Release Date: 2021-02-28
Added errors and exceptions to Action API resources.
CSI volume snapshot objects are now labeled with Kasten labels.
Improve backup performance for policies that cover a large number of namespaces.
Added support to configure memory and CPU resources for injected Kanister Sidecar container using helm values used for Generic Volume Restore pod. Refer to Generic Volume Backup and Restore Resource Requirements for more details.
Fixed issue where an extra cluster settings tab appeared for K10 setup with basic or no authentication.
Fixed issue where
k10primertool incorrectly required the
kasten-ionamespace to be created before running it. It will now run in the
defaultnamespace by default.
Fixed an issue in OpenShift environments where
DeploymentConfiglabels were not enumerated when creating a policy.
Fixed an issue with the k10multicluster tool removing the wrong cluster.
On Dashboard artifact card, volumes size is now correctly formatted instead of being shows in bytes.
Release Date: 2021-02-16
k10tools debugcommand to get complete application information from the specified namespace.
Reduced K10 Disaster Recovery backup retention count from 50 to 4.
Added new helm options to configure memory and CPU resources for the Generic Volume Restore pod.
Added a new tool -
k10genericbackupto make Kubernetes workloads compatible for K10 Generic Storage Backup by injecting a Kanister sidecar.
k10tools debugcommand to allow debugging of backup actions present on the cluster.
Kanister Backup/Restore workflow can now create Root CA ConfigMap in the application namespace when
cacertconfigmap.namehelm option is enabled. This ConfigMap is created when the Root CA Cert ConfigMap is not available in the application namespace and is deleted at the end of Kanister workflow.
Enterprise license node limits now stack. Support for additional nodes may now be purchased without invalidating the previous license.
Multi-Cluster admins can now configure cluster-level access for non-admin users through the dashboard as well as via API.
k10tools primercommand to check cluster compatibility for K10 Generic Volume Snapshots.
Helm upgrade will restart all the K10 service pods if the
k10-configconfig map or K10 related secrets are modified.
Added disk usage Prometheus metrics for stateful K10 services.
Retire action details are available in the K10 Dashboard and API.
Added the ability to manage multi-cluster RBAC resources to the Dashboard.
Added ability to specify the VolumeSnapshotClass as an annotation to the StorageClass.
Fixed an issue that caused updating prometheus policy metrics to fail due to the presence of policies in
Fixed an issue where a failure to meter in a GKE marketplace deployed instance would cause the metering service to restart.
This release requires re-bootstrapping of all secondary clusters.
Release Date: 2021-01-30
A new binary named
k10toolsis available for validation and debugging the environment where K10 is installed. Refer to this page for more information.
Pods created by Kanister are labeled with
Added optional override of Kanister operation timeouts.
Ability to handle volumes of size smaller than 1 GiB.
Exported restore points now indicate the export type - whether the restore point contains references to snapshots or portable data.
Fixes an issue in OpenShift environments where DeploymentConfig labels were not enumerated when creating a policy.
Fixes issue of not backing up Custom Resources in some cases when Custom Resource Definition defines multiple versions.
Fixed an issue in the helm chart that caused K10 pods to fail with
ImagePullBackOfferror after upgrade.
Fixes issue where imported cluster restore point could not be manually restored.
Fixed an issue that caused policy validation status to be stuck in
Indeterminatestate after K10 upgrade.
Fixed a bug on distributions page where text overlapped on narrower page widths.
The gateway service does not start if an IngressClass resource is present in the cluster. The workaround is to update the gateway service image to quay.io/datawire/ambassador:1.11.0.
This release will perform a catalog schema upgrade.
Release Date: 2021-01-21
Fixed an issue with Generic Volume Snapshot blueprint needed for restoration of PVCs containing symbolic links.
Fixes issue of bad counts in dashboard Policies card.
Release Date: 2021-01-17
K10 service storage can be compacted in service procedure.
When a workload with Kanister sidecar injection feature enabled is updated, K10 will automatically update the existing
kanister-toolssidecar image to the latest version.
Owner references are preserved for restored objects.
When creating a policy to import and restore, users now have the option to not restore cluster-scoped resources.
Restore points that were generated by clicking "Run Once" on the policy now display an icon to indicate this.
Restore actions on the Dashboard now link to the restore point that was used for the restore.
Added support for
v1) Kubernetes Volume Snapshot APIs.
Additional error information is available when a backup fails due to a workload not being ready.
Fixed a potential crash when exporting a restore point to an NFS File Storage Location.
Fixed an issue with restoration of PVCs containing symbolic links with absolute paths.
Fixed an issue with restoring PVCs containing symbolic links where retries would always fail.
The Dashboard will now detect when a user's authentication has expired and redirect to the Logout page.
Release Date: 2020-12-31
New helm options to define a list of groups and users whose members are granted admin-level access to K10's dashboard.
Added support for installation of K10 on Azure Stack.
New helm options to resize PVC sizes of individual services.
Introducing the ability to protect cluster-scoped (non-namespaced) resources in addition to protecting application namespaces.
Introduced a new helm value
global.upstreamCertifiedImagesto use Red Hat certified versions of upstream container images.
K10 will generate a ConfigMap in the application namespace containing a private CA certificate when the
cacacertconfigmap.namehelm option is enabled and if the Kanister sidecar injection feature is used for that application.
Dashboard users creating import+restore policies to restore cluster-scoped resources must set
kubectl edit. Refer to restoreParameters in the Policy API specification.
Release Date: 2020-12-14
Added a new helm value
auth.groupAllowListto define a list of groups whose members are allowed to access K10's dashboard.
Added a new
isRunNowlabel to differentiate RestorePoint resources created by
run onceoption of a Policy.
Added a new helm value
auth.ldap.restartPodto force a restart of the authentication service pod.
Added support to snapshot and restore standalone pods.
The support page now displays information about the currently authenticated user and also provides a link to the cluster status page.
Fixed an issue where Active Directory passwords with certain special characters were causing authentication service failures.
Fixed issue with multi-cluster dashboard not visible when K10 is setup in no authentication mode.
Fixed the image tag of K10 images reported by the
Upgraded Ambassador API Gateway to version 1.9.1.
Release Date: 2020-11-25
Fixed issue where policy creation fails for applications with names starting with numbers.
Fixed an issue where the
ingress.urlPathhelm option was being ignored while setting up K10's services.
Fixes an issue where the webhook to create Generic Backup sidecars was always configured with the
kasten-ionamespace instead of the namespace K10 was deployed in.
Fixed an issue where the
ingress.urlPathhelm option was not being used while setting up Active Directory and OpenShift based authentication.
Retrying Policy edits no longer results in invalid Policies being created.
Fixed issues during snapshot and restore of containers that include a VolumeMount with a subPath.
helm v2 is no longer supported. helm should be upgraded to v3 or higher. To upgrade the helm version used to install K10, please use the community developed plugin. See https://helm.sh/blog/migrate-from-helm-v2-to-helm-v3/
Release Date: 2020-11-14
The K10 Multi-Cluster Manager is now generally available. K10 multi-cluster allows management of multiple Kubernetes clusters through a single dashboard. Using the k10multicluster tool, primary-secondary relationships may be created between K10 instances in different clusters. Once logged-in to a primary K10 instance and granted the correct authorization, users have access to the multi-cluster dashboard that contains aggregate metrics and action summaries of the all secondary clusters. In addition, the main dashboards of secondary instances may be accessed directly through the multi-cluster dashboard. K10 resources, specifically Policies and Profiles, may be synchronized from primaries to secondaries.
auth.openshift.useServiceAccountCAto true to setup K10's Authentication Service with OpenShift's CA certificate for verifying TLS connections to the OpenShift OAuth server.
The Dashboard snapshot storage chart now only reflects namespaces that the user has permissions to view.
cacertconfigmap.namehelm option can be used to update K10's Authentication Service's trust store with a private root CA certificate for OpenShift based authentication.
Fix to enable restores of PVCs that are missing a StorageClass.
Fixed a bug where the profile card, shown in a pop-up, always used the dark mode color scheme.
Mitigate potential crashes caused by malicious certificates.
Release Date: 2020-11-07
Improve the responsiveness for user and dashboard queries for K10 actions.
Performance improvements to dashboard compliance checks.
Auto dark mode on Dashboard automatically switches between light/dark modes based on day/night time.
When restoring an application via the UI, support selecting/deselecting all artifacts by resource type instead of choosing them individually.
Fixed an issue where CSI snapshot pre-checks were run even if a Kanister blueprint was being used to backup the workload.
Fixed an issue which would result in the global policy form not showing the complete list of namespaces when one or more clusters was unreachable.
Fixed an issue that would cause backup jobs to fail when writing to a Minio object store running Minio version RELEASE.2020-08-25T00-21-20Z or newer.
Fixed an issue that would cause backup of Portworx volumes with an empty storage class to fail.
Fixed an issue where some export or import policy runs would fail after K10 Disaster Recovery.
The Kanister kando tool does not use multi-part uploads for Azure Blob storage. This impacts Kanister Blueprints that use Azure Blob profiles and when uploading objects larger than 256 MiB.
Retrying Policy edits may cause invalid Policies to skip validation and still be created. The workaround is to recreate the Policy.
Restore actions fail when restoring PVC's that use annotations to reference a StorageClass. The workaround is to use a transform to add a StorageClass during restore.
When restoring a generic storage backup of a PVC that was mounted in a container at a sub path, the sub path is ignored and data is restored in the new root of the restored PVC.
Removed support for OpenShift 4.3
Release Date: 2020-10-26
K10 dashboard can now authenticate against an Active Directory or LDAP server.
Add namespace label to prometheus metrics for snapshot sizes which can be used to filter by applications.
Add namespace label to prometheus metrics for PVC count and PVC size which can be used to filter by application.
Support for NFS FileStore profiles is now available in preview mode.
Introducing a preview of the multi-cluster dashboard, which adds the ability to monitor and manage several clusters in one dashboard view.
Fixed an issue where the
catalog_actions_countmetrics values become negative on deleting restore points.
Fixed an issue that caused creation of Infrastructure Profiles from Dashboard to fail.
Fixed an issue where K10 DR failed if specific special characters were used in the passphrase.
Backup jobs fail when writing to a Minio object store running Minio version RELEASE.2020-08-25T00-21-20Z or newer. The workaround is to use an older Minio release till this is addressed.
When K10 is deployed with OIDC authentication, the dashboard may show errors after the token generated by the OIDC provider has expired. Reloading the dashboard will fix the error.
This release will perform a catalog schema upgrade.
Removed support for Kubernetes 1.14
Removed support for OpenShift 3.11
Readjusted the disaster recovery sidecar default resource requirements.
Release Date: 2020-10-10
Additional metrics for catalog store and jobs service operations.
Introduced helm flag
services.executor.hostNetworkthat can be used to enable
hostNetworkfor executor pods.
Improved performance and scalability of exports and retirement of applications with large numbers of artifacts.
k10offline list-imagescommand to provide output in JSON format.
Fixed the logic that displays the dashboard loading animation.
Fixed issue with restore of Kanister protected application in different cluster.
The Dashboard UI has been updated with the latest storage regions for Azure and Google.
Fixed a bug where deleted applications were not being shown on the applications restore page.
Update vSphere documentation with CSI driver requirement.
Release Date: 2020-09-28
Exclude filters can now be applied to workloads that are not ready.
Added support for authenticating tokens present in Authorization Bearer Token Header.
Add policy label to prometheus metrics for K10 actions which can be used to filter by policy name.
Application details on Dashboard now include OpenShift Route resources.
Fixed the image tag of Dex reported by the
Fixed issue with AWS backups, where user with correct role permissions was reported as unauthorized.
Fixed bug with cancel action workflow where cancelling resulted in error message.
Fix CrashLoopBackoff issues with the Config service when invalid Profiles were missing Secrets.
Fixed an issue that caused exports to repositories created before release 2.5.18 to fail.
Fixed retirement and restore of exported restore point for Kanister-enabled application.
Fixed potential race between snapshot GC and reusing a deleted directory in a snapshot
Fixed an issue where restores get stuck and eventually fail if K10 was deployed with the
cacertconfigmap.namehelm option and if the namespace where the application is being restored does not have a config map containing the root CA in it.
Release Date: 2020-09-14
Add metrics for catalog store operations.
Improved performance and scalability for applications with large numbers of artifacts.
Added the ability to set
runAsUseroption for K10Primer.
Fixed a bug where the Application list was not getting refreshed on the UI dashboard if the underlying resource watcher encountered a timeout.
The K10 dashboard in deployments with no authentication configured or Basic authentication mode did not show an option to create a namespace during restore.
Fixed K10Primer issue when validating a CSI provisioner.
K10Primer uses the CSI snapshots
restoreSizewhen performing a restore.
Only backup StorageClass when taking a snapshot of a PersistentVolumeClaim.
Airgapped installation issue, where Prometheus pod was not coming into running state, has been fixed.
Fixed issue with handling errors when creating backups by exporting snapshots.
On the manual snapshot form, we now show "insufficient permissions" instead of "no options" on the profiles dropdown when the user does not have permissions to list profiles.
Release Date: 2020-09-05
Added support for additional GKE regions:
Do not display the Data card on the dashboard for "Basic" users.
etcd backup for Kubernetes clusters installed via
kubeadmis now supported.
etcd backup for OpenShift Container Platform clusters is now supported.
Improved response times for expensive queries from the dashboard by using an authorization cache.
Users will only be able to see the names of applications or namespaces on the dashboard they have access to.
persistentvolumeclaimsresource is now visible in the resource drop down list.
Fix an issue with the Helm chart that would break installs initiated through the Rancher dashboard.
Fixed potential index compaction issue that would resurrect deleted content entries during full maintenance
Restoring into a new namespace now works correctly for RBAC users with and without namespace creation permissions.
Checking a basic user's permissions may be slow when they first login to clusters with a large number of namespaces. This may cause up to a 30 second delay in loading some UI elements such as applications, actions, and compliance information.
Increase default memory request for disaster recovery sidecar.
Release Date: 2020-08-31
Change the default timeout for restore operations (from 90 minutes to 10 hours) since users can now cancel stuck jobs via the API.
K10 now supports cancellation of in-progress actions through Dashboard and API.
Added compliance data stats to Prometheus metrics.
K10 dashboard can now authenticate against the built-in OAuth server in OpenShift Container Platform environments.
Dashboard editor dialog windows now support text search.
The Dashboard data page now only shows application data for namespaces the user has permissions to view.
Switch service discovery to use Kubernetes DNS by default and provide an optional Helm setting to use Kubernetes endpoints in environments where DNS is disabled or not working.
Added the ability to create an infrastructure profile for vSphere.
Added a new Dashboard infrastructure profile type for vSphere configuration.
Adds missing metrics for retire actions, running actions, and pending actions.
Fixed restore of application with generic storage backup and Kanister blueprint with hooks.
An issue (required volume not mounted) that occurred in case of multi replica workload during GVS is fixed
Added validations for vSphere credentials.
vSphere persistent volumes are no longer left in 'Failed' state upon claim deletion.
vSphere persistent volumes are left in a 'Released' state. Fixed in v2.0.0 of vSphere's external-provisioner.
Release Date: 2020-08-16
On the policy form, values for exported snapshot retention can be "Set to Zero" with a new action link.
K10 deployments now have default resource requests for memory and CPU.
Added support for OpenShift 4.4 and 4.5, and Kubernetes 1.18
Resource requests and limits can be set by Helm values for K10 deployments.
Fix PodSpecOverride while restoring applications using Generic Volume Snapshot.
Correctly display total/retired artifact counts.
Fix problem when backup fails with unready workloads despite ignoreExceptions being set.
Fixed timeout issue when restoring CSI backups from an object store.
Fixes the retirement of restore points that contain both Kanister-protected workloads and Generic Volume Snapshots in the same restore point.
When the authentication service is restarted due to upgrades, manual restarts or errors, users might see 403 errors while accessing the dashboard due to scheduling issues in the gateway service. Restarting the gateway service should resolve the 403 errors.
Removed support for OpenShift 4.2 and Kubernetes 1.13.
Reduce DeleteSnapshot scope for AWS IAM permissions.
Support for OpenShift 4.3 and Kubernetes 1.14 will be removed in an upcoming release.
Kanister Blueprints that implement the backup action must return at least one output artifact if they want K10 to invoke a delete action upon restore point retirement.
Release Date: 2020-08-02
Use Kubernetes Endpoints for service discovery instead of cluster DNS.
Add license compliance information in prometheus metrics. So that compliance, with respect to time, can be seen in the dashboard.
Support token authentication mode with OAuth proxy for OpenShift clusters.
Added support for Portworx infrastructure profiles.
Added direct (non-CSI) support for Portworx storage.
Applications for policies can be selected via wildcard selectors.
Added support to create an OpenShift Route object to connect to the K10 dashboard.
Fixed a Dashboard bug where the retry of a backup action omitted profile info and resulted in failed actions.
Fixed issue where restore from a generic-volume-snapshot could result in multiple PVC restore processes.
Fixed an issue where an application creation via the OpenShift console fails when Kanister sidecar injection feature is enabled.
Fixes issue where export action fails when policy selects no applications to snapshot.
ManagedFields in API objects are not preserved when taking backups. Introduced in Kubernetes 1.18.x (OpenShift 4.5.x), they track the actor in the system who last modified each field in an API object. They are used by server-side apply report conflicting patches to objects. Since these are omitted by K10, executing server-side apply after an application is restored may result in different behavior than before restore.
Sidecar injection for generic volume snapshots is not supported in Kubernetes 1.18+ or OpenShift 4.5+. Do not use the helm value
injectKanisterSidecar.enabled=trueon these versions.
When K10 is deployed with the helm option
auth.tokenAuth.enabledset to true, and when OAuth proxy is used for authentication, the OAuth proxy session is not cleared when the user signs out of the dashboard.
PersistentVolumes provisioned by K10 on vSphere do not get removed when they are released.
The K10 Helm chart options persistence are moved under global.persistence. Setting global.persistence.storageClass now overwrites default StorageClass for Prometheus PVCs.
Release Date: 2020-07-20
K10 automatically adds the
k10.kasten.io/forcegenericbackup="true"annotation to selected workloads to enforce generic backups when the Kanister sidecar injection feature is enabled.
Dashboard now shows DR restore progress and displays suggested actions with failure messages.
When OIDC based authentication is enabled, if K10 is not able to get the user's information from the OIDC token, it will use the provider's userinfo endpoint to get it.
Fixed an issue where an injected Kanister sidecar was failing on OpenShift due to a root SecurityContext. An injected Kanister sidecar's SecurityContext is copied from the primary container.
If configured authentication method is basic, ignore any authentication cookie in requests.
Document how to run Prometheus with a specific user and group ID.
Release Date: 2020-07-07
Added ability to add licenses using the Dashboard.
Validate OpenStack Cinder profiles upon creation.
Added ability to remove a license using the Dashboard.
Improve catalog storage utilization and reduce DR resource and time requirements by performing catalog pruning.
K10 Disaster Recovery now performs app-consistent backups of the K10 catalog store.
K10 now creates an export restore point whenever a snapshot is exported. This includes when a policy is used to copy snapshots to another region.
Exported restore points are now visible in the API as RestorePoint resources in the namespace of the snapshot RestorePoint resource as well as being RestorePointContent resources.
K10 policies that select multiple applications now copy each application independently and export all successfully copied applications by default. Application copy errors are noted as exceptions in the ExportAction and an export restore point is not created for an application with a copy error.
When manually restoring an application, the UI will provide the option of adding transforms previously used to restore that application.
Added support for taking generic snapshots of DeploymentConfigs
New OIDC-related settings -
auth.oidcAuth.groupPrefixhave been added to K10's Helm chart.
Add a Helm option to allow modification of the K10 service security context.
Additional statistics are collected for backups exported to object storage.
Simplify license updates and deletes. No Helm upgrade or patches required anymore.
Support pre-populated namespace labels in the policy creation form.
Improvement in the user experience on the dashboard when an OIDC provider returns an error.
New OIDC-related setting -
auth.oidcAuth.prompthas been added to K10's helm chart.
Dashboard now supports specifying region for OpenStack infrastructure profiles.
Dashboard charts with multiple result sets are now customizable, allowing you to select which results to display.
Support page now displays an upgrade button when a newer version of K10 is available.
Fixed an issue where switching between K10 clusters while using
kubectl proxywould result in a token validation error on the dashboard due to invalid cookies in the browser cache.
Fixed an issue that caused Kanister operations to fail when the subject of the Blueprint was an OpenShift DeploymentConfig.
Fixes bugs leading to early retirement of snapshots when using storage class overrides or independent retention counts.
Fixes bug with object storage data metrics when using the option to ignore exceptions for export.
Fixes bug with import after exporting snapshot data using the option to ignore exceptions for export.
When "View Action YAML" was clicked, the format of the action was not correct. This has been fixed.
Fixed a Dashboard bug when editing a transform that replaces a value with JSON.
Fixed cosmetic bug where object storage profiles with no region showed 'undefined' in profile dropdowns.
Fixed an issue with K10 installation when these options are used together -
The K10 Helm chart now checks if
ingress.annotationsare set before using them.
Fixed issue with profile validation where the original error was being masked.
Fixed an issue where the APIServer was failing to call the mutating webhook endpoint on OpenShift clusters.
Module upgrades to address CVE-2020-14040.
Upgraded Ambassador to incorporate the Envoy 1.14.3 security update.
A schema change is required and will reduce storage consumed by the K10 catalog.
The default docs location has changed to support documentation versioning.
Release Date: 2020-06-21
The Dashboard data page now displays object storage usage for each application.
Simplify K10 Disaster Recovery by not requiring the K10 cluster passphrase on recovery.
The Object Storage Data Usage will now include K10 Disaster Recovery statistics.
K10Primer tool will use the same node selector and tolerations for all test pods it creates.
Added a new settings tab for viewing installed licenses and license details.
storageservices have been merged with the
dashboardservice to reduce the total number of the pods required by K10.
Add hold support for policy-created backups.
Object storage usage metrics can now be viewed for individual applications.
New OIDC-related settings -
auth.oidcAuth.usernamePrefixhave been added to K10's Helm chart.
Added progress bar to indicate when a Dashboard page is still being loaded.
Added support to automatically inject Kanister sidecars into pods for Generic Volume Backup. This can be done cluster-wide or, with label filtering, at the namespace or workload level.
Include skipped actions in prometheus metrics.
During manual snapshot or policy snapshot, added the ability to filter resources by label.
Added a support tab under settings on the Dashboard that displays information about the cluster, K10, and how to contact support.
Fixed an issue where Kanister actions would fail with OpenShift DeploymentConfig workloads.
Fixed a case where object storage data usage may not update immediately following a backup.
Fixed bug that prevented the test transform operation from displaying its results.
Improve error message when no OIDC configuration is discovered from the provider URL specified for OIDC authentication.
Fixed temporary metering service report creation errors when the service is restarted.
Fixed bug where policy delete did not remove policy from Dashboard.
Fixes issue with retiring restore points for policies that selected zero applications.
Fixes metering service bug when the Kubernetes API server is unresponsive.
The following labels have been removed from the metrics exposed by jobs service to Prometheus - job_id, phase, policy_id, scheduled_time, start_time, status, finish_time and attempt_count.
jobs_runningmetric has also been removed to optimize storage consumption by Prometheus.
Release Date: 2020-06-07
Policies that select multiple applications treat application snapshot failures independently.
Allow users with only namespace access to create backups.
New CSI checker application that verifies CSI snapshot/restore capabilities.
Move EFS support out of preview mode.
K10Primer pre-check validates the existence of required CSI feature gate.
Failed backup jobs can now be retried from the Job Details panel.
YAML for jobs can now be viewed and copied to the clipboard from the Job Details panel.
Add support for Kubernetes auditing.
Add guidance for K10 resource requirements.
Added support for Kubernetes 1.17 and Beta Snapshot CRDs.
K10 can be used with an OpenID Connect(OIDC) provider irrespective of whether the Kubernetes cluster is configured with the same OIDC provider, a different OIDC provider, or no authentication system. K10 achieves this by using Kubernetes User Impersonation.
All PVCs within a namespace are snapshotted, independent of being linked to a workload.
Added the ability to use pre-made example transforms on the Dashboard.
Fixed an issue where backup restore points were not displaying the volume snapshot as a selectable artifact on the Dashboard.
Disable RBAC resource creation for the Prometheus server which would not work in OCP 3.11 clusters.
Fixed compliance calculation issue when using policies with advanced frequency options.
Fixed a bug where transform JSON field does not retain its value when editing.
When K10 is deployed with OIDC, user-initiated actions (via the API, CLI, or the dashboard) will be attributed to the user instead of the K10 service account.
The k10-dashboard-view ClusterRole has been updated and renamed to k10-config-view. Check and update bindings for users and service accounts.
We only support Helm v2.16.0+ from this release.
Release Date: 2020-05-29
Added the ability to filter policies by name.
Improved the display of job errors by surfacing the nested root cause messages.
Dashboard login page now accepts a variety of authentication tokens versus only JWT tokens.
Release Date: 2020-05-29
No longer require a VolumeSnapshotClass with
Workaround EFS's behavior where a restored instance is placed in a child directory by moving child directory's contents to the file system's root after restore.
Adjust namespace metadata for cloned Helm 3 applications.
Adding a new tool, K10Primer, that validates a Kubernetes cluster prior to installing K10
Installation of trusted but private root certificate authorities to be used by K10 for verifying TLS connections to object stores.
VolumeSnapshotobjects in application backup.
VolumeSnapshotresources if the driver failed the snapshot operation.
Fixed an issue that caused temporary secrets to be left behind after computing object store data usage statistics.
Fixes issue where multiple VolumeSnapshotClasses with K10 annotations caused snapshot failures.
Recreate provisioner annotations for Ceph-RBD provisioned Persistent Volumes on restore.
prefixURLHelm values to work with K10 routes.
Fix backup data charts not populating on dashboard.
Fixed problem deleting old actions.
Kanister Blueprints used for database-level application backup currently do not work with private root CAs. An available workaround is to disable TLS verification of these object stores for Location profiles in use with Kanister.
This release will perform a catalog schema upgrade.
We no longer require or recommend a
Release Date: 2020-05-10
The air-gapped installation process was simplified.
Improve the display of job errors by showing error details in a modal window with color syntax-highlighting.
Generate skipped jobs when policy scheduler offline across scheduling window.
Added Ceph profile validation on create.
The K10 dashboard will not allow the creation of policies or profiles if the K10 install namespace is not known.
Fixed a bug where the code editor window sometimes displayed unformatted code.
Fixed a bug that prevented K10 disaster recovery from a manual run of the disaster recovery policy.
Fixed a bug that caused some restores to fail after K10 Disaster Recovery.
Fixed a bug that could cause object store logical data size to be under-reported.
K10 image comes with Ceph tools enabled.
Combined the policy and profile services to reduce the number of pods used by K10.
Release Date: 2020-05-02
Add AWS Africa (Cape Town) and Europe (Milan) regions.
Added infrastructure profiles for direct (non-CSI) integration with Ceph and OpenStack Cinder.
Added ability to pause scheduled runs of policies.
Support specifying a region when an endpoint is used with S3 compatible Profiles.
Retention of snapshots and exported backups supports pausing and editing of policies.
Discover AWS region from node labels when EC2 instance metadata endpoint is not reachable.
EBS snapshot jobs fail gracefully if AWS credentials are not provided.
Fixed a bug in the
k10-ns-adminRole for GET permission on secrets in the K10 namespace.
Fixed unlikely case where manual policy run could retire artifacts created by a scheduled policy run.
Release Date: 2020-04-27
Allow specifying which StorageClass should be used when exporting snapshot data.
Volume type transforms on restore are now supported for Azure Disks. Supported storage account types of Azure Disks include
Policy scheduler now waits until the next scheduled time after a policy edit to start a new job.
Reduction in space consumed by the metering service (used for cloud market place billing). The service will delete legacy data and will ensure new data is not retained indefinitely.
Added finer control of policy frequency, start times, and snapshot retention to the K10 API and Dashboard.
Force a file-system level backup if a workload has the
Improve Ceph snapshot mechanism.
Fixed perpetual UI alerts on outdated failed K10 service/pods.
Fixed a bug that caused Object Storage Data Usage statistics to be inaccurate.
Fixed a bug with S3-compatible Location profiles. K10 used transport layer security by default even if the user specified
http://as the transport protocol in the location profile's endpoint.
Kanister profiles are being deprecated. Disable and re-enable any existing DR policy after an upgrade to switch to using a Location profile.
For storage providers that are not supported by K10, do not automatically attempt a file-system backup unless the workload has the
Enabled zoom for documentation images.
Release Date: 2020-04-19
Fixed a bug that caused K10 DR backups to fail after a successful retirement of DR snapshots.
Release Date: 2020-04-17
Add a Prometheus metric to indicate if K10 DR is enabled.
New pre-flight script to validate CSI Snapshot capability.
Ability to transform PersistentVolumeClaim labels on restore.
Fixed a bug that caused failure in retirement of K10 Disaster Recovery snapshots.
Fix issue with Azure profiles incompatibility while creating import policies.
Resolves early retirement of artifacts after K10 disaster recovery.
Preserve PersistentVolumeClaim labels on restore.
Fixed UI bug that prevented import/restore policy creation.
Workaround documented for the migration of EFS CSI Volumes in EKS clusters using the K10 dashboard and AWS CLI/Console.
Increase timeout for waiting for ready pods to 15 minutes.
Release Date: 2020-04-12
Support specifying destination region (Azure, AWS) and account (AWS) when exporting snapshots.
Added the ability to define TLS certificates in the K10 ingress definition. This allows the use an external ingress controller and definition of a custom FQDN to access the K10 platform through the HTTPS protocol.
Reduced the number of Kubernetes workloads by combining the jobs and jobs queue services.
Consolidate Profiles into a new type: Location Profiles.
Reduction in memory consumed by the metering service (used for cloud marketplace billing).
New policies now wait until the first scheduled time to run. Use a manual policy run before then if desired.
API support for offset policy run times (e.g., choose an hour to run a daily backup).
Volume type transforms on restore are now supported for GCE Persistent Disk and AWS EBS. Supported types for GCE Persistent Disk include
pd-standard. Supported types for AWS EBS include
Fix cryptography service failing to start when the catalog service isn't yet available.
Fixed a bug in the DR Restore tool when no
skipResourceargument was specified.
The Object Storage Data Usage statistics may not be completely accurate.
Existing import and export profiles will be converted to location profiles automatically.