Releases: cloudfoundry/loggregator-release
Loggregator 72
Important Notice - New Certificates Required for gRPC Transport
In order to secure the transport of log messages going forward Loggregator will require Metron cert & key as well as the Loggregator CA cert. You won't be able to deploy the this and future versions of Loggregator if you don't have these configured. See our README with specifics for generating and setting up your certs.
Important Notice - Cipher Suite Restrictions
This version of Loggregator restricts ciphers to use only the following 4 ciphers. This is a breaking change for some operators and a configurable property for opting into more cipher suites was introduced in Loggregator 85
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
Important Notice - ETCD Removal
This release removes etcd from metron. You no longer need to include etcd in your release if you are colocating metron.
New Features
- Improved service discovery for Dopplers by removing etcd from metron
- Encrypted log transport Metron->Doppler (via gRPC)
- Pooled connections from Metron->Doppler (via gRPC)
- Changed retry strategy for connecting to with etcd in doppler
Loggregator 70
Note: This version of Loggregator restricts ciphers to use only the following 4 ciphers. This is a breaking change for some operators and a configurable property for opting into more cipher suites was introduced in Loggregator 85
TLS_DHE_RSA_WITH_AES_128_GCM_SHA256
TLS_DHE_RSA_WITH_AES_256_GCM_SHA384
TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
- Updated to golang 1.7.4
- Updated ciphers suites to more secure ciphers.