Confluent for Kubernetes Release Notes¶
Confluent for Kubernetes (CFK) provides a declarative API-driven control plane to deploy and manage Confluent Platform on Kubernetes.
The following sections summarize the technical details of the CFK 2.4 releases.
Confluent for Kubernetes 2.4.4 Release Notes¶
Confluent for Kubernetes (CFK) 2.4.4 allows you to deploy and manage Confluent Platform versions 6.2.x, 7.1.x, and 7.2.x on Kubernetes.
Notable fixes¶
- Fixed security and vulnerability issues.
Confluent for Kubernetes 2.4.3 Release Notes¶
Confluent for Kubernetes (CFK) 2.4.3 allows you to deploy and manage Confluent Platform versions 6.2.x, 7.1.x, and 7.2.x on Kubernetes.
Notable fixes¶
- Fixed the issue with the Kafka CR where the
status.phase
is sometimes stuck inPROVISIONING
even after all replicas have successfully rolled and have come up cleanly. - Fixed security and vulnerability issues.
Confluent for Kubernetes 2.4.2 Release Notes¶
Confluent for Kubernetes (CFK) 2.4.2 allows you to deploy and manage Confluent Platform versions 6.2.x, 7.1.x, and 7.2.x on Kubernetes.
Notable fixes¶
- Fixed where ClusterLink mirror topics were prematurely reported as being stuck in the PENDING_STOPPED state. Now those topics can transition into a terminal state.
- Kafka Pod Delete Webhook now also works with the Node Eviction actions on top of Pod Delete actions.
- Fixed security and vulnerability issues.
Notable enhancements and updates¶
- CFK provides Linux ARM64 architecture Docker images for use in non-production environments. ARM64 is for preview-support only.
Confluent for Kubernetes 2.4.1 Release Notes¶
Confluent for Kubernetes (CFK) 2.4.1 allows you to deploy and manage Confluent Platform versions 7.1.x and 7.2.x on Kubernetes.
Notable fixes¶
- Removed expiring license check when the license is within 7 days of expiring.
- Allow passwords containing equal signs.
- Support Connect and ksqlDB to authentication Control Center using basic authentication.
- Fixed security and vulnerability issues.
Confluent for Kubernetes 2.4.0 Release Notes¶
Confluent for Kubernetes (CFK) 2.4.0 allows you to deploy and manage Confluent Platform versions 7.1.x and 7.2.x on Kubernetes.
New features¶
- Auto-rotation of auto-generated certificates at a configurable period of days
To provide a fully encrypted streaming platform, CFK automates provisioning, securing, and operating certificates for internal networking communications.
Now CFK automates the rotation of auto-generated certificates at a period that you specify at the Helm level.
- Protection against unintended Kafka pod deletion through admission controller
Support for Kubernetes Admission Controller is now in GA.
You can configure CFK to reject object deletion requests, specifically for clusters and Kafka pods.
- Source-initiated cluster links
To bolster Confluent cluster linking that CFK declaratively supports, now you can create and use source-initiated cluster links. It enables Confluent Platform deployed on private infrastructure to create a link and initiate a connection to Confluent Cloud to replicate topic data.
You use this type of cluster links when it is not possible to open up your private infra firewall to let Confluent Cloud connect directly to your Confluent Platform brokers to use the default type of cluster linking.
Notable enhancements and updates¶
Starting in the 2.4.0 release, CFK does not provide the MigrationJob CRD.
See Migrate to Confluent for Kubernetes for the steps to migrate from Operator 1.x to this version of CFK.
Additional configuration options are supported for Cluster Linking:
- You can specify replication factors for mirror topics.
- Mirror topic status now displays replication factor and source topic name which could be different.
- You can add different names for mirror topics in the destination.
When using custom authorizers, you can configure the client-side security for REST Admin authentication in the Kafka CR.
See Configure Confluent Role Based Access Control (RBAC) with Confluent for Kubernetes.
You can deploy CFK and Confluent Platform on Kubernetes 1.24.
Notable fixes¶
- Fixed an edge case where deletion of application custom resources failed with the namespace list and watch error.
- Fixed an issue where incomplete scaling down of all clusters deployed on non-OpenShift environments was incomplete.
- Fixed an issue where provision workflow of Schema Registry and Confluent Control Center cluster were incomplete because certain reconcile errors were not retried.
- Fixed Kafka custom resource to reflect the correct status after a force reconciliation.
- Fixed an issue where non-namespaced CFK deployment missed the watch permission on namespaces.
Known issues in CFK 2.4¶
When deploying Confluent for Kubernetes to Red Hat OpenShift with Red Hat’s Operator Lifecycle Manager (that is, using the Operator Hub), you must use OpenShift version 4.9 or 4.10. You cannot use OpenShift 4.6 - 4.8.
This OpenShift version restriction does not apply when deploying CFK to Red Hat OpenShift in the standard way without using the Red Hat Operator Lifecycle Manager.
If the ksqlDB REST endpoint is using the auto-generated certificates, the ksqlDB deployment that points to Confluent Cloud requires to trust the Let’s Encrypt CA.
For this to work, you must provide a CA bundle through
cacerts.pem
that contains both (1) the Confluent Cloud CA and (2) the self-signed CA to the ksqlDB CR.When TLS is enabled, and when Confluent Control Center uses a different TLS certificate to communicate with MDS or Confluent Cloud Schema Registry, Control Center cannot use an auto-generated TLS certificate to connect to MDS or Confluent Cloud Schema Registry. See Troubleshooting Guide for a workaround.
When deploying the Schema Registry and Kafka CRs simultaneously, Schema Registry could fail because it cannot create topics with a replication factor of 3. It is because the Kafka brokers have not fully started.
The workaround is to delete the Schema Registry deployment and re-deploy once Kafka is fully up.
When deploying an RBAC-enabled Kafka cluster in centralized mode, where another “secondary” Kafka is being used to store RBAC metadata, an error, “License Topic could not be created”, may return on the secondary Kafka cluster.
A periodic Kubernetes TCP probe on ZooKeeper causes frequent warning messages “client has closed socket” when warning logs are enabled.
When you deploy Confluent Platform 7.1.0 with centralized RBAC, you might see an “Invalid License” issue when connecting to the secondary Kafka cluster.
The workaround is to restart the secondary Kafka cluster.
REST Proxy configured with monitoring interceptors is missing the callback handler properties when RBAC is enabled. Interceptor would not work, and you would see an error message in the KafkaRestProxy log.
As a workaround, manually add configuration overrides as shown in the following KafkaRestProxy CR:
configOverrides: server: - confluent.monitoring.interceptor.sasl.login.callback.handler.class=io.confluent.kafka.clients.plugins.auth.token.TokenUserLoginCallbackHandler - consumer.confluent.monitoring.interceptor.sasl.login.callback.handler.class=io.confluent.kafka.clients.plugins.auth.token.TokenUserLoginCallbackHandler - producer.confluent.monitoring.interceptor.sasl.login.callback.handler.class=io.confluent.kafka.clients.plugins.auth.token.TokenUserLoginCallbackHandler
When configuring source initiated cluster links with CFK where the source cluster has TLS enabled, do not set
spec.tls
, and do not setspec.authentication
if the source cluster has mTLS authentication.Instead, in the ClusterLink CR, under the
spec.configs
section, setlocal.security.protocol: SSL
for mTLS.Set
local.security.protocol: SASL_SSL
for SASL authentication with TLS.
Known gaps from Confluent Platform 7.2¶
CFK 2.4 does not support the following Confluent Platform 7.2 functionality:
- Kafka authentication mechanisms: Kerberos and SASL/Scram