-
Previously, enabling encapsulated security payload (ESP) offload hardware when using IPSec on Open vSwitch attached interfaces would break connectivity in your cluster. To resolve this issue, OpenShift Container Platform by default disables ESP offload hardware on Open vSwitch attached interfaces. This fixes the issue. (OCPBUGS-42987)
-
Previously, if you deleted the default sriovOperatorConfig
custom resource (CR), you could not recreate the default sriovOperatorConfig
CR, because the ValidatingWebhookConfiguration
was not initially deleted. With this release, the Single Root I/O Virtualization (SR-IOV) Network Operator removes validating webhooks when you delete the sriovOperatorConfig
CR, so that you can create a new sriovOperatorConfig
CR. (OCPBUGS-41897)
-
Previously, if you set custom annotations in a custom resource (CR), the SR-IOV Operator would override all the default annotations in the SriovNetwork
CR. With this release, when you define custom annotations in a CR, the SR-IOV Operator does not override the default annotations. (OCPBUGS-41352)
-
Previously, bonds that were configured in active-backup
mode would have IPsec Encapsulating Security Payload (ESP) offload active even if underlying links did not support ESP offload. This caused IPsec associations to fail. With this release, ESP offload is disabled for bonds so that IPsec associations pass. (OCPBUGS-39438)
-
Previously, the Machine Config Operator (MCO)'s vSphere resolve-prepender
script used systemd
directives that were incompatible with old bootimage versions used in OpenShift Container Platform 4. With this release, nodes can scale using newer bootimage versions 4.18 4.13 and above, through manual intervention, or by upgrading to a release that includes this fix. (OCPBUGS-38012)
-
Previously, the Ingress Controller status incorrectly displayed as Degraded=False
because of a migration time issue with the CanaryRepetitiveFailures
condition. With this release, the Ingress Controller status is correctly marked as Degraded=True
for the appropriate length of time that the CanaryRepetitiveFailures
condition exists. (OCPBUGS-37491)
-
Previously, when a pod was running on a node on which egress IPv6 is assigned, the pod was not able to communicate with the Kubernetes service in a dual stack cluster. This resulted in the traffic with the IP family, that the egressIP is not applicable to, being dropped. With this release, only the source network address translation (SNAT) for the IP family that the egress IPs applied to is deleted, eliminating the risk of traffic being dropped. (OCPBUGS-37193)
-
Previously, the Single-Root I/O Virtualization (SR-IOV) Operator did not expire the acquired lease during the Operator’s shutdown operation. This impacted a new instance of the Operator, because the new instance had to wait for the lease to expire before the new instance was operational. With this release, an update to the Operator shutdown logic ensures that the Operator expires the lease when the Operator is shutting down. (OCPBUGS-23795)
-
Previously, for an Ingress resource with an IngressWithoutClassName
alert, the Ingress Controller did not delete the alert along with deletion of the resource. The alert continued to show on the OpenShift Container Platform web console. With this release, the Ingress Controller resets the openshift_ingress_to_route_controller_ingress_without_class_name
metric to 0
before the controller deletes the Ingress resource, so that the alert is deleted and no longer shows on the web console. (OCPBUGS-13181)
-
Previously, when either the clusterNetwork
or serviceNetwork
IP address pools overlapped with the default transit_switch_subnet
100.88.0.0/16
IP address and the custom value of transit_switch_subnet
did not take effect, ovnkube-node
pods crashed after the live migration operation. With this release, the custom value of transit_switch_subnet
can be passed to ovnkube node
pods, so that this issue no longer persists. (OCPBUGS-43740)
-
Previously, a change in OVN-Kubernetes that standardized the appProtocol
value h2c
to kubernetes.io/h2c
was not recognized by OpenShift router. Consequently, specifying appProtocol: kubernetes.io/h2c
on a service did not cause OpenShift router to use clear-text HTTP/2 to connect to the service endpoints. With this release, OpenShift router was changed to handle appProtocol: kubernetes.io/h2c
the same way as it handles appProtocol: h2c
resolving the issue. (OCPBUGS-42972)
-
Previously, instructions that guided the user after changing the LoadBalancer
parameter from External
to Internal
were missing for IBM Power Virtual Server, Alibaba Cloud, and Red Hat OpenStack Platform (RHOSP). This caused the Ingress Controller to be put in a permanent Progressing
state. With this release the message The IngressController scope was changed from Internal to External
is followed by To effectuate this change, you must delete the service
resolving the permanent Progressing
state. (OCPBUGS-39151)
-
Previously, there was no event logged when an error occurred from failed conversion from ingress to route conversion. With this update, this error appear in the event logs. (OCPBUGS-29354)
-
Previously, an ovnkube-node
pod on a node that uses cgroup v1 was failing because it could not find the kubelet cgroup path. With this release, an ovnkube-node
pod no longer fails if the node uses cgroup v1. However, the OVN-Kubernetes network plugin outputs an UDNKubeletProbesNotSupported
event notification. If you enable cgroup v2 for each node, OVN-Kubernetes no longer outputs the event notification.(OCPBUGS-50513)
-
Previously, when you finished the live migration for a kubevirt virtual machine (VM) that uses the Layer 2 topology, an old node still transmits IPv4 egress traffic to the virtual machine. With this release, the OVN-Kubernetes plugin updates the gateway MAC address for a kubevirt virtual machine (VM) during the live migration process so that this issue no longer occurs. (OCPBUGS-49857)
-
Previously, the DNS-based egress firewall incorrectly prevented creation of a firewall rule that contained a DNS name in uppercase characters. With this release, an fix to the egress firewall no longer prevents creation of a firewall rule that contains a DNS name in uppercase characters. (OCPBUGS-49589)
-
Previously, when you attempted to use the Cluster Network Operator (CNO) to upgrade a cluster with existing localnet
networks, ovnkube-control-plane
pods failed to run. This happened because the ovnkube-cluster-manager
container could not process an OVN-Kubernetes localnet
topology network that did not have subnets defined. With this release, a fix ensures that the ovnkube-cluster-manager
container can process an OVN-Kubernetes localnet
topology network that does not have subnets defined. (OCPBUGS-44195)
-
Previously, the SR-IOV Network Operator could not retrieve metadata when cloud-native network (CNF) workers were deployed with a configuration drive on Red Hat OpenStack Platform (RHOSP). A configuration drive is often unmounted after a boot operation on immutable systems, so now the Operator dynamically mounts a configuration drive when required. The Operator can now retrieve the metadata and then unmount the configuration drive. This means that you no longer need to manually mount and unmount the configuration drive. (OCPBUGS-41829)
-
Previously, when you switched your cluster to use a different load balancer, the Ingress Operator did not remove the values from the classicLoadBalancer
and networkLoadBalancer
parameters in the IngressController
custom resource (CR) status. This situation caused the status of the CR to report wrong information from the classicLoadBalancer
and networkLoadBalancer
parameters. With this release, after you switch your cluster to use a different load balancer, the Ingress Operator removes values from these parameters so that the CR reports a more accurate and less confusing message status. (OCPBUGS-38217)
-
Previously, a duplicate feature gate, ExternalRouteCertificate
, was added to the FeatureGate
CR. With this release, ExternalRouteCertificate
is removed because a OpenShift Container Platform cluster does not use this feature gate. (OCPBUGS-36479)
-
Previously, after a user created a route, the user needed both create
and update
permissions on the routes/custom-host
sub-resource to edit the .spec.tls.externalCertificate
field of a route. With this release, this permission requirement has been fixed, so that a user only needs the create
permission to edit the .spec.tls.externalCertificate
field of a route. The update
permission is now marked as an optional permission. (OCPBUGS-34373)