Isolation Segment v2.11 Release Notes

Page last updated:

This topic contains release notes for Isolation Segment v2.11.

Because VMware uses the Percona Distribution for MySQL, expect a time lag between Oracle releasing a MySQL patch and VMware releasing TAS for VMs containing that patch.


Releases

v2.11.27

Release Date: 01/31/2023

  • Bump cf-networking to version 3.19.0
  • Bump cflinuxfs3 to version 0.350.0
  • Bump garden-runc to version 1.22.9
  • Bump routing to version 0.254.0
  • Bump silk to version 3.19.0
Component Version Release Notes
ubuntu-xenial stemcell621.376
bpm1.1.21
cf-networking3.19.0
cflinuxfs30.350.0
diego2.71.0
garden-runc1.22.9
haproxy9.8.0
loggregator-agent6.5.6
mapfs1.2.12
metrics-discovery3.2.4
nfs-volume5.0.20
routing0.254.0
v0.254.0
  ✨ Built with go 1.19.5
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.253.0...v0.254.0
          
v0.253.0
  ## What's Changed
  * Specs to make maxRetries configurable for endpoints and route-services by @domdom82 in https://github.com/cloudfoundry/routing-release/pull/298
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.252.0...v0.253.0
          
silk3.19.0
smb-volume3.1.6
smoke-tests4.8.2
syslog11.8.6

v2.11.26

Release Date: 01/17/2023

  • Bump cf-networking to version 3.17.0
  • Bump cflinuxfs3 to version 0.347.0
  • Bump diego to version 2.71.0
  • Bump garden-runc to version 1.22.7
  • Bump loggregator-agent to version 6.5.6
  • Bump routing to version 0.252.0
  • Bump silk to version 3.17.0
  • Bump smoke-tests to version 4.8.2
Component Version Release Notes
ubuntu-xenial stemcell621.364
bpm1.1.21
cf-networking3.17.0
cflinuxfs30.347.0
diego2.71.0
garden-runc1.22.7
haproxy9.8.0
loggregator-agent6.5.6
v6.5.6
  ## What's Changed
  * fix scraping with non-positive intervals to preserve non-scraping behavior by @Benjamintf1 in https://github.com/cloudfoundry/loggregator-agent-release/pull/174
  * updated some dependencies.
  **Full Changelog**: https://github.com/cloudfoundry/loggregator-agent-release/compare/v6.5.5...v6.5.6
          
mapfs1.2.12
metrics-discovery3.2.4
nfs-volume5.0.20
routing0.252.0
v0.252.0
  ## What's Changed
  - Improve random source for least connection pool to be thread safe. Thanks Daniel Lynch!
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.251.0...v0.252.0
          
silk3.17.0
smb-volume3.1.6
smoke-tests4.8.2
4.8.2
  Port assets/ruby_simple to Ruby 3
          
syslog11.8.6

v2.11.25

Release Date: 12/15/2022

  • [Security Fix] Fix CVE-2022-31733: Unsecured Application Port
  • Bump bpm to version 1.1.21
  • Bump cf-networking to version 3.16.0
  • Bump cflinuxfs3 to version 0.345.0
  • Bump diego to version 2.70.0
  • Bump loggregator-agent to version 6.5.5
  • Bump metrics-discovery to version 3.2.4
  • Bump routing to version 0.251.0
  • Bump silk to version 3.16.0
  • Bump syslog to version 11.8.6
Component Version Release Notes
ubuntu-xenial stemcell621.364
bpm1.1.21
cf-networking3.16.0
cflinuxfs30.345.0
diego2.70.0
garden-runc1.22.5
haproxy9.8.0
loggregator-agent6.5.5
v6.5.5
  - bump-golang to v0.114.0 for golang 1.19.4
  - Bump google.golang.org/grpc from 1.50.1 to 1.51.0 in /src
  - Bump github.com/valyala/fasthttp from 1.41.0 to 1.43.0 in /src
  - Bump github.com/onsi/ginkgo/v2 from 2.5.0 to 2.5.1 in /src
  - Bump github.com/onsi/gomega from 1.24.0 to 1.24.1 in /src
  - Bump github.com/prometheus/client_model from 0.2.0 to 0.3.0 in /src
  - Bump golangci/golangci-lint-action from 3.3.0 to 3.3.1
          
mapfs1.2.12
metrics-discovery3.2.4
v3.2.4
  - bump-golang to v0.114.0 for golang 1.19.4
  - Bump github.com/nats-io/nats.go from 1.19.0 to 1.21.0 in /src
  - Bump google.golang.org/grpc from 1.50.1 to 1.51.0 in /src
  - Bump github.com/onsi/ginkgo/v2 from 2.5.0 to 2.5.1 in /src
  - Bump github.com/prometheus/client_golang from 1.13.1 to 1.14.0 in /src
  - Bump github.com/onsi/gomega from 1.24.0 to 1.24.1 in /src
  - Bump golangci/golangci-lint-action from 3.3.0 to 3.3.1
          
nfs-volume5.0.20
routing0.251.0
v0.251.0
  ## What's Changed
  - When the `router.ca_certs` property switched from a multi-line string of certs, to an array of certs, gorouter started failing to start up if any of the certs provided were invalid. Previously they were ignored. This has been reverted, so that any invalid CA certs are ignored during startup. Thanks @ameowlia!
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.250.0...v0.251.0
          
v0.250.0
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.249.0...v0.250.0
  ## ✨  Built with go 1.19.4
          
v0.249.0
  ## What's Changed
  * Switch to healthecker package in cf-networking-helpers by @mariash in https://github.com/cloudfoundry/routing-release/pull/302
  * Add healthchecker package to sync-package-specs file by @mariash in https://github.com/cloudfoundry/routing-release/pull/303
  * **Potential Breaking Change:** In preperation for mtls between gorouter and routing api, add gorouter backends ca to routing-api. Rendering these certs depends on routing-api consuming a link from gorouter. If you have multiple gorouter instance groups (for example in the case of isolation segments), you will need to rename bosh links to prevent the error "Multiple link providers found. For an example of link renaming, see [this ops file](https://github.com/cloudfoundry/cf-deployment/blob/main/operations/test/add-persistent-isolation-segment-router.yml#L74) by @reneighbor in https://github.com/cloudfoundry/routing-release/pull/300
  * Ensure gorouter-healthchecker doesn't restart gorouter forever on failure by @geofffranks in https://github.com/cloudfoundry/routing-release/pull/305
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.248.0...v0.249.0
          
v0.248.0
  ## What's Changed
  * Handle nil ca cert in ca_certs property list
          
v0.247.0
  ## What's Changed
  * gorouter template cleans `router.ca_certs` property to remove empty certificates
          
v0.246.0
  ## What's Changed
  * Update `router.ca_certs` property to accept and array of certificates instead of a string block. Thanks @peanball!
          
silk3.16.0
smb-volume3.1.6
smoke-tests4.8.1
syslog11.8.6
v11.8.6
  Update golang to 1.19.4
  **Full Changelog**: https://github.com/cloudfoundry/syslog-release/compare/v11.8.5...v11.8.6
          

v2.11.24

Release Date: 12/01/2022

  • Bump routing to version 0.245.0
  • Bump syslog to version 11.8.5
Component Version Release Notes
ubuntu-xenial stemcell621.305
bpm1.1.19
cf-networking3.12.0
cflinuxfs30.332.0
diego2.66.3
garden-runc1.22.5
haproxy9.8.0
loggregator-agent6.5.4
mapfs1.2.12
metrics-discovery3.2.3
nfs-volume5.0.20
routing0.245.0
v0.245.0
  ## What's Changed
  * Gorouter's pre-start script now reserves ports used by other CF components when it increases the number of ephemeral ports available via `/proc/sys/net/ipv4/ip_local_reserved_ports`. This resolves issues when components fail to start up during deploys/monit restarts due to accidental port collisions with outbound traffic from the VM. Thanks @ameowlia !
  * Routing-release no longer makes use of the deprecated uaa-go-client, and uses go-uaa instead
  * The `routing_utils/nats_client` helper utility now supports saving + loading gorouter's routing tables! Thanks @domdom82 !
  * Fixed a memory leak with `gorouter` that resulted in HTTP request objects being held open if a client canceled the connection before the App responded.  Thanks @geofffranks !
  * **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.244.0...v0.245.0
  ## ✨  Built with go 1.19.3
          
silk3.14.0
smb-volume3.1.6
smoke-tests4.8.1
syslog11.8.5
v11.8.5
  * update dependencies
  * update golang to 1.19.3
  **Full Changelog**: https://github.com/cloudfoundry/syslog-release/compare/v11.8.4...v11.8.5
          

v2.11.23

Release Date: 11/10/2022

  • [Feature] Add “Max request header size in kb” property to Networking tab to allow operators to specify a limit on the aggregate size of request headers. Requests over this limit receive a 431 status code.
  • Bump cflinuxfs3 to version 0.332.0
  • Bump garden-runc to version 1.22.5
  • Bump loggregator-agent to version 6.5.4
  • Bump mapfs to version 1.2.12
  • Bump metrics-discovery to version 3.2.3
  • Bump routing to version 0.244.0
  • Bump silk to version 3.14.0
  • Bump smb-volume to version 3.1.6
  • Bump smoke-tests to version 4.8.1
  • Bump syslog to version 11.8.4
Component Version Release Notes
ubuntu-xenial stemcell621.305
bpm1.1.19
cf-networking3.12.0
cflinuxfs30.332.0
diego2.66.3
garden-runc1.22.5
haproxy9.8.0
loggregator-agent6.5.4
mapfs1.2.12
v1.2.12
  ## Changes
  * Replace `go get` with `go install` (#23)
  * Update vendored package golang-1-linux (#26)
  * Update vendored package golang-1-linux (#27)
  ## Dependencies
  * **mapfs:** Updated to v`27f8711`.
For more information, see [mapfs](https://github.com/cloudfoundry/mapfs).
metrics-discovery3.2.3
nfs-volume5.0.20
routing0.244.0
v0.244.0
  ## What's Changed
  * Emit access logs for 431 responses to Loggegator [gorouter PR #331](https://github.com/cloudfoundry/gorouter/pull/331). Thanks @dsabeti !
  * Always suspend pruning when nats is down https://github.com/cloudfoundry/routing-release/pull/287. Thanks @ameowlia !
  * **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.243.0...v0.244.0
  ## ✨  Built with go 1.19.2
          
v0.243.0
  🎉 Bumped to go1.19.2
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.242.0...v0.243.0
          
v0.242.0
  ## What's Changed
  -  `tcp_router` is now more verbose when running `haproxy_reloader` to assist in diagnosting failed reloads. Thanks @geofffranks! 🎉 ([PR 9](https://github.com/cloudfoundry/cf-tcp-router/pull/9))
  - `gorouter` will now truncate access logs that exceed loggregator + UDP packet limits, so that we no longer drop access log messages sent to the firehose. Thanks @ameowlia @ebroberson! 😻 ([PR 328](https://github.com/cloudfoundry/gorouter/pull/328) and [PR 329](https://github.com/cloudfoundry/gorouter/pull/329))
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.241.0...v0.242.0
  ## ✨  Built with go 1.18
  * despite what the docs/go.version says
  * because the go 1.18 package is present
          
v0.241.0
  🎉 ~~Bumped to go1.19.1~~
  * Still using go 1.18
  * despite what the docs/go.version says
  * because the go 1.18 package is present
  * @plowin submitted [gorouter PR 327](https://github.com/cloudfoundry/gorouter/pull/327) to adjust endpoint-not-unregistered log-level to 'info'
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.240.0...v0.241.0
          
v0.240.0
  ## What's Changed
  * @geofffranks and @ameowlia added property `router.max_header_bytes` to the gorouter job.
  * This value controls the maximum number of bytes the gorouter will read parsing the request header's keys and values, including the request line.
  * It does not limit the size of the request body.
  * An additional padding of 4096 bytes is added to this value by go.
  * Requests with larger headers will result in a 431 status code.
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.239.0...v0.240.0
  ## Manifest Property Changes
  | Job | Property | 0.237.0 | 0.238.0 |
  | --- | --- | --- | --- |
  | `gorouter` | `router.max_header_bytes` | didn't exist | 1048576 (1MB) |
  ## ✨  Built with go 1.18.6
          
silk3.14.0
smb-volume3.1.6
v3.1.6
  ## Changes
  * Update vendored package golang-1-linux (#67)
  * Update vendored package golang-1-linux (#70)
  ## Dependencies
  * **bosh-template:** Updated to v2.3.0.
For more information, see [bosh-template](https://github.com/cloudfoundry/bosh). * **smbbroker:** Updated to v`89a0251`.
For more information, see [smbbroker](https://github.com/cloudfoundry/smbbroker). * **smbdriver:** Updated to v`68ff9d8`.
For more information, see [smbdriver](https://github.com/cloudfoundry/smbdriver).
smoke-tests4.8.1
4.8.1
  Create bosh final release 4.8.1
          
syslog11.8.4

v2.11.22

Release Date: 10/26/2022

  • Bump nfs-volume to version 5.0.20
  • Bump smoke-tests to version 4.8.0
Component Version Release Notes
ubuntu-xenial stemcell621.296
bpm1.1.19
cf-networking3.12.0
cflinuxfs30.319.0
diego2.66.3
garden-runc1.22.0
haproxy9.8.0
loggregator-agent6.4.4
mapfs1.2.11
metrics-discovery3.1.2
nfs-volume5.0.20
v5.0.20
  ## Changes
  * Use the newer golang package, not the older one (#239)
  ## Dependencies
  * **mapfs-release:** Updated to v`db176d8`.
For more information, see [mapfs-release](https://github.com/cloudfoundry/mapfs-release).
v5.0.19
  ## Changes
  * Update vendored package golang-1-linux (#222)
  ## Dependencies
  * **gomega:** Updated to v1.22.1.
For more information, see [gomega](https://github.com/onsi/gomega). * **mapfs-release:** Updated to v`a43c92f`.
For more information, see [mapfs-release](https://github.com/cloudfoundry/mapfs-release).
routing0.239.0
silk3.12.0
smb-volume3.1.5
smoke-tests4.8.0
4.8.0
  Create bosh final release 4.8.0
          
syslog11.8.2

v2.11.21

Release Date: 10/12/2022

  • Bump routing to version 0.239.0
  • Bump smoke-tests to version 4.7.0
Component Version Release Notes
ubuntu-xenial stemcell621.265
bpm1.1.19
cf-networking3.12.0
cflinuxfs30.319.0
diego2.66.3
garden-runc1.22.0
haproxy9.8.0
loggregator-agent6.4.4
mapfs1.2.11
metrics-discovery3.1.2
nfs-volume5.0.18
routing0.239.0
v0.239.0
  ## What's Changed
  - Bumped Golang to 1.18.6 to mitigate [CVE-2022-27664](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-27664)
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.238.0...v0.239.0
  ## ✨  Built with go 1.18.6
          
v0.238.0
  ## What's Changed
  - Gorouter once again supports hairpinning for route-service requests, for more information, see [the proposed update.](https://github.com/cloudfoundry/routing-release/issues/281) `router.route_services_internal_lookup_allowlist` can be used to control which domains of route services can be hairpinned. Thanks @peanball!!
  - Gorouter has a new websocket-specific dial timeout (`websocket_dial_timeout`), configurable separately from the default endpoint dial timeout. Thanks @peanball  for this one too!!
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.237.0...v0.238.0
  ## Manifest Property Changes
  | Job | Property | 0.237.0 | 0.238.0 |
  | --- | --- | --- | --- |
  | `gorouter` | `websocket_dial_timeout_in_seconds` | didn't exist | Defaults to `endpoint_dial_timeout_in_seconds`'s value |
  | `gorouter` | `router.route_services_internal_lookup_allowlist` | didn't exist | No internal lookups allowed for route services. |
  ## ✨  Built with go 1.18.5
          
v0.237.0
  ## What's Changed
  - ⚠️ Bump to golang 1.18 🎉
  **Breaking Changes:** The routing components are now more strict about the protocols used in TLS communications, causing integrations with systems using older, insecure protocols to fail. These components have been updated to Go 1.18, and will no longer support TLS 1.0 and 1.1 connections or certificates with a SHA-1 checksum. This is most likely to affect connections with external databases.
  Please see this golang 1.18 release notes [section](https://tip.golang.org/doc/go1.18#tls10) for more information about the golang 1.18 change.
  ###
  * Update uaa-go-client; by @joergdw in https://github.com/cloudfoundry/routing-release/pull/277
  * updated spec files to match packages by @ebroberson in https://github.com/cloudfoundry/routing-release/pull/282
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/v0.236.0...v0.237.0
  ## New Contributors
  * @joergdw made their first contribution in https://github.com/cloudfoundry/routing-release/pull/277
  * @ebroberson made their first contribution in https://github.com/cloudfoundry/routing-release/pull/282
  ## ✨  Built with go 1.18.4
          
silk3.12.0
smb-volume3.1.5
smoke-tests4.7.0
4.7.0
  Create bosh final release 4.7.0
          
syslog11.8.2

v2.11.20

Release Date: 09/20/2022

  • [Feature] As of Isolation Segment v2.13.6 and TAS for VMs v2.13.9, you can jump upgrade to TAS for VMs and Isolation Segment v2.13 from TAS for VMs and Isolation Segment v2.11. For more information, see the TAS for VMs v2.13 documentation.
  • [Feature Improvement] Bump golang to 1.18 for diego, routing, cf-networking, and silk
  • [Breaking Change] If you have configured an app log rate limit that measures app log rates in lines per second, Diego immediately drops app logs that exceed the app log rate limit. For more information, see Diego Drops App Logs That Exceed the App Log Rate Limit below.
  • Bump bpm to version 1.1.19
  • Bump cf-networking to version 3.12.0
  • Bump cflinuxfs3 to version 0.319.0
  • Bump diego to version 2.66.3
  • Bump garden-runc to version 1.22.0
  • Bump loggregator-agent to version 6.4.4
  • Bump mapfs to version 1.2.11
  • Bump metrics-discovery to version 3.1.2
  • Bump nfs-volume to version 5.0.18
  • Bump silk to version 3.12.0
  • Bump smb-volume to version 3.1.5
  • Bump syslog to version 11.8.2
Component Version Release Notes
ubuntu-xenial stemcell621.265
bpm1.1.19
cf-networking3.12.0
cflinuxfs30.319.0
diego2.66.3
garden-runc1.22.0
haproxy9.8.0
loggregator-agent6.4.4
mapfs1.2.11
v1.2.11
  ## Changes
  * Update vendored package golang-1-linux (#21)
          
v1.2.8
  ## What's Changed
  * Bump src/mapfs to `0ee84aa` #18
          
v1.2.7
  - [Bumps mapfs submodule to master@1600494](https://github.com/cloudfoundry/mapfs/commit/160049400a47577b0f3a8b2948974bc38ce76f18)
  - [Bump golang from 1.13 to 1.17](https://github.com/cloudfoundry/mapfs-release/commit/c287adda5cbdf345ff1b4985ae93cb72f1618f95)
          
metrics-discovery3.1.2
nfs-volume5.0.18
v5.0.18
  ## Changes
  * Update vendored package golang-1-linux (#215)
  ## Dependencies
  * **bosh-template:** Updated to v2.3.0.
For more information, see [bosh-template](https://github.com/cloudfoundry/bosh). * **gomega:** Updated to v1.20.2.
For more information, see [gomega](https://github.com/onsi/gomega). * **mapfs-release:** Updated to v`4413136`.
For more information, see [mapfs-release](https://github.com/cloudfoundry/mapfs-release).
v5.0.17
  ## Changes
  * Update vendored package golang-1-linux (#206)
  * [ci] Force use of iptables instead of nftables
  ## Dependencies
  * **ginkgo:** Updated to v1.16.5.
For more information, see [ginkgo](https://github.com/onsi/ginkgo). * **gomega:** Updated to v1.19.0.
For more information, see [gomega](https://github.com/onsi/gomega). * **mapfs-release:** Updated to v`90d2f31`.
For more information, see [mapfs-release](https://github.com/cloudfoundry/mapfs-release).
routing0.236.0
silk3.12.0
smb-volume3.1.5
v3.1.5
  ## Changes
  * Update vendored package golang-1-linux (#58)
          
v3.1.4
  ## Release Notes
  - Fix issue when multiple cf versions are included  (#55)
  ## Dependencies
  - The `smbbrokerpush` and `bbr-smbbroker` errands require either the `cf-cli-7-linux` or `cf-cli-6-linux` job from [cf-cli-release](https://bosh.io/releases/github.com/bosh-packages/cf-cli-release?all=1) to be colocated on the errand VM.
          
v3.1.3
  ## Release Notes
  - Added support for CF CLI v8 to errands (#45)
  - Fixed Jammy compilation issues (#53)
  ## Dependencies
  - Bump [src/code.cloudfoundry.org/smbbroker](https://github.com/cloudfoundry/smbbroker) (#41, #50)
  - Bump [src/code.cloudfoundry.org/smbdriver](https://github.com/cloudfoundry/smbdriver) (#47, #48, #51)
          
v3.1.2
  ## Release Notes
  - Support Bionic Stemcell #16
  - Add blobs for the `keyutils` package for both `bionic` and `jammy`.
  - We now install this package on any VM that runs the `smbdriver` bosh job iff that VM uses a `bionic` or `jammy` stemcell
  - This should allow the `smbdriver` to reliably mount SMB volumes on those stemcells, as discussed in #16
  ## Dependencies
  - The `smbbrokerpush` and `bbr-smbbroker` errands require either the `cf-cli-7-linux` or `cf-cli-6-linux` job from [cf-cli-release](https://bosh.io/releases/github.com/bosh-packages/cf-cli-release?all=1) to be colocated on the errand VM.
          
v3.1.1
  ## Release Notes
  * Bumps [bosh-template](https://github.com/cloudfoundry/bosh) from 2.2.0 to 2.2.1 (#22)
  * Bumps [rspec-its](https://github.com/rspec/rspec-its) from 1.2.0 to 1.3.0 (#23)
  * Bumps [rspec](https://github.com/rspec/rspec-metagem) to 3.11.0. (#37)
  * Bumps [src/code.cloudfoundry.org/smbdriver](https://github.com/cloudfoundry/smbdriver) to `1e97c5d` (#34)
  * Bumps [src/code.cloudfoundry.org/smbbroker](https://github.com/cloudfoundry/smbbroker) to `64ba567` (#36)
  * Bumps automake from 1.15 to 1.15.1 (#43 - fixes Bionic compilation)
  ## Dependencies
  - The `smbbrokerpush` and `bbr-smbbroker` errands require either the `cf-cli-7-linux` or `cf-cli-6-linux` job from [cf-cli-release](https://bosh.io/releases/github.com/bosh-packages/cf-cli-release?all=1) to be colocated on the errand VM.
          
smoke-tests4.5.0
syslog11.8.2

v2.11.17

Release Date: 08/10/2022

  • Bump cf-networking to version 3.11.0
  • Bump cflinuxfs3 to version 0.312.0
  • Bump loggregator-agent to version 6.4.3
  • Bump metrics-discovery to version 3.1.1
  • Bump routing to version 0.236.0
  • Bump silk to version 3.11.0
  • Bump syslog to version 11.8.1
Component Version Release Notes
ubuntu-xenial stemcell621.256
bpm1.1.18
cf-networking3.11.0
cflinuxfs30.312.0
diego2.62.0
garden-runc1.20.8
haproxy9.8.0
loggregator-agent6.4.3
mapfs1.2.6
metrics-discovery3.1.1
nfs-volume5.0.16
routing0.236.0
v0.236.0
  ## What's Changed
  * Gorouter restart script waits for the gorouter to be running before reloading monit
  ## ✨  Built with go 1.17.12
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.235.0...0.236.0
          
silk3.11.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.8.1

v2.11.16

Release Date: 07/18/2022

  • [Feature] Enable telemetry for iptables rules on Diego cells
  • Bump cf-networking to version 3.9.0
  • Bump cflinuxfs3 to version 0.309.0
  • Bump diego to version 2.62.0
  • Bump garden-runc to version 1.20.8
  • Bump loggregator-agent to version 6.4.2
  • Bump metrics-discovery to version 3.1.0
  • Bump routing to version 0.235.0
  • Bump silk to version 3.9.0
  • Bump syslog to version 11.8.0
Component Version Release Notes
ubuntu-xenial stemcell621.252
bpm1.1.18
cf-networking3.9.0
cflinuxfs30.309.0
diego2.62.0
garden-runc1.20.8
haproxy9.8.0
loggregator-agent6.4.2
mapfs1.2.6
metrics-discovery3.1.0
nfs-volume5.0.16
routing0.235.0
0.235.0
  ## What's Changed
  * Gorouter healthchecker retries connection instead of monit (https://github.com/cloudfoundry/routing-release/pull/275)
  ## ✨  Built with go 1.17.11
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.234.0...0.235.0
          
0.234.0
  ## What's Changed
  * Gorouter: the metrics package now uses `lsof` to monitor file descriptors on MacOS @domdom82 https://github.com/cloudfoundry/gorouter/pull/312
  * 🐛 Bumped the `lager` dependency to resolve issues where the timeFormat flag was not honored, resulting in epoch timestamps vs human readable. Thanks @ameowlia!
  * Now tested with the bionic stemcell in CI
  ## ✨  Built with go 1.17.11
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.233.0...0.234.0
          
silk3.9.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.8.0

v2.11.15

Release Date: 06/23/2022

Warning:Upcoming breaking changes! In future patches, no sooner than July 1st 2022, some components will become more strict about the protocols used in TLS communications, causing integrations with systems using older, insecure protocols to fail. Specifically, components using the Go programming language will be updated to Go 1.18, and will no longer support TLS 1.0 and 1.1 connections or certificates with a SHA-1 checksum. This is most likely to affect connections with external databases. However, the pre-existing configuration for “TLS versions supported by the Gorouter” will still work. This change may not arrive all at once, as Go is used in systems throughout TAS for VMs. There will be a VMware Knowledge Base article about this change published prior to the changes rolling out. These changes will be clearly designated in the release notes of the versions they ship in; a version of this warning will appear on all patch versions until we are confident no systems remain to be updated.

  • Bump diego to version 2.62.0
Component Version
ubuntu-xenial stemcell621.244
bpm1.1.18
cf-networking3.6.0
cflinuxfs30.301.0
diego2.62.0
garden-runc1.20.6
haproxy9.8.0
loggregator-agent6.4.1
mapfs1.2.6
metrics-discovery3.0.13
nfs-volume5.0.16
routing0.233.0
silk3.6.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.7.10

v2.11.14

Release Date: 06/09/2022

Warning: Breaking change. This version contains Diego 2.64.0, which bumps to Go 1.18. Go 1.18 no longer supports TLS 1.0 and 1.1 connections or certificates with a SHA-1 checksum. This is most likely to affect connections with external databases. We stated earlier that we wouldn’t bump to Go 1.18 until July 1, 2022. This TAS for VMs release with Diego 2.64.0 breaks that promise. We apologize. We are rolling back to Diego 2.62.0. If you already successfully deployed to this TAS for VMs release with Diego 2.64.0, then you are safe to continue using it.

  • [Bug Fix] Sticky sessions no longer break when used with route-services that return HTTP 4xx/5xx responses
  • Bump bpm to version 1.1.18
  • Bump cf-networking to version 3.6.0
  • Bump cflinuxfs3 to version 0.301.0
  • Bump diego to version 2.64.0
  • Bump garden-runc to version 1.20.6
  • Bump loggregator-agent to version 6.4.1
  • Bump metrics-discovery to version 3.0.13
  • Bump nfs-volume to version 5.0.16
  • Bump routing to version 0.233.0
  • Bump silk to version 3.6.0
  • Bump syslog to version 11.7.10
Component Version Release Notes
ubuntu-xenial stemcell621.244
bpm1.1.18
cf-networking3.6.0
cflinuxfs30.301.0
diego2.64.0
garden-runc1.20.6
haproxy9.8.0
loggregator-agent6.4.1
mapfs1.2.6
metrics-discovery3.0.13
nfs-volume5.0.16
routing0.233.0
0.233.0
  ## What's Changed
  * TCP Router: Add locking to the haproxy_reloader script to avoid haproxy reload/restart race conditions by @geofffranks in https://github.com/cloudfoundry/routing-release/pull/269
  * TCP Router: Bump HAProxy from 1.8.13 to 2.5.4 by @cunnie in https://github.com/cloudfoundry/routing-release/pull/266
  * Gorouter: fix proxy round tripper race condition by @ameowlia and @geofffranks  in https://github.com/cloudfoundry/gorouter/pull/318
  * Routing API: fix timestamp precision issue that caused routes to be pruned unexpectedly by @geofffranks in https://github.com/cloudfoundry/routing-api/pull/24
  *  Routing API: remove `golang.x509ignoreCN` bosh property by @geofffranks and @mariash
  * Routing API: fix bug that caused TCP Router's HAProxy to reload every minute by @jrussett in https://github.com/cloudfoundry/routing-api/pull/26.
  ## Manifest Property Changes
  | Job | Property  | Notes |
  | --- | --- | --- |
  | `routing-api` | `golang.x509ignoreCN` | This property exposed a go debug flag for go version 1.15. Since go 1.16 this go debug flag has had no affect. Removing this bosh property is part of our effort to keep our code base free of cruft. |
  ## ✨  Built with go 1.17.10
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.232.0...0.233.0
          
0.232.0
  ## What's Changed
  * Fixing issue #250: Return a 503 not a 404 when all instances down by @kecirlotfi in https://github.com/cloudfoundry/routing-release/pull/268 and https://github.com/cloudfoundry/gorouter/pull/314
  * Fixing issue https://github.com/cloudfoundry/gorouter/pull/315: Fix route service pruning by @geofffranks
  ## Manifest Property Changes
  | Job | Property | default | notes |
  | --- | --- | --- | --- |
  | `gorouter` | `for_backwards_compatibility_only.empty_pool_response_code_503` | `0s` | This property was added to enable https://github.com/cloudfoundry/routing-release/pull/268 |
  ## New Contributors 🎉
  * @kecirlotfi made their first contribution! Thanks so much!
  ## ✨  Built with go 1.17.9
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.231.0...0.232.0
          
silk3.6.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.7.10

v2.11.13

Release Date: 04/20/2022

Component Version Release Notes
ubuntu-xenial stemcell621.224
bpm1.1.16
cf-networking3.3.0
cflinuxfs30.285.0
diego2.62.0
garden-runc1.20.3
haproxy9.8.0
loggregator-agent6.3.11
v6.3.11
  - fix bug with large messages (#89)
  - bump-golang to v0.100.0(now 1.18)
          
mapfs1.2.6
metrics-discovery3.0.10
v3.0.10
  - fix bug with large messages (#22)
  - bump-golang to v0.100.0(now 1.18)
          
nfs-volume5.0.12
routing0.231.0
silk3.3.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.7.7

v2.11.12

Release Date: 03/31/2022

  • [Feature Improvement] Move aggregate drains to the syslog-binding cache to improve deploy speed and reduce errors.
  • [Security Fix] This release fixes CVE-2022-23806 and CVE-2022-23772.
  • [Bug Fix] Resolve an issue resulting in tcp-router repeatedly respawning haproxy until it hits a forked process limit
  • [Bug Fix] Resolves an issue where invalid seeded router group values should caused breaking changes
  • [Bug fix] Remove x509ignoreCN option in Gorouter
  • Bump cf-networking to version 3.3.0
  • Bump cflinuxfs3 to version 0.279.0
  • Bump diego to version 2.61.0
  • Bump garden-runc to version 1.20.3
  • Bump loggregator-agent to version 6.3.10
  • Bump metrics-discovery to version 3.0.9
  • Bump routing to version 0.231.0
  • Bump silk to version 3.3.0
Component Version Release Notes
ubuntu-xenial stemcell621.224
bpm1.1.16
cf-networking3.3.0
cflinuxfs30.279.0
diego2.61.0
garden-runc1.20.3
haproxy9.8.0
loggregator-agent6.3.10
mapfs1.2.6
metrics-discovery3.0.9
nfs-volume5.0.12
routing0.231.0
0.231.0
  ## Bug Fixes
  - Removed the x509ignoreCN property. Now that `gorouter` is built on golang 1.17, it
no longer has any effect on gorouter behavior, and was only adding to confusion in
the properties
  - Resolve an issue with route-registrar using the same TTL as it's RegistrationInterval
for tcp routes, leading to unnecessary churn of pruned + re-registered routes.
  - Resolve an issue with Routing API where upserts to tcp routes were causing change
events to be emitted when the only change was a bump in TTL. This led to an issue
where tcp-router was constantly reloading haproxy with every route's heartbeat
registration call.
  ## Manifest Property Changes
  | Job | Property | 0.230.0 | 0.231.0 |
  | --- | --- | --- | --- |
  | `gorouter` | `golang.x509ignoreCN` | false | No longer exists |
  |  `route_registrar` | `golang.x509ignoreCN` | false | No longer exists |
  | `tcp_router` | `golang.x509ignoreCN` | false | No longer exists |
  ### ✨ Built with golang 1.17.8
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.230.0...0.231.0
          
0.230.0
  ## Feature
  * update gorouter for prometheus scraping by @Benjamintf1 in https://github.com/cloudfoundry/routing-release/pull/258
  ## Bug Fix
  * Invalid seeded router group manifest values should no longer cause breaking changes by default by @ameowlia in https://github.com/cloudfoundry/routing-release/pull/261
  ### ✨ Built with golang 1.17.7
  **Full Changelog**: https://github.com/cloudfoundry/routing-release/compare/0.229.0...0.230.0
          
silk3.3.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.7.7

v2.11.11

Release Date: 02/28/2022

  • [Feature Improvement] Due to routing-release now being built with Golang 1.17, all certificates provided MUST contain SAN entries on them. The previous workaround of setting “Enable temporary workaround for certs without SANs” will no longer function.
  • [Feature Improvement] Per Golang 1.17’s new and stricter IP parsing standards, any IP addrs with leading zeros in any octets will result in a BOSH template failure to allow operators to remove the leading zeros and try again (affects properties fed into diego-release, garden-runc-release, winc-release, nats-release, and routing-release),.
  • [Bug Fix] Fixes an issue related to the parsing of the X-B3-TraceId and X-B3-SpanId HTTP headers
  • [Bug Fix] Smoke tests support for TLSv1.3 only option
  • Bump cflinuxfs3 to version 0.274.0
  • Bump diego to version 2.58.1
  • Bump garden-runc to version 1.20.0
  • Bump loggregator-agent to version 6.3.8
  • Bump metrics-discovery to version 3.0.8
  • Bump routing to version 0.229.0
  • Bump smoke-tests to version 4.5.0
Component Version
ubuntu-xenial stemcell621.211
bpm1.1.16
cf-networking2.43.0
cflinuxfs30.274.0
diego2.58.1
garden-runc1.20.0
haproxy9.8.0
loggregator-agent6.3.8
mapfs1.2.6
metrics-discovery3.0.8
nfs-volume5.0.12
routing0.229.0
silk2.43.0
smb-volume3.1.0
smoke-tests4.5.0
syslog11.7.7

v2.11.10

Release Date: 02/07/2022

Note: This version of TAS for VMs contains a known issue that can cause application traces to break. See Gorouter Sets an Invalid X-B3-SpanID Header in Known Issues.

  • [Security Fix] Bump routing release to 0.228.0 to address (CVE-2021-44716)
  • [Feature Improvement] Golang v1.17 contains stricter IP parsing standards, so IP addresses with leading zeros in any octets cause a BOSH template failure. Operators can remove the leading zeros and try deploying again. This affects properties that feed into cf-networking-release, silk-release, loggregator-agent-release, and syslog-release. Syslog drains and metric registrar endpoints registered using user-provided services might also be affected.

  • Bump bpm to version 1.1.16

  • Bump cf-networking to version 2.43.0

  • Bump cflinuxfs3 to version 0.272.0

  • Bump diego to version 2.57.0

  • Bump loggregator-agent to version 6.3.7

  • Bump metrics-discovery to version 3.0.7

  • Bump routing to version 0.228.0

  • Bump silk to version 2.43.0

  • Bump smoke-tests to version 4.4.0

  • Bump syslog to version 11.7.7

Component Version
ubuntu-xenial stemcell621.198
bpm1.1.16
cf-networking2.43.0
cflinuxfs30.272.0
diego2.57.0
garden-runc1.19.30
haproxy9.8.0
loggregator-agent6.3.7
mapfs1.2.6
metrics-discovery3.0.7
nfs-volume5.0.12
routing0.228.0
silk2.43.0
smb-volume3.1.0
smoke-tests4.4.0
syslog11.7.7

v2.11.9

Release Date: 12/15/2021

Note: This version of TAS for VMs contains a known issue that can cause application traces to break. See Gorouter Sets an Invalid X-B3-SpanID Header in Known Issues.

  • [Bug Fix] Fix “pre-start scripts failed. Failed Jobs: policy-server” error Upgrading to CF Networking Release 2.40.0
  • [Bug Fix] Diego - Envoy 1.19 should use original TCP connection pool, so that it can accept more than 1024 downstream connections
  • [Bug Fix] Enabling audit logging file rotation to reduce IO load during log rotation
  • [Bug Fix] Smoke Tests uses specified domain for Isolation Segments
  • Bump cf-networking to version 2.42.0
  • Bump cflinuxfs3 to version 0.268.0
  • Bump diego to version 2.54.0
  • Bump loggregator-agent to version 6.3.5
  • Bump routing to version 0.227.0
  • Bump silk to version 2.41.0
  • Bump smoke-tests to version 4.3.1
  • Bump syslog to version 11.7.6
Component Version
ubuntu-xenial stemcell~621
bpm1.1.15
cf-networking2.42.0
cflinuxfs30.268.0
diego2.54.0
garden-runc1.19.30
haproxy9.8.0
loggregator-agent6.3.5
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.227.0
silk2.41.0
smb-volume3.1.0
smoke-tests4.3.1
syslog11.7.6

v2.11.8

Release Date: 11/23/2021

  • [Breaking Change] All Gorouter certificates require a SubjectAltName extension. If any Gorouter certificates lack a SubjectAltName, deployment fails. If you need to complete a deployment before configuring new Gorouter certificates, select Enable temporary workaround for certs without SANs in the Networking pane of the TAS for VMs tile. For more information about updating certificates, see Routing and Golang 1.15 X.509 CommonName deprecation in the Knowledge Base.
  • Bump bpm to version 1.1.15
  • Bump cf-networking to version 2.40.0
  • Bump cflinuxfs3 to version 0.264.0
  • Bump routing to version 0.226.0
  • Bump silk to version 2.40.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.15
cf-networking2.40.0
cflinuxfs30.264.0
diego2.53.0
garden-runc1.19.30
haproxy9.8.0
loggregator-agent6.3.4
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.226.0
silk2.40.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.5

v2.11.7

Release Date: 10/19/2021

  • Bump bpm to version 1.1.14
  • Bump cf-networking to version 2.39.0
  • Bump cflinuxfs3 to version 0.262.0
  • Bump routing to version 0.225.0
  • Bump silk to version 2.39.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.14
cf-networking2.39.0
cflinuxfs30.262.0
diego2.53.0
garden-runc1.19.30
haproxy9.8.0
loggregator-agent6.3.4
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.225.0
silk2.39.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.5

v2.11.6

Release Date: 09/30/2021

  • [Security Fix] Fixes an issue where BBS socket connections could be kept alive unnecessarily
  • [Feature Improvement] Disable Diego container proxy ALPN
  • Bump cflinuxfs3 to version 0.259.0
  • Bump diego to version 2.53.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.13
cf-networking2.38.0
cflinuxfs30.259.0
diego2.53.0
garden-runc1.19.30
haproxy9.8.0
loggregator-agent6.3.4
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.224.0
silk2.38.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.5

v2.11.5

Release Date: 09/16/2021

  • [Bug Fix] garden-runc - Fix handling reserved space on ext4 and generating bundle mounts when SMB volumes are present
  • Bump cflinuxfs3 to version 0.256.0
  • Bump garden-runc to version 1.19.30
  • Bump routing to version 0.224.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.13
cf-networking2.38.0
cflinuxfs30.256.0
diego2.50.0
garden-runc1.19.30
haproxy9.8.0
loggregator-agent6.3.4
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.224.0
silk2.38.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.5

v2.11.4

Release Date: 09/09/2021

  • [Security Fix] Gorouter built with Go 1.16.7 to address CVE-2021-36221
  • [Bug Fix] garden-runc - recover after cell restarts
  • Bump bpm to version 1.1.13
  • Bump cflinuxfs3 to version 0.252.0
  • Bump garden-runc to version 1.19.29
  • Bump loggregator-agent to version 6.3.4
  • Bump routing to version 0.221.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.13
cf-networking2.38.0
cflinuxfs30.252.0
diego2.50.0
garden-runc1.19.29
haproxy9.8.0
loggregator-agent6.3.4
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.221.0
silk2.38.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.5

v2.11.3

Release Date: 07/15/2021

  • [Feature Improvement] garden-runc - Enable usage of .NET diagnostic tools
  • [Bug Fix] Prevent tcp routes from using system component ports.
  • [Breaking Change] Gorouter sends all responses with transfer-encoded chunks. Some responses that were not chunked in previous versions now use transfer-encoded chunks. For more information, see Clients receive responses with no Content-Length header and a chunked encoded body after upgrading Tanzu Application Service for VMs in the Knowledge Base. (edited 20 Oct 2021)
  • Bump cf-networking to version 2.38.0
  • Bump cflinuxfs3 to version 0.249.0
  • Bump garden-runc to version 1.19.28
  • Bump metrics-discovery to version 3.0.6
  • Bump routing to version 0.216.0
  • Bump silk to version 2.38.0
  • Bump syslog to version 11.7.5
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.12
cf-networking2.38.0
cflinuxfs30.249.0
diego2.50.0
garden-runc1.19.28
haproxy9.8.0
loggregator-agent6.3.3
mapfs1.2.6
metrics-discovery3.0.6
nfs-volume5.0.12
routing0.216.0
silk2.38.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.5

v2.11.2

Release Date: 06/22/2021

  • [Security Fix] Bump some dependencies to resolve security vulnerabilities
  • Bump bpm to version 1.1.12
  • Bump cf-networking to version 2.37.0
  • Bump cflinuxfs3 to version 0.240.0
  • Bump loggregator-agent to version 6.3.3
  • Bump metrics-discovery to version 3.0.5
  • Bump silk to version 2.37.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.12
cf-networking2.37.0
cflinuxfs30.240.0
diego2.50.0
garden-runc1.19.25
haproxy9.8.0
loggregator-agent6.3.3
mapfs1.2.6
metrics-discovery3.0.5
nfs-volume5.0.12
routing0.213.0
silk2.37.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.0

v2.11.1

Release Date: 05/27/2021

  • [Feature] gorouter - Operator can limit CAs gorouter trusts when validating client certs to a specified list. For more information, see Configure Networking.
  • [Feature Improvement] Patch versions can be upgraded without a stemcell upgrade
  • [Feature Improvement] Adds support for SNI routes
  • [Feature Improvement] Adds per request metrics reporting, which makes metric frequency proportional to request frequency
  • [Bug Fix] Smoke Test allows the operator to provide the apps_domain property when deploying TAS for VMs and also properly configures user provided space when deploying an isolation segment
  • Bump bpm to version 1.1.11
  • Bump cf-networking to version 2.36.0
  • Bump cflinuxfs3 to version 0.238.0
  • Bump diego to version 2.50.0
  • Bump garden-runc to version 1.19.25
  • Bump loggregator-agent to version 6.2.1
  • Bump nfs-volume to version 5.0.12
  • Bump routing to version 0.213.0
  • Bump silk to version 2.36.0
  • Bump smoke-tests to version 4.3.0
Component Version
ubuntu-xenial stemcell621.0
bpm1.1.11
cf-networking2.36.0
cflinuxfs30.238.0
diego2.50.0
garden-runc1.19.25
haproxy9.8.0
loggregator-agent6.2.1
mapfs1.2.6
metrics-discovery3.0.3
nfs-volume5.0.12
routing0.213.0
silk2.36.0
smb-volume3.1.0
smoke-tests4.3.0
syslog11.7.0

v2.11.0

Release Date: March 30, 2021

Component Version
ubuntu-xenial stemcell621.113
bpm1.1.7
cf-networking2.35.0
cflinuxfs30.229.0
diego2.49.0
garden-runc1.19.18
haproxy9.8.0
loggregator-agent6.2.0
mapfs1.2.6
metrics-discovery3.0.3
nfs-volume5.0.11
routing0.211.0
silk2.35.0
smb-volume3.1.0
smoke-tests2.2.0
syslog11.7.0

About Isolation Segment

The Isolation Segment v2.11 tile is available for installation with Ops Manager v2.10.

Isolation segments provide dedicated pools of resources where you can deploy apps and isolate workloads. Using isolation segments separates app resources as completely as if they were in different deployments but avoids redundant management and network complexity. For more information about isolation segments, see Isolation Segments in TAS for VMs Security.

For more information about using isolation segments in your deployment, see Managing Isolation Segments.

How to Install

The Isolation Segment v2.11 tile is available with the release of Ops Manager v2.10. For more information, see the Ops Manager documentation.

To use the Isolation Segment v2.11 tile, you must install Ops Manager v2.10 and VMware Tanzu Application Service for VMs (TAS for VMs) v2.11 or later.

To install Isolation Segment v2.11, see Installing Isolation Segment.

New Features in Isolation Segment v2.11

Isolation Segment v2.11 includes the following major feature:

Configure Trusted CAs for Gorouter

When validating requests using mutual TLS to back ends and route services, the Gorouter trusts multiple certificate authorities (CAs) by default. In Isolation Segment v2.11, you can configure which CA certificates the Gorouter trusts.

For more information, see Configure Networking in Installing Isolation Segment.

Breaking Changes

Isolation Segment v2.11 includes the following breaking changes:

Option Removed: Disable SSL Certificate Verification for this Environment

In Isolation Segment v2.11, the option to disable SSL certificate verification for an environment is removed.

Before you upgrade to Isolation Segment v2.11, you must deactivate the Disable SSL certificate verification checkbox in the Networking pane of the TAS for VMs tile. For more information, see Configure Networking in Configuring TAS for VMs.

If the Disable SSL certificate verification for this environment checkbox is activated when you try to upgrade to Isolation Segment, the upgrade fails with the following error:

attempt to upgrade to IST 2.11+ with Skip SSL Verification enabled, please disable
Skip SSL Verification prior to upgrade by un-checking "Disable SSL certificate
verification for this environment" under "Networking"

If you plan to automate the installation of Isolation Segment v2.11, you must remove references to the corresponding property .properties.skip_cert_verify.

Gorouter Update to Golang v1.15 Introduces Stricter Transfer-Encoding Header Standards

In Isolation Segment v2.11, stricter header standards break Spring apps that incorrectly set the header.

To avoid this breaking change, see Applications on TAS for VMs get 502 chunked response error in the Knowledge Base. You must complete the resolution procedure described in this Knowledge Base article before you upgrade to Isolation Segment v2.11.0 or later.

Note: This breaking change is also present in Pivotal Isolation Segment v2.7.30, Pivotal Isolation Segment v2.8.24, Isolation Segment v2.9.18, and Isolation Segment v2.10.10. If you are using any of these versions or earlier, you must upgrade to Pivotal Isolation Segment v2.7.31, Pivotal Isolation Segment v2.8.25, Isolation Segment v2.9.19, or Isolation Segment v2.10.11 before upgrading or jump upgrading to Isolation Segment v2.11. For more information, see Applications on TAS for VMs get 502 chunked response error in the Knowledge Base.

Diego Drops App Logs That Exceed the App Log Rate Limit

As of Isolation Segment v2.11.20, if you have configured an app log rate limit that measures app log rates in lines per second, Diego immediately drops app logs that exceed the app log rate limit.

In Isolation Segment v2.11.19 and earlier, Diego buffers and releases approximately 5 MB to 10 MB of app logs that exceed the app log rate limit. This behavior has changed in Isolation Segment v2.11.20 because Diego has been upgraded to a newer version.

If this change in behavior causes parts of your deployment to fail, VMware recommends that you either modify any automated scripts that rely on app log output or increase the app log rate limit.

For more information about app log rate limits, see App Log Rate Limiting.

Known Issues

Isolation Segment v2.11 includes the following known issue:

Gorouter Sets an Invalid X-B3-SpanID Header

An issue with the Gorouter’s implementation of X-B3-SpanId and X-B3-TraceId headers can cause invalid span IDs to be set after updating the X-B3-TraceId header to the new 16-byte standard. As a result, some applications and libraries invalidate the X-B3-SpanId value, breaking traces of the application.

This issue affects versions of TAS for VMs that contain routing-release v0.227.0 and v0.228.0.