chore(deps): update helm release eck-operator to v3.4.0 #6528
Reference in New Issue
Block a user
Delete Branch "renovate/unified-eck-operator"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
This PR contains the following updates:
3.3.2→3.4.0Release Notes
elastic/cloud-on-k8s (eck-operator)
v3.4.0Compare Source
Elastic Cloud on Kubernetes 3.4.0
Release Highlights
Elasticsearch client certificate authentication support
ECK now supports configuring Elasticsearch to require client certificates for authentication. This allows you to enforce mutual TLS (mTLS) between clients and Elasticsearch, strengthening security by requiring both the client and server to present valid certificates. Currently, Elasticsearch and Kibana support this feature - Kibana can be configured to present client certificates when connecting to Elasticsearch. Support for the remaining components that connect to Elasticsearch (Beats, Elastic Agent, APM Server, Logstash, and so on) will follow in future releases. For more details, refer to the client certificate authentication documentation.
Rolling restarts of Elasticsearch clusters
ECK now supports triggering rolling restarts of Elasticsearch clusters through a new annotation-based mechanism. This enables operators to gracefully restart all nodes in a cluster without manual intervention, useful for troubleshooting. The rolling restart documentation provides more details.
Simplified zone awareness configuration
ECK simplifies the configuration of zone awareness for Elasticsearch clusters, reducing the amount of boilerplate configuration needed to set up topology-aware allocation. For more details, refer to the zone awareness documentation.
ECK container image signing
ECK container images are now signed using Sigstore cosign. This allows users to verify the authenticity and integrity of ECK operator images before deployment, strengthening the supply chain security of their Kubernetes clusters.
Automatic password-protected keystore for Elasticsearch in FIPS mode
ECK now automatically manages a password-protected keystore for Elasticsearch when FIPS mode is enabled. When
xpack.security.fips_mode.enabledis set totruein the Elasticsearch configuration, the operator generates, stores, and configures a password-protected keystore — eliminating the need for manualpodTemplateoverrides. This feature activates for Elasticsearch 9.4.0+ and respects any existing user-provided keystore password configuration. For more details, refer to the Elasticsearch FIPS keystore password documentation.Features and enhancements
extraObjectssupport to ECK Helm charts #9069kubeAPIServerPortconfiguration option to Helm chart #8980seccompProfiletoRuntimeDefault#9012runAsNonRoottrue for recent versions of EPR #8974Fixes
require_started_replicapredicate #9188TrafficDistribution#8994UpdateReconciledwith Deployment reconciler #9256 (issue: #9246)Documentation improvements
PodTopologyLabelsAdmissionin Elasticsearch sample #9035Dependency updates
Configuration
📅 Schedule: (in timezone America/Chicago)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR has been generated by Mend Renovate.
03a9d4de9cto097339c7de