-alb-ingress-controller:v1.1.2
serviceAccountName: alb-ingress-controller
2 changes: 1 addition & 1 deletion docs/examples/kustomization.yaml
Expand Up @@ -3,7 +3,7 @@ commonLabels:

imageTags:
- name: docker.io/amazon/aws-alb-ingress-controller
newTag: v1.1.1
newTag: v1.1.2

namespace: kube-system

Expand Down
4 changes: 2 additions & 2 deletions docs/guide/controller/setup.md
Expand Up @@ -32,7 +32,7 @@ More docs on [hub.helm.sh](https://hub.helm.sh/charts/incubator/aws-alb-ingress-
### Kubectl
1. Download sample ALB ingress controller manifest
``` bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/alb-ingress-controller.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/alb-ingress-controller.yaml
```

2. Configure the ALB ingress controller manifest
Expand All @@ -50,7 +50,7 @@ More docs on [hub.helm.sh](https://hub.helm.sh/charts/incubator/aws-alb-ingress-
3. Deploy the RBAC roles manifest

```bash
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/rbac-role.yaml
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/rbac-role.yaml
```

4. Deploy the ALB ingress controller manifest
Expand Down
2 changes: 1 addition & 1 deletion docs/guide/external-dns/setup.md
Expand Up @@ -9,7 +9,7 @@ Adequate roles and policies must be configured in AWS and available to the node(
1. Download sample external-dns manifest

``` bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/external-dns.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/external-dns.yaml
```

2. Edit the `--domain-filter` flag to include your hosted zone(s)
Expand Down
16 changes: 8 additions & 8 deletions docs/guide/walkthrough/echoserver.md
Expand Up @@ -43,8 +43,8 @@ In this walkthrough, you'll
1. Download the example alb-ingress-manifest locally.

```bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/alb-ingress-controller.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/rbac-role.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/alb-ingress-controller.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/rbac-role.yaml
```

1. Edit the manifest and set the following parameters and environment variables.
Expand Down Expand Up @@ -100,9 +100,9 @@ In this walkthrough, you'll
1. Deploy all the echoserver resources (namespace, service, deployment)

```bash
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/echoservice/echoserver-namespace.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/echoservice/echoserver-service.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/echoservice/echoserver-deployment.yaml
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/echoservice/echoserver-namespace.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/echoservice/echoserver-service.yaml &&\
kubectl apply -f https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/echoservice/echoserver-deployment.yaml
```

1. List all the resources to ensure they were created.
Expand All @@ -126,7 +126,7 @@ In this walkthrough, you'll
1. Download the echoserver ingress manifest locally.

```bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/echoservice/echoserver-ingress.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/echoservice/echoserver-ingress.yaml
```

1. Configure the subnets, either by add annotation to the ingress or add tags to subnets.
Expand Down Expand Up @@ -235,7 +235,7 @@ In this walkthrough, you'll
1. Download external-dns to manage Route 53.

```bash
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/external-dns.yaml
wget https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/external-dns.yaml
```

1. Edit the `--domain-filter` flag to include your hosted zone(s)
Expand Down Expand Up @@ -306,7 +306,7 @@ In this walkthrough, you'll
follow below steps If you want to use kube2iam to provide the AWS credentials

1. configure the proper policy
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.0/docs/examples/iam-policy.json
The policy to be used can be fetched from https://raw.githubusercontent.com/kubernetes-sigs/aws-alb-ingress-controller/v1.1.2/docs/examples/iam-policy.json

1. configure the proper role and create the trust relationship
You have to find which role is associated woth your K8S nodes. Once you found take note of the full arn:
Expand Down

0 comments on commit cc1c597

Please sign in to comment.