Skip to content

Commit

Permalink
OSSM-4874 [DOC] 2.4.4 Release Notes
Browse files Browse the repository at this point in the history
  • Loading branch information
gwynnemonahan committed Oct 18, 2023
1 parent 03ca388 commit 7ee13ea
Show file tree
Hide file tree
Showing 3 changed files with 86 additions and 1 deletion.
2 changes: 1 addition & 1 deletion _attributes/common-attributes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -144,7 +144,7 @@ endif::[]
:product-rosa: Red Hat OpenShift Service on AWS
:SMProductName: Red Hat OpenShift Service Mesh
:SMProductShortName: Service Mesh
:SMProductVersion: 2.4.3
:SMProductVersion: 2.4.4
:MaistraVersion: 2.4
//Service Mesh v1
:SMProductVersion1x: 1.1.18.2
Expand Down
6 changes: 6 additions & 0 deletions modules/ossm-rn-fixed-issues.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,12 @@ Provide the following info for each issue if possible:
*Result* - How has the behavior changed as a result? Try to avoid “It is fixed” or “The issue is resolved” or “The error no longer presents”.
////

The following issues have been resolved in the current release:

* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.
* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
The following issues have been resolved in previous releases:

[id="ossm-rn-fixed-issues-ossm_{context}"]
Expand Down
79 changes: 79 additions & 0 deletions modules/ossm-rn-new-features.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,32 @@ Module included in the following assemblies:

This release adds improvements related to the following components and concepts.

== New features {SMProductName} version 2.4.4

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.

=== Component versions included in {SMProductName} version 2.4.4
//Istio stays the same
//Envoy updated to 1.24.12
//According to distributed tracing release 2.9, the latest at time of OSSM 2.4.4, Jaeger has been updated to 1.47.0
//Kiali updated to 1.65.9
|===
|Component |Version

|Istio
|1.16.7

|Envoy Proxy
|1.24.12

|Jaeger
|1.47.0

|Kiali
|1.65.9
|===
//Components updated for 2.4.4

== New features {SMProductName} version 2.4.3

* The {SMProductName} Operator is now available on ARM-based clusters as a Technology Preview feature.
Expand Down Expand Up @@ -228,6 +254,33 @@ spec:
* {SMProductShortName} on ARM64 architecture is not supported.
* OpenTelemetry API remains a Technology Preview feature.

== New features {SMProductName} version 2.3.8
//Update with 2.4.4

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.

=== Component versions included in {SMProductName} version 2.3.8
//Istio for 2.3.8 is now 1.14.5
//Kiali is 1.57.13
//Jaeger is 1.47.0
//Envoy stays the same
|===
|Component |Version

|Istio
|1.14.5

|Envoy Proxy
|1.22.11

|Jaeger
|1.47.0

|Kiali
|1.57.13
|===
//Components updated for 2.3.8 as part of 2.4.4 update

== New features {SMProductName} version 2.3.7

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
Expand Down Expand Up @@ -480,6 +533,32 @@ Additionally, the SMMR must also be configured for cluster-wide deployment. This
----
<1> Adds all namespaces to the mesh, including any namespaces you subsequently create. The following namespaces are not part of the mesh: kube, openshift, kube-* and openshift-*.

== New features {SMProductName} version 2.2.11

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.

=== Component versions included in {SMProductName} version 2.2.11
//Istio remains the same
//Kiali updated to 1.48.10
//Jaeger updated to 1.47.0
//Envoy remains the same
|===
|Component |Version

|Istio
|1.12.9

|Envoy Proxy
|1.20.8

|Jaeger
|1.47.0

|Kiali
|1.48.10
|===
//Components updated for 2.2.11 with 2.4.4 release

== New features {SMProductName} version 2.2.10

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.10 and later versions.
Expand Down

0 comments on commit 7ee13ea

Please sign in to comment.