You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ossm-rn-fixed-issues.adoc
+11Lines changed: 11 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -19,8 +19,19 @@ The following issues been resolved in the current release:
19
19
[id="ossm-rn-fixed-issues-ossm_{context}"]
20
20
== {SMProductShortName} fixed issues
21
21
22
+
* https://issues.redhat.com/browse/OSSM-4197[OSSM-4197] Previously, if you deployed a v2.2 or v2.1 of the 'ServiceMeshControlPlane' resource, the `/etc/cni/multus/net.d/` directory was not created. As a result, the `istio-cni` pod failed to become ready, and the `istio-cni` pods log contained the following message:
23
+
+
24
+
[source,terminal]
25
+
----
26
+
$ error Installer exits with open /host/etc/cni/multus/net.d/v2-2-istio-cni.kubeconfig.tmp.841118073: no such file or directory
27
+
----
28
+
+
29
+
Now, if you deploy a v2.2 or v2.1 of the 'ServiceMeshControlPlane' resource, the `/etc/cni/multus/net.d/` directory is created, and the `istio-cni` pod becomes ready.
30
+
22
31
* https://issues.redhat.com/browse/OSSM-3993[OSSM-3993] Previously, Kiali only supported OpenShift OAuth via a proxy on the standard HTTPS port of `443`. Now, Kiali supports OpenShift OAuth over a non-standard HTTPS port. To enable the port, you must set the `spec.server.web_port` field to the proxy's non-standard HTTPS port in the Kiali CR.
23
32
33
+
* https://issues.redhat.com/browse/OSSM-3936[OSSM-3936] Previously, the values for the `injection_label_rev` and `injection_label_name` attributes were hardcoded. This prevented custom configurations from taking effect in the Kiali Custom Resource Definition (CRD). Now, the attribute values are not hardcoded. You can customize the values for the `injection_label_rev` and `injection_label_name` attributes in the `spec.istio_labels` specification.
34
+
24
35
* https://issues.redhat.com/browse/OSSM-3644[OSSM-3644] Previously, the federation egress-gateway received the wrong update of network gateway endpoints, causing extra endpoint entries. Now, the federation-egress gateway has been updated on the server side so it receives the correct network gateway endpoints.
25
36
26
37
* https://issues.redhat.com/browse/OSSM-3595[OSSM-3595] Previously, the `istio-cni` plugin sometimes failed on {op-system-base} because SELinux did not allow the utility `iptables-restore` to open files in the `/tmp` directory. Now, SELinux passes `iptables-restore` via `stdin` input stream instead of via a file.
Copy file name to clipboardExpand all lines: modules/ossm-rn-new-features.adoc
+67-1Lines changed: 67 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,6 +15,28 @@ Module included in the following assemblies:
15
15
16
16
This release adds improvements related to the following components and concepts.
17
17
18
+
== New features {SMProductName} version 2.4.1
19
+
20
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
21
+
22
+
=== Component versions included in {SMProductName} version 2.4.1
23
+
24
+
|===
25
+
|Component |Version
26
+
27
+
|Istio
28
+
|1.16.5
29
+
30
+
|Envoy Proxy
31
+
|1.24.8
32
+
33
+
|Jaeger
34
+
|1.42.0
35
+
36
+
|Kiali
37
+
|1.65.7
38
+
|===
39
+
18
40
== New features {SMProductName} version 2.4
19
41
20
42
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
@@ -102,7 +124,7 @@ Single stack IPv6 support is not available on {ibmpowerProductName}, {ibmzProduc
102
124
====
103
125
104
126
=== {product-title} Gateway API support
105
-
127
+
:FeatureName: {product-title} Gateway API support
106
128
include::snippets/technology-preview.adoc[]
107
129
108
130
This enhancement introduces an updated Technology Preview version of the {product-title} Gateway API. By default, the {product-title} Gateway API is disabled.
@@ -146,6 +168,28 @@ spec:
146
168
* {SMProductShortName} on ARM64 architecture is not supported.
147
169
* OpenTelemetry API remains a Technology Preview feature.
148
170
171
+
== New features {SMProductName} version 2.3.5
172
+
173
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
174
+
175
+
=== Component versions included in {SMProductName} version 2.3.5
176
+
177
+
|===
178
+
|Component |Version
179
+
180
+
|Istio
181
+
|1.14.5
182
+
183
+
|Envoy Proxy
184
+
|1.22.9
185
+
186
+
|Jaeger
187
+
|1.42.0
188
+
189
+
|Kiali
190
+
|1.57.10
191
+
|===
192
+
149
193
== New features {SMProductName} version 2.3.4
150
194
151
195
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
@@ -332,6 +376,28 @@ Additionally, the SMMR must also be configured for cluster-wide deployment. This
332
376
----
333
377
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
334
378
379
+
== New features {SMProductName} version 2.2.8
380
+
381
+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
382
+
383
+
=== Component versions included in {SMProductName} version 2.2.8
384
+
385
+
|===
386
+
|Component |Version
387
+
388
+
|Istio
389
+
|1.12.9
390
+
391
+
|Envoy Proxy
392
+
|1.20.8
393
+
394
+
|Jaeger
395
+
|1.42.0
396
+
397
+
|Kiali
398
+
|1.48.7
399
+
|===
400
+
335
401
== New features {SMProductName} version 2.2.7
336
402
337
403
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
0 commit comments