Skip to content

Commit c8f44f5

Browse files
authored
Merge pull request #47739 from rh-tokeefe/OSSMDOC-586
OSSMDOC-586: Service Mesh 2.2.1 Release Notes
2 parents f4e77b1 + 1564b29 commit c8f44f5

File tree

4 files changed

+59
-15
lines changed

4 files changed

+59
-15
lines changed

_attributes/common-attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ endif::[]
122122
:product-dedicated: Red Hat OpenShift Dedicated
123123
:SMProductName: Red Hat OpenShift Service Mesh
124124
:SMProductShortName: Service Mesh
125-
:SMProductVersion: 2.2
125+
:SMProductVersion: 2.2.1
126126
:MaistraVersion: 2.2
127127
//Service Mesh v1
128128
:SMProductVersion1x: 1.1.18.2

modules/ossm-rn-fixed-issues.adoc

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -19,6 +19,17 @@ The following issues been resolved in the current release:
1919
[id="ossm-rn-fixed-issues-ossm_{context}"]
2020
== {SMProductShortName} fixed issues
2121

22+
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668]
23+
`jwksResolverCA` field is missing in `SMCP`.
24+
25+
* https://issues.redhat.com/browse/OSSM-1325[OSSM-1325] istiod pod crashes and displays the following error message: `fatal error: concurrent map iteration and map write`.
26+
27+
* https://issues.redhat.com/browse/OSSM-1211[OSSM-1211]
28+
Configuring Federated service meshes for failover does not work as expected.
29+
+
30+
The Istiod pilot log displays the following error: `envoy connection [C289] TLS error: 337047686:SSL routines:tls_process_server_certificate:certificate verify failed`
31+
+
32+
2233
* https://issues.redhat.com/browse/OSSM-1099[OSSM-1099]
2334
The Kiali console displayed the message `Sorry, there was a problem. Try a refresh or navigate to a different page.`
2435

modules/ossm-rn-known-issues.adoc

Lines changed: 0 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -34,24 +34,13 @@ These are the known issues in {SMProductName}:
3434

3535
* link:https://github.com/istio/istio/issues/14743[Istio-14743] Due to limitations in the version of Istio that this release of {SMProductName} is based on, there may be applications that are currently incompatible with {SMProductShortName}. See the linked community issue for details.
3636

37-
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668]
38-
`jwksResolverCA` field is missing in `SMCP`.
39-
+
40-
If you upgrade from Service Mesh operator 2.1.3 to Service Mesh operator 2.2, then the `jwksResolverCA` field is not supported. You must use the `techPreview` `jwksResolverExtraRootCA` field to enable additional JWKS CA certificates.
4137
//Keep OSSM-1655 in RN, closed as "explained" error is expected.
4238
* https://issues.redhat.com/browse/OSSM-1655[OSSM-1655] Kiali dashboard shows error after enabling mTLS in `SMCP`.
4339
+
4440
After enabling the `spec.security.controlPlane.mtls` setting in the SMCP, the Kiali console displays the following error message `No subsets defined`.
4541

4642
* https://issues.redhat.com/browse/OSSM-1396[OSSM-1396] If a gateway resource contains the `spec.externalIPs` setting, instead of being recreated when the `ServiceMeshControlPlane` is updated, the gateway is removed and never recreated.
4743

48-
* https://issues.redhat.com/browse/OSSM-1211[OSSM-1211]
49-
Configuring Federated service meshes for failover does not work as expected.
50-
+
51-
The Istiod pilot log displays the following error: `envoy connection [C289] TLS error: 337047686:SSL routines:tls_process_server_certificate:certificate verify failed`
52-
+
53-
There is no workaround at this time.
54-
5544
* https://issues.redhat.com/browse/OSSM-1168[OSSM-1168] When service mesh resources are created as a single YAML file, the Envoy proxy sidecar is not reliably injected into pods. When the SMCP, SMMR, and Deployment resources are created individually, the deployment works as expected.
5645
//Keep OSSM-1052 in RN - Closed as documented.
5746
* https://issues.redhat.com/browse/OSSM-1052[OSSM-1052] When configuring a Service `ExternalIP` for the ingressgateway in the service mesh control plane, the service is not created. The schema for the SMCP is missing the parameter for the service. The workaround for this issue is to disable the gateway creation in the SMCP spec and manage the gateway deployment entirely manually (including Service, Role and RoleBinding).

modules/ossm-rn-new-features.adoc

Lines changed: 47 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,33 @@ Module included in the following assemblies:
1919
* *Policy Enforcement* - Apply organizational policy to the interaction between services, ensure access policies are enforced and resources are fairly distributed among consumers. Policy changes are made by configuring the mesh, not by changing application code.
2020
* *Telemetry* - Gain understanding of the dependencies between services and the nature and flow of traffic between them, providing the ability to quickly identify issues.
2121
22+
== New features {SMProductName} version {SMProductVersion}
23+
24+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), bug fixes, and is supported on OpenShift Container Platform 4.9 and 4.10.
25+
26+
=== Component versions included in {SMProductName} version {SMProductVersion}
27+
28+
|===
29+
|Component |Version
30+
31+
|Istio
32+
|1.12.7
33+
34+
|Envoy Proxy
35+
|1.20.6
36+
37+
|Jaeger
38+
|1.34.1
39+
40+
|Kiali
41+
|1.48.1
42+
|===
43+
2244
== New features {SMProductName} 2.2
2345

2446
This release of {SMProductName} adds new features and enhancements, and is supported on OpenShift Container Platform 4.9 and 4.10.
2547

26-
=== Component versions included in {SMProductName} version {SMProductVersion}
48+
=== Component versions included in {SMProductName} version 2.2
2749

2850
|===
2951
|Component |Version
@@ -87,6 +109,28 @@ spec:
87109
----
88110
Restricting route attachment on Gateway API listeners is possible using the `SameNamespace` or `All` settings. Istio ignores usage of label selectors in `listeners.allowedRoutes.namespaces` and reverts to the default behavior (`SameNamespace`).
89111

112+
== New features {SMProductName} 2.1.4
113+
114+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
115+
116+
=== Component versions included in {SMProductName} version 2.1.4
117+
118+
|===
119+
|Component |Version
120+
121+
|Istio
122+
|1.9.9
123+
124+
|Envoy Proxy
125+
|1.17.1
126+
127+
|Jaeger
128+
|1.29.1
129+
130+
|Kiali
131+
|1.36.11
132+
|===
133+
90134
== New features {SMProductName} 2.1.3
91135

92136
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
@@ -309,10 +353,10 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
309353
|1.14.5
310354

311355
|Jaeger
312-
|1.24.1
356+
|1.28.0
313357

314358
|Kiali
315-
|1.24.14-1
359+
|1.24.15-1
316360
|===
317361

318362
== New features {SMProductName} 2.0.9

0 commit comments

Comments
 (0)