Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
Loading...
This page details the release notes of Lenses.
Lenses 6.0 introduces a new service, called HQ, acting as portal for multi-kafka environments.
New HQ service
IAM (Identity & Access Management). This has moved from each Lenses instant to a global location in the new HQ service
Global SQL Studio
Global Data Catalogue
Community License: You can now use Lenses without a license (community license key is bundled in the docker-compose) or expiry but the following restrictions apply:
No SSO
Maximum of two environments (Kafka clusters) can be connected
Two Users with one an admin user
Two Service Accounts
Two Groups
Two Roles
No Backup / Restore for topics to S3
H2 embedded database is no longer support.
Lenses 5.x permission model is replaced by global IAM. You must recreate the roles and groups in HQ
Connection management in the agent is via file Provisioning only.
Service account annotations were wrongly referenced and were not taking into account upon creation of a new service account
In case authenSignReq was enabled and secrets were not placed it would create environment variable with null values - now it skips creation of environment variables
Breaking change
External secret supports now:
Changeable External Secret Store type: SecretStore | ClusterSecretStore hq:
additionalSpecs
Service account annotations were wrongly referenced and were not taking into account upon creation of a new service account
You can freely map a Group to any SSO group including any characters in the name.
Before, a Group was mapped to SSO via its resource-name
. That was limiting you to SSO groups with only characters and -
dashes.
Now 2 things happen:
By default, the SSO name is the Group name (not the resource-name). This is most of the time what you'd expect.
For the special cases when your SSO name is something specific or cryptic (e.g. a UUID) you can override the mapping by setting the SSO mapping name
to anything you want.
Before, you could set configuration rules for your topics for each of your environments. E.g. enforce topic naming conventions (only dashes) or a maximum number of partitions.
Now, you can control who can access and set these rules with IAM permissions.
The resource type is governance:rule
.
Here's an example for read/write access to this rules for environment eu-stg-env
:
Find more information in the IAM section.
See what's happening under the hood of your SQL queries. Learn about your query's performance:
Which partitions were read and how much of them.
How many records were scanned, skipped and offered as results.
Timing and size.
Configuration details that you can tweak.
The Global SQL Studio will now show you any bad records it cannot understand. These records may be of incorrect formats (e.g. String in an AVRO topic) or have invalid schemas.
IAM permissions editor: improved IntelliSense
For a more IDE-like experience. Get tab completion specific to each segment that you're working on.
Global SQL Studio: improved performance.
SSO: fixed offboarding SSO users. When a user has no SSO groups that map to Lenses, Lenses ensures that the user also has no Lenses groups. This is useful when offboarding users to ensure that they won't have Lenses access.
Global SQL Studio: fixed syntax highlighting.
We have made new alpha release 19:
Agent image:
HQ image:
HQ CLI image
New Helm version 19 for agent and for the HQ: https://lenses.jfrog.io/ui/native/helm-charts-preview/
We have made new alpha release 18:
Agent image:
HQ image:
HQ CLI image
New Helm version 18 for agent and for the HQ: https://lenses.jfrog.io/ui/native/helm-charts-preview/
Agent Metrics are available in overview screen
Introduction of Lenses Resource name in the HQ screens
Added Role description
"Roles" panel improved by getting right side panel, detailed view
Dark mode coloring improved
Authentication error flashing
Introduction of Lenses Resource name key resources like: topic, consumers, schemas
Added "Admin Overview" in the Agent menu
Fixed bad records view
Permissions IntelliSense
New admin permissions to control who can access Lenses Logs
SQL Studio redesigned view
scanned partitions progress
additional statistics
split tab left and right for SQL queries to compare data.
Policy changes are now effective as soon as they are saved, re-login is not necessary anymore
In the past only ClusterSecretStore when handling external secret was support. With a new version you can choose to pick either ClusterSecretStore or a SecretStore when creating external secret.
New property has been added to external secret template called additionalSpecs where you can add or change any of the specs that would normally be added in ExternalSecret resource.
Example:
lensesHq.http.tls
property was referencing wrong properties within defined values.yaml
LRN UX for HQ IAM.
See & copy the LRN of an IAM resource (User, Group, Service Account, Role).
LRN is also an available column in all IAM listing pages. You can enable it in the column selector of the table.
Environments + metrics columns.
Tables UX update: powerful grid
Multi sort
Reorder of columns + column selection
Filters
Preferences are saved for the user
CLI
Provide shell completion for agent --env flag
IAM - Updated permissions syntax.
Renaming. Some services and resources have been renamed. This is to simplify and make the IAM model more consistent. You can find the latest spec here. You may need to adjust your policy YAML definitions. Reach out to us if you need help.
Prefix/infix wildcard support. You can now use *
in a prefix or infix position for resource-id path segments. Use this to express things like "environments that end in -dev" (*-dev
) or "topics whose name starts with fraud and ends with analytics" (fraud*analytics
).
Improved Global SQL studio UX
Topic navigator IDE experience.
See latest topic messages by default, ordered by time, with latest messages 1st.
Dark mode for sign-in page
User Profile page now correctly save changes.
Expose Agent dashboard metrics via API.
Improved Agent-level navigation bar.
We have made new alpha release 17:
Agent image:
HQ image:
HQ CLI image
New Helm version 17 for agent and for the HQ:
When working on software projects, there often arises a need to create additional environment variables for various purposes. One common scenario for this is when users need to securely handle sensitive information, such as passwords or API keys. By storing a user password in a secret, the system ensures that such sensitive information is not exposed to unauthorized access, and this practice offers enhanced security.
Property restPort
has been removed and replaced by lensesHq.http.address
In the provisioning, there has been slight adjustment in the parent agent configuration parameter.
Changes:
lenses has been renamed to lensesAgent
As provisioning with the latest version (2) is mandatory for successful running of the agent, both configs are removed.
In the the past it was possible to use H2 database which would be instantly deployed and ready to use alongside the agent.
Due to certain performance limitations which come with H2 database which can impact the agent functionality, we decided to completely remove H2 support.
However, persistence parameter still remains and can be used to enable extra volume creation dedicated specifically just logs.
We have made new alpha release 16:
Agent image:
HQ image:
New Helm version 16 for agent and for the HQ: https://lenses.jfrog.io/ui/native/helm-charts-preview/
In previous versions, SAML / SSO was a mandatory requirement for authentication. However, with the new release, it becomes optional, allowing you to choose between password-based authentication and SAML / SSO according to your needs.
Existing alpha users will have to introduce lensesHq.saml.enabled
property into their values.yaml
files
In this release, the ingress configuration has been enhanced to provide more flexibility.
Previously, the HQ chart supported a single ingress setting, but now you can define separate ingress configurations for HTTP and the agent.
This addition allows you to tailor ingress rules more specifically to your deployment needs, with dedicated rules for handling HTTP traffic and TCP-based agent connections.
The http
ingress is intended only for HTTP/S traffic, while the agents
ingress is designed specifically for TCP protocol. Ensure appropriate ingress configuration for your use case.
In the following example you will notice how ingress configuration has been broken into:
http - which covers main ingress for HQ and where users will be accessing HQ portal
agent - new and additional ingress which allows you to add new ingress with your custom implementation, whether it is Traefik or any other based.
By default both http and agent ingresses are disabled.
Due to new changes in provisioning structure, the database to which agent is connected must be recreated.
In the provisioning, there has been slight adjustment in connection naming with HQ.
Changes:
grpcServer has been renamed to lensesHq
apiKey has been renamed to agentKey
With the new version of Agent, HQ connection in provisioning has changed which requires complete recreation of database. Following log message will indicate it:
In the past, HQ has been using TOML file format. As we want to reduce differences in file formats between Agent and HQ as much as possible, this was the first step.
Postgres connection URI is not being built within config.yaml but in backend runtime;
parameter group has changed from postgres to storage.postgres.*
In the previous version, schema was defined as a part of extraParamSpecs. In the new version schema is now defined as a separate property storage.postgres.database.schema;
Property extraParamSpecs is renamed to params;
Parameter group api has been renamed to http and following parameters are not part of it anymore:
administrators;
saml;
Property auth is being derived from property api (now. http).
Parameters that has been moved from http to auth are following:
administrators;
saml;
HQ has been tested against Aurora (Postgres) and is compatible.
In case of any changes in ConfigMap and after executing helm upgrade HQ pod will be automatically restarted as well therefore no need for manual interventions.
Previously environment variable known as LENSES_HQ_AGENT_KEY that was referenced in provisioning.yaml and stores the agentKey value has been renamed to LENSESHQ_AGENT_KEY.
Since newest version of Lenses HQ and Agent bring breaking changes following issues can happen.
Upon doing helm upgrade HQ can fail with following error log:
In order to fix it, following command has to be run on the postgres database:
In case SQL command cannot be run, database has to be cleared as if one is starting from scratch.