Skip to content

Commit e4c9acb

Browse files
Merge pull request #65346 from gwynnemonahan/OSSM-4874
2 parents 783d939 + 07a121a commit e4c9acb

File tree

3 files changed

+86
-1
lines changed

3 files changed

+86
-1
lines changed

_attributes/common-attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ endif::[]
145145
:product-rosa: Red Hat OpenShift Service on AWS
146146
:SMProductName: Red Hat OpenShift Service Mesh
147147
:SMProductShortName: Service Mesh
148-
:SMProductVersion: 2.4.3
148+
:SMProductVersion: 2.4.4
149149
:MaistraVersion: 2.4
150150
//Service Mesh v1
151151
:SMProductVersion1x: 1.1.18.2

modules/ossm-rn-fixed-issues.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -14,6 +14,12 @@ Provide the following info for each issue if possible:
1414
*Result* - How has the behavior changed as a result? Try to avoid “It is fixed” or “The issue is resolved” or “The error no longer presents”.
1515
////
1616

17+
The following issues have been resolved in the current release:
18+
19+
* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
20+
21+
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
22+
1723
The following issues have been resolved in previous releases:
1824

1925
[id="ossm-rn-fixed-issues-ossm_{context}"]

modules/ossm-rn-new-features.adoc

Lines changed: 79 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,32 @@ Module included in the following assemblies:
1515

1616
This release adds improvements related to the following components and concepts.
1717

18+
== New features {SMProductName} version 2.4.4
19+
20+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
21+
22+
=== Component versions included in {SMProductName} version 2.4.4
23+
//Istio stays the same
24+
//Envoy updated to 1.24.12
25+
//According to distributed tracing release 2.9, the latest at time of OSSM 2.4.4, Jaeger has been updated to 1.47.0
26+
//Kiali updated to 1.65.9
27+
|===
28+
|Component |Version
29+
30+
|Istio
31+
|1.16.7
32+
33+
|Envoy Proxy
34+
|1.24.12
35+
36+
|Jaeger
37+
|1.47.0
38+
39+
|Kiali
40+
|1.65.9
41+
|===
42+
//Components updated for 2.4.4
43+
1844
== New features {SMProductName} version 2.4.3
1945

2046
* The {SMProductName} Operator is now available on ARM-based clusters as a Technology Preview feature.
@@ -228,6 +254,33 @@ spec:
228254
* {SMProductShortName} on ARM64 architecture is not supported.
229255
* OpenTelemetry API remains a Technology Preview feature.
230256

257+
== New features {SMProductName} version 2.3.8
258+
//Update with 2.4.4
259+
260+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
261+
262+
=== Component versions included in {SMProductName} version 2.3.8
263+
//Istio for 2.3.8 is now 1.14.5
264+
//Kiali is 1.57.13
265+
//Jaeger is 1.47.0
266+
//Envoy stays the same
267+
|===
268+
|Component |Version
269+
270+
|Istio
271+
|1.14.5
272+
273+
|Envoy Proxy
274+
|1.22.11
275+
276+
|Jaeger
277+
|1.47.0
278+
279+
|Kiali
280+
|1.57.13
281+
|===
282+
//Components updated for 2.3.8 as part of 2.4.4 update
283+
231284
== New features {SMProductName} version 2.3.7
232285

233286
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
@@ -480,6 +533,32 @@ Additionally, the SMMR must also be configured for cluster-wide deployment. This
480533
----
481534
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.
482535

536+
== New features {SMProductName} version 2.2.11
537+
538+
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
539+
540+
=== Component versions included in {SMProductName} version 2.2.11
541+
//Istio remains the same
542+
//Kiali updated to 1.48.10
543+
//Jaeger updated to 1.47.0
544+
//Envoy remains the same
545+
|===
546+
|Component |Version
547+
548+
|Istio
549+
|1.12.9
550+
551+
|Envoy Proxy
552+
|1.20.8
553+
554+
|Jaeger
555+
|1.47.0
556+
557+
|Kiali
558+
|1.48.10
559+
|===
560+
//Components updated for 2.2.11 with 2.4.4 release
561+
483562
== New features {SMProductName} version 2.2.10
484563

485564
This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.

0 commit comments

Comments
 (0)