Skip to content

Commit 625b51c

Browse files
authored
Merge pull request #93689 from sbeskin-redhat/CNV-5775_assemble_CNV_4_19_RN
CNV-5775: Assemble CNV-4.19 RN
2 parents cd401f1 + 0f06524 commit 625b51c

File tree

2 files changed

+84
-34
lines changed

2 files changed

+84
-34
lines changed

modules/virt-supported-cluster-version.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
// Module included in the following assemblies:
22
//
33
// * virt/about_virt/about-virt.adoc
4-
// * virt/virt_release_notes/virt-4-9-release-notes.adoc
4+
// * virt/virt_release_notes/virt-4-19-release-notes.adoc
55

66
[id="virt-supported-cluster-version_{context}"]
77
= Supported cluster versions for {VirtProductName}

virt/release_notes/virt-4-19-release-notes.adoc

Lines changed: 83 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ include::_attributes/common-attributes.adoc[]
66

77
toc::[]
88

9-
[id="virt-doc-feedback"]
9+
[id="virt-doc-feedback_{context}"]
1010
== Providing documentation feedback
1111

1212
To report an error or to improve our documentation, log in to your link:https://issues.redhat.com[Red Hat Jira account] and submit a link:https://issues.redhat.com/secure/CreateIssueDetails!init.jspa?pid=12323181&issuetype=1&components=12333768&priority=10200&summary=%5BDoc%5D&customfield_12316142[Jira issue].
1313

14-
[id="virt-about-virt"]
14+
[id="virt-about-virt_{context}"]
1515
== About Red Hat {VirtProductName}
1616

1717
With Red Hat {VirtProductName}, you can bring traditional virtual machines (VMs) into {product-title} and run them alongside containers. In {VirtProductName}, VMs are native Kubernetes objects that you can manage by using the {product-title} web console or the command line.
@@ -29,12 +29,12 @@ xref:../../virt/install/preparing-cluster-for-virt.adoc#preparing-cluster-for-vi
2929
include::modules/virt-supported-cluster-version.adoc[leveloffset=+2]
3030

3131

32-
[id="virt-guest-os"]
32+
[id="virt-guest-os_{context}"]
3333
=== Supported guest operating systems
3434
To view the supported guest operating systems for {VirtProductName}, see link:https://access.redhat.com/articles/973163#ocpvirt[Certified Guest Operating Systems in Red Hat OpenStack Platform, Red Hat Virtualization, OpenShift Virtualization and Red Hat Enterprise Linux with KVM].
3535

3636
//Ensure platform passes Windows Server Virtualization Validation Program. Otherwise, comment out the section below.
37-
[id="virt-svvp-certification"]
37+
[id="virt-svvp-certification_{context}"]
3838
=== Microsoft Windows SVVP certification
3939

4040
//CNV-47134 SVVP 4.18 Release Note: New
@@ -46,50 +46,64 @@ The SVVP certification applies to:
4646
* Red Hat Enterprise Linux CoreOS workers. In the Microsoft SVVP Catalog, they are named __Red Hat OpenShift Container Platform 4 on RHEL CoreOS 9__.
4747
* Intel and AMD CPUs.
4848

49-
[id="virt-quick-starts"]
49+
[id="virt-quick-starts_{context}"]
5050
== Quick starts
5151

5252
Quick start tours are available for several {VirtProductName} features. To view the tours, click the *Help* icon *?* in the menu bar on the header of the {product-title} web console and then select *Quick Starts*. You can filter the available tours by entering the keyword `virtualization` in the *Filter* field.
5353

5454

55-
[id="virt-4-19-new"]
55+
[id="virt-4-19-new_{context}"]
5656
== New and changed features
5757

5858
This release adds new features and enhancements related to the following components and concepts:
5959

60-
[id="virt-4-19-installation-update"]
60+
[id="virt-4-19-installation-update_{context}"]
6161
=== Installation and update
62+
//[id="virt-4-19-installation-update"]
63+
//=== Installation and update
6264

63-
[id="virt-4-19-infrastructure"]
65+
[id="virt-4-19-infrastructure_{context}"]
6466
=== Infrastructure
67+
//[id="virt-4-19-infrastructure"]
68+
//=== Infrastructure
6569

6670
//CNV-49593
6771
* You can now prevent the inadvertent deletion of a virtual machine (VM) by xref:../../virt/managing_vms/virt-enabling-disabling-vm-delete-protection.adoc#virt-enabling-disabling-vm-delete-protection[enabling delete protection for the VM]. You can also disable delete protection that has been set for a VM.
6872
+
6973
As a cluster administrator, you can prevent users from enabling VM delete protection xref:../../virt/managing_vms/virt-enabling-disabling-vm-delete-protection.adoc#virt-removing-vm-delete-protection_virt-enabling-disabling-vm-delete-protection[by removing the option at the cluster level].
7074

75+
[id="virt-4-19-virtualization_{context}"]
76+
=== Virtualization
77+
7178
//CNV-54747
7279
* You can now choose to expand virtual machines (VMs) using instance types and preferences. For more information, see link:https://access.redhat.com/solutions/7107803[Using InstancetypeReferencePolicy to expand VirtualMachines] in the Red Hat Customer Portal.
7380

74-
[id="virt-4-19-virtualization"]
75-
=== Virtualization
7681

7782

78-
[id="virt-4-19-networking"]
83+
84+
85+
[id="virt-4-19-networking_{context}"]
7986
=== Networking
8087

8188
//CNV-30151 NNCP to enable LLDP
8289
* You can now xref:../../networking/k8s_nmstate/k8s-nmstate-updating-node-network-config.adoc#virt-example-enabling-lldp-policy_k8s-nmstate-updating-node-network-config[configure a `NodeNetworkConfigurationPolicy` manifest] to enable the Link Layer Discovery Protocol (LLDP) listener for all ethernet ports in your {product-title} cluster.
8390

8491

85-
[id="virt-4-19-storage"]
92+
93+
[id="virt-4-19-storage_{context}"]
8694
=== Storage
8795

88-
[id="virt-4-19-web"]
96+
97+
[id="virt-4-19-web_{context}"]
8998
=== Web console
9099

91100

92-
[id="virt-4-19-monitoring"]
101+
102+
103+
104+
105+
106+
[id="virt-4-19-monitoring_{context}"]
93107
=== Monitoring
94108

95109
//CNV-59720
@@ -98,32 +112,35 @@ As a cluster administrator, you can prevent users from enabling VM delete protec
98112
** `HighCPUWorkload`
99113
** `NodeNetworkInterfaceDown`
100114

101-
[id="virt-4-19-documentation"]
115+
116+
[id="virt-4-19-documentation_{context}"]
102117
=== Documentation improvements
103118

104119

105-
[id="virt-4-19-notable-technical-changes"]
120+
[id="virt-4-19-notable-technical-changes_{context}"]
106121
=== Notable technical changes
107122

108123

109-
[id="virt-4-19-deprecated-removed"]
124+
[id="virt-4-19-deprecated-removed_{context}"]
110125
== Deprecated and removed features
111126
//NOTE: Comment out deprecated and removed features (and their IDs) if not used in a release
112127

113-
[id="virt-4-19-deprecated"]
128+
[id="virt-4-19-deprecated_{context}"]
114129
=== Deprecated features
115130
// NOTE: When uncommenting deprecated features list, change the Removed features header level below to ===
116131

117132
Deprecated features are included in the current release and supported. However, they will be removed in a future release and are not recommended for new deployments.
118133

119134
* The `OperatorConditionsUnhealthy` alert is deprecated. You can safely xref:../../observability/monitoring/managing-alerts/managing-alerts-as-an-administrator.adoc#silencing-alerts-adm_managing-alerts-as-an-administrator[silence] it.
120135

121-
[id="virt-4-19-removed"]
136+
137+
[id="virt-4-19-removed_{context}"]
122138
=== Removed features
123139

124140
Removed features are no longer supported in {VirtProductName}.
125141

126142

143+
127144
[id="virt-4-19-technology-preview_{context}"]
128145
== Technology Preview features
129146

@@ -135,43 +152,76 @@ link:https://access.redhat.com/support/offerings/techpreview[Technology Preview
135152
* You can now xref:../../virt/vm_networking/virt-setting-interface-link-state.adoc#virt-setting-interface-link-state[manage the link state] of a primary or secondary virtual machine (VM) interface by using the {product-title} web console or the CLI.
136153

137154

138-
[id="virt-4-19-bug-fixes"]
155+
156+
[id="virt-4-19-bug-fixes_{context}"]
139157
== Bug fixes
140-
//
141-
[id="virt-4-18-known-issues"]
158+
159+
160+
[id="virt-4-19-known-issues_{context}"]
142161
== Known issues
143162

144163
[discrete]
145-
[id="virt-4-19-ki-monitoring"]
164+
[id="virt-4-19-ki-monitoring_{context}"]
146165
=== Monitoring
147166

148167
[discrete]
149-
[id="virt-4-19-ki-networking"]
168+
[id="virt-4-19-ki-networking_{context}"]
150169
=== Networking
151170
//CNV-38746
152171
* When you update from {product-title} 4.12 to a newer minor version, VMs that use the `cnv-bridge` Container Network Interface (CNI) fail to live migrate. (link:https://access.redhat.com/solutions/7069807[])
153172
** As a workaround, change the `spec.config.type` field in your `NetworkAttachmentDefinition` manifest from `cnv-bridge` to `bridge` before performing the update.
154173

155174

156-
[discrete]
157-
[id="virt-4-18-ki-nodes"]
158-
=== Nodes
159-
160175

161176
[discrete]
162-
[id="virt-4-18-ki-storage"]
163-
=== Storage
177+
[id="virt-4-19-ki-nodes_{context}"]
178+
==== Nodes
179+
//CNV-38543 - 4.16 Still an issue
180+
* Uninstalling {VirtProductName} does not remove the `feature.node.kubevirt.io` node labels created by {VirtProductName}. You must remove the labels manually. (link:https://issues.redhat.com/browse/CNV-38543[*CNV-38543*])
164181

182+
[discrete]
183+
[id="virt-4-19-ki-storage_{context}"]
184+
==== Storage
185+
//CNV-23501: 4.16 - Keep per Dominik Holler
186+
* If you clone more than 100 VMs using the `csi-clone` cloning strategy, then the Ceph CSI might not purge the clones. Manually deleting the clones might also fail. (link:https://issues.redhat.com/browse/CNV-23501[*CNV-23501*])
187+
** As a workaround, you can restart the `ceph-mgr` daemon to purge the VM clones.
188+
189+
// CNV-55104: 4.18 - Unresolved
190+
* If you perform storage class migration for a stopped VM, the VM might not be able to start because of a missing bootable device. To prevent this, do not attempt storage class migration if the VM is not running. (link:https://issues.redhat.com/browse/CNV-55104[*CNV-55104*])
191+
+
192+
--
193+
:FeatureName: Storage class migration
194+
include::snippets/technology-preview.adoc[]
195+
--
165196

166197
[discrete]
167-
[id="virt-4-18-ki-virtualization"]
198+
[id="virt-4-19-ki-virtualization_{context}"]
168199
=== Virtualization
169200

201+
//CNV-33835: 4.16 - Unresolved
202+
* {VirtProductName} links a service account token in use by a pod to that specific pod. {VirtProductName} implements a service account volume by creating a disk image that contains a token. If you migrate a VM, then the service account volume becomes invalid. (link:https://issues.redhat.com/browse/CNV-33835[*CNV-33835*])
203+
** As a workaround, use user accounts rather than service accounts because user account tokens are not bound to a specific pod.
204+
170205

171206
[discrete]
172-
[id="virt-4-16-ki-webconsole_{context}"]
207+
[id="virt-4-19-ki-webconsole_{context}"]
173208
=== Web console
174209

175210
[discrete]
176-
[id="virt-4-18-ki-ibm-z_{context}"]
211+
[id="virt-4-19-ki-ibm-z_{context}"]
177212
=== {ibm-z-title} and {ibm-linuxone-title}
213+
214+
--
215+
:FeatureName: Using {VirtProductName} with s390x architecture
216+
include::snippets/technology-preview.adoc[]
217+
--
218+
219+
// ocpbugs-51113 - ballooning call traces
220+
* When you create a VM by using {op-system-base-full} container disk images for s390x architecture, call traces referencing `virtio_balloon` print to the VM console. (link:https://issues.redhat.com/browse/OCPBUGS-51113[OCPBUGS-51113])
221+
** As a workaround, add the following parameter to the VM YAML configuration: `spec.autoattachMemBalloon: false`.
222+
223+
// cnv-56889 - boot mode
224+
* In the {product-title} web console, the *Boot mode* list for an s390x VM incorrectly includes *BIOS*, *UEFI*, and *UEFI (secure)* boot modes. If you select one of these modes for an s390x-based VM, the operation fails. This is because VMs based on s390x architecture can only use the *IPL* boot mode. (link:https://issues.redhat.com/browse/CNV-56889[CNV-56889])
225+
226+
// cnv-56890 - threads
227+
* In the {product-title} web console, it is erroneously possible to define multiple CPU threads for a VM based on s390x architecture. If you define multiple CPU threads, the VM enters a `CrashLoopBackOff` state with the `qemu-kvm: S390 does not support more than 1 threads` error. (link:https://issues.redhat.com/browse/CNV-56890[CNV-56890])

0 commit comments

Comments
 (0)