Skip to content

Commit a5beedf

Browse files
authored
Merge pull request #49341 from rh-tokeefe/OSSMDOC-517
OSSMDOC-517: service mesh 2.2.2 z stream release notes
2 parents d9a10aa + 23fe09b commit a5beedf

File tree

4 files changed

+76
-9
lines changed

4 files changed

+76
-9
lines changed

_attributes/common-attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -126,7 +126,7 @@ endif::[]
126126
:product-dedicated: Red Hat OpenShift Dedicated
127127
:SMProductName: Red Hat OpenShift Service Mesh
128128
:SMProductShortName: Service Mesh
129-
:SMProductVersion: 2.2.1
129+
:SMProductVersion: 2.2.2
130130
:MaistraVersion: 2.2
131131
//Service Mesh v1
132132
:SMProductVersion1x: 1.1.18.2

modules/ossm-rn-fixed-issues.adoc

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,13 +19,14 @@ The following issues been resolved in the current release:
1919
[id="ossm-rn-fixed-issues-ossm_{context}"]
2020
== {SMProductShortName} fixed issues
2121

22+
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668] A new field `spec.security.jwksResolverCA` was added to the Version 2.1 `SMCP` but was missing in the 2.2.0 and 2.2.1 releases. When upgrading from an Operator version where this field was present to an Operator version that was missing this field, the `.spec.security.jwksResolverCA` field was not available in the `SMCP`.
23+
2224
* https://issues.redhat.com/browse/OSSM-1325[OSSM-1325] istiod pod crashes and displays the following error message: `fatal error: concurrent map iteration and map write`.
2325

2426
* https://issues.redhat.com/browse/OSSM-1211[OSSM-1211]
2527
Configuring Federated service meshes for failover does not work as expected.
2628
+
2729
The Istiod pilot log displays the following error: `envoy connection [C289] TLS error: 337047686:SSL routines:tls_process_server_certificate:certificate verify failed`
28-
+
2930

3031
* https://issues.redhat.com/browse/OSSM-1099[OSSM-1099]
3132
The Kiali console displayed the message `Sorry, there was a problem. Try a refresh or navigate to a different page.`

modules/ossm-rn-known-issues.adoc

Lines changed: 1 addition & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -34,10 +34,6 @@ These are the known issues in {SMProductName}:
3434

3535
* link:https://github.com/istio/istio/issues/14743[Istio-14743] Due to limitations in the version of Istio that this release of {SMProductName} is based on, there may be applications that are currently incompatible with {SMProductShortName}. See the linked community issue for details.
3636

37-
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668] A new field `spec.security.jwksResolverCA` was added to the Version 2.1 `SMCP` but is missing in the 2.2.0 and 2.2.1 releases. When upgrading from an Operator version where this field was present to an Operator version that is missing this field, the `.spec.security.jwksResolverCA` field is not available in the `SMCP`.
38-
+
39-
Workaround: To enable additional JSON Web Key Set CA certificates when using an Operator version that is missing `spec.security.jwksResolverCA`, the workaround is to use the `spec.techPreview jwksResolverExtraRootCA` field.
40-
4137
//Keep OSSM-1655 in RN, closed as "explained" error is expected.
4238
* https://issues.redhat.com/browse/OSSM-1655[OSSM-1655] Kiali dashboard shows error after enabling mTLS in `SMCP`.
4339
+
@@ -57,7 +53,7 @@ For more information, see Migrating from `ServiceMeshExtension` to `WasmPlugin`
5753
Workaround: Disable the gateway creation in the SMCP spec and manage the gateway deployment entirely manually (including Service, Role and RoleBinding).
5854

5955
//Keep OSSM-882 in RN to document the workaround
60-
* https://issues.redhat.com/browse/OSSM-882[OSSM-882] Namespace is in the accessible_namespace list but does not appear in Kiali UI. By default, Kiali will not show any namespaces that start with "kube" because these namespaces are typically internal-use only and not part of a mesh.
56+
* https://issues.redhat.com/browse/OSSM-882[OSSM-882] This applies for {SMProductShortName} 2.1 and earlier. Namespace is in the accessible_namespace list but does not appear in Kiali UI. By default, Kiali will not show any namespaces that start with "kube" because these namespaces are typically internal-use only and not part of a mesh.
6157
+
6258
For example, if you create a namespace called 'akube-a' and add it to the Service Mesh member roll, then the Kiali UI does not display the namespace. For defined exclusion patterns, the software excludes namespaces that start with or contain the pattern.
6359
+

modules/ossm-rn-new-features.adoc

Lines changed: 72 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ This release adds improvements related to the following components and concepts.
1717

1818
== New features {SMProductName} version {SMProductVersion}
1919

20-
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 and 4.10.
20+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
2121

2222
=== Component versions included in {SMProductName} version {SMProductVersion}
2323

@@ -30,6 +30,32 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
3030
|Envoy Proxy
3131
|1.20.6
3232

33+
|Jaeger
34+
|1.36
35+
36+
|Kiali
37+
|1.48.2-1
38+
|===
39+
40+
=== Copy route labels
41+
42+
With this enhancement, in addition to copying annotations, you can copy specific labels for an OpenShift route. {SMProductName} copies all labels and annotations present in the Istio Gateway resource (with the exception of annotations starting with kubectl.kubernetes.io) into the managed OpenShift Route resource.
43+
44+
== New features {SMProductName} version 2.2.1
45+
46+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
47+
48+
=== Component versions included in {SMProductName} version 2.2.1
49+
50+
|===
51+
|Component |Version
52+
53+
|Istio
54+
|1.12.7
55+
56+
|Envoy Proxy
57+
|1.20.6
58+
3359
|Jaeger
3460
|1.34.1
3561

@@ -39,7 +65,7 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
3965

4066
== New features {SMProductName} 2.2
4167

42-
This release of {SMProductName} adds new features and enhancements, and is supported on OpenShift Container Platform 4.9 and 4.10.
68+
This release of {SMProductName} adds new features and enhancements, and is supported on OpenShift Container Platform 4.9 or later.
4369

4470
=== Component versions included in {SMProductName} version 2.2
4571

@@ -105,6 +131,28 @@ spec:
105131
----
106132
Restricting route attachment on Gateway API listeners is possible using the `SameNamespace` or `All` settings. Istio ignores usage of label selectors in `listeners.allowedRoutes.namespaces` and reverts to the default behavior (`SameNamespace`).
107133

134+
== New features {SMProductName} 2.1.5
135+
136+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
137+
138+
=== Component versions included in {SMProductName} version 2.1.5
139+
140+
|===
141+
|Component |Version
142+
143+
|Istio
144+
|1.9.9
145+
146+
|Envoy Proxy
147+
|1.17.1
148+
149+
|Jaeger
150+
|1.36
151+
152+
|Kiali
153+
|1.36.12-1
154+
|===
155+
108156
== New features {SMProductName} 2.1.4
109157

110158
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
@@ -333,6 +381,28 @@ Kiali 1.36 includes the following features and enhancements:
333381
* Namespace and cluster boxing to support federated service mesh views
334382
* New validations, wizards, and distributed tracing enhancements
335383

384+
== New features {SMProductName} 2.0.11
385+
386+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
387+
388+
=== Component versions included in {SMProductName} version 2.0.11
389+
390+
|===
391+
|Component |Version
392+
393+
|Istio
394+
|1.6.14
395+
396+
|Envoy Proxy
397+
|1.14.5
398+
399+
|Jaeger
400+
|1.36
401+
402+
|Kiali
403+
|1.24.16-1
404+
|===
405+
336406
== New features {SMProductName} 2.0.10
337407

338408
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.

0 commit comments

Comments
 (0)