Compare releases

Compare releases and check for compatibility between your existing Octopus Server and new releases.

What's new

These are the most important features you'll get by upgrading from 2018.9.15 to 2018.10.0

Octopus 2018.9

Highlights

Kubernetes

2018.9 removes the alpha feature-flag from the Kubernetes support in Octopus!

The following pieces are now fully-supported members of the Octopus family:

Offline Drop Artifacts

Offline Package Drop targets can now be configured to persist the bundle as an Octopus Artifact.

Offline Package Drop targets could previously only persist the bundle to a file-system directory, which wasn't suitable for Octopus Cloud instances. Artifacts are a perfect fit for this; the deployment bundle is persisted a zip file stored against the deployment in Octopus.

Cloud Dependency Updates

All the Cloud dependencies that ship with Octopus have had an update in 2018.9

  • Azure PowerShell modules upgraded from 5.7.0 to 6.8.1. This update fixes some known issues with the 5.7.0 release of Azure PowerShell.
  • Azure CLI upgraded from 2.0.42 to 2.0.45
  • AWS PowerShell modules upgraded from 3.3.225.1 to 3.3.343.0
  • AWS CLI upgraded from 1.16.6 to 1.16.15
  • Terraform CLI upgraded from 0.11.5 to 0.11.8
  • Terraform AzureRm plugin version 1.16.0
  • Terraform AWS plugin version 1.39.0

Release notes

These are the features and fixes you'll get by upgrading from 2018.9.15 to 2018.10.0.

Changes in Octopus Server 2018.10.0

  • 5126 - Fix for error saying unable to delete a step template that's in use

Changes in Octopus Server 2018.9.17

  • 5133 - UI Simplifying the Getting Started / Onboarding guides
  • 5144 - Resolved issue with migrator partial-export command exceeding 2100 SQL parameters
  • 5145 - Added the ability to choose how inlined scripts in deployment processes are exported by Octopus.Migrator.exe including CopyInlineScripts (current behaviour), ExtractInlineScripts, and LeaveInline - learn more
  • 5147 - Fixed issue where editing an offline drop removes the encryption password
  • 5154 - Updated task logs for subscription processing and auto-deploy to use nesting and add links to the related project / trigger / release
  • 5163 - Fix error on project process screen when user does not have LifecyleView permissions
  • 5164 - Show empty state info boxes when connecting a tenant to a project or tag set and none exist
  • 5165 - Made the Azure account type expander look and work in the same way as other expanders
  • 5166 - Improved layout of Upload Package dialog
  • 5170 - OctopusClient updated to include information in it's calls that allow filtering in the audit log
  • 5171 - Octopus Cloud instances can now be licensed by deployment target just like self-hosted Octopus Server licenses
  • 5167 - Gracefully stop Octopus Server if running in terminal and process terminated

Changes in Octopus Server 2018.9.16

  • 5143 - Added the Strict-Transport-Security HTTP header to the page shown when Octopus Tentacle is accessed from a Web Browser
  • 5148 - migrator.exe import will no longer fail with a unique constraint violation on name when it mistakenly tried to insert a new MachinePolicy or Subscription or Account or Feed with the same name, now it will correctly overwrite the existing document
  • 5149 - Clicking on a step in the task summary now navigates you to the correct element in the task log
  • 5152 - Added a new update-trust command for Tentacle, this command allows you to update a server thumbprint, without having to remove and then add a new thumbprint which doesn't work for polling Tentacles
  • 5153 - Fixed a regression in Octopus.Migrator.exe partial-export introduced in 2018.9.13 which would incorrectly fail to validate the arguments related to exporting releases
  • 5155 - Support for Kubernetes Container Lifecycle Events

Changes in Octopus Server 2018.9.15

  • 5135 - Resolved script step package references being incorrectly deleted by retention policy
  • 5136 - Create release page shows project ID rather than name for Deploy Release steps
  • 5139 - Extend brute force login protection to cover API keys