|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * backup_and_restore/oadp-1-4-release-notes.adoc |
| 4 | + |
| 5 | +:_mod-docs-content-type: REFERENCE |
| 6 | + |
| 7 | +[id="oadp-1-4-1-release-notes_{context}"] |
| 8 | += OADP 1.4.1 release notes |
| 9 | + |
| 10 | +The {oadp-first} 1.4.1 release notes lists new features, resolved issues and bugs, and known issues. |
| 11 | + |
| 12 | +[id="new-features-1-4-1_{context}"] |
| 13 | +== New features |
| 14 | + |
| 15 | +.New DPA fields to update client qps and burst |
| 16 | + |
| 17 | +You can now change Velero Server Kubernetes API queries per second and burst values by using the new Data Protection Application (DPA) fields. The new DPA fields are `spec.configuration.velero.client-qps` and `spec.configuration.velero.client-burst`, which both default to 100. |
| 18 | +link:https://issues.redhat.com/browse/OADP-4076[OADP-4076] |
| 19 | + |
| 20 | +.Enabling non-default algorithms with Kopia |
| 21 | + |
| 22 | +With this update, you can now configure the hash, encryption, and splitter algorithms in Kopia to select non-default options to optimize performance for different backup workloads. |
| 23 | + |
| 24 | +To configure these algorithms, set the `env` variable of a `velero` pod in the `podConfig` section of the DataProtectionApplication (DPA) configuration. If this variable is not set, or an unsupported algorithm is chosen, Kopia will default to its standard algorithms. |
| 25 | +link:https://issues.redhat.com/browse/OADP-4640[OADP-4640] |
| 26 | + |
| 27 | + |
| 28 | +[id="resolved-issues-1-4-1_{context}"] |
| 29 | +== Resolved issues |
| 30 | + |
| 31 | +.Restoring a backup without pods is now successful |
| 32 | + |
| 33 | +Previously, restoring a backup without pods and having `StorageClass VolumeBindingMode` set as `WaitForFirstConsumer`, resulted in the `PartiallyFailed` status with an error: `fail to patch dynamic PV, err: context deadline exceeded`. |
| 34 | +With this update, patching dynamic PV is skipped and restoring a backup is successful without any `PartiallyFailed` status. |
| 35 | +link:https://issues.redhat.com/browse/OADP-4231[OADP-4231] |
| 36 | + |
| 37 | + |
| 38 | +.PodVolumeBackup CR now displays correct message |
| 39 | + |
| 40 | +Previously, the `PodVolumeBackup` custom resource (CR) generated an incorrect message, which was: `get a podvolumebackup with status "InProgress" during the server starting, mark it as "Failed"`. |
| 41 | +With this update, the message produced is now: |
| 42 | +[source,text] |
| 43 | +---- |
| 44 | +found a podvolumebackup with status "InProgress" during the server starting, |
| 45 | +mark it as "Failed". |
| 46 | +---- |
| 47 | +link:https://issues.redhat.com/browse/OADP-4224[OADP-4224] |
| 48 | + |
| 49 | +.Overriding imagePullPolicy is now possible with DPA |
| 50 | + |
| 51 | +Previously, {oadp-short} set the `imagePullPolicy` parameter to `Always` for all images. |
| 52 | +With this update, {oadp-short} checks if each image contains `sha256` or `sha512` digest, then it sets `imagePullPolicy` to `IfNotPresent`; otherwise `imagePullPolicy` is set to `Always`. You can now override this policy by using the new `spec.containerImagePullPolicy` DPA field. |
| 53 | +link:https://issues.redhat.com/browse/OADP-4172[OADP-4172] |
| 54 | + |
| 55 | +.OADP Velero can now retry updating the restore status if initial update fails |
| 56 | + |
| 57 | +Previously, {oadp-short} Velero failed to update the restored CR status. This left the status at `InProgress` indefinitely. Components which relied on the backup and restore CR status to determine the completion would fail. |
| 58 | +With this update, the restore CR status for a restore correctly proceeds to the `Completed` or `Failed` status. |
| 59 | +link:https://issues.redhat.com/browse/OADP-3227[OADP-3227] |
| 60 | + |
| 61 | +.Restoring BuildConfig Build from a different cluster is successful without any errors |
| 62 | + |
| 63 | +Previously, when performing a restore of the `BuildConfig` Build resource from a different cluster, the application generated an error on TLS verification to the internal image registry. The resulting error was `failed to verify certificate: x509: certificate signed by unknown authority` error. |
| 64 | +With this update, the restore of the `BuildConfig` build resources to a different cluster can proceed successfully without generating the `failed to verify certificate` error. |
| 65 | +link:https://issues.redhat.com/browse/OADP-4692[OADP-4692] |
| 66 | + |
| 67 | +.Restoring an empty PVC is successful |
| 68 | + |
| 69 | +Previously, downloading data failed while restoring an empty persistent volume claim (PVC). It failed with the following error: |
| 70 | +[source,text] |
| 71 | +---- |
| 72 | +data path restore failed: Failed to run kopia restore: Unable to load |
| 73 | + snapshot : snapshot not found |
| 74 | +---- |
| 75 | +With this update, the downloading of data proceeds to correct conclusion when restoring an empty PVC and the error message is not generated. |
| 76 | +link:https://issues.redhat.com/browse/OADP-3106[OADP-3106] |
| 77 | + |
| 78 | +.There is no Velero memory leak in CSI and DataMover plugins |
| 79 | + |
| 80 | +Previously, a Velero memory leak was caused by using the CSI and DataMover plugins. When the backup ended, the Velero plugin instance was not deleted and the memory leak consumed memory until an `Out of Memory` (OOM) condition was generated in the Velero pod. With this update, there is no resulting Velero memory leak when using the CSI and DataMover plugins. |
| 81 | +link:https://issues.redhat.com/browse/OADP-4448[OADP-4448] |
| 82 | + |
| 83 | +.Post-hook operation does not start before the related PVs are released |
| 84 | + |
| 85 | +Previously, due to the asynchronous nature of the Data Mover operation, a post-hook might be attempted before the Data Mover persistent volume claim (PVC) releases the persistent volumes (PVs) of the related pods. This problem would cause the backup to fail with a `PartiallyFailed` status. |
| 86 | +With this update, the post-hook operation is not started until the related PVs are released by the Data Mover PVC, eliminating the `PartiallyFailed` backup status. |
| 87 | +link:https://issues.redhat.com/browse/OADP-3140[OADP-3140] |
| 88 | + |
| 89 | +.Deploying a DPA works as expected in namespaces with more than 37 characters |
| 90 | + |
| 91 | +When you install the OADP Operator in a namespace with more than 37 characters to create a new DPA, labeling the "cloud-credentials" Secret fails and the DPA reports the following error: |
| 92 | +---- |
| 93 | +The generated label name is too long. |
| 94 | +---- |
| 95 | +With this update, creating a DPA does not fail in namespaces with more than 37 characters in the name. |
| 96 | +link:https://issues.redhat.com/browse/OADP-3960[OADP-3960] |
| 97 | + |
| 98 | +.Restore is successfully completed by overriding the timeout error |
| 99 | + |
| 100 | +Previously, in a large scale environment, the restore operation would result in a `Partiallyfailed` status with the error: `fail to patch dynamic PV, err: context deadline exceeded`. |
| 101 | +With this update, the `resourceTimeout` Velero server argument is used to override this timeout error resulting in a successful restore. |
| 102 | +link:https://issues.redhat.com/browse/OADP-4344[OADP-4344] |
| 103 | + |
| 104 | +For a complete list of all issues resolved in this release, see the list of link:https://issues.redhat.com/issues/?filter=12442016[OADP 1.4.1 resolved issues] in Jira. |
| 105 | + |
| 106 | + |
| 107 | +[id="known-issues-1-4-1_{context}"] |
| 108 | +== Known issues |
| 109 | + |
| 110 | +.Cassandra application pods enter into the `CrashLoopBackoff` status after restoring OADP |
| 111 | + |
| 112 | +After {oadp-short} restores, the Cassandra application pods might enter `CrashLoopBackoff` status. To work around this problem, delete the `StatefulSet` pods that are returning the error `CrashLoopBackoff` state after restoring {oadp-short}. The `StatefulSet` controller then recreates these pods and it runs normally. |
| 113 | +link:https://issues.redhat.com/browse/OADP-4407[OADP-4407] |
| 114 | + |
| 115 | +.Deployment referencing ImageStream is not restored properly leading to corrupted pod and volume contents |
| 116 | + |
| 117 | +During a File System Backup (FSB) restore operation, a `Deployment` resource referencing an `ImageStream` is not restored properly. The restored pod that runs the FSB, and the `postHook` is terminated prematurely. |
| 118 | + |
| 119 | +During the restore operation, the {ocp} controller updates the `spec.template.spec.containers[0].image` field in the `Deployment` resource with an updated `ImageStreamTag` hash. The update triggers the rollout of a new pod, terminating the pod on which `velero` runs the FSB along with the post-hook. For more information about image stream trigger, see xref:../../../openshift_images/triggering-updates-on-imagestream-changes.adoc#triggering-updates-on-imagestream-changes[Triggering updates on image stream changes]. |
| 120 | + |
| 121 | +The workaround for this behavior is a two-step restore process: |
| 122 | + |
| 123 | +. Perform a restore excluding the `Deployment` resources, for example: |
| 124 | ++ |
| 125 | +[source,terminal] |
| 126 | +---- |
| 127 | +$ velero restore create <RESTORE_NAME> \ |
| 128 | + --from-backup <BACKUP_NAME> \ |
| 129 | + --exclude-resources=deployment.apps |
| 130 | +---- |
| 131 | + |
| 132 | +. Once the first restore is successful, perform a second restore by including these resources, for example: |
| 133 | ++ |
| 134 | +[source,terminal] |
| 135 | +---- |
| 136 | +$ velero restore create <RESTORE_NAME> \ |
| 137 | + --from-backup <BACKUP_NAME> \ |
| 138 | + --include-resources=deployment.apps |
| 139 | +---- |
| 140 | +link:https://issues.redhat.com/browse/OADP-3954[OADP-3954] |
0 commit comments