Google is committed to advancing racial equity for Black communities. See how.

4.19.06.10 - Edge for Private Cloud release notes

On Sept. 29, 2020, we released a new version of Apigee Edge for Private Cloud.

Update procedure

Updating this release will update the components in the following list of RPMs:

  • edge-gateway-4.19.06-0.0.20094.noarch.rpm
  • edge-management-server-4.19.06-0.0.20094.noarch.rpm
  • edge-message-processor-4.19.06-0.0.20094.noarch.rpm
  • edge-postgres-server-4.19.06-0.0.20094.noarch.rpm
  • edge-qpid-server-4.19.06-0.0.20094.noarch.rpm
  • edge-router-4.19.06-0.0.20094.noarch.rpm
  • apigee-mtls-4.19.06-0.0.20189.noarch.rpm
  • apigee-mtls-consul-4.19.06-0.0.20128.noarch.rpm
  • apigee-cassandra-2.1.16-0.0.2508.noarch.rpm
  • edge-ui-4.19.06-0.0.20164.noarch.rpm
  • edge-management-ui-static-4.19.06-0.0.20018.noarch.rpm
  • apigee-sso-4.19.06-0.0.20080.noarch.rpm
  • apigee-setup-4.19.06-0.0.1122.noarch.rpm

You can check the RPM versions you currently have installed, to see if they need to be updated, by entering:

apigee-all version

To update your installation, perform the following procedure on the Edge nodes:

  1. On all Edge nodes:

    1. Clean the Yum repos:
      sudo yum clean all
    2. Download the latest Edge 4.19.06 bootstrap_4.19.06.sh file to /tmp/bootstrap_4.19.06.sh:
      curl https://software.apigee.com/bootstrap_4.19.06.sh -o /tmp/bootstrap_4.19.06.sh
    3. Install the Edge 4.19.06 apigee-service utility and dependencies:
      sudo bash /tmp/bootstrap_4.19.06.sh apigeeuser=uName apigeepassword=pWord

      Where uName:pWord are the username and password you received from Apigee. If you omit pWord, you will be prompted to enter it.

    4. Update the apigee-setup utility:
      sudo /opt/apigee/apigee-service/bin/apigee-service apigee-setup update
    5. Use the source command to execute the apigee-service.sh script:
      source /etc/profile.d/apigee-service.sh
  2. Update all Cassandra nodes:

    /opt/apigee/apigee-setup/bin/update.sh -c cs -f configFile

    where configFile specifies the configuration file that you used to install Apigee Edge for Private Cloud. For example, /opt/silent.conf.

  3. On all Edge nodes, execute the update.sh script for the edge process. To do this, execute the following command on each node:
    /opt/apigee/apigee-setup/bin/update.sh -c edge -f configFile
  4. Update Edge UI:

    /opt/apigee/apigee-setup/bin/update.sh -c ui -f configFile
  5. Execute the update.sh script for SSO on all nodes. On each node, execute the following command:
    /opt/apigee/apigee-setup/bin/update.sh -c sso -f configFile
  6. If you are using the New Edge experience, execute the folowing command:
    /opt/apigee/apigee-setup/bin/update.sh -c ue -f configFile
  7. If you are using Apigee mTLS, follow the procedure described in Upgrade Apigee mTLS.

    For more information, see Introduction to Apigee mTLS.

Supported software

No changes.

Deprecations and retirements

No new deprecations or retirements.

New Features

This section lists new features in this release.

Encrypting JMX passwords

You can now encrypt JMX passwords. See Enabling JMX password encryption and Enabling JMX authentication for Cassandra for details. (150633039)

Bugs fixed

The following table lists the bugs fixed in this release:

Issue ID Description
159360654

apigee-mtls certificates were only valid for 30 days.

New certificates are now valid for one year. To upgrade an old 30-day certificate with a new certificate, valid for one year, see Upgrade Apigee MTLS.

147736003

An outdated library on enterprise.apigee.com was causing security issues.

The library has been updated.

150594487

A set of Java resources at org level was causing message processors to fail to load organizations.

149739904

Data masking for HTTP headers was case sensitive.

This has been fixed: data masking is no longer case-sensitive.

130416715

Potential vulnerability due to "True-Client-IP" header

This release introduces a new Access Control Policy element, IgnoreTrueClientIPHeader, which fixes the issue. See IgnoreTrueClientIPHeader element.

161858295

Some silent variables were misspelled.

Silent install variable SSO_JWT_SIGNING_KEY_FILEPATH is no longer misspelled.

160951701

mTLS installation was failing due to a Consul server issue.

Consul binary upgraded from v1.6.2 to latest stable version, v1.8.0.

132654321

Audit logs were not showing users whose roles were updated.

After performing role changes for existing users or adding an existing user to an org, the audit log showed "Update user undefined," which prevented you from seeing who the action was performed on.

160916451

mTLS installation was failing due to an outdated Consul binary version.

The Consul binary has been upgraded from v1.6.2 to the latest stable version, v1.8.0.

apigee-mtls now properly handles servers with multiple network interfaces and addresses.

161764596

apigee-tomcat was not being updated when applying patch updates.

This has been fixed.

133145969

Documentation for disabling protocols in the UI was missing.

For new documentation, see Disabling TLS protocols.

Known issues

The following table lists known issues in this release:

Issue ID Description
149245401

Ldap policy connection pooling issue

LDAP connection pool settings for JNDI configured through the LDAP resource are not reflected, and JNDI defaults cause single-use connections each time. As a result, connections are being opened and closed each time for single use, creating a large number of connections per hour to the LDAP server.

Workaround:

In order to change the LDAP connection pool properties, do the following steps to set a global change across all LDAP policies.

  1. Create a configuration properties file if it does not already exist:
    /opt/apigee/customer/application/message-processor.properties
  2. Add the following to the file (replace values of Java Naming and Directory Interface (JNDI) properties based on your LDAP resource configuration requirement).
    bin_setenv_ext_jvm_opts="-Dcom.sun.jndi.ldap.connect.pool.maxsize=20
    -Dcom.sun.jndi.ldap.connect.pool.prefsize=2
    -Dcom.sun.jndi.ldap.connect.pool.initsize=2
    -Dcom.sun.jndi.ldap.connect.pool.timeout=120000
    -Dcom.sun.jndi.ldap.connect.pool.protocol=ssl"
  3. Make sure the file /opt/apigee/customer/application/message-processor.properties is owned by apigee:apigee.
  4. Restart each message processor.

To verify that your connection pool JNDI properties are taking effect, you can perform a tcpdump to observe the behavior of the LDAP connection pool over time.