Release Notes 1.0.0
Release information for NGINX Service Mesh, a configurable, low‑latency infrastructure layer designed to handle a high volume of network‑based interprocess communication among application infrastructure services using application programming interfaces (APIs). Lists of new features and known issues are provided.
These release notes provide general information and describe known issues for NGINX Service Mesh version 1.0.0, in the following categories:
- NGINX Service Mesh Version 1.0.0
NGINX Service Mesh 1.0.0 includes the following updates:
Bug fixes and improvements
- Platform verification and validation for 1.0 GA production release
- Support for the new NGINX container registry: docker-registry.nginx.com
- Added secure message transport for NATS messaging
- Updated Spire 0.12.1 to address CVE-2021-27098 and CVE-2021-27099
- Default local OpenTracing tracer is now Jaeger
- Documentation overhaul
This release includes fixes for the following issues. You can search by the issue ID to locate the details for an issue.
Warning messages emitted when traffic access policies applied (17117)
Deployment may fail if NGINX Service Mesh is already installed (19351)
Cannot disable Prometheus scraping of the NGINX Ingress Controller (19375)
nginx-meshctl remove command may not list all resources that require a restart (22710)
nginx-meshctl version command may display errors (22797)
The following issues are known to be present in this release. Look for updates to these issues in future NGINX Service Mesh release notes.
Non-injected pods and services mishandled as fallback services (14731):
We do not recommend using non-injected pods with a fallback service. Unless the non-injected fallback service is created following the proper order of operations, the service may not be recognized and updated in the circuit breaker flow.
Instead, we recommend using injected pods and services for service mesh injected workloads.
If you must use non-injected workloads, you need to configure the fallback service and pods before the Circuit Breaker CRD references them.
Non-injected fallback servers are incompatible with mTLS mode strict.
“Could not start API server” error is logged when Mesh API is shut down normally (17670):
When the nginx-mesh-api Pod exits normally, the system may log the error “Could not start API server” and an error string. If the process is signaled, the signal value is lost and isn’t printed correctly.
If the error shows “http: Server closed,” the nginx-mesh-api Pod has properly exited, and this message can be disregarded.
Other legitimate error cases correctly show the error encountered, but this may be well after startup and proper operation.
No workaround exists, the exit messages are innocuous.
Rejected configurations return generic HTTP status codes (18101):
The NGINX Service Mesh APIs are a beta feature. Beta features are provided for you to try out before they are released. You shouldn’t use beta features for production purposes.
The NGINX Service Mesh APIs validate input for configured resources. These validations may reject the configuration for various reasons, including non-sanitized input, duplicates, conflicts, etc. When these configurations are rejected, a 500 Internal Server error is generated and returned to the client.
When configuring NGINX Service Mesh resources, do not use the NGINX Service Mesh APIs for production-grade releases if fine-grained error notifications are required. Each feature has Kubernetes API correlates that work according to the Kubernetes API Server semantics and constraints. All features are supported via Kubernetes.
Pods fail to deploy if invalid Jaeger tracing address is set (19469):
--tracing-address is set to an invalid Jaeger address when deploying NGINX Service Mesh, all pods will fail to start.
If you use your own Zipkin or Jaeger instance with NGINX Service Mesh, make sure to correctly set
--tracing-address when deploying the mesh.
Duplicate targetPorts in a Service are disregarded (20566):
NGINX Service Mesh supports a variety of Service
.spec.ports configurations and honors each port list item with one exception.
If the Service lists multiple port configurations that duplicate
.spec.ports.targetPort, the duplicates are disregarded. Only one port configuration is honored for traffic forwarding, authentication, and encryption.
Example invalid configuration:
apiVersion: v1 kind: Service spec: ports: - port: 8080 protocol: TCP targetPort: 55555 - port: 9090 protocol: TCP targetPort: 55555
No workaround exists outside of reconfiguring the Service and application. The Service must use unique
.spec.ports.targetPort values (open up multiple ports on the application workload) or route all traffic to the application workload through the same Service port.
NGINX Service Mesh deployment may fail with TLS errors (20902):
After deploying NGINX Service Mesh, the logs may show repeated TLS errors similar to the following:
From the smi-metrics Pod logs:
echo: http: TLS handshake error from :: remote error: tls: bad certificate
From the Kubernetes api-server log:
E0105 10:03:45.159812 1 controller.go:116] loading OpenAPI spec for "v1alpha1.metrics.smi-spec.io" failed with: failed to retrieve openAPI spec, http error: ResponseCode: 503, Body: error trying to reach service: x509: certificate signed by unknown authority (possibly because of "x509: ECDSA verification failure" while trying to verify candidate authority certificate "NGINX")
A race condition may occur during deployment where the Spire server fails to communicate its certificate authority (CA) to dependent resources. Without the CA, these subsystems cannot operate correctly: metrics aggregation layer, injection, and validation.
You must re-deploy NGINX Service Mesh:
nginx-meshctl remove nginx-meshctl deploy ...
Circuit Breaker functionality is incompatible with load balancing algorithm “random” (22718):
Circuit Breaker functionality is incompatible with the “random” load balancing algorithm. The two configurations interfere with each other and lead to errors. If Circuit Breaker resources exist in your environment, you cannot use the global load balancing algorithm “random” or an annotation for specific Services. The opposite is also true: if using the “random” algorithm, you cannot create Circuit Breaker resources.
If Circuit Breakers (API Version: specs.smi.nginx.com/v1alpha1 Kind: CircuitBreaker) are configured, the load balancing algorithm “random” cannot be used. Combining Circuit Breaker with “random” load balancing will result in errors and cause the sidecar containers to exit in error. Data flow will be detrimentally affected.
There is no workaround at this time, but the configuration can be changed dynamically. If another load balancing algorithm is set, the sidecars will reset and traffic will return to normal operations.
To fix the issue, take one or more of the following actions:
- All load balancing annotations (config.nsm.nginx.com/lb-method) should be removed or updated to another supported algorithm (see https://docs.nginx.com/nginx-service-mesh/get-started/configuration/).
- The global load balancing algorithm should be set to another supported algorithm (see https://docs.nginx.com/nginx-service-mesh/get-started/configuration/) .
Kubernetes reports warnings on versions >=1.19 (22721):
NGINX Service Mesh dependencies use older API versions that newer Kubernetes versions issue a deprecation warning for. Until these resource versions are updated, an NGINX Service Mesh installation will issue the following warnings:
W0303 00:12:03.484737 44320 warnings.go:70] apiextensions.k8s.io/v1beta1 CustomResourceDefinition is deprecated in v1.16+, unavailable in v1.22+; use apiextensions.k8s.io/v1 CustomResourceDefinition
W0303 00:12:04.996104 44320 warnings.go:70] admissionregistration.k8s.io/v1beta1 ValidatingWebhookConfiguration is deprecated in v1.16+, unavailable in v1.22+; use admissionregistration.k8s.io/v1 ValidatingWebhookConfiguration
These are deprecation warnings. The resources are supported but will not be in an upcoming release. There is nothing that you need to do.
Optional, default visualization dependencies may cause excessive disk usage (23886):
NGINX Service Mesh deploys optional metrics, tracing, and visualization services by default. These services are deployed as a convenience for evaluation and demonstration purposes only; these optional deployments should not be used in production.
NGINX Service Mesh supports a “Bring Your Own” model where individual organizations can manage and tailor third-party dependencies. The optional dependencies – Prometheus for metrics, Jaeger or Zipkin for tracing, and Grafana for visualization – should be managed separately for production environments. The default deployments may cause excessive disk usage as their backing stores may be written to Node local storage. In high traffic environments, this may cause DiskPressure warnings and evictions.
To mitigate disk usage issues related to visualization dependencies in high traffic environments, we recommend the following:
- Do not run high capacity applications with default visualization software.
- Use the
--disable-tracingoption at deployment or provide your own service with
- Use the
--deploy-grafana=falseoption at deployment and provide your service to query Prometheus
- Use the
--prometheus-addressoption at deployment and provide your own service
Refer to the NGINX Service Mesh: Monitoring and Tracing guide for additional guidance.
nginx-mesh-api may not be obvious (24182):
When deploying NGINX Service Mesh, if the
nginx-mesh-api image cannot be pulled, and as a result
nginx-meshctl cannot connect to the mesh API, the error that’s shown simply says to “check the logs” without further instruction on what to check for.
nginx-meshctl fails to connect to the mesh API when deploying, you should check to see if an
ImagePullError exists for the
nginx-mesh-api Pod. If you find an
ImagePullError, you should confirm that your registry server is correct when deploying the mesh.
Deploying NGINX Service Mesh to an existing namespace fails and returns an inaccurate error (24599):
NGINX Service Mesh requires its own dedicated namespace, which the installer creates during deployment. If you run the
nginx-meshctl deploy command for a namespace that already exists – either by using the
--namespace option or using the default
nginx-mesh namespace – the deployment fails with the following error:
NGINX Service Mesh already exists. To remove the existing Mesh, run "nginx-meshctl remove".
This error message is inaccurate. Running the
nginx-meshctl remove command does not fix the deployment error.
You don’t need to create a namespace before deploying NGINX Service Mesh. If the namespace you want to use is empty, you should delete it before deploying:
kubectl delete namespace <namespace>
If the namespace you want to use isn’t empty, you should choose an alternate namespace to deploy to or migrate your resources from the desired namespace.
Supported Kubernetes Versions
NGINX Service Mesh has been verified to run on the following Kubernetes versions:
- Kubernetes 1.16-1.20
NGINX Plus Ingress Controller:
- Traffic Access: v1alpha2
- Traffic Metrics: v1alpha1 (in progress, supported resources: StatefulSets, Namespaces, Deployments, Pods, DaemonSets)
- Traffic Specs: v1alpha3
- Traffic Split: v1alpha3
NSM SMI Extensions:
- Traffic Specs: v1alpha1