You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This pages hosts notes for Azure Operator Service Manager (AOSM) releases.
13
+
This pages hosts release notes for Azure Operator Service Manager (AOSM) releases.
14
14
15
15
## Overview
16
16
@@ -19,46 +19,46 @@ The following release notes are generally available (GA):
19
19
* Release Notes for Version 2.0.2763-119
20
20
21
21
### Release Attestation
22
-
These releases are produced compliant with Microsoft’s Secure Development Lifecycle. This includes processes for authorizing software changes, antimalware scanning, and scanning and mitigating security bugs and vulnerabilities.
22
+
These releases are produced compliant with Microsoft’s Secure Development Lifecycle. This lifecycle includes processes for authorizing software changes, antimalware scanning, and scanning and mitigating security bugs and vulnerabilities.
23
23
24
24
## Release 2.0.2763-119
25
25
26
26
Document Revision 1.5
27
27
28
28
### Release Summary
29
-
Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This 07-31-2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2763-119, the details of which are further outlined in the remainder of this document.
29
+
Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software, and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This July 31st, 2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2763-119, the details of which are further outlined in the remainder of this document.
30
30
31
31
### Release Details
32
32
* Release Version: 2.0.2763-119
33
-
* Release Date: 07-31-2024
33
+
* Release Date: July 31st, 2024
34
34
35
35
### Release Installation
36
36
**[BREAKING CHANGE INSTALLATION]** This is a major version release, which includes a breaking change. To safely install this version, follow the below steps:
37
37
1. Delete all site network services and network functions from the custom location.
38
38
2. Uninstall the network function extension:
39
39
3. Delete custom location
40
-
4. _If Required:_ To ensure repository access, update the content delivery network (CDN) to permit the endpoint: "linuxgeneva-microsoft.azurecr.io" port 443. This step can be skipped if a wildcard is being used or if running Nexus 3.12 or later.
40
+
4. Ensure repository access, if required, by updating the content delivery network (CDN) to permit the endpointlinuxgeneva-microsoft.azurecr.io on port 443. This step can be skipped if a wildcard is used or if running Nexus 3.12 or later.
41
41
5. Install the network function extension
42
42
6. Create custom location
43
43
7. Redeploy site network services and network functions to the custom location.
44
44
45
45
### Release Highlights
46
46
#### Cluster Registry & Webhook – High Availability
47
-
Introduced in this release is an enhancement of the cluster registry and webhook service to support high availability operations. When enabled, the singleton pod, used in earlier releases, is rpelaced with a replica set and optionally allows for horizontal auto scaling. Other notable improvements include:
48
-
* Changing registry storage volume from "nexus-volume" to "nexus-shared"
47
+
Introduced in this release is an enhancement of the cluster registry and webhook service to support high availability operations. When enabled, the singleton pod, used in earlier releases, is replaced with a replica set and optionally allows for horizontal auto scaling. Other notable improvements include:
48
+
* Changing registry storage volume from nexus-volume to nexus-shared.
49
49
* Implementing options to allow for the future deletion of the extension with minimal impact.
50
50
* Adds tracking references for cluster registry container images usage
51
51
52
52
#### Safe Upgrades – Downgrade to Lower Version
53
-
With this release, a Site Network Service (SNS) re-put operation now supports downgrading a network function to a lower version. The downgrade re-put operation uses the “helm update” method and is not the same as a rollback operation. Downgrade operations support the same capabilities as upgrades, such as atomic parameter, test-option parameters and pause-on-failure behavior.
53
+
With this release, a Site Network Service (SNS) reput operation now supports downgrading a network function to a lower version. The downgrade reput operation uses the helm update method and is not the same as a rollback operation. Downgrade operations support the same capabilities as upgrades, such as atomic parameter, test-option parameters, and pause-on-failure behavior.
54
54
55
55
### Issues Resolved in This Release
56
56
57
57
#### Bugfix Related Updates
58
-
The following bugfixes, or other defect resolutions, are delivered with this release, for either Network Function Operator (NFO) or reource provider (RP) components.
58
+
The following bug fixes, or other defect resolutions, are delivered with this release, for either Network Function Operator (NFO) or resource provider (RP) components.
59
59
60
60
* NFO - Fix for Out Of Memory(OOM) condition in artifact-controller pod when installing fed-smf with Cluster Registry.
61
-
* NFO - Prevent mutation of non-AOSM managed pods within "kube-system" namespace. AT&T can use the default value for the new parameter to selectively apply mutations to AOSM-managed pods. (see Appendix B)
61
+
* NFO - Prevent mutation of non-AOSM managed pods within kube-system namespace. AT&T can use the default value for the new parameter to selectively apply mutations to AOSM-managed pods.
62
62
* NFO - Improved logging, fixing situations where logs were being dropped
63
63
* NFO - Tuning of memory and CPU resources, to limit resource consumption.
64
64
@@ -67,27 +67,8 @@ Through Microsoft’s Secure Future Initiative (SFI), this release delivers the
67
67
68
68
* NFO - Signing of helm package used by network function extension.
69
69
* NFO - Signing of core image used by network function extension.
70
-
* NFO - Use of Cert-manager for service certificate management and rotation. This change can result in failed SNS deployments if not properly reconciled. For guidance on the impact of this change, see Appendix A.
70
+
* NFO - Use of Cert-manager for service certificate management and rotation. This change can result in failed SNS deployments if not properly reconciled. For guidance on the impact of this change, see our [best practice recommendations](best-practices-onboard-deploy.md#considerations-if-your-nf-runs-cert-manager).
71
71
* NFO - Automated refresh of AOSM certificates during extension installation.
72
-
* NFO - A dedicated service account for the pre-upgrade job to safeguard against modifications to the existing network function extension service account.
73
-
* RP - The service principles (SPs) used for deploying site & NF now require “Microsoft.ExtendedLocation/customLocations/read” permission. The SP's that deploy day N scenario now require "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action" permission. This change can result in failed SNS deployments if not properly reconciled
74
-
* CVE - A total of 5 CVE’s are addressed in this release.
75
-
76
-
### Appendix A
77
-
#### Cert-manager Usage Guidance for NEPS
78
-
With release 1.0.2728-50 and later , AOSM now uses cert-manager to store and rotate certificates. As part of this change, AOSM deploys a cert-manager operator, and associate CRDs, in the azurehybridnetwork namespace. Since having multiple cert-manager operators, even deployed in separate namespaces, will watch across all namespaces, only one cert-manager can be effectively run on the cluster.
79
-
80
-
Any user trying to install cert-manager on the cluster, as part of a workload deployment, will get a deployment failure with an error that the CRD “exists and cannot be imported into the current release.” To avoid this error, the recommendation is to skip installing cert-manager, instead take dependency on cert-manager operator and CRD already installed by AOSM.
81
-
82
-
#### Other Configuration Changes to Consider
83
-
84
-
In addition to disabling the NfApp associated with the old user cert-manager, we have found other changes may be needed;
85
-
1. If one NfApp contains both cert-manager and the CA installation, these must broken into two NfApps, so that the partner can disable cert-manager but enable CA installation.
86
-
2. If any other NfApps have DependsOn references to the old user cert-manager NfApp, these will need to be removed.
87
-
3. If any other NfApps reference the old user cert-manager namespace value, this will need to be changed to the new azurehybridnetwork namespace value.
88
-
89
-
#### Cert-Manager Version Compatibility & Management
90
-
91
-
For the cert-manager operator, our current deployed version is 1.14.5. Users should test for compatibility with this version. Future cert-manager operator upgrades will be supported via the NFO extension upgrade process.
92
-
93
-
For the CRD resources, our current deployed version is 1.14.5. Users should test for compatibility with this version. Since management of a common cluster CRD is something typically handled by a cluster administrator, we are working to enable CRD resource upgrades via standard Nexus Add-on process.
72
+
* NFO - A dedicated service account for the preupgrade job to safeguard against modifications to the existing network function extension service account.
73
+
* RP - The service principles (SPs) used for deploying site & Network Function (NF) now require “Microsoft.ExtendedLocation/customLocations/read” permission. The SP's that deploy day N scenario now require "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action" permission. This change can result in failed SNS deployments if not properly reconciled
74
+
* CVE - A total of five CVEs are addressed in this release.
0 commit comments