R5.0 Release Notes

ISO image

The pre-built ISO and Docker images for StarlingX release 5.0 are located at the StarlingX mirror.


The source code for StarlingX release 5.0 is available in the r/stx.5.0 branch in the StarlingX repositories.


A system install is required to deploy StarlingX release 5.0. There is no upgrade path from previous StarlingX releases. For detailed instructions, see the R5.0 Installation Guides <https://docs.starlingx.io/r/stx.5.0/deploy_install_guides/r5_release/index-install-r5-ca4053cb3ab9.html>.

New features and enhancements

The list below provides a detailed list of new features and links to the associated user guides (if applicable).

  • Rook / Ceph

    A new storage backend rook-ceph to provide storage service to StarlingX.

    Guide: Install StarlingX Kubernetes on Bare Metal Standard with Rook Storage <https://docs.starlingx.io/r/stx.5.0/deploy_install_guides/r5_release/bare_metal/rook_storage.html>

  • FPGA image update orchestration for distributed cloud

    Added support for orchestrating updates to the Intel N3000 FPGA Programmable Acceleration Card across the subclouds in a distributed cloud configuration.

    Guide: Device Image Update Orchestration

  • Automatic certificate renewal for DC admin endpoints

    In Distributed Cloud configurations, admin endpoints for the platform keystone services (e.g. Configuration API, DC Manager API, etc.) on systemController and subclouds are HTTPS with internally generated certificates. This feature adds support for automatically renewing the certificates associated with these admin endpoints.

    Guide: Certificate Management for Admin REST API Endpoints

  • Vault integration for secret management support

    StarlingX now integrates the open source Vault secret management into the StarlingX solution. The StarlingX integration of Vault uses open source Raft (PVC-based) as its storage backend. For more information, refer to: https://www.vaultproject.io/

    The following services are supported:

    • Encryption-as-a-service / Secret Management: Vault provides data encryption for applications and is used to store and access secrets.

    • Vault-manager: The Vault-manager pod handles the initialization of Vault, configuring Transport Layer Security (TLS) for all Vault communication that provides the ability to automatically unseal Vault pods in deployments where an external autounseal provider is not available.

    Guide: Vault Overview

  • Support for container image signature validation

    StarlingX supports image security policies using the Portieris admission controller. Portieris uses a Kubernetes Mutating Admission Webhook to modify Kubernetes resources such as pods, deployments, and others, at the point of creation, to ensure that Kubernetes runs only policy compliant images; for example, only signed images. The StarlingX integration of Portieris is integrated with cert-manager and works with external registries, with an associated Notary server for holding images’ trust data.

    Guide: Portieris Overview

  • Edgeworker for industrial deployments

    EdgeWorker is a new personality of nodes. Edgeworker nodes are typically small systems running dedicated workloads with Ubuntu as its operating system. They usually do not meet worker nodes’ minimum requirements but now they can be managed by StarlingX.

    Guide: Deploy Edgeworker Nodes

  • SNMP v3 support

    StarlingX has updated its SNMP solution to be a containerized SNMP solution, delivered as an optional system application. Net-SNMP is still used as the underlying SNMP Agent. SNMP is configured through helm-overrides of the SNMP system application. The SNMP system application now supports both SNMPv2c and SNMPv3.

    Guide: SNMP Overview

  • Distributed cloud scaling

    The distributed cloud deployment now supports up to 200 AIO-SX subclouds.

    Guide: Distributed Cloud Architecture

  • Secure Device Onboard (SDO)

    SDO is open source software that automates the “onboard” process, which occurs when an SDO device establishes the first trusted connection with a device management service. This release adds support for the SDO Rendezvous (RV) service.

    Guide: Enable SDO Rendezvous Service

  • Hardware enablement

    Added support for Intel Ice Lake CPU, Intel Mt. Bryce eASIC (Pomona Lake), and Intel Columbiaville NIC.

    Guides: Configuring VF Interfaces Rate Limiting Using the CLI and Verified Commercial Hardware

Bug status

Fixed bugs

This release provides fixes for a number of defects. Refer to the StarlingX bug database to review the R5.0 fixed defects.

Known limitations

The following are known limitations in this release. Workarounds are suggested where applicable. Note that these limitations are considered temporary and will likely be resolved in a future release.

  • 1925668 This item is fixed in the master branch.

    Running the bootstrap playbook will fail if it is re-run after first running it with one management subnet (default or specified) and then specifying a new management subnet.