Stay organized with collections
Save and categorize content based on your preferences.
March 08, 2024 [GDC 1.9.11]
Google Distributed Cloud air-gapped 1.9.11 is now released.
See the product overview to learn about the features of Google Distributed Cloud air-gapped.
Updated Canonical Ubuntu OS image version to v20240212 to apply the latest
security patches and important updates. To take advantage of the bug and security vulnerability fixes, you must upgrade all nodes with each release. The following security vulnerabilities are fixed:
The issue with the anthos-prometheus-k8s LogMon resource regularly filling up its persistent volume, causing Prometheus to crash loop, is fixed by reducing default metrics retention time to 24 hours.
Upgrade:
The issue with the upgrade getting stuck at AdminClusterHealth postflight check is fixed.
VM backup and restore:
Role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.
Version update:
The Debian-based image version is updated to bullseye-v1.4.3-gke.11.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.11 has been released, offering new features detailed in the product overview.\u003c/p\u003e\n"],["\u003cp\u003eThe Canonical Ubuntu OS image has been updated to version v20240212, incorporating the latest security patches and updates, and it is mandatory to upgrade all nodes in order to make use of these fixes.\u003c/p\u003e\n"],["\u003cp\u003eMultiple security vulnerabilities, including various CVEs, have been addressed in both the updated OS image and container images.\u003c/p\u003e\n"],["\u003cp\u003eSeveral issues have been resolved, such as the \u003ccode\u003eanthos-prometheus-k8s\u003c/code\u003e LogMon resource issue, upgrade hang at the \u003ccode\u003eAdminClusterHealth\u003c/code\u003e check, and problems with VM backup and restore RBAC and schema settings.\u003c/p\u003e\n"],["\u003cp\u003eThe Debian-based image has been updated to bullseye-v1.4.3-gke.11.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped release notes\n\n\u003cbr /\u003e\n\nMarch 08, 2024 \\[GDC 1.9.11\\]\n-----------------------------\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.11 is now released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nUpdated Canonical Ubuntu OS image version to v20240212 to apply the latest\nsecurity patches and important updates. To take advantage of the bug and security vulnerability fixes, you must [upgrade all nodes](/distributed-cloud/hosted/docs/latest/gdch/infrastructure/io-upgrade/instructions#nodes-os-upgrades) with each release. The following security vulnerabilities are fixed:\n\n- [CVE-2020-26570](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26570)\n- [CVE-2020-26571](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26571)\n- [CVE-2020-26572](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-26572)\n- [CVE-2020-28493](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28493)\n- [CVE-2023-2953](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-2953)\n- [CVE-2023-6004](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6004)\n- [CVE-2023-6040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6040)\n- [CVE-2023-6918](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6918)\n- [CVE-2023-6931](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6931)\n- [CVE-2023-6932](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-6932)\n- [CVE-2023-43040](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-43040)\n- [CVE-2023-45863](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45863)\n- [CVE-2023-51764](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51764)\n- [CVE-2024-0553](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-0553)\n- [CVE-2024-22195](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22195)\n- [CVE-2024-22365](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22365)\n\n*** ** * ** ***\n\n\nThe following container image security vulnerabilities are fixed:\n\n- [CVE-2023-46219](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46219)\n\n*** ** * ** ***\n\n**Monitoring**:\n\n- The issue with the `anthos-prometheus-k8s` LogMon resource regularly filling up its persistent volume, causing Prometheus to crash loop, is fixed by reducing default metrics retention time to 24 hours.\n\n**Upgrade**:\n\n- The issue with the upgrade getting stuck at `AdminClusterHealth` postflight check is fixed.\n\n*** ** * ** ***\n\n**VM backup and restore**:\n\n- Role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.\n\n*** ** * ** ***\n\n**Version update**:\n\n- The Debian-based image version is updated to bullseye-v1.4.3-gke.11.\n\n| **Important:** To access the URLs listed on this page, you must connect to the internet. The URLs are provided to access outside of your air-gapped environment."]]