Skip to content

Commit 5373256

Browse files
authored
Merge pull request #227 from telepresenceio/docs/v2.21.1
Release notes for 2.21.1 and an addition to the troubleshooting guide.
2 parents 3eee5f9 + a18b756 commit 5373256

File tree

3 files changed

+43
-1
lines changed

3 files changed

+43
-1
lines changed

versioned_docs/version-2.21/release-notes.md

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,19 @@
11

22
[comment]: # (Code generated by relnotesgen. DO NOT EDIT.)
33
# <img src="images/logo.png" height="64px"/> Telepresence Release Notes
4+
## Version 2.21.1 <span style="font-size: 16px;">(December 17)</span>
5+
## <div style="display:flex;"><img src="images/bugfix.png" alt="bugfix" style="width:30px;height:fit-content;"/><div style="display:flex;margin-left:7px;">[Allow ingest of serverless deployments without specifying an inject-container-ports annotation](https://github.com/telepresenceio/telepresence/issues/3741)</div></div>
6+
<div style="margin-left: 15px">
7+
8+
The ability to intercept a workload without a service is built around the `telepresence.getambassador.io/inject-container-ports` annotation, and it was also required in order to ingest such a workload. This was counterintuitive and the requirement was removed. An ingest doesn't use a port.
9+
</div>
10+
11+
## <div style="display:flex;"><img src="images/bugfix.png" alt="bugfix" style="width:30px;height:fit-content;"/><div style="display:flex;margin-left:7px;">Upgrade module dependencies to get rid of critical vulnerability.</div></div>
12+
<div style="margin-left: 15px">
13+
14+
Upgrade module dependencies to latest available stable. This includes upgrading golang.org/x/crypto, which had critical issues, from 0.30.0 to 0.31.0 where those issues are resolved.
15+
</div>
16+
417
## Version 2.21.0 <span style="font-size: 16px;">(December 13)</span>
518
## <div style="display:flex;"><img src="images/feature.png" alt="feature" style="width:30px;height:fit-content;"/><div style="display:flex;margin-left:7px;">[Automatic VPN conflict avoidance](reference/vpn)</div></div>
619
<div style="margin-left: 15px">

versioned_docs/version-2.21/release-notes.mdx

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7,6 +7,15 @@ import { Note, Title, Body } from '@site/src/components/ReleaseNotes'
77
[comment]: # (Code generated by relnotesgen. DO NOT EDIT.)
88

99
# Telepresence Release Notes
10+
## Version 2.21.1 <span style={{fontSize:'16px'}}>(December 17)</span>
11+
<Note>
12+
<Title type="bugfix" docs="https://github.com/telepresenceio/telepresence/issues/3741">Allow ingest of serverless deployments without specifying an inject-container-ports annotation</Title>
13+
<Body>The ability to intercept a workload without a service is built around the `telepresence.getambassador.io/inject-container-ports` annotation, and it was also required in order to ingest such a workload. This was counterintuitive and the requirement was removed. An ingest doesn't use a port.</Body>
14+
</Note>
15+
<Note>
16+
<Title type="bugfix">Upgrade module dependencies to get rid of critical vulnerability.</Title>
17+
<Body>Upgrade module dependencies to latest available stable. This includes upgrading golang.org/x/crypto, which had critical issues, from 0.30.0 to 0.31.0 where those issues are resolved.</Body>
18+
</Note>
1019
## Version 2.21.0 <span style={{fontSize:'16px'}}>(December 13)</span>
1120
<Note>
1221
<Title type="feature" docs="reference/vpn">Automatic VPN conflict avoidance</Title>

versioned_docs/version-2.21/troubleshooting.md

Lines changed: 21 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -43,7 +43,27 @@ After you've installed `sshfs`, if mounts still aren't working:
4343
2. Add your user to the "fuse" group with: `sudo usermod -a -G fuse <your username>`
4444
3. Restart your computer after uncommenting `user_allow_other`
4545

46-
### No Sidecar Injected in GKE private clusters
46+
## DNS is broken on macOS
47+
48+
Commands like `dig` cannot find cluster resources even though Telepresence is connected to the cluster, but it works
49+
with `curl`.
50+
51+
This is because `dig`, and some other utilities on macOS have their own built-in DNS client which bypasses the macOS
52+
native DNS system and use the libc resolver directly. Here's an excerpt from the `dig` command's man-page:
53+
> Mac OS X NOTICE
54+
>
55+
> The nslookup command does not use the host name and address resolution or the DNS query routing
56+
> mechanisms used by other processes running on Mac OS X. The results of name or address queries
57+
> printed by nslookup may differ from those found by other processes that use the Mac OS X native
58+
> name and address resolution mechanisms. The results of DNS queries may also differ from queries
59+
> that use the Mac OS X DNS routing library.
60+
61+
A command that should always work is:
62+
```console
63+
$ dscacheutil -q host -a name <name to resolve>
64+
```
65+
66+
## No Sidecar Injected in GKE private clusters
4767

4868
An attempt to `telepresence intercept` results in a timeout, and upon examination of the pods (`kubectl get pods`) it's discovered that the intercept command did not inject a sidecar into the workload's pods:
4969

0 commit comments

Comments
 (0)