You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
title: Azure Operator Service Manager Release Notes
3
-
description: Tracking of notes for major and minor release of AOSM.
3
+
description: Tracking of major and minor releases of Azure Operator Service Manager.
4
4
author: msftadam
5
5
ms.author: adamdor
6
-
ms.date: 08/13/2024
6
+
ms.date: 08/14/2024
7
7
ms.topic: release-notes
8
8
ms.service: azure-operator-service-manager
9
9
---
10
10
11
11
# Release Notes
12
12
13
-
This pages hosts major and minor release notes for Azure Operator Service Manager (AOSM)
13
+
This pages hosts release notes for Azure Operator Service Manager (AOSM).
14
14
15
15
## Overview
16
16
17
-
The following release notes are generally available: (GA)
17
+
The following release notes are generally available (GA):
18
18
19
-
* Release Notes for Version 2.0.2763-119 7/31/24
19
+
* Release Notes for Version 2.0.2763-119
20
20
21
-
## Release 2.0.2763-119 - 7/31
21
+
### Release Attestation
22
+
These releases are produced compliant with Microsoft’s Secure Development Lifecycle. This lifecycle includes processes for authorizing software changes, antimalware scanning, and scanning and mitigating security bugs and vulnerabilities.
23
+
24
+
## Release 2.0.2763-119
22
25
23
-
Azure Operator Service Manager Release Notes
24
-
7/31/2024 – Document Version 1.5
26
+
Document Revision 1.5
25
27
26
28
### Release Summary
27
-
Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This 07-31-2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2763-119, the details of which are further outlined in the remainder of this document.
29
+
Azure Operator Service Manager is a cloud orchestration service that enables automation of operator network-intensive workloads, and mission critical applications hosted on Azure Operator Nexus. Azure Operator Service Manager unifies infrastructure, software, and configuration management with a common model into a single interface, both based on trusted Azure industry standards. This July 31st, 2024 Azure Operator Service Manager release includes updating the NFO version to 2.0.2763-119, the details of which are further outlined in the remainder of this document.
28
30
29
31
### Release Details
30
32
* Release Version: 2.0.2763-119
31
-
* Release Date: 07-31-2024
33
+
* Release Date: July 31st, 2024
32
34
33
35
### Release Installation
34
36
**[BREAKING CHANGE INSTALLATION]** This is a major version release, which includes a breaking change. To safely install this version, follow the below steps:
35
37
1. Delete all site network services and network functions from the custom location.
36
-
2. Uninstall the network function extension:
38
+
2. Uninstall the network function extension.
37
39
3. Delete custom location
38
-
4. _If Required:_ To ensure repository access, update the content delivery network (CDN) to permit the endpoint: "linuxgeneva-microsoft.azurecr.io" port 443. This step can be skipped if a wildcard is being used or if running Nexus 3.12 or later.
40
+
4. Ensure repository access, if required, by updating the content delivery network (CDN) to permit the endpointlinuxgeneva-microsoft.azurecr.io on port 443. This step can be skipped if a wildcard is used or if running Nexus 3.12 or later.
39
41
5. Install the network function extension
40
42
6. Create custom location
41
43
7. Redeploy site network services and network functions to the custom location.
42
44
43
-
### Release Attestation
44
-
This release is produced compliant with Microsoft’s Secure Development Lifecycle. This includes processes for authorizing software changes, antimalware scanning, and scanning and mitigating security bugs and vulnerabilities.
45
-
46
45
### Release Highlights
47
46
#### Cluster Registry & Webhook – High Availability
48
-
Introduced in this release is an enhancement of the cluster registry and webhook service to support high availability operations. When enabled, the singleton pod, used in earlier releases, is rpelaced with a replica set and optionally allows for horizontal auto scaling. Other notable improvements include:
49
-
* Changing registry storage volume from "nexus-volume" to "nexus-shared"
47
+
Introduced in this release is an enhancement of the cluster registry and webhook service to support high availability operations. When enabled, the singleton pod, used in earlier releases, is replaced with a replica set and optionally allows for horizontal auto scaling. Other notable improvements include:
48
+
* Changing registry storage volume from nexus-volume to nexus-shared.
50
49
* Implementing options to allow for the future deletion of the extension with minimal impact.
51
50
* Adds tracking references for cluster registry container images usage
52
51
53
52
#### Safe Upgrades – Downgrade to Lower Version
54
-
With this release, a Site Network Service (SNS) re-put operation now supports downgrading a network function to a lower version. The downgrade re-put operation uses the “helm update” method and is not the same as a rollback operation. Downgrade operations support the same capabilities as upgrades, such as atomic parameter, test-option parameters and pause-on-failure behavior.
53
+
With this release, a Site Network Service (SNS) reput operation now supports downgrading a network function to a lower version. The downgrade reput operation uses the helm update method and is not the same as a rollback operation. Downgrade operations support the same capabilities as upgrades, such as atomic parameter, test-option parameters, and pause-on-failure behavior.
55
54
56
55
### Issues Resolved in This Release
57
56
58
57
#### Bugfix Related Updates
59
-
The following bugfixes, or other defect resolutions, are delivered with this release, for either Network Function Operator (NFO) or reource provider (RP) components.
58
+
The following bug fixes, or other defect resolutions, are delivered with this release, for either Network Function Operator (NFO) or resource provider (RP) components.
60
59
61
60
* NFO - Fix for Out Of Memory(OOM) condition in artifact-controller pod when installing fed-smf with Cluster Registry.
62
-
* NFO - Prevent mutation of non-AOSM managed pods within "kube-system" namespace. AT&T can use the default value for the new parameter to selectively apply mutations to AOSM-managed pods. (see Appendix B)
61
+
* NFO - Prevent mutation of non-AOSM managed pods within kube-system namespace. AT&T can use the default value for the new parameter to selectively apply mutations to AOSM-managed pods.
63
62
* NFO - Improved logging, fixing situations where logs were being dropped
64
63
* NFO - Tuning of memory and CPU resources, to limit resource consumption.
65
64
@@ -68,24 +67,8 @@ Through Microsoft’s Secure Future Initiative (SFI), this release delivers the
68
67
69
68
* NFO - Signing of helm package used by network function extension.
70
69
* NFO - Signing of core image used by network function extension.
71
-
* NFO - Use of Cert-manager for service certificate management and rotation. This change can result in failed SNS deployments if not properly reconciled. For guidance on the impact of this change, see Appendix A.
70
+
* NFO - Use of Cert-manager for service certificate management and rotation. This change can result in failed SNS deployments if not properly reconciled. For guidance on the impact of this change, see our [best practice recommendations](best-practices-onboard-deploy.md#considerations-if-your-nf-runs-cert-manager).
72
71
* NFO - Automated refresh of AOSM certificates during extension installation.
73
-
* NFO - A dedicated service account for the pre-upgrade job to safeguard against modifications to the existing network function extension service account.
74
-
* RP - The service principles (SPs) used for deploying site & NF now require “Microsoft.ExtendedLocation/customLocations/read” permission. The SP's that deploy day N scenario now require "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action" permission. This change can result in failed SNS deployments if not properly reconciled
75
-
* CVE - The following CVE’s are addressed in this release: CVE-2019-25210, CVE-2024-2511, CVE-2023-42366, CVE-2024-4603, CVE-2023-42363
76
-
77
-
### Appendix A
78
-
#### Cert-manager Usage Guidance for NEPS
79
-
With this release, AOSM now uses cert-manager to store and rotate certificates. As part of this change, AOSM deploys a cert-manager operator, and associate custom resource definition (CRD), in the azurehybridnetwork namespace. Since having multiple cert-manager operators, even deployed in separate namespaces, watches across all namespaces, only one cert-manager can be effectively run on the cluster.
80
-
81
-
Any user trying to install cert-manager on the cluster, as part of a workload deployment, may receive a deployment failure error stating the CRD “exists and cannot be imported into the current release.” To avoid this error, the recommendation is to skip installing cert-manager, instead take dependency on cert-manager operator and CRD already installed by AOSM.
82
-
83
-
#### Other Configuration Changes to Consider
84
-
In addition to disabling the NfApp associated with the old user cert-manager, other changes may be needed.
85
-
1. If any other NfApps have DependsOn references to the old user cert-manager NfApp, these references need to be removed.
86
-
2. If any other NfApps reference the old user cert-manager namespace value, these references need to change to the new azurehybridnetwork namespace value.
87
-
88
-
#### Cert-Manager Version Compatibility & Management
89
-
For the cert-manager operator, our current deployed version is 1.14.5. Users should test for compatibility with this version. Future cert-manager operator upgrades are supported via the NFO extension upgrade process.
90
-
91
-
For the CRD resources, our current deployed version is 1.14.5. Users should test for compatibility with this version. Since management of a common cluster CRD is something typically handled by a cluster administrator, we are working to enable CRD resource upgrades via standard Nexus Add-on process.
72
+
* NFO - A dedicated service account for the preupgrade job to safeguard against modifications to the existing network function extension service account.
73
+
* RP - The service principles (SPs) used for deploying site & Network Function (NF) now require “Microsoft.ExtendedLocation/customLocations/read” permission. The SP's that deploy day N scenario now require "Microsoft.Kubernetes/connectedClusters/listClusterUserCredentials/action" permission. This change can result in failed SNS deployments if not properly reconciled
74
+
* CVE - A total of five CVEs are addressed in this release.
0 commit comments