Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization

resources:
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.11.3/manifests/install.yaml
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.13.1/manifests/install.yaml

namespace: argocd
labels:
Expand Down
2 changes: 1 addition & 1 deletion gitops/base-install/argocd/ha-install/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization

resources:
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.11.3/manifests/ha/install.yaml
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.13.1/manifests/ha/install.yaml


namespace: argocd
Expand Down
2 changes: 1 addition & 1 deletion gitops/base-install/cert-manager/install.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ spec:
source:
chart: cert-manager
repoURL: https://charts.jetstack.io
targetRevision: 1.14.4
targetRevision: 1.16.2
helm:
releaseName: cert-manager
valuesObject:
Expand Down
2 changes: 1 addition & 1 deletion gitops/base-install/ebs-csi/install.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ spec:
targetRevision: main
- chart: aws-ebs-csi-driver
repoURL: https://kubernetes-sigs.github.io/aws-ebs-csi-driver
targetRevision: 2.31.0
targetRevision: 2.37.0
helm:
# TODO: figure out correct roles for controller vs node
releaseName: aws-ebs-csi-driver
Expand Down
2 changes: 1 addition & 1 deletion gitops/base-install/external-dns/install.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ spec:
source:
chart: external-dns
repoURL: https://charts.bitnami.com/bitnami
targetRevision: 6.28.4
targetRevision: 8.6.0
helm:
releaseName: external-dns
valuesObject:
Expand Down
2 changes: 1 addition & 1 deletion gitops/base-install/ingress-controller/kustomization.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
resources:
- ./resources.yaml
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.10.0/deploy/static/provider/aws/deploy.yaml
- https://raw.githubusercontent.com/kubernetes/ingress-nginx/controller-v1.11.3/deploy/static/provider/aws/deploy.yaml

patches:
- path: overlays/ingress-class-nginx-patch.yaml
Expand Down
2 changes: 1 addition & 1 deletion gitops/base-install/reloader/install.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
source:
repoURL: https://stakater.github.io/stakater-charts
chart: reloader
targetRevision: v1.0.51
targetRevision: v1.2.0
helm:
releaseName: reloader
valuesObject:
Expand Down
2 changes: 1 addition & 1 deletion gitops/components/crossplane/resources.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
source:
chart: crossplane
repoURL: https://charts.crossplane.io/stable
targetRevision: 1.15.2
targetRevision: 1.18.0
helm:
releaseName: crossplane
valuesObject:
Expand Down
2 changes: 1 addition & 1 deletion gitops/components/image-updater/resources.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -16,7 +16,7 @@ spec:
source:
repoURL: https://argoproj.github.io/argo-helm
chart: argocd-image-updater
targetRevision: 0.13.1
targetRevision: 0.15.1
helm:
valuesObject:
# guide: https://github.com/argoproj-labs/argocd-image-updater/issues/112#issuecomment-1058465942
Expand Down
2 changes: 1 addition & 1 deletion gitops/components/s3-csi/resources.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,7 +18,7 @@ spec:
source:
chart: aws-mountpoint-s3-csi-driver
repoURL: https://awslabs.github.io/mountpoint-s3-csi-driver
targetRevision: v1.3.0
targetRevision: v1.10.0
helm:
releaseName: aws-mountpoint-s3-csi-driver
valuesObject:
Expand Down
18 changes: 9 additions & 9 deletions terraform/foundation-stack/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ locals {

module "vpc" {
source = "terraform-aws-modules/vpc/aws"
version = "5.13.0"
version = "5.16.0"
name = var.stack_name
enable_dns_hostnames = "true"
enable_dns_support = "true"
Expand Down Expand Up @@ -84,7 +84,7 @@ module "vpc" {

module "eks" {
source = "terraform-aws-modules/eks/aws"
version = "20.24.3"
version = "20.30.1"
cluster_name = var.stack_name
cluster_version = "1.29"
create = var.stack_create
Expand Down Expand Up @@ -138,7 +138,7 @@ module "eks" {
module "karpenter" {
count = var.stack_create ? 1 : 0
source = "terraform-aws-modules/eks/aws//modules/karpenter"
version = "20.24.3"
version = "20.30.1"
cluster_name = module.eks.cluster_name
enable_irsa = true
enable_pod_identity = false # TODO: PR because it doesn't work in govcloud (-> it works now since 8/24)
Expand All @@ -158,7 +158,7 @@ module "karpenter" {
# IAM roles and policies for the cluster
module "load_balancer_controller_irsa_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.46.0"
version = "5.48.0"

create_role = var.stack_create

Expand All @@ -177,7 +177,7 @@ module "load_balancer_controller_irsa_role" {

module "ebs_csi_driver_irsa_role" {
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.46.0"
version = "5.48.0"

create_role = var.stack_create

Expand All @@ -196,7 +196,7 @@ module "ebs_csi_driver_irsa_role" {

module "s3_csi" {
source = "terraform-aws-modules/s3-bucket/aws"
version = "4.2.1"
version = "4.2.2"
bucket = "${var.stack_tags.Owner}-${var.stack_name}-csi-bucket"

create_bucket = var.s3_csi_driver_create_bucket
Expand All @@ -219,7 +219,7 @@ module "s3_csi" {
module "s3_driver_irsa_role" {
count = var.stack_create ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.46.0"
version = "5.48.0"
create_role = var.stack_create

role_name = "${var.stack_name}-s3-csi-driver-role"
Expand All @@ -239,7 +239,7 @@ module "s3_driver_irsa_role" {
module "external_dns_irsa_role" {
count = var.stack_create ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.46.0"
version = "5.48.0"

create_role = var.stack_create

Expand All @@ -260,7 +260,7 @@ module "external_dns_irsa_role" {
module "cert_manager_irsa_role" {
count = var.stack_create ? 1 : 0
source = "terraform-aws-modules/iam/aws//modules/iam-role-for-service-accounts-eks"
version = "5.46.0"
version = "5.48.0"

create_role = var.stack_create

Expand Down