From 9a2b308ccc895c1ceaedb92f7b946140383c7b89 Mon Sep 17 00:00:00 2001 From: M00nF1sh Date: Thu, 27 Oct 2022 11:02:50 -0700 Subject: [PATCH 1/3] v1.12 Helm chart changes and release manifests --- charts/aws-vpc-cni/Chart.yaml | 4 ++-- charts/aws-vpc-cni/README.md | 1 - charts/aws-vpc-cni/templates/daemonset.yaml | 16 ---------------- charts/aws-vpc-cni/values.yaml | 8 ++------ config/master/aws-k8s-cni-cn.yaml | 19 +++++++------------ config/master/aws-k8s-cni-us-gov-east-1.yaml | 19 +++++++------------ config/master/aws-k8s-cni-us-gov-west-1.yaml | 19 +++++++------------ config/master/aws-k8s-cni.yaml | 19 +++++++------------ config/master/cni-metrics-helper-cn.yaml | 2 +- .../cni-metrics-helper-us-gov-east-1.yaml | 2 +- .../cni-metrics-helper-us-gov-west-1.yaml | 2 +- config/master/cni-metrics-helper.yaml | 2 +- config/master/manifests.jsonnet | 4 +--- 13 files changed, 37 insertions(+), 80 deletions(-) diff --git a/charts/aws-vpc-cni/Chart.yaml b/charts/aws-vpc-cni/Chart.yaml index 1f7c893385..17f2e9b789 100644 --- a/charts/aws-vpc-cni/Chart.yaml +++ b/charts/aws-vpc-cni/Chart.yaml @@ -1,7 +1,7 @@ apiVersion: v1 name: aws-vpc-cni -version: 1.1.21 -appVersion: "v1.11.4" +version: 1.2.0 +appVersion: "v1.12.0" description: A Helm chart for the AWS VPC CNI icon: https://raw.githubusercontent.com/aws/eks-charts/master/docs/logo/aws.png home: https://github.com/aws/amazon-vpc-cni-k8s diff --git a/charts/aws-vpc-cni/README.md b/charts/aws-vpc-cni/README.md index be20c914f1..acdc7f3596 100644 --- a/charts/aws-vpc-cni/README.md +++ b/charts/aws-vpc-cni/README.md @@ -72,7 +72,6 @@ The following table lists the configurable parameters for this chart and their d | `crd.create` | Specifies whether to create the VPC-CNI CRD | `true` | | `tolerations` | Optional deployment tolerations | `[]` | | `updateStrategy` | Optional update strategy | `type: RollingUpdate` | -| `cri.hostPath` | Optional use alternative container runtime | `nil` | Specify each parameter using the `--set key=value[,key=value]` argument to `helm install` or provide a YAML file containing the values for the above parameters: diff --git a/charts/aws-vpc-cni/templates/daemonset.yaml b/charts/aws-vpc-cni/templates/daemonset.yaml index b0f67e0e03..261480ad5c 100644 --- a/charts/aws-vpc-cni/templates/daemonset.yaml +++ b/charts/aws-vpc-cni/templates/daemonset.yaml @@ -99,13 +99,6 @@ spec: {{- end }} - mountPath: /host/var/log/aws-routed-eni name: log-dir -{{- if .Values.cri.hostPath }} - - mountPath: /var/run/cri.sock - name: cri -{{- else }} - - mountPath: /var/run/dockershim.sock - name: dockershim -{{- end }} - mountPath: /var/run/aws-node name: run-dir - mountPath: /run/xtables.lock @@ -124,15 +117,6 @@ spec: - name: cni-config configMap: name: {{ include "aws-vpc-cni.fullname" . }} -{{- end }} -{{- with .Values.cri.hostPath }} - - name: cri - hostPath: - {{- toYaml . | nindent 10 }} -{{- else }} - - name: dockershim - hostPath: - path: /var/run/dockershim.sock {{- end }} - name: log-dir hostPath: diff --git a/charts/aws-vpc-cni/values.yaml b/charts/aws-vpc-cni/values.yaml index 80c3ccd6bd..6b27e94555 100644 --- a/charts/aws-vpc-cni/values.yaml +++ b/charts/aws-vpc-cni/values.yaml @@ -8,7 +8,7 @@ nameOverride: aws-node init: image: - tag: v1.11.4 + tag: v1.12.0 region: us-west-2 account: "602401143452" pullPolicy: Always @@ -23,7 +23,7 @@ init: image: region: us-west-2 - tag: v1.11.4 + tag: v1.12.0 account: "602401143452" domain: "amazonaws.com" pullPolicy: Always @@ -166,7 +166,3 @@ eniConfig: # id: subnet-789 # securityGroups: # - sg-789 - -cri: - hostPath: -# path: /var/run/containerd/containerd.sock diff --git a/config/master/aws-k8s-cni-cn.yaml b/config/master/aws-k8s-cni-cn.yaml index 52b3e04606..e79d355b01 100644 --- a/config/master/aws-k8s-cni-cn.yaml +++ b/config/master/aws-k8s-cni-cn.yaml @@ -9,7 +9,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" --- # Source: aws-vpc-cni/templates/customresourcedefinition.yaml apiVersion: apiextensions.k8s.io/v1 @@ -20,7 +20,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: scope: Cluster group: crd.k8s.amazonaws.com @@ -47,7 +47,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" rules: - apiGroups: - crd.k8s.amazonaws.com @@ -84,7 +84,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -104,7 +104,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: updateStrategy: rollingUpdate: @@ -125,7 +125,7 @@ spec: hostNetwork: true initContainers: - name: aws-vpc-cni-init - image: "961992271922.dkr.ecr.cn-northwest-1.amazonaws.com.cn/amazon-k8s-cni-init:v1.11.4" + image: "961992271922.dkr.ecr.cn-northwest-1.amazonaws.com.cn/amazon-k8s-cni-init:v1.12.0" env: - name: DISABLE_TCP_EARLY_DEMUX value: "false" @@ -143,7 +143,7 @@ spec: {} containers: - name: aws-node - image: "961992271922.dkr.ecr.cn-northwest-1.amazonaws.com.cn/amazon-k8s-cni:v1.11.4" + image: "961992271922.dkr.ecr.cn-northwest-1.amazonaws.com.cn/amazon-k8s-cni:v1.12.0" ports: - containerPort: 61678 name: metrics @@ -227,8 +227,6 @@ spec: name: cni-net-dir - mountPath: /host/var/log/aws-routed-eni name: log-dir - - mountPath: /var/run/dockershim.sock - name: dockershim - mountPath: /var/run/aws-node name: run-dir - mountPath: /run/xtables.lock @@ -240,9 +238,6 @@ spec: - name: cni-net-dir hostPath: path: /etc/cni/net.d - - name: dockershim - hostPath: - path: /var/run/dockershim.sock - name: log-dir hostPath: path: /var/log/aws-routed-eni diff --git a/config/master/aws-k8s-cni-us-gov-east-1.yaml b/config/master/aws-k8s-cni-us-gov-east-1.yaml index 24e94568b8..662d350fc2 100644 --- a/config/master/aws-k8s-cni-us-gov-east-1.yaml +++ b/config/master/aws-k8s-cni-us-gov-east-1.yaml @@ -9,7 +9,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" --- # Source: aws-vpc-cni/templates/customresourcedefinition.yaml apiVersion: apiextensions.k8s.io/v1 @@ -20,7 +20,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: scope: Cluster group: crd.k8s.amazonaws.com @@ -47,7 +47,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" rules: - apiGroups: - crd.k8s.amazonaws.com @@ -84,7 +84,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -104,7 +104,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: updateStrategy: rollingUpdate: @@ -125,7 +125,7 @@ spec: hostNetwork: true initContainers: - name: aws-vpc-cni-init - image: "151742754352.dkr.ecr.us-gov-east-1.amazonaws.com/amazon-k8s-cni-init:v1.11.4" + image: "151742754352.dkr.ecr.us-gov-east-1.amazonaws.com/amazon-k8s-cni-init:v1.12.0" env: - name: DISABLE_TCP_EARLY_DEMUX value: "false" @@ -143,7 +143,7 @@ spec: {} containers: - name: aws-node - image: "151742754352.dkr.ecr.us-gov-east-1.amazonaws.com/amazon-k8s-cni:v1.11.4" + image: "151742754352.dkr.ecr.us-gov-east-1.amazonaws.com/amazon-k8s-cni:v1.12.0" ports: - containerPort: 61678 name: metrics @@ -227,8 +227,6 @@ spec: name: cni-net-dir - mountPath: /host/var/log/aws-routed-eni name: log-dir - - mountPath: /var/run/dockershim.sock - name: dockershim - mountPath: /var/run/aws-node name: run-dir - mountPath: /run/xtables.lock @@ -240,9 +238,6 @@ spec: - name: cni-net-dir hostPath: path: /etc/cni/net.d - - name: dockershim - hostPath: - path: /var/run/dockershim.sock - name: log-dir hostPath: path: /var/log/aws-routed-eni diff --git a/config/master/aws-k8s-cni-us-gov-west-1.yaml b/config/master/aws-k8s-cni-us-gov-west-1.yaml index 04da2e4af6..70468bce16 100644 --- a/config/master/aws-k8s-cni-us-gov-west-1.yaml +++ b/config/master/aws-k8s-cni-us-gov-west-1.yaml @@ -9,7 +9,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" --- # Source: aws-vpc-cni/templates/customresourcedefinition.yaml apiVersion: apiextensions.k8s.io/v1 @@ -20,7 +20,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: scope: Cluster group: crd.k8s.amazonaws.com @@ -47,7 +47,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" rules: - apiGroups: - crd.k8s.amazonaws.com @@ -84,7 +84,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -104,7 +104,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: updateStrategy: rollingUpdate: @@ -125,7 +125,7 @@ spec: hostNetwork: true initContainers: - name: aws-vpc-cni-init - image: "013241004608.dkr.ecr.us-gov-west-1.amazonaws.com/amazon-k8s-cni-init:v1.11.4" + image: "013241004608.dkr.ecr.us-gov-west-1.amazonaws.com/amazon-k8s-cni-init:v1.12.0" env: - name: DISABLE_TCP_EARLY_DEMUX value: "false" @@ -143,7 +143,7 @@ spec: {} containers: - name: aws-node - image: "013241004608.dkr.ecr.us-gov-west-1.amazonaws.com/amazon-k8s-cni:v1.11.4" + image: "013241004608.dkr.ecr.us-gov-west-1.amazonaws.com/amazon-k8s-cni:v1.12.0" ports: - containerPort: 61678 name: metrics @@ -227,8 +227,6 @@ spec: name: cni-net-dir - mountPath: /host/var/log/aws-routed-eni name: log-dir - - mountPath: /var/run/dockershim.sock - name: dockershim - mountPath: /var/run/aws-node name: run-dir - mountPath: /run/xtables.lock @@ -240,9 +238,6 @@ spec: - name: cni-net-dir hostPath: path: /etc/cni/net.d - - name: dockershim - hostPath: - path: /var/run/dockershim.sock - name: log-dir hostPath: path: /var/log/aws-routed-eni diff --git a/config/master/aws-k8s-cni.yaml b/config/master/aws-k8s-cni.yaml index c75d672125..229ead57b3 100644 --- a/config/master/aws-k8s-cni.yaml +++ b/config/master/aws-k8s-cni.yaml @@ -9,7 +9,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" --- # Source: aws-vpc-cni/templates/customresourcedefinition.yaml apiVersion: apiextensions.k8s.io/v1 @@ -20,7 +20,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: scope: Cluster group: crd.k8s.amazonaws.com @@ -47,7 +47,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" rules: - apiGroups: - crd.k8s.amazonaws.com @@ -84,7 +84,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole @@ -104,7 +104,7 @@ metadata: app.kubernetes.io/name: aws-node app.kubernetes.io/instance: aws-vpc-cni k8s-app: aws-node - app.kubernetes.io/version: "v1.11.4" + app.kubernetes.io/version: "v1.12.0" spec: updateStrategy: rollingUpdate: @@ -125,7 +125,7 @@ spec: hostNetwork: true initContainers: - name: aws-vpc-cni-init - image: "602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni-init:v1.11.4" + image: "602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni-init:v1.12.0" env: - name: DISABLE_TCP_EARLY_DEMUX value: "false" @@ -143,7 +143,7 @@ spec: {} containers: - name: aws-node - image: "602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.11.4" + image: "602401143452.dkr.ecr.us-west-2.amazonaws.com/amazon-k8s-cni:v1.12.0" ports: - containerPort: 61678 name: metrics @@ -227,8 +227,6 @@ spec: name: cni-net-dir - mountPath: /host/var/log/aws-routed-eni name: log-dir - - mountPath: /var/run/dockershim.sock - name: dockershim - mountPath: /var/run/aws-node name: run-dir - mountPath: /run/xtables.lock @@ -240,9 +238,6 @@ spec: - name: cni-net-dir hostPath: path: /etc/cni/net.d - - name: dockershim - hostPath: - path: /var/run/dockershim.sock - name: log-dir hostPath: path: /var/log/aws-routed-eni diff --git a/config/master/cni-metrics-helper-cn.yaml b/config/master/cni-metrics-helper-cn.yaml index d22e3bdc0b..5ec0eee9d0 100644 --- a/config/master/cni-metrics-helper-cn.yaml +++ b/config/master/cni-metrics-helper-cn.yaml @@ -64,5 +64,5 @@ spec: - name: USE_CLOUDWATCH value: "true" name: cni-metrics-helper - image: "961992271922.dkr.ecr.cn-northwest-1.amazonaws.com.cn/cni-metrics-helper:v1.11.4" + image: "961992271922.dkr.ecr.cn-northwest-1.amazonaws.com.cn/cni-metrics-helper:v1.12.0" serviceAccountName: cni-metrics-helper diff --git a/config/master/cni-metrics-helper-us-gov-east-1.yaml b/config/master/cni-metrics-helper-us-gov-east-1.yaml index 119675e475..9981dc833a 100644 --- a/config/master/cni-metrics-helper-us-gov-east-1.yaml +++ b/config/master/cni-metrics-helper-us-gov-east-1.yaml @@ -64,5 +64,5 @@ spec: - name: USE_CLOUDWATCH value: "true" name: cni-metrics-helper - image: "151742754352.dkr.ecr.us-gov-east-1.amazonaws.com/cni-metrics-helper:v1.11.4" + image: "151742754352.dkr.ecr.us-gov-east-1.amazonaws.com/cni-metrics-helper:v1.12.0" serviceAccountName: cni-metrics-helper diff --git a/config/master/cni-metrics-helper-us-gov-west-1.yaml b/config/master/cni-metrics-helper-us-gov-west-1.yaml index 009e5a9b5e..5551e525c4 100644 --- a/config/master/cni-metrics-helper-us-gov-west-1.yaml +++ b/config/master/cni-metrics-helper-us-gov-west-1.yaml @@ -64,5 +64,5 @@ spec: - name: USE_CLOUDWATCH value: "true" name: cni-metrics-helper - image: "013241004608.dkr.ecr.us-gov-west-1.amazonaws.com/cni-metrics-helper:v1.11.4" + image: "013241004608.dkr.ecr.us-gov-west-1.amazonaws.com/cni-metrics-helper:v1.12.0" serviceAccountName: cni-metrics-helper diff --git a/config/master/cni-metrics-helper.yaml b/config/master/cni-metrics-helper.yaml index bb96dc48f9..7506e1f9f9 100644 --- a/config/master/cni-metrics-helper.yaml +++ b/config/master/cni-metrics-helper.yaml @@ -64,5 +64,5 @@ spec: - name: USE_CLOUDWATCH value: "true" name: cni-metrics-helper - image: "602401143452.dkr.ecr.us-west-2.amazonaws.com/cni-metrics-helper:v1.11.4" + image: "602401143452.dkr.ecr.us-west-2.amazonaws.com/cni-metrics-helper:v1.12.0" serviceAccountName: cni-metrics-helper diff --git a/config/master/manifests.jsonnet b/config/master/manifests.jsonnet index cc5e44f453..cbfb3cae3b 100644 --- a/config/master/manifests.jsonnet +++ b/config/master/manifests.jsonnet @@ -3,7 +3,7 @@ local objectItems(obj) = [[k, obj[k]] for k in std.objectFields(obj)]; local regions = { default: { - version:: "v1.10.0", // or eg "v1.6.2" + version:: "v1.12.0", // or eg "v1.6.2" ecrRegion:: "us-west-2", ecrAccount:: "602401143452", ecrDomain:: "amazonaws.com", @@ -206,7 +206,6 @@ local awsnode = { {mountPath: "/host/etc/cni/net.d", name: "cni-net-dir"}, {mountPath: "/host/var/log/aws-routed-eni", name: "log-dir"}, {mountPath: "/var/run/aws-node", name: "run-dir"}, - {mountPath: "/var/run/dockershim.sock", name: "dockershim"}, {mountPath: "/run/xtables.lock", name: "xtables-lock"}, ], }, @@ -215,7 +214,6 @@ local awsnode = { volumes: [ {name: "cni-bin-dir", hostPath: {path: "/opt/cni/bin"}}, {name: "cni-net-dir", hostPath: {path: "/etc/cni/net.d"}}, - {name: "dockershim", hostPath: {path: "/var/run/dockershim.sock"}}, {name: "xtables-lock", hostPath: {path: "/run/xtables.lock"}}, {name: "log-dir", hostPath: { From 8036dbee499ca9611eb9c525774f93b36fcbb898 Mon Sep 17 00:00:00 2001 From: M00nF1sh Date: Thu, 27 Oct 2022 13:16:37 -0700 Subject: [PATCH 2/3] update readme for container runtime --- README.md | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/README.md b/README.md index 677d7effe2..bd5ad064d4 100644 --- a/README.md +++ b/README.md @@ -622,16 +622,16 @@ and the kubelet respectively if you are making use of this tag. ### Container Runtime -Currently, IPAMD uses dockershim socket to pull pod sandboxes information upon its starting. The runtime can be set to others. -The mountPath should be changed to `/var/run/cri.sock` and hostPath should be pointed to the wanted socket, such as -`/var/run/containerd/containerd.sock` for containerd. If using helm chart, the flag `--set cri.hostPath.path=/var/run/containerd/containerd.sock` -can set the paths for you. +For VPC CNI >=v1.12.0, IPAMD have switched to use an on-disk file `/var/run/aws-node/ipam.json` to track IP allocations, thus no longer requires access to Container Runtime Interface(CRI). -*Note*: - -* When using a different container runtime instead of dockershim in VPC CNI, make sure kubelet is also configured to use the same CRI. -* If you want to enable containerd runtime with the support provided by Amazon AMI, please follow the instructions in our documentation, [Enable the containerd runtime bootstrap flag](https://docs.aws.amazon.com/eks/latest/userguide/eks-optimized-ami.html#containerd-bootstrap) +For VPC CNI Date: Thu, 27 Oct 2022 13:19:36 -0700 Subject: [PATCH 3/3] update readme for container runtime --- README.md | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index bd5ad064d4..76e25f1a63 100644 --- a/README.md +++ b/README.md @@ -622,8 +622,9 @@ and the kubelet respectively if you are making use of this tag. ### Container Runtime -For VPC CNI >=v1.12.0, IPAMD have switched to use an on-disk file `/var/run/aws-node/ipam.json` to track IP allocations, thus no longer requires access to Container Runtime Interface(CRI). - +For VPC CNI >=v1.12.0, IPAMD have switched to use an on-disk file `/var/run/aws-node/ipam.json` to track IP allocations, thus became container runtime agnostic and no longer requires access to Container Runtime Interface(CRI) socket. + * **Note**: + * Helm chart >=v1.2.0 is released with VPC CNI v1.12.0, thus no longer supports the `cri.hostPath.path`. If you need to install a VPC CNI