Open Service Mesh (OSM) is a lightweight, extensible, cloud native service mesh that allows users to uniformly manage, secure, and get out-of-the-box observability features for highly dynamic microservice environments.
No CRD changes between tags v1.2.3 and v1.2.4
No CRD changes between tags v1.1.3 and v1.1.4
No CRD changes between tags v1.2.2 and v1.2.3
No CRD changes between tags v1.2.1 and v1.2.2
No CRD changes between tags v1.1.2 and v1.1.3
No CRD changes between tags v1.2.0 and v1.2.1
No CRD changes between tags v1.1.1 and v1.1.2
envoyproxy/envoy-distroless
image instead of the deprecated envoyproxy/envoy-alpine
image.
kubectl exec -c envoy ... -- sh
will no longer work for the Envoy sidecarRate limiting
: Added capability to perform local per-instance rate limiting of TCP connections and HTTP requests.common_name
, due to the fact that the common name's trust domain can rotate. Instead 2 new labels, proxy_uuid
and identity
have been added.
osm_proxy_response_send_success_count
osm_proxy_response_send_error_count
osm_proxy_xds_request_count
affinity
and nodeSelector
fieldsTrafficSplit
configuration must have a selector matching the pods backing the leaf services. The legacy behavior where a root service without a selector matching the pods backing the leaf services is able to split traffic, has been removed.No CRD changes between tags v1.1.1 and v1.2.0
envoyproxy/envoy-distroless
image instead of the deprecated envoyproxy/envoy-alpine
image.
kubectl exec -c envoy ... -- sh
will no longer work for the Envoy sidecarRate limiting
: Added capability to perform local per-instance rate limiting of TCP connections and HTTP requests.common_name
, due to the fact that the common name's trust domain can rotate. Instead 2 new labels, proxy_uuid
and identity
have been added.
osm_proxy_response_send_success_count
osm_proxy_response_send_error_count
osm_proxy_xds_request_count
affinity
and nodeSelector
fieldsNo CRD changes between tags v1.1.1 and v1.2.0-rc.1
spec.sidecar.localProxyMode
field in the MeshConfig API allows users
to specify whether traffic from Envoy sidecars to application containers is
redirected via 127.0.0.1
(the previous behavior and current default) or the
Pod's IP addressspec.traffic.networkInterfaceExclusionList
field in the MeshConfig API
allows users to specify names of network interfaces on Pods that should not
have traffic proxied through Envoy sidecarskubectl apply
None
None
No CRD changes between tags v1.1.0 and v1.1.1