diff --git a/calico-enterprise_versioned_docs/version-3.18-2/release-notes/index.mdx b/calico-enterprise_versioned_docs/version-3.18-2/release-notes/index.mdx index 9262306d6a..1a20aa8014 100644 --- a/calico-enterprise_versioned_docs/version-3.18-2/release-notes/index.mdx +++ b/calico-enterprise_versioned_docs/version-3.18-2/release-notes/index.mdx @@ -262,3 +262,29 @@ Calico Enterprise 3.18.5 is now available. This release includes bug fixes and i #### Updating To update an existing installation of $[prodname] 3.18, see [Install a patch release](../getting-started/manifest-archive.mdx). + + +### Calico Enterprise 3.18.6 bug fix release + +December 19, 2024 + +Calico Enterprise 3.18.6 is now available. This release includes bug fixes and improvements. + +#### Bug fixes + +* Fix that Felix would panic when trying to resync a temporary IP set. + Temporary IP sets are created in certain scenarios after previous failures. +* Fix excessive CPU usage in the process name lookup cache if a PID was unknown. +* Updates the default behavior of list request without tier field selector or label selector on `globalnetworkpolicy, stagedglobalnetworkpolicy, networkpolicy and staged network policy to return all policies available to user, instead of returning only the policies in the default tier. This change allows to manage policies with GitOps tools like ArgoCD. +* Fix Felix panic when using non-default BPF map sizes. Size was not updated in all places resulting in failure to attach programs. +* Security updates. + +#### Updating + +To update an existing installation of $[prodname] 3.18, see [Install a patch release](../getting-started/manifest-archive.mdx). +#### Bug fixes + +* Fixed an issue where excessive API calls were made by the operator when users are running a large number of egress gateways. +* Fix dual ToR startup when using bgp-layout ConfigMap to assign AS numbers. +* Reduce lock contention between the process info cache and the flow logs collector. Avoids slowing down the collector when the info cache is under update load. +* Security updates. This is the last scheduled patch for security updates, we urge users to consider updating to a later minor version of $[prodname]. \ No newline at end of file diff --git a/calico-enterprise_versioned_docs/version-3.18-2/releases.json b/calico-enterprise_versioned_docs/version-3.18-2/releases.json index 2238524ff8..880265a50f 100644 --- a/calico-enterprise_versioned_docs/version-3.18-2/releases.json +++ b/calico-enterprise_versioned_docs/version-3.18-2/releases.json @@ -1,4 +1,260 @@ [ + { + "title": "v3.18.6", + "tigera-operator": { + "image": "tigera/operator", + "version": "v1.32.13", + "registry": "quay.io" + }, + "calico": { + "minor_version": "v3.27", + "archive_path": "archive" + }, + "components": { + "cnx-manager": { + "image": "tigera/cnx-manager", + "version": "v3.18.6" + }, + "voltron": { + "image": "tigera/voltron", + "version": "v3.18.6" + }, + "guardian": { + "image": "tigera/guardian", + "version": "v3.18.6" + }, + "cnx-apiserver": { + "image": "tigera/cnx-apiserver", + "version": "v3.18.6" + }, + "cnx-queryserver": { + "image": "tigera/cnx-queryserver", + "version": "v3.18.6" + }, + "cnx-kube-controllers": { + "image": "tigera/kube-controllers", + "version": "v3.18.6" + }, + "calicoq": { + "image": "tigera/calicoq", + "version": "v3.18.6" + }, + "typha": { + "image": "tigera/typha", + "version": "v3.18.6" + }, + "calicoctl": { + "image": "tigera/calicoctl", + "version": "v3.18.6" + }, + "cnx-node": { + "image": "tigera/cnx-node", + "version": "v3.18.6" + }, + "cnx-node-windows": { + "image": "tigera/cnx-node-windows", + "version": "v3.18.6" + }, + "dikastes": { + "image": "tigera/dikastes", + "version": "v3.18.6" + }, + "dex": { + "image": "tigera/dex", + "version": "v3.18.6" + }, + "fluentd": { + "image": "tigera/fluentd", + "version": "v3.18.6" + }, + "fluentd-windows": { + "image": "tigera/fluentd-windows", + "version": "v3.18.6" + }, + "es-proxy": { + "image": "tigera/es-proxy", + "version": "v3.18.6" + }, + "eck-kibana": { + "version": "7.17.25" + }, + "kibana": { + "image": "tigera/kibana", + "version": "v3.18.6" + }, + "eck-elasticsearch": { + "version": "7.17.25" + }, + "elasticsearch": { + "image": "tigera/elasticsearch", + "version": "v3.18.6" + }, + "cloud-controllers": { + "image": "tigera/cloud-controllers", + "version": "v3.18.6" + }, + "elastic-tsee-installer": { + "image": "tigera/intrusion-detection-job-installer", + "version": "v3.18.6" + }, + "es-curator": { + "image": "tigera/es-curator", + "version": "v3.18.6" + }, + "intrusion-detection-controller": { + "image": "tigera/intrusion-detection-controller", + "version": "v3.18.6" + }, + "compliance-controller": { + "image": "tigera/compliance-controller", + "version": "v3.18.6" + }, + "compliance-reporter": { + "image": "tigera/compliance-reporter", + "version": "v3.18.6" + }, + "compliance-snapshotter": { + "image": "tigera/compliance-snapshotter", + "version": "v3.18.6" + }, + "compliance-server": { + "image": "tigera/compliance-server", + "version": "v3.18.6" + }, + "compliance-benchmarker": { + "image": "tigera/compliance-benchmarker", + "version": "v3.18.6" + }, + "ingress-collector": { + "image": "tigera/ingress-collector", + "version": "v3.18.6" + }, + "l7-collector": { + "image": "tigera/l7-collector", + "version": "v3.18.6" + }, + "license-agent": { + "image": "tigera/license-agent", + "version": "v3.18.6" + }, + "tigera-cni": { + "image": "tigera/cni", + "version": "v3.18.6" + }, + "tigera-cni-windows": { + "image": "tigera/cni-windows", + "version": "v3.18.6" + }, + "firewall-integration": { + "image": "tigera/firewall-integration", + "version": "v3.18.6" + }, + "egress-gateway": { + "image": "tigera/egress-gateway", + "version": "v3.18.6" + }, + "honeypod": { + "image": "tigera/honeypod", + "version": "v3.18.6" + }, + "honeypod-exp-service": { + "image": "tigera/honeypod-exp-service", + "version": "v3.18.6" + }, + "honeypod-controller": { + "image": "tigera/honeypod-controller", + "version": "v3.18.6" + }, + "key-cert-provisioner": { + "image": "tigera/key-cert-provisioner", + "version": "v1.1.27", + "registry": "quay.io" + }, + "elasticsearch-metrics": { + "image": "tigera/elasticsearch-metrics", + "version": "v3.18.6" + }, + "packetcapture": { + "image": "tigera/packetcapture", + "version": "v3.18.6" + }, + "policy-recommendation": { + "image": "tigera/policy-recommendation", + "version": "v3.18.6" + }, + "prometheus": { + "image": "tigera/prometheus", + "version": "v3.18.6" + }, + "coreos-prometheus": { + "version": "v2.48.1" + }, + "coreos-prometheus-operator": { + "version": "v0.70.0" + }, + "coreos-config-reloader": { + "version": "v0.70.0" + }, + "prometheus-operator": { + "image": "tigera/prometheus-operator", + "version": "v3.18.6" + }, + "prometheus-config-reloader": { + "image": "tigera/prometheus-config-reloader", + "version": "v3.18.6" + }, + "tigera-prometheus-service": { + "image": "tigera/prometheus-service", + "version": "v3.18.6" + }, + "es-gateway": { + "image": "tigera/es-gateway", + "version": "v3.18.6" + }, + "linseed": { + "image": "tigera/linseed", + "version": "v3.18.6" + }, + "deep-packet-inspection": { + "image": "tigera/deep-packet-inspection", + "version": "v3.18.6" + }, + "eck-elasticsearch-operator": { + "version": "2.6.1" + }, + "elasticsearch-operator": { + "image": "tigera/eck-operator", + "version": "v3.18.6" + }, + "coreos-alertmanager": { + "version": "v0.25.1" + }, + "alertmanager": { + "image": "tigera/alertmanager", + "version": "v3.18.6" + }, + "envoy": { + "image": "tigera/envoy", + "version": "v3.18.6" + }, + "envoy-init": { + "image": "tigera/envoy-init", + "version": "v3.18.6" + }, + "flexvol": { + "image": "tigera/pod2daemon-flexvol", + "version": "v3.18.6" + }, + "csi": { + "image": "tigera/csi", + "version": "v3.18.6" + }, + "csi-node-driver-registrar": { + "image": "tigera/node-driver-registrar", + "version": "v3.18.6" + } + } + }, { "title": "v3.18.5", "tigera-operator": { @@ -76,14 +332,14 @@ "version": "v3.18.5" }, "eck-kibana": { - "version": "7.17.22" + "version": "7.17.25" }, "kibana": { "image": "tigera/kibana", "version": "v3.18.5" }, "eck-elasticsearch": { - "version": "7.17.22" + "version": "7.17.25" }, "elasticsearch": { "image": "tigera/elasticsearch", diff --git a/calico-enterprise_versioned_docs/version-3.18-2/variables.js b/calico-enterprise_versioned_docs/version-3.18-2/variables.js index 62fa50571b..f13e50b5c0 100644 --- a/calico-enterprise_versioned_docs/version-3.18-2/variables.js +++ b/calico-enterprise_versioned_docs/version-3.18-2/variables.js @@ -2,12 +2,12 @@ const releases = require('./releases.json'); const componentImage = require('../../src/components/utils/componentImage'); const variables = { - releaseTitle: 'v3.18.5', + releaseTitle: 'v3.18.6', prodname: 'Calico Enterprise', prodnamedash: 'calico-enterprise', version: 'v3.18', baseUrl: '/calico-enterprise/3.18', - filesUrl: 'https://downloads.tigera.io/ee/v3.18.5', + filesUrl: 'https://downloads.tigera.io/ee/v3.18.6', tutorialFilesURL: 'https://docs.tigera.io/files', tmpScriptsURL: 'https://docs.tigera.io/calico-enterprise/3.18', windowsScriptsURL: 'https://raw.githubusercontent.com/kubernetes-sigs/sig-windows-tools/master/hostprocess', @@ -17,7 +17,7 @@ const variables = { noderunning: 'calico-node', rootDirWindows: 'C:\\TigeraCalico', registry: 'quay.io/', - chart_version_name: 'v3.18.5-0', + chart_version_name: 'v3.18.6-0', tigeraOperator: releases[0]['tigera-operator'], releases, imageNames: {