Skip to content

Commit 5a47301

Browse files
committed
OSSM-4104: Service Mesh 2.5 Release Notes
1 parent ae46819 commit 5a47301

File tree

5 files changed

+203
-10
lines changed

5 files changed

+203
-10
lines changed

_attributes/common-attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -168,8 +168,8 @@ endif::[]
168168
:product-rosa: Red Hat OpenShift Service on AWS
169169
:SMProductName: Red Hat OpenShift Service Mesh
170170
:SMProductShortName: Service Mesh
171-
:SMProductVersion: 2.4.5
172-
:MaistraVersion: 2.4
171+
:SMProductVersion: 2.5
172+
:MaistraVersion: 2.5
173173
//Service Mesh v1
174174
:SMProductVersion1x: 1.1.18.2
175175
//Windows containers

modules/ossm-rn-deprecated-features.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,17 @@ Deprecated functionality is still included in {product-title} and continues to b
1515

1616
Removed functionality no longer exists in the product.
1717

18+
[id="deprecated-removed-features-ossm-2-5"]
19+
== Deprecated and removed features in {SMProductName} 2.5
20+
21+
The v2.2 `ServiceMeshControlPlane` resource is no longer supported. Customers should update their mesh deployments to use a later version of the `ServiceMeshControlPlane` resource.
22+
23+
Support for the Jaeger Operator is deprecated. To collect trace spans, use the {DTProductName} (Tempo) Stack.
24+
25+
Support for the Elastic Search Operator is deprecated.
26+
27+
Istio will remove support for first-party JSON Web Tokens (JWTs). Istio will still support third-Party JWTs.
28+
1829
== Deprecated and removed features in {SMProductName} 2.4
1930

2031
The v2.1 `ServiceMeshControlPlane` resource is no longer supported. Customers should upgrade their mesh deployments to use a later version of the `ServiceMeshControlPlane` resource.

modules/ossm-rn-fixed-issues.adoc

Lines changed: 11 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,17 @@ Provide the following info for each issue if possible:
1616

1717
The following issue has been resolved in the current release:
1818

19+
* https://issues.redhat.com/browse/OSSM-1397[OSSM-1397] Previously, if you removed the `maistra.io/member-of` label from a namespace, the {SMProductShortName} Operator did not automatically reapply the label to the namespace. As a result, sidecar injection did not work in the namespace.
20+
+
21+
The Operator would reapply the label to the namespace when you made changes to the `ServiceMeshMember` object, which triggered the reconciliation of this member object.
22+
+
23+
Now, any change to the namespace also triggers the member object reconciliation.
24+
25+
The following issues have been resolved in previous releases:
26+
27+
[id="ossm-rn-fixed-issues-ossm_{context}"]
28+
== {SMProductShortName} fixed issues
29+
1930
* https://issues.redhat.com/browse/OSSM-3647[OSSM-3647] Previously, in the {SMProductShortName} control plane (SMCP) v2.2 (Istio 1.12), WasmPlugins were applied only to inbound listeners. Since SMCP v2.3 (Istio 1.14), WasmPlugins have been applied to inbound and outbound listeners by default, which introduced regression for users of the 3scale WasmPlugin. Now, the environment variable `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` is added, which allows safe migration from SMCP v2.2 to v2.3 and v2.4.
2031
+
2132
The following setting should be added to the SMCP config:
@@ -41,11 +52,6 @@ To ensure safe migration, perform the following steps:
4152
. Remove the previously-added environment variable.
4253
--
4354

44-
The following issues have been resolved in previous releases:
45-
46-
[id="ossm-rn-fixed-issues-ossm_{context}"]
47-
== {SMProductShortName} fixed issues
48-
4955
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
5056

5157
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.

modules/ossm-rn-known-issues.adoc

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,40 @@ endif::openshift-rosa[]
3636

3737
These are the known issues in {SMProductName}:
3838

39+
* https://issues.redhat.com/browse/OSSM-6099[OSSM-6099] Installing the OpenShift {SMProductShortName} Console (OSSMC) plugin fails on an IPv6 cluster.
40+
+
41+
Workaround: Install the OSSMC plugin on an IPv4 cluster.
42+
43+
* https://issues.redhat.com/browse/OSSM-5556[OSSM-5556] Gateways are skipped when istio-system labels do not match discovery selectors.
44+
+
45+
Workaround: Label the control plane namespace to match discovery selectors to avoid skipping the Gateway configurations.
46+
+
47+
.Example `ServiceMeshControlPlane` resource
48+
[source,YAML]
49+
----
50+
apiVersion: maistra.io/v2
51+
kind: ServiceMeshControlPlane
52+
metadata:
53+
name: basic
54+
namespace: istio-system
55+
spec:
56+
mode: ClusterWide
57+
meshConfig:
58+
discoverySelectors:
59+
- matchLabels:
60+
istio-discovery: enabled
61+
gateways:
62+
ingress:
63+
enabled: true
64+
----
65+
+
66+
Then, run the following command at the command line:
67+
+
68+
[source,terminal]
69+
----
70+
oc label namespace istio-system istio-discovery=enabled
71+
----
72+
3973
* https://issues.redhat.com/browse/OSSM-3890[OSSM-3890] Attempting to use the Gateway API in a multitenant mesh deployment generates an error message similar to the following:
4074
+
4175
[source,text]

modules/ossm-rn-new-features.adoc

Lines changed: 145 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,131 @@ Module included in the following assemblies:
1515

1616
This release adds improvements related to the following components and concepts.
1717

18+
[id="new-features-ossm-2-5"]
19+
== New features {SMProductName} version 2.5
20+
21+
This release of {SMProductName} adds new features, addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.
22+
23+
This release ends maintenance support for OpenShift {SMProductShortName} version 2.2. If you are using OpenShift {SMProductShortName} version 2.2, you should update to a supported version.
24+
25+
=== Component versions for {SMProductName} version 2.5
26+
27+
|===
28+
|Component |Version
29+
30+
|Istio
31+
|1.18.5
32+
33+
|Envoy Proxy
34+
|1.26.8
35+
36+
|Kiali
37+
|1.73.4
38+
|===
39+
40+
=== Istio 1.18 support
41+
42+
Service Mesh 2.5 is based on Istio 1.18, which brings in new features and product enhancements. While {SMProductName} supports many Istio 1.18 features, the following exceptions should be noted:
43+
44+
* Ambient mesh is not supported
45+
* QuickAssist Technology (QAT) PrivateKeyProvider in Istio is not supported
46+
47+
=== Cluster-Wide mesh migration
48+
49+
This release adds documentation for migrating from a multitenant mesh to a cluster-wide mesh. For more information, see the following documentation:
50+
51+
* "About migrating to a cluster-wide mesh"
52+
* "Excluding namespaces from a cluster-wide mesh"
53+
* "Defining which namespaces receive sidecar injection in a cluster-wide mesh"
54+
* "Excluding individual pods from a cluster-wide mesh"
55+
56+
=== {SMProductName} Operator on ARM-based clusters
57+
58+
This release provides the {SMProductName} Operator on ARM-based clusters as a generally available feature.
59+
60+
=== Integration with {DTProductName} (Tempo) Stack
61+
62+
This release introduces a generally available integration of the tracing extension provider(s). You can expose tracing data to the {DTProductName} (Tempo) stack by appending a named element and the `zipkin` provider to the `spec.meshConfig.extensionProviders` specification. Then, a telemetry custom resource configures Istio proxies to collect trace spans and send them to the Tempo distributor service endpoint.
63+
64+
[NOTE]
65+
====
66+
{DTProductName} (Tempo) Stack is not supported on {ibm-z-title}.
67+
====
68+
69+
=== OpenShift Service Mesh Console plugin
70+
71+
This release introduces a generally available version of the OpenShift {SMProductShortName} Console (OSSMC) plugin.
72+
73+
The OSSMC plugin is an extension to the OpenShift Console that provides visibility into your Service Mesh. With the OSSMC plugin installed, a new Service Mesh menu option is available in the left-hand navigation of the web console, as well as new Service Mesh tabs that enhance existing Workloads and Service console pages.
74+
75+
The features of the OSSMC plugin are very similar to those of the standalone Kiali Console. The OSSMC plugin does not replace the Kiali Console, and after installing the OSSMC plugin, you can still access the standalone Kiali Console.
76+
77+
=== Istio OpenShift Routing (IOR) default setting change
78+
79+
The default setting for Istio OpenShift Routing (IOR) has changed. Starting with this release, automatic routes are disabled by default for new instances of the `ServiceMeshControlPlane` resource.
80+
81+
For new instances of the `ServiceMeshControlPlane` resources, you can use automatic routes by setting the `enabled` field to `true` in the `gateways.openshiftRoute` specification of the `ServiceMeshControlPlane` resource.
82+
83+
.Example `ServiceMeshControlPlane` resource
84+
[source,yaml]
85+
----
86+
apiVersion: maistra.io/v2
87+
kind: ServiceMeshControlPlane
88+
spec:
89+
gateways:
90+
openshiftRoute:
91+
enabled: true
92+
----
93+
94+
When updating existing instances of the `ServiceMeshControlPlane` resource to {SMProductName} version 2.5, automatic routes remain enabled by default.
95+
96+
=== Istio proxy concurrency configuration enhancement
97+
98+
The `concurrency` parameter in the `networking.istio` API configures how many worker threads the Istio proxy runs.
99+
100+
For consistency across deployments, Istio now configures the `concurrency` parameter based upon the CPU limit allocated to the proxy container. For example, a limit of 2500m would set the `concurrency` parameter to `3`. If you set the `concurrency` parameter to a different value, then Istio uses that value to configure how many threads the proxy runs instead of using the CPU limit.
101+
102+
Previously, the default setting for the parameter was `2`.
103+
104+
=== Gateway API CRD versions
105+
:FeatureName: {product-title} Gateway API support
106+
include::snippets/technology-preview.adoc[]
107+
108+
A new version of the Gateway API custom resource definition (CRD) is now available. Refer to the following table to determine which Gateway API version should be installed with the OpenShift {SMProductShortName} version you are using:
109+
110+
|===
111+
|Service Mesh Version | Istio Version | Gateway API Version | Notes
112+
113+
|2.5.x
114+
|1.18.x
115+
|0.6.2
116+
|Use the experimental branch because `ReferenceGrand` is missing in v0.6.2
117+
118+
|2.4.x
119+
|1.16.x
120+
|0.5.1
121+
|For multitenant mesh deployment, all Gateway API CRDs must be present. Use the experimental branch.
122+
|===
123+
124+
[id="new-features-ossm-2-4-6"]
125+
== New features {SMProductName} version 2.4.6
126+
127+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.
128+
129+
=== Component versions for {SMProductName} version 2.4.6
130+
|===
131+
|Component |Version
132+
133+
|Istio
134+
|1.16.7
135+
136+
|Envoy Proxy
137+
|1.24.12
138+
139+
|Kiali
140+
|1.65.11
141+
|===
142+
18143
== New features {SMProductName} version 2.4.5
19144

20145
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
@@ -34,9 +159,6 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
34159
|Envoy Proxy
35160
|1.24.12
36161

37-
|Jaeger
38-
|1.47.0
39-
40162
|Kiali
41163
|1.65.11
42164
|===
@@ -286,6 +408,26 @@ endif::openshift-rosa[]
286408
* {SMProductShortName} on ARM64 architecture is not supported.
287409
* OpenTelemetry API remains a Technology Preview feature.
288410

411+
[id="new-features-ossm-2-3-10"]
412+
== New features {SMProductName} version 2.3.10
413+
//Update with 2.5
414+
415+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.
416+
417+
=== Component versions for {SMProductName} version 2.3.10
418+
|===
419+
|Component |Version
420+
421+
|Istio
422+
|1.14.5
423+
424+
|Envoy Proxy
425+
|1.22.11
426+
427+
|Kiali
428+
|1.57.14
429+
|===
430+
289431
== New features {SMProductName} version 2.3.9
290432
//Update with 2.4.5
291433

0 commit comments

Comments
 (0)