You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# Cluster API Provider for Cloudstack (CAPC) Release Notes
2
+
3
+
## Version v0.4.8
4
+
5
+
These Release Notes are for the customer downloading and deploying CAPC private Version 0.4.8 released on 10/20/2022.
6
+
7
+
### This release extends the v0.4.4 release of CAPC with:
8
+
* Support for distributing VMs across multiple CloudStack management endpoints via Failure Domains (in addition to pre-existing Zone, Domain and Account-based Failure Domains)
9
+
* v1beta2 declared, as the above is a breaking change.
10
+
* Switch to user-provisioned-secret-based CloudStack credentials (from the previous env-var-based method).
11
+
* Support for Customized Disk Offerings (i.e., with parameters)
12
+
* Custom metrics that count CloudStack API errors returned, grouped by error code.
13
+
* new *make* target and config files for creating an alternative infrastructure-components.yaml that exposes the manager metrics port from the pod via kube-rbac-proxy.
14
+
* Discontinued MachineStateChecker, as the remediation technique of deleting CAPI machines from with the manager is proving unreliable.
15
+
* Use of CAPI Machine name as hostname and k8s node name
16
+
* Various bug fixes, doc improvements and build/test enhancements.
17
+
18
+
### TLS Certificates
19
+
The default mode of operation for the deployed Kubernetes cluster components is to use self-signed certificates. Options exist for use of an enterprise certificate authority via cert-manager (https://cert-manager.io/docs/configuration/). Detailed configuration of this component is outside the scope of this release.
20
+
21
+
### Pre-conditions
22
+
23
+
* The following pre-conditions must be met for CAPC to operate as designed.
24
+
* A functional CloudStack 4.14 or 4.16 deployment
25
+
* The CloudStack account used by CAPC must have domain administrator privileges or be otherwise appropriately privileged to execute the API calls specified in the below CAPC CloudStack API Calls document link. A least-privilege CloudStack Role is now documents in the CAPC book.
26
+
* Zone(s) and Network(s) must be pre-created and available to CAPC prior to CreateCluster API call.
27
+
* A VM template suitable for implementing a Kubernetes node with kubeadm must be available in CloudStack.
28
+
* The software has been tested with RHEL-8 images created with CAPI Image-builder.
29
+
* Links to pre-built images are available in the CAPC Book.
30
+
* Machine offerings suitable for running Kubernetes nodes must be available in CloudStack
31
+
* When using CloudStack Shared Networks, an unused IP address in the shared network’s address range must be available for the Kubernetes Control Plane for each cluster, upon which it will be exposed.
32
+
33
+
### Release Assets :
34
+
* CAPI Standard deployment manifests: infrastructure-components.yaml, metadata.yaml, cluster-template.yaml and its flavor variations.
35
+
* capi-cloudstack-controller image, at gcr.io/k8s-staging-capi-cloudstack
36
+
* security_findings.csv: results of package security scan
37
+
38
+
### Known Issues :
39
+
* Cluster upgrade is not supported when the controlPlaneEndpoint is defined to be an IP address in a shared network when not using kube-vip for the control plane.
cloud.google.com/go/storage:1.10.0,cpe:2.3:a:storage_project:storage:1.10.0:*:*:*:*:*:*:*,No exploitable issue. This finding only affects applications unpacking container Image manifests.
3
+
github.com/coreos/etcd:3.3.13+incompatible,cpe:2.3:a:etcd:etcd:3.3.13:*:*:*:*:*:*:*,"No exploitable issue. etcd is unused in Kubernetes CAPI controllers, only the Kubernetes API server interacts with an etcd database."
4
+
github.com/docker/distribution:2.7.1+incompatible,cpe:2.3:a:docker:docker:2.7.1:*:*:*:*:*:*:*,No exploitable issue. The Docker API and client are unused in a Kubernetes CAPI controller.
5
+
github.com/emicklei/go-restful:2.9.5+incompatible,cpe:2.3:a:go-restful_project:go-restful:2.9.5:*:*:*:*:*:*:*,Used by Kubernetes libraries (i.e. k8s.io/apiserver). As of 2022-10-20 NIST reports that the vulnerability is undergoing re-analysis with recommendation to check-back.
6
+
github.com/grpc-ecosystem/go-grpc-middleware:1.3.0,cpe:2.3:a:grpc:grpc:1.3.0:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
7
+
github.com/grpc-ecosystem/go-grpc-prometheus:1.2.0,cpe:2.3:a:grpc:grpc:1.2.0:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
8
+
github.com/grpc-ecosystem/grpc-gateway:1.16.0,cpe:2.3:a:grpc:grpc:1.16.0:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
9
+
github.com/hashicorp/consul/api:1.10.1,cpe:2.3:a:hashicorp:consul:1.10.1:*:*:*:*:*:*:*,No exploitable issue. Consul is unused by a Kubernetes CAPI controller.
10
+
github.com/hashicorp/consul/sdk:0.8.0,cpe:2.3:a:hashicorp:consul:0.8.0:*:*:*:*:*:*:*,No exploitable issue. Consul is unused by a Kubernetes CAPI controller.
11
+
github.com/matttproud/golang_protobuf_extensions:1.0.2-0.20181231171920-c182affec369,cpe:2.3:a:golang:protobuf:1.0.2.0.20181231171920.c182.fec369:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
12
+
github.com/prometheus/client_golang:1.11.0,cpe:2.3:a:prometheus:client_golang:1.11.0:*:*:*:*:*:*:*,No exploitable issue. The mentioned vulnerability is related to the Prometheus UI.
13
+
github.com/prometheus/client_model:0.2.0,cpe:2.3:a:prometheus:prometheus:0.2.0:*:*:*:*:*:*:*,No exploitable issue. The mentioned vulnerability is related to the Prometheus UI.
14
+
github.com/prometheus/common:0.26.0,cpe:2.3:a:prometheus:prometheus:0.26.0:*:*:*:*:*:*:*,No exploitable issue. The mentioned vulnerability is related to the Prometheus UI.
15
+
github.com/prometheus/procfs:0.6.0,cpe:2.3:a:prometheus:prometheus:0.6.0:*:*:*:*:*:*:*,No exploitable issue. The mentioned vulnerability is related to the Prometheus UI.
16
+
github.com/prometheus/tsdb:0.7.1,cpe:2.3:a:prometheus:prometheus:0.7.1:*:*:*:*:*:*:*,No exploitable issue. The mentioned vulnerability is related to the Prometheus UI.
17
+
github.com/tmc/grpc-websocket-proxy:0.0.0-20201229170055-e5319fda7802,cpe:2.3:a:grpc:grpc:0.0.0.20201229170055.e5319.fda7802:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
18
+
go.etcd.io/etcd/client/v2:2.305.0,cpe:2.3:a:etcd:etcd:2.305.0:*:*:*:*:*:*:*,"No exploitable issue. etcd is unused in Kubernetes CAPI controllers, only the Kubernetes API server interacts with an etcd database."
19
+
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc:0.20.0,cpe:2.3:a:grpc:grpc:0.20.0:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
20
+
google.golang.org/grpc/cmd/protoc-gen-go-grpc:1.1.0,cpe:2.3:a:grpc:grpc:1.1.0:*:*:*:*:*:*:*,No exploitable issue. Kubernetes controllers do not make or issue gRPC calls.
21
+
gopkg.in/yaml.v3:3.0.0-20210107192922-496545a6307b,cpe:2.3:a:yaml_project:yaml:3.0.0:*:*:*:*:go:*:*,As of 2022-10-20 NIST reports that the vulnerability is undergoing re-analysis with recommendation to check-back.
0 commit comments