1 .. This work is licensed under a Creative Commons Attribution 4.0 International
3 .. http://creativecommons.org/licenses/by/4.0
4 .. Copyright 2017 Bell Canada & Amdocs Intellectual Property. All rights
6 .. _release_notes_dublin:
10 ONAP Operations Manager Release Notes
11 =====================================
13 Version 4.0.0 (Dublin Release)
14 ------------------------------
16 :Release Date: 2019-06-26
18 **Previous Release Notes**
20 - :ref:`Casablanca <release_notes_casablanca>`
21 - :ref:`Beijing <release_notes_beijing>`
22 - :ref:`Amsterdam <release_notes_amsterdam>`
28 **Platform Resiliency**
30 * Documenation of a Highly-Available Kubernetes Cluster Deployment
31 * Availability of a Default Storage Class Provisioner for improved Persistent
33 * Availability of a CNI reference integration for Multi-site support
35 * applications can take advantage of multi-site by using POD and/or Node
36 (anti)affinity, taints/tolerations, labels per application
38 **Footprint Optimization**
40 * Shared MariaDB-Galera Cluster - current clients in Dublin: SO, SDNC
41 * Shared Cassandra Cluster - current clients in Dublin: AAI, SDC
42 * Optional deployment of independent clusters (backward compatibility)
44 **Platform Upgradability**
46 * Introduction of an Upgrade Framework supporting:
48 * Automated rolling upgrades for applications
49 * In-place schema and data migrations
50 * Blue-Green deployment environment migration (e.g. Pre-prod to Prod)
51 * Upgrades from embedded database instance into shared database instance
53 * Release-to-release upgrade support delivered for the following projects
61 *Fixed Security Issues*
63 *Known Security Issues*
65 * In default deployment OOM (consul-server-ui) exposes HTTP port 30270 outside of cluster. [`OJSI-134 <https://jira.onap.org/browse/OJSI-134>`_]
66 * Hard coded password used for all oom deployments [`OJSI-188 <https://jira.onap.org/browse/OJSI-188>`_]
67 * CVE-2019-12127 - OOM exposes unprotected API/UI on port 30270 [`OJSI-202 <https://jira.onap.org/browse/OJSI-202>`_]
69 *Known Vulnerabilities in Used Modules*
71 OOM code has been formally scanned during build time using NexusIQ and no
72 Critical vulnerability was found.
76 - `OOM project page <https://wiki.onap.org/display/DW/ONAP+Operations+Manager+Project>`_
78 - `Passing Badge information for OOM <https://bestpractices.coreinfrastructure.org/en/projects/1631>`_