You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To report an error or to improve our documentation, log in to your link:https://issues.redhat.com[Red Hat Jira account] and submit a link:https://issues.redhat.com/secure/CreateIssueDetails!init.jspa?pid=12323181&issuetype=1&components=12333768&priority=10200&summary=%5BDoc%5D&customfield_12316142[Jira issue].
13
13
14
-
[id="virt-about-virt"]
14
+
[id="virt-about-virt_{context}"]
15
15
== About Red Hat {VirtProductName}
16
16
17
17
With Red Hat {VirtProductName}, you can bring traditional virtual machines (VMs) into {product-title} and run them alongside containers. In {VirtProductName}, VMs are native Kubernetes objects that you can manage by using the {product-title} web console or the command line.
To view the supported guest operating systems for {VirtProductName}, see link:https://access.redhat.com/articles/973163#ocpvirt[Certified Guest Operating Systems in Red Hat OpenStack Platform, Red Hat Virtualization, OpenShift Virtualization and Red Hat Enterprise Linux with KVM].
35
35
36
36
//Ensure platform passes Windows Server Virtualization Validation Program. Otherwise, comment out the section below.
37
-
[id="virt-svvp-certification"]
37
+
[id="virt-svvp-certification_{context}"]
38
38
=== Microsoft Windows SVVP certification
39
39
40
40
//CNV-47134 SVVP 4.18 Release Note: New
@@ -46,50 +46,64 @@ The SVVP certification applies to:
46
46
* Red Hat Enterprise Linux CoreOS workers. In the Microsoft SVVP Catalog, they are named __Red Hat OpenShift Container Platform 4 on RHEL CoreOS 9__.
47
47
* Intel and AMD CPUs.
48
48
49
-
[id="virt-quick-starts"]
49
+
[id="virt-quick-starts_{context}"]
50
50
== Quick starts
51
51
52
52
Quick start tours are available for several {VirtProductName} features. To view the tours, click the *Help* icon *?* in the menu bar on the header of the {product-title} web console and then select *Quick Starts*. You can filter the available tours by entering the keyword `virtualization` in the *Filter* field.
53
53
54
54
55
-
[id="virt-4-19-new"]
55
+
[id="virt-4-19-new_{context}"]
56
56
== New and changed features
57
57
58
58
This release adds new features and enhancements related to the following components and concepts:
59
59
60
-
[id="virt-4-19-installation-update"]
60
+
[id="virt-4-19-installation-update_{context}"]
61
61
=== Installation and update
62
+
//[id="virt-4-19-installation-update"]
63
+
//=== Installation and update
62
64
63
-
[id="virt-4-19-infrastructure"]
65
+
[id="virt-4-19-infrastructure_{context}"]
64
66
=== Infrastructure
67
+
//[id="virt-4-19-infrastructure"]
68
+
//=== Infrastructure
65
69
66
70
//CNV-49593
67
71
* You can now prevent the inadvertent deletion of a virtual machine (VM) by xref:../../virt/managing_vms/virt-enabling-disabling-vm-delete-protection.adoc#virt-enabling-disabling-vm-delete-protection[enabling delete protection for the VM]. You can also disable delete protection that has been set for a VM.
68
72
+
69
73
As a cluster administrator, you can prevent users from enabling VM delete protection xref:../../virt/managing_vms/virt-enabling-disabling-vm-delete-protection.adoc#virt-removing-vm-delete-protection_virt-enabling-disabling-vm-delete-protection[by removing the option at the cluster level].
70
74
75
+
[id="virt-4-19-virtualization_{context}"]
76
+
=== Virtualization
77
+
71
78
//CNV-54747
72
79
* You can now choose to expand virtual machines (VMs) using instance types and preferences. For more information, see link:https://access.redhat.com/solutions/7107803[Using InstancetypeReferencePolicy to expand VirtualMachines] in the Red Hat Customer Portal.
73
80
74
-
[id="virt-4-19-virtualization"]
75
-
=== Virtualization
76
81
77
82
78
-
[id="virt-4-19-networking"]
83
+
84
+
85
+
[id="virt-4-19-networking_{context}"]
79
86
=== Networking
80
87
81
88
//CNV-30151 NNCP to enable LLDP
82
89
* You can now xref:../../networking/k8s_nmstate/k8s-nmstate-updating-node-network-config.adoc#virt-example-enabling-lldp-policy_k8s-nmstate-updating-node-network-config[configure a `NodeNetworkConfigurationPolicy` manifest] to enable the Link Layer Discovery Protocol (LLDP) listener for all ethernet ports in your {product-title} cluster.
83
90
84
91
85
-
[id="virt-4-19-storage"]
92
+
93
+
[id="virt-4-19-storage_{context}"]
86
94
=== Storage
87
95
88
-
[id="virt-4-19-web"]
96
+
97
+
[id="virt-4-19-web_{context}"]
89
98
=== Web console
90
99
91
100
92
-
[id="virt-4-19-monitoring"]
101
+
102
+
103
+
104
+
105
+
106
+
[id="virt-4-19-monitoring_{context}"]
93
107
=== Monitoring
94
108
95
109
//CNV-59720
@@ -98,32 +112,35 @@ As a cluster administrator, you can prevent users from enabling VM delete protec
//NOTE: Comment out deprecated and removed features (and their IDs) if not used in a release
112
127
113
-
[id="virt-4-19-deprecated"]
128
+
[id="virt-4-19-deprecated_{context}"]
114
129
=== Deprecated features
115
130
// NOTE: When uncommenting deprecated features list, change the Removed features header level below to ===
116
131
117
132
Deprecated features are included in the current release and supported. However, they will be removed in a future release and are not recommended for new deployments.
118
133
119
134
* The `OperatorConditionsUnhealthy` alert is deprecated. You can safely xref:../../observability/monitoring/managing-alerts/managing-alerts-as-an-administrator.adoc#silencing-alerts-adm_managing-alerts-as-an-administrator[silence] it.
120
135
121
-
[id="virt-4-19-removed"]
136
+
137
+
[id="virt-4-19-removed_{context}"]
122
138
=== Removed features
123
139
124
140
Removed features are no longer supported in {VirtProductName}.
* You can now xref:../../virt/vm_networking/virt-setting-interface-link-state.adoc#virt-setting-interface-link-state[manage the link state] of a primary or secondary virtual machine (VM) interface by using the {product-title} web console or the CLI.
136
153
137
154
138
-
[id="virt-4-19-bug-fixes"]
155
+
156
+
[id="virt-4-19-bug-fixes_{context}"]
139
157
== Bug fixes
140
-
//
141
-
[id="virt-4-18-known-issues"]
158
+
159
+
160
+
[id="virt-4-19-known-issues_{context}"]
142
161
== Known issues
143
162
144
163
[discrete]
145
-
[id="virt-4-19-ki-monitoring"]
164
+
[id="virt-4-19-ki-monitoring_{context}"]
146
165
=== Monitoring
147
166
148
167
[discrete]
149
-
[id="virt-4-19-ki-networking"]
168
+
[id="virt-4-19-ki-networking_{context}"]
150
169
=== Networking
151
170
//CNV-38746
152
171
* When you update from {product-title} 4.12 to a newer minor version, VMs that use the `cnv-bridge` Container Network Interface (CNI) fail to live migrate. (link:https://access.redhat.com/solutions/7069807[])
153
172
** As a workaround, change the `spec.config.type` field in your `NetworkAttachmentDefinition` manifest from `cnv-bridge` to `bridge` before performing the update.
154
173
155
174
156
-
[discrete]
157
-
[id="virt-4-18-ki-nodes"]
158
-
=== Nodes
159
-
160
175
161
176
[discrete]
162
-
[id="virt-4-18-ki-storage"]
163
-
=== Storage
177
+
[id="virt-4-19-ki-nodes_{context}"]
178
+
==== Nodes
179
+
//CNV-38543 - 4.16 Still an issue
180
+
* Uninstalling {VirtProductName} does not remove the `feature.node.kubevirt.io` node labels created by {VirtProductName}. You must remove the labels manually. (link:https://issues.redhat.com/browse/CNV-38543[*CNV-38543*])
164
181
182
+
[discrete]
183
+
[id="virt-4-19-ki-storage_{context}"]
184
+
==== Storage
185
+
//CNV-23501: 4.16 - Keep per Dominik Holler
186
+
* If you clone more than 100 VMs using the `csi-clone` cloning strategy, then the Ceph CSI might not purge the clones. Manually deleting the clones might also fail. (link:https://issues.redhat.com/browse/CNV-23501[*CNV-23501*])
187
+
** As a workaround, you can restart the `ceph-mgr` daemon to purge the VM clones.
188
+
189
+
// CNV-55104: 4.18 - Unresolved
190
+
* If you perform storage class migration for a stopped VM, the VM might not be able to start because of a missing bootable device. To prevent this, do not attempt storage class migration if the VM is not running. (link:https://issues.redhat.com/browse/CNV-55104[*CNV-55104*])
191
+
+
192
+
--
193
+
:FeatureName: Storage class migration
194
+
include::snippets/technology-preview.adoc[]
195
+
--
165
196
166
197
[discrete]
167
-
[id="virt-4-18-ki-virtualization"]
198
+
[id="virt-4-19-ki-virtualization_{context}"]
168
199
=== Virtualization
169
200
201
+
//CNV-33835: 4.16 - Unresolved
202
+
* {VirtProductName} links a service account token in use by a pod to that specific pod. {VirtProductName} implements a service account volume by creating a disk image that contains a token. If you migrate a VM, then the service account volume becomes invalid. (link:https://issues.redhat.com/browse/CNV-33835[*CNV-33835*])
203
+
** As a workaround, use user accounts rather than service accounts because user account tokens are not bound to a specific pod.
204
+
170
205
171
206
[discrete]
172
-
[id="virt-4-16-ki-webconsole_{context}"]
207
+
[id="virt-4-19-ki-webconsole_{context}"]
173
208
=== Web console
174
209
175
210
[discrete]
176
-
[id="virt-4-18-ki-ibm-z_{context}"]
211
+
[id="virt-4-19-ki-ibm-z_{context}"]
177
212
=== {ibm-z-title} and {ibm-linuxone-title}
213
+
214
+
--
215
+
:FeatureName: Using {VirtProductName} with s390x architecture
216
+
include::snippets/technology-preview.adoc[]
217
+
--
218
+
219
+
// ocpbugs-51113 - ballooning call traces
220
+
* When you create a VM by using {op-system-base-full} container disk images for s390x architecture, call traces referencing `virtio_balloon` print to the VM console. (link:https://issues.redhat.com/browse/OCPBUGS-51113[OCPBUGS-51113])
221
+
** As a workaround, add the following parameter to the VM YAML configuration: `spec.autoattachMemBalloon: false`.
222
+
223
+
// cnv-56889 - boot mode
224
+
* In the {product-title} web console, the *Boot mode* list for an s390x VM incorrectly includes *BIOS*, *UEFI*, and *UEFI (secure)* boot modes. If you select one of these modes for an s390x-based VM, the operation fails. This is because VMs based on s390x architecture can only use the *IPL* boot mode. (link:https://issues.redhat.com/browse/CNV-56889[CNV-56889])
225
+
226
+
// cnv-56890 - threads
227
+
* In the {product-title} web console, it is erroneously possible to define multiple CPU threads for a VM based on s390x architecture. If you define multiple CPU threads, the VM enters a `CrashLoopBackOff` state with the `qemu-kvm: S390 does not support more than 1 threads` error. (link:https://issues.redhat.com/browse/CNV-56890[CNV-56890])
0 commit comments