在 Google Distributed Cloud 经过网闸隔离的私有正式版中,入侵检测和防御系统 Syslog 会分发给每个组织。
Google Distributed Cloud air-gapped 1.9.1 GA 在防火墙上添加了 Border Gateway Protocol 的安全规则(使用环回链路 CIDR),并在防火墙上添加了 Internet Control Message Protocol 的安全规则(使用实例外部 CIDR)。
将 Google Distributed Cloud 版本更新为 1.14.2-gke.11,以应用最新的安全补丁和重要更新。
[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-02。"],[[["\u003cp\u003eGoogle Distributed Cloud air-gapped 1.9.1 is now generally available, offering a range of services including AI/ML, compute, databases, marketplace, networking, security, and storage.\u003c/p\u003e\n"],["\u003cp\u003eThe new release introduces predefined cluster roles for disaster recovery, enhancing the management capabilities for Infrastructure Operators and Platform Administrators.\u003c/p\u003e\n"],["\u003cp\u003eVersion 1.9.1 of Google Distributed Cloud includes a tool for generating templates for interconnect-related access control lists and improvements for Node and Operating System component failures.\u003c/p\u003e\n"],["\u003cp\u003eMultiple security vulnerabilities in both the Ubuntu OS image and container images have been addressed in this release, as well as updating the google distributed cloud version to 1.14.2.\u003c/p\u003e\n"],["\u003cp\u003eSeveral known issues have been identified in versions 1.9.0 and 1.9.1, including problems with VM backup and restore processes, \u003ccode\u003estandard-block\u003c/code\u003e storage class, node reprovisioning, node OS upgrades, add-on installations, GPU-to-VM coupling, and memory overrides.\u003c/p\u003e\n"]]],[],null,["# Google Distributed Cloud air-gapped 1.9.1 release notes\n\n\u003cbr /\u003e\n\nMarch 21, 2023 \\[GDC 1.9.1 General Availability\\]\n-------------------------------------------------\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 General Availability (GA) is now released.\n\nSee the [product overview](/distributed-cloud/hosted/docs/latest/gdch/overview) to learn about the features of Google Distributed Cloud air-gapped.\n\nThe following table lists services available in Google Distributed Cloud air-gapped.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA introduces new predefined cluster roles for disaster recovery:\n\n- `dr-admin` created on a root admin cluster for an Infrastructure Operator (IO).\n\n- `gdch-dr-admin` created in the namespace `gdch-dr` for an IO for bucket creation.\n\n- `dr-restore-admin` created on an org admin cluster for an IO.\n\n- `dr-backup-admin` created on an org admin cluster for a Platform Administrator (PA).\n\n- `dr-system-admin` created in the namespace `dr-system` for a PA for bucket creation.\n\nFor details, see:\n\n- [Predefined identity and access roles tables for PA and AO](/distributed-cloud/hosted/docs/latest/gdch/platform/pa-user/iam/role-descriptions)\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA introduces a tool for generating templates for interconnect-related access control lists.\n\n*** ** * ** ***\n\n\nIn Google Distributed Cloud air-gapped 1.9.1 GA, the Node and Operating System component uses an auto restart on configuration feature of the VM to resolve the issue of potential failure to use a new VM disk for a VM after stopping and restarting KVM during cluster upgrade.\n\n*** ** * ** ***\n\n\nIn Monitoring operable component, `IMSPodImageReconciller` did not loop all projects in Artifact Registry and couldn't find images in the library project causing the `ims_unauthorized_image` alert to fire all the time.\n\n*** ** * ** ***\n\n\nIn Google Distributed Cloud air-gapped Private General Availability, Intrusion Detection and Prevention Systems Syslog fans-out to each organization.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA adds security rules for Border Gateway Protocol on firewalls using hairpin links CIDR and for Internet Control Message Protocol on firewalls using instance external CIDR.\n\n*** ** * ** ***\n\n\nUpdated Google Distributed Cloud version to 1.14.2-gke.11 to apply the latest security patches and important updates.\n\nSee [Google Distributed Cloud 1.14.2 release notes](https://cloud.google.com/anthos/clusters/docs/bare-metal/latest/release-notes#March_01_2023) for details.\n\n*** ** * ** ***\n\n\nUpdated Canonical Ubuntu OS image version to 20230227 to apply the latest security patches and important updates.\n\nThe following security vulnerabilities are fixed:\n\n- [CVE-2022-2601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601)\n- [CVE-2022-3775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3775)\n- [CVE-2022-2601](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2601)\n- [CVE-2022-3775](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3775)\n\n*** ** * ** ***\n\n\nThe following container image security vulnerabilities are fixed:\n\n- [CVE-2023-0286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0286)\n- [CVE-2023-0215](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0215)\n- [CVE-2022-4450](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4450)\n- [CVE-2022-2097](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2097)\n- [CVE-2022-32221](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-32221)\n- [CVE-2022-41903](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-41903)\n- [CVE-2022-23521](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-23521)\n- [CVE-2022-39260](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39260)\n- [CVE-2022-29187](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29187)\n- [CVE-2022-24765](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24765)\n- [CVE-2022-39253](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-39253)\n- [CVE-2021-46848](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-46848)\n- [CVE-2022-42898](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-42898)\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 has a known issue where role-based access control (RBAC) and schema settings in the VM manager is stopping users from starting VM backup and restore processes.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.0 has a known issue where\n\nremote server management software\n\nis occasionally unable to retrieve the key from HSM.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA has a known issue where using the `standard-block` storage class might prevent virtual machines (VMs) from starting or restarting.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA has a known issue where a compute node becomes stuck after reprovisioning a machine.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA has a known issue during the Node OS upgrade where a the server is stuck in deprovisioning because `boot.ipxe` URL is invalid.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA has a known issue during the Node OS upgrade where a node fails the `machine-init` job.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA has a known issue where the upgrade from 1.9.0 to 1.9.1 is blocked because the `ods-fleet` add-on failed to install.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.0 has a known issue in the UI that lets you select an incompatible coupling of GPU to VM type.\n\n*** ** * ** ***\n\nGoogle Distributed Cloud air-gapped 1.9.0 has a known issue where VMs with memory greater than 32 GB require a memory override due to an incorrect QEMU overhead calculation.\n\n*** ** * ** ***\n\n\nGoogle Distributed Cloud air-gapped 1.9.1 GA has a known issue where alerts in organization system clusters don't reach the ticketing system."]]