You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -75,7 +75,7 @@ See [upgrade docs](./docs/upgrades.md)
75
75
76
76
We publish NGINX Ingress Operator releases on GitHub. See our [releases page](https://github.com/nginxinc/nginx-ingress-helm-operator/releases).
77
77
78
-
The latest stable release is [2.3.0](https://github.com/nginxinc/nginx-ingress-helm-operator/releases/tag/v2.3.0). For production use, we recommend that you choose the latest stable release.
78
+
The latest stable release is [2.3.1](https://github.com/nginxinc/nginx-ingress-helm-operator/releases/tag/v2.3.1). For production use, we recommend that you choose the latest stable release.
2. To deploy the Operator and associated resources to all environments, run:
15
15
16
16
```shell
17
-
make deploy IMG=nginx/nginx-ingress-operator:2.3.0
17
+
make deploy IMG=nginx/nginx-ingress-operator:2.3.1
18
18
```
19
19
20
20
2. Check that the Operator is running:
@@ -30,11 +30,11 @@ This will deploy the operator in the `nginx-ingress-operator-system` namespace.
30
30
31
31
In order to deploy NGINX Ingress Controller instances into OpenShift environments, a new SCC is required to be created on the cluster which will be used to bind the specific required capabilities to the NGINX Ingress service account(s). To do so for NIC deployments, please run the following command (assuming you are logged in with administrator access to the cluster):
Copy file name to clipboardExpand all lines: docs/openshift-installation.md
+2-2Lines changed: 2 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -23,10 +23,10 @@ Additional steps:
23
23
24
24
In order to deploy NGINX Ingress Controller instances into OpenShift environments, a new SCC is required to be created on the cluster which will be used to bind the specific required capabilities to the NGINX Ingress service account(s). To do so for NIC deployments, please run the following command (assuming you are logged in with administrator access to the cluster):
2. Change your working directory to nginx-ingress:
@@ -236,7 +236,7 @@ The steps you should follow depend on the Helm release name:
236
236
Selector: app=nginx-ingress-nginx-ingress
237
237
```
238
238
239
-
2. Checkout the latest available tag using `git checkout v3.6.0`
239
+
2. Checkout the latest available tag using `git checkout v3.6.1`
240
240
241
241
3. Navigate to `/kubernates-ingress/charts/nginx-ingress`
242
242
@@ -288,7 +288,7 @@ reviewing its events:
288
288
Selector: app=<helm_release_name>-nginx-ingress
289
289
```
290
290
291
-
2. Checkout the latest available tag using `git checkout v3.6.0`
291
+
2. Checkout the latest available tag using `git checkout v3.6.1`
292
292
293
293
3. Navigate to `/kubernates-ingress/charts/nginx-ingress`
294
294
@@ -355,7 +355,7 @@ The following tables lists the configurable parameters of the NGINX Ingress Cont
355
355
|`controller.logLevel` | The log level of the Ingress Controller. | 1 |
356
356
|`controller.image.digest` | The image digest of the Ingress Controller. | None |
357
357
|`controller.image.repository` | The image repository of the Ingress Controller. | nginx/nginx-ingress |
358
-
|`controller.image.tag` | The tag of the Ingress Controller image. | 3.6.0 |
358
+
|`controller.image.tag` | The tag of the Ingress Controller image. | 3.6.1 |
359
359
|`controller.image.pullPolicy` | The pull policy for the Ingress Controller image. | IfNotPresent |
360
360
|`controller.lifecycle` | The lifecycle of the Ingress Controller pods. | {} |
361
361
|`controller.customConfigMap` | The name of the custom ConfigMap used by the Ingress Controller. If set, then the default config is ignored. | "" |
@@ -386,7 +386,7 @@ The following tables lists the configurable parameters of the NGINX Ingress Cont
386
386
|`controller.initContainerResources` | The resources of the init container which is used when `readOnlyRootFilesystem` is enabled by either setting `controller.securityContext.readOnlyRootFilesystem` or `controller.readOnlyRootFilesystem`to `true`. | requests: cpu=100m,memory=128Mi |
387
387
|`controller.replicaCount` | The number of replicas of the Ingress Controller deployment. | 1 |
388
388
|`controller.ingressClass.name` | A class of the Ingress Controller. An IngressClass resource with the name equal to the class must be deployed. Otherwise, the Ingress Controller will fail to start. The Ingress Controller only processes resources that belong to its class - i.e. have the "ingressClassName" field resource equal to the class. The Ingress Controller processes all the VirtualServer/VirtualServerRoute/TransportServer resources that do not have the "ingressClassName" field for all versions of Kubernetes. | nginx |
389
-
|`controller.ingressClass.create` | Creates a new IngressClass object with the name `controller.ingressClass.name`. Set to `false` to use an existing ingressClass created using `kubectl` with the same name. If you use `helm upgrade`, do not change the values from the previous release as helm will delete IngressClass objects managed by helm. If you are upgrading from a release earlier than 3.6.0, do not set the value to false. | true |
389
+
|`controller.ingressClass.create` | Creates a new IngressClass object with the name `controller.ingressClass.name`. Set to `false` to use an existing ingressClass created using `kubectl` with the same name. If you use `helm upgrade`, do not change the values from the previous release as helm will delete IngressClass objects managed by helm. If you are upgrading from a release earlier than 3.6.1, do not set the value to false. | true |
390
390
|`controller.ingressClass.setAsDefaultIngress` | New Ingresses without an `"ingressClassName"` field specified will be assigned the class specified in `controller.ingressClass.name`. Requires `controller.ingressClass.create`. | false |
391
391
|`controller.watchNamespace` | Comma separated list of namespaces the Ingress Controller should watch for resources. By default the Ingress Controller watches all namespaces. Mutually exclusive with `controller.watchNamespaceLabel`. Please note that if configuring multiple namespaces using the Helm cli `--set` option, the string needs to wrapped in double quotes and the commas escaped using a backslash - e.g. `--set controller.watchNamespace="default\,nginx-ingress"`. | "" |
392
392
|`controller.watchNamespaceLabel` | Configures the Ingress Controller to watch only those namespaces with label foo=bar. By default the Ingress Controller watches all namespaces. Mutually exclusive with `controller.watchNamespace`. | "" |
0 commit comments