Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: add release notes DOC-1663 #5692

Open
wants to merge 4 commits into
base: release-4-6
Choose a base branch
from

Conversation

addetz
Copy link
Contributor

@addetz addetz commented Feb 7, 2025

Describe the Change

This PR adds the release notes to the release branch. It also adds the NATS removal to the announcements page. This was originally posted in 4.4 release notes as a breaking change but was missed on the announcements page.

Changed Pages

💻 Release Notes
💻 Announcements

Jira Tickets

🎫 DOC-1663

Backports

Can this PR be backported?

  • No. Please leave a short comment below about why this PR cannot be backported.

@addetz addetz requested a review from a team as a code owner February 7, 2025 19:14
@addetz addetz force-pushed the doc-1663-release-notes-4-6 branch from e55ee9c to 8fad759 Compare February 7, 2025 19:16
Copy link

netlify bot commented Feb 7, 2025

Deploy Preview for docs-spectrocloud ready!

Name Link
🔨 Latest commit 49b71a8
🔍 Latest deploy log https://app.netlify.com/sites/docs-spectrocloud/deploys/67a66b808c373a0008c67bc6
😎 Deploy Preview https://deploy-preview-5692--docs-spectrocloud.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link
Contributor

github-actions bot commented Feb 7, 2025

🤖 Netlify configured to enable preview build for branch: doc-1663-release-notes-4-6 . Subsequent commits will automatically trigger a Netlify build preview.

Copy link
Contributor

@achuribooks achuribooks left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Left a few suggestions and questions :) Nice job!

docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
docs/docs-content/release-notes/release-notes.md Outdated Show resolved Hide resolved
@achuribooks achuribooks self-requested a review February 7, 2025 20:04
@addetz addetz force-pushed the doc-1663-release-notes-4-6 branch from 56a86f6 to 49b71a8 Compare February 7, 2025 20:22
Copy link
Contributor

@caroldelwing caroldelwing left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Approved with tiny suggestions 🚀

| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 |
| Change | Target Date | Published Date |
| --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------- | ------------------ |
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 |
| The EdgeForge build process utility, CanvOS, has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 |

| Change | Target Date | Published Date |
| --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------- | ------------------ |
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 |
| Palette's internal message communication between components transitioned from NATS to gRPC. The previous usage of NATS has been deprecated and will be removed in a future release. This change primarily affects customers using Palette agents on versions older than 4.0. If your tenant clusters still use agents on version 3.x or older, [resume agent upgrades](../clusters/cluster-management/platform-settings/pause-platform-upgrades.md) to avoid disrupting critical functions such as health monitoring and heartbeat publishing. To learn more about Palette's internal network architecture, refer to the [Network Ports](../architecture/networking-ports.md) page. If you are using network proxies, we recommend you review the [gRPC and Proxies](../architecture/grps-proxy.md) documentation for potential issues. | March 15, 2025 | September 14, 2024 |
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
| Palette's internal message communication between components transitioned from NATS to gRPC. The previous usage of NATS has been deprecated and will be removed in a future release. This change primarily affects customers using Palette agents on versions older than 4.0. If your tenant clusters still use agents on version 3.x or older, [resume agent upgrades](../clusters/cluster-management/platform-settings/pause-platform-upgrades.md) to avoid disrupting critical functions such as health monitoring and heartbeat publishing. To learn more about Palette's internal network architecture, refer to the [Network Ports](../architecture/networking-ports.md) page. If you are using network proxies, we recommend you review the [gRPC and Proxies](../architecture/grps-proxy.md) documentation for potential issues. | March 15, 2025 | September 14, 2024 |
| Palette's internal message communication between components transitioned from NATS to gRPC. The previous usage of NATS has been deprecated and will be removed in a future release. This change primarily affects customers using Palette agents on versions older than 4.0. If your clusters still use agents on version 3.x or older, [resume agent upgrades](../clusters/cluster-management/platform-settings/pause-platform-upgrades.md) to avoid disrupting critical functions such as health monitoring and heartbeat publishing. To learn more about Palette's internal network architecture, refer to the [Network Ports](../architecture/networking-ports.md) page. If you are using network proxies, we recommend you review the [gRPC and Proxies](../architecture/grps-proxy.md) documentation for potential issues. | March 15, 2025 | September 14, 2024 |

only tenant clusters or all clusters? :)


- [Self-hosted Palette](../enterprise-version/enterprise-version.md) and Dedicated Palette SaaS installations now offer
complete brand customization. System operators can apply custom logos and color schemes to the instances they manage
by using the **Customize interface** tab in the **Administration** panel in the system control. Refer to the Customize
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
by using the **Customize interface** tab in the **Administration** panel in the system control. Refer to the Customize
by using the **Customize interface** tab in the **Administration** panel of the system console. Refer to the Customize

maybe?

Comment on lines +55 to +58
- <TpBadge /> Palette now supports a two node architecture, which provides High Availability (HA) mode. Users can access
this feature by using a toggle to enable high availability mode during cluster configuration. High availability mode
replaces etcd with Postgres and [Kine](https://github.com/k3s-io/kine). Refer to the Two Node Architecture page for
further details.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- <TpBadge /> Palette now supports a two node architecture, which provides High Availability (HA) mode. Users can access
this feature by using a toggle to enable high availability mode during cluster configuration. High availability mode
replaces etcd with Postgres and [Kine](https://github.com/k3s-io/kine). Refer to the Two Node Architecture page for
further details.
- <TpBadge /> Palette now supports a two node architecture, which provides a High Availability (HA) mode. Users can enable this feature by toggling the high availability mode during cluster configuration. In HA mode, etcd is replaced with Postgres and [Kine](https://github.com/k3s-io/kine). Refer to the Two Node Architecture page for
further details.

maybe? also, are we using two node or two-node?


#### CSI
- Palette support for <VersionedLink text="MicroK8s" url="/integrations/packs/?pack=kubernetes-microk8s" /> 1.29 and 1.30 has been enhanced to provide airgap support, as well as deployments on [MAAS](../clusters/data-center/maas/maas.md) and [AWS](../clusters/public-cloud/aws/aws.md). Additionally, this update validates multi-node control planes.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Palette support for <VersionedLink text="MicroK8s" url="/integrations/packs/?pack=kubernetes-microk8s" /> 1.29 and 1.30 has been enhanced to provide airgap support, as well as deployments on [MAAS](../clusters/data-center/maas/maas.md) and [AWS](../clusters/public-cloud/aws/aws.md). Additionally, this update validates multi-node control planes.
- Palette's support for <VersionedLink text="MicroK8s" url="/integrations/packs/?pack=kubernetes-microk8s" /> 1.29 and 1.30 has been enhanced to provide airgap support, as well as deployments on [MAAS](../clusters/data-center/maas/maas.md) and [AWS](../clusters/public-cloud/aws/aws.md). Additionally, this update validates multi-node control planes.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants