Skip to content

Commit da6c3ab

Browse files
Merge pull request #461 from syedriko/syedriko-ols-1976
OLS-1976: OCP docs update, week of 2025/07/28
2 parents dd48df5 + 64561bc commit da6c3ab

File tree

199 files changed

+1816
-1602
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

199 files changed

+1816
-1602
lines changed

ocp-product-docs-plaintext/4.15/architecture/architecture-installation.txt

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -202,6 +202,10 @@ The Cluster Version Operator (CVO) in your cluster checks with the OpenShift Upd
202202

203203
To allow the OpenShift Update Service to provide only compatible updates, a release verification pipeline drives automation. Each release artifact is verified for compatibility with supported cloud platforms and system architectures, as well as other component packages. After the pipeline confirms the suitability of a release, the OpenShift Update Service notifies you that it is available.
204204

205+
The OpenShift Update Service (OSUS) supports a single-stream release model, where only one release version is active and supported at any given time. When a new release is deployed, it fully replaces the previous release.
206+
207+
The updated release provides support for upgrades from all Red Hat OpenShift Container Platform versions starting after 4.8 up to the new release version.
208+
205209

206210
[IMPORTANT]
207211
----

ocp-product-docs-plaintext/4.15/backup_and_restore/application_backup_and_restore/oadp-features-plugins.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -138,21 +138,21 @@ OpenShift API for Data Protection (OADP) is platform neutral. The information th
138138
* OADP 1.1.7 was tested successfully against Red Hat OpenShift Container Platform 4.11 for both IBM Power(R) and IBM Z(R). The sections that follow give testing and support information for OADP 1.1.7 in terms of backup locations for these systems.
139139
* OADP 1.2.3 was tested successfully against Red Hat OpenShift Container Platform 4.12, 4.13, 4.14, and 4.15 for both IBM Power(R) and IBM Z(R). The sections that follow give testing and support information for OADP 1.2.3 in terms of backup locations for these systems.
140140
* OADP 1.3.7 was tested successfully against Red Hat OpenShift Container Platform 4.12, 4.13, 4.14, and 4.15 for both IBM Power(R) and IBM Z(R). The sections that follow give testing and support information for OADP 1.3.7 in terms of backup locations for these systems.
141-
* OADP 1.4.4 was tested successfully against Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17 for both IBM Power(R) and IBM Z(R). The sections that follow give testing and support information for OADP 1.4.4 in terms of backup locations for these systems.
141+
* OADP 1.4.5 was tested successfully against Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17 for both IBM Power(R) and IBM Z(R). The sections that follow give testing and support information for OADP 1.4.5 in terms of backup locations for these systems.
142142

143143
## OADP support for target backup locations using IBM Power
144144

145145
* IBM Power(R) running with Red Hat OpenShift Container Platform 4.11 and 4.12, and OpenShift API for Data Protection (OADP) 1.1.7 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Power(R) with Red Hat OpenShift Container Platform 4.11 and 4.12, and OADP 1.1.7 against all S3 backup location targets, which are not AWS, as well.
146146
* IBM Power(R) running with Red Hat OpenShift Container Platform 4.12, 4.13, 4.14, and 4.15, and OADP 1.2.3 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Power(R) with Red Hat OpenShift Container Platform 4.12, 4.13. 4.14, and 4.15, and OADP 1.2.3 against all S3 backup location targets, which are not AWS, as well.
147147
* IBM Power(R) running with Red Hat OpenShift Container Platform 4.12, 4.13, 4.14, and 4.15, and OADP 1.3.7 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Power(R) with Red Hat OpenShift Container Platform 4.13, 4.14, and 4.15, and OADP 1.3.7 against all S3 backup location targets, which are not AWS, as well.
148-
* IBM Power(R) running with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and OADP 1.4.4 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Power(R) with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and OADP 1.4.4 against all S3 backup location targets, which are not AWS, as well.
148+
* IBM Power(R) running with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and OADP 1.4.5 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Power(R) with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and OADP 1.4.5 against all S3 backup location targets, which are not AWS, as well.
149149

150150
## OADP testing and support for target backup locations using IBM Z
151151

152152
* IBM Z(R) running with Red Hat OpenShift Container Platform 4.11 and 4.12, and OpenShift API for Data Protection (OADP) 1.1.7 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Z(R) with Red Hat OpenShift Container Platform 4.11 and 4.12, and OADP 1.1.7 against all S3 backup location targets, which are not AWS, as well.
153153
* IBM Z(R) running with Red Hat OpenShift Container Platform 4.12, 4.13, 4.14, and 4.15, and OADP 1.2.3 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Z(R) with Red Hat OpenShift Container Platform 4.12, 4.13, 4.14 and 4.15, and OADP 1.2.3 against all S3 backup location targets, which are not AWS, as well.
154154
* IBM Z(R) running with Red Hat OpenShift Container Platform 4.12, 4.13, 4.14, and 4.15, and 1.3.7 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Z(R) with Red Hat OpenShift Container Platform 4.13 4.14, and 4.15, and 1.3.7 against all S3 backup location targets, which are not AWS, as well.
155-
* IBM Z(R) running with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and 1.4.4 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Z(R) with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and 1.4.4 against all S3 backup location targets, which are not AWS, as well.
155+
* IBM Z(R) running with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and 1.4.5 was tested successfully against an AWS S3 backup location target. Although the test involved only an AWS S3 target, Red Hat supports running IBM Z(R) with Red Hat OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17, and 1.4.5 against all S3 backup location targets, which are not AWS, as well.
156156

157157
### Known issue of OADP using IBM Power(R) and IBM Z(R) platforms
158158

ocp-product-docs-plaintext/4.15/backup_and_restore/application_backup_and_restore/release-notes/oadp-1-4-release-notes.txt

Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,26 @@ The release notes for OpenShift API for Data Protection (OADP) describe new feat
88
For additional information about OADP, see OpenShift API for Data Protection (OADP) FAQs
99
----
1010

11+
# OADP 1.4.5 release notes
12+
13+
The OpenShift API for Data Protection (OADP) 1.4.5 release notes lists new features and resolved issues.
14+
15+
## New features
16+
17+
You can collect logs and information about OpenShift API for Data Protection (OADP) custom resources by using the must-gather tool. The must-gather data must be attached to all customer cases.
18+
This tool generates a Markdown output file with the collected information, which is located in the clusters directory of the must-gather logs. (OADP-5904)
19+
20+
## Resolved issues
21+
22+
OADP 1.4.5 fixes the following CVEs::
23+
* CVE-2024-45337
24+
* CVE-2024-45338
25+
* CVE-2025-21613
26+
* CVE-2025-27144
27+
* CVE-2025-22868
28+
* CVE-2025-22869
29+
* CVE-2025-30204
30+
1131
# OADP 1.4.4 release notes
1232

1333
OpenShift API for Data Protection (OADP) 1.4.4 is a Container Grade Only (CGO) release, which is released to refresh the health grades of the containers. No code was changed in the product itself compared to that of OADP 1.4.3.

ocp-product-docs-plaintext/4.15/backup_and_restore/application_backup_and_restore/troubleshooting/oadp-monitoring.txt

Lines changed: 11 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,14 @@ With enabled User Workload Monitoring, it is possible to configure and use any P
1616

1717
Monitoring metrics requires enabling monitoring for the user-defined projects and creating a ServiceMonitor resource to scrape those metrics from the already enabled OADP service endpoint that resides in the openshift-adp namespace.
1818

19+
20+
[NOTE]
21+
----
22+
The OADP support for Prometheus metrics is offered on a best-effort basis and is not fully supported.
23+
----
24+
25+
For more information about setting up the monitoring stack, see Configuring user workload monitoring.
26+
1927
* You have access to an Red Hat OpenShift Container Platform cluster using an account with cluster-admin permissions.
2028
* You have created a cluster monitoring config map.
2129

@@ -29,10 +37,10 @@ $ oc edit configmap cluster-monitoring-config -n openshift-monitoring
2937

3038
```yaml
3139
apiVersion: v1
40+
kind: ConfigMap
3241
data:
3342
config.yaml: |
3443
enableUserWorkload: true 1
35-
kind: ConfigMap
3644
metadata:
3745
# ...
3846
```
@@ -142,7 +150,7 @@ servicemonitor.monitoring.coreos.com/oadp-service-monitor created
142150
```
143151

144152

145-
* Confirm that the new service monitor is in an Up state by using the Administrator perspective of the Red Hat OpenShift Container Platform web console:
153+
* Confirm that the new service monitor is in an Up state by using the Administrator perspective of the Red Hat OpenShift Container Platform web console. Wait a few minutes for the service monitor to reach the Up state.
146154
1. Navigate to the Observe -> Targets page.
147155
2. Ensure the Filter is unselected or that the User source is selected and type openshift-adp in the Text search field.
148156
3. Verify that the status for the Status for the service monitor is Up.
@@ -204,7 +212,7 @@ OADP backup failing alert
204212

205213
# List of available metrics
206214

207-
These are the list of metrics provided by the OADP together with their Types.
215+
Refer to the following table for a list of Velero metrics provided by OADP together with their Types:
208216

209217

210218

ocp-product-docs-plaintext/4.15/backup_and_restore/application_backup_and_restore/troubleshooting/using-the-must-gather-tool.txt

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -44,10 +44,10 @@ Specify a timeout value.
4444
* For OADP 1.4, run the following command:
4545

4646
```terminal
47-
$ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.4 -- /usr/bin/gather_with_timeout <timeout> 1
47+
$ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.4 -- /usr/bin/gather --request-timeout 1m 1
4848
```
4949

50-
Specify a timeout value in seconds.
50+
In this example, the timeout is 1 minute.
5151
* To use the insecure TLS connection flag with the must-gather tool, run one of the following commands:
5252
* For OADP 1.3, run the following command:
5353

@@ -58,10 +58,9 @@ $ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.3
5858
* For OADP 1.4, run the following command:
5959

6060
```terminal
61-
$ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.4 -- /usr/bin/gather_without_tls <value> 1
61+
$ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.4 -- /usr/bin/gather --skip-tls
6262
```
6363

64-
By default, the value is false. Set to true to allow insecure TLS connections.
6564
* To use a combination of the insecure TLS connection, and the timeout flags with the must-gather tool, run one of the following commands:
6665
* For OADP 1.3, run the following command:
6766

@@ -73,10 +72,10 @@ By default, the --skip-tls flag value is false. Set the value to true to allow i
7372
* For OADP 1.4, run the following command:
7473

7574
```terminal
76-
$ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.4 --skip_tls=true /usr/bin/gather_with_timeout <timeout_value_in_seconds> 1
75+
$ oc adm must-gather --image=registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.4 -- /usr/bin/gather --request-timeout 15s --skip-tls 1
7776
```
7877

79-
By default, the --skip-tls flag value is false. Set the value to true to allow insecure TLS connections. Specify a timeout value.
78+
In this example, the timeout is 15 seconds. By default, the --skip-tls flag value is false. Set the value to true to allow insecure TLS connections.
8079

8180
1. Verify that the Markdown output file is generated at the following location: must-gather.local.89&#8230;&#8203;054550/registry.redhat.io/oadp/oadp-mustgather-rhel9:v1.5-sha256-0&#8230;&#8203;84/clusters/a4&#8230;&#8203;86/oadp-must-gather-summary.md
8281
2. Review the must-gather data in the Markdown file by opening the file in a Markdown previewer. For an example output, refer to the following image. You can upload this output file to a support case on the Red Hat Customer Portal.

ocp-product-docs-plaintext/4.15/installing/installing_with_agent_based_installer/installing-with-agent-based-installer.txt

Lines changed: 7 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -337,6 +337,13 @@ $ cd ../mirror
337337

338338
As an optional task, you can use this procedure to encrypt your disk or partition while installing Red Hat OpenShift Container Platform with the Agent-based Installer.
339339

340+
341+
[IMPORTANT]
342+
----
343+
If there are leftover TPM encryption keys from a previous operating system on the bare-metal host, the cluster deployment can get stuck.
344+
To avoid this situation, it is highly recommended to reset the TPM chip in the BIOS before booting the ISO.
345+
----
346+
340347
* You have created and configured the install-config.yaml and agent-config.yaml files, unless you are using ZTP manifests.
341348
* You have placed the openshift-install binary in a directory that is on your PATH.
342349

ocp-product-docs-plaintext/4.15/networking/k8s_nmstate/k8s-nmstate-updating-node-network-config.txt

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1170,6 +1170,5 @@ The next hop address for the node traffic. This must be in the same subnet as th
11701170

11711171
[IMPORTANT]
11721172
----
1173-
You cannot use the OVN-Kubernetes br-ex bridge as the next hop interface when configuring a static route unless you manually configured a customized br-ex bridge.
1174-
For more information, see "Creating a manifest object that includes a customized br-ex bridge" in the Deploying installer-provisioned clusters on bare metal document or the Installing a user-provisioned cluster on bare metal document.
1173+
You cannot use the OVN-Kubernetes br-ex bridge as the next hop interface when configuring a static route.
11751174
----

ocp-product-docs-plaintext/4.15/networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.txt

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@ Red Hat OpenShift Networking offers two options for the network plugin, OpenShif
5353

5454
The OVN-Kubernetes network plugin has the following limitations:
5555

56+
* If you set the ipv6.disable parameter to 1 in the kernelArgument section of the MachineConfig custom resource (CR) for your cluster, OVN-Kubernetes pods enter a CrashLoopBackOff state. Additionally, updating your cluster to a later version of Red Hat OpenShift Container Platform fails because the Network Operator is stuck on a Degraded state. Red Hat does not support disabling IPv6 adddresses for your cluster so do not set the ipv6.disable parameter to 1.
57+
5658
* For clusters configured for dual-stack networking, both IPv4 and IPv6 traffic must use the same network interface as the default gateway.
5759
If this requirement is not met, pods on the host in the ovnkube-node daemon set enter the CrashLoopBackOff state.
5860
If you display a pod with a command such as oc get pod -n openshift-ovn-kubernetes -l app=ovnkube-node -o yaml, the status field contains more than one message about the default gateway, as shown in the following output:

ocp-product-docs-plaintext/4.15/networking/ovn_kubernetes_network_provider/configuring-egress-ips-ovn.txt

Lines changed: 4 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -127,7 +127,7 @@ For more information, see Networking limits.
127127

128128
## Considerations for using an egress IP on additional network interfaces
129129

130-
In Red Hat OpenShift Container Platform, egress IPs provide administrators a way to control network traffic. Egress IPs can be used with the br-ex, or primary, network interface, which is a Linux bridge interface associated with Open vSwitch, or they can be used with additional network interfaces.
130+
In Red Hat OpenShift Container Platform, egress IPs provide administrators a way to control network traffic. Egress IPs can be used with a br-ex Open vSwitch (OVS) bridge interface and any physical interface that has IP connectivity enabled.
131131

132132
You can inspect your network interface type by running the following command:
133133

@@ -155,24 +155,10 @@ OVN-Kubernetes provides a mechanism to control and direct outbound network traff
155155

156156
For users who want an egress IP and traffic to be routed over a particular interface that is not the primary network interface, the following conditions must be met:
157157

158-
* Red Hat OpenShift Container Platform is installed on a bare metal cluster. This feature is disabled within cloud or hypervisor environments.
158+
* Red Hat OpenShift Container Platform is installed on a bare-metal cluster. This feature is disabled within a cloud or a hypervisor environment.
159159
* Your Red Hat OpenShift Container Platform pods are not configured as host-networked.
160-
* If a network interface is removed or if the IP address and subnet mask which allows the egress IP to be hosted on the interface is removed, then the egress IP is reconfigured. Consequently, it could be assigned to another node and interface.
161-
* IP forwarding must be enabled for the network interface. To enable IP forwarding, you can use the oc edit network.operator command and edit the object like the following example:
162-
163-
```yaml
164-
# ...
165-
spec:
166-
clusterNetwork:
167-
- cidr: 10.128.0.0/14
168-
hostPrefix: 23
169-
defaultNetwork:
170-
ovnKubernetesConfig:
171-
gatewayConfig:
172-
ipForwarding: Global
173-
# ...
174-
```
175-
160+
* If a network interface is removed or if the IP address and subnet mask which allows the egress IP to be hosted on the interface is removed, the egress IP is reconfigured. Consequently, the egress IP could be assigned to another node and interface.
161+
* If you use an Egress IP address on a secondary network interface card (NIC), you must use the Node Tuning Operator to enable IP forwarding on the secondary NIC.
176162

177163
## Assignment of egress IPs to pods
178164

0 commit comments

Comments
 (0)