You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-rn-deprecated-features.adoc
+15Lines changed: 15 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,21 @@ Deprecated functionality is still included in {product-title} and continues to b
15
15
16
16
Removed functionality no longer exists in the product.
17
17
18
+
== Deprecated and removed features {SMProductName} 2.3
19
+
20
+
Support for the following cipher suites has been deprecated. In a future release, they will be removed from the default list of ciphers used in TLS negotiations on both the client and server sides.
21
+
22
+
* ECDHE-ECDSA-AES128-SHA
23
+
* ECDHE-RSA-AES128-SHA
24
+
* AES128-GCM-SHA256
25
+
* AES128-SHA
26
+
* ECDHE-ECDSA-AES256-SHA
27
+
* ECDHE-RSA-AES256-SHA
28
+
* AES256-GCM-SHA384
29
+
* AES256-SHA
30
+
31
+
The `ServiceMeshExtension` API, which was deprecated in {SMProductName} version 2.2, was removed in {SMProductName} version 2.3. If you are using the `ServiceMeshExtension` API, you must migrate to the `WasmPlugin` API to continue using your WebAssembly extensions.
32
+
18
33
== Deprecated features {SMProductName} 2.2
19
34
20
35
The `ServiceMeshExtension` API is deprecated as of release 2.2 and will be removed in a future release. While `ServiceMeshExtension` API is still supported in release 2.2, customers should start moving to the new `WasmPlugin` API.
Copy file name to clipboardExpand all lines: modules/ossm-rn-fixed-issues.adoc
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,6 +23,8 @@ The following issues been resolved in the current release:
23
23
+
24
24
Using {SMProductName} Operator 2.2 or 2.3, the SMMR controller no longer removes the namespaces from `SMMR.status.configuredMembers`. Instead, the controller adds the namespaces to `SMMR.status.pendingMembers` to indicate that they are not up-to-date. During reconciliation, as each namespace synchronizes with the SMCP, the namespace is automatically removed from `SMMR.status.pendingMembers`.
25
25
26
+
* https://issues.redhat.com/browse/OSSM-1962[OSSM-1962] Use `EndpointSlices` in federation controller. The federation controller now uses `EndpointSlices`, which improves scalability and performance in large deployments. The PILOT_USE_ENDPOINT_SLICE flag is enabled by default. Disabling the flag prevents use of federation deployments.
27
+
26
28
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668] A new field `spec.security.jwksResolverCA` was added to the Version 2.1 `SMCP` but was missing in the 2.2.0 and 2.2.1 releases. When upgrading from an Operator version where this field was present to an Operator version that was missing this field, the `.spec.security.jwksResolverCA` field was not available in the `SMCP`.
27
29
28
30
* https://issues.redhat.com/browse/OSSM-1325[OSSM-1325] istiod pod crashes and displays the following error message: `fatal error: concurrent map iteration and map write`.
Copy file name to clipboardExpand all lines: modules/ossm-rn-known-issues.adoc
+10Lines changed: 10 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,6 +34,16 @@ These are the known issues in {SMProductName}:
34
34
35
35
* link:https://github.com/istio/istio/issues/14743[Istio-14743] Due to limitations in the version of Istio that this release of {SMProductName} is based on, there may be applications that are currently incompatible with {SMProductShortName}. See the linked community issue for details.
36
36
37
+
* https://issues.redhat.com/browse/OSSM-2221[OSSM-2221] Gateway injection does not work in control plane namespace. If you use the Gateway injection feature to create a gateway in the same location as the control plane, the injection fails and OpenShift generates this message:
To create a gateway in the control plane namespace, use the `gateways` parameter in the SMCP spec to configure ingress and egress gateways for the mesh.
42
+
43
+
* https://issues.redhat.com/browse/OSSM-2042[OSSM-2042] Deployment of SMCP named `default` fails. If you are creating an SMCP object, and set its version field to v2.3, the name of the object cannot be `default`. If the name is `default`, then the control plane fails to deploy, and OpenShift generates a `Warning` event with the following message:
44
+
+
45
+
`Error processing component mesh-config: error: [mesh-config/templates/telemetryv2_1.6.yaml: Internal error occurred: failed calling webhook "rev.validation.istio.io": Post "https://istiod-default.istio-system.svc:443/validate?timeout=10s": x509: certificate is valid for istiod.istio-system.svc, istiod-remote.istio-system.svc, istio-pilot.istio-system.svc, not istiod-default.istio-system.svc, mesh-config/templates/enable-mesh-permissive.yaml`
46
+
37
47
//Keep OSSM-1655 in RN, closed as "explained" error is expected.
38
48
* https://issues.redhat.com/browse/OSSM-1655[OSSM-1655] Kiali dashboard shows error after enabling mTLS in `SMCP`.
Copy file name to clipboardExpand all lines: modules/ossm-rn-new-features.adoc
+132-2Lines changed: 132 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,13 +17,121 @@ This release adds improvements related to the following components and concepts.
17
17
18
18
== New features {SMProductName} version {SMProductVersion}
19
19
20
-
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
20
+
This release of {SMProductName} introduces new features, addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.9, 4.10, and 4.11.
21
21
22
22
=== Component versions included in {SMProductName} version {SMProductVersion}
23
23
24
24
|===
25
25
|Component |Version
26
26
27
+
|Istio
28
+
|1.14
29
+
30
+
|Envoy Proxy
31
+
|1.22.4
32
+
33
+
|Jaeger
34
+
|1.38
35
+
36
+
|Kiali
37
+
|1.57.3
38
+
|===
39
+
40
+
=== New Container Network Interface (CNI) DaemonSet container and ConfigMap
41
+
42
+
The `openshift-operators` namespace includes a new istio CNI DaemonSet `istio-cni-node-v2-3` and a new `ConfigMap` resource, `istio-cni-config-v2-3`.
43
+
44
+
When upgrading to Service Mesh Control Plane 2.3, the existing `istio-cni-node` DaemonSet is not changed, and a new `istio-cni-node-v2-3` DaemonSet is created.
45
+
46
+
This name change does not affect previous releases or any `istio-cni-node` CNI DaemonSet associated with a Service Mesh Control Plane deployed using a previous release.
47
+
48
+
=== Gateway injection support
49
+
50
+
This release introduces generally available support for Gateway injection. Gateway configurations are applied to standalone Envoy proxies that are running at the edge of the mesh, rather than the sidecar Envoy proxies running alongside your service workloads. This enables the ability to customize gateway options. When using gateway injection, you must create the following resources in the namespace where you want to run your gateway proxy: `Service`, `Deployment`, `Role`, and `RoleBinding`.
51
+
52
+
=== Istio 1.14 Support
53
+
54
+
{SMProductShortName} 2.3 is based on Istio 1.14, which brings in new features and product enhancements. While many Istio 1.14 features are supported, the following exceptions should be noted:
55
+
56
+
* ProxyConfig API is supported with the exception of the image field.
57
+
* Telemetry API is a Technology Preview feature.
58
+
* SPIRE runtime is not a supported feature.
59
+
60
+
=== OpenShift Service Mesh Console
61
+
62
+
This release introduces a Developer Preview version of the {product-title} Service Mesh Console, which integrates the Kiali interface directly into the OpenShift web console. For additional information, see link:https://cloud.redhat.com/blog/introducing-the-openshift-service-mesh-console-a-developer-preview[Introducing the OpenShift Service Mesh Console (A Developer Preview)]
63
+
64
+
=== Cluster-Wide deployment
65
+
66
+
This release introduces cluster-wide deployment as a Technology Preview feature. A cluster-wide deployment contains a Service Mesh Control Plane that monitors resources for an entire cluster. The control plane uses a single query across all namespaces to monitor each Istio or Kubernetes resource kind that affects the mesh configuration. In contrast, the multitenant approach uses a query per namespace for each resource kind. Reducing the number of queries the control plane performs in a cluster-wide deployment improves performance.
67
+
68
+
==== Configuring cluster-wide deployment
69
+
70
+
The following example `ServiceMeshControlPlane` object configures a cluster-wide deployment.
71
+
72
+
To create an SMCP for cluster-wide deployment, a user must belong to the `cluster-admin` ClusterRole. If the SMCP is configured for cluster-wide deployment, it must be the only SMCP in the cluster. You cannot change the control plane mode from multitenant to cluster-wide (or from cluster-wide to multitenant). If a multitenant control plane already exists, delete it and create a new one.
73
+
74
+
This example configures the SMCP for cluster-wide deployment.
75
+
76
+
[source,yaml]
77
+
----
78
+
apiVersion: maistra.io/v2
79
+
kind: ServiceMeshControlPlane
80
+
metadata:
81
+
name: cluster-wide
82
+
namespace: istio-system
83
+
spec:
84
+
version: v2.3
85
+
techPreview:
86
+
controlPlaneMode: ClusterScoped <1>
87
+
----
88
+
<1> Enables Istiod to monitor resources at the cluster level rather than monitor each individual namespace.
89
+
90
+
Additionally, the SMMR must also be configured for cluster-wide deployment. This example configures the SMMR for cluster-wide deployment.
91
+
92
+
[source,yaml]
93
+
----
94
+
apiVersion: maistra.io/v1
95
+
kind: ServiceMeshMemberRoll
96
+
metadata:
97
+
name: default
98
+
spec:
99
+
members:
100
+
- '*' <1>
101
+
----
102
+
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
103
+
104
+
== New features {SMProductName} version 2.2.4
105
+
106
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
107
+
108
+
=== Component versions included in {SMProductName} version 2.2.4
109
+
110
+
|===
111
+
|Component |Version
112
+
113
+
|Istio
114
+
|1.14
115
+
116
+
|Envoy Proxy
117
+
|1.20.8
118
+
119
+
|Jaeger
120
+
|1.36.14
121
+
122
+
|Kiali
123
+
|1.48.3
124
+
|===
125
+
126
+
== New features {SMProductName} version 2.2.3
127
+
128
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
129
+
130
+
=== Component versions included in {SMProductName} version 2.2.3
131
+
132
+
|===
133
+
|Component |Version
134
+
27
135
|Istio
28
136
|1.12.9
29
137
@@ -108,7 +216,7 @@ This release of {SMProductName} adds new features and enhancements, and is suppo
108
216
|===
109
217
110
218
=== `WasmPlugin` API
111
-
This release adds support for the `WasmPlugin` API and deprecates the `ServiceMeshExtention` API.
219
+
This release adds support for the `WasmPlugin` API and deprecates the `ServiceMeshExtension` API.
112
220
113
221
=== ROSA support
114
222
This release introduces service mesh support for Red Hat OpenShift on AWS (ROSA), including multi-cluster federation.
@@ -153,6 +261,28 @@ spec:
153
261
----
154
262
Restricting route attachment on Gateway API listeners is possible using the `SameNamespace` or `All` settings. Istio ignores usage of label selectors in `listeners.allowedRoutes.namespaces` and reverts to the default behavior (`SameNamespace`).
155
263
264
+
== New features {SMProductName} 2.1.5.2
265
+
266
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
267
+
268
+
=== Component versions included in {SMProductName} version 2.1.5.2
269
+
270
+
|===
271
+
|Component |Version
272
+
273
+
|Istio
274
+
|1.14
275
+
276
+
|Envoy Proxy
277
+
|1.17.5
278
+
279
+
|Jaeger
280
+
|1.36
281
+
282
+
|Kiali
283
+
|1.24.17
284
+
|===
285
+
156
286
== New features {SMProductName} 2.1.5.1
157
287
158
288
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
Copy file name to clipboardExpand all lines: modules/ossm-rn-technology-preview.adoc
-19Lines changed: 0 additions & 19 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,22 +13,3 @@ Some features in this release are currently in Technology Preview. These experim
13
13
Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production.
14
14
These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. For more information about the support scope of Red Hat Technology Preview features, see the link:https://access.redhat.com/support/offerings/techpreview/[Technology Preview Support Scope].
0 commit comments