Releases: linkerd/linkerd2
edge-21.1.2
edge-21.1.2
This edge release continues the work on decoupling non-core Linkerd components.
Commands that use the viz extension i.e, dashboard, edges, routes,
stat, tap and top are moved to the viz sub-command. These commands are still
available under root but are marked as deprecated and will be removed in a
later stable release.
This release also upgrades the proxy's dependencies to the Tokio v1 ecosystem.
- Moved sub-commands that use the viz extension under
viz - Started ignoring pods with
Succeededstatus when watching IP addresses
in destination. This allows the re-use of IPs of terminated pods - Support Bring your own Jaeger use-case by adding
collector.jaegerAddrin
the Jaeger extension. - Fixed an issue with the generation of working manifests in the
podAntiAffinityuse-case - Added support for the modification of proxy resources in the viz
extension throughvalues.yamlin Helm and flags in CLI. - Improved error reporting for port-forward logic with namespace
and pod data, used across dashboard, checks, etc
(thanks @piyushsingariya) - Added support to disable the rendering of
linkerd-viznamespace
resource in the viz extension (thanks @nlamirault) - Made service-profile generation work offline with
--ignore-cluster
flag (thanks @piyushsingariya) - Upgraded the proxy's dependencies to the Tokio v1 ecosystem
stable-2.9.2
Warning: there is a known issue where upgrading to this release with the --prune flag as described in the Linkerd Upgrade documentation will delete certain Linkerd configuration and prevent you from performing any subsequent upgrades. It is highly recommended that you skip this version and instead upgrade directly to stable-2.9.3 or later. If you have already upgraded to this version, you can repair your installation by upgrading your CLI to stable-2.9.3 and using the linkerd repair command.
stable-2.9.2
This stable release fixes an issue that stops traffic to a pod when there is an
IP address conflict with another pod that is not in a running state.
It also fixes an upgrade issue when using HA that would lead to values being
overridden.
edge-21.1.1
edge-21.1.1
This edge release introduces a new "opaque transport" feature that allows the
proxy to securely transport server-speaks-first and otherwise opaque TCP
traffic. Using the config.linkerd.io/opaque-ports annotation on pods and
namespaces, users can configure ports that should skip the proxy's protocol
detection.
Additionally, a new linkerd-viz extension has been introduced that separates
the installation of the Grafana, Prometheus, web, and tap components. This
extension closely follows the Jaeger and multicluster extensions; users can
install and uninstall with the linkerd viz .. command as well as configure
for HA with the --ha flag.
The linkerd viz install command does not have any cli flags to customize the
install directly, but instead follows the Helm way of customization by using
flags such as set, set-string, values, set-files.
Finally, a new /shutdown admin endpoint that may only be accessed over the
loopback network has been added. This allows batch jobs to gracefully terminate
the proxy on completion. The linkerd-await utility can be used to automate
this.
- Added a new
linkerd multicluster checkcommand to validate that the
linkerd-multiclusterextension is working correctly - Fixed description in the
linkerd edgescommand (thanks @jsoref!) - Moved the Grafana, Prometheus, web, and tap components into a new Viz chart,
following the same extension model that multicluster and Jaeger follow - Introduced a new "opaque transport" feature that allows the proxy to securely
transport server-speaks-first and otherwise opaque TCP traffic - Removed the check comparing the
ca.crtfield in the identity issuer secret
and the trust anchors in the Linkerd config; these values being different is
not a failure case for thelinkerd checkcommand (thanks @cypherfox!) - Removed the Prometheus check from the
linkerd checkcommand since it now
depends on a component that is installed with the Viz extension - Fixed error messages thrown by the cert checks in
linkerd check(thanks
@pradeepnnv!) - Added PodDisruptionBudgets to the control plane components so that they cannot
be all terminated at the same time during disruptions (thanks @tustvold!) - Fixed an issue that displayed the wrong
linkerd.io/proxy-versionwhen it is
overridden by annotations (thanks @mateiidavid!) - Added support for custom registries in the
linkerd-vizhelm chart (thanks
@jimil749!) - Renamed
proxy-mutatortojaeger-injectorin thelinkerd-jaegerextension - Added a new
/shutdownadmin endpoint that may only be accessed over the
loopback network allowing batch jobs to gracefully terminate the proxy on
completion - Introduced the
linkerd identitycommand, used to fetch the TLS certificates
for injected pods (thanks @jimil749) - Fixed an issue with the CNI plugin where it was incorrectly terminating and
emitting error events (thanks @mhulscher!) - Re-added support for non-LoadBalancer service types in the
linkerd-multiclusterextension
edge-20.12.4
edge-20.12.4
This edge release adds support for the config.linkerd.io/opaque-ports
annotation on pods and namespaces, to configure ports that should skip the
proxy's protocol detection. In addition, it adds new CLI commands related to the
linkerd-jaeger extension, fixes bugs in the CLI install and upgrade
commands and Helm charts, and fixes a potential false positive in the proxy's
HTTP protocol detection. Finally, it includes improvements in proxy performance
and memory usage, including an upgrade for the proxy's dependency on the Tokio
async runtime.
- Added support for the
config.linkerd.io/opaque-portsannotation on pods and
namespaces, to indicate to the proxy that some ports should skip protocol
detection - Fixed an issue where
linkerd install --hafailed to honor flags - Fixed an issue where
linkerd upgrade --hacan override existing configs - Added missing label to the
linkerd-config-overridessecret to avoid breaking
upgrades performed with the help ofkubectl apply --prune - Added a missing icon to Jaeger Helm chart
- Added new
linkerd jaeger checkCLI command to validate that the
linkerd-jaegerextension is working correctly - Added new
linkerd jaeger uninstallCLI command to print thelinkerd-jaeger
extension's resources so that they can be piped intokubectl delete - Fixed an issue where the
linkerd-cnidaemgitonset may not be installed on all
intended nodes, due to missing tolerations to thelinkerd-cniHelm chart
(thanks @rish-onesignal!) - Fixed an issue where the
tapAPIServer would not refresh its certs
automatically when provided externally—like through cert-manager - Changed the proxy's cache eviction strategy to reduce memory consumption,
especially for busy HTTP/1.1 clients - Fixed an issue in the proxy's HTTP protocol detection which could cause false
positives for non-HTTP traffic - Increased the proxy's default dispatch timeout to 5 seconds to accomodate
connection pools which might open conenctions without immediately making a
request - Updated the proxy's Tokio dependency to v0.3
edge-20.12.3
edge-20.12.3
This edge release is functionally the same as edge-20.12.2. It fixes an issue
that prevented the release build from occurring.
stable-2.9.1
Warning: there is a known issue where upgrading to this release with the --prune flag as described in the Linkerd Upgrade documentation will delete certain Linkerd configuration and prevent you from performing any subsequent upgrades. It is highly recommended that you skip this version and instead upgrade directly to stable-2.9.3 or later. If you have already upgraded to this version, you can repair your installation by upgrading your CLI to stable-2.9.3 and using the linkerd repair command.
stable-2.9.1
This stable release contains a number of proxy enhancements: better support for
high-traffic workloads, improved performance by eliminating unnecessary endpoint
resolutions for TCP traffic and properly tearing down serverside connections
when errors occur, and reduced memory consumption on proxies which maintain many
idle connections (such as Prometheus' proxy).
On the CLI and control plane sides, it relaxes checks on root and intermediate
certificates (following X509 best practices), and fixes two issues: one that
prevented installation of the control plane into a custom namespace and one
which failed to update endpoint information when a headless service was
modified.
-
Proxy:
- Addressed some issues reported around clients seeing max-concurrency errors
by increasing the default in-flight request limit to 100K pending requests - Reduced the default idle connection timeout to 5s for outbound clients and
for inbound clients to reduce the proxy's memory footprint, especially on
Prometheus instances - Fixed an issue where the proxy did not receive updated endpoint information
when a headless service was modified - Added HTTP/2 keepalive PING frames
- Removed logic to avoid redundant TCP endpoint resolution
- Fixed an issue where serverside connections were not torn down when an error
occurred
- Addressed some issues reported around clients seeing max-concurrency errors
-
CLI / Helm / Control Plane:
- Fixed a CLI issue where the
linkerd-namespaceflag was not honored when
passed to theinstallandupgradecommands - Fixed installing HA through the CLI (
linkerd install --ha) that wasn't
honoring some of the default settings found invalues-ha.yml - Force the webhook pods (proxy-injector, sp-validator and tap) to be
restarted when upgrading through the CLI, if a secret they rely on changes - Fixed multicluster installation using Helm (thanks @DaspawnW!)
- Updated
linkerd checkso that it doesn't attempt to validate the subject
alternative name (SAN) on root and intermediate certificates. SANs for leaf
certificates will continue to be validated - Fixed an issue in the destination service where endpoints always included a
protocol hint, regardless of the controller label being present or not - Removed the
getandlogscommand from the CLI - No longer panic in rare cases when
linkerd-configdoesn't have an entry
forGlobalconfigs (thanks @hodbn!)
- Fixed a CLI issue where the
edge-20.12.1
edge-20.12.1
This edge release continues the work of decoupling non-core Linkerd components
by moving more tracing related functionality into the Linkerd-jaeger extension.
- Continued work on moving tracing functionality from the main control plane
into thelinkerd-jaegerextension - Fixed a potential panic in the proxy when looking up a socket's peer address
while under high load - Added automatic readme generation for charts (thanks @GMarkfjard!)
- Fixed zsh completion for the CLI (thanks @jiraguha!)
- Added support for multicluster gateways of types other than LoadBalancer
(thanks @DaspawnW!)
edge-20.11.5
edge-20.11.5
This edge release improves the proxy's support for high-traffic workloads. It also
contains the first steps towards decoupling non-core Linkerd components, the
first iteration being a new linkerd jaeger sub-command for installing tracing.
Please note this is still a work in progress.
- Addressed some issues reported around clients seeing max-concurrency errors by
increasing the default in-flight request limit to 100K pending requests - Have the proxy appropriately set
content-typewhen synthesizing gRPC error
responses - Bumped the
proxy-initimage tov1.3.8which is based off of
buster-20201117-slimto reduce potential security vulnerabilities - No longer panic in rare cases when
linkerd-configdoesn't have an entry for
Globalconfigs (thanks @hodbn!) - Work in progress: the
/jaegerdirectory now contains the charts and commands
for installing the tracing component.
edge-20.11.4
edge-20.11.4
- Fixed an issue in the destination service where endpoints always included a
protocol hint, regardless of the controller label being present or not
edge-20.11.3
edge-20.11.3
This edge release improves support for CNI by properly handling parameters
passed to the nsenter command, relaxes checks on root and intermediate
certificates (following X509 best practices), and fixes two issues: one that
prevented installation of the control plane into a custom namespace and one
which failed to update endpoint information when a headless service is modified.
This release also improves linkerd proxy performance by eliminating unnecessary
endpoint resolutions for TCP traffic and properly tearing down serverside
connections when errors occur.
- Added HTTP/2 keepalive PING frames
- Removed logic to avoid redundant TCP endpoint resolution
- Fixed an issue where serverside connections were not torn down when an error
occurs - Updated
linkerd checkso that it doesn't attempt to validate the subject
alternative name (SAN) on root and intermediate certificates. SANs for leaf
certificates will continue to be validated - Fixed a CLI issue where the
linkerd-namespaceflag is not honored when
passed to theinstallandupgradecommands - Fixed an issue where the proxy does not receive updated endpoint information
when a headless service is modified - Updated the control plane Docker images to use
buster-20201117-slimto
reduce potential security vulnerabilities - Updated the proxy-init container to
v1.3.7which fixes CNI issues in certain
environments by properly parsingnsenterargs