-
Notifications
You must be signed in to change notification settings - Fork 37
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
docs: add release notes DOC-1663 #5692
base: release-4-6
Are you sure you want to change the base?
Conversation
e55ee9c
to
8fad759
Compare
✅ Deploy Preview for docs-spectrocloud ready!
To edit notification comments on pull requests, go to your Netlify site configuration. |
🤖 Netlify configured to enable preview build for branch: doc-1663-release-notes-4-6 . Subsequent commits will automatically trigger a Netlify build preview. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left a few suggestions and questions :) Nice job!
Co-authored-by: Amanda Churi Filanowski <[email protected]>
56a86f6
to
49b71a8
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved with tiny suggestions 🚀
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 | | ||
| Change | Target Date | Published Date | | ||
| --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------- | ------------------ | | ||
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 | | |
| The EdgeForge build process utility, CanvOS, has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 | |
| Change | Target Date | Published Date | | ||
| --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------- | ------------------ | | ||
| The EdgeForge build process utility, CanvOS has an argument variable named `PROXY_CERT_PATH`. This variable is deprecated and no longer the recommended way to pass proxy certificates to the CanvOS build process. Use the **certs** folder in the root of the project directory to store proxy certificates. The **certs** folder is automatically included in the CanvOS build process. Refer to the [Build Provider Images](../clusters/edge/edgeforge-workflow/palette-canvos/build-provider-images.md) for guidance on using the **certs** folder to pass proxy certificates to the CanvOS build process. | March 15, 2025 | December 7, 2024 | | ||
| Palette's internal message communication between components transitioned from NATS to gRPC. The previous usage of NATS has been deprecated and will be removed in a future release. This change primarily affects customers using Palette agents on versions older than 4.0. If your tenant clusters still use agents on version 3.x or older, [resume agent upgrades](../clusters/cluster-management/platform-settings/pause-platform-upgrades.md) to avoid disrupting critical functions such as health monitoring and heartbeat publishing. To learn more about Palette's internal network architecture, refer to the [Network Ports](../architecture/networking-ports.md) page. If you are using network proxies, we recommend you review the [gRPC and Proxies](../architecture/grps-proxy.md) documentation for potential issues. | March 15, 2025 | September 14, 2024 | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
| Palette's internal message communication between components transitioned from NATS to gRPC. The previous usage of NATS has been deprecated and will be removed in a future release. This change primarily affects customers using Palette agents on versions older than 4.0. If your tenant clusters still use agents on version 3.x or older, [resume agent upgrades](../clusters/cluster-management/platform-settings/pause-platform-upgrades.md) to avoid disrupting critical functions such as health monitoring and heartbeat publishing. To learn more about Palette's internal network architecture, refer to the [Network Ports](../architecture/networking-ports.md) page. If you are using network proxies, we recommend you review the [gRPC and Proxies](../architecture/grps-proxy.md) documentation for potential issues. | March 15, 2025 | September 14, 2024 | | |
| Palette's internal message communication between components transitioned from NATS to gRPC. The previous usage of NATS has been deprecated and will be removed in a future release. This change primarily affects customers using Palette agents on versions older than 4.0. If your clusters still use agents on version 3.x or older, [resume agent upgrades](../clusters/cluster-management/platform-settings/pause-platform-upgrades.md) to avoid disrupting critical functions such as health monitoring and heartbeat publishing. To learn more about Palette's internal network architecture, refer to the [Network Ports](../architecture/networking-ports.md) page. If you are using network proxies, we recommend you review the [gRPC and Proxies](../architecture/grps-proxy.md) documentation for potential issues. | March 15, 2025 | September 14, 2024 | |
only tenant clusters or all clusters? :)
|
||
- [Self-hosted Palette](../enterprise-version/enterprise-version.md) and Dedicated Palette SaaS installations now offer | ||
complete brand customization. System operators can apply custom logos and color schemes to the instances they manage | ||
by using the **Customize interface** tab in the **Administration** panel in the system control. Refer to the Customize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
by using the **Customize interface** tab in the **Administration** panel in the system control. Refer to the Customize | |
by using the **Customize interface** tab in the **Administration** panel of the system console. Refer to the Customize |
maybe?
- <TpBadge /> Palette now supports a two node architecture, which provides High Availability (HA) mode. Users can access | ||
this feature by using a toggle to enable high availability mode during cluster configuration. High availability mode | ||
replaces etcd with Postgres and [Kine](https://github.com/k3s-io/kine). Refer to the Two Node Architecture page for | ||
further details. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- <TpBadge /> Palette now supports a two node architecture, which provides High Availability (HA) mode. Users can access | |
this feature by using a toggle to enable high availability mode during cluster configuration. High availability mode | |
replaces etcd with Postgres and [Kine](https://github.com/k3s-io/kine). Refer to the Two Node Architecture page for | |
further details. | |
- <TpBadge /> Palette now supports a two node architecture, which provides a High Availability (HA) mode. Users can enable this feature by toggling the high availability mode during cluster configuration. In HA mode, etcd is replaced with Postgres and [Kine](https://github.com/k3s-io/kine). Refer to the Two Node Architecture page for | |
further details. |
maybe? also, are we using two node or two-node?
|
||
#### CSI | ||
- Palette support for <VersionedLink text="MicroK8s" url="/integrations/packs/?pack=kubernetes-microk8s" /> 1.29 and 1.30 has been enhanced to provide airgap support, as well as deployments on [MAAS](../clusters/data-center/maas/maas.md) and [AWS](../clusters/public-cloud/aws/aws.md). Additionally, this update validates multi-node control planes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- Palette support for <VersionedLink text="MicroK8s" url="/integrations/packs/?pack=kubernetes-microk8s" /> 1.29 and 1.30 has been enhanced to provide airgap support, as well as deployments on [MAAS](../clusters/data-center/maas/maas.md) and [AWS](../clusters/public-cloud/aws/aws.md). Additionally, this update validates multi-node control planes. | |
- Palette's support for <VersionedLink text="MicroK8s" url="/integrations/packs/?pack=kubernetes-microk8s" /> 1.29 and 1.30 has been enhanced to provide airgap support, as well as deployments on [MAAS](../clusters/data-center/maas/maas.md) and [AWS](../clusters/public-cloud/aws/aws.md). Additionally, this update validates multi-node control planes. |
Describe the Change
This PR adds the release notes to the release branch. It also adds the NATS removal to the announcements page. This was originally posted in 4.4 release notes as a breaking change but was missed on the announcements page.
Changed Pages
💻 Release Notes
💻 Announcements
Jira Tickets
🎫 DOC-1663
Backports
Can this PR be backported?