Releases: vexxhost/atmosphere
v5.1.0
New Features
- The Open vSwitch container image now uses a more centralized location at
ghcr.io/vexxhost/docker-openvswitch. This provides better
maintainability and a dedicated repository for the Open vSwitch container
images. The image now uses a specific version tag (v3.3.6-2) for
better reproducibility and stability.
Bug Fixes
-
Fixed the node-exporter Prometheus monitoring configuration by setting the
nodeExporterSelectorto filter metrics byjob="node-exporter"label.
This ensures that node-exporter dashboards and alerts correctly
reference the appropriate metrics. -
Fix
OctaviaAmphoraNotOperationalmonitoring rule to excludeDELETEDAmphora status. -
Fixed an issue preventing automatic certificate renewal for Octavia load balancers.
The fix ensures proper TLS certificate mounting for job board communication between
Octavia components and Valkey, enabling certificates to renew correctly.
Other Notes
- The libvirt exporter image switch to use
ghcr.io/inovex/prometheus-libvirt-exporter,
offering greater stability and performance on libvirt metrics collection.
v4.7.0
New Features
- The Open vSwitch container image now uses a more centralized location at
ghcr.io/vexxhost/docker-openvswitch. This provides better
maintainability and a dedicated repository for the Open vSwitch container
images. The image now uses a specific version tag (v3.3.6-2) for
better reproducibility and stability.
Bug Fixes
-
Fixed the node-exporter Prometheus monitoring configuration by setting the
nodeExporterSelectorto filter metrics byjob="node-exporter"label.
This ensures that node-exporter dashboards and alerts correctly
reference the appropriate metrics. -
Fix
OctaviaAmphoraNotOperationalmonitoring rule to excludeDELETEDAmphora status. -
Fixed an issue preventing automatic certificate renewal for Octavia load balancers.
The fix ensures proper TLS certificate mounting for job board communication between
Octavia components and Valkey, enabling certificates to renew correctly.
Other Notes
- The libvirt exporter image switch to use
ghcr.io/inovex/prometheus-libvirt-exporter,
offering greater stability and performance on libvirt metrics collection.
v3.5.0
New Features
- The Open vSwitch container image now uses a more centralized location at
ghcr.io/vexxhost/docker-openvswitch. This provides better
maintainability and a dedicated repository for the Open vSwitch container
images. The image now uses a specific version tag (v3.3.6-2) for
better reproducibility and stability.
Bug Fixes
-
Fixed the node-exporter Prometheus monitoring configuration by setting the
nodeExporterSelectorto filter metrics byjob="node-exporter"label.
This ensures that node-exporter dashboards and alerts correctly
reference the appropriate metrics. -
Fix
OctaviaAmphoraNotOperationalmonitoring rule to excludeDELETEDAmphora status. -
Fixed an issue preventing automatic certificate renewal for Octavia load balancers.
The fix ensures proper TLS certificate mounting for job board communication between
Octavia components and Valkey, enabling certificates to renew correctly.
Other Notes
- The libvirt exporter image switch to use
ghcr.io/inovex/prometheus-libvirt-exporter,
offering greater stability and performance on libvirt metrics collection.
v2.5.0
New Features
- The Open vSwitch container image now uses a more centralized location at
ghcr.io/vexxhost/docker-openvswitch. This provides better
maintainability and a dedicated repository for the Open vSwitch container
images. The image now uses a specific version tag (v3.3.6-2) for
better reproducibility and stability.
Bug Fixes
-
Fixed the node-exporter Prometheus monitoring configuration by setting the
nodeExporterSelectorto filter metrics byjob="node-exporter"label.
This ensures that node-exporter dashboards and alerts correctly
reference the appropriate metrics. -
Fix
OctaviaAmphoraNotOperationalmonitoring rule to excludeDELETEDAmphora status.
Other Notes
- The libvirt exporter image switch to use
ghcr.io/inovex/prometheus-libvirt-exporter,
offering greater stability and performance on libvirt metrics collection.
v1.14.0
New Features
- The Open vSwitch container image now uses a more centralized location at
ghcr.io/vexxhost/docker-openvswitch. This provides better
maintainability and a dedicated repository for the Open vSwitch container
images. The image now uses a specific version tag (v3.3.6-2) for
better reproducibility and stability.
Bug Fixes
-
Fixed the node-exporter Prometheus monitoring configuration by setting the
nodeExporterSelectorto filter metrics byjob="node-exporter"label.
This ensures that node-exporter dashboards and alerts correctly
reference the appropriate metrics. -
Fix
OctaviaAmphoraNotOperationalmonitoring rule to excludeDELETEDAmphora status.
Other Notes
- The libvirt exporter image switch to use
ghcr.io/inovex/prometheus-libvirt-exporter,
offering greater stability and performance on libvirt metrics collection.
v6.0.0-beta.9
New Features
- The Atmosphere project now includes the Tap-as-a-Service (TaaS) extension for the openstack
Neutron networking service. This feature introduces local and remote port mirroring
capabilities, enabling tenants and cloud administrators to monitor and debug complex virtual
networks by capturing and analyzing network traffic associated with virtual machines.
Bug Fixes
-
Fixed containers failing to validate TLS certificates on Red Hat-based systems. The issue occurred when mounting the OpenSSL trusted certificate bundle (
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt) which uses the "TRUSTED CERTIFICATE" format that's incompatible with Go applications. The configuration now uses the standard PEM format bundle (/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem) on Red Hat systems, which resolves certificate validation errors. -
Add required OVN VPN configuration files to Neutron server so VPN
features behave as expected. The Neutron server receives RPC calls from the
Neutron OVN VPN agent and executes VPN operations. Therefore, VPN
configurations must be present on the Neutron server.
v6.0.0
New Features
- The Atmosphere project now includes the Tap-as-a-Service (TaaS) extension for the openstack
Neutron networking service. This feature introduces local and remote port mirroring
capabilities, enabling tenants and cloud administrators to monitor and debug complex virtual
networks by capturing and analyzing network traffic associated with virtual machines.
Bug Fixes
-
Fixed containers failing to validate TLS certificates on Red Hat-based systems. The issue occurred when mounting the OpenSSL trusted certificate bundle (
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt) which uses the "TRUSTED CERTIFICATE" format that's incompatible with Go applications. The configuration now uses the standard PEM format bundle (/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem) on Red Hat systems, which resolves certificate validation errors. -
Add required OVN VPN configuration files to Neutron server so VPN
features behave as expected. The Neutron server receives RPC calls from the
Neutron OVN VPN agent and executes VPN operations. Therefore, VPN
configurations must be present on the Neutron server.
v5.0.5
Bug Fixes
-
Fixed containers failing to validate TLS certificates on Red Hat-based systems. The issue occurred when mounting the OpenSSL trusted certificate bundle (
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt) which uses the "TRUSTED CERTIFICATE" format that's incompatible with Go applications. The configuration now uses the standard PEM format bundle (/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem) on Red Hat systems, which resolves certificate validation errors. -
Add required OVN VPN configuration files to Neutron server so VPN
features behave as expected. The Neutron server receives RPC calls from the
Neutron OVN VPN agent and executes VPN operations. Therefore, VPN
configurations must be present on the Neutron server.
v4.6.9
Bug Fixes
-
Fixed containers failing to validate TLS certificates on Red Hat-based systems. The issue occurred when mounting the OpenSSL trusted certificate bundle (
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt) which uses the "TRUSTED CERTIFICATE" format that's incompatible with Go applications. The configuration now uses the standard PEM format bundle (/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem) on Red Hat systems, which resolves certificate validation errors. -
Add required OVN VPN configuration files to Neutron server so VPN
features behave as expected. The Neutron server receives RPC calls from the
Neutron OVN VPN agent and executes VPN operations. Therefore, VPN
configurations must be present on the Neutron server.
v3.4.7
Bug Fixes
- Fixed containers failing to validate TLS certificates on Red Hat-based systems. The issue occurred when mounting the OpenSSL trusted certificate bundle (
/etc/pki/ca-trust/extracted/openssl/ca-bundle.trust.crt) which uses the "TRUSTED CERTIFICATE" format that's incompatible with Go applications. The configuration now uses the standard PEM format bundle (/etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem) on Red Hat systems, which resolves certificate validation errors.