Skip to content

Current versions

nameversion
current9.8.x
previous9.6.x
critical9.4.x
security9.2.x

Supported versions

We release a new version of the platform every 3 months. If there are major changes in functionality, or significant backward compatibility issues then it will be tagged as a new major version, otherwise a new minor version. We normally maintain 4 versions of the system, which means that each new release will typically be supported for a year. Once a new major or minor version has been tagged gold it should not have any changes that change the behavior of queries.

Which versions should changes be applied to? The following gives some examples of the types of changes and which version they would be most relevant to target.

"master":

  • New features.
  • Bug fixes that will change the semantics of existing queries or processes.
  • Refactoring.
  • Performance improvements (unless simple and safe)

"<current>":

  • Bug fixes that only change behavior where it previously crashes or had undefined behavior (If well defined but wrong need to have very strong justification to change.)
  • Fixes for race conditions (the behavior was previously indeterminate so less of an argument against it changing)
  • Data corruption fixes - on a case by case basis if they change existing query results.
  • Missing functionality that prevents features from working.
  • Changes for tech-preview work that only effect those who are using it.
  • Regressions.
  • Improvements to logging and error messages (possibly in "previous" if simple and added to help diagnose problems).
  • Occasional simple refactoring that makes up-merging simpler..
  • Changes to improve backward compatibility of new features. (E.g. adding an ignored syntax to the compiler.)
  • Performance improvements - if simple and safe

"<previous>":

  • Simple bug fixes that do not change behavior
  • Simple changes for missing functionality
  • Regressions with simple fixes (but care is needed if it caused a change in behavior)
  • Serious regressions
  • Complex security fixes

"<critical>" fixes only:

  • Simple security fixes
  • Complex security fixes if sufficiently serious

"<security>" fixes only:

  • Serious security fixes

Occasionally earlier branches will be chosen, (e.g. security fixes to even older versions) but they should always be carefully discussed (and documented).

Patches and images

We aim to produce new point releases once a week. The point releases will contain

a) Any changes to the code base for that branch. b) Any security fixes for libraries that are project dependencies. We will upgrade to the latest point release for the library that fixes the security issue. c) For the cloud any security fixes in the base image or the packages installed in that image.

If there are no changes in any of those areas for a particular version then a new point release will not be created.

If you are deploying a system to the cloud you have one of two options

a) Use the images that are automatically built and published as part of the build pipeline. This image is currently based on ubuntu 22.04 and contains the majority of packages users will require.

b) Use your own hardened base image, and install the containerized package that we publish into that image.

Package versions.

We currently generate the following versions of the package and images:

  • debug
  • release with symbols
  • release without symbols.

It is recommended that you deploy the "release with symbols" version to all bare-metal and non-production cloud deployments. The extra symbols allow the system to generate stack backtraces which make it much easier to diagnose problems if they occur. The "release without symbols" version is recommended for Kubernetes production deployments. Deploying a system without symbols reduces the size of the images. This reduces the time it takes Kubernetes to copy the image before provisioning a new node.

Released under the Apache-2.0 License.