Ce contenu n'est pas disponible dans la langue sélectionnée.

Chapter 1. OpenShift Service Mesh release notes


Red Hat OpenShift Service Mesh release notes contain information about new features and enhancements, and known issues. They contain a set of tables for supported component versions and Istio features, and are organized by OpenShift Service Mesh version.

Note

For additional information about the Red Hat OpenShift Service Mesh life cycle and supported platforms, refer to the OpenShift Operator Life Cycles.

This release makes Red Hat OpenShift Service Mesh 3.2 generally available, adds new features, addresses Common Vulnerabilities and Exposures (CVEs), and is supported on OpenShift Container Platform 4.18 and later.

For a list of supported component versions and support features, see "Service Mesh 3.2 feature support tables".

When upgrading from OpenShift Service Mesh 2.x, you must first migrate to version 3.0 and then to version 3.1. Then, you can upgrade to version 3.2. For more information, see "Migrating from Service Mesh 2 to Service Mesh 3".

1.1.1. General availability of Istio ambient mode

This enhancement brings the core features of Istio ambient mode, ztunnel, and waypoint, to general availability. Ambient mode reduces the resource costs of running a service mesh by removing the need for sidecar proxies with a new data plane architecture that consists of the following two levels of proxy:

  • The layer 4 node level ztunnel proxy
  • The layer 7 application level waypoint proxy

1.1.2. Updated feature support matrix for ambient mode

This enhancement provides an updated feature support matrix for Istio ambient mode. Not all sidecar mode features are supported in ambient mode. For detailed information about supported and unsupported features, see "Service Mesh feature support tables".

Istio ambient mode uses an application-layer tunnel (L7) called HBONE to carry TCP traffic (L4) securely between workloads. The ztunnel component tunnels pod traffic over TCP port 15008. If existing Kubernetes NetworkPolicy configurations block inbound traffic on this port, update them to allow inbound TCP traffic on port 15008 for ambient workloads. Sidecar workloads must also allow inbound traffic on this port to communicate with ambient workloads. For more information, see "Configuring network policies for ambient mode".

To ensure liveness and readiness probes continue to function correctly for workloads running in Istio ambient mode, you must enable OVN-Kubernetes local gateway mode by setting routingViaHost: true in the gatewayConfig specification. For more information, see the "OVN-Kubernetes documentation"

Before this update, OpenShift Service Mesh Console (OSSMC) plugin users could not navigate directly from Service Mesh to Network Traffic. With this update, users can now click a workload in the Service Mesh Traffic Graph and find a new Network Traffic link in the side panel. This feature gives users one-click access to network flow data for that specific workload. The link only appears if the NetObserv plugin is successfully installed and detected by the console.

With the 3.2 release, enabling the global networkPolicy setting now extends NetworkPolicy creation to include istio-cni and ztunnel resources, in addition to the previously supported istiod and gateway resources.

1.2. Red Hat OpenShift Service Mesh 3.2 known issues

Istio ambient mode does not currently support OpenShift clusters running in Federal Information Processing Standards (FIPS) mode. Deployments that require FIPS compliance must continue using sidecar mode until support becomes available in a future release.

1.2.2. Limitation due to ztunnel concurrency issue

A concurrency issue in ztunnel limits throughput scalability in Istio ambient mode. Performance remains comparable to sidecar mode in most scenarios, but the issue can limit the potential to scale throughput performance.

OSSM-11132

Configuring Istio in sidecar mode with Transparent Proxy (TPROXY) on s390x and PowerPC hardware platforms causes the istio-proxy container to fail certificate signing and remain unready. As a consequence, the sidecar cannot reach the Istiod service and the connection times out. As a result, affected workloads cannot run successfully under these conditions.

Running Istio in ambient mode on the s390x hardware platform causes the waypoint proxy to emit incomplete telemetry after the namespace is enrolled. As a consequence, tools such as Kiali cannot generate accurate graphs or diagrams, resulting in missing edges, unknown fields, or no visualization data. As a result, telemetry-dependent observability features remain incomplete on affected clusters.

OSSM-11285

Retour au début
Red Hat logoGithubredditYoutubeTwitter

Apprendre

Essayez, achetez et vendez

Communautés

À propos de la documentation Red Hat

Nous aidons les utilisateurs de Red Hat à innover et à atteindre leurs objectifs grâce à nos produits et services avec un contenu auquel ils peuvent faire confiance. Découvrez nos récentes mises à jour.

Rendre l’open source plus inclusif

Red Hat s'engage à remplacer le langage problématique dans notre code, notre documentation et nos propriétés Web. Pour plus de détails, consultez le Blog Red Hat.

À propos de Red Hat

Nous proposons des solutions renforcées qui facilitent le travail des entreprises sur plusieurs plates-formes et environnements, du centre de données central à la périphérie du réseau.

Theme

© 2025 Red Hat