Skip to content

Commit d65aad4

Browse files
authored
Merge pull request #45652 from rh-tokeefe/OSSMDOC-467
OSSMDOC-467: Service Mesh 2.2 release notes
2 parents 1b0b38b + 14a5b60 commit d65aad4

File tree

6 files changed

+126
-16
lines changed

6 files changed

+126
-16
lines changed

_attributes/common-attributes.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -122,8 +122,8 @@ endif::[]
122122
:product-dedicated: Red Hat OpenShift Dedicated
123123
:SMProductName: Red Hat OpenShift Service Mesh
124124
:SMProductShortName: Service Mesh
125-
:SMProductVersion: 2.1.3
126-
:MaistraVersion: 2.1
125+
:SMProductVersion: 2.2
126+
:MaistraVersion: 2.2
127127
//Service Mesh v1
128128
:SMProductVersion1x: 1.1.18.2
129129
//Windows containers

modules/ossm-rn-deprecated-features.adoc

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,14 @@ Deprecated functionality is still included in {product-title} and continues to b
1515

1616
Removed functionality no longer exists in the product.
1717

18+
== Deprecated features {SMProductName} 2.2
19+
20+
The `ServiceMeshExtension` API is deprecated as of release 2.2 and will be removed in a future release. While `ServiceMeshExtension` API is still supported in release 2.2, customers should start moving to the new `WasmPlugin` API.
21+
22+
== Removed features {SMProductName} 2.2
23+
24+
This release marks the end of support for service mesh control planes based on Service Mesh 1.1 for all platforms.
25+
1826
== Removed features {SMProductName} 2.1
1927

2028
In Service Mesh 2.1, the Mixer component is removed. Bug fixes and support is provided through the end of the Service Mesh 2.0 life cycle.

modules/ossm-rn-known-issues.adoc

Lines changed: 23 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,21 +21,41 @@ These limitations exist in {SMProductName}:
2121

2222
* The first time you access related services such as {JaegerShortName} and Grafana, from the Kiali console, you must accept the certificate and re-authenticate using your {product-title} login credentials. This happens due to an issue with how the framework displays embedded pages in the console.
2323

24-
* The Bookinfo sample application cannot be installed on IBM Z and IBM Power Systems.
24+
* The Bookinfo sample application cannot be installed on IBM Z and IBM Power.
2525

26-
* WebAssembly extensions are not supported on IBM Z and IBM Power Systems.
26+
* WebAssembly extensions are not supported on IBM Z and IBM Power.
2727

28+
* LuaJIT is not supported on IBM Power.
2829

2930
[id="ossm-rn-known-issues-ossm_{context}"]
3031
== {SMProductShortName} known issues
3132

3233
These are the known issues in {SMProductName}:
3334

35+
* https://issues.redhat.com/browse/OSSM-1668[OSSM-1668]
36+
`jwksResolverCA` field is missing in `SMCP`.
37+
+
38+
If you upgrade from Service Mesh operator 2.1.3 to Service Mesh operator 2.2, then the `jwksResolverCA` field is not supported. You must use the `techPreview` `jwksResolverExtraRootCA` field to enable additional JWKS CA certificates.
39+
40+
* https://issues.redhat.com/browse/OSSM-1655[OSSM-1655] Kiali dashboard shows error after enabling mTLS in `SMCP`.
41+
+
42+
After enabling the `spec.security.controlPlane.mtls` setting in the SMCP, the Kiali console displays the following error message `"No subsets defined"`.
43+
3444
* https://issues.redhat.com/browse/OSSM-1211[OSSM-1211]
35-
Configuring Federated service meshes for failover does not work as expected. There is no workaround at this time.
45+
Configuring Federated service meshes for failover does not work as expected.
46+
+
47+
The Istiod pilot log displays the following error: `envoy connection [C289] TLS error: 337047686:SSL routines:tls_process_server_certificate:certificate verify failed`
48+
+
49+
There is no workaround at this time.
3650

3751
* link:https://github.com/istio/istio/issues/14743[Istio-14743] Due to limitations in the version of Istio that this release of {SMProductName} is based on, there are several applications that are currently incompatible with {SMProductShortName}. See the linked community issue for details.
3852

53+
* https://issues.redhat.com/browse/OSSM-1396[OSSM-1396] If a gateway resource contains the `spec.externalIPs` setting, instead of being recreated when the `ServiceMeshControlPlane` is updated, the gateway is removed and never recreated.
54+
55+
* https://issues.redhat.com/browse/OSSM-1168[OSSM-1168] When service mesh resources are created as a single YAML file, the Envoy proxy sidecar is not reliably injected into pods. When the SMCP, SMMR, and Deployment resources are created individually, the deployment works as expected.
56+
57+
* https://issues.redhat.com/browse/OSSM-1052[OSSM-1052] When configuring a Service `ExternalIP` for the ingressgateway in the service mesh control plane, the service is not created. The schema for the SMCP is missing the parameter for the service. The workaround for this issue is to disable the gateway creation in the SMCP spec and manage the gateway deployment entirely manually (including Service, Role and RoleBinding).
58+
3959
* https://issues.redhat.com/browse/OSSM-882[OSSM-882] Namespace is in the accessible_namespace list but does not appear in Kiali UI. By default, Kiali will not show any namespaces that start with "kube" because these namespaces are typically internal-use only and not part of a mesh.
4060
+
4161
For example, if you create a namespace called 'akube-a' and add it to the Service Mesh member roll, then the Kiali UI does not display the namespace. For defined exclusion patterns, the software excludes namespaces that start with or contain the pattern.

modules/ossm-rn-new-features.adoc

Lines changed: 91 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,11 +19,101 @@ Module included in the following assemblies:
1919
* *Policy Enforcement* - Apply organizational policy to the interaction between services, ensure access policies are enforced and resources are fairly distributed among consumers. Policy changes are made by configuring the mesh, not by changing application code.
2020
* *Telemetry* - Gain understanding of the dependencies between services and the nature and flow of traffic between them, providing the ability to quickly identify issues.
2121
22+
== New features {SMProductName} 2.2
23+
24+
This release of {SMProductName} adds new features and enhancements, and is supported on OpenShift Container Platform 4.9 and 4.10.
25+
26+
=== Component versions included in {SMProductName} version {SMProductVersion}
27+
28+
|===
29+
|Component |Version
30+
31+
|Istio
32+
|1.12.7
33+
34+
|Envoy Proxy
35+
|1.20.4
36+
37+
|Jaeger
38+
|1.34.1
39+
40+
|Kiali
41+
|1.48.0.16
42+
|===
43+
44+
=== `WasmPlugin` API
45+
This release adds support for the `WasmPlugin` API and deprecates the `ServiceMeshExtention` API.
46+
47+
=== ROSA support
48+
This release introduces service mesh support for Red Hat OpenShift on AWS (ROSA), including multi-cluster federation.
49+
50+
=== `istio-node` DaemonSet renamed
51+
This release, the `istio-node` DaemonSet is renamed to `istio-cni-node` to match the name in upstream Istio.
52+
53+
=== Envoy sidecar networking changes
54+
Istio 1.10 updated Envoy to send traffic to the application container using `eth0` rather than `lo` by default.
55+
56+
=== Service Mesh Control Plane 1.1
57+
This release marks the end of support for Service Mesh Control Planes based on Service Mesh 1.1 for all platforms.
58+
59+
=== Istio 1.12 Support
60+
61+
{SMProductShortName} 2.2 is based on Istio 1.12, which brings in new features and product enhancements. While many Istio 1.12 features are supported, the following unsupported features should be noted:
62+
63+
* AuthPolicy Dry Run is a tech preview feature.
64+
* gRPC Proxyless Service Mesh is a tech preview feature.
65+
* Telemetry API is a tech preview feature.
66+
* Discovery selectors is not a supported feature.
67+
* External control plane is not a supported feature.
68+
* Gateway injection is not a supported feature.
69+
70+
=== Kubernetes Gateway API
71+
Kubernetes Gateway API is a technology preview feature that is disabled by default.
72+
73+
To enable the feature, set the following environment variables for the `Istiod` container in `ServiceMeshControlPlane`:
74+
75+
[source,yaml]
76+
----
77+
spec:
78+
runtime:
79+
components:
80+
pilot:
81+
container:
82+
env:
83+
PILOT_ENABLE_GATEWAY_API: true
84+
PILOT_ENABLE_GATEWAY_API_STATUS: true
85+
# and optionally, for the deployment controller
86+
PILOT_ENABLE_GATEWAY_API_DEPLOYMENT_CONTROLLER: true
87+
----
88+
Restricting route attachment on Gateway API listeners is possible using the `SameNamespace` or `All` settings. Istio ignores usage of label selectors in `listeners.allowedRoutes.namespaces` and reverts to the default behavior (`SameNamespace`).
89+
2290
== New features {SMProductName} 2.1.3
2391

2492
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
2593

26-
=== Component versions included in {SMProductName} version {SMProductVersion}
94+
=== Component versions included in {SMProductName} version 2.1.3
95+
96+
|===
97+
|Component |Version
98+
99+
|Istio
100+
|1.9.9
101+
102+
|Envoy Proxy
103+
|1.17.1
104+
105+
|Jaeger
106+
|1.30.2
107+
108+
|Kiali
109+
|1.36.10.2
110+
|===
111+
112+
== New features {SMProductName} 2.1.2.1
113+
114+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs) and bug fixes.
115+
116+
=== Component versions included in {SMProductName} version 2.1.2.1
27117

28118
|===
29119
|Component |Version

modules/ossm-vs-istio.adoc

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -133,9 +133,3 @@ Subdomains (e.g.: "*.domain.com") are supported. However this ability doesn't co
133133
[id="ossm-tls_{context}"]
134134
=== Transport layer security
135135
Transport Layer Security (TLS) is supported. This means that, if the Gateway contains a `tls` section, the OpenShift Route will be configured to support TLS.
136-
137-
138-
[id="ossm-wasm_{context}"]
139-
=== WebAssembly Extensions
140-
141-
{SMProductName} 2.0 introduces WebAssembly extensions to Envoy Proxy as a link:https://access.redhat.com/support/offerings/techpreview/[Technology Preview]. Note that WASM extensions are not included in the proxy binary and that WASM filters from the upstream Istio community are not supported in {SMProductName} 2.0.

service_mesh/v2x/servicemesh-release-notes.adoc

Lines changed: 2 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,10 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
== Making open source more inclusive
10-
11-
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see link:https://www.redhat.com/en/blog/making-open-source-more-inclusive-eradicating-problematic-language[our CTO Chris Wright's message].
12-
139
// The following include statements pull in the module files that comprise 2.x release notes.
1410

11+
include::modules/making-open-source-more-inclusive.adoc[leveloffset=+1]
12+
1513
include::modules/ossm-rn-new-features.adoc[leveloffset=+1]
1614

1715
include::modules/ossm-rn-technology-preview.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)