Release Notes
Version 1.2.17
Security fixes
- Fix for CVE-2021-39155
- Fix for CVE-2021-39156
- Fix for CVE-2022-23635
- Fix for CVE-2022-24726
- Fix for CVE-2022-24921
- Fix for CVE-2021-32780
- Fix for CVE-2021-32777
- Fix for CVE-2021-32778
- Fix for CVE-2021-32779
The following CVEs were evaluated and this version of TSB found not to be affected:
- CVE-2021-32780
- CVE-2022-21679
- CVE-2022-21701
- CVE-2022-21657
- CVE-2022-21656
- CVE-2022-23606
- CVE-2021-43826
- CVE-2021-43825
- CVE-2021-43824
- CVE-2022-21654
- CVE-2022-21655
- CVE-2021-32781
Version 1.2.16
Bug fixes
- Allow to set the max gRPC message size in the connections between MPC and XCP central.
- Fixed an error that prevented the control plane observability agents to connect to a mangement plane running with minimum TLS version 1.3.
- Fixed an issue that caused
tctl get all
command to return*AccessBinding
objects within a direct mode group with the wrong metadata.
Version 1.2.15
Security fixes
- Fix for CVE-2021-22569.
- Fix for CVE-2021-44832.
Version 1.2.14
Bug fixes
- Fixed an issue in OAP which was incorrectly identitying outbound traffic.
Security fixes
- Fix for CVE-2021-45105.
Version 1.2.13
Security fixes
- Fix for CVE-2021-45046
Version 1.2.12
Security fixes
- Fix for critical vulnerability (CVE-2021-44228, CVSS score 10) in the Java logging library Apache Log4j 2.
Version 1.2.11
TBA
Version 1.2.10
TBA
Version 1.2.9
TBA
Version 1.2.8
TBA
Version 1.2.7
TBA
Version 1.2.6
TBA
Version 1.2.5
TBA
Version 1.2.4
Features
- Starting from 1.2.4 the MPC component needs a certificate to authenticate with XCP Central using mutual TLS. When upgrading, a certificate
for MPC must be created and stored in a secret named
mpc-certs
. The following example shows how to create the certificate using cert-manager. Note that example certificates can also be created by using thetctl install manifest management-plane-secrets
with the--xcp-certs
flag.
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: mpc-certs
namespace: tsb
spec:
secretName: mpc-certs
issuerRef:
name: xcp-identity-issuer
kind: Issuer
duration: 30000h
isCA: false
dnsNames:
- "mpc.tsb.svc.cluster.local"
uris:
- spiffe://xcp.tetrate.io/mpc
usages:
- client auth
- server auth
Improvements
- Fix an issue in XCP when
Cluster
object becomes bigger than 3MB.
Version 1.2.3
Features
TSB 1.2.3 is a patch release and does not include any new features
Improvements
- Improve DB connection handling to improve performance and decrease the number of used connections.
- Expose new settings in TSB operator for
ManagementPlane
Postgres settings:connection_max_open
to limit the number of open connections to Postgres.connection_idle_max_open
to limit the number of idle connections to Postgres.connection_idle_lifetime
to limit the amount of time an idle connection will be kept open.
Version 1.2.1
TBA
Version 1.2.0
What's New
- We are introducing the Application and API as Alpha features.
- Applications are logical groupings of services that are related to each other, typically within a trusted group. A common example are three tier applications composed of a frontend, a backend and a datastore service.
- Configuring API at Application Ingress Gateway with OpenAPI specs. We added support for configuring CORS, Authentication and Authorization. We will add more configuration in the future.
- This capability is available via tctl. UI will be available in the next release.
- Native Tracing UI as a replacement for the Zipkin Lens UI.
- Organization Settings API to allow configuring network reachability and regional failover.
Improvements
- UI: Ability to view sidecars errors
- UI: Topology offers Circular Layout, Auto Layout, Zoom to fit.
- UI: Context sensitive role selection in policies
- UI: Dashboard - Services view offers subset level metrics
- UI: Auto refresh and partial rendering of UI for graphs and metrics
- Relax virtual service validation so that VirtualServices in TrafficGroup can bound to Gateway in GatewayGroup
- Periodic config sync between xcp central and xcp edges
Bug fixes
- Fix Direct mode gateways not considered load balancer in service registry
- Detect service mesh external change
- Fix error when import YAML with UI
- Fix UI crashing because PassthroughServers are not resolved
- Fix xcp operator crashed when using overlays
- Fix nodeport services not working properly with private node ips
Security fixes
This release fixes the following Envoy security vulnerabilities:
- CVE-2021-28683 (CVSS score 7.5, High): Envoy contains a remotely exploitable NULL pointer dereference and crash in TLS when an unknown TLS alert code is received.
- CVE-2021-28682 (CVSS score 7.5, High): Envoy contains a remotely exploitable integer overflow in which a very large grpc-timeout value leads to unexpected timeout calculations.
- CVE-2021-29258 (CVSS score 7.5, High): Envoy contains a remotely exploitable vulnerability where an HTTP2 request with an empty metadata map can cause Envoy to crash.
Upgrade notes
In this release the SkyWalking version adds some performance improvements for the Elasticsearch storage. For them to apply it is imperative to delete the SkyWalking related Elasticsearch indexes and templates. Please follow the procedure described in the Elasticsearch wipe procedure page to delete the appropriate data from Elasticsearch.
If you are upgrading from a TSB version 1.0.x or higher and you are using XCP's GlobalSettings
to set the reachability between control planes, you need to migrate the GlobalSettings
to the new OrganizationSettings
in TSB.
For instance, a GlobalSettings
like this one:
apiVersion: xcp.tetrate.io/v2
kind: GlobalSetting
metadata:
namespace: tsb
name: xcp-global-settings
spec:
networkSettings:
networkReachability:
tier1: tier2
Would become:
apiVersion: api.tsb.tetrate.io/v2
kind: OrganizationSetting
metadata:
name: org-settings
organization: myorg
spec:
networkSettings:
networkReachability:
tier1: tier2
Note also that whereas GlobalSetting
is applied to the cluster via kubectl
, the OrganizationSetting
need to be applied to the management plane via tctl
. Since this change has to be done after upgrading
to 1.2.0, you can expect a brief network disruption between the management plane upgrade and the creation
of the OrganizationSetting
resource.
Deprecation Notices
These notices describe functionality that will be removed in a future release. Please consider upgrading your environment to remove the deprecated functionality.
- Deprecated the ability to attach VirtualService in a TrafficGroup to a Gateway in a GatewayGroup.
- Traffic Groups and Gateway Groups are independent resources that could have a set of disjoint selectors. When those selectors do not match exactly, configuring ingresses via VirtualServices in traffic groups could lead to configuration inconsistencies, and VirtualServices getting pushed to namespaces or clusters where the gateway objects don't even exist.
- One of the objectives of the TSB APis is to provide configuration safety, and in future releases, the traffic (east/west) and gateway (north/south) semantics will be enforced at the group level to prevent the mentioned misconfiguration issues.
- Deprecated the ability to reference the
mesh
gateway or no gateway at all from VirtualServices in GatewayGroups.- Gateway groups will only allow VirtualServices that configure north/south, and traffic groups will only allow VirtualServices for east/west
Known Issues
- VM Onboarding: If you use an "offline" onboarding flow, i.e. manually copy a
*.tgz
file with security token and seed configuration generated bytctl x sidecar-bootstrap
onto a VM, you must run thebin/start-istio-proxy.sh
script while the security token is still valid (24h
by default). If you run the script after the token expired, Istio Proxy running on the VM will no longer be able to authenticate to the Istio CA and will lose connectivity to the mesh. - VM Onboarding: Istio Proxy installed on a VM always binds to
0.0.0.0:15021
(health status endpoint). If you have other services in the mesh that use port15021
, Istio Proxy running on a VM will not be able to proxy outgoing requests to them. - UI: (6564) Tier1 gateways are not correctly identified as gateway type,
therefore they are not shown in the dashboard's
Gateways
tab. In order to check for Tier1 gateway metrics, you can navigate to theServices
menu and select the corresponding service from the list. Once on the details page, you will find the desired metrics in theDetails
andService metrics
tabs. - Data plane operator: (6002) Removing the last gateway in the cluster is not
working properly. The operator fails to delete the last remaining ingress, tier1
or egress gateway in the cluster. To workadound this you can delete the
IstioOperator
CR namedtsb-gateways
from the data plane operator namespace (kubectl delete istiooperator -n istio-gateway tsb-gateways
).