You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-rn-fixed-issues.adoc
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,13 +19,14 @@ The following issues been resolved in the current release:
19
19
[id="ossm-rn-fixed-issues-ossm_{context}"]
20
20
== {SMProductShortName} fixed issues
21
21
22
+
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668] A new field `spec.security.jwksResolverCA` was added to the Version 2.1 `SMCP` but was missing in the 2.2.0 and 2.2.1 releases. When upgrading from an Operator version where this field was present to an Operator version that was missing this field, the `.spec.security.jwksResolverCA` field was not available in the `SMCP`.
23
+
22
24
* https://issues.redhat.com/browse/OSSM-1325[OSSM-1325] istiod pod crashes and displays the following error message: `fatal error: concurrent map iteration and map write`.
Configuring Federated service meshes for failover does not work as expected.
26
28
+
27
29
The Istiod pilot log displays the following error: `envoy connection [C289] TLS error: 337047686:SSL routines:tls_process_server_certificate:certificate verify failed`
Copy file name to clipboardExpand all lines: modules/ossm-rn-known-issues.adoc
+1-5Lines changed: 1 addition & 5 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -34,10 +34,6 @@ These are the known issues in {SMProductName}:
34
34
35
35
* link:https://github.com/istio/istio/issues/14743[Istio-14743] Due to limitations in the version of Istio that this release of {SMProductName} is based on, there may be applications that are currently incompatible with {SMProductShortName}. See the linked community issue for details.
36
36
37
-
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668] A new field `spec.security.jwksResolverCA` was added to the Version 2.1 `SMCP` but is missing in the 2.2.0 and 2.2.1 releases. When upgrading from an Operator version where this field was present to an Operator version that is missing this field, the `.spec.security.jwksResolverCA` field is not available in the `SMCP`.
38
-
+
39
-
Workaround: To enable additional JSON Web Key Set CA certificates when using an Operator version that is missing `spec.security.jwksResolverCA`, the workaround is to use the `spec.techPreview jwksResolverExtraRootCA` field.
40
-
41
37
//Keep OSSM-1655 in RN, closed as "explained" error is expected.
42
38
* https://issues.redhat.com/browse/OSSM-1655[OSSM-1655] Kiali dashboard shows error after enabling mTLS in `SMCP`.
43
39
+
@@ -57,7 +53,7 @@ For more information, see Migrating from `ServiceMeshExtension` to `WasmPlugin`
57
53
Workaround: Disable the gateway creation in the SMCP spec and manage the gateway deployment entirely manually (including Service, Role and RoleBinding).
58
54
59
55
//Keep OSSM-882 in RN to document the workaround
60
-
* https://issues.redhat.com/browse/OSSM-882[OSSM-882] Namespace is in the accessible_namespace list but does not appear in Kiali UI. By default, Kiali will not show any namespaces that start with "kube" because these namespaces are typically internal-use only and not part of a mesh.
56
+
* https://issues.redhat.com/browse/OSSM-882[OSSM-882] This applies for {SMProductShortName} 2.1 and earlier. Namespace is in the accessible_namespace list but does not appear in Kiali UI. By default, Kiali will not show any namespaces that start with "kube" because these namespaces are typically internal-use only and not part of a mesh.
61
57
+
62
58
For example, if you create a namespace called 'akube-a' and add it to the Service Mesh member roll, then the Kiali UI does not display the namespace. For defined exclusion patterns, the software excludes namespaces that start with or contain the pattern.
Copy file name to clipboardExpand all lines: modules/ossm-rn-new-features.adoc
+72-2Lines changed: 72 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -17,7 +17,7 @@ This release adds improvements related to the following components and concepts.
17
17
18
18
== New features {SMProductName} version {SMProductVersion}
19
19
20
-
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 and 4.10.
20
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
21
21
22
22
=== Component versions included in {SMProductName} version {SMProductVersion}
23
23
@@ -30,6 +30,32 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
30
30
|Envoy Proxy
31
31
|1.20.6
32
32
33
+
|Jaeger
34
+
|1.36
35
+
36
+
|Kiali
37
+
|1.48.2-1
38
+
|===
39
+
40
+
=== Copy route labels
41
+
42
+
With this enhancement, in addition to copying annotations, you can copy specific labels for an OpenShift route. {SMProductName} copies all labels and annotations present in the Istio Gateway resource (with the exception of annotations starting with kubectl.kubernetes.io) into the managed OpenShift Route resource.
43
+
44
+
== New features {SMProductName} version 2.2.1
45
+
46
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
47
+
48
+
=== Component versions included in {SMProductName} version 2.2.1
49
+
50
+
|===
51
+
|Component |Version
52
+
53
+
|Istio
54
+
|1.12.7
55
+
56
+
|Envoy Proxy
57
+
|1.20.6
58
+
33
59
|Jaeger
34
60
|1.34.1
35
61
@@ -39,7 +65,7 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
39
65
40
66
== New features {SMProductName} 2.2
41
67
42
-
This release of {SMProductName} adds new features and enhancements, and is supported on OpenShift Container Platform 4.9 and 4.10.
68
+
This release of {SMProductName} adds new features and enhancements, and is supported on OpenShift Container Platform 4.9 or later.
43
69
44
70
=== Component versions included in {SMProductName} version 2.2
45
71
@@ -105,6 +131,28 @@ spec:
105
131
----
106
132
Restricting route attachment on Gateway API listeners is possible using the `SameNamespace` or `All` settings. Istio ignores usage of label selectors in `listeners.allowedRoutes.namespaces` and reverts to the default behavior (`SameNamespace`).
107
133
134
+
== New features {SMProductName} 2.1.5
135
+
136
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
137
+
138
+
=== Component versions included in {SMProductName} version 2.1.5
139
+
140
+
|===
141
+
|Component |Version
142
+
143
+
|Istio
144
+
|1.9.9
145
+
146
+
|Envoy Proxy
147
+
|1.17.1
148
+
149
+
|Jaeger
150
+
|1.36
151
+
152
+
|Kiali
153
+
|1.36.12-1
154
+
|===
155
+
108
156
== New features {SMProductName} 2.1.4
109
157
110
158
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
@@ -333,6 +381,28 @@ Kiali 1.36 includes the following features and enhancements:
333
381
* Namespace and cluster boxing to support federated service mesh views
334
382
* New validations, wizards, and distributed tracing enhancements
335
383
384
+
== New features {SMProductName} 2.0.11
385
+
386
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 or later.
387
+
388
+
=== Component versions included in {SMProductName} version 2.0.11
389
+
390
+
|===
391
+
|Component |Version
392
+
393
+
|Istio
394
+
|1.6.14
395
+
396
+
|Envoy Proxy
397
+
|1.14.5
398
+
399
+
|Jaeger
400
+
|1.36
401
+
402
+
|Kiali
403
+
|1.24.16-1
404
+
|===
405
+
336
406
== New features {SMProductName} 2.0.10
337
407
338
408
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
0 commit comments