Edit release notes for consistency and clarity. (#3737)

Signed-off-by: rcaballeromx <grca@google.com>
This commit is contained in:
Rigs Caballero 2019-03-18 10:52:40 -07:00 committed by istio-bot
parent 0a18a02929
commit e5499e77e9
1 changed files with 129 additions and 78 deletions

View File

@ -4,10 +4,13 @@ publishdate: 2019-03-20
icon: notes
---
We're proud to release Istio 1.1! We have spent the last 8 months making some significant improvements to the overall
product, with fixes & features from Google, IBM, VMware, Huawei, RedHat, Cisco, SAP, Salesforce, Pivotal, SUSE, Datadog
and LightStep, to name a few. Special thanks to all of our end-users for providing feedback, feature requests and
testing the release candidates at various scales.
We're proud to release Istio 1.1!
We have spent the last 8 months making some significant improvements to the
overall product, with fixes and features from Google, IBM, VMware, Huawei,
RedHat, Cisco, SAP, Salesforce, Pivotal, SUSE, Datadog and LightStep, to name a
few. Special thanks to all of our end-users for providing feedback, feature
requests, and testing the release candidates at various scales.
These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
@ -16,106 +19,141 @@ These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
## Upgrades
- We recommend a manual upgrade of the control plane and data plane to 1.1. See
[upgrades](/docs/setup/kubernetes/upgrade/) for more information.
the [upgrades documents](/docs/setup/kubernetes/upgrade/) for more
information.
{{< warning >}}
Be sure to check out the [upgrade notice](/docs/setup/upgrade-notice) for a concise list of things you should know before
upgrading your deployment to Istio 1.1.
Be sure to check out the [upgrade notice](/docs/setup/upgrade-notice) for a
concise list of things you should know before upgrading your deployment to
Istio 1.1.
{{< /warning >}}
## Installation
- **CRD Install Separated from Istio Install**. Istios CRDs have been placed into their own Helm chart `istio-init`.
By placing CRDs in their own Helm chart, data continuity of custom resource content is preserved during the upgrade
process and further enables Istio to evolve beyond a Helm-based installation.
- **CRD Install Separated from Istio Install**. Placed Istios Custom Resource
Definitions (CRDs) into the `istio-init` Helm chart. Placing the CRDs in
their own Helm chart preserves the data continuity of the custom resource
content during the upgrade process and further enables Istio to evolve beyond
a Helm-based installation.
- **Installation Configuration Profiles**. Several installation configuration profiles have been added to
simplify the installation process using well-known and well-tested patterns. Learn more about the better
user experience afforded by the [installation profile feature](/docs/setup/kubernetes/additional-setup/config-profiles/).
- **Installation Configuration Profiles**. Added several installation
configuration profiles to simplify the installation process using well-known
and well-tested patterns. Learn more about the better user experience
afforded by the [installation profile feature](/docs/setup/kubernetes/additional-setup/config-profiles/).
- **Improved Multicluster Integration**. The 1.0 `istio-remote` chart previously used for
- **Improved Multicluster Integration**. Consolidated the 1.0 `istio-remote`
chart previously used for
[multicluster VPN](/docs/setup/kubernetes/install/multicluster/vpn/) and
[multicluster split horizon](/docs/examples/multicluster/split-horizon-eds/) remote cluster installation
has been consolidated into the Istio Helm chart simplifying the operational experience.
into the Istio Helm chart simplifying the operational experience.
## Traffic management
- **New `Sidecar` Resource**. Added support to limit the set of services visible to sidecar proxies in a given namespace using the `Sidecar` resource.
This limit reduces the amount of configuration computed and transmitted to the proxy. On large clusters, we recommend adding
a sidecar resource per namespace.
- **New `Sidecar` Resource**. Added support to limit the set of services
visible to sidecar proxies in a given namespace using the `Sidecar` resource.
This limit reduces the amount of configuration computed and transmitted to
the proxy. On large clusters, we recommend adding a sidecar resource per
namespace.
- **Restrict Visibility of Networking Resources**. Added the new `exportTo` field to all networking resources
which lets you control the visibility of individual resources to specific namespaces.
- **Restrict Visibility of Networking Resources**. Added the new `exportTo`
field to all networking resources which lets you control the visibility of
individual resources to specific namespaces.
- **Updates to `ServiceEntry` Resources**. Added support to specify the locality of a service
and the associated SAN to use with mutual TLS. Service entries with HTTPS ports no
longer need an additional virtual service to enable SNI-based routing.
- **Updates to `ServiceEntry` Resources**. Added support to specify the
locality of a service and the associated SAN to use with mutual TLS. Service
entries with HTTPS ports no longer need an additional virtual service to
enable SNI-based routing.
- **Locality-Aware Routing**. Added full support for routing to services in the same locality before picking services in other localities.
- **Locality-Aware Routing**. Added full support for routing to services in the
same locality before picking services in other localities.
- **Refined Multicluster Routing**. Simplified the multicluster setup and enabled additional deployment modes. You can now
connect multiple clusters simply using their ingress gateways without needing pod-level VPNs, deploy control planes in each
cluster for high-availability cases, and span a namespace across several clusters
to create global namespaces. Locality-aware routing is enabled by default in the high-availability control plane solution.
- **Refined Multicluster Routing**. Simplified the multicluster setup and
enabled additional deployment modes. You can now connect multiple clusters
simply using their ingress gateways without needing pod-level VPNs, deploy
control planes in each cluster for high-availability cases, and span a
namespace across several clusters to create global namespaces. Locality-aware
routing is enabled by default in the high-availability control plane
solution.
- **Istio Ingress Deprecated**. Removed the previously deprecated Istio ingress. Refer to the
[Securing Kubernetes Ingress with Cert-Manager](/docs/examples/advanced-gateways/ingress-certmgr/) example for more details
on how to use Kubernetes Ingress resources with [gateways](/docs/concepts/traffic-management/#gateways).
- **Istio Ingress Deprecated**. Removed the previously deprecated Istio
ingress. Refer to the [Securing Kubernetes Ingress with Cert-Manager](/docs/examples/advanced-gateways/ingress-certmgr/)
example for more details on how to use Kubernetes Ingress resources with
[gateways](/docs/concepts/traffic-management/#gateways).
- **Performance and Scalability Improvements**. The performance and scalability of Istio and Envoy have been highly tuned.
Read more about [Performance & Scalability](/docs/concepts/performance-and-scalability/) enhancements.
- **Performance and Scalability Improvements**. Tuned the performance and
scalability of Istio and Envoy. Read more about [Performance and Scalability](/docs/concepts/performance-and-scalability/)
enhancements.
- **Access Logging Off by Default**. The access logs for all Envoy sidecars have been disabled by default to improve
performance.
- **Access Logging Off by Default**. Disabled the access logs for all Envoy
sidecars by default to improve performance.
## Security
- **Readiness and Liveness Probes**. Added support for Kubernetes' HTTP [readiness and liveness probes when mutual TLS is enabled](/help/faq/security/#k8s-health-checks).
- **Readiness and Liveness Probes**. Added support for Kubernetes' HTTP
[readiness and liveness probes](/help/faq/security/#k8s-health-checks) when
mutual TLS is enabled.
- **Cluster RBAC Configuration**. Replaced the `RbacConfig` resource with the `ClusterRbacConfig` resource to implement the correct cluster scope.
See [Migrating `RbacConfig` to `ClusterRbacConfig`](/docs/setup/kubernetes/upgrade/#migrating-from-rbacconfig-to-clusterrbacconfig).
for migration instructions.
- **Cluster RBAC Configuration**. Replaced the `RbacConfig` resource with the
`ClusterRbacConfig` resource to implement the correct cluster scope. See
[Migrating `RbacConfig` to `ClusterRbacConfig`](/docs/setup/kubernetes/upgrade/#migrating-from-rbacconfig-to-clusterrbacconfig).
for migration instructions.
- **Identity Provisioning Through SDS**. Provides stronger security with on-node key generation and dynamic certificate rotation without restarting Envoy.
See [Provisioning Identity through SDS](/docs/tasks/security/auth-sds) for more information.
- **Identity Provisioning Through SDS**. Added SDS support to provide stronger
security with on-node key generation and dynamic certificate rotation without
restarting Envoy. See [Provisioning Identity through SDS](/docs/tasks/security/auth-sds)
for more information.
- **Authorization for TCP Services**. Supports authorization for TCP services in addition to HTTP and gRPC services.
See [Authorization for TCP Services](/docs/tasks/security/authz-tcp) for more information.
- **Authorization for TCP Services**. Added support of authorization for TCP
services in addition to HTTP and gRPC services. See [Authorization for TCP Services](/docs/tasks/security/authz-tcp)
for more information.
- **Authorization for End-User Groups**. Allows authorization based on `groups` claim or any list-typed claims in JWT.
See [Authorization for groups and list claims](/docs/tasks/security/rbac-groups/) for more information.
- **Authorization for End-User Groups**. Added authorization based on `groups`
claim or any list-typed claims in JWT. See [Authorization for groups and list claims](/docs/tasks/security/rbac-groups/)
for more information.
- **External Certificate Management on Ingress Gateway Controller**. Dynamically loads and rotates external certificates.
- **External Certificate Management on Ingress Gateway Controller**.
Added a controller to dynamically load and rotate external certificates.
- **Vault PKI Integration**. Provides stronger security with Vault-protected signing keys and facilitates integration with existing Vault PKIs.
See [Istio Vault CA Integration](/docs/tasks/security/vault-ca) for more information.
- **Vault PKI Integration**. Added Vault PKI integration to provides stronger
security with Vault-protected signing keys and facilitates integration with
existing Vault PKIs. See [Istio Vault CA Integration](/docs/tasks/security/vault-ca)
for more information.
- **Customized (non `cluster.local`) Trust Domains**. Supports organization- or cluster-specific trust domains in the identities.
- **Customized (non `cluster.local`) Trust Domains**. Added support for
organization- or cluster-specific trust domains in the identities.
## Policies and telemetry
- **Policy Checks Off By Default**. Changed policy checks to be turned off by default which improves performance for most customer scenarios.
[Enabling Policy Enforcement](/docs/tasks/policy-enforcement/enabling-policy/) details how to turn on Istio policy checks, if needed.
- **Policy Checks Off By Default**. Changed policy checks to be turned off by
default to improve performance for most customer scenarios. [Enabling Policy Enforcement](/docs/tasks/policy-enforcement/enabling-policy/)
details how to turn on Istio policy checks, if needed.
- **Kiali**. Replaced the [Service Graph addon](https://github.com/istio/istio/issues/9066) with [Kiali](https://www.kiali.io) to provide
a richer visualization experience. See the [Kiali task](/docs/tasks/telemetry/kiali/) for more details.
- **Kiali**. Replaced the [Service Graph addon](https://github.com/istio/istio/issues/9066)
with [Kiali](https://www.kiali.io) to provide a richer visualization
experience. See the [Kiali task](/docs/tasks/telemetry/kiali/) for more
details.
- **Reduced Overhead**. Added several performance and scale improvements including:
- **Reduced Overhead**. Added several performance and scale improvements
including:
- Significant reduction in default collection of Envoy-generated statistics.
- Significant reduction in default collection of Envoy-generated
statistics.
- Added load-shedding functionality to Mixer workloads.
- Improved the protocol between Envoy and Mixer.
- **Control Headers and Routing**. Added the option to create adapters to influence
an incoming request's headers and routing. See [Control Headers and Routing](/docs/tasks/policy-enforcement/control-headers) task
for more information.
- **Control Headers and Routing**. Added the option to create adapters to
influence the headers and routing of an incoming request. See the [Control Headers and Routing](/docs/tasks/policy-enforcement/control-headers)
task for more information.
- **Out of Process Adapters**. The out-of-process adapter functionality is now ready for production use. As a result, the in-process
adapter model is being deprecated in this release. All new adapter development should use the out-of-process model moving forward.
- **Out of Process Adapters**. Added the out-of-process adapter functionality
for production use. As a result, we deprecated the in-process adapter model
in this release. All new adapter development should use the out-of-process
model moving forward.
- **Tracing Improvements**. There have been many improvements in our overall tracing story:
- **Tracing Improvements**. Performed many improvements in our overall tracing
story:
- Trace ids are now 128 bit wide.
@ -127,34 +165,47 @@ adapter model is being deprecated in this release. All new adapter development s
- **Default TCP Metrics**. Added default metrics for tracking TCP connections.
- **Reduced Load Balancer Requirements for Addons**. Addons are no longer exposed via separate load balancers.
Instead addons are exposed via the Istio gateway. To expose addons externally using either HTTP or HTTPS protocols,
- **Reduced Load Balancer Requirements for Addons**. Stopped exposing addons
via separate load balancers. Instead, addons are exposed via the Istio
gateway. To expose addons externally using either HTTP or HTTPS protocols,
please use the [Addon Gateway documentation](/docs/tasks/telemetry/gateways/).
- **Secure Addon Credentials**. Grafana, Kiali, and Jaeger passwords and username are now stored in
[Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/) for improved security and compliance.
- **Secure Addon Credentials**. Changed storage of the addon credentials.
Grafana, Kiali, and Jaeger passwords and username are now stored in
[Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/)
for improved security and compliance.
- **More Flexibility with `statsd` Collector**. The built-in `statsd` collector has been removed.
Istio now supports bring your own `statsd` for improved flexibility with existing Kubernetes deployments.
- **More Flexibility with `statsd` Collector**. Removed the built-in `statsd`
collector. Istio now supports bring your own `statsd` for
improved flexibility with existing Kubernetes deployments.
## Configuration management
- **Galley**. Added [Galley](/docs/concepts/what-is-istio/#galley) as the primary configuration ingestion and distribution mechanism within Istio. It provides
a robust model to validate, transform, and distribute configuration state to Istio components insulating the Istio components
from Kubernetes details. Galley uses the [Mesh Configuration Protocol (MCP)](https://github.com/istio/api/tree/{{< source_branch_name >}}/mcp) to interact with components.
- **Galley**. Added [Galley](/docs/concepts/what-is-istio/#galley) as the
primary configuration ingestion and distribution mechanism within Istio. It
provides a robust model to validate, transform, and distribute configuration
states to Istio components insulating the Istio components from Kubernetes
details. Galley uses the [Mesh Configuration Protocol (MCP)](https://github.com/istio/api/tree/{{< source_branch_name >}}/mcp)
to interact with components.
- **Monitoring Port**. Changed Galley's default monitoring port from 9093 to 15014.
- **Monitoring Port**. Changed Galley's default monitoring port from 9093 to
15014.
## `istioctl` and `kubectl`
- **Validate Command**. Added the [`istioctl validate`](/docs/reference/commands/istioctl/#istioctl-validate)
command for offline validation of Istio Kubernetes resources.
command for offline validation of Istio Kubernetes resources.
- **Verify-Install Command**. Added the [`istioctl experimental verify-install`](/docs/reference/commands/istioctl/#istioctl-experimental-verify-install) command to verify the status of an
Istio installation given a specified installation YAML file.
- **Verify-Install Command**. Added the [`istioctl experimental verify-install`](/docs/reference/commands/istioctl/#istioctl-experimental-verify-install)
command to verify the status of an Istio installation given a specified
installation YAML file.
- **Deprecated Commands**. Deprecated the `istioctl create`, `istioctl replace`, `istioctl get`, and `istioctl delete` commands. Use the [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl) equivalents instead.
Deprecated the `istioctl gen-deploy` command too. Use a [`helm template`](/docs/setup/kubernetes/install/helm/#option-1-install-with-helm-via-helm-template) instead.
These commands will be removed in the 1.2 release.
- **Deprecated Commands**. Deprecated the `istioctl create`, `istioctl
replace`, `istioctl get`, and `istioctl delete` commands. Use the
[`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl)
equivalents instead. Deprecated the `istioctl gen-deploy` command too. Use a
[`helm template`](/docs/setup/kubernetes/install/helm/#option-1-install-with-helm-via-helm-template)
instead. Release 1.2 will remove these commands.
- **Short Commands**. Included short commands in `kubectl` for gateways, virtual services, destination rules and service entries.
- **Short Commands**. Included short commands in `kubectl` for gateways,
virtual services, destination rules and service entries.