You can upgrade an already running Cluster via the command octops upgrade as shown here.
Features
- An implementation of Envoy's ext_proc (read more here) has been added to allow for implementing arbitrarily complex HTTP request/response header and body modifications. This is extremely useful for many use cases including applying custom rate limiting, AI guardrails, LLM prompt manipulation, DLP and any use case where you would want to modify HTTP requests and responses in an arbitrarily complex way that might include further calls to SaaS APIs (e.g. AI guardrails APIs) and access to external databases. Simply you can now implement an Envoy compliant ext_proc gRPC service and Octelium's Vigil, the identity-aware proxy will act as the ext_proc gRPC client exactly like any Envoy instance. Additionally, Vigil sends the requestContext (i.e. the
ctxmap used in access control and dynamic configuration) for your ext_proc service to provide identity-based, context-aware decisions on a per-request basis. Envoy's ext_proc has (re)-gained traction lately over other solutions such as proxy-wasm since it simply allows you to have arbitrarily complex logic without having to care about the limitations of WASM binaries and runtimes. Documenting this feature will be added soon. octops certcommand has been added. This command is meant to set your Cluster domain TLS certificate instead of having to usekubectlas shown here here.
Improvements
- Secretless access for AWS sigv4 auth is now available for use. Read more here
- Service config inheritance is now available for use. Read more here
- TPM-based Authenticator client-side logic has been implemented. However, it is still not available for use until further testing is made.
- You can now create/update Secrets from stdin by using
-as file path. Here is an example:echo $MY_SECRET | octeliumctl create secret my-secret --file - OCTELIUM_INSECURE_TLSenvironment variable has been added to be used byocteliumandocteliumctlclients to connect to Clusters that are still serving the initial self-signed Cluster domain cert set during the Cluster installation until a real cert signed by a real CA is set. So far this was possible via theOCTELIUM_DEVen var but this is actually used for general debugging and it throws debug logs. You can use the new env var as follows:export OCTELIUM_INSECURE_TLS=true