In previous versions, the service CA did not automatically renew, leading to service disruption and requiring manual intervention. The service CA and signing key now auto-rotate before expiration. This allows administrators to plan for their environments in advance, avoiding service disruption.
You can now encrypt data stored in etcd. Enabling etcd encryption for your cluster provides an additional layer of data security. The KubeletTooManyPods alert now uses the Pod capacity metric as a threshold instead of a fixed number. The existing monitoring stack can be extended so you can configure monitoring for your own Services.
Querying metrics is now available through the Developer perspective inside the OpenShift Container Platform web console. A machine instance that is deleted out of band no longer attempts to recreate a new instance; instead, the machine enters a failed phase. You can automatically repair damaged machines in a machine pool by configuring and deploying a machine health check.
The controller that observes a MachineHealthCheck resource checks for the status that you define. If a machine fails the health check, it is automatically deleted and a new one is created to take its place. When a machine is deleted, you see a machine-deleted event. To limit disruptive impact of the machine deletion, the controller drains and deletes only one node at a time.
The Log Forwarding API provides a way to ship container and node logs to destinations that are not necessarily managed by the OpenShift Container Platform cluster logging infrastructure. Destination endpoints can be on or off your OpenShift Container Platform cluster. Log forwarding provides an easier way to forward logs than using Fluentd plug-ins without requiring you to set the cluster to Unmanaged. OpenShift Do odo has a few enhancements that focus on the user experience of application deployment:.
Both the Service Catalog and component creation have been improved with extended output and information prompts. Architecture support has been expanded to IBM Z and Power platforms, providing binaries that are available for installation.
It uses a packaging format called Helm charts to simplify defining, installing, and upgrading of applications and Services. The new Project dashboard is now available from the Administrator and Developer perspectives. This dashboard provides the following information about a project:.
The new location option NamespaceDashboard in the ConsoleLink Custom Resource Definition lets you add project-specific links to the project dashboard. You can now integrate cluster-wide third-party user interfaces to develop, administer, and configure Operator-backed services with the ConsoleLink Custom Resource Definition.
See Customizing the web console for more information. You can now view your container vulnerabilities from the web console dashboard. This leverages the Quay Operator, which supports both on-premise and external Quay registries. Security vulnerabilities are only reported for images managed by Quay. All user management resources are now available under the User Resource navigation section. The ability to impersonate a user has also been added, which lets you view exactly what a user sees when navigating the console.
You can create PagerDuty and webhook alert types. Storage classes are hardcoded in the user interface; CSI-based storage classes are dynamic in nature and do not have static names. Now, users are able to list CSI-based provisioners in the storage class creation page and can also create one.
If you create a policy with an ipBlock section including an except clause, the SDN Pods log warnings, and the entire ipBlock section of that policy is ignored. You can follow the installation guide for installing a cluster on OpenStack with Kuryr. This feature is enabled by default in Technology Preview. The Local Storage Operator now tolerates node taints, allowing you to provision local volumes from tainted nodes. The Samples Operator also uses Prometheus metrics to gather information about which imagestreams have failed to import, and if the Samples Operator has invalid configurations.
An alert is sent if an imagestream fails to import or the Samples Operator has an invalid configuration. The registry management state is set as Removed on Baremetal, vSphere, and Red Hat Virtualization platforms so other storage providers can be configured. New installations must set the registry state to Managed in addition to provisioning storage.
Assuming there is a registry running in a disconnected environment available to both the disconnected cluster and to the workstation from which the oc adm commands are run, you can now mirror the OperatorHub by following three steps:. Mirror the Operator catalog into the container image and push to the disconnected registry using oc adm catalog build.
Parse the referenced Operator and app images and push to the disconnected registry using oc adm catalog mirror. Enable the mirror catalog in the disconnected cluster using oc apply -f. See Using Operator Lifecycle Manager on restricted networks for details. For example, the OLM sends alerts about Operators transitioning into the failure state.
Removal of dep -based projects. All Go projects are now scaffolded to use Go modules. For the 4. Additionally, you can add any certificates required by your configuration to a secret that is mounted to the Fluentd Pods.
See Sending logs to external devices using Fluentd Forward plug-ins. When you update to OpenShift Container Platform 4. You can copy your current secure-forward. You can forward logs to an external Elasticsearch instance and other endpoints using the new Log Forwarding API feature or the Fluentd forward protocol. The documentation is now updated to reflect these changes. The previously deprecated Technical Preview of the ose-local-storage-provisioner container has been removed. Persistent volume snapshots were deprecated in OpenShift Container Platform 4.
If they are enabled in 4. The following related APIs will be removed in a future release:. The Authentication Operator reported a static "available" string as a reason for the unavailability condition, which was unclear. This bug fix implements more precise reasons for unavailability conditions, and as a result, inspecting why the Operator is unavailable is more clear.
BZ The oauth-proxy process was reloading CA certificates for each request and storing them in memory. High memory consumption caused the oauth-proxy container to be killed.
With this bug fix, CA certificates are now cached unless they change. As a result, memory consumption for the oauth-proxy process has dropped significantly when multiple requests against it are issued. When login-proxies tried to connect to the OAuth server, they would not use their client certificate, resulting in their request being unauthenticated, which in turn caused users of the IdP being unable to log in to the cluster.
The bootstrap user introduced in OpenShift Container Platform 4. The message about how to retrieve an authentication token, which was there in OCP 3.
With this bug fix, the bootstrap user identity provider IdP is no longer configured when it is disabled by the user. As a result, after the bootstrap IdP is disabled by following the steps from the OCP documentation, the message about how to retrieve an authentication token in web console-only scenarios is now displayed. Previously, the route to oauth-server did not react to Ingress domain changes, which degraded the Authentication Operator and caused the oauth-server to not authenticate properly.
The oauth-server route now updates when an Ingress domain change is detected, allowing authentication to work in this scenario. Builds started very soon after an imagestream was created might not leverage local pullthrough imagestream tags when specified. The build attempts to pull the image from the external image registry, and if the build is not set up with the authorization and certificates needed for that registry, the build would fail.
The build controller is now updated to detect when its imagestream cache is missing the necessary information to allow for local pullthrough imagestream tags and retrieve that information from other means. Builds can now successfully leverage local imagestream tag pullthrough.
The build controller sometimes incorrectly assumed a build was instantiated from the build config endpoint when it was actually instantiated directly from the build endpoint. Therefore, confusing logging about non-existent build configs could appear in the build controller logs if a user instantiated an OpenShift build directly, as opposed to initiating a build request off of the build config API endpoint.
The build controller is now updated to better check whether a build was instantiated from the build config endpoint and refrain from logging unnecessary error messages. The build controller logs no longer have these confusing error messages for build instantiated directly versus from the build config endpoint.
BZ , BZ Previously, the update protocol Cincinnati, designed to facilitate automatic updates, used tags for payload references. This could yield different results when applying the same release of the same graph at different points. Now the payload reference uses the image SHA instead, if the container registry provides the manifestref. This guarantees the exact release version a cluster is going to use. Previously, the specified volumeMode was not passed to newly created disks, so PVCs might not bind properly.
The volumeMode is now passed properly to the newly created disks. Previously, the virtual machine detail page did not load properly when accessed directly by the URL.
The page now loads properly. The storage class defaults are now used properly when requesting VMware imported disks. Previously, the title for the Import VM wizard was incorrect and could be confusing. The wizard now has the correct title of Import Virtual Machine. Previously, the confirmation buttons for storage and network configuration in the VM migration wizard were located in the wrong place.
These confirmation buttons are now located in the correct location. Previously, the Create Virtual Machine wizard did not prompt for confirmation before creating a VM, which meant the user could unexpectedly create a VM. With this fix, the user must click "Create Virtual Machine" on the review page before a VM is created. Previously, the Create Virtual Machine wizard had required fields that were not always intuitive when importing a VM.
The Create Virtual Machine wizard has been redesigned to work as expected. Previously, error messages for validating VM names were not helpful. These error messages have been improved to be more descriptive. It would therefore ask the storage library to delete the containers. This bug fix now properly filters Podman containers on CRI-O restore so that they are no longer deleted from storage upon startup.
Etcd would become overloaded with a large number of objects, causing the cluster to go down when etcd failed. Now, the etcd client balancer facilitates peer failovers in the event of a client connection timeout. Etcd would fail during the upgrade process and result in disaster recovery remediation steps. Now, etcd has been updated to resolve gRPC package to prevent catastrophic cluster failure. Because of this behavior, the image registry Operator was not removed after you deleted its configuration.
Now only the new storage type is displayed, so the image registry Operator is removed after you change the storage type that the image uses. Now, the image pruner always prune images when the associated imagestream has an invalid name. Because of this issue, upgrades failed when the image registry operator was set to Removed.
You can complete upgrades even if you remove the image registry from the cluster. It was possible to configure the image registry Operator with an invalid Azure container name, and the image registry did not deploy on Azure because of the invalid name.
An unnecessary service monitoring object was created for each of the following contollers: kube-apiserver, kube-controller-manager, and kube-scheduler. The unused service monitoring object is no longer created. When a cluster is in a non-upgradeable state because either Technology Preview features or custom features are enabled, no alert was sent. The cluster will now send a TechPreviewNoUpgrade alert through Prometheus if an upgrade is attempted on a cluster in a non-upgradeable state.
When defining a StatefulSet resource object, custom labels were not applied when creating PersistentVolumeClaim resource objects from the template specified by volumeClaimTemplates parameter. Custom labels are now applied correctly to PersistentVolumeClaim objects created from the volumeClaimTemplates objects defined by a StatefulSet resource.
Mismatches between cluster version and ClusterLogging version would cause ClusterLogging to fail to deploy. Now, the kubeversion is verified that it supports the deployed ClusterLogging version. The data in journald for facility values was not sanitized and values were incorrect, causing fluentd to emit error messages at the wrong level.
Now, fluentd logs at the debug level and these errors are reported correctly. The oauth-proxy was misconfigured in a way that users were unable to log in after logging out. Now, the oauth-proxy has been reconfigured so that users can log in again after logging out. Eventrouter was not able to handle unknown event types, which would result in Eventrouter crashing. Now, Eventrouter properly handles unknown event types. As a result, errors regarding early web socket connection terminations were possible.
Now, the Details card does not watch Infrastructure resources and only fetches the resource data once. Errors are not reported after implementing this fix. The console Operator would record an initial empty string value for the console URL before the router had a chance to provide the host name.
Now, the Operator waits until the hostname is filled and eliminates the empty string value. Previously, the containerImage field in the metering-operator CSV bundle referenced an image tag that was not listed in the image-references file that ART uses for substitution purposes.
This bug fix replaces the image tag latest with release As a result, ART is now able to successfully substitute the metering-operator container image. Previously, Hadoop Dockerfile. The path has been corrected to now point to the right location. Previously, not all related objects were deleted when the CNO was changed, which left stale network-attachment-definitions.
The code has been refactored to now do this in a more generic way in OpenShift Container Platform 4. Previously, some updates were dropped which caused events to be missed. Events are no longer dropped. Previously, in clusters that had high network traffic volumes with packet loss, a once-successful connection to a service could fail with a Connection reset by peer error. As a result, clients had to reconnect and retransmit. An update has been made to iptables rules to process TCP retransmits correctly.
Established connections will remain open until they are closed. Previously, NetworkPolicy rule applications to new namespaces could occur slowly in clusters that had many namespaces, namespace changes, and NetworkPolicies that select namespaces. New namespaces could take significant amounts of time before they could be accessed from other namespaces. Due to an update in Namespace and NetworkPolicy code, NetworkPolicies should be applied promptly to new namespaces.
SDN pods now clean up stale Egress IP addresses as they start, preventing such conflicts from occuring. Records were queried regardless of whether a particular DNS record had been refreshed by a previous query, resulting in slow network performance. As a result, DNS query performance has been significantly improved. Route creation between multiple service endpoints was not possible from the console. Now, the GUI has been updated to add or remove up to three alternative service endpoints.
With this bug fix, only metrics of the most current container running or stopped are included. Upstream changes were made to the long path names test. Pods with names longer than character were not logged and no warning was issued. Now, the long names test is removed and Pods with names longer than characters will log as expected.
The LocalStorageCapacityIsolation feature was disabled, and users were unable to use the Statefulset. Previously when using server-side print, the wide output option was ignored when used in a watch oc get clusteroperators -o wide. The operation has been fixed to now properly recognize all the possible options when using server-side print.
The oc explain command links to upstream documentation were out of date. These links have been updated and are now valid. Full usage menu information was printed along with bad flag error messages, causing the error message to be lost at times. Now, when the oc command --help command is run, the bad flag error is the only information displayed.
The oc status command was not displaying DaemonSets in a consistent format due to missing status code information. Now, the Daemonsets, Deployments, and Deployment Configurations are printed properly in the output of the oc status command. The commands oc version and oopenshift-install version would show as Dirty due to incorectly set flags. The oc status command would suggest oc set probe pod to verify pods are still running, including pods that may have been owned by controllers.
Now, pods that are owned by controllers are ignored for probe suggestions. Previously, the oc new-build help command was not properly filtering flags. This caused irrelevant flags to be printed when invoking oc new-build --help. This has been fixed, and now the help command only prints relevant output.
The ClusterResourceQuota in 4. Therefore, integer quota values could not be set in ClusterResourceQuota objects, even though doing so was previously possible in 4.
During upgrades, openshift-apiserver would report degraded. The reason for degradation was MultipleAvailable , but this was not understandable to the user. This bug fix now lists the reason for the degradation, so that no information is hidden from the user.
The console workload shows a restricted access error if the knative serverless TP1 Operator is installed and you are logged in as non-admin user. With this bug fix, the Overview sidebar resources now work as expected for both normal and knative-specific deployments.
A non-admin user can now view the workloads. The topology view data model was originally a subset of the project Workloads page. As more feature were added, the topology view grew to be similar but did not share the same code. As use cases became more complex, certain edge cases were being missed in the new code.
In certain situations, the Pod list from the topology view was incorrect. With this bug fix, code logic is now shared between the topology view and project Workloads page. As a result, whether viewing the sidebar Pod list from topology or from the project Workloads list, the Pod details are now identical. Previously, when the Route object was created, the first port from the list of available ports was set instead of setting the selected port from the target-port dropdown menu.
Because of this, the user was unable to select their desired target port. The port selected from the target port dropdown menu is now applied when creating a Route object; if no port is selected, the first port from the list is set. Previously, certain features, such as the name of the application and the build status, were not rendered in the Topology view on the Edge browser.
With this bug fix, the Edge browser renders the application name and the build status as expected. In the web console Overview, a non-admin user was not able to view workloads when the Knative Operator was installed, even if a deployment that was not a Knative workload was selected.
This bug fix adds a check in case there are no configurations found so that the system will not add Knative-specific resources in Overview. This enables a non-admin user to now view the workloads as expected. Previously, when the Topology context menu was open, the associated node was not easily identifiable. This caused confusion for users because they did not know which node the context menu referred to.
Now when right-clicking a node to open the context menu, a visual hover, or drop shadow, is applied to the node for easier identification. The regular expression has been updated to accept all valid Git URLs.
Error messages from the developer console were duplicated. Now, this system has been updated to reflect values from the client side.
As a result, error messages are now clear and concise. Previously, the web console could experience a runtime error when visiting the Resources tab of an OLM operand resource. The web console could also freeze when trying to sort the Resources tab for an OLM operand resource.
These issues are now resolved. Previously, visiting the OpenShift web console pod details page in Microsoft Edge could result in a runtime error, preventing the page from displaying. The issue is now resolved and the pod details page now displays correctly. The comparison defect has been fixed. In previous versions, the documentation link on the Network Policy page was incorrect. It has been replaced with the correct link. Previously, Prometheus queries contained a range selector, which prevented the chart on the default page of the Prometheus UI from rendering.
The queries no longer contain range selectors, so the query now renders properly. Recycle was the default value for the Persistent Volume Reclaim policy even though that option was deprecated. Persistent Volumes contained deprecated values by default.
The default Persistent Volume Reclaim policy is now Retain , so new Persistent Volumes do not contain deprecated values. Previously, after upgrading your cluster, the web console could use cached CSS stylesheets, which might cause some rendering issues when loading the console. The problem has been fixed, and the web console now correctly uses the correct stylesheets after an upgrade. Previously, when using the web console in some situations part of the options menu was hidden behind other elements on the page.
The options menu no longer appears behind other page elements and will expand in a viewable space on the page to ensure the entire menu is always visible. Previously, long node names could overflow the table column in the OpenShift console pods table. With this bug fix, they now correctly wrap. Previously, creating a report query using an example YAML would result in an error. This bug fix adds a new YAML example for report queries that contains all required fields so that an error does not occur.
Previously on the Install Plan Details page, the namespace for associated catalog sources was set incorrectly. This resulted in broken links because the namespace did not exist.
This bug fix uses the status. Thus, the catalog source links now work as expected. Previously, unknown custom resources were automatically split into words to estimate what the user should see. However, some resources were split inappropriately. With this bug fix, custom resources now use the name as defined in the Custom Resource Definition, rather than being split into separate words.
Some features in this release are currently in Technology Preview. These experimental features are not intended for production use. Note the following scope of support on the Red Hat Customer Portal for these features:. Technology Preview Features Support Scope.
Features marked as - indicate that the feature is removed from the release or deprecated. Determination of active Pods when a rollout fails can be incorrect in the Topology view. When a user with limited cluster-wide permissions creates an application using the Container Image option in the Add page, and chooses the Image name from internal registry option, no imagestreams are detected in the project, though an imagestream exists.
In disconnected environments, Jenkins can be enabled to pull through by default. Use this command as a workaround to use Jenkins in disconnected environments:. When adding defaultProxy and gitProxy under builds. Installer-provisioned infrastructure installations on OpenStack fail with Security group rule already exists error when OpenStack Neutron is under heavy load.
Clusters will display errors and abnormal states after etcd backup or restore functions are conducted during the etcd encryption migration process. This is caused by public cloud images not allowing kernel integrity checks.
To do this, you must upload your own images. The oc adm catalog build and oc adm catalog mirror commands do not work for the restricted cluster.
When upgrading an OpenShift Container Platform cluster from 4. Verify that the Pods are now in a Running state. If a cluster-wide egress proxy is configured and then later unset, Pods for applications that have been previously deployed by OLM-managed Operators can enter a CrashLoopBackOff state. This is caused by the deployed Operator still being configured to rely on the proxy. This issue applies for environment variables, Volumes, and VolumeMounts created by the cluster-wide egress proxy.
This same issue occurs when setting environment variables, Volumes, and VolumeMounts using the SubscriptionsConfig object. A fix is planned for a future release of OpenShift Container Platform, however you can workaround the issue by deleting the Deployment using the CLI or web console.
This triggers OLM to regenerate the Deployment and starts up Pods with the correct networking configuration. Cluster administrators can get a list of all affected OLM-managed Deployments by running the following command:. There is an issue with the Machine Config Operator MCO supporting Day 2 proxy support, which describes when an existing non-proxied cluster is reconfigured to use a proxy.
As a workaround, you must manually add the proxy CA certificate to your trust bundle and then update the trust bundle:. When upgrading to a new OpenShift Container Platform z-stream release, connectivity to routers might be interrupted as router Pods are updated. For the duration of the upgrade, some applications might not be consistently reachable. Later releases revoked this access to reduce the possible attack surface for security exploits because some discovery endpoints are forwarded to aggregated API servers.
However, unauthenticated access is preserved in upgraded clusters so that existing use cases are not broken. If you are a cluster administrator for a cluster that has been upgraded from OpenShift Container Platform 4.
It is recommended to revoke unauthenticated access unless there is a specific need for it. If you do continue to allow unauthenticated access, be aware of the increased risks. If you have applications that rely on unauthenticated access, they might receive HTTP errors if you revoke unauthenticated access. Security, bug fix, and enhancement updates for OpenShift Container Platform 4. All OpenShift Container Platform 4.
When errata notifications are enabled, users are notified via email whenever new errata relevant to their registered systems are released. This section will continue to be updated over time to provide notes on enhancements and bug fixes for future asynchronous errata releases of OpenShift Container Platform 4. Versioned asynchronous releases, for example with the form OpenShift Container Platform 4. In addition, releases in which the errata text cannot fit in the space provided by the advisory will be detailed in subsections that follow.
For any OpenShift Container Platform release, always review the instructions on updating your cluster properly. OpenShift Container Platform release 4. The list of container images and bug fixes includes in the update are documented in the RHBA advisory. Space precluded documenting all of the container images for this release in the advisory. See the following article for notes on the container images in this release:. The list of packages included in the update are documented in the RHBA advisory.
The container images and bug fixes included in the update are provided by the RHBA advisory. Community home. Advertising Cloud. Audience Manager. Campaign Standard. Experience Cloud. Experience Manager. Experience Platform. View all communities. Feedback Panel. View your awards after completing your profile. Adobe Experience League. Exit search. Installation instructions For detailed instructions, see Installing Dispatcher. Release History Release 4. On this page. View next:.
All Learning. Documentation home. Experience Cloud release notes. Document Cloud release notes. Magento Commerce. Marketo Engage. Workfront, an Adobe company. Experience Cloud support.
0コメント