Skip to content

Commit 08dc92c

Browse files
ctauchentmjd
andauthored
Publish Calico Cloud 21.1.0 (#1975)
Co-authored-by: Erik Stidham <[email protected]>
1 parent 1217f95 commit 08dc92c

File tree

83 files changed

+1065
-263
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

83 files changed

+1065
-263
lines changed

__tests__/crawler.test.js

+1
Original file line numberDiff line numberDiff line change
@@ -182,6 +182,7 @@ test('Crawl the docs and execute tests', async () => {
182182
'https://www.f5.com/glossary/cross-site-scripting', //TEMPORARY
183183
'https://www.f5.com/glossary/sql-injection', //TEMPORARY
184184
'https://www.f5.com/labs/articles/threat-intelligence/application-protection-report-2019--episode-2--2018-breach-trend', //TEMPORARY
185+
'https://installer.calicocloud.io/manifests/cc-operator/latest/deploy-with-container-security.yaml', //TEMPORARY
185186
];
186187

187188
const lc = linkChecker();

calico-cloud/about/index.mdx

-11
Original file line numberDiff line numberDiff line change
@@ -10,16 +10,6 @@ $[prodname] is a security solution for cloud-native applications running on cont
1010

1111
![calico-cloud](/img/calico/calico-cloud.svg)
1212

13-
Beyond the **Kubernetes security** features that you get from Calico Enterprise and Calico Open Source, $[prodname] adds these **container security** solutions:
14-
15-
- **Image Assurance**
16-
17-
Automated image scanning and blocking so you can monitor and assess workloads for new and existing CVEs 24/7.
18-
19-
- **Container threat defense**
20-
21-
Fully automated protection against known and unknown attacks (network or container-based).
22-
2313
## Best fit
2414

2515
The best fit for $[prodname] is small teams who need to manage the full spectrum of compliance in a web-based console. To jumpstart learning for teams, $[prodname] provides:
@@ -35,5 +25,4 @@ The best fit for $[prodname] is small teams who need to manage the full spectrum
3525
- To connect your cluster to $[prodname] in 15 minutes, [start a free trial](https://auth.calicocloud.io/u/signup/identifier?state=hKFo2SB3ekhybXN1TGdxTkZTUWIwQV9BSzNlaHBEUk0wMENJdKFur3VuaXZlcnNhbC1sb2dpbqN0aWTZIEE5b2NkREs1eWZKR0twc0ZWZmh2LWZCZEZxb2ZRNkJOo2NpZNkgc3NJQkNFdEdkZFpLNlVubDNOYWl2ZzhrY2RmcWd6dFE)
3626
- [Calico Cloud pricing](https://www.tigera.io/tigera-products/calico-cloud-pricing/)
3727
- [Connect a cluster to $[prodname] documentation](../get-started/connect-cluster.mdx)
38-
- [Image assurance documentation](../image-assurance)
3928
- [Container threat defense documentation](../threat/container-threat-detection.mdx)

calico-cloud/about/product-comparison.mdx

-6
Original file line numberDiff line numberDiff line change
@@ -71,10 +71,6 @@ What is the best fit for you? It depends on your needs. The following table prov
7171
| iptables | <center><CheckIcon /></center> | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
7272
| Windows HNS | <center><CheckIcon /></center> | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
7373
| VPP | <center><CheckIcon /></center> | | |
74-
| **Image Assurance** | | | |
75-
| Scan images for vulnerabilities for workloads in Kubernetes cluster | | <center><CheckIcon /></center> | |
76-
| Create policy to block vulnerable images from your clusters | | <center><CheckIcon /></center> | |
77-
| Runtime view to assess impact of newly-found vulnerabilities | | <center><CheckIcon /></center> | |
7874
| **Observability and troubleshooting** | | | |
7975
| Application level observability and troubleshooting | | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
8076
| Service Graph | | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
@@ -87,8 +83,6 @@ What is the best fit for you? It depends on your needs. The following table prov
8783
| Multi-cluster management | | | <center><CheckIcon /></center> |
8884
| Federated identity and services | | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
8985
| **Threat defense** | | | |
90-
| Anomaly detection | | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
91-
| Container threat detection | | <center><CheckIcon /></center> | |
9286
| Workload-centric Web Application Firewall (WAF) | | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
9387
| Add threatfeeds to trace suspicious network flows | | <center><CheckIcon /></center> | <center><CheckIcon /></center> |
9488
| **Reports** | | | |

calico-cloud/compliance/compliance-reports-cis.mdx

+5-3
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,12 @@ description: Configure reports to assess compliance for all assets in a Kubernet
44

55
# Configure CIS benchmark reports
66

7-
:::info deprecation notice
7+
:::warning[deprecation and removal notice]
88

9-
The compliance features described on this page are deprecated and will be removed in a future release.
10-
We're building a new compliance reporting system that will eventually replace the current one.
9+
This feature was deprecated in Calico Cloud version 21.1.0 and will be removed in a future release. Availability depends on when you started using Calico Cloud.
10+
11+
- For users who started using Calico Cloud in April 2025 or later, this feature is not available.
12+
- Legacy users, who started using Calico Cloud before April 2025, can continue to use this feature until it is removed in a future release.
1113

1214
:::
1315

calico-cloud/compliance/enable-compliance.mdx

+5-3
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,12 @@ description: Enable compliance reports to configure reports to assess compliance
44

55
# Enable compliance reports
66

7-
:::info deprecation notice
7+
:::warning[deprecation and removal notice]
88

9-
The compliance features described on this page are deprecated and will be removed in a future release.
10-
We're building a new compliance reporting system that will eventually replace the current one.
9+
This feature was deprecated in Calico Cloud version 21.1.0 and will be removed in a future release. Availability depends on when you started using Calico Cloud.
10+
11+
- For users who started using Calico Cloud in April 2025 or later, this feature is not available.
12+
- Legacy users, who started using Calico Cloud before April 2025, can continue to use this feature until it is removed in a future release.
1113

1214
:::
1315

calico-cloud/compliance/overview.mdx

+5-3
Original file line numberDiff line numberDiff line change
@@ -4,10 +4,12 @@ description: Get the reports for regulatory compliance on Kubernetes workloads a
44

55
# Schedule and run compliance reports
66

7-
:::info deprecation notice
7+
:::warning[deprecation and removal notice]
88

9-
The compliance features described on this page are deprecated and will be removed in a future release.
10-
We're building a new compliance reporting system that will eventually replace the current one.
9+
This feature was deprecated in Calico Cloud version 21.1.0 and will be removed in a future release. Availability depends on when you started using Calico Cloud.
10+
11+
- For users who started using Calico Cloud in April 2025 or later, this feature is not available.
12+
- Legacy users, who started using Calico Cloud before April 2025, can continue to use this feature until it is removed in a future release.
1113

1214
:::
1315

calico-cloud/get-started/install-automated.mdx

+24-5
Original file line numberDiff line numberDiff line change
@@ -78,21 +78,40 @@ If you're using a private registry, you must set the following parameters.
7878
### Optional parameters for features
7979

8080
The following parameters enable certain features in Calico Cloud.
81-
These features can be enabled or diabled only by setting them in your `values.yaml` file at installation.
81+
These features can be enabled or disabled only by setting them in your `values.yaml` file at installation.
8282

8383
| Feature name | Parameter | Values |
8484
|---------|-----|--------|
85-
| Image Assurance | `installer.components.imageAssurance.state` | `Enabled` (default), `Disabled` |
86-
| Container Threat Detection | `installer.components.runtimeSecurity.state` | `Enabled`, `Disabled` (default) |
8785
| Packet Capture | `installer.components.packetCaptureAPI.state` | `Enabled`, `Disabled` (default) |
88-
| Compliance Reports | `installer.components.compliance.enabled` | `true` (default), `false` |
8986

9087
:::note
9188

92-
If you're upgrading from Calico Cloud 19 or earlier, the Container Threat Detection and Packet Capture features will remain enabled unless you explicitly set them to `Disabled`.
89+
If you're upgrading from Calico Cloud 19, the Packet Capture features will remain enabled unless you explicitly set them to `Disabled`.
9390

9491
:::
9592

93+
<details>
94+
<summary>Use alternate feature keys for legacy features</summary>
95+
96+
The Image Assurance, Container Threat Detection, and Compliance Reports features were removed for new users in Calico Cloud 21.1.0.
97+
Legacy users of those features can continue to use a deprecated version until the features are completely removed in a future release.
98+
99+
100+
| Feature | Key | Values |
101+
|---------|-----|--------|
102+
| Image Assurance | `installer.components.imageAssurance.state` | `Enabled`, `Disabled` (default) |
103+
| Container Threat Detection | `installer.components.runtimeSecurity.state` | `Enabled`, `Disabled` (default\*) <br/> * The default for new clusters is `Disabled`. For upgrades for previously connected clusters, the default will retain the previous state. |
104+
| Packet Capture | `installer.components.packetCaptureAPI.state` | `Enabled`, `Disabled` (default\*) <br/> * The default for new clusters is `Disabled`. For upgrades for previously connected clusters, the default will retain the previous state. |
105+
| Compliance Reports | `installer.components.compliance.enabled` | `true`, `false` (default) |
106+
107+
:::note
108+
109+
If you're upgrading from Calico Cloud 19, the Container Threat Detection and Packet Capture features will remain enabled unless you explicitly set them to `Disabled`.
110+
111+
:::
112+
113+
</details>
114+
96115
### Optional parameters for pod scheduling and resource management
97116

98117
For many Calico Cloud components, you can specify node selectors, tolerations, and resource requests and limits.

calico-cloud/get-started/install-cluster.mdx

+38-9
Original file line numberDiff line numberDiff line change
@@ -23,9 +23,20 @@ You can quickly connect a cluster to Calico Cloud by generating a unique kubectl
2323
We always recommend the latest version, which is installed by default.
2424
1. Click **Connect** to generate a unique kubectl command. Copy the command.
2525

26-
```bash title="Example of generated kubectl installation command"
27-
kubectl apply -f https://installer.calicocloud.io/manifests/cc-operator/latest/deploy.yaml && curl -H "Authorization: Bearer mprcnz04t:9dav6eoag:s8w7xjslez1x1xkf6ds0h23miz5b1fw6phh9897d0n76e4pjfdekijowjv5lw9dd" "https://www.calicocloud.io/api/managed-cluster/deploy.yaml?version=v19.1.0" | kubectl apply -f -
28-
```
26+
<details>
27+
<summary>Use alternate manifest for legacy features</summary>
28+
29+
The Image Assurance, Container Threat Detection, and Compliance Reports features were removed for new users in Calico Cloud 21.1.0.
30+
Legacy users of those features can continue to use a deprecated version until the features are completely removed in a future release.
31+
32+
To continue using these features, modify the generated command by replacing `deploy.yaml` with `deploy-with-container-security.yaml`.
33+
This change gives you a manifest with all three legacy features enabled.
34+
You cannot enable or disable these features individually.
35+
36+
```bash title="Example of generated kubectl command with alternate manifest"
37+
kubectl apply -f https://installer.calicocloud.io/manifests/cc-operator/latest/deploy-with-container-security.yaml && curl -H "Authorization: Bearer ..." "https://www.calicocloud.io/api/managed-cluster/deploy-with-container-security.yaml?version=$[cloudUserVersion]" | kubectl apply -f -
38+
```
39+
</details>
2940

3041
1. From a terminal, paste and run the command.
3142
1. On the **Managed Clusters** page, you should immediately see your cluster in the list of managed clusters.
@@ -39,26 +50,44 @@ You can quickly connect a cluster to Calico Cloud by generating a unique kubectl
3950
1. Optional: If you must install a specific older release, select the Calico Cloud version you want to install.
4051
We always recommend the latest version, which is installed by default.
4152
1. Click **Connect** to generate a unique Helm installation command. Copy the command.
42-
4353
```bash title="Example of generated Helm installation command"
4454
helm repo add calico-cloud https://installer.calicocloud.io/charts --force-update && helm upgrade --install calico-cloud-crds calico-cloud/calico-cloud-crds --namespace calico-cloud --create-namespace && helm upgrade --install calico-cloud calico-cloud/calico-cloud --namespace calico-cloud --set apiKey=ryl34elz8:9dav6eoag:ifk1uwruwlgp7vzn7ecijt5zjbf5p9p1il1ag8877ylwjo4muu19wzg2g8x5qa7x --set installer.clusterName=my-cluster --set installer.calicoCloudVersion=v19.1.0
4555
```
46-
1. Optional: To make changes to what features are enabled during installation, paste the command to a text editor and append the `--set` option any of the following key-value pairs.
47-
You can change these options only by reinstalling or upgrading Calico Cloud and changing the values.
56+
1. Optional: If you want to enable the Packet Capture feature, you can append `--set installer.components.packetCaptureAPI.state=Enabled` to the generated Helm command.
57+
You can change this option only by reinstalling or upgrading Calico Cloud and changing the values.
58+
| Feature | Key | Values |
59+
|---------|-----|--------|
60+
| Packet Capture | `installer.components.packetCaptureAPI.state` | `Enabled`, `Disabled` (default\*) <br/> * The default for new clusters is `Disabled`. For upgrades for previously connected clusters, the default will retain the previous state. |
61+
62+
```bash title="Example of generated Helm command with user-added parameters"
63+
helm repo add calico-cloud https://installer.calicocloud.io/charts --force-update && helm upgrade --install calico-cloud-crds calico-cloud/calico-cloud-crds --namespace calico-cloud --create-namespace && helm upgrade --install calico-cloud calico-cloud/calico-cloud --namespace calico-cloud --set apiKey=ryl34elz8:9dav6eoag:ifk1uwruwlgp7vzn7ecijt5zjbf5p9p1il1ag8877ylwjo4muu19wzg2g8x5qa7x --set installer.clusterName=my-cluster --set installer.calicoCloudVersion=v19.1.0 \
64+
--set installer.components.packetCaptureAPI.state=Enabled
65+
```
66+
67+
In this example, the command connects the cluster to Calico Cloud with the Packet Capture feature enabled.
68+
69+
<details>
70+
<summary>Use alternate feature keys for legacy features</summary>
71+
72+
The Image Assurance, Container Threat Detection, and Compliance Reports features were removed for new users in Calico Cloud 21.1.0.
73+
Legacy users of those features can continue to use a deprecated version until the features are completely removed in a future release.
74+
4875

4976
| Feature | Key | Values |
5077
|---------|-----|--------|
51-
| Image Assurance | `installer.components.imageAssurance.state` | `Enabled` (default), `Disabled` |
78+
| Image Assurance | `installer.components.imageAssurance.state` | `Enabled`, `Disabled` (default) |
5279
| Container Threat Detection | `installer.components.runtimeSecurity.state` | `Enabled`, `Disabled` (default\*) <br/> * The default for new clusters is `Disabled`. For upgrades for previously connected clusters, the default will retain the previous state. |
5380
| Packet Capture | `installer.components.packetCaptureAPI.state` | `Enabled`, `Disabled` (default\*) <br/> * The default for new clusters is `Disabled`. For upgrades for previously connected clusters, the default will retain the previous state. |
54-
| Compliance Reports | `installer.components.compliance.enabled` | `true` (default), `false` |
81+
| Compliance Reports | `installer.components.compliance.enabled` | `true`, `false` (default) |
5582

5683
```bash title="Example of generated Helm command with user-added parameters"
5784
helm repo add calico-cloud https://installer.calicocloud.io/charts --force-update && helm upgrade --install calico-cloud-crds calico-cloud/calico-cloud-crds --namespace calico-cloud --create-namespace && helm upgrade --install calico-cloud calico-cloud/calico-cloud --namespace calico-cloud --set apiKey=ryl34elz8:9dav6eoag:ifk1uwruwlgp7vzn7ecijt5zjbf5p9p1il1ag8877ylwjo4muu19wzg2g8x5qa7x --set installer.clusterName=my-cluster --set installer.calicoCloudVersion=v19.1.0 \
5885
--set installer.components.imageAssurance.state=Enabled \
5986
--set installer.components.runtimeSecurity.state=Enabled \
6087
```
61-
In this example, this command connects the cluster to Calico Cloud with Image Assurance and Runtime Security features enabled.
88+
In this example, the command connects the cluster to Calico Cloud with Image Assurance and Container Threat Detection features enabled.
89+
90+
</details>
6291

6392
1. From a terminal, paste and run the command.
6493
1. On the **Managed Clusters** page, you should immediately see your cluster in the list of managed clusters.

0 commit comments

Comments
 (0)