On Sept. 29, 2020, we released a new version of Apigee Edge for Private Cloud.
Updating this release will update the components in the following list of RPMs:
You can check the RPM versions you currently have installed, to see if they need to be updated, by entering:
To update your installation, perform the following procedure on the Edge nodes:
On all Edge nodes:
- Clean the Yum repos:
sudo yum clean all
- Download the latest Edge 4.19.01
curl https://software.apigee.com/bootstrap_4.19.01.sh -o /tmp/bootstrap_4.19.01.sh
- Install the Edge 4.19.01
apigee-serviceutility and dependencies:
sudo bash /tmp/bootstrap_4.19.01.sh apigeeuser=uName apigeepassword=pWord
Where uName:pWord are the username and password you received from Apigee. If you omit pWord, you will be prompted to enter it.
- Update the
sudo /opt/apigee/apigee-service/bin/apigee-service apigee-setup update
- Use the
sourcecommand to execute the
- Clean the Yum repos:
Update all Cassandra nodes:
/opt/apigee/apigee-setup/bin/update.sh -c cs -f configFile
where configFile specifies the configuration file that you used to install Apigee Edge for Private Cloud. For example,
- On all Edge nodes, execute the
update.shscript for the
edgeprocess. To do this, execute the following command on each node:
/opt/apigee/apigee-setup/bin/update.sh -c edge -f configFile
- If you are using the New Edge experience, execute the folowing command:
/opt/apigee/apigee-setup/bin/update.sh -c ue -f configFile
- (Apigee mTLS only) To update Apigee mTLS:
follow the procedure described in
Upgrade Apigee mTLS.
For more information, see Introduction to Apigee mTLS.
Deprecations and retirements
No new deprecations or retirements.
This section lists new features in this release.
Encrypting JMX passwords
The following table lists the bugs fixed in this release:
apigee-mtls certificates were only valid for 30 days.
New certificates are now valid for one year. To upgrade an old 30-day certificate with a new certificate, valid for one year, see Upgrade Apigee MTLS.
When message processors were restarted, some proxies were not deployed.
Potential vulnerability due to "True-Client-IP" header
This release introduces a new Access Control Policy element,
Audit logs were not showing users whose roles were updated.
After performing role changes for existing users or adding an existing user to an org, the audit log showed "Update user undefined," which prevented you from seeing who the action was performed on.
mTLS installation was failing due to outdated Consul binary version.
Consul binary upgraded from v1.6.2 to latest stable version, v1.8.0.
mTLS installation was failing due to a missing entry for the Consul
apigee-mtls now properly handles servers with multiple network interfaces and addresses.
Documentation for disabling protocols in the UI was missing
For new documentation, see Disabling TLS protocols.
The following table lists known issues in this release:
Ldap policy connection pooling issue
LDAP connection pool properties specified using LDAP resource are not taking effect. As a result, connections are being opened and closed each time for single use, creating a large number of connections per hour to the LDAP server.
In order to change the LDAP connection pool properties, do the following steps to set a global change across all LDAP policies.
To verify that your connection pool JNDI properties are taking effect, you can perform a tcpdump to observe the behavior of the LDAP connection pool over time.