Skip to content

Commit 41f61f8

Browse files
committed
Add release note for BGP routing
- https://issues.redhat.com/browse/OSDOCS-10810
1 parent 91a6d30 commit 41f61f8

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed

release_notes/ocp-4-19-release-notes.adoc

Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -460,6 +460,52 @@ For more information, see xref:../updating/preparing_for_updates/updating-cluste
460460

461461
With this release, {product-title} routes can be configured with third-party certificate management solutions, utilising the `.spec.tls.externalCertificate` field in the route API. This allows you to reference externally managed TLS certificates through secrets, streamlining the process by eliminating manual certificate management. By using externally managed certificates, you reduce errors, ensure a smoother certificate update process, and enable the OpenShift router to promptly serve renewed certificates. For more information, see xref:../networking/routes/secured-routes.adoc#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate].
462462

463+
[id="ocp-4-19-support-for-bgp-routing-protocol_{context}"]
464+
==== Support for the BGP routing protocol
465+
466+
The Cluster Network Operator (CNO) now supports enabling Border Gateway Protocol (BGP) routing. With BGP, you can import and export routes to the underlying provider network and use multi-homing, link redundancy, and fast convergence. BGP configuration is managed with the `FRRConfiguration` custom resource (CR).
467+
468+
When upgrading from an earlier version of {product-title} in which you installed the MetalLB Operator, you must manually migrate your custom frr-k8s configurations from the `metallb-system` namespace to the `openshift-frr-k8s` namespace. To move these CRs, enter the following commands:
469+
470+
. To create the `openshift-frr-k8s` namespace, enter the following command:
471+
+
472+
[source,terminal]
473+
----
474+
$ oc create namespace openshift-frr-k8s
475+
----
476+
477+
. To automate the migration, create a `migrate.sh` file with the following content:
478+
+
479+
[source,bash]
480+
----
481+
#!/bin/bash
482+
OLD_NAMESPACE="metallb-system"
483+
NEW_NAMESPACE="openshift-frr-k8s"
484+
FILTER_OUT="metallb-"
485+
oc get frrconfigurations.frrk8s.metallb.io -n "${OLD_NAMESPACE}" -o json |\
486+
jq -r '.items[] | select(.metadata.name | test("'"${FILTER_OUT}"'") | not)' |\
487+
jq -r '.metadata.namespace = "'"${NEW_NAMESPACE}"'"' |\
488+
oc create -f -
489+
----
490+
491+
. To run the migration script, enter the following command:
492+
+
493+
[source,terminal]
494+
----
495+
$ bash migrate.sh
496+
----
497+
498+
. To verify that the migration succeeded, enter the following command:
499+
+
500+
[source,terminal]
501+
----
502+
$ oc get frrconfigurations.frrk8s.metallb.io -n openshift-frr-k8s
503+
----
504+
505+
After the migration is complete, you can remove the `FRR-K8s` custom resources from the `metallb-system` namespace.
506+
507+
For more information, see x!ref:../networking/bgp_routing/about-bgp-routing.adoc#about-bgp-routing[About BGP routing].
508+
463509
[id="ocp-4-19-networking-gateway-api-controller_{context}"]
464510
==== Support for using the Gateway API to configure cluster Ingress traffic
465511
We will have details here when {product-title} {product-version} is released.

0 commit comments

Comments
 (0)