mirror of https://github.com/istio/istio.io.git
Edit release notes for consistency and clarity. (#3737)
Signed-off-by: rcaballeromx <grca@google.com>
This commit is contained in:
parent
0a18a02929
commit
e5499e77e9
|
|
@ -4,10 +4,13 @@ publishdate: 2019-03-20
|
|||
icon: notes
|
||||
---
|
||||
|
||||
We're proud to release Istio 1.1! We have spent the last 8 months making some significant improvements to the overall
|
||||
product, with fixes & features from Google, IBM, VMware, Huawei, RedHat, Cisco, SAP, Salesforce, Pivotal, SUSE, Datadog
|
||||
and LightStep, to name a few. Special thanks to all of our end-users for providing feedback, feature requests and
|
||||
testing the release candidates at various scales.
|
||||
We're proud to release Istio 1.1!
|
||||
|
||||
We have spent the last 8 months making some significant improvements to the
|
||||
overall product, with fixes and features from Google, IBM, VMware, Huawei,
|
||||
RedHat, Cisco, SAP, Salesforce, Pivotal, SUSE, Datadog and LightStep, to name a
|
||||
few. Special thanks to all of our end-users for providing feedback, feature
|
||||
requests, and testing the release candidates at various scales.
|
||||
|
||||
These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
|
||||
|
||||
|
|
@ -16,106 +19,141 @@ These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
|
|||
## Upgrades
|
||||
|
||||
- We recommend a manual upgrade of the control plane and data plane to 1.1. See
|
||||
[upgrades](/docs/setup/kubernetes/upgrade/) for more information.
|
||||
the [upgrades documents](/docs/setup/kubernetes/upgrade/) for more
|
||||
information.
|
||||
|
||||
{{< warning >}}
|
||||
Be sure to check out the [upgrade notice](/docs/setup/upgrade-notice) for a concise list of things you should know before
|
||||
upgrading your deployment to Istio 1.1.
|
||||
Be sure to check out the [upgrade notice](/docs/setup/upgrade-notice) for a
|
||||
concise list of things you should know before upgrading your deployment to
|
||||
Istio 1.1.
|
||||
{{< /warning >}}
|
||||
|
||||
## Installation
|
||||
|
||||
- **CRD Install Separated from Istio Install**. Istio’s CRDs have been placed into their own Helm chart `istio-init`.
|
||||
By placing CRDs in their own Helm chart, data continuity of custom resource content is preserved during the upgrade
|
||||
process and further enables Istio to evolve beyond a Helm-based installation.
|
||||
- **CRD Install Separated from Istio Install**. Placed Istio’s Custom Resource
|
||||
Definitions (CRDs) into the `istio-init` Helm chart. Placing the CRDs in
|
||||
their own Helm chart preserves the data continuity of the custom resource
|
||||
content during the upgrade process and further enables Istio to evolve beyond
|
||||
a Helm-based installation.
|
||||
|
||||
- **Installation Configuration Profiles**. Several installation configuration profiles have been added to
|
||||
simplify the installation process using well-known and well-tested patterns. Learn more about the better
|
||||
user experience afforded by the [installation profile feature](/docs/setup/kubernetes/additional-setup/config-profiles/).
|
||||
- **Installation Configuration Profiles**. Added several installation
|
||||
configuration profiles to simplify the installation process using well-known
|
||||
and well-tested patterns. Learn more about the better user experience
|
||||
afforded by the [installation profile feature](/docs/setup/kubernetes/additional-setup/config-profiles/).
|
||||
|
||||
- **Improved Multicluster Integration**. The 1.0 `istio-remote` chart previously used for
|
||||
- **Improved Multicluster Integration**. Consolidated the 1.0 `istio-remote`
|
||||
chart previously used for
|
||||
[multicluster VPN](/docs/setup/kubernetes/install/multicluster/vpn/) and
|
||||
[multicluster split horizon](/docs/examples/multicluster/split-horizon-eds/) remote cluster installation
|
||||
has been consolidated into the Istio Helm chart simplifying the operational experience.
|
||||
into the Istio Helm chart simplifying the operational experience.
|
||||
|
||||
## Traffic management
|
||||
|
||||
- **New `Sidecar` Resource**. Added support to limit the set of services visible to sidecar proxies in a given namespace using the `Sidecar` resource.
|
||||
This limit reduces the amount of configuration computed and transmitted to the proxy. On large clusters, we recommend adding
|
||||
a sidecar resource per namespace.
|
||||
- **New `Sidecar` Resource**. Added support to limit the set of services
|
||||
visible to sidecar proxies in a given namespace using the `Sidecar` resource.
|
||||
This limit reduces the amount of configuration computed and transmitted to
|
||||
the proxy. On large clusters, we recommend adding a sidecar resource per
|
||||
namespace.
|
||||
|
||||
- **Restrict Visibility of Networking Resources**. Added the new `exportTo` field to all networking resources
|
||||
which lets you control the visibility of individual resources to specific namespaces.
|
||||
- **Restrict Visibility of Networking Resources**. Added the new `exportTo`
|
||||
field to all networking resources which lets you control the visibility of
|
||||
individual resources to specific namespaces.
|
||||
|
||||
- **Updates to `ServiceEntry` Resources**. Added support to specify the locality of a service
|
||||
and the associated SAN to use with mutual TLS. Service entries with HTTPS ports no
|
||||
longer need an additional virtual service to enable SNI-based routing.
|
||||
- **Updates to `ServiceEntry` Resources**. Added support to specify the
|
||||
locality of a service and the associated SAN to use with mutual TLS. Service
|
||||
entries with HTTPS ports no longer need an additional virtual service to
|
||||
enable SNI-based routing.
|
||||
|
||||
- **Locality-Aware Routing**. Added full support for routing to services in the same locality before picking services in other localities.
|
||||
- **Locality-Aware Routing**. Added full support for routing to services in the
|
||||
same locality before picking services in other localities.
|
||||
|
||||
- **Refined Multicluster Routing**. Simplified the multicluster setup and enabled additional deployment modes. You can now
|
||||
connect multiple clusters simply using their ingress gateways without needing pod-level VPNs, deploy control planes in each
|
||||
cluster for high-availability cases, and span a namespace across several clusters
|
||||
to create global namespaces. Locality-aware routing is enabled by default in the high-availability control plane solution.
|
||||
- **Refined Multicluster Routing**. Simplified the multicluster setup and
|
||||
enabled additional deployment modes. You can now connect multiple clusters
|
||||
simply using their ingress gateways without needing pod-level VPNs, deploy
|
||||
control planes in each cluster for high-availability cases, and span a
|
||||
namespace across several clusters to create global namespaces. Locality-aware
|
||||
routing is enabled by default in the high-availability control plane
|
||||
solution.
|
||||
|
||||
- **Istio Ingress Deprecated**. Removed the previously deprecated Istio ingress. Refer to the
|
||||
[Securing Kubernetes Ingress with Cert-Manager](/docs/examples/advanced-gateways/ingress-certmgr/) example for more details
|
||||
on how to use Kubernetes Ingress resources with [gateways](/docs/concepts/traffic-management/#gateways).
|
||||
- **Istio Ingress Deprecated**. Removed the previously deprecated Istio
|
||||
ingress. Refer to the [Securing Kubernetes Ingress with Cert-Manager](/docs/examples/advanced-gateways/ingress-certmgr/)
|
||||
example for more details on how to use Kubernetes Ingress resources with
|
||||
[gateways](/docs/concepts/traffic-management/#gateways).
|
||||
|
||||
- **Performance and Scalability Improvements**. The performance and scalability of Istio and Envoy have been highly tuned.
|
||||
Read more about [Performance & Scalability](/docs/concepts/performance-and-scalability/) enhancements.
|
||||
- **Performance and Scalability Improvements**. Tuned the performance and
|
||||
scalability of Istio and Envoy. Read more about [Performance and Scalability](/docs/concepts/performance-and-scalability/)
|
||||
enhancements.
|
||||
|
||||
- **Access Logging Off by Default**. The access logs for all Envoy sidecars have been disabled by default to improve
|
||||
performance.
|
||||
- **Access Logging Off by Default**. Disabled the access logs for all Envoy
|
||||
sidecars by default to improve performance.
|
||||
|
||||
## Security
|
||||
|
||||
- **Readiness and Liveness Probes**. Added support for Kubernetes' HTTP [readiness and liveness probes when mutual TLS is enabled](/help/faq/security/#k8s-health-checks).
|
||||
- **Readiness and Liveness Probes**. Added support for Kubernetes' HTTP
|
||||
[readiness and liveness probes](/help/faq/security/#k8s-health-checks) when
|
||||
mutual TLS is enabled.
|
||||
|
||||
- **Cluster RBAC Configuration**. Replaced the `RbacConfig` resource with the `ClusterRbacConfig` resource to implement the correct cluster scope.
|
||||
See [Migrating `RbacConfig` to `ClusterRbacConfig`](/docs/setup/kubernetes/upgrade/#migrating-from-rbacconfig-to-clusterrbacconfig).
|
||||
for migration instructions.
|
||||
- **Cluster RBAC Configuration**. Replaced the `RbacConfig` resource with the
|
||||
`ClusterRbacConfig` resource to implement the correct cluster scope. See
|
||||
[Migrating `RbacConfig` to `ClusterRbacConfig`](/docs/setup/kubernetes/upgrade/#migrating-from-rbacconfig-to-clusterrbacconfig).
|
||||
for migration instructions.
|
||||
|
||||
- **Identity Provisioning Through SDS**. Provides stronger security with on-node key generation and dynamic certificate rotation without restarting Envoy.
|
||||
See [Provisioning Identity through SDS](/docs/tasks/security/auth-sds) for more information.
|
||||
- **Identity Provisioning Through SDS**. Added SDS support to provide stronger
|
||||
security with on-node key generation and dynamic certificate rotation without
|
||||
restarting Envoy. See [Provisioning Identity through SDS](/docs/tasks/security/auth-sds)
|
||||
for more information.
|
||||
|
||||
- **Authorization for TCP Services**. Supports authorization for TCP services in addition to HTTP and gRPC services.
|
||||
See [Authorization for TCP Services](/docs/tasks/security/authz-tcp) for more information.
|
||||
- **Authorization for TCP Services**. Added support of authorization for TCP
|
||||
services in addition to HTTP and gRPC services. See [Authorization for TCP Services](/docs/tasks/security/authz-tcp)
|
||||
for more information.
|
||||
|
||||
- **Authorization for End-User Groups**. Allows authorization based on `groups` claim or any list-typed claims in JWT.
|
||||
See [Authorization for groups and list claims](/docs/tasks/security/rbac-groups/) for more information.
|
||||
- **Authorization for End-User Groups**. Added authorization based on `groups`
|
||||
claim or any list-typed claims in JWT. See [Authorization for groups and list claims](/docs/tasks/security/rbac-groups/)
|
||||
for more information.
|
||||
|
||||
- **External Certificate Management on Ingress Gateway Controller**. Dynamically loads and rotates external certificates.
|
||||
- **External Certificate Management on Ingress Gateway Controller**.
|
||||
Added a controller to dynamically load and rotate external certificates.
|
||||
|
||||
- **Vault PKI Integration**. Provides stronger security with Vault-protected signing keys and facilitates integration with existing Vault PKIs.
|
||||
See [Istio Vault CA Integration](/docs/tasks/security/vault-ca) for more information.
|
||||
- **Vault PKI Integration**. Added Vault PKI integration to provides stronger
|
||||
security with Vault-protected signing keys and facilitates integration with
|
||||
existing Vault PKIs. See [Istio Vault CA Integration](/docs/tasks/security/vault-ca)
|
||||
for more information.
|
||||
|
||||
- **Customized (non `cluster.local`) Trust Domains**. Supports organization- or cluster-specific trust domains in the identities.
|
||||
- **Customized (non `cluster.local`) Trust Domains**. Added support for
|
||||
organization- or cluster-specific trust domains in the identities.
|
||||
|
||||
## Policies and telemetry
|
||||
|
||||
- **Policy Checks Off By Default**. Changed policy checks to be turned off by default which improves performance for most customer scenarios.
|
||||
[Enabling Policy Enforcement](/docs/tasks/policy-enforcement/enabling-policy/) details how to turn on Istio policy checks, if needed.
|
||||
- **Policy Checks Off By Default**. Changed policy checks to be turned off by
|
||||
default to improve performance for most customer scenarios. [Enabling Policy Enforcement](/docs/tasks/policy-enforcement/enabling-policy/)
|
||||
details how to turn on Istio policy checks, if needed.
|
||||
|
||||
- **Kiali**. Replaced the [Service Graph addon](https://github.com/istio/istio/issues/9066) with [Kiali](https://www.kiali.io) to provide
|
||||
a richer visualization experience. See the [Kiali task](/docs/tasks/telemetry/kiali/) for more details.
|
||||
- **Kiali**. Replaced the [Service Graph addon](https://github.com/istio/istio/issues/9066)
|
||||
with [Kiali](https://www.kiali.io) to provide a richer visualization
|
||||
experience. See the [Kiali task](/docs/tasks/telemetry/kiali/) for more
|
||||
details.
|
||||
|
||||
- **Reduced Overhead**. Added several performance and scale improvements including:
|
||||
- **Reduced Overhead**. Added several performance and scale improvements
|
||||
including:
|
||||
|
||||
- Significant reduction in default collection of Envoy-generated statistics.
|
||||
- Significant reduction in default collection of Envoy-generated
|
||||
statistics.
|
||||
|
||||
- Added load-shedding functionality to Mixer workloads.
|
||||
|
||||
- Improved the protocol between Envoy and Mixer.
|
||||
|
||||
- **Control Headers and Routing**. Added the option to create adapters to influence
|
||||
an incoming request's headers and routing. See [Control Headers and Routing](/docs/tasks/policy-enforcement/control-headers) task
|
||||
for more information.
|
||||
- **Control Headers and Routing**. Added the option to create adapters to
|
||||
influence the headers and routing of an incoming request. See the [Control Headers and Routing](/docs/tasks/policy-enforcement/control-headers)
|
||||
task for more information.
|
||||
|
||||
- **Out of Process Adapters**. The out-of-process adapter functionality is now ready for production use. As a result, the in-process
|
||||
adapter model is being deprecated in this release. All new adapter development should use the out-of-process model moving forward.
|
||||
- **Out of Process Adapters**. Added the out-of-process adapter functionality
|
||||
for production use. As a result, we deprecated the in-process adapter model
|
||||
in this release. All new adapter development should use the out-of-process
|
||||
model moving forward.
|
||||
|
||||
- **Tracing Improvements**. There have been many improvements in our overall tracing story:
|
||||
- **Tracing Improvements**. Performed many improvements in our overall tracing
|
||||
story:
|
||||
|
||||
- Trace ids are now 128 bit wide.
|
||||
|
||||
|
|
@ -127,34 +165,47 @@ adapter model is being deprecated in this release. All new adapter development s
|
|||
|
||||
- **Default TCP Metrics**. Added default metrics for tracking TCP connections.
|
||||
|
||||
- **Reduced Load Balancer Requirements for Addons**. Addons are no longer exposed via separate load balancers.
|
||||
Instead addons are exposed via the Istio gateway. To expose addons externally using either HTTP or HTTPS protocols,
|
||||
- **Reduced Load Balancer Requirements for Addons**. Stopped exposing addons
|
||||
via separate load balancers. Instead, addons are exposed via the Istio
|
||||
gateway. To expose addons externally using either HTTP or HTTPS protocols,
|
||||
please use the [Addon Gateway documentation](/docs/tasks/telemetry/gateways/).
|
||||
|
||||
- **Secure Addon Credentials**. Grafana, Kiali, and Jaeger passwords and username are now stored in
|
||||
[Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/) for improved security and compliance.
|
||||
- **Secure Addon Credentials**. Changed storage of the addon credentials.
|
||||
Grafana, Kiali, and Jaeger passwords and username are now stored in
|
||||
[Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/)
|
||||
for improved security and compliance.
|
||||
|
||||
- **More Flexibility with `statsd` Collector**. The built-in `statsd` collector has been removed.
|
||||
Istio now supports bring your own `statsd` for improved flexibility with existing Kubernetes deployments.
|
||||
- **More Flexibility with `statsd` Collector**. Removed the built-in `statsd`
|
||||
collector. Istio now supports bring your own `statsd` for
|
||||
improved flexibility with existing Kubernetes deployments.
|
||||
|
||||
## Configuration management
|
||||
|
||||
- **Galley**. Added [Galley](/docs/concepts/what-is-istio/#galley) as the primary configuration ingestion and distribution mechanism within Istio. It provides
|
||||
a robust model to validate, transform, and distribute configuration state to Istio components insulating the Istio components
|
||||
from Kubernetes details. Galley uses the [Mesh Configuration Protocol (MCP)](https://github.com/istio/api/tree/{{< source_branch_name >}}/mcp) to interact with components.
|
||||
- **Galley**. Added [Galley](/docs/concepts/what-is-istio/#galley) as the
|
||||
primary configuration ingestion and distribution mechanism within Istio. It
|
||||
provides a robust model to validate, transform, and distribute configuration
|
||||
states to Istio components insulating the Istio components from Kubernetes
|
||||
details. Galley uses the [Mesh Configuration Protocol (MCP)](https://github.com/istio/api/tree/{{< source_branch_name >}}/mcp)
|
||||
to interact with components.
|
||||
|
||||
- **Monitoring Port**. Changed Galley's default monitoring port from 9093 to 15014.
|
||||
- **Monitoring Port**. Changed Galley's default monitoring port from 9093 to
|
||||
15014.
|
||||
|
||||
## `istioctl` and `kubectl`
|
||||
|
||||
- **Validate Command**. Added the [`istioctl validate`](/docs/reference/commands/istioctl/#istioctl-validate)
|
||||
command for offline validation of Istio Kubernetes resources.
|
||||
command for offline validation of Istio Kubernetes resources.
|
||||
|
||||
- **Verify-Install Command**. Added the [`istioctl experimental verify-install`](/docs/reference/commands/istioctl/#istioctl-experimental-verify-install) command to verify the status of an
|
||||
Istio installation given a specified installation YAML file.
|
||||
- **Verify-Install Command**. Added the [`istioctl experimental verify-install`](/docs/reference/commands/istioctl/#istioctl-experimental-verify-install)
|
||||
command to verify the status of an Istio installation given a specified
|
||||
installation YAML file.
|
||||
|
||||
- **Deprecated Commands**. Deprecated the `istioctl create`, `istioctl replace`, `istioctl get`, and `istioctl delete` commands. Use the [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl) equivalents instead.
|
||||
Deprecated the `istioctl gen-deploy` command too. Use a [`helm template`](/docs/setup/kubernetes/install/helm/#option-1-install-with-helm-via-helm-template) instead.
|
||||
These commands will be removed in the 1.2 release.
|
||||
- **Deprecated Commands**. Deprecated the `istioctl create`, `istioctl
|
||||
replace`, `istioctl get`, and `istioctl delete` commands. Use the
|
||||
[`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl)
|
||||
equivalents instead. Deprecated the `istioctl gen-deploy` command too. Use a
|
||||
[`helm template`](/docs/setup/kubernetes/install/helm/#option-1-install-with-helm-via-helm-template)
|
||||
instead. Release 1.2 will remove these commands.
|
||||
|
||||
- **Short Commands**. Included short commands in `kubectl` for gateways, virtual services, destination rules and service entries.
|
||||
- **Short Commands**. Included short commands in `kubectl` for gateways,
|
||||
virtual services, destination rules and service entries.
|
||||
|
|
|
|||
Loading…
Reference in New Issue