You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-rn-deprecated-features.adoc
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,17 @@ Deprecated functionality is still included in {product-title} and continues to b
15
15
16
16
Removed functionality no longer exists in the product.
17
17
18
+
[id="deprecated-removed-features-ossm-2-5"]
19
+
== Deprecated and removed features in {SMProductName} 2.5
20
+
21
+
The v2.2 `ServiceMeshControlPlane` resource is no longer supported. Customers should update their mesh deployments to use a later version of the `ServiceMeshControlPlane` resource.
22
+
23
+
Support for the Jaeger Operator is deprecated. To collect trace spans, use the {DTProductName} (Tempo) Stack.
24
+
25
+
Support for the Elastic Search Operator is deprecated.
26
+
27
+
Istio will remove support for first-party JSON Web Tokens (JWTs). Istio will still support third-Party JWTs.
28
+
18
29
== Deprecated and removed features in {SMProductName} 2.4
19
30
20
31
The v2.1 `ServiceMeshControlPlane` resource is no longer supported. Customers should upgrade their mesh deployments to use a later version of the `ServiceMeshControlPlane` resource.
Copy file name to clipboardExpand all lines: modules/ossm-rn-fixed-issues.adoc
+11-5Lines changed: 11 additions & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -16,6 +16,17 @@ Provide the following info for each issue if possible:
16
16
17
17
The following issue has been resolved in the current release:
18
18
19
+
* https://issues.redhat.com/browse/OSSM-1397[OSSM-1397] Previously, if you removed the `maistra.io/member-of` label from a namespace, the {SMProductShortName} Operator did not automatically reapply the label to the namespace. As a result, sidecar injection did not work in the namespace.
20
+
+
21
+
The Operator would reapply the label to the namespace when you made changes to the `ServiceMeshMember` object, which triggered the reconciliation of this member object.
22
+
+
23
+
Now, any change to the namespace also triggers the member object reconciliation.
24
+
25
+
The following issues have been resolved in previous releases:
26
+
27
+
[id="ossm-rn-fixed-issues-ossm_{context}"]
28
+
== {SMProductShortName} fixed issues
29
+
19
30
* https://issues.redhat.com/browse/OSSM-3647[OSSM-3647] Previously, in the {SMProductShortName} control plane (SMCP) v2.2 (Istio 1.12), WasmPlugins were applied only to inbound listeners. Since SMCP v2.3 (Istio 1.14), WasmPlugins have been applied to inbound and outbound listeners by default, which introduced regression for users of the 3scale WasmPlugin. Now, the environment variable `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` is added, which allows safe migration from SMCP v2.2 to v2.3 and v2.4.
20
31
+
21
32
The following setting should be added to the SMCP config:
@@ -41,11 +52,6 @@ To ensure safe migration, perform the following steps:
41
52
. Remove the previously-added environment variable.
42
53
--
43
54
44
-
The following issues have been resolved in previous releases:
45
-
46
-
[id="ossm-rn-fixed-issues-ossm_{context}"]
47
-
== {SMProductShortName} fixed issues
48
-
49
55
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
50
56
51
57
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
* https://issues.redhat.com/browse/OSSM-3890[OSSM-3890] Attempting to use the Gateway API in a multitenant mesh deployment generates an error message similar to the following:
Copy file name to clipboardExpand all lines: modules/ossm-rn-new-features.adoc
+145-3Lines changed: 145 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,131 @@ Module included in the following assemblies:
15
15
16
16
This release adds improvements related to the following components and concepts.
17
17
18
+
[id="new-features-ossm-2-5"]
19
+
== New features {SMProductName} version 2.5
20
+
21
+
This release of {SMProductName} adds new features, addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.
22
+
23
+
This release ends maintenance support for OpenShift {SMProductShortName} version 2.2. If you are using OpenShift {SMProductShortName} version 2.2, you should update to a supported version.
24
+
25
+
=== Component versions for {SMProductName} version 2.5
26
+
27
+
|===
28
+
|Component |Version
29
+
30
+
|Istio
31
+
|1.18.5
32
+
33
+
|Envoy Proxy
34
+
|1.26.8
35
+
36
+
|Kiali
37
+
|1.73.4
38
+
|===
39
+
40
+
=== Istio 1.18 support
41
+
42
+
Service Mesh 2.5 is based on Istio 1.18, which brings in new features and product enhancements. While {SMProductName} supports many Istio 1.18 features, the following exceptions should be noted:
43
+
44
+
* Ambient mesh is not supported
45
+
* QuickAssist Technology (QAT) PrivateKeyProvider in Istio is not supported
46
+
47
+
=== Cluster-Wide mesh migration
48
+
49
+
This release adds documentation for migrating from a multitenant mesh to a cluster-wide mesh. For more information, see the following documentation:
50
+
51
+
* "About migrating to a cluster-wide mesh"
52
+
* "Excluding namespaces from a cluster-wide mesh"
53
+
* "Defining which namespaces receive sidecar injection in a cluster-wide mesh"
54
+
* "Excluding individual pods from a cluster-wide mesh"
55
+
56
+
=== {SMProductName} Operator on ARM-based clusters
57
+
58
+
This release provides the {SMProductName} Operator on ARM-based clusters as a generally available feature.
59
+
60
+
=== Integration with {DTProductName} (Tempo) Stack
61
+
62
+
This release introduces a generally available integration of the tracing extension provider(s). You can expose tracing data to the {DTProductName} (Tempo) stack by appending a named element and the `zipkin` provider to the `spec.meshConfig.extensionProviders` specification. Then, a telemetry custom resource configures Istio proxies to collect trace spans and send them to the Tempo distributor service endpoint.
63
+
64
+
[NOTE]
65
+
====
66
+
{DTProductName} (Tempo) Stack is not supported on {ibm-z-title}.
67
+
====
68
+
69
+
=== OpenShift Service Mesh Console plugin
70
+
71
+
This release introduces a generally available version of the OpenShift {SMProductShortName} Console (OSSMC) plugin.
72
+
73
+
The OSSMC plugin is an extension to the OpenShift Console that provides visibility into your Service Mesh. With the OSSMC plugin installed, a new Service Mesh menu option is available in the left-hand navigation of the web console, as well as new Service Mesh tabs that enhance existing Workloads and Service console pages.
74
+
75
+
The features of the OSSMC plugin are very similar to those of the standalone Kiali Console. The OSSMC plugin does not replace the Kiali Console, and after installing the OSSMC plugin, you can still access the standalone Kiali Console.
The default setting for Istio OpenShift Routing (IOR) has changed. Starting with this release, automatic routes are disabled by default for new instances of the `ServiceMeshControlPlane` resource.
80
+
81
+
For new instances of the `ServiceMeshControlPlane` resources, you can use automatic routes by setting the `enabled` field to `true` in the `gateways.openshiftRoute` specification of the `ServiceMeshControlPlane` resource.
82
+
83
+
.Example `ServiceMeshControlPlane` resource
84
+
[source,yaml]
85
+
----
86
+
apiVersion: maistra.io/v2
87
+
kind: ServiceMeshControlPlane
88
+
spec:
89
+
gateways:
90
+
openshiftRoute:
91
+
enabled: true
92
+
----
93
+
94
+
When updating existing instances of the `ServiceMeshControlPlane` resource to {SMProductName} version 2.5, automatic routes remain enabled by default.
The `concurrency` parameter in the `networking.istio` API configures how many worker threads the Istio proxy runs.
99
+
100
+
For consistency across deployments, Istio now configures the `concurrency` parameter based upon the CPU limit allocated to the proxy container. For example, a limit of 2500m would set the `concurrency` parameter to `3`. If you set the `concurrency` parameter to a different value, then Istio uses that value to configure how many threads the proxy runs instead of using the CPU limit.
101
+
102
+
Previously, the default setting for the parameter was `2`.
103
+
104
+
=== Gateway API CRD versions
105
+
:FeatureName: {product-title} Gateway API support
106
+
include::snippets/technology-preview.adoc[]
107
+
108
+
A new version of the Gateway API custom resource definition (CRD) is now available. Refer to the following table to determine which Gateway API version should be installed with the OpenShift {SMProductShortName} version you are using:
109
+
110
+
|===
111
+
|Service Mesh Version | Istio Version | Gateway API Version | Notes
112
+
113
+
|2.5.x
114
+
|1.18.x
115
+
|0.6.2
116
+
|Use the experimental branch because `ReferenceGrand` is missing in v0.6.2
117
+
118
+
|2.4.x
119
+
|1.16.x
120
+
|0.5.1
121
+
|For multitenant mesh deployment, all Gateway API CRDs must be present. Use the experimental branch.
122
+
|===
123
+
124
+
[id="new-features-ossm-2-4-6"]
125
+
== New features {SMProductName} version 2.4.6
126
+
127
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.
128
+
129
+
=== Component versions for {SMProductName} version 2.4.6
130
+
|===
131
+
|Component |Version
132
+
133
+
|Istio
134
+
|1.16.7
135
+
136
+
|Envoy Proxy
137
+
|1.24.12
138
+
139
+
|Kiali
140
+
|1.65.11
141
+
|===
142
+
18
143
== New features {SMProductName} version 2.4.5
19
144
20
145
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
@@ -34,9 +159,6 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
34
159
|Envoy Proxy
35
160
|1.24.12
36
161
37
-
|Jaeger
38
-
|1.47.0
39
-
40
162
|Kiali
41
163
|1.65.11
42
164
|===
@@ -286,6 +408,26 @@ endif::openshift-rosa[]
286
408
* {SMProductShortName} on ARM64 architecture is not supported.
287
409
* OpenTelemetry API remains a Technology Preview feature.
288
410
411
+
[id="new-features-ossm-2-3-10"]
412
+
== New features {SMProductName} version 2.3.10
413
+
//Update with 2.5
414
+
415
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.
416
+
417
+
=== Component versions for {SMProductName} version 2.3.10
0 commit comments