Releases: strimzi/strimzi-kafka-operator
0.21.1
0.21.0
Main Changes since 0.20.x
Note: This version of Strimzi supports Kubernetes 1.16 and higher.
- Add support for Kafka 2.7.0
- Add support for declarative management of connector plugins in Kafka Connect CR
- Add
inter.broker.protocol.version
to the default configuration in example YAMLs - Add support for
secretPrefix
property for User Operator to prefix all secret names created from KafkaUser resource. - Allow configuring labels and annotations for Cluster CA certificate secrets
- Add the JAAS configuration string in the sasl.jaas.config property to the generated secrets for KafkaUser with SCRAM-SHA-512 authentication.
- Strimzi
test-container
has been renamed tostrimzi-test-container
to make the name more clear - Updated the CPU usage metric in the Kafka, ZooKeeper and Cruise Control dashboards to include the CPU kernel time (other than the current user time)
- Allow disabling ownerReference on CA secrets
- Make it possible to run Strimzi operators and operands with read-only root filesystem
- Move from Docker Hub to Quay.io as our container registry
- Add possibility to configure DeploymentStrategy for Kafka Connect, Kafka Mirror Maker (1 and 2), and Kafka Bridge
- Support passing metrics configuration as an external ConfigMap
- Enable CORS configuration for Cruise Control
- Add support for rolling individual Kafka or ZooKeeper pods through the Cluster Operator using an annotation
- Add support for Topology Spread Constraints in Pod templates
- Make Kafka
cluster-id
(KIP-78) available on Kafka CRD status
All changes can be found under the 0.21.0 milestone.
Deprecations and removals
- The
metrics
field in the Strimzi custom resources has been deprecated and will be removed in the future. For configuring metrics, use the newmetricsConfig
field and pass the configuration via ConfigMap.
!!!!! IMPORTANT - Update 17th Jan 2021 !!!!!
There is a bug in the new feature for configuring metrics from ConfigMap instead of directly in the custom resource. When used, it in some cases does not properly configure the network policies for the port 9404 used for the metrics. As a workaround, either keep using the old configuration or create manually an additional network policy with your custom name for the port 9404. This bug will be fixed in 0.21.1.
Upgrading from Strimzi 0.20.0
0.21.0-rc1
Main Changes since 0.20.x
Note: This version of Strimzi supports Kubernetes 1.16 and higher.
- Add support for declarative management of connector plugins in Kafka Connect CR
- Add
inter.broker.protocol.version
to the default configuration in example YAMLs - Add support for
secretPrefix
property for User Operator to prefix all secret names created from KafkaUser resource. - Allow configuring labels and annotations for Cluster CA certificate secrets
- Add the JAAS configuration string in the sasl.jaas.config property to the generated secrets for KafkaUser with SCRAM-SHA-512 authentication.
- Strimzi
test-container
has been renamed tostrimzi-test-container
to make the name more clear - Updated the CPU usage metric in the Kafka, ZooKeeper and Cruise Control dashboards to include the CPU kernel time (other than the current user time)
- Allow disabling ownerReference on CA secrets
- Make it possible to run Strimzi operators and operands with read-only root filesystem
- Move from Docker Hub to Quay.io as our container registry
- Add possibility to configure DeploymentStrategy for Kafka Connect, Kafka Mirror Maker (1 and 2), and Kafka Bridge
- Support passing metrics configuration as an external ConfigMap
- Enable CORS configuration for Cruise Control
- Add support for rolling individual Kafka or ZooKeeper pods through the Cluster Operator using an annotation
- Add support for Topology Spread Constraints in Pod templates
- Make Kafka
cluster-id
(KIP-78) available on Kafka CRD status
All changes can be found under the 0.21.0 milestone.
Deprecations and removals
- The
metrics
field in the Strimzi custom resources has been deprecated and will be removed in the future. For configuring metrics, use the newmetricsConfig
field and pass the configuration via ConfigMap.
Upgrading from Strimzi 0.20.0
0.20.1
Main changes since 0.20.0
This patch release contains several bug-fixes:
- Silent error from missing CRB RBAC in Kafka Connect when not needed (#4019)
- Fine-tune the Kafka Exporter health checks (#3885)
- Correct connect configuration comparison (#3987)
- Avoid changing custom resource status because of HashSet ordering (#4069)
- Fix the client rack-awareness in Kafka Connect (#3903)
- Connect default logging not expanded (#4057)
- Topic operator improvements (#3982)
- Do not use ownerReference in UO and TO bindings into a different namespace (#4080)
- Remove owner references from ClusterRoleBindings (#4077)
- Topic Operator metrics (#3883)
0.20.1-rc1
Main changes since 0.20.0
This patch release contains several bugfixes:
- Silent error from missing CRB RBAC in Kafka Connect when not needed (#4019)
- Fine-tune the Kafka Exporter health checks (#3885)
- Correct connect configuration comparison (#3987)
- Avoid changing custom resource status because of HashSet ordering (#4069)
- Fix the client rack-awareness in Kafka Connect (#3903)
- Connect default logging not expanded (#4057)
- Topic operator improvements (#3982)
- Do not use ownerReference in UO and TO bindings into a different namespace (#4080)
- Remove owner references from ClusterRoleBindings (#4077)
- Topic Operator metrics (#3883)
0.20.0
Main Changes since 0.19.0
Note: This is the last version of Strimzi that will support Kubernetes 1.11 and higher. Future versions will support only Kubernetes 1.16 and higher.
- Add support for Kafka 2.5.1 and 2.6.0. Remove support for 2.4.0 and 2.4.1
- Make
listeners
configurable as an array and add support for more different listeners in single cluster - Remove TLS sidecars from Kafka pods => Kafka now uses native TLS to connect to ZooKeeper
- Updated to Cruise Control 2.5.11, which adds Kafka 2.6.0 support and fixes a previous issue with CPU utilization statistics for containers. As a result, the CPUCapacityGoal has now been enabled.
- Configure Cluster Operator logging using ConfigMap instead of environment variable and support dynamic changes
- Switch to use the
AclAuthorizer
class for thesimple
Kafka authorization type.AclAuthorizer
contains new features such as the ability to control the amount of authorization logs in the broker logs. - Support dynamic logging configuration of Kafka, Kafka Connect, Kafka Connect S2I and Kafka MirrorMaker2
- Add support for
client.rack
property for Kafka Connect to usefetch from closest replica
feature. - Add support for configuring
hostAliases
in Pod templates - Cruise Control metrics integration including a new Grafana dashboard
- Improved operators Grafana dashboard
- Add improvements for oauth authentication, and keycloak authorization:
- Support for re-authentication was added, which also enforces access token lifespan on the Kafka client session
- Permission changes through Keycloak Authorization Services are now detected by Kafka Brokers
All changes can be found under the 0.20.0 milestone.
Deprecations and removals
* Deprecation of the old listener configuration
* Removal of monitoring port on Kafka and ZooKeeper related services
* Deprecation of Kafka TLS sidecar configuration
Redesign of the .spec.kafka.listeners
section
The .spec.kafka.listeners
section of the Kafka CRD has been redesigned to allow configuring more different listeners.
The old listeners
object which allowed only configuration of oneplain
, one tls
, and one external
listener is now deprecated and will be removed in the future.
It is replaced with an array allowing configuration of multiple different listeners:
listeners:
- name: local
port: 9092
type: internal
tls: true
- name: external1
port: 9093
type: loadbalancer
tls: true
- name: external2
port: 9094
type: nodeport
tls: true
This change includes some other changes:
- The
tls
field is now required. - The former
overrides
section is now merged with theconfiguration
section. - The
dnsAnnotations
field has been renamed toannotations
since we found out it has wider use. - Configuration of
loadBalancerSourceRanges
andexternalTrafficPolicy
has been moved into listener configuration. Its use in thetemplate
section is now deprecated. - For
type: internal
listeners, you can now use the flaguseServiceDnsDomain
to define whether they should use the fully qualified DNS names including the cluster service suffix (usually.cluster.local
). This option defaults to false. - All listeners now support configuring the advertised hostname and port.
preferredAddressType
has been removed topreferredNodePortAddressType
.
To convert the old format into the new format with backwards compatibility, you should use following names and types:
- For the old
plain
listener, use the nameplain
, port9092
and typeinternal
. - For the old
tls
listener, use the nametls
, port9093
and typeinternal
. - For the old
external
listener, use the nameexternal
, port9094
.
For example the following old configuration:
listeners:
plain:
# ...
tls:
# ...
external:
type: loadbalancer
# ...
Will look like this in the new format:
listeners:
- name: plain
port: 9092
type: internal
tls: false
- name: tls
port: 9093
type: internal
tls: true
- name: external
port: 9094
type: loadbalancer
tls: true
Removal of monitoring port on Kafka and ZooKeeper related services
The PodMonitor
resource is now used instead of the ServiceMonitor
for scraping metrics from Kafka, ZooKeeper, Kafka Connect and so on.
For this reason, we have removed the monitoring port tcp-prometheus
(9404) on all the services where it is declared (Kafka bootstrap, ZooKeeper client and so on).
It was already deprecated in the previous 0.19.0 release.
Together with it we have also removed the Prometheus annotations from the services. If you want to add them, you can use the templates.
See here https://strimzi.io/docs/operators/master/using.html#assembly-customizing-kubernetes-resources-str for more details about templates usage.
Finally, the Kafka Exporter service was has been removed because it was used just for the monitoring port.
Deprecation of Kafka TLS sidecar configuration
Since the Kafka TLS sidecar has been removed, the related configuration options in the Kafka custom resource are now deprecated:
.spec.kafka.tlsSidecar
.spec.kafka.template.tlsSidecar
Upgrading from Strimzi 0.19.0
0.20.0-rc3
Main Changes since 0.20.0-rc2
Release Candidate 3 contains several fixes to bugs found in Release Candidate 2:
- Fix rolling updates when all Kafka pods are Pending (#3848)
- Bump OPA Authorizer version to fix CVE in its dependencies (#3853)
- Fix rebalance examples (#3838)
- Fix cAdvisor metric labels (#3840)
- Several docs and system test fixes and improvements
Upgrading from Strimzi 0.19.0
0.20.0-rc2
Main Changes since 0.20.0-rc1
Release Candidate 2 contains several fixes to bugs found in Release Candidate 1:
- Fix secrets with
.
in name (#3820) - Fix leak of HTTPClients in Connector Operator (#3827)
- Fix handling of custom and OAuth certificates (#3825)
- Upgrade JMX Exporter to 0.14.0
- Several docs and system test fixes and improvements
Upgrading from Strimzi 0.19.0
0.20.0-rc1
Main Changes since 0.19.0
Note: This is the last version of Strimzi that will support Kubernetes 1.11 and higher. Future versions will support only Kubernetes 1.16 and higher.
- Add support for Kafka 2.5.1 and 2.6.0. Remove support for 2.4.0 and 2.4.1
- Make
listeners
configurable as an array and add support for more different listeners in single cluster - Remove TLS sidecars from Kafka pods => Kafka now uses native TLS to connect to ZooKeeper
- Updated to Cruise Control 2.5.11, which adds Kafka 2.6.0 support and fixes a previous issue with CPU utilization statistics for containers. As a result, the CPUCapacityGoal has now been enabled.
- Configure Cluster Operator logging using ConfigMap instead of environment variable and support dynamic changes
- Switch to use the
AclAuthorizer
class for thesimple
Kafka authorization type.AclAuthorizer
contains new features such as the ability to control the amount of authorization logs in the broker logs. - Support dynamic logging configuration of Kafka, Kafka Connect, Kafka Connect S2I and Kafka MirrorMaker2
- Add support for
client.rack
property for Kafka Connect to usefetch from closest replica
feature. - Add support for configuring
hostAliases
in Pod templates - Cruise Control metrics integration including a new Grafana dashboard
- Improved operators Grafana dashboard
Deprecations and removals
* Deprecation of the old listener configuration
* Removal of monitoring port on Kafka and ZooKeeper related services
* Deprecation of Kafka TLS sidecar configuration
Redesign of the .spec.kafka.listeners
section
The .spec.kafka.listeners
section of the Kafka CRD has been redesigned to allow configuring more different listeners.
The old listeners
object which allowed only configuration of oneplain
, one tls
, and one external
listener is now deprecated and will be removed in the future.
It is replaced with an array allowing configuration of multiple different listeners:
listeners:
- name: local
port: 9092
type: internal
tls: true
- name: external1
port: 9093
type: loadbalancer
tls: true
- name: external2
port: 9094
type: nodeport
tls: true
This change includes some other changes:
- The
tls
field is now required. - The former
overrides
section is now merged with theconfiguration
section. - The
dnsAnnotations
field has been renamed toannotations
since we found out it has wider use. - Configuration of
loadBalancerSourceRanges
andexternalTrafficPolicy
has been moved into listener configuration. Its use in thetemplate
section is now deprecated. - For
type: internal
listeners, you can now use the flaguseServiceDnsDomain
to define whether they should use the fully qualified DNS names including the cluster service suffix (usually.cluster.local
). This option defaults to false. - All listeners now support configuring the advertised hostname and port.
preferredAddressType
has been removed topreferredNodePortAddressType
.
To convert the old format into the new format with backwards compatibility, you should use following names and types:
- For the old
plain
listener, use the nameplain
, port9092
and typeinternal
. - For the old
tls
listener, use the nametls
, port9093
and typeinternal
. - For the old
external
listener, use the nameexternal
, port9094
.
For example the following old configuration:
listeners:
plain:
# ...
tls:
# ...
external:
type: loadbalancer
# ...
Will look like this in the new format:
listeners:
- name: plain
port: 9092
type: internal
tls: false
- name: tls
port: 9093
type: internal
tls: true
- name: external
port: 9094
type: loadbalancer
tls: true
Removal of monitoring port on Kafka and ZooKeeper related services
The PodMonitor
resource is now used instead of the ServiceMonitor
for scraping metrics from Kafka, ZooKeeper, Kafka Connect and so on.
For this reason, we have removed the monitoring port tcp-prometheus
(9404) on all the services where it is declared (Kafka bootstrap, ZooKeeper client and so on).
It was already deprecated in the previous 0.19.0 release.
Together with it we have also removed the Prometheus annotations from the services. If you want to add them, you can use the templates.
See here https://strimzi.io/docs/operators/master/using.html#assembly-customizing-kubernetes-resources-str for more details about templates usage.
Finally, the Kafka Exporter service was has been removed because it was used just for the monitoring port.
Deprecation of Kafka TLS sidecar configuration
Since the Kafka TLS sidecar has been removed, the related configuration options in the Kafka custom resource are now deprecated:
.spec.kafka.tlsSidecar
.spec.kafka.template.tlsSidecar
Upgrading from Strimzi 0.19.0
0.19.0
Main Changes since 0.18.0
- Add support for authorization using Open Policy Agent
- Add support for scale subresource to make scaling of following resources easier:
- KafkaConnect
- KafkaConnectS2I
- KafkaBridge
- KafkaMirrorMaker
- KafkaMirrorMaker2
- KafkaConnector
- Remove deprecated
Kafka.spec.topicOperator
classes and deployment logic - Use Java 11 as the Java runtime
- Removed the need to manually create Cruise Control metrics topics if topic auto creation is disabled.
- Migration to Helm 3
- Refactored the format of the
KafkaRebalance
resource's status. The state of the rebalance is now displayed in the associatedCondition
'stype
field rather than thestatus
field. This was done so that the information would display correctly in various Kubernetes tools. - Added performance tuning options to the
KafkaRebalance
CR and the ability to define a regular expression that will exclude matching topics from a rebalance optimization proposal. - Use Strimzi Kafka Bridge 0.18.0
- Make it possible to configure labels and annotations for secrets created by the User Operator
- Strimzi Kafka Bridge metrics integration:
- enable/disable metrics in the KafkaBridge custom resource
- new Grafana dashboard for the bridge metrics
- Support dynamically changeable logging in the Entity Operator and Kafka Bridge
Full list of changes can be found under the 0.19.0 milestone.
Deprecations and removals
Deprecation of Helm v2 chart
The Helm v2 support will end soon.
Bug fixing should stop on August 13th 2020 and security fixes on November 13th.
See https://helm.sh/blog/covid-19-extending-helm-v2-bug-fixes/ for more details.
In sync with that, the Helm v2 chart of Strimzi Cluster Operator is now deprecated and will be removed in the future as Helm v2 support ends.
Since Strimzi 0.19.0, we have a new chart for Helm v3 which can be used instead.
Removal of v1alpha1 versions of several custom resources
In Strimzi 0.12.0, the v1alpha1
versions of the following resources have been deprecated and replaced by v1beta1
:
Kafka
KafkaConnect
KafkaConnectS2I
KafkaMirrorMaker
KafkaTopic
KafkaUser
In the next release, the v1alpha1
versions of these resources will be removed.
Please follow the guide for upgrading the resources: https://strimzi.io/docs/operators/latest/deploying.html#assembly-upgrade-str.
Removal deprecated cadvisor metric labels
The pod_name
and container_name
labels provided on the cadvisor metrics are now just pod
and container
starting from Kubernetes 1.16.
We removed the old ones from the Prometheus scraping configuration/alerts and on the Kafka and ZooKeeper dashboard as well.
It means that the charts related to memory and CPU usage are not going to work on Kuvbernetes version previous 1.14.
For more information on what is changed: #3312
Deprecation of monitoring port on Kafka and ZooKeeper related services
The PodMonitor
resource is now used instead of the ServiceMonitor
for scraping metrics from Kafka, ZooKeeper, Kafka Connect and so on.
For this reason, we are deprecating the monitoring port tcp-prometheus
(9404) on all the services where it is declared (Kafka bootstrap, ZooKeeper client and so on).
This port will be removed in the next release.
Together with it we will also remove the Prometheus annotation from the service.
Removal warning of Cluster Operator log level
Because of the new Cluster Operator dynamic logging configuration via PR#3328 we are going to remove the STRIMZI_LOG_LEVEL
environment variable from the Cluster Operator deployment YAML file in the 0.20.0 release.