You're viewing Apigee Edge documentation.
Go to the
Apigee X documentation. info
On Sept. 29, 2020, we released a new version of Apigee Edge for Private Cloud.
Update procedure
Updating this release will update the components in the following list of RPMs:
- edge-gateway-4.50.00-0.0.20093.noarch.rpm
- edge-management-server-4.50.00-0.0.20093.noarch.rpm
- edge-message-processor-4.50.00-0.0.20093.noarch.rpm
- edge-postgres-server-4.50.00-0.0.20093.noarch.rpm
- edge-qpid-server-4.50.00-0.0.20093.noarch.rpm
- edge-router-4.50.00-0.0.20093.noarch.rpm
- edge-analytics-4.50.00-0.0.40031.noarch.rpm
- apigee-mtls-4.50.00-0.0.20187.noarch.rpm
- apigee-mtls-consul-4.50.00-0.0.20127.noarch.rpm
- apigee-cassandra-2.1.16-0.0.2509.noarch.rpm
- apigee-sso-4.50.00-0.0.20079.noarch.rpm
- edge-ui-4.50.00-0.0.20165.noarch.rpm
You can check the RPM versions you currently have installed, to see if they need to be updated, by entering:
apigee-all version
To update your installation, perform the following procedure on the Edge nodes:
-
On all Edge nodes:
- Clean the Yum repos:
sudo yum clean all
- Download the latest Edge 4.50.00
bootstrap_4.50.00.sh
file to/tmp/bootstrap_4.50.00.sh
:curl https://software.apigee.com/bootstrap_4.50.00.sh -o /tmp/bootstrap_4.50.00.sh
- Install the Edge 4.50.00
apigee-service
utility and dependencies:sudo bash /tmp/bootstrap_4.50.00.sh apigeeuser=uName apigeepassword=pWord
Where uName:pWord are the username and password you received from Apigee. If you omit pWord, you will be prompted to enter it.
- Update the
apigee-setup
utility:sudo /opt/apigee/apigee-service/bin/apigee-service apigee-setup update
- Use the
source
command to execute theapigee-service.sh
script:source /etc/profile.d/apigee-service.sh
- Clean the Yum repos:
Update all Cassandra nodes:
/opt/apigee/apigee-setup/bin/update.sh -c cs -f configFile
where configFile specifies the configuration file that you used to install Apigee Edge for Private Cloud. For example,
/opt/silent.conf
.- On all Edge nodes, execute the
update.sh
script for theedge
process. To do this, execute the following command on each node:/opt/apigee/apigee-setup/bin/update.sh -c edge -f configFile
- Execute the
update.sh
script for the UI on all nodes. On each node, execute the following command:/opt/apigee/apigee-setup/bin/update.sh -c ui -f configFile
- Execute the
update.sh
script for SSO on all nodes. On each node, execute the following command:/opt/apigee/apigee-setup/bin/update.sh -c sso -f configFile
- If you are using Apigee mTLS, follow the procedure described in
Upgrade Apigee mTLS.
For more information, see Introduction to Apigee mTLS.
Supported software
No changes.
Deprecations and retirements
No new deprecations or retirements.
New Features
This section lists new features in this release.
Encrypting JMX passwords
You can now encrypt JMX passwords. See Enabling JMX password encryption and Enabling JMX authentication for Cassandra for details. (150633039)
Bugs fixed
The following table lists the bugs fixed in this release:
Issue ID | Description |
---|---|
135972575 | Edge for Private Cloud was showing different behavior during deployment
with This has been fixed. |
163578296 | The axstatus API was incorrectly reporting failure status for a fresh installation. This has been fixed. |
160955355 | The UI Trace session did not match the trace session log: policies executed between two service callouts were missing. This was happening because some policies were being saved and dispatched in the wrong order. This has been fixed. |
147736003 | An outdated library on enterprise.apigee.com was causing security issues. The library has been updated. |
161858295 | Some silent variables were misspelled. Silent install variable |
160951701 | mTLS installation was failing due to an outdated Consul binary version. The Consul binary has been upgraded from v1.6.2 to the latest stable version, v1.8.0. |
160916451 | mTLS installation was failing due to a missing entry for the Consul
apigee-mtls now properly handles servers with multiple network interfaces and addresses. |
Known issues
The following table lists known issues in this release:
Issue ID | Description |
---|---|
149245401 |
Ldap policy connection pooling issue LDAP connection pool properties specified using LDAP resource are not taking effect. As a result, connections are being opened and closed each time for single use, creating a large number of connections per hour to the LDAP server. Workaround: In order to change the LDAP connection pool properties, do the following steps to set a global change across all LDAP policies.
To verify that your connection pool JNDI properties are taking effect, you can perform a tcpdump to observe the behavior of the LDAP connection pool over time. |