• /
  • EnglishEspañol日本語한국어Português
  • 로그인지금 시작하기

Infrastructure agent release notesRSS

July 18, 2019
Infrastructure agent v1.4.9

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Added

  • Optional JSON log format (doc coming soon).

Changed

  • Startup info and errors are now logged into the log file since the beginning.
  • Log messages prior to configuration being fully loaded.
  • Improved error catching and logging on fatal failures.
  • Improved log messages. Most of the messages are now static, not inlined with context values, so messages are more easily filterable/greppable, and context fields are provided attached.

Example old message:

Containerized agent found with container id VALUE

Example new message:

Containerized agent found in container
containerID: VALUE

July 15, 2019
Infrastructure agent v1.4.5

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Changed

  • Allow enabling http-server (required for Statsd integration) to work in forwarder mode.

July 11, 2019
Infrastructure agent v1.4.0

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Added

Improved logging and troubleshooting features:

  • Logging agent config options at startup (with obfuscation of sensitive data).
  • Logging all the config options of the loaded integrations at startup (with obfuscation of sensitive data).
  • Improve log messages related to integrations.
  • Integrations health checks
  • New binary called newrelic-infra-ctl for sending notifications to the agent for:
    • Enabling verbose logs for 5 minutes
    • Integrations health check

Agent daemon notification

For notifying the agent to perform actions, the newrelic-infra-ctl command was created. It has the sole responsibility of sending a notification to the agent process that's running inside the host.

In Linux this communication happens via POSIX signals. newrelic-infra-ctl first tries to find if there is an agent process running. If it finds it, it checks if the process is running inside a Docker container. This is because signals to Docker containers are sent with the docker kill command. Once it knows the pid and the signaling method to use, it sends a SIGUSR1 signal to the agent. The agent just has to set a signal handler for when it receives a SIGUSR1.

In Windows, things are a little different. The only signals that we could send to the process were exit signals. In Windows processes communicate by sending messages to their respective windows, but you might be wondering (as I was), the agent is a daemon process so it doesn't have a window. The solution, easy, a hidden window. On startup the agent creates a hidden window, and sets a handler that listens for messages that arrive in that window. newrelic-infra-ctl finds that windows and sends messages to it.

Changed

  • Decorate samples with reportingAgent attribute and replace loopback address if found in reportingEndpoint and reportingEntityKey samples attributes.
  • Do not log config.pid_file property in the Windows agent.

July 1, 2019
Infrastructure agent v1.3.33

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Changes

  • Minor internal architectural improvements. No impact expected.

May 27, 2019
Infrastructure agent v1.3.27

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Features

  • Add support for Red Hat Enterprise Linux 8 and CentOS 8

Improvements

  • Improve log messages related to startup permissions errors.

April 11, 2019
Infrastructure agent v1.3.18

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Bug fixes

  • When the configuration variable startup_connection_retries is set to -1, the Agent will keep checking forever the connectivity at startup to avoid CrashLoopBackOff states in K8S in case of failures. 'startup_connection_retry_time' has been removed and now the Agent uses an exponential backoff algorithm.
  • Improve the exponential backoff algorithm the Agent uses when posting metrics fails due to a non 2xx request response.
  • Filter duplicated device entries in the StorageSample.

April 1, 2019
Infrastructure agent v1.3.5

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Bug fixes

  • Fix post installation script for upstart.

March 27, 2019
Infrastructure agent v1.3.3

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Changes

  • Removed libcap dependency since it's only used for privileged mode.

Bug fixes

  • Lower log level for Selinux errors.

March 25, 2019
Infrastructure agent v1.3.1

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Improvements

  • Added HTTPS proxy certificate verification. You can enable it with the proxy_validate_certificates: true configuration option. When this option is set to true and you setup an HTTPS proxy with self-signed certificates, you may need to specify the certificates location with the ca_bundle_fileor ca_bundle_dir configuration options.
  • Added a Proxy Configuration Plugin that submits non-sensitive proxy configuration information as inventory. To disable it, set the proxy_config_plugin: false configuration option.
  • Warn on RPM plugin package parsing error.

Changes

  • Increased the intervals of some samplers
    • Increased ProcessSample default interval from 10 to 20
    • Increased StorageSample default interval from 5 to 20
    • Increased NetworkSample default interval from 5 to 10
  • When the configuration option startup_connection_retries is set to -1, the Agent, at startup, will keep checking forever the connectivity.
  • The configuration option startup_connection_retry_time has been removed and now the Agent uses an exponential backoff algorithm.
  • The Windows Agent does not ignore A: and B: drives anymore, as they may be mapped to actual Hard Disks. If those drives are reported because they map into a removable drive and you don't want the agent to report them, you can set the win_removable_drives: false configuration option.

Bug fixes

  • Fixed a bug that may cause some configuration options to be ignored when settting via environment variables (e.g. NRIA_IGNORE_RECLAIMABLE or NRIA_PROXY_VALIDATE_CERTIFICATES)
  • Fixed a bug in the Linux agent that prevented the agent from loading the system root certificates when the ca_bundle_dir or ca_bundle_file options were specified. This bug can't be fixed in the Windows Agent so the user will need to place in the ca_bundle_dir a copy of the New Relic certificate.

March 14, 2019
Infrastructure agent v1.2.25

Notes

A new version of the agent has been released. Follow standard procedures to update your Infrastructure agent.

Improvements

Bug fixes

  • Fixed unreported processes issue caused by the inability to parse a different format of /proc//stat.
  • Fixed a problem that caused the Windows agent to submit os:"unknown".

Security updates

  • Fixed a low security issue that caused the Windows agent to periodically access C:\etc folder.

Copyright © 2024 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.