4.19.06.01 - Edge for Private Cloud release notes

You're viewing Apigee Edge documentation.
Go to the Apigee X documentation.
info

On February 20, 2020, we released a new version of Apigee Edge for Private Cloud.

Update procedure

To update your installation, perform the following procedure on the Edge nodes:

  1. On all Edge nodes:

    1. Clean the Yum repos:
      sudo yum clean all
    2. Download the latest Edge 4.19.06 bootstrap_4.19.06.sh file to /tmp/bootstrap_4.19.06.sh:
      curl https://software.apigee.com/bootstrap_4.19.06.sh -o /tmp/bootstrap_4.19.06.sh
    3. Install the Edge 4.19.06 apigee-service utility and dependencies:
      sudo bash /tmp/bootstrap_4.19.06.sh apigeeuser=uName apigeepassword=pWord

      Where uName:pWord are the username and password you received from Apigee. If you omit pWord, you will be prompted to enter it.

    4. Update the apigee-setup utility:
      sudo /opt/apigee/apigee-service/bin/apigee-service apigee-setup update
    5. Use the source command to execute the apigee-service.sh script:
      source /etc/profile.d/apigee-service.sh
  2. Run the update.sh script on all Message Processor, Router, and Management Server nodes. On each node, execute the following command:
    /opt/apigee/apigee-setup/bin/update.sh -c edge -f configFile

    Where configFile specifies the configuration file that you used to install Edge.

  3. On all analytics hosts (Management Servers, Qpid servers, and Postgres servers), update the edge-analytics service by executing the following command:
    /opt/apigee/apigee-service/bin/apigee-service edge-analytics update

Supported software

This release includes the following changes to supported software:

  • Oracle 7.7 support added

For more information, see Supported software and supported versions.

Deprecations and retirements

None.

Bugs fixed

The following table lists the bugs fixed in this release:

Issue ID Description
145057629
139337568

Security vulnerabilities in Message Processors

Updated Message Processors to address security vulnerabilities.