Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 2 additions & 2 deletions _attributes/common-attributes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -158,8 +158,8 @@ endif::[]
:product-rosa: Red Hat OpenShift Service on AWS
:SMProductName: Red Hat OpenShift Service Mesh
:SMProductShortName: Service Mesh
:SMProductVersion: 2.4.5
:MaistraVersion: 2.4
:SMProductVersion: 2.5
:MaistraVersion: 2.5
//Service Mesh v1
:SMProductVersion1x: 1.1.18.2
//Windows containers
Expand Down
11 changes: 11 additions & 0 deletions modules/ossm-rn-deprecated-features.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,17 @@ Deprecated functionality is still included in {product-title} and continues to b

Removed functionality no longer exists in the product.

[id="deprecated-removed-features-ossm-2-5"]
== Deprecated and removed features in {SMProductName} 2.5

The v2.2 `ServiceMeshControlPlane` resource is no longer supported. Customers should update their mesh deployments to use a later version of the `ServiceMeshControlPlane` resource.

Support for the Jaeger Operator is deprecated. To collect trace spans, use the {DTProductName} (Tempo) Stack.

Support for the Elastic Search Operator is deprecated.

Istio will remove support for first-party JSON Web Tokens (JWTs). Istio will still support third-Party JWTs.

== Deprecated and removed features in {SMProductName} 2.4

The v2.1 `ServiceMeshControlPlane` resource is no longer supported. Customers should upgrade their mesh deployments to use a later version of the `ServiceMeshControlPlane` resource.
Expand Down
16 changes: 11 additions & 5 deletions modules/ossm-rn-fixed-issues.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,17 @@ Provide the following info for each issue if possible:

The following issue has been resolved in the current release:

* https://issues.redhat.com/browse/OSSM-1397[OSSM-1397] Previously, if you removed the `maistra.io/member-of` label from a namespace, the {SMProductShortName} Operator did not automatically reapply the label to the namespace. As a result, sidecar injection did not work in the namespace.
+
The Operator would reapply the label to the namespace when you made changes to the `ServiceMeshMember` object, which triggered the reconciliation of this member object.
+
Now, any change to the namespace also triggers the member object reconciliation.

The following issues have been resolved in previous releases:

[id="ossm-rn-fixed-issues-ossm_{context}"]
== {SMProductShortName} fixed issues

* https://issues.redhat.com/browse/OSSM-3647[OSSM-3647] Previously, in the {SMProductShortName} control plane (SMCP) v2.2 (Istio 1.12), WasmPlugins were applied only to inbound listeners. Since SMCP v2.3 (Istio 1.14), WasmPlugins have been applied to inbound and outbound listeners by default, which introduced regression for users of the 3scale WasmPlugin. Now, the environment variable `APPLY_WASM_PLUGINS_TO_INBOUND_ONLY` is added, which allows safe migration from SMCP v2.2 to v2.3 and v2.4.
+
The following setting should be added to the SMCP config:
Expand All @@ -41,11 +52,6 @@ To ensure safe migration, perform the following steps:
. Remove the previously-added environment variable.
--

The following issues have been resolved in previous releases:

[id="ossm-rn-fixed-issues-ossm_{context}"]
== {SMProductShortName} fixed issues

* https://issues.redhat.com/browse/OSSM-4851[OSSM-4851] Previously, an error occurred in the operator deploying new pods in a namespace scoped inside the mesh when `runAsGroup`, `runAsUser`, or `fsGroup` parameters were `nil`. Now, a yaml validation has been added to avoid the `nil` value.

* https://issues.redhat.com/browse/OSSM-3771[OSSM-3771] Previously, OpenShift routes could not be disabled for additional ingress gateways defined in a Service Mesh Control Plane (SMCP). Now, a `routeConfig` block can be added to each `additionalIngress` gateway so the creation of OpenShift routes can be enabled or disabled for each gateway.
Expand Down
34 changes: 34 additions & 0 deletions modules/ossm-rn-known-issues.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -36,6 +36,40 @@ endif::openshift-rosa[]

These are the known issues in {SMProductName}:

* https://issues.redhat.com/browse/OSSM-6099[OSSM-6099] Installing the OpenShift {SMProductShortName} Console (OSSMC) plugin fails on an IPv6 cluster.
+
Workaround: Install the OSSMC plugin on an IPv4 cluster.

* https://issues.redhat.com/browse/OSSM-5556[OSSM-5556] Gateways are skipped when istio-system labels do not match discovery selectors.
+
Workaround: Label the control plane namespace to match discovery selectors to avoid skipping the Gateway configurations.
+
.Example `ServiceMeshControlPlane` resource
[source,YAML]
----
apiVersion: maistra.io/v2
kind: ServiceMeshControlPlane
metadata:
name: basic
namespace: istio-system
spec:
mode: ClusterWide
meshConfig:
discoverySelectors:
- matchLabels:
istio-discovery: enabled
gateways:
ingress:
enabled: true
----
+
Then, run the following command at the command line:
+
[source,terminal]
----
oc label namespace istio-system istio-discovery=enabled
----

* https://issues.redhat.com/browse/OSSM-3890[OSSM-3890] Attempting to use the Gateway API in a multitenant mesh deployment generates an error message similar to the following:
+
[source,text]
Expand Down
148 changes: 145 additions & 3 deletions modules/ossm-rn-new-features.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,131 @@ Module included in the following assemblies:

This release adds improvements related to the following components and concepts.

[id="new-features-ossm-2-5"]
== New features {SMProductName} version 2.5

This release of {SMProductName} adds new features, addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.

This release ends maintenance support for OpenShift {SMProductShortName} version 2.2. If you are using OpenShift {SMProductShortName} version 2.2, you should update to a supported version.

=== Component versions for {SMProductName} version 2.5

|===
|Component |Version

|Istio
|1.18.5

|Envoy Proxy
|1.26.8

|Kiali
|1.73.4
|===

=== Istio 1.18 support

Service Mesh 2.5 is based on Istio 1.18, which brings in new features and product enhancements. While {SMProductName} supports many Istio 1.18 features, the following exceptions should be noted:

* Ambient mesh is not supported
* QuickAssist Technology (QAT) PrivateKeyProvider in Istio is not supported

=== Cluster-Wide mesh migration

This release adds documentation for migrating from a multitenant mesh to a cluster-wide mesh. For more information, see the following documentation:

* "About migrating to a cluster-wide mesh"
* "Excluding namespaces from a cluster-wide mesh"
* "Defining which namespaces receive sidecar injection in a cluster-wide mesh"
* "Excluding individual pods from a cluster-wide mesh"

=== {SMProductName} Operator on ARM-based clusters

This release provides the {SMProductName} Operator on ARM-based clusters as a generally available feature.

=== Integration with {DTProductName} (Tempo) Stack

This release introduces a generally available integration of the tracing extension provider(s). You can expose tracing data to the {DTProductName} (Tempo) stack by appending a named element and the `zipkin` provider to the `spec.meshConfig.extensionProviders` specification. Then, a telemetry custom resource configures Istio proxies to collect trace spans and send them to the Tempo distributor service endpoint.

[NOTE]
====
{DTProductName} (Tempo) Stack is not supported on {ibm-z-title}.
====

=== OpenShift Service Mesh Console plugin

This release introduces a generally available version of the OpenShift {SMProductShortName} Console (OSSMC) plugin.

The OSSMC plugin is an extension to the OpenShift Console that provides visibility into your Service Mesh. With the OSSMC plugin installed, a new Service Mesh menu option is available in the left-hand navigation of the web console, as well as new Service Mesh tabs that enhance existing Workloads and Service console pages.

The features of the OSSMC plugin are very similar to those of the standalone Kiali Console. The OSSMC plugin does not replace the Kiali Console, and after installing the OSSMC plugin, you can still access the standalone Kiali Console.

=== Istio OpenShift Routing (IOR) default setting change

The default setting for Istio OpenShift Routing (IOR) has changed. Starting with this release, automatic routes are disabled by default for new instances of the `ServiceMeshControlPlane` resource.

For new instances of the `ServiceMeshControlPlane` resources, you can use automatic routes by setting the `enabled` field to `true` in the `gateways.openshiftRoute` specification of the `ServiceMeshControlPlane` resource.

.Example `ServiceMeshControlPlane` resource
[source,yaml]
----
apiVersion: maistra.io/v2
kind: ServiceMeshControlPlane
spec:
gateways:
openshiftRoute:
enabled: true
----

When updating existing instances of the `ServiceMeshControlPlane` resource to {SMProductName} version 2.5, automatic routes remain enabled by default.

=== Istio proxy concurrency configuration enhancement

The `concurrency` parameter in the `networking.istio` API configures how many worker threads the Istio proxy runs.

For consistency across deployments, Istio now configures the `concurrency` parameter based upon the CPU limit allocated to the proxy container. For example, a limit of 2500m would set the `concurrency` parameter to `3`. If you set the `concurrency` parameter to a different value, then Istio uses that value to configure how many threads the proxy runs instead of using the CPU limit.

Previously, the default setting for the parameter was `2`.

=== Gateway API CRD versions
:FeatureName: {product-title} Gateway API support
include::snippets/technology-preview.adoc[]

A new version of the Gateway API custom resource definition (CRD) is now available. Refer to the following table to determine which Gateway API version should be installed with the OpenShift {SMProductShortName} version you are using:

|===
|Service Mesh Version | Istio Version | Gateway API Version | Notes

|2.5.x
|1.18.x
|0.6.2
|Use the experimental branch because `ReferenceGrand` is missing in v0.6.2

|2.4.x
|1.16.x
|0.5.1
|For multitenant mesh deployment, all Gateway API CRDs must be present. Use the experimental branch.
|===

[id="new-features-ossm-2-4-6"]
== New features {SMProductName} version 2.4.6

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.

=== Component versions for {SMProductName} version 2.4.6
|===
|Component |Version

|Istio
|1.16.7

|Envoy Proxy
|1.24.12

|Kiali
|1.65.11
|===

== New features {SMProductName} version 2.4.5

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.11 and later versions.
Expand All @@ -34,9 +159,6 @@ This release of {SMProductName} addresses Common Vulnerabilities and Exposures (
|Envoy Proxy
|1.24.12

|Jaeger
|1.47.0

|Kiali
|1.65.11
|===
Expand Down Expand Up @@ -286,6 +408,26 @@ endif::openshift-rosa[]
* {SMProductShortName} on ARM64 architecture is not supported.
* OpenTelemetry API remains a Technology Preview feature.

[id="new-features-ossm-2-3-10"]
== New features {SMProductName} version 2.3.10
//Update with 2.5

This release of {SMProductName} addresses Common Vulnerabilities and Exposures (CVEs), contains bug fixes, and is supported on {product-title} 4.13 and later.

=== Component versions for {SMProductName} version 2.3.10
|===
|Component |Version

|Istio
|1.14.5

|Envoy Proxy
|1.22.11

|Kiali
|1.57.14
|===

== New features {SMProductName} version 2.3.9
//Update with 2.4.5

Expand Down