You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: migration/migrating_3_4/migrating-application-workloads-3-to-4.adoc
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -12,13 +12,10 @@ The CAM tool's web console and API, based on Kubernetes Custom Resources, enable
12
12
13
13
Optionally, you can use the xref:../../migration/migrating_3_4/migrating-with-cpma.adoc#migration-understanding-cpma_{context}[Control Plane Migration Assistant (CPMA)] to assist you in migrating control plane settings.
14
14
15
-
////
16
-
// TODO: Add back in once 4.4 planning content has been added
17
15
[IMPORTANT]
18
16
====
19
17
Before you begin your migration, be sure to review the information on xref:../../migration/migrating_3_4/planning-migration-3-to-4.adoc#planning-migration-3-to-4[planning your migration].
Before performing your migration to {product-title} 4.3, it is important to take the time to properly plan for the transition. {product-title} 4 introduces architectural changes and enhancements, so the procedures that you used to manage your {product-title} 3 cluster might not apply for {product-title} 4.
8
+
Before performing your migration to {product-title} 4.4, it is important to take the time to properly plan for the transition. {product-title} 4 introduces architectural changes and enhancements, so the procedures that you used to manage your {product-title} 3 cluster might not apply for {product-title} 4.
9
9
10
10
[NOTE]
11
11
====
12
-
This planning document assumes that you are transitioning from {product-title} 3.11 to {product-title} 4.3.
12
+
This planning document assumes that you are transitioning from {product-title} 3.11 to {product-title} 4.4.
13
13
====
14
14
15
15
This document provides high-level information on the most important xref:../../migration/migrating_3_4/planning-migration-3-to-4.adoc#migration-comparing-ocp-3-4[differences between {product-title} 3 and {product-title} 4] and the most noteworthy xref:../../migration/migrating_3_4/planning-migration-3-to-4.adoc#migration-considerations[migration considerations]. For detailed information on configuring your {product-title} 4 cluster, review the appropriate sections of the {product-title} documentation. For detailed information on new features and other notable technical changes, review the xref:../../release_notes/ocp-4-4-release-notes.adoc#ocp-4-4-release-notes[OpenShift Container Platform 4.4 release notes].
@@ -52,11 +52,11 @@ For more information, see xref:../../operators/olm-what-operators-are.adoc#olm-w
52
52
53
53
To install {product-title} 3.11, you prepared your Red Hat Enterprise Linux (RHEL) hosts, set all of the configuration values your cluster needed, and then ran an Ansible playbook to install and set up your cluster.
54
54
55
-
In {product-title} 4.3, you use the OpenShift installation program to create a minimum set of resources required for a cluster. Once the cluster is running, you use Operators to further configure your cluster and to install new services. After first boot, {op-system-first} systems are managed by the Machine Config Operator (MCO) that runs in the {product-title} cluster.
55
+
In {product-title} 4.4, you use the OpenShift installation program to create a minimum set of resources required for a cluster. Once the cluster is running, you use Operators to further configure your cluster and to install new services. After first boot, {op-system-first} systems are managed by the Machine Config Operator (MCO) that runs in the {product-title} cluster.
56
56
57
57
For more information, see xref:../../architecture/architecture-installation.adoc#installation-process_architecture-installation[Installation process].
58
58
59
-
If you want to add RHEL worker machines to your {product-title} 4.3 cluster, you use an Ansible playbook to join the RHEL worker machines after the cluster is running. For more information, see xref:../../machine_management/adding-rhel-compute.adoc#adding-rhel-compute[Adding RHEL compute machines to an {product-title} cluster].
59
+
If you want to add RHEL worker machines to your {product-title} 4.4 cluster, you use an Ansible playbook to join the RHEL worker machines after the cluster is running. For more information, see xref:../../machine_management/adding-rhel-compute.adoc#adding-rhel-compute[Adding RHEL compute machines to an {product-title} cluster].
60
60
61
61
[discrete]
62
62
==== Infrastructure options
@@ -68,7 +68,7 @@ For more information, see xref:../../architecture/architecture-installation.adoc
68
68
[discrete]
69
69
==== Upgrading your cluster
70
70
71
-
In {product-title} 3.11, you upgraded your cluster by running Ansible playbooks. In {product-title} 4.3, the cluster manages its own updates, including updates to {op-system-first} on cluster nodes. You can easily upgrade your cluster by using the web console or by using the `oc adm upgrade` command from the OpenShift CLI and the Operators will automatically upgrade themselves. If your {product-title} 4.3 cluster has Red Hat Enterprise Linux worker machines, then you will still need to run an Ansible playbook to upgrade those worker machines.
71
+
In {product-title} 3.11, you upgraded your cluster by running Ansible playbooks. In {product-title} 4.4, the cluster manages its own updates, including updates to {op-system-first} on cluster nodes. You can easily upgrade your cluster by using the web console or by using the `oc adm upgrade` command from the OpenShift CLI and the Operators will automatically upgrade themselves. If your {product-title} 4.4 cluster has Red Hat Enterprise Linux worker machines, then you will still need to run an Ansible playbook to upgrade those worker machines.
72
72
73
73
For more information, see xref:../../updating/updating-cluster-between-minor.adoc#updating-cluster-between-minor[Updating clusters].
74
74
@@ -80,39 +80,39 @@ Review the changes and other considerations that might affect your transition fr
80
80
[id="migration-preparing-storage"]
81
81
=== Storage considerations
82
82
83
-
Review the following storage changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.3.
83
+
Review the following storage changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.4.
84
84
85
85
[discrete]
86
86
==== Local volume persistent storage
87
87
88
-
Local storage is only supported by using the Local Storage Operator in {product-title} 4.3. It is not supported to use the local provisioner method from {product-title} 3.11.
88
+
Local storage is only supported by using the Local Storage Operator in {product-title} 4.4. It is not supported to use the local provisioner method from {product-title} 3.11.
89
89
90
90
For more information, see xref:../../storage/persistent_storage/persistent-storage-local.adoc#persistent-storage-using-local-volume[Persistent storage using local volumes].
91
91
92
92
[discrete]
93
93
==== FlexVolume persistent storage
94
94
95
-
The FlexVolume plug-in location changed from {product-title} 3.11. The new location in {product-title} 4.3 is `/etc/kubernetes/kubelet-plugins/volume/exec`. Attachable FlexVolume plug-ins are no longer supported.
95
+
The FlexVolume plug-in location changed from {product-title} 3.11. The new location in {product-title} 4.4 is `/etc/kubernetes/kubelet-plugins/volume/exec`. Attachable FlexVolume plug-ins are no longer supported.
96
96
97
97
For more information, see xref:../../storage/persistent_storage/persistent-storage-flexvolume.adoc#persistent-storage-using-flexvolume[Persistent storage using FlexVolume].
Persistent storage using the Container Storage Interface (CSI) was link:https://access.redhat.com/support/offerings/techpreview[Technology Preview] in {product-title} 3.11. CSI version 1.1.0 is fully supported in {product-title} 4.3, but does not ship with any CSI drivers. You must install your own driver.
102
+
Persistent storage using the Container Storage Interface (CSI) was link:https://access.redhat.com/support/offerings/techpreview[Technology Preview] in {product-title} 3.11. CSI version 1.1.0 is fully supported in {product-title} 4.4, but does not ship with any CSI drivers. You must install your own driver.
103
103
104
104
For more information, see xref:../../storage/persistent_storage/persistent-storage-csi.adoc#persistent-storage-using-csi[Persistent storage using the Container Storage Interface (CSI)].
105
105
106
106
[discrete]
107
107
==== Unsupported persistent storage options
108
108
109
-
Support for the following persistent storage options from {product-title} 3.11 has changed in {product-title} 4.3:
109
+
Support for the following persistent storage options from {product-title} 3.11 has changed in {product-title} 4.4:
110
110
111
111
* GlusterFS is no longer supported.
112
112
* CephFS is no longer supported.
113
113
* Ceph RBD is no longer supported.
114
114
115
-
If you used of one these in {product-title} 3.11, you must choose a different persistent storage option for full support in {product-title} 4.3.
115
+
If you used of one these in {product-title} 3.11, you must choose a different persistent storage option for full support in {product-title} 4.4.
116
116
117
117
For more information, see xref:../../storage/understanding-persistent-storage.adoc#understanding-persistent-storage[Understanding persistent storage].
118
118
@@ -121,28 +121,28 @@ For more information, see xref:../../storage/understanding-persistent-storage.ad
121
121
[id="migration-preparing-networking"]
122
122
=== Networking considerations
123
123
124
-
Review the following networking changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.3.
124
+
Review the following networking changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.4.
125
125
126
126
[discrete]
127
127
==== Network isolation mode
128
128
129
-
The default network isolation mode for {product-title} 3.11 was `ovs-subnet`, though users frequently switched to use `ovn-multitenant`. The default network isolation mode for {product-title} 4.3 is now NetworkPolicy.
129
+
The default network isolation mode for {product-title} 3.11 was `ovs-subnet`, though users frequently switched to use `ovn-multitenant`. The default network isolation mode for {product-title} 4.4 is now NetworkPolicy.
130
130
131
-
If your {product-title} 3.11 cluster used the `ovs-subnet` or `ovs-multitenant` mode, it is recommended to switch to the NetworkPolicy mode for your {product-title} 4.3 cluster. NetworkPolicy is supported upstream, is more flexible, and also provides the functionality that `ovs-multitenant` does. If you want to maintain the `ovs-multitenant` behavior while using NetworkPolicy in {product-title} 4.3, follow the steps to xref:../../networking/configuring-networkpolicy.adoc#nw-networkpolicy-multitenant-isolation_configuring-networkpolicy-plugin[configure multitenant isolation using NetworkPolicy].
131
+
If your {product-title} 3.11 cluster used the `ovs-subnet` or `ovs-multitenant` mode, it is recommended to switch to the NetworkPolicy mode for your {product-title} 4.4 cluster. NetworkPolicy is supported upstream, is more flexible, and also provides the functionality that `ovs-multitenant` does. If you want to maintain the `ovs-multitenant` behavior while using NetworkPolicy in {product-title} 4.4, follow the steps to xref:../../networking/configuring-networkpolicy.adoc#nw-networkpolicy-multitenant-isolation_configuring-networkpolicy-plugin[configure multitenant isolation using NetworkPolicy].
132
132
133
133
For more information, see xref:../../networking/configuring-networkpolicy.adoc#nw-networkpolicy-about_configuring-networkpolicy-plugin[About network policy].
134
134
135
135
[discrete]
136
136
==== Encrypting traffic between hosts
137
137
138
-
In {product-title} 3.11, you could use IPsec to encrypt traffic between hosts. {product-title} 4.3 does not support IPsec. It is recommended to use Red Hat OpenShift Service Mesh to enable mutual TLS between services.
138
+
In {product-title} 3.11, you could use IPsec to encrypt traffic between hosts. {product-title} 4.4 does not support IPsec. It is recommended to use Red Hat OpenShift Service Mesh to enable mutual TLS between services.
139
139
140
140
For more information, see xref:../../service_mesh/service_mesh_arch/understanding-ossm.adoc#understanding-ossm[Understanding Red Hat OpenShift Service Mesh].
141
141
142
142
[id="migration-preparing-logging"]
143
143
=== Logging considerations
144
144
145
-
Review the following logging changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.3.
145
+
Review the following logging changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.4.
146
146
147
147
[discrete]
148
148
==== Deploying cluster logging
@@ -161,12 +161,12 @@ For more information, see xref:../../logging/cluster-logging.adoc#cluster-loggin
161
161
[id="migration-preparing-security"]
162
162
=== Security considerations
163
163
164
-
Review the following security changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.3.
164
+
Review the following security changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.4.
165
165
166
166
[discrete]
167
167
==== Unauthenticated access to discovery endpoints
168
168
169
-
In {product-title} 3.11, an unauthenticated user could access the discovery endpoints (for example, [x-]`/api/*` and [x-]`/apis/*`). For security reasons, unauthenticated access to the discovery endpoints is no longer allowed in {product-title} 4.3. If you do need to allow unauthenticated access, you can configure the RBAC settings as necessary; however, be sure to consider the security implications as this can expose internal cluster components to the external network.
169
+
In {product-title} 3.11, an unauthenticated user could access the discovery endpoints (for example, [x-]`/api/*` and [x-]`/apis/*`). For security reasons, unauthenticated access to the discovery endpoints is no longer allowed in {product-title} 4.4. If you do need to allow unauthenticated access, you can configure the RBAC settings as necessary; however, be sure to consider the security implications as this can expose internal cluster components to the external network.
170
170
171
171
// TODO: Anything to xref to, or additional details?
172
172
@@ -175,15 +175,15 @@ In {product-title} 3.11, an unauthenticated user could access the discovery endp
175
175
176
176
Configuration for identity providers has changed for {product-title} 4, including the following notable changes:
177
177
178
-
* The request header identity provider in {product-title} 4.3 requires mutual TLS, where in {product-title} 3.11 it did not.
179
-
* The configuration of the OpenID Connect identity provider was simplified in {product-title} 4.3. It now obtains data, which previously had to specified in {product-title} 3.11, from the provider's `/.well-known/openid-configuration` endpoint.
178
+
* The request header identity provider in {product-title} 4.4 requires mutual TLS, where in {product-title} 3.11 it did not.
179
+
* The configuration of the OpenID Connect identity provider was simplified in {product-title} 4.4. It now obtains data, which previously had to specified in {product-title} 3.11, from the provider's `/.well-known/openid-configuration` endpoint.
180
180
181
181
For more information, see xref:../../authentication/understanding-identity-provider.adoc#understanding-identity-provider[Understanding identity provider configuration].
182
182
183
183
[id="migration-preparing-monitoring"]
184
184
=== Monitoring considerations
185
185
186
-
Review the following monitoring changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.3.
186
+
Review the following monitoring changes to consider when transitioning from {product-title} 3.11 to {product-title} 4.4.
187
187
188
188
[discrete]
189
189
==== Alert for monitoring infrastructure availability
0 commit comments