Skip to content

Commit 749cb13

Browse files
OSSM-8570: 2.6.5 (At Stage): [DOC] Release Notes
1 parent 4f3e07e commit 749cb13

File tree

7 files changed

+111
-10
lines changed

7 files changed

+111
-10
lines changed

_attributes/common-attributes.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -186,7 +186,7 @@ endif::[]
186186
:product-rosa: Red Hat OpenShift Service on AWS
187187
:SMProductName: Red Hat OpenShift Service Mesh
188188
:SMProductShortName: Service Mesh
189-
:SMProductVersion: 2.6.4
189+
:SMProductVersion: 2.6.5
190190
:MaistraVersion: 2.6
191191
:KialiProduct: Kiali Operator provided by Red Hat
192192
:SMPlugin: OpenShift Service Mesh Console (OSSMC) plugin

modules/ossm-release-2-4-14.adoc

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
////
2+
Module included in the following assemblies:
3+
* service_mesh/v2x/servicemesh-release-notes.adoc
4+
////
5+
6+
:_mod-docs-content-type: REFERENCE
7+
[id="ossm-release-2-4-14_{context}"]
8+
= {SMProductName} version 2.4.14
9+
10+
This release of {SMProductName} is included with the {SMProductName} Operator 2.6.5 and is supported on {product-title} 4.14 and later. This release addresses Common Vulnerabilities and Exposures (CVEs).
11+
12+
[id=ossm-release-2-4-14-components_{context}]
13+
== Component updates
14+
15+
|===
16+
|Component |Version
17+
18+
|Istio
19+
|1.16.7
20+
21+
|Envoy Proxy
22+
|1.24.12
23+
24+
|Kiali Server
25+
|1.65.19
26+
|===
27+
28+
[id="ossm-fixed-issues-2-4-14_{context}"]
29+
== Fixed issues
30+
31+
* https://issues.redhat.com/browse/OSSM-8608[OSSM-8608] Previously, terminating a Container Network Interface (CNI) pod during the installation phase while copying binaries could leave Istio-CNI temporary files on the node file system. Repeated occurrences could eventually fill up the node disk space. Now, while terminating a CNI pod during the installation phase, existing temporary files are deleted before copying the CNI binary, ensuring that only one temporary file per Istio version exists on the node file system.

modules/ossm-release-2-5-8.adoc

Lines changed: 31 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,31 @@
1+
////
2+
Module included in the following assemblies:
3+
* service_mesh/v2x/servicemesh-release-notes.adoc
4+
////
5+
6+
:_mod-docs-content-type: REFERENCE
7+
[id="ossm-release-2-5-8_{context}"]
8+
= {SMProductName} version 2.5.8
9+
10+
This release of {SMProductName} is included with the {SMProductName} Operator 2.6.5 and is supported on {product-title} 4.14 and later. This release addresses Common Vulnerabilities and Exposures (CVEs).
11+
12+
[id=ossm-release-2-5-8-components_{context}]
13+
== Component updates
14+
15+
|===
16+
|Component |Version
17+
18+
|Istio
19+
|1.18.7
20+
21+
|Envoy Proxy
22+
|1.26.8
23+
24+
|Kiali Server
25+
|1.73.18
26+
|===
27+
28+
[id="ossm-fixed-issues-2-5-8_{context}"]
29+
== Fixed issues
30+
31+
* https://issues.redhat.com/browse/OSSM-8608[OSSM-8608] Previously, terminating a Container Network Interface (CNI) pod during the installation phase while copying binaries could leave Istio-CNI temporary files on the node file system. Repeated occurrences could eventually fill up the node disk space. Now, while terminating a CNI pod during the installation phase, existing temporary files are deleted before copying the CNI binary, ensuring that only one temporary file per Istio version exists on the node file system.

modules/ossm-release-2-6-0.adoc

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -98,13 +98,6 @@ You can expose tracing data to the {TempoName} by appending a named element and
9898

9999
You can create a {OTELName} instance in a mesh namespace and configure it to send tracing data to a tracing platform backend service.
100100

101-
//Still true for 2.6
102-
//Asked in forum-ocp-tracing channel 06/24/2024, verified 06/25/2024
103-
[NOTE]
104-
====
105-
{TempoName} Stack is not supported on {ibm-z-title}.
106-
====
107-
108101
[id="jaeger-default-setting-change-ossm-2-6-0_{context}"]
109102
== {JaegerName} default setting change
110103
//also included in "Upgrading --> Upgrading 2.5 to 2.6" but added here for increased visibility.

modules/ossm-release-2-6-4.adoc

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -11,8 +11,6 @@ This release of {SMProductName} updates the {SMProductName} Operator version to
1111

1212
This release addresses Common Vulnerabilities and Exposures (CVEs) and is supported on {product-title} 4.14 and later.
1313

14-
include::snippets/ossm-current-version-support-snippet.adoc[]
15-
1614
The most current version of the {KialiProduct} can be used with all supported versions of {SMProductName}. The version of {SMProductShortName} is specified by using the `ServiceMeshControlPlane` resource. The version of {SMProductShortName} automatically ensures a compatible version of Kiali.
1715

1816
[id=ossm-release-2-6-4-components_{context}]

modules/ossm-release-2-6-5.adoc

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
////
2+
Module included in the following assemblies:
3+
* service_mesh/v2x/servicemesh-release-notes.adoc
4+
////
5+
6+
:_mod-docs-content-type: REFERENCE
7+
[id="ossm-release-2-6-5_{context}"]
8+
= {SMProductName} version 2.6.5
9+
10+
This release of {SMProductName} updates the {SMProductName} Operator version to 2.6.5, and includes the following `ServiceMeshControlPlane` resource version updates: 2.6.5, 2.5.8, and 2.4.14.
11+
12+
This release addresses Common Vulnerabilities and Exposures (CVEs) and is supported on {product-title} 4.14 and later.
13+
14+
include::snippets/ossm-current-version-support-snippet.adoc[]
15+
16+
You can use the most current version of the {KialiProduct} with all supported versions of {SMProductName}. The version of {SMProductShortName} is specified by using the `ServiceMeshControlPlane` resource. The version of {SMProductShortName} automatically ensures a compatible version of Kiali.
17+
18+
[id=ossm-release-2-6-5-components_{context}]
19+
== Component updates
20+
21+
|===
22+
|Component |Version
23+
24+
|Istio
25+
|1.20.8
26+
27+
|Envoy Proxy
28+
|1.28.7
29+
30+
|Kiali Server
31+
|1.73.18
32+
|===
33+
34+
[id="ossm-new-features-2-6-5_{context}"]
35+
== New features
36+
37+
* {TempoName} Stack is now supported on {ibm-z-title}.
38+
39+
[id="ossm-fixed-issues-2-6-5_{context}"]
40+
== Fixed issues
41+
42+
* https://issues.redhat.com/browse/OSSM-8608[OSSM-8608] Previously, terminating a Container Network Interface (CNI) pod during the installation phase while copying binaries could leave Istio-CNI temporary files on the node file system. Repeated occurrences could eventually fill up the node disk space. Now, while terminating a CNI pod during the installation phase, existing temporary files are deleted before copying the CNI binary, ensuring that only one temporary file per Istio version exists on the node file system.

service_mesh/v2x/servicemesh-release-notes.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,12 @@ toc::[]
1010

1111
include::modules/making-open-source-more-inclusive.adoc[leveloffset=+1]
1212

13+
include::modules/ossm-release-2-6-5.adoc[leveloffset=+1]
14+
15+
include::modules/ossm-release-2-5-8.adoc[leveloffset=+1]
16+
17+
include::modules/ossm-release-2-4-14.adoc[leveloffset=+1]
18+
1319
include::modules/ossm-release-2-6-4.adoc[leveloffset=+1]
1420

1521
include::modules/ossm-release-2-5-7.adoc[leveloffset=+1]

0 commit comments

Comments
 (0)