Release Notes
6.22.2 (2025-08-27)β
Package Bug Fixesβ
- jira efs values (2378e23)
6.22.1 (2025-08-26)β
π¨ Upgrade Noticesβ
- Vault now enforces schema validation for provided Helm values; ensure that any package-specific values have been migrated under the
upstreamkey, as described in the Big Bang Passthrough Documentation. If you do not migrate the values, you will see an error similar to the following on the HelmRelease.(root): Additional property cr is not allowed. - Jira now enforces schema validation for provided Helm values; ensure that any package-specific values have been migrated under the
upstreamkey, Β as described in the Big Bang Passthrough Documentation. If you do not migrate the values, you will see an error similar to the following on the HelmRelease.(root): Additional property cr is not allowed. - IaC: The eks-cluster IaC module is now the default IaC cluster module, so if the K8S_DISTRO environment variable is not set or is empty, an EKS cluster will be deployed by the IaC. If your existing workflow sets the K8S_DISTRO environment variable to eks-cluster, you may continue to do so without repercussions.
π¦ SmoothGlue Featuresβ
- IaC: The
eks-clusterIaC module is now the default IaC cluster module.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.22.0 includes Big Bang Version 3.4.0. For more details on the features and updates included in Big Bang Version 3.4.0, please refer to the Big Bang Release Notes.
- Jira has been updated to Helm chart version
2.0.3-bb.1; the container version has been updated tojira-node-lts:10.3.9.- JSM must be updated to 10.3.8 (users are responsible for updating this).
- miniOrange has been updated (users are responsible for updating this).
- Confluence container version has been updated to
confluence-node-lts:9.2.7.- miniOrange has been updated (users are responsible for updating this).
- Nexus IQ has been updated to Helm chart version
193.0.0-bb.0; the container version has been updated to1.193.0-01.
πͺ² Bug Fixesβ
- Added back missing Keycloak image and corrected Gitlab image versions.
βοΈ Known Issuesβ
- SonarQube automation for setting a randomized admin password is no longer functional for new SmoothGlue Build environments. This only affects new deployments of SmoothGlue Build. Environments that are upgrading from a previous version of SmoothGlue are unaffected.
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- K3s:
v1.33.3+k3s1 - EKS:
v1.31.11 - RKE2:
v1.31.8+rke2r1
- K3s:
- The following AMI versions were used for testing:
- EKS AMI:
smoothglue-eks-1.31.11-rocky-8-base-v1.1.1-stig-2025-08-19T15-18-44Z - RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z
- EKS AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.22.0 (2025-08-22)β
π¨ Upgrade Noticesβ
- 6.22.0 should be skipped, in favor of deploying 6.22.1.
- Vault now enforces schema validation for provided Helm values; ensure that any package-specific values have been migrated under the
upstreamkey, as described in the Big Bang Passthrough Documentation. If you do not migrate the values, you will see an error similar to the following on the HelmRelease.(root): Additional property cr is not allowed. - Jira now enforces schema validation for provided Helm values; ensure that any package-specific values have been migrated under the
upstreamkey, Β as described in the Big Bang Passthrough Documentation. If you do not migrate the values, you will see an error similar to the following on the HelmRelease.(root): Additional property cr is not allowed. - IaC: The eks-cluster IaC module is now the default IaC cluster module, so if the K8S_DISTRO environment variable is not set or is empty, an EKS cluster will be deployed by the IaC. If your existing workflow sets the K8S_DISTRO environment variable to eks-cluster, you may continue to do so without repercussions.
π¦ SmoothGlue Featuresβ
- IaC: The
eks-clusterIaC module is now the default IaC cluster module.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.22.0 includes Big Bang Version 3.4.0. For more details on the features and updates included in Big Bang Version 3.4.0, please refer to the Big Bang Release Notes.
- Jira has been updated to Helm chart version
2.0.3-bb.1; the container version has been updated tojira-node-lts:10.3.9.- JSM must be updated to 10.3.8 (users are responsible for updating this).
- miniOrange has been updated (users are responsible for updating this).
- Confluence container version has been updated to
confluence-node-lts:9.2.7.- miniOrange has been updated (users are responsible for updating this).
- Nexus IQ has been updated to Helm chart version
193.0.0-bb.0; the container version has been updated to1.193.0-01.
βοΈ Known Issuesβ
- SonarQube automation for setting a randomized admin password is no longer functional for new SmoothGlue Build environments. This only affects new deployments of SmoothGlue Build. Environments that are upgrading from a previous version of SmoothGlue are unaffected.
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- K3s:
v1.33.3+k3s1 - EKS:
v1.31.11 - RKE2:
v1.31.8+rke2r1
- K3s:
- The following AMI versions were used for testing:
- EKS AMI:
smoothglue-eks-1.31.11-rocky-8-base-v1.1.1-stig-2025-08-19T15-18-44Z - RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z
- EKS AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.21.0 (2025-08-08)β
π¨ Upgrade Noticesβ
Big Bang Upstream Passthrough Patternβ
This release includes four new packages that are being migrated to the upstream passthrough pattern. The affected packages are keycloak, argocd, fluentbit, gitlabRunner and sonarqube.
Please carefully review the Big Bang 3.3.1 Release Notes to ensure values are migrated properly.
Example values before:
fluentbit:
values:
testFramework:
enabled: false
addons:
argocd:
values:
configs:
cm:
oidc.config: |
name: keycloak
keycloak:
values:
resources:
requests:
cpu: "1"
memory: "1Gi"
limits:
memory: "1Gi"
sonarqube:
values:
sonarProperties:
sonar.core.serverBaseURL: "https://your.sonarqube.url/"
gitlabRunner:
values:
resources:
limits:
cpu: 500m
memory: 750Mi
requests:
cpu: 200m
memory: 256Mi
Example values after applying upstream passthrough pattern:
fluentbit:
values:
upstream:
testFramework:
enabled: false
addons:
argocd:
values:
upstream:
configs:
cm:
oidc.config: |
name: keycloak
keycloak:
values:
upstream:
resources:
requests:
cpu: "1"
memory: "1Gi"
limits:
memory: "1Gi"
sonarqube:
values:
upstream:
sonarProperties:
sonar.core.serverBaseURL: "https://your.sonarqube.url/"
gitlabRunner:
values:
upstream:
resources:
limits:
cpu: 500m
memory: 750Mi
requests:
cpu: 200m
memory: 256Mi
SonarQubeβ
βοΈ This update includes several breaking changes. Please read these notices carefully.
Upgrade Steps to Prevent Data Loss
This release includes a major refactor of the upstream SonarQube Helm chart, which changes how the PostgreSQL dependency and StatefulSets are managed. Due to these changes, a conflict can occur with the PostgreSQL secret and StatefulSets created by previous versions of this chart, which can cause the upgrade to fail. The serviceName of the PostgreSQL StatefulSet has changed from sonarqube-postgresql to sonarqube-postgresql-headless, which is an immutable field. To perform a successful upgrade while preserving your existing SonarQube data, you must delete the old secret and StatefulSets, and then perform the upgrade.
Follow these steps to upgrade your SonarQube instance:
-
Backup your database prior to performing any upgrades.
-
Suspend the helm release:
flux -n bigbang suspend helmrelease sonarqube -
Delete the old PostgreSQL secret to prevent the upgrade from failing due to a secret conflict:
kubectl delete secret sonarqube-postgresql -n sonarqube -
Delete the existing StatefulSets to prevent the upgrade from failing due to immutable field errors:
kubectl delete statefulset sonarqube-postgresql sonarqube-sonarqube -n sonarqube -
Upgrade SmoothGlue: Perform your SmoothGlue upgrade.
-
Wait for the Big Bang helm release to report it has successfully reconciled to version 3.3.1.
-
Resume the helm release: This may not complete until all the next steps are done:
flux -n bigbang resume helmrelease sonarqube -
Verify Pod and Helm Release: The
sonarqube-sonarqube-0pod should beRunning; the helm release will remain aREADYstate ofUnknown:kubectl -n sonarqube get pods; kubectl -n bigbang get helmrelease sonarqube -
Navigate to your SonarQube site. It will probably display
SonarQube is under maintenance. -
Follow the SonarQube Upgrade Roadmap: https://docs.sonarsource.com/sonarqube-community-build/server-upgrade-and-maintenance/upgrade/roadmap/. You will likely need to navigate to
https://yourSonarQubeURL/setupand follow the instructions. -
Verify Helm Release: The SonarQube helm release should show
Ready: True:kubectl -n bigbang get helmrelease sonarqube -
If SSO is configured, validate that it is still functional. If receiving a 500 error with a similar log from the pod as indicated in this upstream thread, please log in as the admin account, remove the SSO config, and restart the pod to resolve the error.
β© Upgraded Packagesβ
- Confluence: chart bump: 2.0.2-bb.5
- Jira: chart bump: 2.0.2-bb.1
- Big Bang 3.3.1
βοΈ Known Issuesβ
- SonarQube automation for setting a randomized admin password is no longer functional for new SmoothGlue Build environments. This only affects new deployments of SmoothGlue Build. Environments that are upgrading from a previous version of SmoothGlue are unaffected.
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.31.8+rke2r1 - K3s:
v1.32.5+k3s1 - EKS:
v1.31.7
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z - EKS AMI:
smoothglue-eks-1.31.7-rocky-8-base-v1.1.1-stig-2025-07-21T08-24-21Z
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue Documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.20.1 (2025-08-20)β
In addition to the features included in v6.20.0, this patch release also includes the following:
πͺ² Bug Fixesβ
- GitLab has been updated to Helm chart version
9.2.1-bb.0(GitLab version18.2.1) to resolve an issue in Big Bang3.2.0(GitLab Helm chart version9.1.0-bb.0) which broke air-gapped deployments. This matches the GitLab version deployed in SmoothGlue Enterprisev6.21.0. We recommend that all users upgrade fromv6.19.xdirectly tov6.20.1, skippingv6.20.0.
6.20.0 (2025-07-22)β
π¨ Upgrade Noticesβ
- Kiali now enforces schema validation for provided Helm values; ensure that any package-specific values have been migrated under the
upstreamkey as described in the Big Bang 2.53.1 upgrade notices.- If the values have not been migrated, a schema validation error, such as the following, may be shown on the Helm upgrade:
(root): Additional property cr is not allowed.
- If the values have not been migrated, a schema validation error, such as the following, may be shown on the Helm upgrade:
π¦ SmoothGlue Featuresβ
- IaC: This release adds additional input variables for the
eks-clusterIaC module to configure the NodePort values for the public and passthrough Ingress Gateways and their associated NLB or ALB load balancers. For more details, refer to the EKS Config Reference. The new input variables are listed below:passthrough_ingress_gateway_http_portpassthrough_ingress_gateway_https_portpassthrough_ingress_gateway_status_portpublic_ingress_gateway_http_portpublic_ingress_gateway_https_portpublic_ingress_gateway_status_port
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.20.0 includes Big Bang Version 3.2.0. For more details on the features and updates included in Big Bang Version 3.2.0, please refer to the Big Bang Release Notes.
- Jira has been updated to Helm chart version
2.0.2-bb.0; the container version has been updated tojira-node-lts:10.3.8.- JSM must be updated to 10.3.8 (users are responsible for updating this).
- Confluence has been updated to Helm chart version
2.0.2-bb.4; the container version remains atconfluence-node-lts:9.2.6.
πͺ² Bug Fixesβ
- The
getKeycloakCACertHelm helper function will now fail gracefully if no values are provided for.Values.istioGateway.chartValues. - IaC: The offline Terraform bundle for the ALB IaC module now references a cached local version of the load balancer module, in order to avoid queries to the upstream Terraform registry.
- IaC: The
eks-clustervariablecommit_ref_namehas been removed and resources such as EC2 instances are no longer tagged with it, in order to prevent unnecessary node rotations.
βοΈ Known Issuesβ
- The Alloy Helm chart performs a lookup for the kube-apiserver Service Endpoint when the Helm chart is rendered to create a Network Policy,
but these endpoints may later change. If this happens, Alloy will be unable to talk to the kube-apiserver and will fail to ship logs successfully.
- See the upstream issue for more details.
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.31.8+rke2r1 - K3s:
v1.32.5+k3s1 - EKS:
v1.31.7
- RKE2:
- The following AMI versions were used for testing:
- EKS AMI:
smoothglue-eks-1.31.7-rocky-8-base-v1.1.1-stig-2025-07-21T08-24-21Z - RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z
- EKS AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.19.1 (2025-07-17)β
In addition to the features included in v6.19.0, this patch release also includes the following:
πͺ² Bug Fixesβ
- IaC: The
eks-clustervariablecommit_ref_namehas been removed and resources such as EC2 instances are no longer tagged with it, in order to prevent unnecessary node rotations.
6.19.0 (2025-07-09)β
π¨ Upgrade Noticesβ
- Argo CD is upgrading to 3.0, which includes multiple breaking changes for users creating separate policies or using fine grain policies.
If you have configured Argo CD, please take a look at the Big Bang page regarding this
update.
- Users most affected are those that have policies and sub-policies in place to allow/disallow certain permissions.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.19.0 includes Big Bang Version 3.1.0. For more details on the features and updates included in Big Bang Version 3.1.0, please refer to the Big Bang Release Notes.
- Argo CD: upgraded to major version v3.0.6, which includes many changes for users that have customized their Argo CD deployments; see full list of called out changes here.
- GitLab-Runner: updated to major version 18.0 (catching up to the major version of the main GitLab); please see depreciated list for 18.0.
- Jira: chart bump (2.0.1-bb.4); version bump jira-node-lts:10.3.7.
- JSM must be updated to 10.3.7 (users are responsible for updating this).
- Confluence: chart bump (@2.0.2-bb.3); version bump confluence-node-lts:9.2.6.
- MiniOrange must be upgraded to 2.5.3 (users are responsible for updating this).
βοΈ Known Issuesβ
- The Alloy Helm chart performs a lookup for the kube-apiserver Service Endpoint when the Helm chart is rendered to create a Network Policy,
but these endpoints may later change. If this happens, Alloy will be unable to talk to the kube-apiserver and will fail to ship logs successfully.
- See the upstream issue for more details.
- If this happens, due to another bug, suspending and resuming the Flux HelmRelease
may fail.
- Instead, delete and re-create the Flux HelmRelease, using a set of commands, such as the following:
kubectl get HelmRelease -n bigbang alloy -oyaml | tee hr-alloy.yaml
kubectl delete HelmRelease -n bigbang alloy
kubectl apply -f hr-alloy.yaml
- Instead, delete and re-create the Flux HelmRelease, using a set of commands, such as the following:
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.31.8+rke2r1 - K3s:
v1.32.5+k3s1 - EKS:
v1.31.7
- RKE2:
- The following AMI versions were used for testing:
- EKS AMI:
smoothglue-eks-1.31.7-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-32Z - RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-05-19T0702
- EKS AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.18.1 (2025-07-17)β
In addition to the features included in v6.18.0, this patch release also includes the following:
πͺ² Bug Fixesβ
- IaC: The offline Terraform bundle for the ALB IaC module now references a cached local version of the load balancer module, in order to avoid queries to the upstream Terraform registry.
- IaC: The
eks-clustervariablecommit_ref_namehas been removed and resources such as EC2 instances are no longer tagged with it, in order to prevent unnecessary node rotations.
6.18.0 (2025-06-27)β
π¨ Upgrade Noticesβ
- Big Bang 3.0.0 requires migration to operatorless Istio.
- Starting with this release, the deprecated
istioandistioOperatorcomponents cannot be successfully enabled. - Ensure that you have migrated all configurations to the
istiodandistioGatewaycomponents as appropriate, and that you have removed theistioandistioOperatortop-level keys from yourbigbang-values.yamlandbigbang-secrets.yaml, if applicable. - Review the Operatorless Istio Migration Guide for more details.
- Starting with this release, the deprecated
π¦ SmoothGlue Featuresβ
- This release adds a new
instance_storage_mountsinput variable to theeks-clusterIaC module to allow any instance storage present on the instance to be automatically formatted and mounted for use.- If the instance type has no instance storage available, this input has no effect. See the EKS Config Reference page for information on configuring this variable.
- The
bbctlBig Bang compliance dashboard tool has been added as a SmoothGlue platform tool. It is disabled by default.- When enabled, the
bbctltool runs periodically and collects certain information regarding cluster configuration and Kyverno policy violations. This data is presented via Grafana dashboards. - See the upstream chart for more details.
- When enabled, the
β© Upgraded Packagesβ
- SmoothGlue Enterprise v6.18.0 includes Big Bang Version 3.0.0. For more details on the features and updates included in Big Bang 3.0.0, please refer to the Big Bang release notes.
- See the upgrade notice above regarding the required migration to operatorless Istio.
- Configuration for Jaeger and Cluster Auditor has been removed from
top-level Big Bang umbrella chart, so matching references in the default
bigbang-values.yamlhave also been removed. - Flux CD has been updated to v2.6.1.
- Crossplane has been updated to v1.20.0. Refer to the Crossplane v1.20.0
Release Notes for full details. Notable changes:
- Realtime reconciliation is now enabled by default and enables Crossplane to
actively watch for changes, potentially speeding up resource reconciliation
significantly. The
--poll-intervalflag no longer has an effect. - The default registry for Crossplane packages is now
xpkg.crossplane.io(instead ofxpkg.upbound.io). This has no direct effect on SmoothGlue users since SmoothGlue uses hardened containers fromregistry1.dso.mil.
- Realtime reconciliation is now enabled by default and enables Crossplane to
actively watch for changes, potentially speeding up resource reconciliation
significantly. The
- The
crossplane-provider-gitlabimage has been updated to v0.10.5.- This version of
crossplane-provider-gitlaballows use of HTTP basic authentication interacting with GitLab. This has implications for the bootstrapping process for GitLab, when no Personal Access Tokens have yet been created.- To configure
crossplane-provider-gitlabto use HTTP basic authentication:- Add the following to the
provider-gitlabProviderConfig:kind: ProviderConfig
spec:
credentials:
method: BasicAuth
secretRef:
key: credential
name: your-secret-name
namespace: crossplane-system - Create the
your-secret-namesecret in thecrossplane-systemnamespace:kind: Secret
data:
credential: <base64-encoded credential> - The credential can be generated using a shell command:
echo -n '{"username": "your-username", "password": "your-password"}' | base64
- Add the following to the
- See the crossplane-provider-gitlab GitHub for more details.
- To configure
- This version of
πͺ² Bug Fixesβ
- SmoothGlue platform tools that were previously enabled can now be disabled
by explicitly setting the relevant Zarf
_ENABLEDflag tofalse. (For example, to disable Keycloak, set theKEYCLOAK_ENABLEDflag tofalse.) A Helm keep annotation prevents the platform tools from being disabled inadvertently, but setting the_ENABLEDflag now removes this annotation and allows the component to be disabled. This change has no effect if the_ENABLEDflag is left blank or is otherwise not set explicitly tofalse. - When using the automatic SSO configuration with custom realms, this release fixes an issue with automatic detection of the custom realm(s).
- This release fixes an issue where Istio components could not be disabled
independently of the
MIGRATE_ISTIOflag. This allows the new and deprecated Istio components to be toggled individually.
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.31.8+rke2r1 - K3s:
v1.32.5+k3s1 - EKS:
v1.31.7
- RKE2:
- The following AMI versions were used for testing:
- EKS AMI:
smoothglue-eks-1.31.7-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-32Z - RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-05-19T0702
- EKS AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.17.1 (2025-07-17)β
In addition to the features included in v6.17.0, this patch release also includes the following:
πͺ² Bug Fixesβ
- IaC: The offline Terraform bundle for the ALB IaC module now references a cached local version of the load balancer module, in order to avoid queries to the upstream Terraform registry.
- IaC: The
eks-clustervariablecommit_ref_namehas been removed and resources such as EC2 instances are no longer tagged with it, in order to prevent unnecessary node rotations. - The SmoothGlue package allows currently-enabled SmoothGlue components to be disabled explicitly by setting the relevant
_ENABLEDZarf flag tofalse. - The Zarf variables for enabling and disabling Istio-related components now work as expected again.
- The SmoothGlue package no longer populates an empty gatewayCert if no Istio TLS certificate or key is provided.
- The SmoothGlue package now skips the Keycloak CA cert gracefully if no Istio TLS cert is provided.
- Overrides for the new Istio components will now be properly stored in component-specific Config Maps/Secrets, rather than as part of the the
bigbang-overridesConfig Map/Secrets.
6.17.0 (2025-06-10)β
π¨ Upgrade Noticesβ
- GitLab has been updated to v18.0. See GitLab's guide to breaking changes for full details. Note particularly:
- Support for PostgreSQL 15 is removed in GitLab v18.0. (PostgreSQL 16 is configured with our GitLab RDS IaC module, so no action should be necessary if using up-to-date IaC.)
- The CI_JOB_TOKEN "Limit access from this project" option for has been removed after being deprecated in GitLab v16.0.
- Values for the upstream Kyverno Helm chart have been refactored, so overrides which were previously defined under
.kyverno.valuesshould be moved to.kyverno.values.kyvernoinstead. ThekyvernoPoliciesvalues are not impacted by this change. - Values for the upstream Metrics-server Helm chart have been refactored, so overrides which were previously defined under
.addons.metricsServer.valuesshould be moved to.addons.metricsServer.values.upstream. - IaC: The
default_metadata_options.http_tokensvariable for theeks-clustermodule now defaults torequiredinstead ofoptional, disabling IMDSv1. This change will cause a node group rotation due to the updated launch template.- If IMDSv1 is required, it can be enabled by setting the following in your
env.hcl:locals {
cluster_inputs = {
default_metadata_options = {
http_tokens = "optional"
http_put_response_hop_limit = 2
instance_metadata_tags = "disabled"
http_endpoint = "enabled"
}
}
}
- If IMDSv1 is required, it can be enabled by setting the following in your
π¦ SmoothGlue Featuresβ
- IaC: The
eks-clustermodule now supports a newdefault_bdm_iopsinput variable, which allows specifying an explicit IOPS value for the default block device mapping without needing to specify an entirely custom block device mapping.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.17.0 includes Big Bang Version 2.54.0. For more details on the features and updates included in Big Bang Version 2.54.0, please refer to the Big Bang release notes.
- Operatorless Istio is now generally available in Big Bang 2.54.0. Migration from the Istio operator to operatorless Istio will be required prior to Big Bang 3.0.
- Zarf has been upgraded to v0.55.6 for stability.
- Confluence has been updated to chart version
2.0.1-bb.1and image versionconfluence-node-lts:9.2.5. - Jira has been updated to chart version
2.0.1-bb.1and image versionjira-node-lts:10.3.6.
π Compatibilityβ
- The packages for this release were built using Zarf v0.55.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.31.8+rke2r1 - K3s:
v1.32.5+k3s1 - EKS:
v1.31.7
- RKE2:
- The following AMI versions were used for testing:
- EKS AMI:
smoothglue-eks-1.31.7-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-32Z - RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-05-19T0702
- EKS AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.16.1 (2025-07-17)β
In addition to the features included in v6.16.0, this patch release also includes the following:
πͺ² Bug Fixesβ
- IaC: The offline Terraform bundle for the ALB IaC module now references a cached local version of the load balancer module, in order to avoid queries to the upstream Terraform registry.
- IaC: The
eks-clustervariablecommit_ref_namehas been removed and resources such as EC2 instances are no longer tagged with it, in order to prevent unnecessary node rotations. - The SmoothGlue package allows currently-enabled SmoothGlue components to be disabled explicitly by setting the relevant
_ENABLEDZarf flag tofalse. - The Zarf variables for enabling and disabling Istio-related components now work as expected again.
- The Custom Resource Definitions for the latest version of External Secrets Operator are now applied using
kubectl applyrather using Zarf's manifest component in order to avoid Helm issues with importing resources on existing clusters. - The SmoothGlue package no longer populates an empty gatewayCert if no Istio TLS certificate or key is provided.
- The SmoothGlue package now skips the Keycloak CA cert gracefully if no Istio TLS cert is provided.
- Overrides for the new Istio components will now be properly stored in component-specific Config Maps/Secrets, rather than as part of the the
bigbang-overridesConfig Map/Secrets.
6.16.0 (2025-05-29)β
π¨ Upgrade Noticesβ
-
Promtail has been deprecated, disabled by default, and replaced by Alloy.
- If the user has any custom configurations of Promtail, they can utilize the Grafana Alloy migration utility to assist with the migration from Promtail to Alloy.
- Follow the appropriate installation instructions to install Grafana Alloy.
- With an active connection to the cluster containing a Promtail configuration, run:
kubectl get secret -n monitoring promtail-promtail -o yaml, or otherwise obtain the configuration frompromtail.yaml.- Take the decoded contents of the
promtail.yamlkey and save locally:alloy convert --source-format=promtail --output=alloy.yaml promtail.yaml - Update any custom
values.yamlreferences to.alloy.
- If the user has any custom configurations of Promtail, they can utilize the Grafana Alloy migration utility to assist with the migration from Promtail to Alloy.
-
The new variable,
create_cloudwatch_log_group, defaults totrue. To opt-out of importing and modifying the log group default retention time, setcreate_cloudwatch_log_group = false-
β ForΒ existing buildΒ clusters, it will require the import of the AWS CloudWatch Log Group (implicitly created by AWS) for each of the (typically 8) RDS instances (shown below) before running the Terraform IaC. Otherwise the IaC upgrade will fail.
-
If opting-in, then enter the following import commands for existing build clusters prior to configuring log retention and running the terraform IaC:
terragrunt --terragrunt-working-dir modules/jira import 'module.rds.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-jira/postgresql
terragrunt --terragrunt-working-dir modules/confluence import 'module.rds.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-confluence/postgresql
terragrunt --terragrunt-working-dir modules/console import 'module.rds.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-console/postgresql
terragrunt --terragrunt-working-dir modules/mattermost import 'module.rds.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-mattermost/postgresql
terragrunt --terragrunt-working-dir modules/keycloak import 'module.rds.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-keycloak/postgresql
terragrunt --terragrunt-working-dir modules/sonarqube import 'module.rds.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-sonarqube/postgresql
# NOTE: The commands below are a bit different than those above.
terragrunt --terragrunt-working-dir modules/gitlab import 'module.rds[0].module.db_instance.aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/instance/build-'dbIdentifier'-gitlab/postgresql
terragrunt --terragrunt-working-dir modules/nexus import 'module.rds[0].aws_cloudwatch_log_group.this["postgresql"]' /aws/rds/cluster/build-'dbIdentifier'-nexus/postgresql
-
-
The Auto SSO feature is now disabled by default. The following config can be added to the
zarf-config.yamlfile to enable the feature:package:
deploy:
set:
AUTO_SSO_ENABLED: "true"
π¦ SmoothGlue Featuresβ
- Promtail has been deprecated, disabled by default, and replaced by Alloy.
- Kubernetes
v1.31.xis officially supported and the default version used to test SmoothGlue on EKS/RKE2. Additional testing is performed for Kubernetesv1.32.xusing internal single node instances on K3s. - SmoothGlue also now supports new native Istio Helm charts in preparation for the required migration off of Istio Operator. If users would like to test out the automation and new charts before they are required, as well as read about the pre-migration steps and migration concerns, please see the Istio Migration documentation.
- IaC Version tracking has been added. Objects deployed via the IaC are saved as a variable in the
commit_ref_namein the outputs and will show up as a tag on AWS objects with the tagsg:automation:commit-ref-name. - A new Terragrunt variable has been added in the HCL to allow setting
apply_immediatelyfor RDS modules. Setting this totruewill apply Terraform changes to RDS instances to occur during IaC apply instead at scheduled maintenance time; the default remainsfalse. - Auto SSO Feature:
- This feature is now disabled by default. Please see the linked documentation below on how to enable and configure the feature.
- SmoothGlue Run environments are now supported and new documentation on how to enable/configure the feature is now available.
- The CloudWatch Log Group retention policy capability has been added for RDS/Aurora.
- Two new variables,
cloudwatch_log_group_retention_in_daysandcreate_cloudwatch_log_group, have been added to application module inputs within thebuild.hclfile to configure the Aurora/RDS log group retention time, improving log retrieval times, overall system performance, and cost savings. (See upgrade notices for existing build clusters.) - The variable
create_cloudwatch_log_groupis defaulted totrue. For existing clusters, seeUpgrade Notices. For new clusters, usecloudwatch_log_group_retention_in_daysto set retention days per database as seen below:
- Two new variables,
locals {
gitlab_inputs = {
# Adjust as needed, default is 0 days (logs never expire). Valid value for X is one of:
# [0 1 3 5 7 14 30 60 90 120 150 180 365 400 545 731 1096 1827 2192 2557 2922 3288 3653]
cloudwatch_log_group_retention_in_days = X
# Set to false to avoid importing the cloudwatch_log_group for existing build clusters
# create_cloudwatch_log_group = false
}
# Repeat for each module's input
jira_inputs = {
cloudwatch_log_group_retention_in_days = X
}
confluence_inputs = {...}
keycloak_inputs = {...}
mattermost_inputs = {...}
sonarqube_inputs = {...}
console_inputs = {...}
nexus_inputs = {{...}
}
- Grafana can be enabled with High Availability (HA). This creates multiple Grafana pods managed by an HPA with pod distribution rules and a backing RDS instance. See our docs for more information.
- To enable Grafana HA, you must turn on the Grafana module, which can be completed by:
- Setting the
locals.grafana_inputs.high_availabilitytotrue - Setting
modules.grafanatotrue
- Setting the
- NOTE: Due to how Grafana pods need to communicate with each other to deconflict and de-duplicate, all database IaC features and in-cluster variables must be enabled at once at the Terragrunt level.
- Grafana HA can be enabled on existing clusters, and maintainers should be aware of the following chart additions when enabling:
- To enable Grafana HA, you must turn on the Grafana module, which can be completed by:
---
grafana:
values:
headlessService: true
autoscaling:
enabled: true
minReplicas: 2
maxReplicas: 5
targetCPU: "60"
targetMemory: ""
podDisruptionBudget:
apiVersion: "policy/v1"
minAvailable: 1
grafana.ini:
database:
type: postgres
host: "${db_host}:${db_port}"
name: grafana
user: "${db_name}"
alerting:
enabled: false
unified_alerting:
enabled: true
ha_peers: monitoring-grafana-headless:9094
ha_listen_address: ${POD_IP}:9094
ha_advertise_address: ${POD_IP}:9094
rule_version_record_limit: "5"
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- topologyKey: "kubernetes.io/hostname"
labelSelector:
matchLabels:
dont-schedule-with: grafana
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.16.0 includes Big Bang Version 2.53.1. For more details on the features and updates included in Big Bang Version 2.53.1, please refer to the Big Bang Release Notes.
- Confluence: chart bump(@2.0.0-bb.0) version bump confluence-node-lts:9.2.4
- Jira: chart bump (2.0.0-bb.2)
π Bug Fixesβ
- SmoothGlue now disables the
KubeControllerManagerDownandKubeSchedulerDownPrometheus alerts by default for EKS since those components are located on the control-plane, which is managed by AWS and is not accessible from the cluster.
π Compatibilityβ
- The packages for this release were built using Zarf v0.54.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.31.8+rke2r1 - K3s:
v1.32.4+k3s1 - EKS:
v1.31.7
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.31.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-30Z - EKS AMI:
smoothglue-eks-1.31.7-rocky-8-base-v1.1.1-stig-2025-05-19T08-22-32Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-05-19T0702
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.15.0 (2025-05-14)β
π¨ Upgrade Noticesβ
- Zarf is being updated to
v0.54.0, which is now the minimum supported version. Trying to use an older Zarf version will result in Zarf registry failures on EKS clusters if using IRSA and S3 bucket backing for the registry (which are the default settings). - Ensure that you are using the new Zarf init config from the IaC. You will also need to run the Zarf init steps again to update Zarf. See the "Initializing Zarf on SmoothGlue" section in the "SmoothGlue Build/Run Deploy Guide" for more details. The Zarf registry will be unusable between the period from when the IaC is run and when Zarf is re-initialized.
ZARF_CONFIG=infra-iac/outputs/zarf-init-config.yaml zarf init --components git-server --architecture=amd64
- The Nexus Repository Manager APIs changed impacting the
blobstorageandrepojobs. We have temporarily modified the IaC values to disable these jobs and ensure the IaC values are applied, or the Nexus Repository Manager upgrade will fail. - You may need to restart the Keycloak pods using
kubectl rollout restart statefulset -n keycloak keycloakto ensure that all pods are using the updated Keycloak theme bundled with this SmoothGlue release.
π¦ SmoothGlue Featuresβ
- This release updates the styling and branding of the SmoothGlue Keycloak theme. Notably, the theme now includes a configurable Terms of Use banner, which can be configured on a per-realm basis. This feature is not enabled by default; to configure the Terms of Use banner, follow these steps:
- Log into Keycloak's admin console and select the realm you wish to modify.
- Navigate to "Realm Settings" -> "Localization" -> "Realm Overrides".
- Click the "Add Translation" button to add a translation with the key "termsText". The value should be the text of your Terms of Use banner. This field supports HTML tags.
- IAM Roles for Service Accounts (IRSA) is now enabled by default for EKS cluster nodes to access the Zarf registry, when backed up by an S3 bucket (by itself, a default setting). This moves away from the IMDSv1 based S3 bucket policy, which was a less secure access method. Existing clusters will transition seamlessly from IMDSv1 to IRSA based Zarf registry access without requiring any user intervention. Zarf has been updated to
v0.54.0to support this.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.15.0 includes Big Bang Version 2.52.0. For more details on the features and updates included in Big Bang Version 2.52.0, please refer to the Big Bang Release Notes.
- Upgrades the following Big Bang third-party apps:
- Cert-Manager: 1.17.2
- Confluence chart:
1.22.7-bb.1 - Jira chart:
2.0.0-bb.0
π Bug Fixesβ
- Updated the Keycloak theme, which resolved a Javascript error presented on the login page, as well as re-styled the "update password" page, which previously had white text on a white background for the password input field.
β Known Issuesβ
- You may encounter a scenario following the upgrade or installation where
istio-proxyfails to communicate properly with theistiodservice. You may observe an error similar to the following:- To workaround this issue, restart the
istiodDeployment.
- To workaround this issue, restart the
2025-05-12T16:58:56.878375Z warn ca ca request failed, starting attempt 4 in 804.379312ms
2025-05-12T16:58:57.683232Z error citadelclient failed to sign CSR: create certificate: rpc error: code = Unavailable desc = connection error: desc = "transport: Error while dialing:
-
The following only applies to the initial deployment of the SmoothGlue IAC. No action is required for updates to already deployed clusters - Due to an upstream issue for the EKS module and when deploying a cluster using an AL2023 AMI, the System Integrator will need to manually generate and set a Zarf registry pull password. The following config can be added to the
env.hclfile:locals {
cluster_inputs = {
zarf_registry_pull_password = "securepassword123"
}
} -
When using a network load balancer (NLB) with theΒ
preserve_client_ipΒ option enabled, the default routing rules for EKS nodes prevent nodes from accessing platform services hosted on the same node, which can cause failures when logging into Keycloak, particularly on clusters with fewer nodes.- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
preserve_client_ipΒ option, the VPC router rewrites the source IP for traffic; when the node attempts to talk to the NLB, the traffic is rewritten so that it appears to come from the node itself, and the return traffic is not able to be routed correctly back to the NLB. - The following options are potential workarounds:
- Disabling theΒ
preserve_client_ipΒ option on the NLB will resolve the issue at the cost of losing source attribution for incoming traffic. - Removing the local subnet route on nodes will resolve the issue at the cost of increasing the amount and cost of traffic being routed through the VPC router.
- Increasing the node count for the cluster will reduce the likelihood of the issue because it will become less likely for any given traffic to be routed back to the original node.
- Disabling theΒ
- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
-
The Big Bang Istio Helm chart has a bug that prevents Istio Gateway deployments from properly being upgraded. During an upgrade, Istio Gateway deployments may get stuck as a result and will need manual intervention to complete the upgrade. To validate the issue in the cluster, check the health of theΒ
istiooperators.install.istio.ioΒ resource as follows:kubectl get istiooperators.install.istio.io -n istio-systemIf it is in
Errorstatus, delete all Istio Gateway deployments in theΒistio-systemΒ namespace to allow the Istio Operator to finish reconciling the upgrade and report aHealthystatus. The deployments will be recreated automatically by the Istio Operator. For example:kubectl delete deployment.apps/admin-ingressgateway -n istio-system
kubectl delete deployment.apps/passthrough-ingressgateway -n istio-system
kubectl delete deployment.apps/public-ingressgateway -n istio-systemNote: Deleting the deployments will entail some brief but non-zero downtime.
https://repo1.dso.mil/big-bang/product/packages/istio-controlplane/-/issues/253 has been opened to track this issue, which was introduced in SmoothGlue 6.7 (Big Bang 2.44)
π Compatibilityβ
- The packages for this release were built using Zarf v0.54.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.12+rke2r1 - K3s:
v1.32.3+k3s1 - EKS:
v1.30.9-eks-5d632ec
- RKE2:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
6.14.1 (2025-05-07)β
Package Bug Fixesβ
- add missing k8s-sidecar image (b2fc23e)
6.14.0 (2025-05-01)β
π¨ Upgrade Noticesβ
-
Updated Console's default config to change the default Keycloak host config from
login.<domain>tokeycloak.<domain>. SmoothGlue Build environments use thekeycloak.<domain>host by default when deploying Keycloak. If deploying Keycloak underlogin.<domain>the following can be added to thebigbang-values.yamlto configure Console to use the overwritten host for Keycloak:packages:
console:
values:
keycloak:
host: login.<domain> -
This upgrade includes a major version update to Keycloak. The full migration guide for Keycloak
26.0.0is located here. Specific changes of note:-
If you are currently setting the
KC_PROXYenvironment variable toedgeusing the.addons.keycloak.values.secrets.envvalue, note that this option has been removed. It has been replaced byKC_PROXY_HEADERSoption, which should be set automatically if the value.addons.keycloak.values.proxy.enabledis set totrue.addons:
keycloak:
values:
proxy:
enabled: true
-
-
Keycloak may fail to upgrade.
- To resolve this, reconcile the helm release and then delete the pods within the keycloak namespace.
flux reconcile hr -n bigbang keycloak --with-source --force
kubectl delete pods -n keycloak- Alternately, scale the keycloak pod replica count to 1 by editing the Horizontal Pod Autoscaler before starting the upgrade.
kubectl patch hpa -n keycloak keycloak -p "{\"spec\":{\"minReplicas\":1,\"maxReplicas\":1}}"And then scale it back up once done with the upgrade, for example.
kubectl patch hpa -n keycloak keycloak -p "{\"spec\":{\"minReplicas\":2,\"maxReplicas\":5}}" -
The SmoothGlue EKS IaC's
zarf-configoutput now includes Zarf variables for AWS and a variable forCLUSTER_NAME. When using the auto-SSO feature, please ensure the variables in the outputtedzarf-configare merged with customer-managedzarf-config's to ensure Keycloak client names are configured properly.
π¦ SmoothGlue Featuresβ
- SmoothGlue Automated SSO:
- SmoothGlue now automatically configures the
_structusureAdminsgroup with the appropriate Keycloak permissions to manage thesmoothgluerealm. - SmoothGlue now automatically configures cluster-level prefixes onto Keycloak clients managed by SmoothGlue. This change will enable future work to allow a SmoothGlue Run's SSO clients to be managed by SmoothGlue. Some applications may need to be manually restarted to pickup the new SSO client names.
- SmoothGlue now automates the creation of the Keycloak objects for SonarQube. There are still some manual steps required by System Integrators to enable SSO for SonarQube. Please see updated documentation.
- SmoothGlue will automatically configure a Keycloak client and automatically configure the application for:
- Gitlab
- Mattermost
- Console
- SmoothGlue will automatically configure a Keycloak client for:
- Confluence
- Jira
- SmoothGlue now automatically configures the
- This release updates the styling and branding of the SmoothGlue Keycloak theme. Notably, the theme now includes a configurable terms of use banner which can be configured on a per-realm basis. This feature is not enabled by default; to configure the terms of use banner, follow these steps:
- Log into Keycloak's admin console and select the realm you wish to modify.
- Navigate to "Realm Settings" -> "Localization" -> "Realm Overrides".
- Click the "Add Translation" button to add a translation with the key "termsText". The value should be the text of your Terms of Use banner. This field supports HTML tags.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.14.0 includes Big Bang Version 2.51.0. For more details on the features and updates included in Big Bang Version 2.51.0, please refer to the Big Bang release notes.
- Kiali stays pinned to the earlier 2.50.0 version of v2.6.0 due to a failure seen in latest version.
π Bug Fixesβ
- Docusaurus and Tailwind config to support dark mode by default. Updated global footer to add a label for the legal links.
β Known Issuesβ
-
The following only applies to the initial deployment of the SmoothGlue IAC. No action is required for updates to already deployed clusters - Due to an upstream issue for the EKS module and when deploying a cluster using an AL2023 AMI, the System Integrator will need to manually generate and set a Zarf registry pull password. The following config can be added to the
env.hclfile:locals {
cluster_inputs = {
zarf_registry_pull_password = "securepassword123"
}
} -
When using a network load balancer (NLB) with theΒ
preserve_client_ipΒ option enabled, the default routing rules for EKS nodes prevent nodes from accessing platform services hosted on the same node, which can cause failures when logging into Keycloak, particularly on clusters with fewer nodes.- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
preserve_client_ipΒ option, the VPC router rewrites the source IP for traffic; when the node attempts to talk to the NLB, the traffic is rewritten so that it appears to come from the node itself, and the return traffic is not able to be routed correctly back to the NLB. - The following options are potential workarounds:
- Disabling theΒ
preserve_client_ipΒ option on the NLB will resolve the issue at the cost of losing source attribution for incoming traffic. - Removing the local subnet route on nodes will resolve the issue at the cost of increasing the amount and cost of traffic being routed through the VPC router.
- Increasing the node count for the cluster will reduce the likelihood of the issue because it will become less likely for any given traffic to be routed back to the original node.
- Disabling theΒ
- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
-
The Big Bang Istio Helm chart has a bug that prevents Istio Gateway deployments from properly being upgraded. During an upgrade, Istio Gateway deployments may get stuck as a result and will need manual intervention to complete the upgrade. To validate the issue in the cluster, check the health of theΒ
istiooperators.install.istio.ioΒ resource as follows:kubectl get istiooperators.install.istio.io -n istio-systemIf it is in
Errorstatus, delete all Istio Gateway deployments in theΒistio-systemΒ namespace to allow the Istio Operator to finish reconciling the upgrade and report aHealthystatus. The deployments will be recreated automatically by the Istio Operator. For example:kubectl delete deployment.apps/admin-ingressgateway -n istio-system
kubectl delete deployment.apps/passthrough-ingressgateway -n istio-system
kubectl delete deployment.apps/public-ingressgateway -n istio-systemNote: Deleting the deployments will entail some brief but non-zero downtime.
https://repo1.dso.mil/big-bang/product/packages/istio-controlplane/-/issues/253 has been opened to track this issue, which was introduced in SmoothGlue 6.7 (Big Bang 2.44)
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2: v1.30.11+rke2r1
- K3s: v1.32.3+k3s1
- EKS: v1.30.9-eks-5d632ec
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.13.0 (2025-04-16)β
π¦ SmoothGlue Featuresβ
-
A new optional variable
cloudwatch_log_group_retention_in_dayshas been added to theenv.hclfiles to configure the EKS cluster log group retention time. It can be configured as shown below.locals {
cluster_inputs = {
# Adjust as needed, default is 90 days. Valid value for X is one of:
# [0 1 3 5 7 14 30 60 90 120 150 180 365 400 545 731 1096 1827 2192 2557 2922 3288 3653]
cloudwatch_log_group_retention_in_days = X
}
} -
IAM policies generated by the SmoothGlue IAC no longer apply tags to IAM policies when
compatibility_modeis set to true. This change is to conform to limitations on high-side deployments- NOTE: On an existing cluster, you may need to delete the
allow_kmsandallow_cluster_autoscalerIAM policies to allow their recreation.
- NOTE: On an existing cluster, you may need to delete the
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.13.0 includes Big Bang Version 2.50.0. For more details on the features and updates included in Big Bang Version 2.50.0, please refer to the Big Bang release notes.
- Upgrades the following Big Bang third-party apps:
- Confluence LTS: 9.2.3
- Jira LTS: 10.3.5
- Nexus IQ Server: 1.189.0-01
π Bug Fixesβ
- Fixed an issue that prevented user data scripts from running on AL2023 AMIs.
- Fixed an issue that overwrote default values from SmoothGlue with customer overrides. This prevented SmoothGlue default values from being viewable at runtime. Overrides provided by customers are still overlayed on top of SmoothGlue default values, so this is a purely cosmetic change.
β Known Issuesβ
-
The following only applies to the initial deployment of the SmoothGlue IAC. No action is required for updates to already deployed clusters - Due to an upstream issue for the EKS module and when deploying a cluster using an AL2023 AMI, the System Integrator will need to manually generate and set a Zarf registry pull password. The following config can be added to the
env.hclfile:locals {
cluster_inputs = {
zarf_registry_pull_password = "securepassword123"
}
} -
When using a network load balancer (NLB) with theΒ
preserve_client_ipΒ option enabled, the default routing rules for EKS nodes prevent nodes from accessing platform services hosted on the same node, which can cause failures when logging into Keycloak, particularly on clusters with fewer nodes.- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
preserve_client_ipΒ option, the VPC router rewrites the source IP for traffic; when the node attempts to talk to the NLB, the traffic is rewritten so that it appears to come from the node itself, and the return traffic is not able to be routed correctly back to the NLB. - The following options are potential workarounds:
- Disabling theΒ
preserve_client_ipΒ option on the NLB will resolve the issue at the cost of losing source attribution for incoming traffic. - Removing the local subnet route on nodes will resolve the issue at the cost of increasing the amount and cost of traffic being routed through the VPC router.
- Increasing the node count for the cluster will reduce the likelihood of the issue because it will become less likely for any given traffic to be routed back to the original node.
- Disabling theΒ
- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
-
The Big Bang Istio Helm chart has a bug that prevents Istio Gateway deployments from properly being upgraded. During an upgrade, Istio Gateway deployments may get stuck as a result and will need manual intervention to complete the upgrade. To validate the issue in the cluster, check the health of theΒ
istiooperators.install.istio.ioΒ resource as follows:kubectl get istiooperators.install.istio.io -n istio-systemIf it is in
Errorstatus, delete all Istio Gateway deployments in theΒistio-systemΒ namespace to allow the Istio Operator to finish reconciling the upgrade and report aHealthystatus. The deployments will be recreated automatically by the Istio Operator. For example:kubectl delete deployment.apps/admin-ingressgateway -n istio-system
kubectl delete deployment.apps/passthrough-ingressgateway -n istio-system
kubectl delete deployment.apps/public-ingressgateway -n istio-systemNote: Deleting the deployments will entail some brief but non-zero downtime.
https://repo1.dso.mil/big-bang/product/packages/istio-controlplane/-/issues/253 has been opened to track this issue, which was introduced in SmoothGlue 6.7 (Big Bang 2.44)
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.8+rke2r1 - K3s:
v1.32.3+k3s1 - EKS:
v1.30.9-eks-5d632ec
- RKE2:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
6.12.0 (2025-04-02)β
π¨ Upgrade Noticesβ
- Kyverno
- A new Kyverno Policy has been added which mutates pod specs to drop
ALLcapabilities in all containers if not already done. This policy works in tandem with therequire-drop-all-capabilitiespolicy to make it easier for SREs to securely deploy workloads to their clusters without having to explicitly modify the pod's containers'securityContexts to be compliant. - If Big Bang consumers are currently excluding certain workloads from the
require-drop-all-capabilitiespolicy due to incompatibilities with that policy, those exclusions should also be included for this new policy:add-default-capability-dropto avoid workload interruption.
- A new Kyverno Policy has been added which mutates pod specs to drop
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.12.0 includes Big Bang Version 2.49.0. For more details on the features and updates included in Big Bang Version 2.49.0, please refer to the Big Bang Release Notes.
consoleupdated image to 54183nexus-iqchart upgraded to 188
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.9-rke2r1 - K3s:
v1.30.9+k3s1 - EKS:
v1.30.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.30.9-rke2r1-rocky-8-base-v1.1.1-stig-2025-02-17T09-24-30Z - EKS AMI:
smoothglue-eks-1.30.8-rocky-8-base-v1.1.1-stig-2025-02-10T09-21-19Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-02-10T0802
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.11.0 (2025-03-19)β
π¨ Upgrade Noticesβ
- Flux has been upgraded to
2.5.1. Platform Operators should update their local Flux binary to a compatible version.
π¦ SmoothGlue Featuresβ
- On RKE2-based clusters, theΒ
preserve_client_ipsΒ IaC variable is now set toΒfalseΒ by default in order to allow pods to communicate internally using external DNS names. See the known issues section for more information.
Note: This means that the client IP in any logs will appear to be the load balancer itself. To get the true client IP, you will need to setup monitoring on the NLB - Added documentation for manually rotating RDS/Aurora database passwords as a good security practice.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.11.0 includes Big Bang Version 2.48.0. For more details on the features and updates included in Big Bang Version 2.48.0, please refer to the Big Bang Release Notes.
- Update Gitlab to 17.9.2 (applied Critical Patch)
- Update Jira to LTS 10.3.4 (addresses CVE-2024-38819)
- Update JSM to 10.3.4 (addresses CVE-2024-38819)
π Bug Fixesβ
- Fixed an issue with the SmoothGlue automated SSO feature for ArgoCD. SmoothGlue Admins should now be correctly given admin privileges in ArgoCD.
β Known Issuesβ
- When using a network load balancer (NLB) with theΒ
preserve_client_ipΒ option enabled, the default routing rules for EKS nodes prevent nodes from accessing platform services hosted on the same node, which can cause failures when logging into Keycloak, particularly on clusters with fewer nodes.- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
preserve_client_ipΒ option, the VPC router rewrites the source IP for traffic; when the node attempts to talk to the NLB, the traffic is rewritten so that it appears to come from the node itself, and the return traffic is not able to be routed correctly back to the NLB. - The following options are potential workarounds:
- Disabling theΒ
preserve_client_ipΒ option on the NLB will resolve the issue at the cost of losing source attribution for incoming traffic. - Removing the local subnet route on nodes will resolve the issue at the cost of increasing the amount and cost of traffic being routed through the VPC router.
- Increasing the node count for the cluster will reduce the likelihood of the issue because it will become less likely for any given traffic to be routed back to the original node.
- Disabling theΒ
- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the nodeβs local subnet, since these addresses should theoretically be reachable directly by the node. However, when using theΒ
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.9-rke2r1 - K3s:
v1.30.9+k3s1 - EKS:
v1.30.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.30.9-rke2r1-rocky-8-base-v1.1.1-stig-2025-02-17T09-24-30Z - EKS AMI:
smoothglue-eks-1.30.8-rocky-8-base-v1.1.1-stig-2025-02-10T09-21-19Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-02-10T0802
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.10.0 (2025-03-04)β
SmoothGlue Featuresβ
- This release adds optional basic support for Amazon Linux 2023 (AL2023) AMIs in EKS cluster IaC. To use AL2023, add the following to the
cluster_inputssection of yourenv.hclfile:locals {
cluster_inputs = {
ami_id = "ami-0123456789abcdef0" # replace with actual AMI ID
default_ami_type = "AL2023_x86_64_STANDARD"
}
}- For more details, refer to How to Create an EKS Cluster with Amazon Linux 2023.
- This release adds optional support in IaC for provisioning GitLab's database using an RDS Multi-AZ cluster rather than a single database instance. As a single instance, RDS offers support for a single warm standby instance; however, provisioning the database using an RDS Multi-AZ cluster allows for a cluster of three instances. There is no automatic migration path from a single RDS instance to a Multi-AZ cluster, so we recommend enabling the Multi-AZ cluster during the initial cluster provision if possible. If migrating an existing cluster, you will need to perform a database import/export manually.
- Note that there are instance class limitations when using a Multi-AZ RDS cluster; see the AWS documentation for more information.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.10.0 includes Big Bang Version 2.47.0. For more details on the features and updates included in Big Bang Version 2.47.0, please refer to the Big Bang Release Notes.
- Update Confluence to LTS 9.2.1 (Helm chart version 1.22.5-bb.0).
- Update Jira to LTS 10.3.3 (Helm chart version 1.22.5-bb.1).
πͺ² Bug Fixesβ
- Refactor IaC compatibility mode toggle to correctly disable NLB stickiness in ISO regions.
- Exclude
aws-ebs-csi-drivernamespace fromgenerate-networkpolicy-imdsKyverno ClusterPolicy so that RKE2 clusters can provision EBS PVCs correctly. - Exclude the following namespaces from the
require-istio-on-namespacesKyverno ClusterPolicy so that users may enforce the policy:cluster-autoscalercrossplane-systemkyvernostructsure-system
- Extend HelmRelease install timeout for GitLab to 15 minutes.
βοΈ Known Issuesβ
- When using a network load balancer (NLB) with the
preserve_client_ipoption enabled, the default routing rules for EKS and RKE2 nodes prevent nodes from accessing platform services hosted on the same node, which can cause failures when logging into Keycloak, particularly on clusters with fewer nodes.- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the node's local subnet, since these addresses should theoretically be reachable directly by the node. However, when using the
preserve_client_ipoption, the VPC router rewrites the source IP for traffic; when the node attempts to talk to the NLB, the traffic is rewritten so that it appears to come from the node itself, and the return traffic is not able to be routed correctly back to the NLB. - We are currently working on an Istio-level fix which should prevent VirtualService traffic within the cluster from ever leaving the cluster. Until that fix is available, the following options are potential workarounds:
- Disabling the
preserve_client_ipoption on the NLB will resolve the issue at the cost of losing source attribution for incoming traffic. - Removing the local subnet route on nodes will resolve the issue at the cost of increasing the amount and cost of traffic being routed through the VPC router.
- Increasing the node count for the cluster will reduce the likelihood of the issue because it will become less likely for any given traffic to be routed back to the original node.
- Disabling the
- More specifically, the default routing rules for nodes do not route traffic to the VPC router for traffic within the node's local subnet, since these addresses should theoretically be reachable directly by the node. However, when using the
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.9-rke2r1 - K3s:
v1.30.9+k3s1 - EKS:
v1.30.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.30.9-rke2r1-rocky-8-base-v1.1.1-stig-2025-02-17T09-24-30Z - EKS AMI:
smoothglue-eks-1.30.8-rocky-8-base-v1.1.1-stig-2025-02-10T09-21-19Z - Base AMI:
base-Rocky-8-EC2-LVM-v1.1.1-stig-2025-02-10T0802
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.9.0 (2025-02-19)β
π¨ Upgrade Noticesβ
- During upgrade, you may get a
SonarQube is under maintenanceerror message on the SonarQube UI.- To resolve this, once the HelmRelease upgrades, you will be prompted to visit your SonarQube instance at a <sonarqube_url>/setup URL.
π¦ SmoothGlue Featuresβ
- Crossplane Upgraded the Crossplane and provider-kubernetes Crossplane components.
- IaC: Added HA support for RDS Aurora modules:
- Supported Applications:
- Jira
- Confluence
- Mattermost
- SonarQube
- Nexus
- Console
- Keycloak
- For any of the above modules, you can now add more than one RDS instance into a cluster. Additional instances will be
Readerinstances only. If the mainWriterinstance goes down, Aurora will automatically promote aReaderinstance toWriter.- For each instance created, values such as the availability zone can be manually set; however, you do not have to specify AZ for each instance; Aurora will automatically place each instance in a different AZ.
- All RDS Aurora storage is automatically replicated across multiple AZs regardless of DB instance count.
- Examples
-
To create a writer instance and two reader instances for keycloak in your
env.hcl:keycloak_inputs = {
# Allows a specific number of database instances to be defined
rds_instances = {
primary = {availibility_zone = us-east-1a}
secondary = {}
replica1 = {}
# ...
}
} -
Autoscaling of instances is also optionally available. Aurora autoscaling will NOT scale any instances explicitly defined in
rds_instances; it will only add or remove reader instances up to the definedminandmaxlimits. Autoscaling will use thetarget_metricscaling policy by default with a target CPU utilization of 70%. The followingenv.hclprovisions Keycloak RDS Aurora autoscaling with between 0 and 5 reader instances:keycloak_inputs = {
rds_auto_scale = {
enabled = true
min = 0 # default is 0
max = 5 # default is 5
}
}
-
- Supported Applications:
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.9.0 includes Big Bang Version 2.46.0. For more details on the features and updates included in Big Bang Version 2.46.0, please refer to the Big Bang release notes.
- Confluence: confluence-node:9.2.0 version: 1.22.3-bb.4
- Removed duplicate jmx-initContainer
- Updated cypress (source) 14.0.0 -> 14.0.1
- Jira: jira-node-lts:10.3.2. version: 1.22.3-bb.0
- Updated chart to 1.22.3
- Updated cypress (source) 14.0.0 -> 14.0.1
- Nexus IQ: Upgraded from 1.186.0-01 to 1.187.0-01
- Crossplane Components:
- crossplane - v1.16.0 to v1.19.0
- provider-kubernetes - v0.12.1 to 0.16.2
β Known Issuesβ
- If turning on new components, Zarf health checks are performed before unsuspending Big Bang. Manually resume the Big Bang HelmRelease, as required.
- Big Bang 2.46.0 comes with a known issue relating to the
gitlab-gitlab-exporterServiceMonitor object. We are handling this issue as part of our upgrade process; no user action should be required. More information may be found here.
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.9+rke2r1 - K3s:
v1.31.5+k3s1 - EKS:
v1.30.8-eks-2d5f260
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.30.9-rke2r1-rocky-8-base-v1.1.1-stig-2025-02-17T09-24-30Z - EKS AMI:
smoothglue-eks-1.30.6-rocky-8-base-v1.1.1-stig-2025-01-04T03-12-26Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.8.0 (2025-02-06)β
π¨ Upgrade Noticesβ
-
SmoothGlue packages are now built with Zarf v0.46.0, which is the minimum version supported. Please
zarf initpre-existing clusters with the v0.46.0 init package before upgrading SmoothGlue. -
The new Zarf version provides better package readiness checking. As a byproduct, the logic in the package has less control over when and what is evaluated. The default readiness timeout set by Zarf is too low for deploying a fresh cluster. It is recommended to add the following to the ZARF_CONFIG file:
package:
deploy:
timeout: 30m0s -
Due to the better readiness checks from Zarf, clusters that do not wish to use the automated SSO feature need to disable it from the config. Run clusters have it disabled by default, but for build clusters it is recommended to include the following to the ZARF_CONFIG file to opt out of the automated SSO feature:
package:
deploy:
set:
KEYCLOAK_CONFIG_ENABLED: false -
This release will cause a node refresh to occur.
π¦ SmoothGlue Featuresβ
- IaC Allow overriding EKS-calculated max-pods per node.
β© Upgraded Packagesβ
- Upgraded Zarf to v0.46.0
- Upgraded Confluence to confluence-node:9.2.0 version: 1.22.3-bb.2
- Updated gluon from 0.5.12 to 0.5.14
- Updated cypress dependencies 13.12.0 -> ^14.0.0
- Updated registry1.dso.mil/ironbank/opensource/postgres/postgresql from 16.6 to 17.2
- Upgraded Jira to jira-node-lts:10.3.2 version: 1.22.2-bb.4
- Added gluon 0.5.12 -> 0.5.14
- Updated cypress ^13.15.0 -> ^14.0.0
- Updated registry1.dso.mil/ironbank/atlassian/jira-data-center/jira-node-lts 10.3.1 -> 10.3.2
- This release of SmoothGlue Enterprise v6.8.x includes Big Bang Version 2.45.1. For more details on the features and updates included in Big Bang Version 2.45.1, please refer to the Big Bang Release Notes.
- Promtail: Note: bumping
promtailimage/appVersion beyond the version used in upstream chart (v3.0.0 vs v3.3.2) - Mattermost upgrade from 10.4.1 to 10.4.2
- GitLab upgrade from 17.6.2 to 17.8.1
- Promtail: Note: bumping
πͺ² Bug Fixesβ
- Standardize Terraform provider versions to resolve lookup inconsistencies.
- Nexus can be enabled with
nexus = trueornexusRepositoryManager = true, allowing for conditional enablement of Nexus Repository Manager.
π Compatibilityβ
- The packages for this release were built using Zarf v0.46.0.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.8-rke2r1 - K3s:
v1.30.5+k3s1 - EKS:
v1.30.8-eks-2d5f260
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.30.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-01-13T09-22-54Z - EKS AMI:
smoothglue-eks-1.30.6-rocky-8-base-v1.1.1-stig-2025-01-04T03-12-26Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.7.0 (2025-01-22)β
π¦ SmoothGlue Features
- Kubernetes v1.30.x is officially supported and is the default version used to test SmoothGlue on EKS/RKE2. Additional testing is performed for Kubernetes v1.31.x using K3s.
- IaC: allow autoscaling on a per-nodegroup basis with supporting documentation. Cluster autoscaler will be enabled by default on the main nodegroup. Additional nodegroups can be explicitly defined via tags.
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.7.0 includes Big Bang Version 2.44.0. For more details on the features and updates included in Big Bang Version 2.44.0, please refer to the Big Bang release notes.
consoleupdated image to 39560nexus-iqchart upgraded to 186cluster-autoscalerupgrade to support Kubernetes v1.30.x
β Known Issuesβ
- Kiali - ISSUE
-
On Kubernetes 1.29+, the Kiali Operator may fail with a 404 while running the kiali-deploy playbook if the cluster returns the
flowcontrol.apiserver.k8s.io/v1beta2API version (no longer served as of v1.29).In this case, removing the invalid API version should resolve the issue and allow the Kiali Operator to run successfully.
-
$ kubectl delete apiservices.apiregistration.k8s.io v1beta2.flowcontrol.apiserver.k8s.io
π Compatibilityβ
- The packages for this release were built using Zarf v0.36.1.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.30.8-rke2r1 - K3s:
v1.30.5+k3s1 - EKS:
v1.30.8-eks-2d5f260
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.30.8-rke2r1-rocky-8-base-v1.1.1-stig-2025-01-13T09-22-54Z - EKS AMI:
smoothglue-eks-1.30.6-rocky-8-base-v1.1.1-stig-2025-01-04T03-12-26Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.6.0 (2025-01-07)β
π¨ Upgrade Noticesβ
- :octagonal_sign: With a Major version update to Jira 10.3 you must also update the SSO addon, this is not provided for you if you are running Jira in a disconnected environment.
π¦ SmoothGlue Featuresβ
- Adds Grafana Dashboard / Alerts for monitoring failed Keycloak login attempts by Username and IP
- Jira has a major version update that changes how users SSO login, To force users to have to login again see this guide
β© Upgraded Packagesβ
- This release of SmoothGlue Enterprise v6.6.0 includes Big Bang Version 2.43.0. For more details on the features and updates included in Big Bang Version 2.43.0, please refer to the Big Bang release notes.
- Jira has received a major version to 10
π Compatibilityβ
- The packages for this release were built using Zarf v0.36.1.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.8+rke2r1 - K3s:
v1.30.5+k3s1 - EKS:
v1.29.6
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.29.8-rke2r1-rocky-8-base-v1.1.1-stig-2024-09-23T08-14-20Z - EKS AMI:
smoothglue-eks-1.29.6-rocky-8-base-v1.1.1-stig-2024-09-09T08-14-46Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.5.0 (2024-12-30)β
π¨ Upgrade Noticesβ
If you see a :octagonal_sign: it means that some form of manual step is required to proceed, please heed these warnings.
- :octagonal_sign: Zarf version required is now
v0.36.1to support new functionality around deploying OCI artifacts. Upgrading existing clusters requires using the new version to zarf init the cluster to upgrade onto the new version - :octagonal_sign: Due to a FIPs compliance issue in the Big Bang's version of
Gitlabyou MUST upgrade the RDS for GitLab from Postgres version 14 to version 16 while staying on the same version of GitLab. It is recommended to upgrade to Postgres 16 before attempting to upgrade via the IaC. Steps to manually upgrade GitLab RDS:- Fully backup GitLab and store backup in secure location
- Scale down GitLab deployments and statefulsets
- Go to AWS console and find your GitLab instance (ity won't be in a cluster)
- Click Modify in the top right
- Change
DB engine versionto 16.X - Scroll to "additional configurations" --> "Database options"
- Change DB parameter group to
default.postgres16 - Click continue and BE SURE TO SELECT
Apply Immediately- AWS will take ~10 minutes to upgrade. Please make sure the RDS is done upgrading before proceeding.
- Now run the IaC for 6.5. The IaC should accept the database engine version 16 and create a new
aws_db_parameterswith the 16 family
- :octagonal_sign: The Terraform EKS module and a major change to how roles attach to the Cluster has been implemented.
- If you encounter an error in the Terragunt/Terraform with the object called
aws_eks_access_entrydue to the object already existing, you must: terragrunt import 'module.eks.aws_eks_access_entry.this["<Your access entry name In the HCL>"]' <cluster name>:arn:aws:iam::<aws account>:role/ec2/<Role id>
- If you encounter an error in the Terragunt/Terraform with the object called
- :octagonal_sign: This release updates the Terraform module for AWS EKS from major version 19 to 20, which enables support for EKS cluster access entries. We recommend migrating from the
aws-authConfigMap to cluster access entries, as this will become the preferred authentication mode for EKS clusters moving forward.-
For a role which was previously defined using the following parameter in the
env.hcl:aws_auth_roles = [
{
rolearn = "arn:aws:iam::012345678901:role/AWSReservedSSO_AdministratorAccess_0123456789abcdef",
username = "AWSReservedSSO_AdministratorAccess_0123456789abcdef",
groups = [
"system:masters",
]
},
]The following access entry is equivalent:
access_entries = {
admin = {
principal_arn = "arn:aws:iam::012345678901:role/aws-reserved/sso.amazonaws.com/us-east-2/AWSReservedSSO_AdministratorAccess_0123456789abcdef"
policy_associations = {
cluster_admin = {
policy_arn = "arn:aws:eks::aws:cluster-access-policy/AmazonEKSClusterAdminPolicy"
access_scope = {
type = "cluster"
}
}
}
}
} -
For existing clusters which are migrating to the
API_AND_CONFIG_MAPauthentication method, an existing access entry for the cluster creator will be exposed during the migration. was previously not visible when using aws-auth ConfigMap, but will become visible when access entry is enabled. If you are defining a cluster access entry for this IAM entity, it must be imported into Terraform using the following command:terragrunt import 'module.eks.aws_eks_access_entry.this["<access_entry_key"]' <eks_cluster_name>:<arn_of_iam_entity> -
By default, the created EKS clusters will enable authentication via both the newly-enabled cluster access entries, as well as the legacy
aws-authConfigMap.- If you are relying upon the
aws-authConfigMap in an existing cluster, note that due to major version 20 of the EKS module removing theaws-authfunctionality from the core of the module, theaws-authConfigMap is created using a separate submodule. This means the existing ConfigMap will be re-created during the Terraform apply process, and any users whose permissions are defined only in theaws-authConfigMap may temporarily lose access to the cluster until the ConfigMap is re-created. This should be a one-time process.
- If you are relying upon the
-
This version adds the following new variables to the
eks-clusterTerraform module:authentication_mode: Determines the enabled EKS authentication modes, defaults to (API_AND_CONFIG_MAP).access_entries: A map of the cluster access entries for the cluster, see the exampleenv.hclfor more information.enable_cluster_creator_admin_permissions: Automatically creates a cluster access entry for the identity running the Terraform module. (This should not be set totrueif an explicit access entry is being created for this identity).
-
- :octagonal_sign: Due to a Big Bang update for Kyverno 1.13.0 that deprecated how cluster policies are generated and the fact that cluster policies are immutable; the old cluster policies must be manually deleted to allow for the same policies to be recreated. If you have your own custom cluster policies that used
generate-XYZplease see Upstream Kyverno release notes to ensure that they follow the new standards. https://kyverno.io/blog/2024/10/30/announcing-kyverno-release-1.13/kubectl delete clusterpolicy generate-networkpolicy-imdskubectl delete clusterpolicy generate-private-git-server-secret
- β In
kyvernoupdate tov1.13they have removewildcard permissionswhich allowed Kyverno controllers to view all resources. We have added back in the wildcard permissions for the time being but all users should follow best practices and remove them - β The EKS terraform module update will cause a node rotation, this can take a long time depending on your availability settings and terraform might time out until the EKS node group is back into an active state
- β GitLab HR will succeed but there will be a job that fails called
gitlab-gitlab-upgrade-check, you can delete the job as it is just a warning
π¦ SmoothGlue Featuresβ
- iac: enable specifying EKS cluster log types to save to cloudwatch
- iac: update eks tf module, support eks cluster access entries
β© Upgraded Packagesβ
- Upgrades to console v6.3.0:
- New GitLab projects Crossplane XRD to support initializing GitLab repos from example projects
- This release of SmoothGlue Enterprise v6.5.0 includes Big Bang Version 2.42.0.
- Refer to Sonatype Nexus IQ Release 185 release notes at https://help.sonatype.com/en/iq-2024-release-notes.html#release-185--december-2024--286015 for more details on this Release.
- Confluence is being upgraded to 9.2.x, which is a Long Term Support (LTS) Release. https://confluence.atlassian.com/doc/confluence-9-2-release-notes-1456345480.html
π Bug Fixesβ
- This fix restores RKE2 functionality (NeuVector is not working), which has been broken since SmoothGlue release 6.2.0.
- The AWS EFS CSI driver add-on has been locked down to version v2.1.0 for EKS. The latest version v2.1.1 gives EFS mount failure issues with NeuVector, Jira and Confluence.
- zarf: add deny imds exclusion for aws-efs-csi-driver
β Known Issuesβ
- There is a chance that the Kiali pod will be stuck in a non functional state, rotate the pod and it should fix itself
crossplane-provider-keycloakmight be stuck in an unhealthy state, to remedy find theproviderrevision.pkg.crossplane.iofor thecrossplane-provider-keycloakand force delete it so it can be recreated. This is will be for bothrunandbuild.
π Compatibilityβ
- The packages for this release were built using Zarf v0.36.1.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.8+rke2r1 - K3s:
v1.30.5+k3s1 - EKS:
v1.29.6
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.29.8-rke2r1-rocky-8-base-v1.1.1-stig-2024-09-23T08-14-20Z - EKS AMI:
smoothglue-eks-1.29.6-rocky-8-base-v1.1.1-stig-2024-09-09T08-14-46Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
Other Changesβ
- console: deploy chart from OCI artifact (d3f1c74)**
6.4.0 (2024-12-13)β
π¨ Upgrade Noticesβ
- For SmoothGlue users using
EKSyou must go into AWS Console and manually pinaws-efs-csi-driver- Log into
AWSconsole -->EKS - Navigate to your cluster
- Got to the
add-onssection - Search for "Amazon EFS CSI Driver"
- Edit and select version
v2.1.0-eksbuild.1
- Log into
π¦ SmoothGlue Featuresβ
- Add ALB support as an optional module that users can leverage instead of the default load balancer.
- Allow setting S3 block_public access. A new IaC flag
block_public_accesshas been added to theenv.hclfiles in theinfra-iac/envs/directory of the AWS IaC repository. If set totrue(the default), this flag blocks all public access to S3 buckets created for the cluster.
β© Upgraded Packagesβ
- Nexus IQ upgrade to 184
- Refer to https://help.sonatype.com/en/iq-2024-release-notes.html#idp212975 for more details. If you enabled the Golden Versions feature in release 183 and then upgraded IQ server to 184, you will need to disable and re-enable the feature post-upgrade in order to access it. This is a one-time requirement and will not be required after your next upgrade.
- This release of SmoothGlue Enterprise v6.4.0 includes Big Bang Version 2.41.0. For more details on the features and updates included in Big Bang Version 2.41.0, please refer to the Big Bang Release Notes.
- Kiali - MR:
- By default, Kiali has access to all namespaces within a given cluster. However, if you have restricted access to only specific namespaces, please review this note prior to upgrading, as the methodology behind this has changed.
- External-secrets - MR:
- If you are deploying any deprecated v1alpha1 custom resources, your deployment may break with this patch. Please upgrade resources to non-deprecated versions.
- BBTOC- MR
- In an effort to provide more clarity on where each package stands within Big Bang, we have implemented the Package Maintenance Tracks as approved by the BBTOC. This should provide more information on how different packages are maintained and tested. In order to facilitate this, each package that is maintained & integrated by Big Bang (not community maintained packages) now has a badge added on the readme to identify what track each package is on.
- Kiali - MR:
π Bug Fixesβ
- Adjust asg_attachment module logic to support optional ALB.
- Add runtimePath for NeuVector Enforcer.
βοΈ Known Issuesβ
- NeuVector Helm Release fails on RKE2 clusters due to an AWS EFS CSI driver issue.
π Compatibilityβ
- The packages for this release were built using Zarf v0.32.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.9+rke2r1 - K3s:
v1.31.3+k3s1 - EKS:
v1.29.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
structsure-rke2-v1.29.9-rke2r1-rocky-8-base-v1.1.1-stig-2024-10-28T08-12-25Z - EKS AMI:
structsure-eks-1.29.8-rocky-8-base-v1.1.1-stig-2024-10-28T08-12-34Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.3.0 (2024-11-25)β
π¨ Upgrade Noticesβ
- PostgreSQL 13 is no longer a supported version for Confluence 9.1.x. For this Confluence version, youΒ mustΒ upgrade to at least RDS 14.x. Applying the IaC for this version will upgrade Confluence's database to 14.x. As such, if you are running Confluence, ensure you run the IaC before upgrading the package on the cluster.
- Prior to applying the IaC for the RDS upgrade, suspend the Confluence helm release and scale the Confluence statefulset to 0. The HR can be resumed after the 14.x RDS is available and healthy.
- Upon visiting the login screen, users may be prompted with a database thread warning. Click Accept to continue.
- SSO will be disabled on initial login due to a miniOrange upgrade dependency. Log in with admin credentials, and upgrade miniOrange to 2.3.2 in the Manage Apps section of the Admin panel.
π¦ SmoothGlue Featuresβ
- Kyverno Policies
-
A new policy named
generate-networkpolicy-imdshas been added to the default Kyverno policies. This Kyverno policy will generate a network policy in any non-Big Bang namespace. The network policy will block egress traffic to IMDS. This policy can be disabled by adding the following to the Big Bang values:kyvernoPolicies:
values:
additionalPolicies:
generate-networkpolicy-imds:
enabled: false
-
- Crossplane provider-gitlab
-
provider-gitlabhas been enabled by default. It allows Crossplane to automate functions in GitLab. This provider is used by Console to enable project creation, initialization, and manage project settings to enforce a common baseline. Currently,provider-gitlabrequires additional steps to enable automation within GitLab.provider-gitlabcan be disabled by adding the following to thezarf-deploy-configfile:package:
deploy:
components: '-crossplane-provider-gitlab'
-
β© Upgraded Packagesβ
- Jira upgrade to 9.12.15
- Fixes CVE CVE-2024-45801
- Issues Resolved
- Full Release Notes
- Confluence upgrade to 9.1.1
- End of support for PostgreSQL 13; provides an upgrade to PostgreSQL 14.x
- Java 21 bundled with Confluence
- Eclipse Temurin Java 21 is now included with Confluence installations and upgrades via the installer
- Dark theme support for custom logos and color schemes
- Fixes multiple CVEs
- Issues Resolved
- Full Release Notes
- This release of SmoothGlue Enterprise v6.3.0 includes Big Bang Version 2.40.0. For more details on the features and updates included in Big Bang Version 2.40.0, please refer to the Big Bang Release Notes.
-
- This release adds a default
EnvoyFilterto increase the security of the Istio cluster. This filter, which defaults toenabled, can be disabled using e.g.,istio.Values.defaultSecurityHeaders.enabled: false. The filter will add the following HTTP headers when the backend service does not already provide the header:- StrictTransportSecurity: maxage=31536000; includeSubDomains
- XFrameOptions: SAMEORIGIN
- XContentTypeOptions: nosniff
- ReferrerPolicy: strictorigin
- In the event these additional headers cause issues with any deployment, you can disable the filter.
- This release adds a default
-
Nexus
- Nexus realms configuration has been moved and is no longer nested under
sso. Therealmkey has been renamed torealms, e.g.:
addons:
nexusRepositoryManager:
values:
realms:
- "DockerToken" - Nexus realms configuration has been moved and is no longer nested under
-
π Compatibilityβ
- The packages for this release were built using Zarf v0.32.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.8+rke2r1 - K3s:
v1.30.6+k3s1 - EKS:
v1.29.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.29.8-rke2r1-rocky-8-base-v1.1.1-stig-2024-09-23T08-14-20Z - EKS AMI:
structsure-eks-1.29.8-rocky-8-base-v1.1.1-stig-2024-10-28T08-12-34Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.2.0 (2024-11-12)β
π¦ SmoothGlue Featuresβ
- The SSO buttons default to read
SmoothGlue SSO, when possible.
β© Upgraded Packagesβ
- Upgrades to
consolev6.2.x (also v6.1.x) include the following:- Fixed bug in SG Run Basic where tools are missing from tools page
- Fixed bug where deployments are not presented if they have not synced in Argo
- Console teams now have a slug attribute
- Bug fix: removing a user from an org now removes the user from the org's teams
- Removed non-functional rename organization action
- Bug fix: dashboard view does not crash if there is an error retrieving tool info
- Removed ability to set user's organization attributes from team page
- Increased click target for organization and project cards
- This release of SmoothGlue Enterprise v6.2.0 includes Big Bang Version 2.39.0. For more details on the features and updates included in Big Bang Version 2.39.0, please refer to the Big Bang Release Notes.
nexus-iqchart upgraded to 183Jirahas been upgraded to 9.12.14:- Update gluon patch from 0.5.4 to 0.5.8
- Update cypress (source) 13.15.0 -> 13.15.1
π Bug Fixesβ
Vaultcan now be configured to use the correct DNS suffix for the ISO regions.
π Compatibilityβ
- The packages for this release were built using Zarf v0.32.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.8+rke2r1 - K3s:
v1.30.5+k3s1 - EKS:
v1.29.6
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
smoothglue-rke2-v1.29.8-rke2r1-rocky-8-base-v1.1.1-stig-2024-09-23T08-14-20Z - EKS AMI:
smoothglue-eks-1.29.6-rocky-8-base-v1.1.1-stig-2024-09-09T08-14-46Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.1.0 (2024-10-30)β
The following are the v6.1.0 release notes for convenience:
π¨ Upgrade Noticesβ
This is a major update to SonarQube. During upgrade, you may get a SonarQube is under maintenance error message on the SonarQube UI.
- To resolve this, once the HelmRelease upgrades, you will be prompted to visit your SonarQube instance at a
<sonarqube_url>/setupURL. This is intended to launch a Database migration/update for SonarQube internally. The app will be available once it completes.
β© Upgraded Packagesβ
- Console has been upgraded from v5.58 to v6.0.x and now offers the following capabilities:
- Enhanced deployment wizard for deploying apps via Kustomize manifest (platform admins only).
- Adds support for multiple ingress routes when using deployment wizard.
- Adds ENABLE_SELF_SERVE_DEPLOYMENTS feature flag.
- Fixes failure to load projects page if an expected deployment has no metadata in Argo CD.
- Includes SonarQube, when it's deployed, on tools pages.
- Removes non-functional rename project action.
- Restores ability for platform admins to send credentials reset to users.
- Big Bang has been upgraded from 2.37.0 to 2.38.0. For more details on the features and updates included in Big Bang Version 2.38.0, please refer to the Big Bang release notes.
πͺ² Bug Fixesβ
- Fixes an issue with load balancer stickiness.
- When
compatibility_modeis set, the object that is returned contains false. Additionally, started deprecation for IaC variable name for EKS; the old variable will remain for the time being so please only set one:- var.sso_nlb_stickiness_enabled => var.sso_nlb_stickiness_settings
- var.application_nlb_stickiness_enabled => var.application_nlb_stickiness_settings
- When
- Updates to the RKE2 Terraform to handle multiple VPC CIDRs.
π Compatibilityβ
- The packages for this release were built using Zarf v0.32.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.8+rke2r1 - K3s:
v1.30.5+k3s1 - EKS:
v1.29.6
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
structsure-rke2-v1.29.8-rke2r1-rocky-8-base-v1.1.1-stig-2024-09-23T08-14-20Z - EKS AMI:
structsure-eks-1.29.6-rocky-8-base-v1.1.1-stig-2024-09-30T08-10-58Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.0.1 (2024-10-22)β
Patch notesβ
- Patches GitLab to 17.2.9 to address critical CVE: https://about.gitlab.com/releases/2024/10/09/patch-release-gitlab-17-4-2-released/
- Fixed a bug that prevented upgrading from prior versions of the SmoothGlue package
The following are the v6.0.0 release notes for convenience:
π¨ Upgrade Noticesβ
- With the 6.0.0 release, Structsure Enterprise is now SmoothGlue Enterprise!
- Structsure Enterprise Developer Collaboration Environment is now known as SmoothGlue Build Enterprise.
- Structsure Enterprise Deploy Target is now known as SmoothGlue Run Enterprise.
- On new installations making use of automatic Keycloak configuration, the default realm will now be named
smoothglueinstead ofstructsure. Keycloak should use redirect to this realm automatically, but any URL references to thestructsurerealm should be updated to point to thesmoothgluerealm on new installs.-
For existing Structsure Enterprise installations making use of the automatic Keycloak realm configuration feature, you should add the following configuration to your
bigbang-values.yamlin order to continue using your existing Keycloak realm:addons:
keycloak:
values:
realms:
- realmName: structsure
-
π¦ SmoothGlue Enterprise Featuresβ
- The following applications have updated SmoothGlue branding/theming:
- SmoothGlue Console
- Keycloak
- ArgoCD
- External Secrets Operator: Now officially bundled and supported as a SmoothGlue Enterprise component.
- External Secrets Operator (ESO) is not installed by default on either Build or Run installations and must be enabled explicitly.
-
ESO can be enabled by setting
EXTERNAL_SECRETS_ENABLEDtotruein your Zarf config, or by adding the following settings to yourbigbang-values.yaml:addons:
externalSecrets:
enabled: true
-
- If you have previously manually installed External Secrets Operator, you may need to manually update Helm annotations to allow existing resources to be adopted.
- External Secrets Operator (ESO) is not installed by default on either Build or Run installations and must be enabled explicitly.
- IaC: The SmoothGlue Enterprise IaC now includes an optional Terragrunt module to create a public or private Route 53 zone associated with the cluster. Please see the documentation for more information on how to enable and configure this module.
- IaC: SmoothGlue Enterprise now has provides an optional Terragrunt module to create an RDS database for Nexus IQ. Please see the documentation for more information on how to enable and configure this module.
β© Upgraded Packagesβ
- Upgraded console to v5.57.x
- This release includes Big Bang Version 2.37.0. For more details on the features and updates included in Big Bang Version 2.37.0, please refer to the Big Bang release notes.
- Upgraded cert-manager to v1.15.3
π Bug Fixesβ
- When migrating an existing Structsure Enterprise install to SmoothGlue Enterprise v6.0.0, a new Zarf Helm chart is deployed within the
defaultnamespace with an updated Crossplane Configuration forstructsure-enterprise. The Helm chart fails to automatically patch the Configuration resource properly, even though it adopts the existing resource as expected. To work around this, a Zarf command will override the Configuration using akubectl patchthis release. This will not affect future releases. - Fixed an issue preventing user-provided TLS certificates using
ZARF_VAR_CERTandZARF_VAR_KEYfrom being consumed during the Zarf package deploy. If a user-provided certificate is provided, it will take precedence; otherwise, the full order of precedence is as follows, from highest to lowest:- certs/keys provided using
ZARF_VAR_CERTorZARF_VAR_KEY, - values provided to Istio using
bigbang-secrets.yaml, - existing Istio secrets on the cluster, and finally
- an automatically generated TLS certificate.
- certs/keys provided using
- IaC: In VPCs with multiple CIDR ranges, the default security group rules for EKS clusters will now allow access from all CIDR ranges associated with the VPC, rather than just the primary CIDR block.
β Known Issuesβ
- Although many visible references to Structsure Enterprise have been updated to SmoothGlue Enterprise, some resources will continue to use the older Structsure naming, largely for compatibility reasons. If any of the below listed resources still refer to Structsure, this is expected. These resources may be migrated to use the updated SmoothGlue branding in future releases.
- When creating the
smoothglueKeycloak realm, the default Keycloak configuration will continue to create groups for_structsureAdminsand_structsureAuditfor use with Console. - Kubernetes objects which were previously deployed to the
structsure-systemnamespace will continue to be deployed there, such as-overridesConfigMaps and Secrets, as well as Crossplane and Flux resources.
- When creating the
π Compatibilityβ
- The packages for this release were built using Zarf v0.32.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.9-rke2r1 - K3S:
v1.30.5+k3s1 - EKS:
v1.29.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
structsure-rke2-v1.29.9-rke2r1-rocky-8-base-v1.1.1-stig-2024-10-14T08-10-40Z - EKS AMI:
structsure-eks-1.29.8-rocky-8-base-v1.1.1-stig-2024-10-14T08-10-55Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue Enterprise documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.
6.0.0 (2024-10-16)β
π¨ Upgrade Noticesβ
- With the 6.0.0 release, Structsure Enterprise is now SmoothGlue Enterprise!
- Structsure Enterprise Developer Collaboration Environment is now known as SmoothGlue Build Enterprise.
- Structsure Enterprise Deploy Target is now known as SmoothGlue Run Enterprise.
- On new installations making use of automatic Keycloak configuration, the default realm will now be named
smoothglueinstead ofstructsure. Keycloak should use redirect to this realm automatically, but any URL references to thestructsurerealm should be updated to point to thesmoothgluerealm on new installs.-
For existing Structsure Enterprise installations making use of the automatic Keycloak realm configuration feature, you should add the following configuration to your
bigbang-values.yamlin order to continue using your existing Keycloak realm:addons:
keycloak:
values:
realms:
- realmName: structsure
-
π¦ SmoothGlue Enterprise Featuresβ
- The following applications have updated SmoothGlue branding/theming:
- SmoothGlue Console
- Keycloak
- ArgoCD
- External Secrets Operator: Now officially bundled and supported as a SmoothGlue Enterprise component.
- External Secrets Operator (ESO) is not installed by default on either Build or Run installations and must be enabled explicitly.
-
ESO can be enabled by setting
EXTERNAL_SECRETS_ENABLEDtotruein your Zarf config, or by adding the following settings to yourbigbang-values.yaml:addons:
externalSecrets:
enabled: true
-
- If you have previously manually installed External Secrets Operator, you may need to manually update Helm annotations to allow existing resources to be adopted.
- External Secrets Operator (ESO) is not installed by default on either Build or Run installations and must be enabled explicitly.
- IaC: The SmoothGlue Enterprise IaC now includes an optional Terragrunt module to create a public or private Route 53 zone associated with the cluster. Please see the documentation for more information on how to enable and configure this module.
- IaC: SmoothGlue Enterprise now has provides an optional Terragrunt module to create an RDS database for Nexus IQ. Please see the documentation for more information on how to enable and configure this module.
β© Upgraded Packagesβ
- Upgraded console to v5.57.x
- This release includes Big Bang Version 2.37.0. For more details on the features and updates included in Big Bang Version 2.37.0, please refer to the Big Bang release notes.
- Upgraded cert-manager to v1.15.3
π Bug Fixesβ
- When migrating an existing Structsure Enterprise install to SmoothGlue Enterprise v6.0.0, a new Zarf Helm chart is deployed within the
defaultnamespace with an updated Crossplane Configuration forstructsure-enterprise. The Helm chart fails to automatically patch the Configuration resource properly, even though it adopts the existing resource as expected. To work around this, a Zarf command will override the Configuration using akubectl patchthis release. This will not affect future releases. - Fixed an issue preventing user-provided TLS certificates using
ZARF_VAR_CERTandZARF_VAR_KEYfrom being consumed during the Zarf package deploy. If a user-provided certificate is provided, it will take precedence; otherwise, the full order of precedence is as follows, from highest to lowest:- certs/keys provided using
ZARF_VAR_CERTorZARF_VAR_KEY, - values provided to Istio using
bigbang-secrets.yaml, - existing Istio secrets on the cluster, and finally
- an automatically generated TLS certificate.
- certs/keys provided using
- IaC: In VPCs with multiple CIDR ranges, the default security group rules for EKS clusters will now allow access from all CIDR ranges associated with the VPC, rather than just the primary CIDR block.
β Known Issuesβ
- Although many visible references to Structsure Enterprise have been updated to SmoothGlue Enterprise, some resources will continue to use the older Structsure naming, largely for compatibility reasons. If any of the below listed resources still refer to Structsure, this is expected. These resources may be migrated to use the updated SmoothGlue branding in future releases.
- When creating the
smoothglueKeycloak realm, the default Keycloak configuration will continue to create groups for_structsureAdminsand_structsureAuditfor use with Console. - Kubernetes objects which were previously deployed to the
structsure-systemnamespace will continue to be deployed there, such as-overridesConfigMaps and Secrets, as well as Crossplane and Flux resources.
- When creating the
π Compatibilityβ
- The packages for this release were built using Zarf v0.32.6.
- The packages were tested across the following Kubernetes distributions:
- RKE2:
v1.29.9-rke2r1 - K3S:
v1.30.5+k3s1 - EKS:
v1.29.8
- RKE2:
- The following AMI versions were used for testing:
- RKE2 AMI:
structsure-rke2-v1.29.9-rke2r1-rocky-8-base-v1.1.1-stig-2024-10-14T08-10-40Z - EKS AMI:
structsure-eks-1.29.8-rocky-8-base-v1.1.1-stig-2024-10-14T08-10-55Z - Base AMI:
Rocky-8-EC2-LVM-8.10-20240528.0.x86_64
- RKE2 AMI:
π Helpful Linksβ
- Refer to the SmoothGlue Enterprise documentation for additional guidance.
- For details on the Big Bang release, see the Big Bang Release Notes.