github cilium/cilium v1.14.0-snapshot.2

latest releases: v1.17.0-pre.2, 1.17.0-pre.2, v1.16.3...
pre-release18 months ago

We are pleased to release Cilium v1.14.0-snapshot.2.

Summary of Changes

Major Changes:

  • Add support for references to CiliumCIDRGroup inside FromCIDRSet for ingress rules in CNPs (#24638, @pippolo84)
  • Assume Ingress identity for cluster internal traffic through Cilium Ingress for policy enforcement. (#24826, @jrajahalme)
  • Support DSR with Geneve dispatch in CNI mode (#23890, @ysksuzuki)

Minor Changes:

  • Add --hubble-monitor-events flag, to control the event types that get to the hubble subsystem. (#24828, @epk)
  • Add a mechanism for the SPIRE server to signal rotated certificates for re-authenticating connections (#24300, @meyskens)
  • Add flag to administratively enable APIs on bootstrap (#25009, @joestringer)
  • Add network policy auth method "always-fail" (#24609, @meyskens)
  • Add new logging format option, 'json-ts', for JSON formatted logs with timestamps (#24307, @learnitall)
  • auth: Add spire identity registration for CiliumIdentity (#24471, @sayboras)
  • Change cilium_host IPv6 address, use node router IPv6 instead of native node IPv6, and fixed several relative IPv6 issues. (#24208, @jschwinger233)
  • Cilium L7 Proxy: Envoy config dump contains Cilium network policies (#25028, @mhofstetter)
  • cmd: Add NodeEncryption status to the cilium status command (#24399, @romanspb80)
  • daemon: remove deprecated force-local-policy-eval-at-source option (#24727, @tklauser)
  • Deprecate --tunnel in favor of --routing-mode and --tunnel-protocol. (#24561, @pchaigno)
  • Drop traffic matching an egress gateway policy when no gateway are found (#24835, @MrFreezeex)
  • Enable endpoint routes + veth fast redirect support (#22006, @aspsk)
  • Enable update-ec2-adapter-limit-via-api by default (#24564, @christarazi)
  • Enabled cilium_bpf_map_pressure metric by default (#24721, @Vishal-Chdhry)
  • endpoint: omit pre-1.11 compatibility restoration symlink (#24730, @tklauser)
  • envoy: Bump envoy to v1.25.4 (#24649, @sayboras)
  • envoy: Bump envoy version to v1.25.5 (#24893, @sayboras)
  • envoy: Bump envoy version to v1.25.6 (#25165, @mhofstetter)
  • Expose Cilium agent go runtime scheduler latency prometheus metric go_sched_latencies_seconds (#24745, @derailed)
  • Fix broken IPv6 connectivity from outside to NodePort service when L7 ingress policy applied by removing PROXY_RT route table. (#24882, @jschwinger233)
  • helm: Add CPU panel to Hubble L7 HTTP Workload dashboard (#24934, @chancez)
  • helm: Add SA to nodeinit ds (#24836, @darox)
  • Helm: Clean up deprecated values (#24214, @qmonnet)
  • ingress: Add ownerReferences for shared mode (#24942, @sayboras)
  • Introduce the support for specifying a CA bundle in the helm chart (#24862, @giorio94)
  • ipsec, option: Make the IPsec key rotation delay configurable (#24811, @pchaigno)
  • mtls: SPIRE server and agent installation (#24765, @sayboras)
  • Provides operational state of BGP peers via CLI 'cilium bgp peers' (#24612, @harsimran-pabla)
  • Remove sockops-enable and friends (#23606, @mohit-marathe)
  • Rename the sec_label field in remote_endpoint_info structure to sec_identity (#25057, @ldelossa)
  • Report the kernel error code in case of packet drops due to failures to create conntrack map entries. (#24716, @gentoo-root)
  • Supports IPv4 ICMP "fragmentation needed" in egress SNAT (#25054, @liuyuan10)
  • The Cilium agent now manages the CNI configuration file. This will allow for faster startup times when injecting Cilium as a chained plugin, such as with aws-cni. (#24389, @squeed)

Bugfixes:

  • Address cilium-agent startup performance regression. (#25007, @bimmlerd)
  • bpf: dsr: fix parsing of IPv6 AUTH extension header (#24792, @julianwiedmann)
  • bpf: nodeport: fix up trace point in to-overlay NAT paths (#24886, @julianwiedmann)
  • bpf: policy: fix handling of ICMPv6 packet with extension headers (#24797, @julianwiedmann)
  • Bugfix: Invert --hubble-monitor-events logic to be an allowlist (#25167, @epk)
  • cmd/cleanup: Fix cleanup of generic XDP programs (#25117, @pchaigno)
  • Filter ipv6 advertisements when using metallb as BGP speaker. (#25043, @harsimran-pabla)
  • Fix broken IPv4 connectivity from outside to NodePort service when using L7 ingress policy, by removing PROXY_RT route table. (#24807, @jschwinger233)
  • Fix bug that causes enforcement of host policies on reply IPv6 pod traffic. (#25024, @pchaigno)
  • Fix bug where Cilium configurations running with tunneling disabled, BPF-masq disabled, but with masquerading enabled, do not clean up ipset configuration when a node IP changes. This can lead to a lack of masquerading on those node IPs. (#24825, @christarazi)
  • Fix connectivity issue if nodes share the same name across the clustermesh and wireguard is enabled (#24785, @giorio94)
  • Fix incorrect network policy ebpf setup that may lead to incorrect packets denies when CEP is present in multiple CES (#24838, @alan-kut)
  • Fix issues that caused SPIRE not to install properly (#25160, @meyskens)
  • Fix operator startup delay caused by leader election lease not being released correctly (#24978, @giorio94)
  • Fix panic due to assignment to nil BGP service announcements map. (#24985, @harsimran-pabla)
  • Fix security-group-tags not working in ENI (#24951, @aanm)
  • Fix the bug when long-living connections using egress gateway may be reset. (#24905, @gentoo-root)
  • Fixed bug where L7 rules would be incorrectly merged between rules for the same (remote) endpoint. This bug could have caused L7 rules to be bypassed via a wildcard header rule being improperly appended to the set of HTTP rules when both a policy with HTTP header rules applying to multiple endpoints and an allow-all rule for only one of those endpoints are specified. (#24788, @jrajahalme)
  • gateway-api: Re-queue gateway for namespace change (#24624, @sayboras)
  • Handle leaked service backends that may lead to filling up of lb4_backends map and thereby connectivity issues. (#24681, @aditighag)
  • helm: mandate issuer configuration when using cert-manager to generate certificates (#24666, @giorio94)
  • ipcache don't short-circuit InjectLabels if source differs (#24875, @squeed)
  • ipsec: Clean up stale XFRM policies and states (#24773, @pchaigno)
  • pkg/kvstore: Fix for deadlock in etcd status checker (#24786, @hemanthmalla)
  • Prevent egress gateway from adding and then immediately removing BPF policy entries for policies that don't match any gateway node (#24646, @MrFreezeex)
  • Solve control-plane deadlock issues leading to outages. A typical log line indicative of this issue is probe=l7-proxy msg="No response from probe within 15 seconds" (#24672, @bimmlerd)
  • The operator now reconciles duplicate entries in a CiliumEndpointSlice on startup. (#24596, @alan-kut)

CI Changes:

Misc Changes:

Docker Manifests

cilium

docker.io/cilium/cilium:v1.14.0-snapshot.2@sha256:fb92067c1c5c031ae6a6581ef46c35304acb316850d718470fef58c5571f150b
quay.io/cilium/cilium:v1.14.0-snapshot.2@sha256:fb92067c1c5c031ae6a6581ef46c35304acb316850d718470fef58c5571f150b

clustermesh-apiserver

docker.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.2@sha256:9e06603b72be5eff51930af3cbdd945d0b69f514531ba1569bb4a4b26fad2521
quay.io/cilium/clustermesh-apiserver:v1.14.0-snapshot.2@sha256:9e06603b72be5eff51930af3cbdd945d0b69f514531ba1569bb4a4b26fad2521

docker-plugin

docker.io/cilium/docker-plugin:v1.14.0-snapshot.2@sha256:d99c9216137b52bb40fcfd56ca422702235d61b7375175f3f404169826f79061
quay.io/cilium/docker-plugin:v1.14.0-snapshot.2@sha256:d99c9216137b52bb40fcfd56ca422702235d61b7375175f3f404169826f79061

hubble-relay

docker.io/cilium/hubble-relay:v1.14.0-snapshot.2@sha256:d7bca0ec8e6b0597b11d8ddca4e889fdab0057a0e7dcf4ea8e1faae69c20d5de
quay.io/cilium/hubble-relay:v1.14.0-snapshot.2@sha256:d7bca0ec8e6b0597b11d8ddca4e889fdab0057a0e7dcf4ea8e1faae69c20d5de

operator-alibabacloud

docker.io/cilium/operator-alibabacloud:v1.14.0-snapshot.2@sha256:1c896f17772ea7b37aca9aaab128e63e6598fdb607e54329525705e3f241b1a7
quay.io/cilium/operator-alibabacloud:v1.14.0-snapshot.2@sha256:1c896f17772ea7b37aca9aaab128e63e6598fdb607e54329525705e3f241b1a7

operator-aws

docker.io/cilium/operator-aws:v1.14.0-snapshot.2@sha256:5b07ff515077169459d41f527a5f45327e1a6f2ba41d0a41559ea416a880036e
quay.io/cilium/operator-aws:v1.14.0-snapshot.2@sha256:5b07ff515077169459d41f527a5f45327e1a6f2ba41d0a41559ea416a880036e

operator-azure

docker.io/cilium/operator-azure:v1.14.0-snapshot.2@sha256:8db15e6810d6fc3e1ac54dc4d29caf8c8566ec0c160695312b2540111438e278
quay.io/cilium/operator-azure:v1.14.0-snapshot.2@sha256:8db15e6810d6fc3e1ac54dc4d29caf8c8566ec0c160695312b2540111438e278

operator-generic

docker.io/cilium/operator-generic:v1.14.0-snapshot.2@sha256:ac6e3f6058c2692decba6d8b84f8b505b5b677ead8efc78c1ca234873fb92b63
quay.io/cilium/operator-generic:v1.14.0-snapshot.2@sha256:ac6e3f6058c2692decba6d8b84f8b505b5b677ead8efc78c1ca234873fb92b63

operator

docker.io/cilium/operator:v1.14.0-snapshot.2@sha256:16acb7bb9145dd998a046f3c46fc6ccd3585ae8de2a21f814a1e69bf8bf82874
quay.io/cilium/operator:v1.14.0-snapshot.2@sha256:16acb7bb9145dd998a046f3c46fc6ccd3585ae8de2a21f814a1e69bf8bf82874

Don't miss a new cilium release

NewReleases is sending notifications on new releases.