You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-rn-fixed-issues.adoc
+12Lines changed: 12 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -21,6 +21,18 @@ The following issues been resolved in the current release:
21
21
22
22
* https://issues.redhat.com/browse/OSSM-3025[OSSM-3025] Istiod sometimes fails to become ready. Sometimes, when a mesh contained many member namespaces, the Istiod pod did not become ready due to a deadlock within Istiod. The deadlock is now resolved and the pod now starts as expected.
23
23
24
+
* https://issues.redhat.com/browse/OSSM-2493[OSSM-2493] Default `nodeSelector` and `tolerations` in SMCP not passed to Kiali. The `nodeSelector` and `tolerations` you add to `SMCP.spec.runtime.defaults` are now passed to the Kiali resource.
25
+
26
+
* https://issues.redhat.com/browse/OSSM-2492[OSSM-2492] Default tolerations in SMCP not passed to Jaeger. The `nodeSelector` and `tolerations` you add to `SMCP.spec.runtime.defaults` are now passed to the Jaeger resource.
27
+
28
+
* https://issues.redhat.com/browse/OSSM-2374[OSSM-2374] If you deleted one of the `ServiceMeshMember` resources, then the Service Mesh operator deleted the `ServiceMeshMemberRoll`. While this is expected behavior when you delete the last `ServiceMeshMember`, the operator should not delete the `ServiceMeshMemberRoll` if it contains any members in addition to the one that was deleted. This issue is now fixed and the operator only deletes the ServiceMeshMemberRoll when the last `ServiceMeshMember` resource is deleted.
29
+
30
+
* https://issues.redhat.com/browse/OSSM-2373[OSSM-2373] Error trying to get OAuth metadata when logging in. To fetch the cluster version, the `system:anonymous` account is used. With the cluster's default bundled ClusterRoles and ClusterRoleBinding, the anonymous account can fetch the version correctly. If the `system:anonymous` account loses its privileges to fetch the cluster version, OpenShift authentication becomes unusable.
31
+
+
32
+
This is fixed by using the Kiali SA to fetch the cluster version. This also allows for improved security on the cluster.
33
+
34
+
* https://issues.redhat.com/browse/OSSM-2371[OSSM-2371] Despite Kiali being configured as "view-only," a user can change the proxy logging level via the Workload details' Logs tab's kebab menu. This issue has been fixed so the options under "Set Proxy Log Level" are disabled when Kiali is configured as "view-only."
35
+
24
36
* https://issues.redhat.com/browse/OSSM-2344[OSSM-2344] Restarting Istiod causes Kiali to flood CRI-O with port-forward requests. This issue occurred when Kiali could not connect to Istiod and Kiali simultaneously issued a large number of requests to istiod. Kiali now limits the number of requests it sends to istiod.
25
37
26
38
* https://issues.redhat.com/browse/OSSM-2335[OSSM-2335] Dragging the mouse pointer over the Traces scatterchart plot sometimes caused the Kiali console to stop responding due to concurrent backend requests.
Copy file name to clipboardExpand all lines: modules/ossm-rn-new-features.adoc
+46-2Lines changed: 46 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,11 +15,33 @@ Module included in the following assemblies:
15
15
16
16
This release adds improvements related to the following components and concepts.
17
17
18
+
== New features {SMProductName} version 2.3.2
19
+
20
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.9 or later.
21
+
22
+
=== Component versions included in {SMProductName} version 2.3.2
23
+
24
+
|===
25
+
|Component |Version
26
+
27
+
|Istio
28
+
|1.14.5
29
+
30
+
|Envoy Proxy
31
+
|1.22.7
32
+
33
+
|Jaeger
34
+
|1.39
35
+
36
+
|Kiali
37
+
|1.57.6
38
+
|===
39
+
18
40
== New features {SMProductName} version 2.3.1
19
41
20
42
This release of {SMProductName} introduces new features, addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.9 or later.
21
43
22
-
=== Component versions included in {SMProductName} version {SMProductVersion}
44
+
=== Component versions included in {SMProductName} version 2.3.1
23
45
24
46
|===
25
47
|Component |Version
@@ -125,6 +147,28 @@ Additionally, the SMMR must also be configured for cluster-wide deployment. This
125
147
----
126
148
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
127
149
150
+
== New features {SMProductName} version 2.2.6
151
+
152
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.9 or later.
153
+
154
+
=== Component versions included in {SMProductName} version 2.2.6
155
+
156
+
|===
157
+
|Component |Version
158
+
159
+
|Istio
160
+
|1.12.9
161
+
162
+
|Envoy Proxy
163
+
|1.20.8
164
+
165
+
|Jaeger
166
+
|1.39
167
+
168
+
|Kiali
169
+
|1.48.4
170
+
|===
171
+
128
172
== New features {SMProductName} version 2.2.5
129
173
130
174
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.9 or later.
@@ -355,7 +399,7 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
0 commit comments