mirror of https://github.com/istio/istio.io.git
Edit release notes for consistency and clarity. (#3737)
Signed-off-by: rcaballeromx <grca@google.com>
This commit is contained in:
parent
0a18a02929
commit
e5499e77e9
|
|
@ -4,10 +4,13 @@ publishdate: 2019-03-20
|
||||||
icon: notes
|
icon: notes
|
||||||
---
|
---
|
||||||
|
|
||||||
We're proud to release Istio 1.1! We have spent the last 8 months making some significant improvements to the overall
|
We're proud to release Istio 1.1!
|
||||||
product, with fixes & features from Google, IBM, VMware, Huawei, RedHat, Cisco, SAP, Salesforce, Pivotal, SUSE, Datadog
|
|
||||||
and LightStep, to name a few. Special thanks to all of our end-users for providing feedback, feature requests and
|
We have spent the last 8 months making some significant improvements to the
|
||||||
testing the release candidates at various scales.
|
overall product, with fixes and features from Google, IBM, VMware, Huawei,
|
||||||
|
RedHat, Cisco, SAP, Salesforce, Pivotal, SUSE, Datadog and LightStep, to name a
|
||||||
|
few. Special thanks to all of our end-users for providing feedback, feature
|
||||||
|
requests, and testing the release candidates at various scales.
|
||||||
|
|
||||||
These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
|
These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
|
||||||
|
|
||||||
|
|
@ -16,106 +19,141 @@ These release notes describe what's different between Istio 1.0.6 and Istio 1.1.
|
||||||
## Upgrades
|
## Upgrades
|
||||||
|
|
||||||
- We recommend a manual upgrade of the control plane and data plane to 1.1. See
|
- We recommend a manual upgrade of the control plane and data plane to 1.1. See
|
||||||
[upgrades](/docs/setup/kubernetes/upgrade/) for more information.
|
the [upgrades documents](/docs/setup/kubernetes/upgrade/) for more
|
||||||
|
information.
|
||||||
|
|
||||||
{{< warning >}}
|
{{< warning >}}
|
||||||
Be sure to check out the [upgrade notice](/docs/setup/upgrade-notice) for a concise list of things you should know before
|
Be sure to check out the [upgrade notice](/docs/setup/upgrade-notice) for a
|
||||||
upgrading your deployment to Istio 1.1.
|
concise list of things you should know before upgrading your deployment to
|
||||||
|
Istio 1.1.
|
||||||
{{< /warning >}}
|
{{< /warning >}}
|
||||||
|
|
||||||
## Installation
|
## Installation
|
||||||
|
|
||||||
- **CRD Install Separated from Istio Install**. Istio’s CRDs have been placed into their own Helm chart `istio-init`.
|
- **CRD Install Separated from Istio Install**. Placed Istio’s Custom Resource
|
||||||
By placing CRDs in their own Helm chart, data continuity of custom resource content is preserved during the upgrade
|
Definitions (CRDs) into the `istio-init` Helm chart. Placing the CRDs in
|
||||||
process and further enables Istio to evolve beyond a Helm-based installation.
|
their own Helm chart preserves the data continuity of the custom resource
|
||||||
|
content during the upgrade process and further enables Istio to evolve beyond
|
||||||
|
a Helm-based installation.
|
||||||
|
|
||||||
- **Installation Configuration Profiles**. Several installation configuration profiles have been added to
|
- **Installation Configuration Profiles**. Added several installation
|
||||||
simplify the installation process using well-known and well-tested patterns. Learn more about the better
|
configuration profiles to simplify the installation process using well-known
|
||||||
user experience afforded by the [installation profile feature](/docs/setup/kubernetes/additional-setup/config-profiles/).
|
and well-tested patterns. Learn more about the better user experience
|
||||||
|
afforded by the [installation profile feature](/docs/setup/kubernetes/additional-setup/config-profiles/).
|
||||||
|
|
||||||
- **Improved Multicluster Integration**. The 1.0 `istio-remote` chart previously used for
|
- **Improved Multicluster Integration**. Consolidated the 1.0 `istio-remote`
|
||||||
|
chart previously used for
|
||||||
[multicluster VPN](/docs/setup/kubernetes/install/multicluster/vpn/) and
|
[multicluster VPN](/docs/setup/kubernetes/install/multicluster/vpn/) and
|
||||||
[multicluster split horizon](/docs/examples/multicluster/split-horizon-eds/) remote cluster installation
|
[multicluster split horizon](/docs/examples/multicluster/split-horizon-eds/) remote cluster installation
|
||||||
has been consolidated into the Istio Helm chart simplifying the operational experience.
|
into the Istio Helm chart simplifying the operational experience.
|
||||||
|
|
||||||
## Traffic management
|
## Traffic management
|
||||||
|
|
||||||
- **New `Sidecar` Resource**. Added support to limit the set of services visible to sidecar proxies in a given namespace using the `Sidecar` resource.
|
- **New `Sidecar` Resource**. Added support to limit the set of services
|
||||||
This limit reduces the amount of configuration computed and transmitted to the proxy. On large clusters, we recommend adding
|
visible to sidecar proxies in a given namespace using the `Sidecar` resource.
|
||||||
a sidecar resource per namespace.
|
This limit reduces the amount of configuration computed and transmitted to
|
||||||
|
the proxy. On large clusters, we recommend adding a sidecar resource per
|
||||||
|
namespace.
|
||||||
|
|
||||||
- **Restrict Visibility of Networking Resources**. Added the new `exportTo` field to all networking resources
|
- **Restrict Visibility of Networking Resources**. Added the new `exportTo`
|
||||||
which lets you control the visibility of individual resources to specific namespaces.
|
field to all networking resources which lets you control the visibility of
|
||||||
|
individual resources to specific namespaces.
|
||||||
|
|
||||||
- **Updates to `ServiceEntry` Resources**. Added support to specify the locality of a service
|
- **Updates to `ServiceEntry` Resources**. Added support to specify the
|
||||||
and the associated SAN to use with mutual TLS. Service entries with HTTPS ports no
|
locality of a service and the associated SAN to use with mutual TLS. Service
|
||||||
longer need an additional virtual service to enable SNI-based routing.
|
entries with HTTPS ports no longer need an additional virtual service to
|
||||||
|
enable SNI-based routing.
|
||||||
|
|
||||||
- **Locality-Aware Routing**. Added full support for routing to services in the same locality before picking services in other localities.
|
- **Locality-Aware Routing**. Added full support for routing to services in the
|
||||||
|
same locality before picking services in other localities.
|
||||||
|
|
||||||
- **Refined Multicluster Routing**. Simplified the multicluster setup and enabled additional deployment modes. You can now
|
- **Refined Multicluster Routing**. Simplified the multicluster setup and
|
||||||
connect multiple clusters simply using their ingress gateways without needing pod-level VPNs, deploy control planes in each
|
enabled additional deployment modes. You can now connect multiple clusters
|
||||||
cluster for high-availability cases, and span a namespace across several clusters
|
simply using their ingress gateways without needing pod-level VPNs, deploy
|
||||||
to create global namespaces. Locality-aware routing is enabled by default in the high-availability control plane solution.
|
control planes in each cluster for high-availability cases, and span a
|
||||||
|
namespace across several clusters to create global namespaces. Locality-aware
|
||||||
|
routing is enabled by default in the high-availability control plane
|
||||||
|
solution.
|
||||||
|
|
||||||
- **Istio Ingress Deprecated**. Removed the previously deprecated Istio ingress. Refer to the
|
- **Istio Ingress Deprecated**. Removed the previously deprecated Istio
|
||||||
[Securing Kubernetes Ingress with Cert-Manager](/docs/examples/advanced-gateways/ingress-certmgr/) example for more details
|
ingress. Refer to the [Securing Kubernetes Ingress with Cert-Manager](/docs/examples/advanced-gateways/ingress-certmgr/)
|
||||||
on how to use Kubernetes Ingress resources with [gateways](/docs/concepts/traffic-management/#gateways).
|
example for more details on how to use Kubernetes Ingress resources with
|
||||||
|
[gateways](/docs/concepts/traffic-management/#gateways).
|
||||||
|
|
||||||
- **Performance and Scalability Improvements**. The performance and scalability of Istio and Envoy have been highly tuned.
|
- **Performance and Scalability Improvements**. Tuned the performance and
|
||||||
Read more about [Performance & Scalability](/docs/concepts/performance-and-scalability/) enhancements.
|
scalability of Istio and Envoy. Read more about [Performance and Scalability](/docs/concepts/performance-and-scalability/)
|
||||||
|
enhancements.
|
||||||
|
|
||||||
- **Access Logging Off by Default**. The access logs for all Envoy sidecars have been disabled by default to improve
|
- **Access Logging Off by Default**. Disabled the access logs for all Envoy
|
||||||
performance.
|
sidecars by default to improve performance.
|
||||||
|
|
||||||
## Security
|
## Security
|
||||||
|
|
||||||
- **Readiness and Liveness Probes**. Added support for Kubernetes' HTTP [readiness and liveness probes when mutual TLS is enabled](/help/faq/security/#k8s-health-checks).
|
- **Readiness and Liveness Probes**. Added support for Kubernetes' HTTP
|
||||||
|
[readiness and liveness probes](/help/faq/security/#k8s-health-checks) when
|
||||||
|
mutual TLS is enabled.
|
||||||
|
|
||||||
- **Cluster RBAC Configuration**. Replaced the `RbacConfig` resource with the `ClusterRbacConfig` resource to implement the correct cluster scope.
|
- **Cluster RBAC Configuration**. Replaced the `RbacConfig` resource with the
|
||||||
See [Migrating `RbacConfig` to `ClusterRbacConfig`](/docs/setup/kubernetes/upgrade/#migrating-from-rbacconfig-to-clusterrbacconfig).
|
`ClusterRbacConfig` resource to implement the correct cluster scope. See
|
||||||
for migration instructions.
|
[Migrating `RbacConfig` to `ClusterRbacConfig`](/docs/setup/kubernetes/upgrade/#migrating-from-rbacconfig-to-clusterrbacconfig).
|
||||||
|
for migration instructions.
|
||||||
|
|
||||||
- **Identity Provisioning Through SDS**. Provides stronger security with on-node key generation and dynamic certificate rotation without restarting Envoy.
|
- **Identity Provisioning Through SDS**. Added SDS support to provide stronger
|
||||||
See [Provisioning Identity through SDS](/docs/tasks/security/auth-sds) for more information.
|
security with on-node key generation and dynamic certificate rotation without
|
||||||
|
restarting Envoy. See [Provisioning Identity through SDS](/docs/tasks/security/auth-sds)
|
||||||
|
for more information.
|
||||||
|
|
||||||
- **Authorization for TCP Services**. Supports authorization for TCP services in addition to HTTP and gRPC services.
|
- **Authorization for TCP Services**. Added support of authorization for TCP
|
||||||
See [Authorization for TCP Services](/docs/tasks/security/authz-tcp) for more information.
|
services in addition to HTTP and gRPC services. See [Authorization for TCP Services](/docs/tasks/security/authz-tcp)
|
||||||
|
for more information.
|
||||||
|
|
||||||
- **Authorization for End-User Groups**. Allows authorization based on `groups` claim or any list-typed claims in JWT.
|
- **Authorization for End-User Groups**. Added authorization based on `groups`
|
||||||
See [Authorization for groups and list claims](/docs/tasks/security/rbac-groups/) for more information.
|
claim or any list-typed claims in JWT. See [Authorization for groups and list claims](/docs/tasks/security/rbac-groups/)
|
||||||
|
for more information.
|
||||||
|
|
||||||
- **External Certificate Management on Ingress Gateway Controller**. Dynamically loads and rotates external certificates.
|
- **External Certificate Management on Ingress Gateway Controller**.
|
||||||
|
Added a controller to dynamically load and rotate external certificates.
|
||||||
|
|
||||||
- **Vault PKI Integration**. Provides stronger security with Vault-protected signing keys and facilitates integration with existing Vault PKIs.
|
- **Vault PKI Integration**. Added Vault PKI integration to provides stronger
|
||||||
See [Istio Vault CA Integration](/docs/tasks/security/vault-ca) for more information.
|
security with Vault-protected signing keys and facilitates integration with
|
||||||
|
existing Vault PKIs. See [Istio Vault CA Integration](/docs/tasks/security/vault-ca)
|
||||||
|
for more information.
|
||||||
|
|
||||||
- **Customized (non `cluster.local`) Trust Domains**. Supports organization- or cluster-specific trust domains in the identities.
|
- **Customized (non `cluster.local`) Trust Domains**. Added support for
|
||||||
|
organization- or cluster-specific trust domains in the identities.
|
||||||
|
|
||||||
## Policies and telemetry
|
## Policies and telemetry
|
||||||
|
|
||||||
- **Policy Checks Off By Default**. Changed policy checks to be turned off by default which improves performance for most customer scenarios.
|
- **Policy Checks Off By Default**. Changed policy checks to be turned off by
|
||||||
[Enabling Policy Enforcement](/docs/tasks/policy-enforcement/enabling-policy/) details how to turn on Istio policy checks, if needed.
|
default to improve performance for most customer scenarios. [Enabling Policy Enforcement](/docs/tasks/policy-enforcement/enabling-policy/)
|
||||||
|
details how to turn on Istio policy checks, if needed.
|
||||||
|
|
||||||
- **Kiali**. Replaced the [Service Graph addon](https://github.com/istio/istio/issues/9066) with [Kiali](https://www.kiali.io) to provide
|
- **Kiali**. Replaced the [Service Graph addon](https://github.com/istio/istio/issues/9066)
|
||||||
a richer visualization experience. See the [Kiali task](/docs/tasks/telemetry/kiali/) for more details.
|
with [Kiali](https://www.kiali.io) to provide a richer visualization
|
||||||
|
experience. See the [Kiali task](/docs/tasks/telemetry/kiali/) for more
|
||||||
|
details.
|
||||||
|
|
||||||
- **Reduced Overhead**. Added several performance and scale improvements including:
|
- **Reduced Overhead**. Added several performance and scale improvements
|
||||||
|
including:
|
||||||
|
|
||||||
- Significant reduction in default collection of Envoy-generated statistics.
|
- Significant reduction in default collection of Envoy-generated
|
||||||
|
statistics.
|
||||||
|
|
||||||
- Added load-shedding functionality to Mixer workloads.
|
- Added load-shedding functionality to Mixer workloads.
|
||||||
|
|
||||||
- Improved the protocol between Envoy and Mixer.
|
- Improved the protocol between Envoy and Mixer.
|
||||||
|
|
||||||
- **Control Headers and Routing**. Added the option to create adapters to influence
|
- **Control Headers and Routing**. Added the option to create adapters to
|
||||||
an incoming request's headers and routing. See [Control Headers and Routing](/docs/tasks/policy-enforcement/control-headers) task
|
influence the headers and routing of an incoming request. See the [Control Headers and Routing](/docs/tasks/policy-enforcement/control-headers)
|
||||||
for more information.
|
task for more information.
|
||||||
|
|
||||||
- **Out of Process Adapters**. The out-of-process adapter functionality is now ready for production use. As a result, the in-process
|
- **Out of Process Adapters**. Added the out-of-process adapter functionality
|
||||||
adapter model is being deprecated in this release. All new adapter development should use the out-of-process model moving forward.
|
for production use. As a result, we deprecated the in-process adapter model
|
||||||
|
in this release. All new adapter development should use the out-of-process
|
||||||
|
model moving forward.
|
||||||
|
|
||||||
- **Tracing Improvements**. There have been many improvements in our overall tracing story:
|
- **Tracing Improvements**. Performed many improvements in our overall tracing
|
||||||
|
story:
|
||||||
|
|
||||||
- Trace ids are now 128 bit wide.
|
- Trace ids are now 128 bit wide.
|
||||||
|
|
||||||
|
|
@ -127,34 +165,47 @@ adapter model is being deprecated in this release. All new adapter development s
|
||||||
|
|
||||||
- **Default TCP Metrics**. Added default metrics for tracking TCP connections.
|
- **Default TCP Metrics**. Added default metrics for tracking TCP connections.
|
||||||
|
|
||||||
- **Reduced Load Balancer Requirements for Addons**. Addons are no longer exposed via separate load balancers.
|
- **Reduced Load Balancer Requirements for Addons**. Stopped exposing addons
|
||||||
Instead addons are exposed via the Istio gateway. To expose addons externally using either HTTP or HTTPS protocols,
|
via separate load balancers. Instead, addons are exposed via the Istio
|
||||||
|
gateway. To expose addons externally using either HTTP or HTTPS protocols,
|
||||||
please use the [Addon Gateway documentation](/docs/tasks/telemetry/gateways/).
|
please use the [Addon Gateway documentation](/docs/tasks/telemetry/gateways/).
|
||||||
|
|
||||||
- **Secure Addon Credentials**. Grafana, Kiali, and Jaeger passwords and username are now stored in
|
- **Secure Addon Credentials**. Changed storage of the addon credentials.
|
||||||
[Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/) for improved security and compliance.
|
Grafana, Kiali, and Jaeger passwords and username are now stored in
|
||||||
|
[Kubernetes secrets](https://kubernetes.io/docs/concepts/configuration/secret/)
|
||||||
|
for improved security and compliance.
|
||||||
|
|
||||||
- **More Flexibility with `statsd` Collector**. The built-in `statsd` collector has been removed.
|
- **More Flexibility with `statsd` Collector**. Removed the built-in `statsd`
|
||||||
Istio now supports bring your own `statsd` for improved flexibility with existing Kubernetes deployments.
|
collector. Istio now supports bring your own `statsd` for
|
||||||
|
improved flexibility with existing Kubernetes deployments.
|
||||||
|
|
||||||
## Configuration management
|
## Configuration management
|
||||||
|
|
||||||
- **Galley**. Added [Galley](/docs/concepts/what-is-istio/#galley) as the primary configuration ingestion and distribution mechanism within Istio. It provides
|
- **Galley**. Added [Galley](/docs/concepts/what-is-istio/#galley) as the
|
||||||
a robust model to validate, transform, and distribute configuration state to Istio components insulating the Istio components
|
primary configuration ingestion and distribution mechanism within Istio. It
|
||||||
from Kubernetes details. Galley uses the [Mesh Configuration Protocol (MCP)](https://github.com/istio/api/tree/{{< source_branch_name >}}/mcp) to interact with components.
|
provides a robust model to validate, transform, and distribute configuration
|
||||||
|
states to Istio components insulating the Istio components from Kubernetes
|
||||||
|
details. Galley uses the [Mesh Configuration Protocol (MCP)](https://github.com/istio/api/tree/{{< source_branch_name >}}/mcp)
|
||||||
|
to interact with components.
|
||||||
|
|
||||||
- **Monitoring Port**. Changed Galley's default monitoring port from 9093 to 15014.
|
- **Monitoring Port**. Changed Galley's default monitoring port from 9093 to
|
||||||
|
15014.
|
||||||
|
|
||||||
## `istioctl` and `kubectl`
|
## `istioctl` and `kubectl`
|
||||||
|
|
||||||
- **Validate Command**. Added the [`istioctl validate`](/docs/reference/commands/istioctl/#istioctl-validate)
|
- **Validate Command**. Added the [`istioctl validate`](/docs/reference/commands/istioctl/#istioctl-validate)
|
||||||
command for offline validation of Istio Kubernetes resources.
|
command for offline validation of Istio Kubernetes resources.
|
||||||
|
|
||||||
- **Verify-Install Command**. Added the [`istioctl experimental verify-install`](/docs/reference/commands/istioctl/#istioctl-experimental-verify-install) command to verify the status of an
|
- **Verify-Install Command**. Added the [`istioctl experimental verify-install`](/docs/reference/commands/istioctl/#istioctl-experimental-verify-install)
|
||||||
Istio installation given a specified installation YAML file.
|
command to verify the status of an Istio installation given a specified
|
||||||
|
installation YAML file.
|
||||||
|
|
||||||
- **Deprecated Commands**. Deprecated the `istioctl create`, `istioctl replace`, `istioctl get`, and `istioctl delete` commands. Use the [`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl) equivalents instead.
|
- **Deprecated Commands**. Deprecated the `istioctl create`, `istioctl
|
||||||
Deprecated the `istioctl gen-deploy` command too. Use a [`helm template`](/docs/setup/kubernetes/install/helm/#option-1-install-with-helm-via-helm-template) instead.
|
replace`, `istioctl get`, and `istioctl delete` commands. Use the
|
||||||
These commands will be removed in the 1.2 release.
|
[`kubectl`](https://kubernetes.io/docs/tasks/tools/install-kubectl)
|
||||||
|
equivalents instead. Deprecated the `istioctl gen-deploy` command too. Use a
|
||||||
|
[`helm template`](/docs/setup/kubernetes/install/helm/#option-1-install-with-helm-via-helm-template)
|
||||||
|
instead. Release 1.2 will remove these commands.
|
||||||
|
|
||||||
- **Short Commands**. Included short commands in `kubectl` for gateways, virtual services, destination rules and service entries.
|
- **Short Commands**. Included short commands in `kubectl` for gateways,
|
||||||
|
virtual services, destination rules and service entries.
|
||||||
|
|
|
||||||
Loading…
Reference in New Issue