What's New in This Guide
This section introduces the documentation updates for release 24.1.x.
Release 24.1.0 - F93043-02, July 2024
- Updated CNE versions in the CNE Requirement section to list the CNE versions that are compatible with Policy 24.1.0.
 - Updated Kubernetes versions in the Software Requirements section to list the Kubernetes versions that are compatible with Policy 24.1.0.
 
Release 24.1.0 - F93043-01, April 2024
- Updated the Pushing the Images to Customer Docker Registry section to describe the compatible docker image versions for various microservices.
 - Updated the Supported Upgrade Paths for upgrading Policy to 24.1.0.
 - Updated the Supported RollBack Paths in Rolling Back Policy section.
 - Added details of the following configurable parameters for database slicing
          under Database Load Balancing Configuration:
                        
- usage-mon.enableTableSlicing
 - usage-mon.umContextTableSlicingCount
 - SM_POLICY_ASSOCIATION_TABLE_SLICING_COUNT
 
 - Added details of global.TRACE_ID_GENERATION_ENABLED parameter to Basic Configurations in Ingress Gateway.
 - Added OCCM Requirements to list requirements for Policy integration with OCCM.
 - Added details of the following configuration parameters to Basic Configurations in Ingress Gateway:
                        
- ingress-gateway.enableIncomingHttps
 - ingress-gateway.service.ssl.privateKey.k8SecretName
 - ingress-gateway.service.ssl.privateKey.k8NameSpace
 - ingress-gateway.service.ssl.privateKey.rsa.fileName
 - ingress-gateway.service.ssl.certificate.k8SecretName
 - ingress-gateway.service.ssl.certificate.k8NameSpace
 - ingress-gateway.service.ssl.certificate.rsa.fileName
 - ingress-gateway.service.ssl.caBundle.k8SecretName
 - ingress-gateway.service.ssl.caBundle.k8NameSpace
 - ingress-gateway.service.ssl.caBundle.fileName
 - ingress-gateway.service.ssl.keyStorePassword.k8SecretName
 - ingress-gateway.service.ssl.keyStorePassword.k8NameSpace
 - ingress-gateway.service.ssl.keyStorePassword.fileName
 - ingress-gateway.service.ssl.trustStorePassword.k8SecretName
 - ingress-gateway.service.ssl.trustStorePassword.k8NameSpace
 - ingress-gateway.service.ssl.trustStorePassword.fileName
 
 - Added details of the following configuration parameters to Basic Configurations in Egress Gateway:
                        
- egress-gateway.sniHeader.enabled
 - egress-gateway.enableOutgoingHttps
 - egress-gateway.egressGwCertReloadEnabled
 - egress-gateway.egressGwCertReloadPath
 - egress-gateway.service.ssl.privateKey.k8SecretName
 - egress-gateway.service.ssl.privateKey.k8NameSpace
 - egress-gateway.service.ssl.privateKey.rsa.fileName
 - egress-gateway.service.ssl.privateKey.ecdsa.fileName
 - egress-gateway.service.ssl.certificate.k8SecretName
 - egress-gateway.service.ssl.certificate.k8NameSpace
 - egress-gateway.service.ssl.certificate.rsa.fileName
 - egress-gateway.service.ssl.certificate.ecdsa.fileName
 - egress-gateway.service.ssl.caBundle.k8SecretName
 - egress-gateway.service.ssl.caBundle.k8NameSpace
 - egress-gateway.service.ssl.caBundle.fileName
 - egress-gateway.service.ssl.keyStorePassword.k8SecretName
 - egress-gateway.service.ssl.keyStorePassword.k8NameSpace
 - egress-gateway.service.ssl.keyStorePassword.fileName
 - egress-gateway.service.ssl.trustStorePassword.k8SecretName
 - egress-gateway.service.ssl.trustStorePassword.k8NameSpace
 - egress-gateway.service.ssl.trustStorePassword.fileName
 
 - Added the details of following Helm Parameters to Basic Configurations in Ingress Gateway section to support SSL TLS version and allowed Cipher list:
                        
- ingress-gateway.service.ssl.tlsVersion
 - ingress-gateway.allowedCipherSuites
 - ingress-gateway.cipherSuites
 
 - Added the details of following Helm Parameters to Basic Configurations in Egress Gateway section to support SSL TLS version and allowed Cipher list:
                        
- egress-gateway.service.ssl.tlsVersion
 - egress-gateway.allowedCipherSuites
 - egress-gateway.cipherSuites
 
 - Added the details of following Helm Parameters to NRF Client Configuration section to support readiness and liveness probes:
                        
- global.nrfClientCommonServicePort
 - nrf-client.nrf-client-nfdiscovery.readinessProbe.httpGet.port
 - nrf-client.nrf-client-nfdiscovery.livenessProbe.httpGet.port
 - nrf-client.nrf-client-nfmanagement.readinessProbe.httpGet.port
 - nrf-client.nrf-client-nfmanagement.livenessProbe.httpGet.port
 
 - Updated the MIB Management section with the changes in the MIB files.