copyright | lastupdated | keywords | subcollection | ||
---|---|---|---|---|---|
|
2023-02-06 |
kubernetes, nginx, ingress controller, fluentd |
containers |
{{site.data.keyword.attribute-definition-list}}
{: #cluster-add-ons-changelog}
Your {{site.data.keyword.containerlong}} cluster comes with components, such as the Fluentd and Ingress ALB components, that are updated automatically by IBM. You can also disable automatic updates for some components and manually update them separately from the master and worker nodes. Refer to the tables in the following sections for a summary of changes for each version. {: shortdesc}
Check the Security Bulletins on {{site.data.keyword.cloud_notm}} Status for security vulnerabilities that affect {{site.data.keyword.containerlong_notm}}. You can filter the results to view only Kubernetes Cluster security bulletins that are relevant to {{site.data.keyword.containerlong_notm}}. {{site.data.keyword.containerlong_notm}}. Change log entries that address other security vulnerabilities but don't also refer to an IBM Security Bulletin are for vulnerabilities that are not known to affect {{site.data.keyword.containerlong_notm}} in normal usage. If you run privileged containers, run commands on the workers, or execute untrusted code, then you might be at risk.
For more information about managing updates for Fluentd and Ingress ALBs, see Updating cluster components.
{: #kube_ingress_changelog}
View version changes for Ingress application load balancers (ALBs) that run the community Kubernetes Ingress image. {: shortdesc}
When you create a new ALB, enable an ALB that was previously disabled, or manually update an ALB, you can specify an image version for your ALB in the --version
option. The latest three versions of the Kubernetes Ingress image are supported for ALBs. To list the currently supported versions, run the following command:
ibmcloud ks ingress alb versions
{: pre}
The Kubernetes Ingress version follows the format <community_version>_<ibm_build>_iks
. The IBM build number indicates the most recent build of the Kubernetes Ingress NGINX release that {{site.data.keyword.containerlong_notm}} released. For example, the version 1.1.2_2507_iks
indicates the most recent build of the 0.47.0
Ingress NGINX version. {{site.data.keyword.containerlong_notm}} might release builds of the community image version to address vulnerabilities.
When automatic updates are enabled for ALBs, your ALBs are updated to the most recent build of the version that is marked as default
. If you want to use a version other than the default, you must disable automatic updates. Typically, the latest version becomes the default version one month after the latest version is released by the Kubernetes community. Actual availability and release dates of versions are subject to change and depend on various factors, such as community updates, security patches, and technology changes between versions.
{: #1_5_1}
{: #1.5.1_3705_iks}
Updates the golang version to 1.19.5.
{: #1.5.1_3683_iks}
Introduces support for multiple platform architectures such as AMD64 and s390x.
{: #1.5.1_3536_iks}
Initial release of 1.5.1
{: #1_4_0}
{: #1.4.1_3703_iks}
Updates the golang version to 1.19.5.
{: #1.4.0_3684_iks}
Introduces support for multiple platform architectures such as AMD64 and s390x.
{: #1.4.0_3537_iks}
- CVE-2022-43551{: external}
- CVE-2022-43552{: external}
{: #1.4.0_3297_iks}
CVE-2022-41717{: external}
{: #1.4.0_3212_iks}
Initial release of 1.4.0
{: #1_3_1}
{: #1.3.1_3704_iks}
Updates the golang version to 1.19.5.
{: #1.3.1_3685_iks}
Introduces support for multiple platform architectures such as AMD64 and s390x.
{: #1.3.1_3538_iks}
- CVE-2022-43551{: external}
- CVE-2022-43552{: external}
{: #1.3.1_3298_iks}
CVE-2022-41717{: external}
{: #1.3.1_3192_iks}
Updated the golang version to 1.19.3.
{: #1.3.1_3108_iks}
Initial release of 1.3.1
{: #1_3_0}
Version 1.3.0 is no longer supported.
{: #1.3.0_2907_iks}
- CVE-2022-32221{: external}
- CVE-2022-42915{: external}
- CVE-2022-42916{: external}
{: #1.3.0_2847_iks}
Initial release of 1.3.0
{: #1_2_1}
Version 1.3.0 is no longer supported.
{: #1.2.1_3299_iks}
CVE-2022-41717{: external}
{: #1.2.1_3186_iks}
Updated the golang version to 1.19.3.
{: #1.2.1_3111_iks}
Metadata changes.
{: #1.2.1_2809_iks}
- CVE-2022-32149{: external}
- CVE-2022-40303{: external}
- CVE-2022-40304{: external}
{: #1.2.1_2714_iks}
Updated the NGINX base image.
{: #1.2.1_2646_iks}
- Managed configuration changes. For more information, see Ingress ConfigMap change log.
{: #1.2.1_2558_iks}
- CVE-2022-35252{: external}
- CVE-2022-27664{: external}
{: #1.2.1_2506_iks}
- CVE-2022-3209{: external}
{: #1.2.1_2488_iks}
- CVE-2022-37434{: external}
{: #1.2.1_2487_iks}
- CVE-2022-37434{: external}
{: #1.2.1_2426_iks}
- CVE-2022-30065{: external}
- CVE-2022-21221{: external}
{: #1.2.1_2415_iks}
- CVE-2022-29458{: external}
- CVE-2022-2097{: external}
- CVE-2022-27781{: external}
- CVE-2022-27782{: external}
- CVE-2022-32205{: external}
- CVE-2022-32206{: external}
- CVE-2022-32207{: external}
- CVE-2022-32208{: external}
{: #1.2.1_2337_iks}
- Initial release of
1.2.1
- Resolves CVE-2021-25748{: external}
{: #1_2_0}
{: #1.2.0_2251_iks}
Resolves CVE-2022-29824{: external}
{: #1.2.0_2147_iks}
- CVE-2022-22576{: external}
- CVE-2022-27774{: external}
- CVE-2022-27775{: external}
- CVE-2022-27776{: external}
- CVE-2022-28327{: external}
- CVE-2022-24675{: external}
- CVE-2022-27536{: external}
{: #1.2.0_2131_iks}
- Initial release of
1.2.0
. - Resolves CVE-2021-25745{: external} and CVE-2021-25746{: external}. For more information, see the security bulletin{: external}.
{: #1_1_2}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 1.1.2 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
Version 1.1.2 is no longer available.
{: #1.1.2_2808_iks}
- CVE-2022-32149{: external}
- CVE-2022-40303{: external}
- CVE-2022-40304{: external}
{: #1.1.2_2645_iks}
- Managed configuration changes. For more information, see Ingress ConfigMap change log.
{: #1.1.2_2586_iks}
- CVE-2022-35252{: external}
- CVE-2022-27664{: external}
{: #1.1.2_2507_iks}
- CVE-2022-3209{: external}
{: #1.1.2_2411_iks}
Resolves CVE-2022-30065{: external}
{: #1.1.2_2368_iks}
- CVE-2022-29458{: external}
- CVE-2022-2097{: external}
{: #1.1.2_2305_iks}
- CVE-2022-29162{: external}
- CVE-2022-21221{: external}
{: #1.1.2_2252_iks}
Resolves CVE-2022-29824{: external}
{: #1.1.2_2146_iks}
- CVE-2022-22576{: external}
- CVE-2022-27774{: external}
- CVE-2022-27775{: external}
- CVE-2022-27776{: external}
- CVE-2022-28327{: external}
- CVE-2022-24675{: external}
- CVE-2022-27536{: external}
{: #1.1.2_2121_iks}
Resolves CVE-2022-1271{: external}
{: #1.1.2_2084_iks}
- CVE-2018-25032{: external}
- CVE-2022-28391{: external}
- CVE-2022-0778{: external}
{: #1.1.2_2050_iks}
- CVE-2022-0778{: external}
- CVE-2022-23308{: external}
{: #1_1_1}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 1.1.1 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #1.1.1_2119_iks}
Resolves CVE-2022-1271{: external}
{: #1.1.1_2085_iks}
- CVE-2018-25032{: external}
- CVE-2022-28391{: external}
- CVE-2022-0778{: external}
{: #1.1.1_2054_iks}
- CVE-2022-0778{: external}
- CVE-2022-23308{: external}
{: #1.1.1_1996_iks}
- CVE-2022-23772{: external}
- CVE-2022-23773{: external}
- CVE-2022-23806{: external}
{: #1.1.1_1949_iks}
Version 1.1.1_1949_iks is now the default version for all ALBs that run the Kubernetes Ingress image. If you have Ingress auto update enabled, your ALBs automatically update to use this image.
- CVE-2021-44716{: external}
- CVE-2021-44717{: external}
{: #1_0_0}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 1.0.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #1.0.3_1995_iks}
- CVE-2022-23772{: external}
- CVE-2022-23773{: external}
- CVE-2022-23806{: external}
{: #1.0.3_1933_iks}
- CVE-2021-44716{: external}
- CVE-2021-44717{: external}
{: #1.0.3_1831_iks}
- CVE-2021-41771{: external}
- CVE-2021-41772{: external}
{: #1.0.3_1730_iks}
{: #1.0.0_1699_iks}
- CVE-2021-22945{: external}
- CVE-2021-22946{: external}
- CVE-2021-22947{: external}
{: #1.0.0_1645_iks}
Initial release of version 1.0.0.
{: #0_49_0}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following sections for a summary of changes for each build of version 0.49.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.49.3_2253_iks}
This image is no longer available. {: note}
Resolves CVE-2022-29824{: external}
{: #0.49.3_2145_iks}
- CVE-2022-22576{: external}
- CVE-2022-27774{: external}
- CVE-2022-27775{: external}
- CVE-2022-27776{: external}
- CVE-2022-28327{: external}
- CVE-2022-24675{: external}
- CVE-2022-27536{: external}
{: #0.49.3_2120_iks}
Resolves CVE-2022-1271{: external}
{: #0.49.3_2083_iks}
- CVE-2018-25032{: external}
- CVE-2022-28391{: external}
- CVE-2022-0778{: external}
{: #0.49.3_2051_iks}
- CVE-2022-0778{: external}
- CVE-2022-23308{: external}
{: #0.49.3_1994_iks}
- CVE-2022-23772{: external}
- CVE-2022-23773{: external}
- CVE-2022-23806{: external}
{: #0.49.3_1941_iks}
- CVE-2021-44716{: external}
- CVE-2021-44717{: external}
{: #0.49.3_1830_iks}
- CVE-2021-41771{: external}
- CVE-2021-41772{: external}
{: #0.49.3_1745_iks}
As of 14 Sep 2021, this is the only image supported for Kubernetes version 1.18 clusters.
{: #0_48_0}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.48.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.48.1_1698_iks}
This image is no longer available. {: note}
- CVE-2021-22945{: external}
- CVE-2021-22946{: external}
- CVE-2021-22947{: external}
{: #0.48.1_1613_iks}
- CVE-2021-3711{: external}
- CVE-2021-3712{: external}
{: #0.48.1_1579_iks}
Updates to support arbitrary controller values in the Ingress classes.
{: #0.48.1_1541_iks}
- CVE-2021-36221{: external}
- CVE-2021-3121{: external}
{: #0.48.1_1465_iks}
{: #0_47_0}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.47.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.47.0_1614_iks}
This image is no longer available. {: note}
- CVE-2021-3711{: external}
- CVE-2021-3712{: external}
{: #0.47.0_1578_iks}
Updates to support arbitrary controller values in the Ingress classes.
{: #0.47.0_1540_iks}
- CVE-2021-36221{: external}
- CVE-2021-3121{: external}
{: #0.47.0_1480_iks}
- CVE-2021-34558{: external}
{: #0.47.0_1434_iks}
- CVE-2021-3541{: external}{: extenral}
- CVE-2021-22925{: external}
- CVE-2021-22924{: external}
{: #0.47.0_1376_iks}
- CVE-2019-20633{: external}.
{: #0.47.0_1341_iks}
{: #0_45_0}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.45.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.45.0_1482_iks}
This image is no longer available. {: note}
{: #0.45.0_1435_iks}
- CVE-2021-3541{: external}{: extenral}
- CVE-2021-22925{: external}
- CVE-2021-22924{: external}
{: #0.45.0_1329_iks}
- CVE-2021-22898{: external}
- CVE-2021-22897{: external}
- CVE-2021-22901{: external}
- CVE-2021-33194{: external}
- CVE-2021-31525{: external}
{: #regression}
Due to a regression in the community Kubernetes Ingress NGINX code{: external}, trailing slashes (/
) are removed from subdomains during TLS redirects.
{: #0.45.0_1228_iks}
{: #0_43_0}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.43.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.43.0_1697_iks}
This image is no longer available. {: note}
- CVE-2021-22945{: external}
- CVE-2021-22946{: external}
- CVE-2021-22947{: external}
{: #0.43.0_1612_iks}
- CVE-2021-3711{: external}
- CVE-2021-3712{: external}
{: #0.43.0_1580_iks}
Updates to support arbitrary controller values in the Ingress classes.
{: #0.43.0_1539_iks}
- CVE-2021-36221{: external}
- CVE-2021-3121{: external}
{: #archive-unsupported}
{: #0_35_0}
Kubernetes Ingress controller version 0.35.0 is no longer supported. {: important}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.35.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.35.0_1374_iks}
- CVE-2019-20633{: external}.
{: #0.35.0_1330_iks}
- CVE-2021-22898{: external}
- CVE-2021-22897{: external}
- CVE-2021-22901{: external}
- CVE-2021-33194{: external}
- CVE-2021-31525{: external}
{: #0.35.0_1182_iks}
- CVE-2021-20305{: external}
- CVE-2021-28851{: external}
- CVE-2021-28852{: external}
{: #0.35.0_1155_iks}
- CVE-2021-3449{: external}
- CVE-2021-3450{: external}
{: #version-update}
In the ibm-k8s-controller-config
ConfigMap, sets the server-tokens
field to False
so that the NGINX version is not returned in response headers.
{: #0.35.0_1094_iks}
- CVE-2021-3114{: external}
- CVE-2021-3115{: external}
{: #0.35.0_869_iks}
- CVE-2020-28241{: external}
{: #0.35.0_826_iks}
- CVE-2020-1971{: external}.
{: #0.35.0_767_iks}
- CVE-2020-28362{: external}
- CVE-2020-28367{: external}
- CVE-2020-28366{: external}
{: #0.35.0_474_iks}
- CVE-2020-24977{: external}
- CVE-2020-8169{: external}
- CVE-2020-8177{: external}
{: #0_34_1}
For the community changes for this version of the Kubernetes Ingress image, see the community Kubernetes change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.34.1 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.34.1_1331_iks}
- CVE-2021-22898{: external}
- CVE-2021-22897{: external}
- CVE-2021-22901{: external}
- CVE-2021-33194{: external}
- CVE-2021-31525{: external}
{: #0.34.1_1191_iks}
- CVE-2021-20305{: external}
- CVE-2021-28851{: external}
- CVE-2021-28852{: external}
{: #0.34.1_1153_iks}
- CVE-2021-3449{: external}
- CVE-2021-3450{: external}.
{: #version-update-34}
In the ibm-k8s-controller-config
ConfigMap, sets the server-tokens
field to False
so that the NGINX version is not returned in response headers.
{: #0.34.1_1096_iks}
- CVE-2021-3114{: external}
- CVE-2021-3115{: external}
{: #0.34.1_866_iks}
- CVE-2020-28241{: external}.
{: #0.34.1_835_iks}
- CVE-2020-1971{: external}.
{: #0.34.1_764_iks}
- CVE-2020-28362{: external}
- CVE-2020-28367{: external}
- CVE-2020-28366{: external}
{: #0.34.1_391_iks}
- CVE-2019-15847{: external}.
{: #0_33_0}
For the community changes for this version of the Kubernetes Ingress image, see the community change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.33.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #0.33.0_1198_iks}
- CVE-2021-20305{: external}
- CVE-2021-28851{: external}
- CVE-2021-28852{: external}
{: #0.33.0_1154_iks}
- CVE-2021-3449{: external}
- CVE-2021-3450{: external}
{: #version-updates-33}
In the ibm-k8s-controller-config
ConfigMap, sets the server-tokens
field to False
so that the NGINX version is not returned in response headers.
{: #0.33.0_1097_iks}
- CVE-2021-3114{: external}
- CVE-2021-3115{: external}
{: #0.33.0_865_iks}
- CVE-2020-28241{: external}.
{: #0.33.0_834_iks}
- CVE-2020-1971{: external}.
{: #0.33.0_768_iks}
- CVE-2020-28362{: external}
- CVE-2020-28367{: external}
- CVE-2020-28366{: external}
{: #0.33.0_390_iks}
- CVE-2019-15847{: external}.
{: #0_32_0}
For the community changes for this version of the Kubernetes Ingress image, see the community change log for ingress-nginx
{: external}. Refer to the following table for a summary of changes for each build of version 0.32.0 of the Kubernetes Ingress image that {{site.data.keyword.containerlong_notm}} releases.
{: shortdesc}
{: #version-update-32}
In the ibm-k8s-controller-config
ConfigMap, sets the server-tokens
field to False
so that the NGINX version is not returned in response headers.
{: #0.32.0_392_iks}
- CVE-2019-15847{: external}.
{: #fluentd_changelog}
View image version changes for the Fluentd component for logging in your {{site.data.keyword.containerlong_notm}} clusters. {: shortdesc}
As of 14 November 2019, a Fluentd component is created for your cluster only if you create a logging configuration to forward logs to a syslog server. If no logging configurations for syslog exist in your cluster, the Fluentd component is removed automatically. If you don't forward logs to syslog and want to ensure that the Fluentd component is removed from your cluster, automatic updates to Fluentd must be enabled. {: important}
Refer to the following information for a summary of changes for each build of the Fluentd component.
{: #14-nov-2019}
The following changes occurred for the c7901bf0d1323806d44ce5f92bce5085f9b6c791
Fluentd component.
Non-disruptive changes : None
Disruptive : The Fluentd component is created for your cluster only if you create a logging configuration to forward logs to a syslog server. If no logging configurations for syslog exist in your cluster, the Fluentd component is removed automatically. If you don't forward logs to syslog and want to ensure that the Fluentd component is removed from your cluster, automatic updates to Fluentd must be enabled.
{: #06-nov-2019}
The following changes occurred for the c7901bf0d1323806d44ce5f92bce5085f9b6c791
Fluentd component.
Non-disruptive changes
: Fixes LibSass
vulnerabilities for CVE-2018-19218{: external}.
Disruptive : None
{: #28-oct-2019}
The following changes occurred for the ee01ba3471cadbb9925269183acd724f4bf0e5bd
Fluentd component.
Non-disruptive changes : Fixes Ruby vulnerabilities - CVE-2019-15845{: external} - CVE-2019-16201{: external} - CVE-2019-16254{: external} - CVE-2019-16255{: external}
Disruptive : None
{: #24-sept-2019}
The following changes occurred for the 58c604236080f142f35d14fe3b6c4b4484290121
Fluentd component.
Non-disruptive changes : Fixes OpenSSL vulnerabilities - CVE-2019-1547{: external} - CVE-2019-1549{: external} - CVE-2019-1563{: external}
Disruptive : None
{: #18-sept-2019}
The following changes occurred for the 7c94e41a34ff1b7a56b9163471ff740a9585e053
Fluentd component.
Non-disruptive changes
: Updates the Kubernetes API version in the Fluentd deployment from extensions/v1beta1
to apps/v1
.
Disruptive : None
{: #14-aug-2019}
The following changes occurred for the e7e944a8279deee0c3a8743e2fa69696ed71b6f5
Fluentd component.
Non-disruptive changes
: Fixes GNU binary utilities (binutils
) vulnerabilities
- CVE-2018-6543{: external}
- CVE-2018-6759{: external}
- CVE-2018-6872{: external}
- CVE-2018-7208{: external}
- CVE-2018-7568{: external}
- CVE-2018-7569{: external}
- CVE-2018-7570{: external}
- CVE-2018-7642{: external}
- CVE-2018-7643{: external}
- CVE-2018-8945{: external}
Disruptive : None
{: #09-aug-2019}
The following changes occurred for the d24b1afcc004ec9745dc3f9ef1328d3ed4b495f8
Fluentd component.
Non-disruptive changes
: Fixes musl libc
vulnerabilities for CVE-2019-14697{: external}.
Disruptive : None
{: #22-july-2019}
The following changes occurred for the 96f399cdea1c86c63a4ca4e043180f81f3559676
Fluentd component.
Non-disruptive changes : Updates Alpine packages - CVE-2019-8905{: external} - CVE-2019-8906{: external} - CVE-2019-8907{: external}
Disruptive : None
{: #30-june-2019}
The following changes occurred for the e7c10d74350dc64d4d92ba7f72bb4ff9219315d2
Fluentd component.
Non-disruptive changes : Updates the Fluent config map to always ignore pod logs from IBM namespaces, even when the Kubernetes master is unavailable.
Disruptive : None
{: #21-may-2019}
The following changes occurred for the c16fe1602ab65db4af0a6ac008f99ca2a526e6f6
Fluentd component.
Non-disruptive changes : Fixes a bug where worker node metrics did not display.
Disruptive : None
{: #10-may-2019}
The following changes occurred for the 60fc11f7bd39d9c6cfed923c598bf6457b3f2037
Fluentd component.
Non-disruptive changes : Updates Ruby packages - CVE-2019-8320{: external} - CVE-2019-8321{: external} - CVE-2019-8322{: external} - CVE-2019-8323{: external} - CVE-2019-8324{: external} - CVE-2019-8325{: external}
Disruptive : None
{: #08-may-2019}
The following changes occurred for the 91a737f68f7d9e81b5d2223c910aaa7d7f91b76d
Fluentd component.
Non-disruptive changes : Updates Ruby packages - [CVE-2019-8320])https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-8320){: external} - CVE-2019-8321{: external} - CVE-2019-8322{: external} - CVE-2019-8323{: external} - CVE-2019-8324{: external} - CVE-2019-8325{: external}
Disruptive : None
{: #11-april-2019}
The following changes occurred for the d9af69e286986a05ed4a50469585b1cf978ddb1d
Fluentd component.
Non-disruptive changes : Updates the cAdvisor plug-in to use TLS 1.2.
Disruptive : None
{: #01-april-2019}
The following changes occurred for the 3100ddb62580a9f46ffdff7bab2ebec40b164de6
Fluentd component.
Non-disruptive changes : Updates the Fluentd service account.
Disruptive : None
{: #18-mar-2019}
The following changes occurred for the c85567b75bd7ad1c9428794cd63a8e239c3fd8f5
Fluentd component.
Non-disruptive changes : Removes the dependency on cURL for CVE-2019-8323{: external}.
Disruptive : None
{: #18-feb-2019}
The following changes occurred for the 320ffdf87de068ee2f7f34c0e7a47a111e8d457b
Fluentd component.
Non-disruptive changes : Updates Fluentd to version 1.3. - Removes Git from the Fluentd image for CVE-2018-19486{: external}.
Disruptive : None
{: #01-jan-2019}
The following changes occurred for the 972865196aefd3324105087878de12c518ed579f
Fluentd component.
Non-disruptive changes
: Enables UTF-8 encoding for the Fluentd in_tail
plug-in.
- Minor bug fixes.
Disruptive : None