Trusted Postgres Architect 23.41.0 release notes v23.41.0
Released: 26 November 2025
Known Issue
When using TPA 23.35 or later to deploy to a PGD/BDR cluster created with an earlier version of TPA
the barman user will have its superuser permissions revoked. This means that attempts by this user to connect to the postgres database will fail.
This will cause the Barman check command to report a failure.
The workaround for this issue is to restore these permissions with a post-deploy hook.
New features, enhancements, bug fixes, and other changes in Trusted Postgres Architect 23.41.0 include the following:
Highlights
- Perform updates of all cluster components - not just Postgres and PGD
- Hardening of the default Patroni configuration, with many new options to fine-tune security measures
- Support for minor version upgrades of PGD 6 (PGD-X and PGD-S)
- Support for Postgres 18
Enhancements
| Description | Addresses |
|---|---|
Secure etcd and Patroni defaults for new | |
Support upgrade of components M1 and PGD/BDR clusters.All cluster software components (failover managers, PEM, Barman, etc.) can now be updated, either to a specific version by specifying the component package version in | |
Improved automation of PGD5.9+ to PGD6 upgrade.For a PGD v5.9 to v6 migration, Connection Manager is a requirement instead of PGD proxy. A new command | |
Communication with the | |
Mutual TLS (mTLS) Authentication for Patroni REST API.Support for mutual TLS has been added to provide a more secure, certificate-based authentication method for the Patroni REST API. A new configuration variable,
The default authentication mode remains | |
Improve security of Patroni REST API with access | |
TPA now supports minor version upgrades for PGD-X.The | |
TPA now supports minor version upgrades for PGD-S.The | |
Enable etcd Basic Authentication and Role-Based Access Control.This release introduces a new capability to secure the etcd distributed key-value store with client authentication. You can now enable basic authentication and configure a dedicated user for Patroni with granular, least-privilege permissions. A new configuration variable,
To maintain backward compatibility, this feature is disabled by default ( | |
Mutual TLS (mTLS) Authentication for | |
Introduced new instance-level variables to control how servers and agents are displayed in PEM.Introduced four new instance variables for use with the
| |
Added support for validity period in OpenSSL generated certificates.Previously, some SSL certificates (OpenVPN, PEM and TPA itself) used in TPA didn't come with a way of specifying the number of days before expiration. This change adds a variable called |
Changes
| Description | Addresses |
|---|---|
Changed the default EFM password encryption to scram-sha-256.TPA now defaults to | |
The | |
TPA now runs | 46753, 46426 |
Moved the pre-deploy hook outside repositories role.In previous versions, this hook was part of the repositories role. When TPA introduced the possibility to exclude this role from deployments, it created a situation whereby this hook could be unintentionally skipped. To avoid this situation, we moved the hook outside the role so it's always executed. | 52412 |
Added | |
Updated the internal dictionary of the AWS regions.The change updates the internal dictionary of the AWS regions to expand the coverage of the supported regions and corresponding AZs. | |
Documented | |
Disabled TRACK and TRACE methods on the PEM HTTPD server.PEM 10.3 contains a fix for HTTPD configuration, moving the directive to rewrite TRACK/TRACE requests to the <VirtualHost> section for the default virtual host on port defined by the | 54529 |
Added | |
Added support for pgaudit and postgis plugins on PG18.Adding PG18 support for those plugins. The version of those depends on the Postgres version being supported as well. We have removed versions 11 and 12 from the plugin lists as they are no longer widely supported. | |
Start PGD proxy after the network is available.This service needs the network service to be up and running before it can be started. | 54251, 52731 |
Install | |
Install |
Bug Fixes
| Description | Addresses |
|---|---|
Patroni REST API SSL/TLS connections are now correctly configured and secure.Previously, enabling SSL for the Patroni REST API ( | |
Fixed race conditions during concurrent updates to the Barman ``.pgpass` file.Previously, when multiple backed-up nodes attempted to update the Barman node's | 52460 |
Fix | |
Fixed task selection for pgdcli.Fixed a bug whereby the | |
Fixed a fatal error during Docker container provisioning.When creating containers on modern versions of docker using user-defined networks, | |
Fixed | |
Fixed an issue whereby | 53224 |
Fixed issue with missing PGD CLI on proxy nodes when performing upgrade (3.7 to 5).When performing a regular deploy, or an upgrade from a 'BDR-Always-ON' setup to 'PGD-Always-ON', the proxy nodes (previously deployed with the 'harp-proxy' role), will not come shipped with the PGD CLI when trying to install it with the 'pgd-proxy' role, necessary to perform the upgrade. This fix ensures that the PGD CLI will be installed on the proxy nodes and nodes with a 'bdr' role, also on the nodes featuring only the 'pgdcli' role. |
- On this page
- Highlights
- Enhancements
- Changes
- Bug Fixes