Skip to content

Commit 5d16bc5

Browse files
authored
Merge pull request #94607 from jeana-redhat/4.19-bug-text-cloud-compute
Batches 4.19 Cloud Compute bugs
2 parents edd12d4 + 40f9ca5 commit 5d16bc5

File tree

1 file changed

+129
-3
lines changed

1 file changed

+129
-3
lines changed

release_notes/ocp-4-19-release-notes.adoc

Lines changed: 129 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ You must use {op-system} machines for the control plane and for the compute mach
2222
//Removed the note per https://issues.redhat.com/browse/GRPA-3517
2323
//Removed paragraph about the RHEL package because mode workers are removed from 4.19, per Scott Dodson
2424
//Even-numbered release lifecycle verbiage (Comment in for even-numbered releases)
25-
////
25+
////
2626
Starting from {product-title} 4.14, the Extended Update Support (EUS) phase for even-numbered releases increases the total available lifecycle to 24 months on all supported architectures, including `x86_64`, 64-bit ARM (`aarch64`), {ibm-power-name} (`ppc64le`), and {ibm-z-name} (`s390x`) architectures. Beyond this, Red{nbsp}Hat also offers a 12-month additional EUS add-on, denoted as _Additional EUS Term 2_, that extends the total available lifecycle from 24 months to 36 months. The Additional EUS Term 2 is available on all architecture variants of {product-title}. For more information about support for all versions, see the link:https://access.redhat.com/support/policy/updates/openshift[Red Hat {product-title} Life Cycle Policy].
2727
////
2828

@@ -1219,6 +1219,132 @@ For more information about the unsupported, community-maintained, version of the
12191219
[id="ocp-release-note-cloud-compute-bug-fixes_{context}"]
12201220
==== Cloud Compute
12211221

1222+
* When upgrading {gcp-short} clusters that use a boot disk that is not compatible with UEFI, you cannot enable Shielded VM support.
1223+
Previously, this prevented the creation of new compute machines.
1224+
With this release, disks with known UEFI incompatiblity have Shielded VM support disabled.
1225+
This primarily affects customers upgrading from {product-title} version 4.12 to 4.13 using the {gcp-short} marketplace images.
1226+
(link:https://issues.redhat.com/browse/OCPBUGS-17079[OCPBUGS-17079])
1227+
1228+
* Previously, VMs in a cluster that ran on {azure-short} failed because the attached network interface controller (NIC) was in a `ProvisioningFailed` state.
1229+
With this release, the Machine API controller checks the provisioning status of a NIC and refreshes the VMs on a regular basis to prevent this issue.
1230+
(link:https://issues.redhat.com/browse/OCPBUGS-31515[OCPBUGS-31515])
1231+
1232+
* Previously, in larger clusters that had other subsystems using certificate signing requests (CSRs), the CSR approver counted unrelated, unapproved CSRs towards its total and prevented further approvals.
1233+
With this release, the CSR approver uses a `signerName` property as a filter and only includes CSRs that it can approve.
1234+
As a result, the CSR approver only prevents new approvals when there are a large number of unapproved CSRs for the relevant `signerName` values.
1235+
(link:https://issues.redhat.com/browse/OCPBUGS-36404[OCPBUGS-36404])
1236+
1237+
* Previously, the Machine API controller read only the zone number to populate machine zone information.
1238+
For machines in {azure-short} regions that only support availability sets, the set number represents the zone, so the Machine API controller did not populate their zone information.
1239+
With this release, the Machine API controller references the {azure-short} fault domain property.
1240+
This property works for availability sets and availability zones, so the controller correctly reads the fault domain in each case and machines always report a zone.
1241+
(link:https://issues.redhat.com/browse/OCPBUGS-38570[OCPBUGS-38570])
1242+
1243+
* Previously, increased granularity in {gcp-short} zone API error messages caused the machine controller to mistakenly mark some machines with invalid configurations as valid with a temporary cloud error.
1244+
This behavior prevented invalid machines from transitioning to a failed state.
1245+
With this release, the machine controller handles the more granular error messages correctly so that machines with an invalid zone or project ID correctly move to a failed state.
1246+
(link:https://issues.redhat.com/browse/OCPBUGS-43531[OCPBUGS-43531])
1247+
1248+
* Previously, some permissions required for linked actions were missing.
1249+
Linked actions create the subresources necessary for other {azure-short} resources that the cloud controller manager and {product-title} require.
1250+
With this release, the cloud controller manager for {azure-short} has the following permissions for linked actions:
1251+
+
1252+
--
1253+
** `Microsoft.Network/applicationGateways/backendAddressPools/join/action`
1254+
** `Microsoft.Network/applicationSecurityGroups/joinIpConfiguration/action`
1255+
** `Microsoft.Network/applicationSecurityGroups/joinNetworkSecurityRule/action`
1256+
** `Microsoft.Network/ddosProtectionPlans/join/action`
1257+
** `Microsoft.Network/gatewayLoadBalancerAliases/join/action`
1258+
** `Microsoft.Network/loadBalancers/backendAddressPools/join/action`
1259+
** `Microsoft.Network/loadBalancers/frontendIPConfigurations/join/action`
1260+
** `Microsoft.Network/loadBalancers/inboundNatRules/join/action`
1261+
** `Microsoft.Network/networkInterfaces/join/action`
1262+
** `Microsoft.Network/networkSecurityGroups/join/action`
1263+
** `Microsoft.Network/publicIPAddresses/join/action`
1264+
** `Microsoft.Network/publicIPPrefixes/join/action`
1265+
** `Microsoft.Network/virtualNetworks/subnets/join/action`
1266+
--
1267+
+
1268+
(link:https://issues.redhat.com/browse/OCPBUGS-44126[OCPBUGS-44126])
1269+
1270+
* Previously, some permissions required for linked actions were missing.
1271+
Linked actions create the subresources necessary for other {azure-short} resources that the Machine API and {product-title} require.
1272+
With this release, the Machine API provider for {azure-short} has the following permissions for linked actions:
1273+
+
1274+
--
1275+
** `Microsoft.Compute/disks/beginGetAccess/action`
1276+
** `Microsoft.KeyVault/vaults/deploy/action`
1277+
** `Microsoft.ManagedIdentity/userAssignedIdentities/assign/action`
1278+
** `Microsoft.Network/applicationGateways/backendAddressPools/join/action`
1279+
** `Microsoft.Network/applicationSecurityGroups/joinIpConfiguration/action`
1280+
** `Microsoft.Network/applicationSecurityGroups/joinNetworkSecurityRule/action`
1281+
** `Microsoft.Network/ddosProtectionPlans/join/action`
1282+
** `Microsoft.Network/gatewayLoadBalancerAliases/join/action`
1283+
** `Microsoft.Network/loadBalancers/backendAddressPools/join/action`
1284+
** `Microsoft.Network/loadBalancers/frontendIPConfigurations/join/action`
1285+
** `Microsoft.Network/loadBalancers/inboundNatPools/join/action`
1286+
** `Microsoft.Network/loadBalancers/inboundNatRules/join/action`
1287+
** `Microsoft.Network/networkInterfaces/join/action`
1288+
** `Microsoft.Network/networkSecurityGroups/join/action`
1289+
** `Microsoft.Network/publicIPAddresses/join/action`
1290+
** `Microsoft.Network/publicIPPrefixes/join/action`
1291+
** `Microsoft.Network/virtualNetworks/subnets/join/action`
1292+
--
1293+
+
1294+
(link:https://issues.redhat.com/browse/OCPBUGS-44130[OCPBUGS-44130])
1295+
1296+
* Previously, installing an {aws-short} cluster failed in certain environments on existing subnets when the `publicIp` parameter in the compute machine set CR was set to `false`.
1297+
With this release, a fix ensures that a configuration value set for `publicIp` no longer causes issues when the installation program provisions machines for your {aws-short} cluster in certain environments.
1298+
(link:https://issues.redhat.com/browse/OCPBUGS-44373[OCPBUGS-44373])
1299+
1300+
* Previously, {gcp-short} clusters that used non-UEFI disks failed to load.
1301+
This release adds a check to ensure that disks are UEFI-compatible before enabling features that require UEFI, such as secure boot.
1302+
This change adds `compute.images.get` and `compute.images.getFromFamily` permissions requirements.
1303+
As a result, you can use non-UEFI disks if you do nto need these features.
1304+
(link:https://issues.redhat.com/browse/OCPBUGS-44671[OCPBUGS-44671])
1305+
1306+
* Previously, when the {aws-short} `DHCPOptionSet` parameter was configured to use a custom domain name that contains a trailing period (`.`), {product-title} installation failed.
1307+
With this release, the logic that extracts the hostname of EC2 instances and turns them into kubelet node names trims trailing periods so that the resulting Kubernetes object name is valid.
1308+
Trailing periods in this parameter no longer cause installation to fail. (link:https://issues.redhat.com/browse/OCPBUGS-45306[OCPBUGS-45306])
1309+
1310+
* Previously, the number of {azure-short} availability set fault domains used a fixed value of `2`.
1311+
This setting works in most {azure-short} regions because fault domain counts are typically at least 2.
1312+
However, this setting failed in the `centraluseuap` and `eastusstg` regions.
1313+
With this release, the number of availability set fault domains in a region is set dynamically.
1314+
(link:https://issues.redhat.com/browse/OCPBUGS-45663[OCPBUGS-45663])
1315+
1316+
* Previously, the {azure-short} cloud controller manager panicked when there was a temporary API server disconnection.
1317+
With this release, the {azure-short} cloud controller manager correctly recovers from temporary disconnection.
1318+
(link:https://issues.redhat.com/browse/OCPBUGS-45859[OCPBUGS-45859])
1319+
1320+
* Previously, some services became stuck in a pending state due to incorrect or missing annotations.
1321+
With this release, validation added to the {azure-short} `service.beta.kubernetes.io/azure-load-balancer-tcp-idle-timeout` and {gcp-short} `cloud.google.com/network-tier` annotations resolves the issue.
1322+
(link:https://issues.redhat.com/browse/OCPBUGS-48481[OCPBUGS-48481])
1323+
1324+
* Previously, the method used to fetch the provider ID from {aws-short} could fail to provide this value to the kubelet when needed.
1325+
As a result, sometimes machines could get stuck in different states and fail to complete initialization.
1326+
With this release, the provider ID is consistently set when the kubelet starts up.
1327+
(link:https://issues.redhat.com/browse/OCPBUGS-50905[OCPBUGS-50905])
1328+
1329+
* Previously, an incorrect endpoint in the {azure-short} cloud controller manager caused installations on {azure-full} Government Cloud to fail.
1330+
The issue is resolved in this release.
1331+
(link:https://issues.redhat.com/browse/OCPBUGS-50969[OCPBUGS-50969])
1332+
1333+
* Previously, the Machine API sometimes detected an unhealthy control plane node during cluster creation on {ibm-cloud-title} and attempted to replace the node.
1334+
This effectively destroyed the cluster.
1335+
With this release, the Machine API only attempts to replace unhealthy compute nodes during cluster creation and does not attempt to replace unhealthy control plane nodes.
1336+
(link:https://issues.redhat.com/browse/OCPBUGS-51864[OCPBUGS-51864])
1337+
1338+
* Previously, {azure-short} spot machines that were evicted before their node became ready could get stuck in the `provisioned` state.
1339+
With this release, {azure-short} spot instances now use a delete-eviction policy.
1340+
This policy ensures that the machines correctly move to the `failed` state upon preemption.
1341+
(link:https://issues.redhat.com/browse/OCPBUGS-54617[OCPBUGS-54617])
1342+
1343+
* Previously, a bug fix altered the availability set configuration by changing the fault domain count to use the maximum available value instead of a fixed value of `2`.
1344+
This inadvertently caused scaling issues for compute machine sets created before the bug fix, as the controller attempted to change immutable availability sets.
1345+
With this release, availability sets are no longer modified after creation, allowing affected compute machine sets to scale properly.
1346+
(link:https://issues.redhat.com/browse/OCPBUGS-56653[OCPBUGS-56653])
1347+
12221348
[discrete]
12231349
[id="ocp-release-note-cloud-cred-operator-bug-fixes_{context}"]
12241350
==== Cloud Credential Operator
@@ -1247,13 +1373,13 @@ For more information about the unsupported, community-maintained, version of the
12471373
[id="ocp-release-note-image-registry-bug-fixes_{context}"]
12481374
==== Registry
12491375

1250-
* Previously, image importing from blocked registries would fail if those registries were configured with `NeverContactSource`, even when mirror registries were set up. With this update, image importing is no longer blocked when a registry has mirrors configured. This ensures that image imports succeed even if the original source was set to `NeverContactSource` in the `ImageDigestMirrorSet` or `ImageTagMirrorSet` resources. (link:https://issues.redhat.com/browse/OCPBUGS-44432[*OCPBUGS-44432*])
1376+
* Previously, image importing from blocked registries would fail if those registries were configured with `NeverContactSource`, even when mirror registries were set up. With this update, image importing is no longer blocked when a registry has mirrors configured. This ensures that image imports succeed even if the original source was set to `NeverContactSource` in the `ImageDigestMirrorSet` or `ImageTagMirrorSet` resources. (link:https://issues.redhat.com/browse/OCPBUGS-44432[OCPBUGS-44432])
12511377

12521378
[discrete]
12531379
[id="ocp-release-note-installer-bug-fixes_{context}"]
12541380
==== Installer
12551381

1256-
* Previously, if you attempted to install an {aws-first} cluster with minimum privileges and you did not specify an instance type in the `install-config.yaml` file, installation of the cluster failed. This issue happened because the installation program could not find supported instance types that the cluster uses in availability zones. For example, the `m6i.xlarge` default instance type was unavailable in `ap-southeast-4` and `eu-south-2` availability zones. With this release, the `openshift-install` program now requires the `ec2:DescribeInstanceTypeOfferings` {aws-short} permission to prevent the installation of the cluster from failing in situations where `m6i.xlarge` or another supported instance type is unavailable in a supported availability zone. (link:https://issues.redhat.com/browse/OCPBUGS-46596[*OCPBUGS-46596*])
1382+
* Previously, if you attempted to install an {aws-first} cluster with minimum privileges and you did not specify an instance type in the `install-config.yaml` file, installation of the cluster failed. This issue happened because the installation program could not find supported instance types that the cluster could use in supported availability zones. For example, the `m6i.xlarge` default instance type was unavailable in `ap-southeast-4` and `eu-south-2` availability zones. With this release, the `openshift-install` program now requires the `ec2:DescribeInstanceTypeOfferings` {aws-short} permission to prevent the installation of the cluster from failing in situations where `m6i.xlarge` or another supported instance type is unavailable in a supported availability zone. (link:https://issues.redhat.com/browse/OCPBUGS-46596[OCPBUGS-46596])
12571383

12581384
[discrete]
12591385
[id="ocp-release-note-insights-operator-bug-fixes_{context}"]

0 commit comments

Comments
 (0)