Este contenido no está disponible en el idioma seleccionado.

Chapter 1. OpenShift Service Mesh release notes


Red Hat OpenShift Service Mesh release notes contain information about new features and enhancements, deprecated features, technology preview features, bug fixes, and known issues. They contain a set of tables for supported component versions and Istio features, and are organized by OpenShift Service Mesh version.

Note

For additional information about the Red Hat OpenShift Service Mesh life cycle and supported platforms, refer to the OpenShift Operator Life Cycles.

1.1. Red Hat OpenShift Service Mesh version 3.1.2

This release of Red Hat OpenShift Service Mesh is included with the Red Hat OpenShift Service Mesh Operator 3.1.2 and is supported on OpenShift Container Platform 4.16 and later. This release addresses enhancements, fixed issues, and Common Vulnerabilities and Exposures (CVEs).

For supported component versions for 3.1.2, see "Service Mesh version support tables".

1.1.1. Enhancements

  • This enhancement updates Istio to version 1.26.4.
  • This enhancement updates Kiali operator and Kiali server to version 2.11.3.

1.2. Red Hat OpenShift Service Mesh version 3.1.1

This release of Red Hat OpenShift Service Mesh is included with the Red Hat OpenShift Service Mesh Operator 3.1.1 and is supported on OpenShift Container Platform 4.16 and later. This release addresses enhancements, fixed issues, and Common Vulnerabilities and Exposures (CVEs).

For supported component versions for 3.1.1, see "Service Mesh version support tables".

1.2.1. Enhancements

  • This enhancement updates Istio to version 1.26.3.
  • This enhancement updates Kiali operator to version 2.11.2.

1.2.2. Fixed issues

  • Before this update, enabling NetworkPolicy field globally in the Istio custom resource (CR) failed to create the corresponding NetworkPolicy resource due to incorrect resource handling. This issue prevented users from applying network policies when Istio was enabled globally. With this update, NetworkPolicy resource creation is enabled upon Istio CR update, allowing end users to consistently apply network policy rules in Istio. (OSSM-10595)
  • Before this update, creating a PodDisruptionBudget for a single istiod pod with a minAvailable value of 1 caused an upgrade to fail, preventing node restart during upgrade. As a consequence, the upgrade was unsuccessful. With this update, the Istio Operator disables the default podDisruptionBudget for the single istiod pod in the Istio 1.24.3 configuration. As a result, the node can now restart during an upgrade without being prevented by the single istiod pod. (OSSM-9392)

This release makes Red Hat OpenShift Service Mesh 3.1 generally available, adds new features, addresses Common Vulnerabilities and Exposures (CVEs), and is supported on OpenShift Container Platform 4.16 and later.

For a list of supported component versions and support features, see "Service Mesh 3.0 feature support tables".

When upgrading from OpenShift Service Mesh 2.x, first you must migrate to version 3.0. Then, you can upgrade to version 3.1. For more information see, "Migrating from Service Mesh 2 to Service Mesh 3".

1.3.1. Support for Kubernetes Gateway API

This release introduces support for Kubernetes Gateway API custom resource definitions (CRDs). You can now use these CRDs to configure OpenShift Service Mesh with the Kubernetes Gateway API. This feature is available with Red Hat OpenShift Service Mesh 4.19.

1.3.2. Support for OpenShift Service Mesh on x86 dual-stack clusters

This release introduces support for OpenShift Service Mesh on x86 dual-stack clusters. This feature remains a technology preview on all other platforms.

1.3.3. Kubernetes Traffic Distribution Support

This release introduces support for the Kubernetes traffic distribution feature, part of the Kubernetes Service API, within OpenShift Service Mesh. As of Red Hat OpenShift Service Mesh 4.19, this is a Beta feature and requires enabling the ServiceTrafficDistribution parameter in the Istio Custom Resources (CRs).

1.3.4. Developer Preview for Kubernetes ClusterTrustBundle

This release introduces developer preview support for the experimental Kubernetes ClusterTrustBundle feature. This feature provides a new way of distributing X.509 trust anchors (root certificates) to workloads within the cluster. As of Red Hat OpenShift Service Mesh 4.19, this is an Alpha feature and requires enabling the ClusterTrustBundle feature.

1.3.5. UBI-micro base containers

This release updates OpenShift Service Mesh to use UBI-micro base containers for most container images. The UBI-micro image is the smallest possible Universal Base Image (UBI), which excludes a package manager and all of its dependencies normally included in a container image. This change minimizes the attack surface of container images that use the UBI-micro base.

This release includes some features that are currently in Technology Preview. These experimental features are not intended for production use. For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

1.4.1. Istio ambient mode

This release updates the status of Istio ambient mode to Technology Preview. Istio ambient mode provides a sidecar-less alternative data plane to the traditional sidecar-based data plane. By default, ambient mode splits the data plane into node-level L4 ZTunnels and namespace-scoped L7 Waypoint proxies.

Istio ambient mode requires Kubernetes Gateway API custom resource definitions (CRDs). Use OpenShift Service Mesh 4.19 or later, which includes the CRDs by default.

To avoid potential conflicts, you must install Istio ambient mode only on clusters that do not have an existing Red Hat OpenShift Service Mesh installation. Istio ambient mode is not compatible with clusters that use Red Hat OpenShift Service Mesh 2.6 or earlier.

When you use Istio ambient mode, pods that rely on liveness or readiness probes require you to set the OVN-Kubernetes gateway mode to local instead of the default shared mode. In local mode, traffic routes through the host and the host processes it using the routing table, ensuring that probes function correctly. For more information, see the "Configuring gateway mode" section in the OVN-Kubernetes documentation.

To start using Istio ambient mode, see the "Istio ambient mode" section in the OpenShift Service Mesh 3 installation documentation.

1.4.2. Kubernetes Gateway API Inference Extensions

This release provides technology preview support for Kubernetes Gateway API Inference Extensions. These extensions build on Kubernetes Gateway API to provide inference-specific routing capabilities that optimize for self-hosted generative-AI workloads. This implementation was backported to OpenShift Service Mesh 3.1 from Istio 1.27.

1.5. Red Hat OpenShift Service Mesh version 3.1 fixed issues

1.5.1. Kiali fixed issue

  • Before this update, the Kiali Operator provided by Red Hat used the k8s_cluster_info Ansible module from the kubernetes.core collection, which caused failures in certain environments during the Get API version information from the cluster task. As a result, Kiali deployment failure occurred, affecting service visibility and management. With this update, the Kiali Operator provided by Red Hat avoids the k8s_cluster_info module, resolving the issue and ensuring smooth Kiali installation for users. (OSSM-9659)

1.6. Red Hat OpenShift Service Mesh 3.1 known issues

1.6.1. podDisruptionBudget object that prevents nodes from upgrading

There is currently a known issue that prevents OpenShift Container Platform nodes from upgrading. The podDisruptionBudget resource prevents the draining of the node where the istiod pod is running, unless there are multiple replicas of the istiod pod.

Workaround: Set the .spec.values.global.defaultPodDisruptionBudget.enabled field in the Istio CR to false. Alternatively, you can temporarily increase the number of replicas for the istiod deployment. OSSM-9392

1.7. Red Hat OpenShift Service Mesh version 3.1 deprecated features

Some features available in previous releases have been deprecated or removed.

Deprecated functionality is still included in OpenShift Container Platform and continues to be supported; however, it will be removed in a future release of Red Hat OpenShift Service Mesh 3 and is not recommended for new deployments.

Removed functionality no longer exists in the product.

1.7.1. DNS auto-allocation in ProxyMetadata

This release removes the use of ISTIO_META_DNS_AUTO_ALLOCATE option in the proxyMetadata configuration. You can use the DNS auto-allocation label in the ServiceEntry resource instead. A future release will remove support for the ISTIO_META_DNS_AUTO_ALLOCATE option.

For more information about using the DNS auto-allocation label in the ServiceEntry resource, see the "Address auto-collection" section in the Istio documentation.

1.9. Red Hat OpenShift Service Mesh version 3.0.3

This release of Red Hat OpenShift Service Mesh is included with the Red Hat OpenShift Service Mesh Operator 3.0.3 and is supported on OpenShift Container Platform 4.14 and later. This release addresses Common Vulnerabilities and Exposures (CVEs) and is supported on OpenShift Container Platform 4.14 and later. For supported component versions for 3.0.3, see "Service Mesh version support tables".

1.9.1. Enhancements

  • This enhancement updates Istio to version 1.24.6. For more information, see OSSM-9758
  • This enhancement updates Kiali operator to version 2.4.7.

1.9.2. Bug fixes

  • Previously, the Kiali Operator provided by Red Hat used the k8s_cluster_info Ansible module from the kubernetes.core collection, which could fail in some environments with a result code of -9. This failure occurred during the Get api version information from the cluster Ansible task and prevented the Operator from reconciling Kiali custom resources (CRs). Now, the fix removes the use of the k8s_cluster_info Ansible module to prevent this error. (OSSM-9659)

1.10. Red Hat OpenShift Service Mesh version 3.0.2

This release of Red Hat OpenShift Service Mesh is included with the Red Hat OpenShift Service Mesh Operator 3.0.2 and is supported on OpenShift Container Platform 4.14 and later. This release addresses Common Vulnerabilities and Exposures (CVEs) and is supported on OpenShift Container Platform 4.14 and later. For supported component versions for 3.0.2, see "Service Mesh version support tables".

1.11. Red Hat OpenShift Service Mesh version 3.0.1

This release of Red Hat OpenShift Service Mesh is included with the Red Hat OpenShift Service Mesh Operator 3.0.1 and is supported on OpenShift Container Platform 4.14 and later. This release addresses Common Vulnerabilities and Exposures (CVEs) and is supported on OpenShift Container Platform 4.14 and later. For supported component versions for 3.0.1, see "Service Mesh version support tables".

1.12. OpenShift Service Mesh 3.0 new features and enhancements

This release makes Red Hat OpenShift Service Mesh 3.0 generally available, adds new features, addresses Common Vulnerabilities and Exposures (CVEs), and is supported on OpenShift Container Platform 4.14 and later.

For a list of supported component versions and support features, see "Service Mesh 3.0 feature support tables".

For a complete list of changes between OpenShift Service Mesh 2 and OpenShift Service Mesh 3, see "Important information to know if you are migrating from OpenShift Service Mesh 2.6".

1.12.1. Migration guides

This release adds a set of checklists and migration guides to help you migrate from OpenShift Service Mesh 2 to OpenShift Service Mesh 3.0.

You must complete the checklists first. The checklists help you set up and configure OpenShift Service Mesh 2 and the ServiceMeshControlPlane resource to migrate to OpenShift Service Mesh 3.0 and the Istio control plane resource.

Your migration depends on your deployment model:

  • Multitenant
  • Multitenant with cert-manager
  • Cluster-wide
  • Cluster-wide with cert-manager

You can also migrate gateways. For more information, see "Migrating from Service Mesh 2 to Service Mesh 3".

1.12.2. New Istio distribution and operator

OpenShift Service Mesh 3.0 is based on a Red Hat distribution of the Istio project and is deployed with a new Operator for Istio based on the Sail Operator project that is part of the istio-ecosystem organization on GitHub. The Sail Operator includes a new set of custom resource definitions (CRDs) for managing Istio. For example, the Istio CRD replaces the ServiceMeshControlPlane CRD in previous releases of OpenShift Service Mesh.

1.12.3. Support for Istioctl for select platforms and commands

This release adds support for select platforms and commands for Istioctl, the command line utility for the Istio project that includes many diagnostic and debugging utilities. For more information, see "Support for Istioctl".

Important

Installing Istio using the istioctl utility is not supported.

1.12.4. Support for multi-cluster deployment models

This release introduces support for the following Istio multi-cluster deployment models:

  • Multi-primary
  • Primary-remote
  • An external control plane

The federation feature introduced in OpenShift Service Mesh 2.1 is not available in OpenShift Service Mesh 3.0.

1.12.5. Multiple control planes in a single cluster

This release adds support for the Istio feature of multiple control planes in a single cluster. This replaces the MultiTenant deployment model (mode) in OpenShift Service Mesh 2.

1.12.6. Revision based updates

This release adds support for canary-style updates of the Istio control plane using the Istio revision feature. This enables a new Istio control plane to be created alongside the existing Istio control plane so that workloads can be migrated incrementally. The update strategy is configured using the spec.updateStrategy parameter of the Istio resource.

For more information, see "About RevisionBased strategy".

1.12.7. IstioCNI custom resource definition

This release introduces the IstioCNI custom resource definition (CRD), which is used to manage the lifecycle of the Istio Container Network Interface (CNI) daemon set. A single instance of this resource must be created per cluster to configure traffic redirection for pods in the mesh. The Istio CNI lifecycle is independent of the Istio control plane or planes.

1.12.8. IPv4/IPv6 dual-stack (Technology Preview)

Important

IPv4/IPv6 dual-stack is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

This release includes IPv4/IPv6 dual-stack support as a technology preview feature. This aligns with the Alpha status of the Istio upstream project, and is feature-complete for Istio when using sidecars. Dual-stack helps organizations smoothly transition to IPv6, while still maintaining compatibility with their existing IPv4 setup.

In OpenShift Service Mesh 3.0, dual-stack is disabled by default in the Istio resource. You can enable it with specific configuration changes, such as the one shown in the following example:

Example YAML configuration for IPv4/IPv6 dual stack

apiVersion: sailoperator.io/v1
kind: Istio
metadata:
  name: default
spec:
  values:
    meshConfig:
      defaultConfig:
        proxyMetadata:
          ISTIO_DUAL_STACK: "true"
    pilot:
      ipFamilyPolicy: RequireDualStack
      env:
        ISTIO_DUAL_STACK: "true"
  namespace: istio-system
Copy to Clipboard Toggle word wrap

1.12.9. Istio Ambient mode (Developer Preview)

Important

Istio Ambient mode is a Developer Preview feature only. Developer Preview features are not supported by Red Hat in any way and are not functionally complete or production-ready. Do not use Developer Preview features for production or business-critical workloads. Developer Preview features provide early access to upcoming product features in advance of their possible inclusion in a Red Hat product offering, enabling customers to test functionality and provide feedback during the development process. These features might not have any documentation, are subject to change or removal at any time, and testing is limited. Red Hat might provide ways to submit feedback on Developer Preview features without an associated SLA.

Istio Ambient mode provides a sidecarless service mesh architecture that reduces resource overhead, simplifies operations, and allows incremental adoption without application changes. It maintains security and observability through a layered security model with mTLS and authorization. The OpenShift Service Mesh 3 Operator includes deploying the Ambient profile as a developer preview feature using the community Ztunnel image. However, the Ambient profile should not be used on clusters with production workloads or for multi-control plane use cases.

The community Ztunnel image is unavailable on the following platforms:

  • IBM Power®
  • IBM Z®
  • OpenShift Container Platform clusters in FIPS mode

1.13. Red Hat OpenShift Service Mesh 3.0 known issues

  • OSSM-8878 In Red Hat OpenShift Service Mesh 3.0, OpenShift Container Platform builder pods fail to create in namespaces with injection enabled. As a workaround, add injection labels to workloads instead of the namespace when creating the BuildConfigs resource.

1.14. OpenShift Service Mesh 3.0 deprecated and removed features

Some features available in previous releases have been deprecated or removed.

Deprecated functionality is still included in OpenShift Container Platform and continues to be supported; however, it will be removed in a future release of Red Hat OpenShift Service Mesh 3 and is not recommended for new deployments.

Removed functionality no longer exists in the product.

1.14.1. Istio OpenShift routes (IOR)

This release removes the Istio OpenShift Route (IOR) for automatically creating and managing OpenShift Route resources with Istio Gateway resources. Istio Gateways are managed independent of the Istio control plane using either Gateway injection or Kubernetes Gateway API.

1.14.2. Metrics and tracing integrations

OpenShift Service Mesh 3.0 no longer includes Prometheus and Grafana, and it does not manage the configuration of Jaeger and Elasticsearch. Both Jaeger and Elasticsearch are deprecated and will be removed in a future release.

Supported integrations are provided with Red Hat OpenShift Observability, including user-workload monitoring and distributed tracing. For more information, see "Red Hat OpenShift Observability and Service Mesh". Support is also provided for the Kiali Operator provided by Red Hat. For more information, see "Using Kiali Operator provided by Red Hat".

Volver arriba
Red Hat logoGithubredditYoutubeTwitter

Aprender

Pruebe, compre y venda

Comunidades

Acerca de la documentación de Red Hat

Ayudamos a los usuarios de Red Hat a innovar y alcanzar sus objetivos con nuestros productos y servicios con contenido en el que pueden confiar. Explore nuestras recientes actualizaciones.

Hacer que el código abierto sea más inclusivo

Red Hat se compromete a reemplazar el lenguaje problemático en nuestro código, documentación y propiedades web. Para más detalles, consulte el Blog de Red Hat.

Acerca de Red Hat

Ofrecemos soluciones reforzadas que facilitan a las empresas trabajar en plataformas y entornos, desde el centro de datos central hasta el perímetro de la red.

Theme

© 2025 Red Hat