-
Notifications
You must be signed in to change notification settings - Fork 142
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Rel Notes 2.44.0-1 #3604
Rel Notes 2.44.0-1 #3604
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
```sh | ||
cd /srv | ||
tar -cvf srv.tar . | ||
# Transfer to new server |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I suggest to make Transfer to new server
a step on its own. It can go without commands.
|
||
After upgrading, verify that your system is functioning correctly: | ||
|
||
1. Check service status to confirm both PMM Client and PMM Server are running. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we should either provide commands here or point to the UI. Is it supervisorctl status
or something else?
4. Deploy data on the new installation: | ||
```sh | ||
supervisorctl stop all | ||
cd /srv |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
let's remove all data in /srv directory before pasting backup.
A critical vulnerability has been identified in OVA installations of PMM 2.38 and above, as described in [CVE-xxxx-xxxx](https://cve.mitre.org/cgi-bin/cvename.cgi?name=xxxx-xxxx). If you are running any of these OVA installations, we strongly recommend upgrading immediately to this release. | ||
|
||
The vulnerability was caused by default service account credentials used in OVA provisioning, which had weak password security and enabled SSH login access. | ||
These issues could allow unauthorized SSH access and potential privilege escalation to `root` via `sudo` capabilities. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
and leak credentials of all services added to PMM. So we recommend to rotate passwords on these services as well
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
PMM-0
Link to the Feature Build: SUBMODULES-0
If this PR adds or removes or alters one or more API endpoints, please review and add or update the relevant API documents as well:
If this PR is related to some other PRs in this or other repositories, please provide links to those PRs: