-
Previously, if you did not specify a custom Red Hat Enterprise Linux CoreOS (RHCOS) Amazon Machine Image (AMI) when installing an AWS cluster to a supported secret partition, the installation failed. With this update, the installation program validates that you have specified the ID of an RHCOS AMI in the installation configuration file before deploying the cluster. (OCPBUGS-13636)
-
Previously, the OpenShift Container Platform installation program did not find private hosted zones in the host project during installations on Google Cloud Platform (GCP) by using a shared VPC. With this update, the installation program checks for an existing private hosted zone in the host project and uses the private hosted zone if it exists. (OCPBUGS-11736)
-
Previously, if you configured user-defined outbound routing when installing a private Azure cluster, the cluster was incorrectly deployed with the default public load balancer. This behavior occurred when using the installer-provisioned infrastructure to install the cluster. With this update, the installation program no longer creates the public load balancer when user-defined routing is configured. (OCPBUGS-9404)
-
Previously, for clusters that run on RHOSP, in the deprovisioning phase of installation, the installer deleted object storage containers sequentially. This behavior caused slow and inefficient deletion of objects, especially with large containers. This problem occurred in part because image streams that use Swift containers accumulated objects over time. Now, bulk object deletion occurs concurrently with up to 3 calls to the RHOSP API, improving efficiency by handling a higher object count per call. This optimization speeds up resource cleanup during deprovisioning. (OCPBUGS-9081)
-
Previously, SSH access to bootstrap and cluster nodes failed when the bastion host ran in the same VPC network as the cluster nodes. Additionally, this configuration caused SSH access from the temporary bootstrap node to the cluster nodes to fail. These issues are now fixed by updating the IBM Cloud SecurityGroupRules
to support SSH traffic between the temporary bootstrap node and cluster nodes, and to support SSH traffic from a bastion host to cluster nodes on the same VPC network. Log and debug information can be accurately collected for analysis during installer-provisioned infrastructure failure.(OCPBUGS-8035)
-
Previously, DNS records that the installation program created were not removed when uninstalling a private cluster. With this update, the installation program now correctly removes these DNS records. (OCPBUGS-7973)
-
Previously, a script provided in the documentation for checking invalid HTTPS certificates in the RHOSP API assumed a recent version of the RHOSP client. For users who did not have a recent version of the client, this script failed. Now, manual instructions are added to the documentation that users can follow to perform the check with any version of the client. (OCPBUGS-7954)
-
Previously, when defining static IP addresses in the agent-config.yaml
or nmstateconfig.yaml
files for the configuration of an Agent-based install, the configured static IP addresses might not have been configured during bootstrap. As a result, the host interfaces would choose an address through DHCP. With this update, timing issues are fixed to ensure that the configured static IP address is correctly applied to the host interface. (OCPBUGS-16219)
-
Previously, during an Agent-based installation, the certificates in the AdditionalTrustBundle
field of the install-config.yaml
file were only propagated to the final image when the ImageContentSources
field was also set for mirroring. If mirroring was not set, the additional certificates were on the bootstrap but not the final image. This situation can cause issues when you have set up a proxy and want to add additional certificates as described in Configuring the cluster-wide proxy during installation. With this update, these additional certificates are propagated to the final image whether or not the ImageContentSources
field is also set. (OCPBUGS-13535)
-
Previously, the openshift-install agent create
command did not return the help output when running an invalid command. With this update, the help output is now shown when you run an invalid openshift-install agent create
command. (OCPBUGS-10638)
-
Previously, primary networks were not correctly set for generated machines that used Technology Preview failure domains. As a consequence, port targets with the ID control-plane
were not set as the primary network on machines, which could cause installations that use Kuryr to function improperly. The field is now set to use the proper port target, if set. The primary network for generated machines is now set correctly, allowing installations that use Kuryr to complete. (OCPBUGS-10570)
-
Previously, when running the openshift-install agent create image
command while using a releaseImage
that contained a digest, the command produced the following warning message: WARNING The ImageContentSources configuration in install-config.yaml should have at-least one source field matching the releaseImage
. This message was produced every time, regardless of how ImageContentSources
was configured, and could cause confusion. With this update, the warning message is only produced when ImageContentSources
is legitimately not set to have at least one source field matching the release image. (OCPBUGS-10207)
-
Previously, when running the openshift-install agent create image
command to generate a bootable ISO image, the command output provided a message indicating a successful generated image. This output message existed even if the Agent-based installer could not extract a base ISO image from the release image. With this update, the command output now produces an error message if the Agent-based Installer cannot locate the base ISO image, which might be indicative of an issue with releaseImage
. (OCPBUGS-9949)
-
Previously, shared VPC installations on GCP that used passthrough credentials mode could fail because the installation program used credentials from the default service account. With this update, you can specify another service account to use for node creation instead of the default. (OCPBUGS-15421)
-
Previously, if you defined more control plane nodes than compute nodes in either the agent-config.yaml
or the nmstateconfig.yaml
configuration file, you received a warning message. Now, if you specify this configuration in either file, you receive an error message, which indicates that compute nodes cannot exceed control plane nodes in either file. (OCPBUGS-14877)
-
Previously, an Agent-based installation would fail if a non-canonical IPv6 address was used for the RendezvousIP
field in the agent-config.yaml
file. Non-canonical IPv6 addresses contain leading zeros, for example, 2001:0db8:0000:0000:0000:0000:0000:0000
. With this update, these valid addresses can now be used for the RendezvousIP
. (OCPBUGS-14121)
-
Previously, the Operator cached the cloud credentials, which resulted in authentication issues when these credentials were rotated. Now, the Operator always uses the latest credentials. The Manila CSI Driver Operator now automatically creates an OpenShift storage class for each available Manila share type. As part of this operation, the Operator queries the Manila API. (OCPBUGS-14049)
-
Previously, when configuring the install-config.yaml
file for use during an Agent-based installation, changing the cpuPartitioning
field to a non-default value did not produce a warning to alert users that the field is ignored for Agent-based installations. With this update, changing the cpuPartitioning
field causes a warning to users that the configuration does not impact the install. (OCPBUGS-13662)
-
Previously, installing an Azure cluster into an existing Azure Virtual Network (VNet) could fail because the installation program created a default network security group, which allowed traffic from 0.0.0.0
. The failure occurred when the existing VNet had the following rule enabled in the tenant: Rule: Network Security Groups shall not allow rule with 0.0.0.0/Any Source/Destination IP Addresses - Custom Deny
. With this fix, the installation program no longer creates the default network security group when installing a cluster into an existing VNet, and the installation succeeds. (OCPBUGS-11796)
-
During an installation, when the cluster status is installing-pending-user-action
, the installation does not complete until the status is resolved. Previously, if you ran the openshift-install agent wait-for bootstrap-complete
command, no indication existed of how to resolve the problem that caused this status. With this update, the command output provides a message indicating which actions must be taken to resolve the issue. (OCPBUGS-4998)
For example, the wait-for
output when an invalid boot disk is used is now as follows:
"level=info msg=Cluster has hosts requiring user input
level=debug msg=Host master-1 Expected the host to boot from disk, but it booted the installation image - please reboot and fix boot order to boot from disk QEMU_HARDDISK drive-scsi0-0-0-0 (sda, /dev/disk/by-path/pci-0000:03:00.0-scsi-0:0:0:0)
level=debug msg=Host master-2 Expected the host to boot from disk, but it booted the installation image - please reboot and fix boot order to boot from disk QEMU_HARDDISK drive-scsi0-0-0-0 (sda, /dev/disk/by-path/pci-0000:03:00.0-scsi-0:0:0:0)
level=info msg=cluster has stopped installing... working to recover installation"
-
Previously, the assisted-installer-controller
on the installed cluster would run continuously even after the cluster had completed installation. Because assisted-service
runs on the bootstrap node and not on the cloud, and because the assisted-service goes offline after the bootstrap node reboots to join the cluster, the assisted-installer-controller
was unable to communicate with assisted-service to post updates and upload logs and loops. Now, the assisted-installer-controller
checks the cluster installation without using assisted-service
, and exits when the cluster installation is complete. (OCPBUGS-4240)
-
Previously, installing a cluster to the AWS Commercial Cloud Services (C2S) us-iso-east-1
region failed with an error message stating an UnsupportedOperation
. With this fix, installing to this region now succeeds. (OCPBUGS-2324)
-
Previously, installations on AWS could fail because the installation program did not create the cloud.conf
file with the necessary service endpoints in it. This led to the machine config operator creating an empty cloud.conf
file that lacked the service endpoints, leading to an error. With this update, the installation program always creates the cloud.conf
file so that the installation succeeds. (OCPBUGS-20401)
-
Previously, if you installed a cluster using the Agent-based installer and your pull secret had a null auth
or email
field, the installation would fail without providing a useful error. With this update, the openshift-install agent wait-for install-complete
command validates your pull secret and notifies you if there are null fields. (OCPBUGS-14405)
-
Previously, the create agent-config-template
command printed a line with INFO
only, but no details about whether the command was successful and where the template file was written to. Now, if the command is successful, the command will print INFO Created Agent Config Template in <path> directory
. (OCPBUGS-13408)
-
Previously, when a user specified the vendor
hint in the agent-config.yaml
file, the value was checked against the wrong field so that the hint would not match. With this update, the use of the vendor
hint correctly selects a disk. (OCPBUGS-13356)
-
Previously, setting the metadataService.authentication
field to Required
when installing a cluster on AWS did not configure the bootstrap VM to use IMDSv2 authentication. This could result in installations failing if you configured your AWS account to block IMDSv1 authentication. With this update, the metadataService.authentication
field correctly configures the bootstrap VM to use IMDSv2 authentication when set to Required
. (OCPBUGS-12964)
-
Previously, if you configured user-defined outbound routing when installing a private Azure cluster, the cluster was incorrectly deployed with the default public load balancer. This behavior occurred when using the installer-provisioned infrastructure to install the cluster. With this update, the installation program no longer creates the public load balancer when user-defined routing is configured. (OCPBUGS-9404)
-
Previously, the vSphere Terraform vsphere_virtual_machine
resource did not include the firmware
parameter. This issue caused the firmware of the VM to be set to bios
by default instead of efi
. Now, the resource includes the firmware
parameter and sets efi
as the default value for the parameter, so that the VM runs the Extensible Firmware Interface (EFI) instead of the basic input/output system (BIOS) interface. (OCPBUGS-9378)
-
Previously, for clusters that run on RHOSP, in the deprovisioning phase of installation, the installer deleted object storage containers sequentially. This behavior caused slow and inefficient deletion of objects, especially with large containers. This problem occurred in part because image streams that use Swift containers accumulated objects over time. Now, bulk object deletion now occurs concurrently with up to 3 calls to the RHOSP API, improving efficiency by handling a higher object count per call. This optimization speeds up resource cleanup during deprovisioning. (OCPBUGS-9081)
-
Previously, the installation program did not exit with an error if you installed a cluster on Azure by using disk encryption without providing a subscription ID. This caused the installation to begin, and then only to fail later on. With this update, the installation program requires you to specify a subscription ID for encrypted Azure installations and exits with an error if you do not provide one. (OCPBUGS-8449)
-
Previously, the Agent-based installer showed the results of secondary checks such as ping
and nslookup
, which can harmlessly fail even when the installation succeeds. This could result in errors being displayed despite the cluster installing successfully. With this update, secondary checks only display results if the primary installation checks fail, so that you can use the secondary checks to troubleshoot the failed installation. (OCPBUGS-8390)
-
Using an IPI install-config
with the Agent-based Installer results in warning log messages showing the contents of any unused fields. Previously, these warnings printed sensitive information such as passwords. With this update, the warning messages for the credentials fields in the vsphere
and baremetal
platform sections have been changed to avoid logging any sensitive information. (OCPBUGS-8203)
-
Previously, clusters on Azure Stack Hub could not create new control plane nodes unless the nodes had custom disk sizes, because the default disk size could not be validated. With this update, the default disk size has been set to 128 GB and the installation program enforces user-specified disk size values between 128 and 1023 GB. (OCPBUGS-6759)
-
Previously, the installation program used port 80 to provide images to the Baseboard Management Controller (BMC) and the deployment agent when installing on bare metal with installer-provisioned infrastructure. This could present security concerns because many types of public traffic use port 80. With this update, the installation program uses port 6180 for this purpose. (OCPBUGS-8509)