Skip to content

Commit 666e243

Browse files
authored
Merge pull request #51715 from rh-tokeefe/OSSMDOC-582
OSSMDOC-582: Service Mesh 2.3 release notes
2 parents 963c530 + 7bdd12e commit 666e243

7 files changed

+162
-24
lines changed

_attributes/common-attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -132,8 +132,8 @@ endif::[]
132132
:product-dedicated: Red Hat OpenShift Dedicated
133133
:SMProductName: Red Hat OpenShift Service Mesh
134134
:SMProductShortName: Service Mesh
135-
:SMProductVersion: 2.2.3
136-
:MaistraVersion: 2.2
135+
:SMProductVersion: 2.3
136+
:MaistraVersion: 2.3
137137
//Service Mesh v1
138138
:SMProductVersion1x: 1.1.18.2
139139
//Windows containers

modules/ossm-rn-deprecated-features.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,21 @@ Deprecated functionality is still included in {product-title} and continues to b
1515

1616
Removed functionality no longer exists in the product.
1717

18+
== Deprecated and removed features {SMProductName} 2.3
19+
20+
Support for the following cipher suites has been deprecated. In a future release, they will be removed from the default list of ciphers used in TLS negotiations on both the client and server sides.
21+
22+
* ECDHE-ECDSA-AES128-SHA
23+
* ECDHE-RSA-AES128-SHA
24+
* AES128-GCM-SHA256
25+
* AES128-SHA
26+
* ECDHE-ECDSA-AES256-SHA
27+
* ECDHE-RSA-AES256-SHA
28+
* AES256-GCM-SHA384
29+
* AES256-SHA
30+
31+
The `ServiceMeshExtension` API, which was deprecated in {SMProductName} version 2.2, was removed in {SMProductName} version 2.3. If you are using the `ServiceMeshExtension` API, you must migrate to the `WasmPlugin` API to continue using your WebAssembly extensions.
32+
1833
== Deprecated features {SMProductName} 2.2
1934

2035
The `ServiceMeshExtension` API is deprecated as of release 2.2 and will be removed in a future release. While `ServiceMeshExtension` API is still supported in release 2.2, customers should start moving to the new `WasmPlugin` API.

modules/ossm-rn-fixed-issues.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,8 @@ The following issues been resolved in the current release:
2323
+
2424
Using {SMProductName} Operator 2.2 or 2.3, the SMMR controller no longer removes the namespaces from `SMMR.status.configuredMembers`. Instead, the controller adds the namespaces to `SMMR.status.pendingMembers` to indicate that they are not up-to-date. During reconciliation, as each namespace synchronizes with the SMCP, the namespace is automatically removed from `SMMR.status.pendingMembers`.
2525

26+
* https://issues.redhat.com/browse/OSSM-1962[OSSM-1962] Use `EndpointSlices` in federation controller. The federation controller now uses `EndpointSlices`, which improves scalability and performance in large deployments. The PILOT_USE_ENDPOINT_SLICE flag is enabled by default. Disabling the flag prevents use of federation deployments.
27+
2628
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668] A new field `spec.security.jwksResolverCA` was added to the Version 2.1 `SMCP` but was missing in the 2.2.0 and 2.2.1 releases. When upgrading from an Operator version where this field was present to an Operator version that was missing this field, the `.spec.security.jwksResolverCA` field was not available in the `SMCP`.
2729

2830
* https://issues.redhat.com/browse/OSSM-1325[OSSM-1325] istiod pod crashes and displays the following error message: `fatal error: concurrent map iteration and map write`.

modules/ossm-rn-known-issues.adoc

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,16 @@ These are the known issues in {SMProductName}:
3434

3535
* link:https://github.com/istio/istio/issues/14743[Istio-14743] Due to limitations in the version of Istio that this release of {SMProductName} is based on, there may be applications that are currently incompatible with {SMProductShortName}. See the linked community issue for details.
3636

37+
* https://issues.redhat.com/browse/OSSM-2221[OSSM-2221] Gateway injection does not work in control plane namespace. If you use the Gateway injection feature to create a gateway in the same location as the control plane, the injection fails and OpenShift generates this message:
38+
+
39+
`Warning Failed 10s kubelet, ocp-wide-vh8fd-worker-vhqm9 Failed to pull image "auto": rpc error: code = Unknown desc = reading manifest latest in docker.io/library/auto: errors`
40+
+
41+
To create a gateway in the control plane namespace, use the `gateways` parameter in the SMCP spec to configure ingress and egress gateways for the mesh.
42+
43+
* https://issues.redhat.com/browse/OSSM-2042[OSSM-2042] Deployment of SMCP named `default` fails. If you are creating an SMCP object, and set its version field to v2.3, the name of the object cannot be `default`. If the name is `default`, then the control plane fails to deploy, and OpenShift generates a `Warning` event with the following message:
44+
+
45+
`Error processing component mesh-config: error: [mesh-config/templates/telemetryv2_1.6.yaml: Internal error occurred: failed calling webhook "rev.validation.istio.io": Post "https://istiod-default.istio-system.svc:443/validate?timeout=10s": x509: certificate is valid for istiod.istio-system.svc, istiod-remote.istio-system.svc, istio-pilot.istio-system.svc, not istiod-default.istio-system.svc, mesh-config/templates/enable-mesh-permissive.yaml`
46+
3747
//Keep OSSM-1655 in RN, closed as "explained" error is expected.
3848
* https://issues.redhat.com/browse/OSSM-1655[OSSM-1655] Kiali dashboard shows error after enabling mTLS in `SMCP`.
3949
+

modules/ossm-rn-new-features.adoc

Lines changed: 132 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,13 +17,121 @@ This release adds improvements related to the following components and concepts.
1717

1818
== New features {SMProductName} version {SMProductVersion}
1919

20-
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
20+
This release of {SMProductName} introduces new features, addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.9, 4.10, and 4.11.
2121

2222
=== Component versions included in {SMProductName} version {SMProductVersion}
2323

2424
|===
2525
|Component |Version
2626

27+
|Istio
28+
|1.14
29+
30+
|Envoy Proxy
31+
|1.22.4
32+
33+
|Jaeger
34+
|1.38
35+
36+
|Kiali
37+
|1.57.3
38+
|===
39+
40+
=== New Container Network Interface (CNI) DaemonSet container and ConfigMap
41+
42+
The `openshift-operators` namespace includes a new istio CNI DaemonSet `istio-cni-node-v2-3` and a new `ConfigMap` resource, `istio-cni-config-v2-3`.
43+
44+
When upgrading to Service Mesh Control Plane 2.3, the existing `istio-cni-node` DaemonSet is not changed, and a new `istio-cni-node-v2-3` DaemonSet is created.
45+
46+
This name change does not affect previous releases or any `istio-cni-node` CNI DaemonSet associated with a Service Mesh Control Plane deployed using a previous release.
47+
48+
=== Gateway injection support
49+
50+
This release introduces generally available support for Gateway injection. Gateway configurations are applied to standalone Envoy proxies that are running at the edge of the mesh, rather than the sidecar Envoy proxies running alongside your service workloads. This enables the ability to customize gateway options. When using gateway injection, you must create the following resources in the namespace where you want to run your gateway proxy: `Service`, `Deployment`, `Role`, and `RoleBinding`.
51+
52+
=== Istio 1.14 Support
53+
54+
{SMProductShortName} 2.3 is based on Istio 1.14, which brings in new features and product enhancements. While many Istio 1.14 features are supported, the following exceptions should be noted:
55+
56+
* ProxyConfig API is supported with the exception of the image field.
57+
* Telemetry API is a Technology Preview feature.
58+
* SPIRE runtime is not a supported feature.
59+
60+
=== OpenShift Service Mesh Console
61+
62+
This release introduces a Developer Preview version of the {product-title} Service Mesh Console, which integrates the Kiali interface directly into the OpenShift web console. For additional information, see link:https://cloud.redhat.com/blog/introducing-the-openshift-service-mesh-console-a-developer-preview[Introducing the OpenShift Service Mesh Console (A Developer Preview)]
63+
64+
=== Cluster-Wide deployment
65+
66+
This release introduces cluster-wide deployment as a Technology Preview feature. A cluster-wide deployment contains a Service Mesh Control Plane that monitors resources for an entire cluster. The control plane uses a single query across all namespaces to monitor each Istio or Kubernetes resource kind that affects the mesh configuration. In contrast, the multitenant approach uses a query per namespace for each resource kind. Reducing the number of queries the control plane performs in a cluster-wide deployment improves performance.
67+
68+
==== Configuring cluster-wide deployment
69+
70+
The following example `ServiceMeshControlPlane` object configures a cluster-wide deployment.
71+
72+
To create an SMCP for cluster-wide deployment, a user must belong to the `cluster-admin` ClusterRole. If the SMCP is configured for cluster-wide deployment, it must be the only SMCP in the cluster. You cannot change the control plane mode from multitenant to cluster-wide (or from cluster-wide to multitenant). If a multitenant control plane already exists, delete it and create a new one.
73+
74+
This example configures the SMCP for cluster-wide deployment.
75+
76+
[source,yaml]
77+
----
78+
apiVersion: maistra.io/v2
79+
kind: ServiceMeshControlPlane
80+
metadata:
81+
name: cluster-wide
82+
namespace: istio-system
83+
spec:
84+
version: v2.3
85+
techPreview:
86+
controlPlaneMode: ClusterScoped <1>
87+
----
88+
<1> Enables Istiod to monitor resources at the cluster level rather than monitor each individual namespace.
89+
90+
Additionally, the SMMR must also be configured for cluster-wide deployment. This example configures the SMMR for cluster-wide deployment.
91+
92+
[source,yaml]
93+
----
94+
apiVersion: maistra.io/v1
95+
kind: ServiceMeshMemberRoll
96+
metadata:
97+
name: default
98+
spec:
99+
members:
100+
- '*' <1>
101+
----
102+
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
103+
104+
== New features {SMProductName} version 2.2.4
105+
106+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
107+
108+
=== Component versions included in {SMProductName} version 2.2.4
109+
110+
|===
111+
|Component |Version
112+
113+
|Istio
114+
|1.14
115+
116+
|Envoy Proxy
117+
|1.20.8
118+
119+
|Jaeger
120+
|1.36.14
121+
122+
|Kiali
123+
|1.48.3
124+
|===
125+
126+
== New features {SMProductName} version 2.2.3
127+
128+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
129+
130+
=== Component versions included in {SMProductName} version 2.2.3
131+
132+
|===
133+
|Component |Version
134+
27135
|Istio
28136
|1.12.9
29137

@@ -108,7 +216,7 @@ This release of {SMProductName} adds new features and enhancements, and is suppo
108216
|===
109217

110218
=== `WasmPlugin` API
111-
This release adds support for the `WasmPlugin` API and deprecates the `ServiceMeshExtention` API.
219+
This release adds support for the `WasmPlugin` API and deprecates the `ServiceMeshExtension` API.
112220

113221
=== ROSA support
114222
This release introduces service mesh support for Red Hat OpenShift on AWS (ROSA), including multi-cluster federation.
@@ -153,6 +261,28 @@ spec:
153261
----
154262
Restricting route attachment on Gateway API listeners is possible using the `SameNamespace` or `All` settings. Istio ignores usage of label selectors in `listeners.allowedRoutes.namespaces` and reverts to the default behavior (`SameNamespace`).
155263

264+
== New features {SMProductName} 2.1.5.2
265+
266+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
267+
268+
=== Component versions included in {SMProductName} version 2.1.5.2
269+
270+
|===
271+
|Component |Version
272+
273+
|Istio
274+
|1.14
275+
276+
|Envoy Proxy
277+
|1.17.5
278+
279+
|Jaeger
280+
|1.36
281+
282+
|Kiali
283+
|1.24.17
284+
|===
285+
156286
== New features {SMProductName} 2.1.5.1
157287

158288
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.

modules/ossm-rn-technology-preview.adoc

Lines changed: 0 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -13,22 +13,3 @@ Some features in this release are currently in Technology Preview. These experim
1313
Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production.
1414
These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. For more information about the support scope of Red Hat Technology Preview features, see the link:https://access.redhat.com/support/offerings/techpreview/[Technology Preview Support Scope].
1515
====
16-
17-
[id="istio-compatibility-support-matrix_{context}"]
18-
== Istio compatibility and support matrix
19-
20-
In the table, features are marked with the following statuses:
21-
22-
- *TP*: _Technology Preview_
23-
24-
- *GA*: _General Availability_
25-
26-
Note the following scope of support on the Red Hat Customer Portal for these features:
27-
28-
.Istio compatibility and support matrix
29-
[cols="1,1,1,4",options="header"]
30-
|===
31-
| Feature | Istio Version | Support Status | Description
32-
| holdApplicationUntilProxyStarts | 1.7 | TP | Blocks application container startup until proxy is running
33-
| DNS capture | 1.8 | GA | Enabled by default
34-
|===

modules/ossm-vs-istio.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,7 @@ The Operator annotates the default gateways to indicate that they are generated
139139
[id="ossm-multicluster-configuration_{context}"]
140140
== Multicluster configurations
141141

142-
{SMProductName} does not provide support for multicluster configurations.
142+
{SMProductName} support for multicluster configurations is limited to the federation of service meshes across multiple clusters.
143143

144144
[id="ossm-certificate-signing-request_{context}"]
145145
== Custom Certificate Signing Requests (CSR)

0 commit comments

Comments
 (0)