Tetrate Service BridgeVersion: 1.11.x
Release Notes
Version 1.11.0
- In the Service Registry, values previously found in the
ExternalAddresses
andHostnames
fields are now returned in theHostnames
andInternalHostnames
fields, respectively. TheExternalAddresses
field now contains a list of IPs or load balancer hostnames that can be used to reach the service from outside the mesh. - The STRICTER propagation for WASM extensions from all Security Settings has been changed so that it is not accumulative. Instead, the WASM Extension collection applied in a parent resource will overwrite their children's. This is more secure and gives more control to privileged users on the extensions that can be used in the different workspaces.
- By default, new clusters will use LOCAL namespace scoping if no other scope is specified. This default setting is chosen because most use cases do not involve cross-cluster applications. As a result, the service registry will provide a more accurate view of the services within the mesh. Note: You can always update the namespace scoping by modifying the Cluster resource.
- Added a new metric
service_relation_mtls_percentage
for service relation (tcp_service_relation_mtls_percentage
for TCP service relation) to reflect the percentage of calls that use mutual TLS, the percentage is multiplied by 100 and is in range[0, 10000]
, e.g.500
means5.00%
and1234
means12.34%
. - Minimum length is now enforced for the HMAC keys. A key of the same size as the hash output (for instance, 256 bits for "HS256") or larger MUST be used with this algorithm. This requirement is based on Section 5.3.4 (Security Effect of the HMAC Key) of NIST SP 800-117 [NIST.800-107], which states that the effective security strength is the minimum of the security strength of the key and two times the size of the internal hash value.
- This release bumps the Istio version to 1.22. Please check the upgrade notes to understand the implications of the upgrade.
- Added a configuration to set the retention period days for traces data, the default value is 3 days. This can be configured in the ManagementPlane resource:
telemetryStore:
tracesRetentionPeriodDays: 5 - When isolation boundaries are enabled for the first time on an existing TSB install, the
istio-gateway
namespace will not be deleted automatically anymore. If this namespace is not required, users are advised to delete this namespace manually. If it is required to delete this namespace, one needs to cleanup the terminating resources by removing finalizers usingkubectl get iop -n istio-gateway -o name | xargs -I % kubectl patch % -n istio-gateway -p '{"metadata":{"finalizers":null}}' --type=merge;
. After which the namespace can be deleted normally. Read more on isolation boundaries post upgrade cleanup steps. - Enabled automatically refreshing access token using refresh token in OIDC response by default. To toggle this option use
useRefreshToken
option in gateway authentication:authentication:
oidc:
clientId: "example-client"
clientTokenSecret: "example-secret"
redirectUri: http://httpbin.example.com/bearer
provider:
issuer: https://example.com/issuer
authorizationEndpoint: https://example.com/authorize/v1
tokenEndpoint: https://example.com/authorize/v1/token
jwksUri: https://example.com/authorize/v1/jwks
useRefreshToken: false - TSB can run kong plugins as an extension. This needs a sidecar to be injected in TSB called
tetrate-kong-extender
. The image for this sidecar is currently not supported for FIPS mode and will fail to install. Please refer HowTos to know about extending TSB in detail.
Upgrade notes
- If the Management Plane runs on Azure and uses a managed database with Azure AD credentials, you will need to
create an additional federated credential for the new
tsb-n2ac
service account introduced in TSB 1.11. Further details can be found in the Configuring Azure AD with PostgreSQL in TSB guide.