Skip to content

tracking: Release Notes for SDP 26.3.0#828

Open
Techassi wants to merge 62 commits intomainfrom
docs/release-notes-26.3.0
Open

tracking: Release Notes for SDP 26.3.0#828
Techassi wants to merge 62 commits intomainfrom
docs/release-notes-26.3.0

Conversation

@Techassi
Copy link
Member

@Techassi Techassi commented Mar 16, 2026

Release Notes for SDP 26.3.0

Caution

Please assign the applicable scheduled-for/26.3.0 label.

Tip

  • Use the commented out template headings in release-notes.
  • Begin each sentence on a new line. This helps with review suggestions and diffing.
  • Use xrefs for links to other parts of the documentation so that they remain valid across versions.

Release note compilation tasks

  • Check Issues for Product and Platform release notes
  • Check PRs for Product and Platform release notes
  • Optionally check the Changelogs in case release notes were missed
  • Compile list of new product versions that are supported and compile a list of new product features to include in the Release Highlights
  • Upgrade guide: Document how to use stackablectl to uninstall all and install new release
  • Upgrade guide: Document how to use helm to uninstall all and install new release
  • Upgrade guide: Every breaking change of all our operators
  • Upgrade guide: List removed product versions (if there are any)
  • Upgrade guide: List removed operators (if there are any)
  • Upgrade guide: List supported Kubernetes versions

Each of the following tasks focuses on a specific goal and should be done once the items above have been completed.

Release note review tasks

  • Check overall document structure
  • Check spelling, grammar, and correct wording
  • Check that internal links are xrefs
  • Check that rendered links are valid
  • Check that each sentence begins on a new line

@netlify
Copy link

netlify bot commented Mar 16, 2026

Deploy Preview for stackable-docs ready!

Name Link
🔨 Latest commit d360dff
🔍 Latest deploy log https://app.netlify.com/projects/stackable-docs/deploys/69c1302904b89000087021da
😎 Deploy Preview https://deploy-preview-828--stackable-docs.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@Techassi Techassi marked this pull request as ready for review March 19, 2026 16:01
@Techassi Techassi moved this from Development: In Progress to Development: Waiting for Review in Stackable Engineering Mar 19, 2026
Copy link
Member

@lfrancke lfrancke left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not fully done yet - just wanted to submit before I stop for today.

@Techassi Techassi moved this from Development: Waiting for Review to Development: In Review in Stackable Engineering Mar 23, 2026
Copy link
Member

@NickLarsenNZ NickLarsenNZ left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Been over it, left some comments.

[#airflow-removals-26_3_0]
===== Apache Airflow

*Breaking:* Users of the `EXPERIMENTAL_FILE_HEADER` and `EXPERIMENTAL_FILE_FOOTER` fields who rely on `AUTH_OID` from the `flask_appbuilder.const` import must switch to `AUTH_OAUTH`.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This applies to Superset as well.

stackabletech/docker-images#1329 (comment)

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Moved in ab1788b. But this still doesn't mention EXPERIMENTAL_FILE_HEADER and EXPERIMENTAL_FILE_FOOTER which I guess should be added.

See https://github.com/stackabletech/kafka-operator/pull/933[kafka-operator#933].
--
* There is a https://github.com/kubernetes/kubernetes/issues/137409[known issue] with the feature gate https://github.com/kubernetes/kubernetes/pull/133153[MaxUnavailableStatefulSet] that is enabled by default as a beta feature in Kubernetes 1.35.
This issue affects all SDP operators, especially the Trino operator. +
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We should probably explain why especially Trino.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hopefully @razvan can elaborate on this as he was the one who found this problem.

Copy link
Member

@lfrancke lfrancke left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

still not 100% done

* All remaining operators now maintain their own CRDs instead of relying on Helm as a deployment mechanism.
Additionally, the conversion webhook is now running alongside the controller for future CRD versioning.
Tracked in https://github.com/stackabletech/issues/issues/808[issues#808].
* This release supports `objectOverrides`, a list of generic Kubernetes objects, which are merged into the objects created by the operator (e.g. StatefulSets, Listeners or ConfigMaps).
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This was mentioned as a highlight - and I think it's a great feature. I'd love to move this to position 1 in the list. And maybe link to the docs for the feature as well.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sure thang, I can do that!

* There are cases where customers may wish to provide static authorization files (users.xml, authorizer.xml, authorizations.xml) instead of fetching the data dynamically (for instance, when collecting user and group data from AD/Entra).
+
--
Statically provided user/group information and coarse-grained permissions are honoured automatically (as long as the UUIDs match those available in the backend), but for the initial process group this has to be done by a callback mechanism so that the authorizations can be updated after the flow has been registered.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

So, I was part of these discussions and I think I know what's meant here. For those with only a little NiFi knowledge this might be hard to parse or hard to see whether this is relevant for them.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd page @adwk67 for this.

--
Statically provided user/group information and coarse-grained permissions are honoured automatically (as long as the UUIDs match those available in the backend), but for the initial process group this has to be done by a callback mechanism so that the authorizations can be updated after the flow has been registered.

The NiFi images have been patched for versions 2.4.0 and 2.6.0 to support this.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Did we not remove 2.4.0?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

2.4.0 is gone. I assume the release note was written before the version meeting.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We did. It seems like it was initially patched for 2.4.0 and 2.6.0, then 2.4.0 was removed and 2.7.2 was added. The patch was then also ported to 2.7.2.

So I think this should say:

Suggested change
The NiFi images have been patched for versions 2.4.0 and 2.6.0 to support this.
The NiFi images have been patched for versions 2.6.0 and 2.7.2 to support this.

* Driver pods are now garbage collected when the Spark application is finished.
Previously, driver pods created by the submit job would be left hanging even after the job has been deleted.
Fixed in https://github.com/stackabletech/spark-k8s-operator/pull/649[spark-k8s-operator#649].
* Fix application pod specifications when both the history server and the S3 connection reference the same SecretClass object.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Everywhere else we use the "Fixed" (past), this is using a different form. Not super important.

Copy link
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I would say this is fine, because it still says "fixed" two lines below.

Techassi and others added 2 commits March 23, 2026 13:12
Co-authored-by: Lars Francke <lars.francke@stackable.tech>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

Status: Development: In Review

Development

Successfully merging this pull request may close these issues.

4 participants