Skip to content

Commit f41c19f

Browse files
authored
PBM-1655 Release notes 2.12.0 (#311)
* PBM-1655 Release notes 2.12.0 new file: docs/release-notes/2.12.0.md modified: mkdocs-base.yml modified: variables.yml
1 parent 4a954a7 commit f41c19f

File tree

6 files changed

+106
-9
lines changed

6 files changed

+106
-9
lines changed

docs/_templates/pdf_cover_page.tpl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3,8 +3,8 @@
33
<p>
44
<img src="_images/Percona_Logo_Color.png" />
55
</p>
6-
<h1>Backup for MongoDB 2.11.0</h1>
6+
<h1>Backup for MongoDB 2.12.0</h1>
77
{% if config.site_description %}
88
<h1>{{ config.site_description }}</h1>
99
{% endif %}
10-
<h2>2.11.0 (September 25, 2025)</h2>
10+
<h2>2.12.0 (November 4, 2025)</h2>

docs/details/gcs.md

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,9 @@ You can use Google Cloud Storage (GCS) as a remote backup storage for Percona Ba
99

1010
PBM supports communication with GCS via the JSON API and XML API. The preferred approach is to use the JSON API with a service account. HMAC keys are mainly useful for compatibility with S3-style APIs.
1111

12-
!!! warning "Known limitation"
13-
14-
When you run backups to GCS via HMAC keys, incomplete backups may be incorrectly marked as successful if network interruptions occur during the backup process. This results in corrupted or partially uploaded archives being stored and treated as valid backups, which can later fail during restore operations. This issue is addressed in [PBM-1605](https://perconadev.atlassian.net/browse/PBM-1605).
12+
!!! warning "HMAC keys support deprecation"
1513

16-
Until the issue is resolved, we recommend using a native GCS connection type with JSON keys rather than HMAC keys to ensure backup integrity.
14+
Starting with version 2.12.0, HMAC keys support is deprecated. We encourage you to use GCS connection type with native JSON keys.
1715

1816
To use GCS, you need the following:
1917

docs/release-notes.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# {{pbm.full_name}} release notes
22

3+
* [{{pbm.full_name}} 2.12.0](release-notes/2.12.0.md)
34
* [{{pbm.full_name}} 2.11.0](release-notes/2.11.0.md)
45
* [{{pbm.full_name}} 2.10.0](release-notes/2.10.0.md)
56
* [{{pbm.full_name}} 2.9.1](release-notes/2.9.1.md)

docs/release-notes/2.12.0.md

Lines changed: 96 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,96 @@
1+
# Percona Backup for MongoDB 2.12.0 ({{date.2_12_0}})
2+
3+
[Installation](../installation.md){.md-button}
4+
5+
6+
Percona Backup for MongoDB is a distributed, low-impact solution for creating consistent backups of MongoDB sharded clusters and replica sets, and for restoring those backups to a specific point in time.
7+
8+
## Release Highlights
9+
10+
This release focuses on improvements to backup storages. It includes new storage types, enhances Azure and GCS implementations and fixes issues with S3-compatible storage services.
11+
12+
Details below:
13+
14+
### Support of Alibaba Cloud as the backup storage
15+
16+
With **Percona Backup for MongoDB (PBM)** now supporting **Alibaba Cloud OSS** as a remote backup destination, you can seamlessly integrate your backup workflows into the Alibaba Cloud ecosystem. This means you can store any type of backups directly in OSS without extra tools or manual steps, taking full advantage of Alibaba's scalable infrastructure and strong regional performance.
17+
18+
You can authenticate directly using your OSS Access Key ID and Secret, or take advantage of full support for Alibaba Cloud's Security Token Service (STS) AssumeRole, which includes automatic security token refresh. The latter authentication flow is ideal for organizations that require temporary credentials for enhanced security.
19+
20+
This integration empowers teams already invested in Alibaba Cloud to adopt PBM better. Whether you're operating in Asia-Pacific or building cloud-native infrastructure, this gives you a secure, scalable, and compliant way to protect your data.
21+
22+
### Ensure data upload to Azure Blob storage even during unstable network
23+
24+
You can now control the number of upload retries to Azure in PBM configuration. This enhancement ensures your data reaches its destination—even when the network is unstable or intermittent. By customizing retry behavior, you gain greater resilience and reliability in backup and sync workflows. It’s a simple way to reduce failed uploads and improve peace of mind.
25+
26+
### Native MinIO Support in PBM
27+
28+
PBM now includes a native support for the MinIO storage by adding the **MinIo Go client library**. This integration makes it easier to use custom S3-compatible storage services for backup and restore.
29+
30+
Not all S3-compatible storage services support Signature Version 4 (SigV4) used in AWS SDK v2, which may result in compatibility and connectivity issues.
31+
32+
To solve this, PBM now uses the MinIo Go client and supports a new `minio` storage type in its configuration.
33+
34+
```yaml
35+
storage:
36+
type: minio
37+
minio:
38+
endpoint: minio.example.com:9000
39+
bucket: pbm-test-bucket
40+
prefix: data/pbm/backup
41+
credentials:
42+
access-key-id: <your-access-key-id-here>
43+
secret-access-key: <your-secret-key-here>
44+
```
45+
46+
If your custom S3-compatible storage is not compatible with AWS SDK v2, consider re-configuring PBM to use the `minio` storage type after the upgrade. However, be aware of the current [known limitation](#known-limitation-for-using-the-minio-storage-type) for using the MinIO storage type.
47+
48+
#### Known limitation for using the MinIO storage type
49+
50+
While MinIo SDK supports concurrency, its implementation interferes with PBM's backup logic and affects PBM functionality. Therefore, currently PBM uploads backups using a single thread which results in slower backup performance compared to S3. We're actively investigating safe ways to improve throughput without compromising reliability.
51+
52+
### Deprecation of HMAC keys support for Google Cloud Storage
53+
54+
Accessing Google Cloud Storage with HMAC keys relies on AWS Signature Version 2 (SigV2), an outdated authentication method that has been officially deprecated. Google Cloud Storage doesn't support a new Signature Version 4 (SigV4) and only supports SigV2 for HMAC authentication.
55+
56+
Continuing to use SigV2 can lead to serious issues: Percona Backup for MongoDB may incorrectly mark incomplete backups as successful and upload corrupted data to storage. This puts your restore process at risk and undermines backup reliability.
57+
58+
Using the outdated Signature Version 2 (SigV2) authentication for Google Cloud Storage is not recommended because it lacks important security enhancements, is no longer maintained, and can introduce critical reliability issues.
59+
60+
To prevent this, support for HMAC keys is now deprecated. We strongly recommend migrating to a native GCS connection type [with JSON keys :octicons-link-external-16:](https://cloud.google.com/iam/docs/keys-create-delete#creating). Refer to the [documentation](../details/gcs.md#adjust-pbm-configuration-to-use-gcs) for guidance on adjusting PBM configuration to use JSON keys.
61+
62+
We will end-of-life HMAC support and remove it in the PBM release after April 30, 2026.
63+
64+
65+
## Changelog
66+
67+
### New features
68+
69+
- [PBM-1588](https://perconadev.atlassian.net/browse/PBM-1588) - Percona Backup for MongoDB now supports Alibaba Cloud Object storage Service (OSS) as the remote backup storage (Thank you Imre Nagi for reporting and contributing to this feature).
70+
71+
- [PBM-1631](https://perconadev.atlassian.net/browse/PBM-1631) - Use MinIO client for S3-compatible storage to improve compatibility.
72+
73+
74+
### Improvements
75+
76+
- [PBM-1321](https://perconadev.atlassian.net/browse/PBM-1321) - Improved PBM logs for logical backups by providing clearer status messages during the backup process.
77+
78+
- [PBM-1593](https://perconadev.atlassian.net/browse/PBM-1593) - Interrupted downloads from Azure Blob storage now automatically resume, preventing restore failures due to temporary network issues (Thank you Daniel Oliver for reporting and contributing to this issue).
79+
80+
- [PBM-1628](https://perconadev.atlassian.net/browse/PBM-1628) - Backups to Google Cloud Storage (GCS) are now more resilient to temporary network interruptions.
81+
82+
## Fixed bugs
83+
84+
- [PBM-1093](https://perconadev.atlassian.net/browse/PBM-1093) - Added the ability to retry data upload to Azure Blob storage in case of connection issues, ensuring reliable backups.
85+
86+
- [PBM-1594](https://perconadev.atlassian.net/browse/PBM-1594) - Fixed the issue with backups failing to be uploaded due to data chunks exceeding the limit when HTTPS connection is used with MinIO. The issue is fixed by adding a MinIO client library (Thank you Rama Mekala for reporting this issue).
87+
88+
- [PBM-1605](https://perconadev.atlassian.net/browse/PBM-1605) - Fixed the issue with PBM marking incomplete backups as successful without logging errors during network disruptions and when HMAC keys are used for accessing Google Cloud Storage. PBM now calculates Cyclic Redundancy Check (CRC) and compares it with GCS generated one, reporting the error in case of mismatch.
89+
90+
- [PBM-1607](https://perconadev.atlassian.net/browse/PBM-1607) - Fixed the issue with already uploaded files remaining on the storage if the backup failed by correctly reporting the actual error in logs
91+
92+
- [PBM-1610](https://perconadev.atlassian.net/browse/PBM-1610) - Fixed the issue with data upload to a custom S3-compatible storage that was caused by a new upload algorithm introduced in AWS SDK v2 by adding a MinIO Go client library that resolves compatibility issues for custom S3-compatible storage services.
93+
94+
- [PBM-1619](https://perconadev.atlassian.net/browse/PBM-1619) - Fixed the issue with PBM failing with segmentation fault (segfault) on invalid configuration by introducing basic checks and returning the meaningful error message on failed check. (Thank you Neha Oudin for reporting and contributing to this issue)
95+
96+
- [PBM-1627](https://perconadev.atlassian.net/browse/PBM-1627) - GCS storage retry configurations now correctly interpret time units (e.g., '60s') and include a new `ChunkRetryDeadline` setting to manage upload timeouts.

mkdocs-base.yml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -276,7 +276,8 @@ nav:
276276
- Release notes:
277277
- release-notes.md
278278
- PBM 2.x:
279-
- "{{pbm.full_name}} 2.11.0 ({{date.2_11_0}})": release-notes/2.11.0.md
279+
- "{{pbm.full_name}} 2.12.0 ({{date.2_12_0}})": release-notes/2.12.0.md
280+
- release-notes/2.11.0.md
280281
- release-notes/2.10.0.md
281282
- release-notes/2.9.1.md
282283
- release-notes/2.9.0.md

variables.yml

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,14 @@
11
# PBM Variables set for HTML output
22
# See also mkdocs.yml plugins.with-pdf.cover_subtitle and output_path
33

4-
release: '2.11.0'
5-
version: '2.11'
4+
release: '2.12.0'
5+
version: '2.12'
66
year: '2025'
77

88
pbm:
99
full_name: 'Percona Backup for MongoDB'
1010
date:
11+
2_12_0: 2025-11-04
1112
2_11_0: 2025-09-25
1213
2_10_0: 2025-06-26
1314
2_9_1: 2025-03-27

0 commit comments

Comments
 (0)