Skip to content

Commit e6b187b

Browse files
shreyasiddharthaopenshift-cherrypick-robot
authored andcommitted
OSSM-9882
1 parent 48cdb0f commit e6b187b

6 files changed

+126
-0
lines changed
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * service-mesh-docs-main/ossm-release-notes/ossm-release-notes.adoc
4+
5+
:_mod-docs-content-type: REFERENCE
6+
[id="ossm-release-3-1-deprecated-features_{context}"]
7+
= {SMProductName} version 3.1 deprecated features
8+
9+
Some features available in previous releases have been deprecated or removed.
10+
11+
Deprecated functionality is still included in {ocp-product-title} and continues to be supported; however, it will be removed in a future release of {SMProductName} 3 and is not recommended for new deployments.
12+
13+
Removed functionality no longer exists in the product.
14+
15+
[id="dns-auto-auto-allocation-proxymetadata_{context}"]
16+
== DNS auto-allocation in ProxyMetadata
17+
18+
This release removes the use of `ISTIO_META_DNS_AUTO_ALLOCATE` option in the `proxyMetadata` configuration. You can use the DNS auto-allocation label in the `ServiceEntry` resource instead. A future release will remove support for the `ISTIO_META_DNS_AUTO_ALLOCATE` option.
19+
20+
For more information about using the DNS auto-allocation label in the `ServiceEntry` resource, see the "Address auto-collection" section in the {istio} documentation.
Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,12 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * service-mesh-docs-main/ossm-release-notes/ossm-release-notes.adoc
4+
5+
:_mod-docs-content-type: REFERENCE
6+
[id="ossm-release-3-1-fixed-issues_{context}"]
7+
= {SMProductName} version 3.1 fixed issues
8+
9+
[id="kiali-fixed-issue_{context}"]
10+
== Kiali fixed issue
11+
12+
* Before this update, the {KialiProduct} used the `k8s_cluster_info` Ansible module from the `kubernetes.core` collection, which caused failures in certain environments during the `Get API version information from the cluster` task. As a result, Kiali deployment failure occurred, affecting service visibility and management. With this update, the {KialiProduct} avoids the `k8s_cluster_info` module, resolving the issue and ensuring smooth Kiali installation for users. (link:https://issues.redhat.com/browse/OSSM-9659[OSSM-9659])
Lines changed: 16 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,16 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * service-mesh-docs-main/ossm-release-notes.adoc
4+
5+
:_mod-docs-content-type: REFERENCE
6+
[id="ossm-release-3-1-known-issues_{context}"]
7+
= {SMProductName} 3.1 known issues
8+
9+
[id="pod-health-check-issues-ovn-k-cni-ambient-mode_{context}"]
10+
== Pod health check issues with OVN-K CNI in ambient mode
11+
12+
There is currently a known issue where pod health checks (`liveness` and `readiness` probes) may fail in ambient mode when using the OVN-Kubernetes Container Network Interface (CNI) on OpenShift Container Platform (OCP) 4.18 and earlier releases, such as OCP 4.16. This issue causes pods to enter a `CrashLoopBackOff` state, even though the application containers are running as expected.
13+
14+
Workaround: Configure the OVN-Kubernetes CNI to use local gateway mode by setting the `routingViaHost` field as `true` in the `gatewayConfig` specification in the Cluster Network Operator.
15+
16+
For configuration details, see “Configuring Gateway Mode”. link:https://issues.redhat.com/browse/OSSM-9053[OSSM-9053]
Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,36 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * service-mesh-docs-main/ossm-release-notes/ossm-release-notes.adoc
4+
5+
:_mod-docs-content-type: REFERENCE
6+
[id="ossm-release-3-1-new-features-enhancements_{context}"]
7+
= {SMProductName} version 3.1 new features and enhancements
8+
9+
This release makes {SMProductName} 3.1 generally available, adds new features, addresses Common Vulnerabilities and Exposures (CVEs), and is supported on {ocp-product-title} 4.14 and later.
10+
11+
For a list of supported component versions and support features, see "Service Mesh 3.0 feature support tables".
12+
13+
[id="support-for-kubernetes-gateway-api_{context}"]
14+
== Support for Kubernetes Gateway API
15+
16+
This release introduces support for {k8s} Gateway API custom resource definitions (CRDs). You can now use these CRDs to configure {SMProduct} with the {k8s} Gateway API. This feature is available with {product-title} 4.19.
17+
18+
[id="support-for-ossm-on-x86-dual-stack-clusters_{context}"]
19+
== Support for OpenShift Service Mesh on x86 dual-stack clusters
20+
21+
This release introduces support for {SMProduct} on x86 dual-stack clusters. This feature remains a technology preview on all other platforms.
22+
23+
[id="kubernetes-traffic-distribution-support_{context}"]
24+
== Kubernetes Traffic Distribution Support
25+
26+
This release introduces support for the {k8s} traffic distribution feature, part of the {k8s} Service API, within {SMProduct}. As of {product-title} 4.19, this is a Beta feature and requires enabling the `ServiceTrafficDistribution` parameter in the {istio} Custom Resources (CRs).
27+
28+
[id="developer-preview-kubernetes-clustertrustbundle_{context}"]
29+
== Developer Preview for Kubernetes ClusterTrustBundle
30+
31+
This release introduces developer preview support for the experimental {k8s} `ClusterTrustBundle` feature. This feature provides a new way of distributing X.509 trust anchors (root certificates) to workloads within the cluster. As of {product-title} 4.19, this is an Alpha feature and requires enabling the `ClusterTrustBundle` feature.
32+
33+
[id="ubi-micro-base-containers_{context}"]
34+
== UBI-micro base containers
35+
36+
This release updates {SMProduct} to use UBI-micro base containers for most container images. The UBI-micro image is the smallest possible Universal Base Image (UBI), which excludes a package manager and all of its dependencies normally included in a container image. This change minimizes the attack surface of container images that use the UBI-micro base.
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * service-mesh-docs-main/ossm-release-notes/ossm-release-notes.adoc
4+
5+
:_mod-docs-content-type: REFERENCE
6+
[id="ossm-release-3-1-technology-preview-features_{context}"]
7+
= {SMProductName} version 3.1 Technology Preview features
8+
9+
This release includes some features that are currently in Technology Preview. These experimental features are not intended for production use. For more information about the support scope of Red Hat Technology Preview features, see link:https://access.redhat.com/support/offerings/techpreview/[Technology Preview Features Support Scope].
10+
11+
[id="istio-ambient-mode-rn_{context}"]
12+
== Istio ambient mode
13+
14+
This release updates the status of {istio} ambient mode to Technology Preview. {istio} ambient mode provides a sidecar-less alternative data plane to the traditional sidecar-based data plane. By default, ambient mode splits the data plane into node-level L4 ZTunnels and namespace-scoped L7 Waypoint proxies.
15+
16+
{istio} ambient mode requires {k8s} Gateway API custom resource definitions (CRDs). Use OpenShift Service Mesh 4.19 or later, which includes the CRDs by default.
17+
18+
To avoid potential conflicts, you must install {istio} ambient mode only on clusters that do not have an existing {SMProductName} installation. {istio} ambient mode is not compatible with clusters that use {SMProductName} 2.6 or earlier.
19+
20+
When you use {istio} ambient mode, pods that rely on `liveness` or `readiness` probes require you to set the OVN-Kubernetes gateway mode to `local` instead of the default `shared` mode. In local mode, traffic routes through the host and the host processes it using the routing table, ensuring that probes function correctly. For more information, see the "Configuring gateway mode" section in the OVN-Kubernetes documentation.
21+
22+
To start using {istio} ambient mode, see the "Istio ambient mode" section in the {SMProduct} 3 installation documentation.
23+
24+
[id="kubernetes-gateway-api-inference-extensions_{context}"]
25+
== Kubernetes Gateway API Inference Extensions
26+
27+
This release provides technology preview support for {k8s} Gateway API Inference Extensions. These extensions build on Kubernetes Gateway API to provide inference-specific routing capabilities that optimize for self-hosted generative-AI workloads. This implementation was backported to {SMProduct} 3.1 from {istio} 1.27.

ossm-release-notes/ossm-release-notes.adoc

Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,21 @@ For additional information about the {SMProductName} life cycle and supported pl
1616
//03/25/2025:
1717
//Gwynne is rotating off Service Mesh. For next writer and CS: Continue to refine the IA for rel notes. The structure and IA will likely make more sense as there are more z-streams and versions released, making it easier to see how best to lay rel notes out in docs.redhat. Should anything be its own tile to make it easier to find for users?
1818

19+
include::modules/ossm-release-notes-3-1-technology-preview-features.adoc[leveloffset=+1]
20+
include::modules/ossm-release-notes-3-1-new-features-enhancements.adoc[leveloffset=+1]
21+
include::modules/ossm-release-notes-3-1-fixed-issues.adoc[leveloffset=+1]
22+
include::modules/ossm-release-notes-3-1-known-issues.adoc[leveloffset=+1]
23+
include::modules/ossm-release-notes-3-1-deprecated-features.adoc[leveloffset=+1]
24+
25+
[role="_additional-resources"]
26+
== Additional resources
27+
28+
* xref:../ossm-release-notes/ossm-release-notes-version-support-tables.adoc#ossm-release-notes-version-support-tables[Service Mesh version support]
29+
* xref:../ossm-release-notes/ossm-release-notes-feature-support-tables.adoc#ossm-release-notes-feature-support-tables[Service Mesh feature support tables]
30+
* xref:../install/ossm-istio-ambient-mode.adoc#ossm-istio-ambient-mode[Istio ambient mode]
31+
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/networking/ovn-kubernetes-network-plugin#configuring-gateway-mode[Configuring gateway mode]
32+
* link:https://istio.io/latest/docs/ops/configuration/traffic-management/dns-proxy/#address-auto-allocation[Address auto-allocation]
33+
1934
include::modules/ossm-release-notes-3-0-3.adoc[leveloffset=+1]
2035
include::modules/ossm-release-notes-3-0-2.adoc[leveloffset=+1]
2136
include::modules/ossm-release-notes-3-0-1.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)