Skip to content

Commit 827be16

Browse files
laubaibmcelvee
authored andcommitted
Minor updates to What's New for the OCP 4.18 release.
1 parent 52c46ef commit 827be16

File tree

1 file changed

+13
-9
lines changed

1 file changed

+13
-9
lines changed

rosa_release_notes/rosa-release-notes.adoc

Lines changed: 13 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -24,32 +24,34 @@ endif::openshift-rosa[]
2424
//remove from rosa distro once HCP split occurs.
2525
* **New version of {hcp-title} available.** {hcp-title} version 4.18 is now available. For more information about upgrading to this latest version, see xref:../upgrading/rosa-hcp-upgrading.adoc#rosa-hcp-upgrading[Upgrading ROSA with HCP clusters].
2626

27+
* **Graphical installer enhancements.** You can now use the graphical installer in {hybrid-console} to configure the following options when you create your cluster:
28+
** Configure a `cluster-admin` user and optionally define a custom password.
29+
** Configure the root disk size for the default machine pool.
30+
31+
ifdef::openshift-rosa-hcp[]
32+
* **Edit the billing account for existing ROSA with HCP clusters.** You can now update the billing account associated with your {hcp-title} clusters after cluster creation. For more information, see the {cluster-manager} documentation: link:https://docs.redhat.com/en/documentation/openshift_cluster_manager/1-latest/html-single/managing_clusters/index#proc_updating-billing-accts-rosa-hcp_assembly-managing-clusters[Updating billing accounts].
33+
endif::openshift-rosa-hcp[]
34+
35+
//The following is included in Classic only until the Images doc has been split for HCP
2736
ifndef::openshift-rosa-hcp[]
2837
* **Image configuration is now available for {hcp-title}.** You can configure registries within a cluster to exclude some registries or allow only a defined list. It also allows to expose additional trusted bundle for registries to pull from. For more information, see xref:../openshift_images/image-configuration-hcp.adoc#images-configuration-parameters-hcp_image-configuration-hcp[Image configuration resources for {hcp-title}].
2938
endif::openshift-rosa-hcp[]
3039

3140
// These notes need to be duplicated until the ROSA with HCP split out is completed.
3241
ifdef::openshift-rosa[]
3342
* **{rosa-classic} cluster node limit update.** {rosa-classic} clusters versions 4.14.14 and greater can now scale to 249 worker nodes. This is an increase from the previous limit of 180 nodes. For more information, see xref:../rosa_planning/rosa-limits-scalability.adoc#rosa-limits-scalability[Limits and scalability].
34-
+
43+
3544
// * **{product-title} SDN network plugin blocks future major upgrades**
3645
* **Initiate live migration from OpenShift SDN to OVN-Kubernetes.**
3746
As part of the {product-title} move to OVN-Kubernetes as the only supported network plugin starting with {product-title} version 4.17, users can now initiate live migration from the OpenShift SDN network plugin to the OVN-Kubernetes network plugin.
3847
+
3948
If your cluster uses the OpenShift SDN network plugin, you cannot upgrade to future major versions of {product-title} without migrating to OVN-Kubernetes.
4049
+
4150
For more information about migrating to OVN-Kubernetes, see xref:../networking/ovn_kubernetes_network_provider/migrate-from-openshift-sdn.adoc#migrate-from-openshift-sdn[Migrating from OpenShift SDN network plugin to OVN-Kubernetes network plugin].
42-
+
43-
* **Egress lockdown is now available as a Technology Preview on {product-title} clusters.** You can create a fully operational cluster that does not require a public egress by configuring a virtual private cloud (VPC) and using the `--properties zero_egress:true` flag when creating your cluster. For more information, see xref:../rosa_hcp/rosa-hcp-egress-lockdown-install.adoc#rosa-hcp-egress-lockdown-install[Creating a {product-title} cluster with egress lockdown].
44-
+
45-
--
46-
:FeatureName: Egress lockdown
47-
include::snippets/technology-preview.adoc[]
48-
--
49-
* **ROSA with HCP now creates independent security groups for the AWS PrivateLink endpoint and worker nodes.** {hcp-title} clusters version 4.17.2 and greater can now add additional AWS security groups to the AWS PrivateLink endpoint to allow additional ingress traffic to the cluster's API. For more information, see xref:../rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc#rosa-hcp-aws-private-security-groups_rosa-hcp-aws-private-creating-cluster[Adding additional AWS security groups to the AWS PrivateLink endpoint].
5051

5152
* **Red{nbsp}Hat SRE log-based alerting endpoints have been updated.** {rosa-classic} customers who are using a firewall to control egress traffic can now remove all references to `*.osdsecuritylogs.splunkcloud.com:9997` from your firewall allowlist. {rosa-classic} clusters still require the `http-inputs-osdsecuritylogs.splunkcloud.com:443` log-based alerting endpoint to be accessible from the cluster.
5253
endif::openshift-rosa[]
54+
5355
ifdef::openshift-rosa-hcp[]
5456
* **ROSA with HCP now creates independent security groups for the AWS PrivateLink endpoint and worker nodes.** {hcp-title} clusters version 4.17.2 and greater can now add additional AWS security groups to the AWS PrivateLink endpoint to allow additional ingress traffic to the cluster's API. For more information, see xref:../rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc#rosa-hcp-aws-private-security-groups_rosa-hcp-aws-private-creating-cluster[Adding additional AWS security groups to the AWS PrivateLink endpoint].
5557

@@ -60,6 +62,8 @@ ifdef::openshift-rosa-hcp[]
6062
include::snippets/technology-preview.adoc[]
6163
--
6264
endif::openshift-rosa-hcp[]
65+
66+
//The following omits all earlier updates from HCP builds, right down to Known Issues; unclear if we want this long term or if it's a stop-gap while we split the HCP docs
6367
ifdef::openshift-rosa[]
6468

6569
[id="rosa-q4-2024_{context}"]

0 commit comments

Comments
 (0)