Release notes

6 MINUTE READ

The following table shows component versioning for Calico v3.17.

To select a different version, click Releases in the top navigation bar.

v3.17.1

Release archive with Kubernetes manifests, Docker images and binaries.

10 Dec 2020

Bug fixes

  • In BPF mode, fix handling of node ports that redirect to host networked pods in AWS. felix #2631 (@fasaxc)
  • Mark aws-src-dst-check report ready when successful. This fix addresses the issue with calico-node not being ready in EKS setup using Calico CNI. felix #2604 (@fasaxc)
  • All components that use Typha now use the same logic to discover Typha’s address. They lookup the endpoints of the service directly and connect to one at random. This avoids a dependency on kube-proxy. typha #466 (@fasaxc)
  • kube-controllers runs a non-root by default kube-controllers #566 (@caseydavenport)
Component Version
calico/typha v3.17.1
calico/ctl v3.17.1
calico/node v3.17.1
calico/cni v3.17.1
calico/kube-controllers v3.17.1
calico/flannel-migration-controller v3.17.1
networking-calico v3.17.1
quay.io/coreos/flannel v0.12.0
calico/dikastes v3.17.1
calico/pod2daemon-flexvol v3.17.1

v3.17.0

Release archive with Kubernetes manifests, Docker images and binaries.

23 Nov 2020

MTU auto-detection

Calico v3.17.0 supports automatic detection of host MTU and automatic configuration of pod network MTU based on your environment! Calico will now automatically determine the optimal MTU for new pods based on the underlying network MTU and enabled encapsulation methods, providing optimal network performance without the need for any manual configuration.

PRs:

  • Automatic MTU detection felix #2511 (@caseydavenport)
  • CNI plugin respects the /var/lib/calico/mtu file for picking pod MTU cni-plugin #962 (@caseydavenport)
  • Add field to configure interfaces for MTU detection libcalico-go #1331 (@caseydavenport)

Windows BGP networking

Calico now supports BGP networking when running on Windows nodes. The initial release of Calico for Windows included VXLAN networking only.

PRs:

  • Add BGP networking support for Calico for Windows. node #588 (@song-jiang)

Additional platform support for Windows nodes

During the Calico v3.17 release cycle, the Calico team brought Calico for Windows support to both OpenShift and Rancher clusters. We’ll be continuing to certify additional platforms in upcoming releases with new testing and documentation.

Bug fixes

  • Fix DNS resolution in calico-node containers. node #583 (@NeonSludge)
  • Fix that Typha was unable to deduplicate Calico v3 Node resources. This caused excessive CPU usage in Felix. typha #454 (@fasaxc)
  • Felix now detects the error from iptables-save when it is run on a system with incompatible nft rules. This prevents Felix from flooding the iptables NAT table with rules. felix #2564 (@fasaxc)
  • Fix Wireguard resync processing to properly track deltas felix #2535 (@robbrockbank)
  • Fix etcd backend watch errors libcalico-go #1337 (@robbrockbank)
  • Fix that, in eBPF mode, when using a non-Calico CNI (such as the AWS VPC CNI), the non-Calico CNI’s SNAT rules could be skipped. This fixes access from pods to non-cluster resources in EKS, for example. felix #2531 (@tomastigera)
  • Fix invalid parsing of some IPv6 addresses libcalico-go #1275 (@weizhouBlue)
  • Fix a bug that made the UPDATE_CNI_BINARIES environment variable not behave as expected. cni-plugin #981 (@mgleung)
  • Fix a bug that prevented failed attempts at unlocking the datastore during IPAM migration from retrying. cni-plugin #968 (@mgleung)
  • Fix a bug that caused IPAM assignment to throw a nil pointer exception in cases where tunnel address IP assignment failed. cni-plugin #967 (@mgleung)
  • Fix that installing CNI plugin would fail if binaries were in use cni-plugin #966 (@caseydavenport)
  • Fix population of etcd certificates in CNI config cni-plugin #948 (@caseydavenport)
  • Fix Felix crash and set the health status to false when EC2 source-destination-check fails. felix #2507 (@realgaurav)
  • Fix that broadcast routes weren’t filtered out of felix’s list of local IPs. In BPF mode, this caused dataplane route flaps. felix #2495 (@fasaxc)
  • Fix releasing of improperly formatted handles as a result of host-local IPAM migration bug. libcalico-go #1346 (@caseydavenport)
  • Fix that “deleted” was a required field libcalico-go #1318 (@caseydavenport)
  • Fix that deleting a node didn’t release its wireguard tunnel address libcalico-go #1310 (@caseydavenport)
  • Fix to allow IPv6 floating IPs in a dual stack deployment. cni-plugin #922 (@fionera)
  • Fix issue where Wireguard tunnel IPs on deleted nodes were not garbage collected kube-controllers #512 (@caseydavenport)
  • Fix flannel migration for clusters with multiple control-plane nodes. kube-controllers #496 (@caseydavenport)

Other changes

Notable behavior changes:

  • Default to Kubernetes datastore. This means calicoctl will default to using DATASTORE_TYPE=kubernetes libcalico-go #1279 (@frozenprocess)

Windows:

  • restore metadata route for GCE if missing node #646 (@lmm)
  • Enable automatic setting of etcd TLS config for Calico for Windows. node #570 (@lippertmarkus)

eBPF:

  • In eBPF mode, fix that long-lived connections to nodeports could be incorrectly cleaned up resulting in dropped connections, this particularly impacted AWS load balancers. felix #2590 (@fasaxc)
  • In eBPF mode, choose the backend randomly for service VIPs with service affinity enabled. This ensures a more random distribution and good rebalancing (as expected by the k8s conformance tests). felix #2538 (@tomastigera)
  • In eBPF mode, disable bypass for connections that have moved from one interface to another, allowing the RPF check to be reset. felix #2523 (@tomastigera)
  • In eBPF mode, Calico now includes all Kubernetes Node IPs in its IP ownership calculations. This means that NodePorts are honoured on all IPs. felix #2508 (@tomastigera)
  • In eBPF mode, use mark bits to refine use of accept_local. felix #2491 (@tomastigera)
  • In eBPF mode, Felix now checks that the mark bits used by the BPF programs are assigned to Felix. Previously, it would use them without checking, possibly creating conflicts. felix #2489 (@fasaxc)

Application-layer policy:

  • Update ALP manifests to support Istio versions 1.7 and 1.6 calico #4169 (@realgaurav)
  • Updated ALP documentation to support recent Istio versions (v1.7 and v1.6). calico #4141 (@realgaurav)

General:

  • Added monitor-addresses option to calico-node to continually monitor IP addresses. node #549 (@realgaurav)
  • Expand the regexes used to detect host interfaces to cover less common and development interfaces. felix #2555 (@fasaxc)
  • bpf/proxy: add info logging when Syncer iteration start/ends felix #2497 (@tomastigera)
  • Add knobs to explicitly disable adding drop rules for encapsulated packets originating from workloads. felix #2484 (@doublek)
  • Change iptables backend default from legacy to auto. felix #2464 (@tmjd)
  • Enable releasing block affinities even if pool has been deleted. libcalico-go #1300 (@caseydavenport)
  • Release affinities for all empty blocks on deleted nodes, even if some still have allocations. libcalico-go #1299 (@caseydavenport)
  • Support global configuration for max blocks per node libcalico-go #1297 (@caseydavenport)
  • Add FelixConfiguration parameters to explicitly allow encapsulated packets from workloads. libcalico-go #1296 (@doublek)
  • Change Unicode apostrophe in API comments to ASCII apostrophe libcalico-go #1289 (@neiljerram)
  • Calico can now program ECMP routes into its local kernel, if its BGP daemon (BIRD) learns about a prefix via equally good paths from multiple peers. confd #379 (@misi)
  • apply keepOriginalNextHop to global peerings as well confd #358 (@neiljerram)
  • Prevent routing loops to unused service IPs, when service IP advertisement is enabled. calico #4104 (@neiljerram)
  • It’s now possible to specify a password on a BGPPeer resource, and the password will be used to authenticate the peer on BGP sessions generated by that resource. calico #4033 (@neiljerram)
Component Version
calico/typha v3.17.0
calico/ctl v3.17.0
calico/node v3.17.0
calico/cni v3.17.0
calico/kube-controllers v3.17.0
calico/flannel-migration-controller v3.17.0
networking-calico v3.17.0
quay.io/coreos/flannel v0.12.0
calico/dikastes v3.17.0
calico/pod2daemon-flexvol v3.17.0