|
| 1 | +// Module included in the following assemblies: |
| 2 | +// * rosa-release-notes.adoc |
| 3 | + |
| 4 | +:_mod-docs-content-type: REFERENCE |
| 5 | +[id="rosa-q2-2024_{context}"] |
| 6 | += Q2 2024 |
| 7 | + |
| 8 | +ifdef::openshift-rosa-hcp[] |
| 9 | +* **Approve additional principals for {product-title} clusters.** You can approve additional user-roles to connect to your cluster's private API server endpoint. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/install_clusters/index#rosa-additional-principals-overview_rosa-hcp-aws-private-creating-cluster[Additional principals on your {product-title} cluster]. |
| 10 | +endif::openshift-rosa-hcp[] |
| 11 | + |
| 12 | +* **ROSA CLI update.** The ROSA CLI (`rosa`) was updated to a new version. For information about what has changed in this release, see the link:https://github.com/openshift/rosa/releases/tag/v1.2.41[ROSA CLI release notes]. For more information about the ROSA CLI (`rosa`), |
| 13 | +ifdef::openshift-rosa[] |
| 14 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/cli_tools/#rosa-about_rosa-getting-started-cli[About the ROSA CLI]. |
| 15 | +endif::openshift-rosa[] |
| 16 | +ifdef::openshift-rosa-hcp[] |
| 17 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/cli_tools/index#rosa-about_rosa-getting-started-cli[About the ROSA CLI]. |
| 18 | +endif::openshift-rosa-hcp[] |
| 19 | +
|
| 20 | +* **Approved Access for {product-title} clusters.** Red{nbsp}Hat Site Reliability Engineering (SRE) managing and proactively supporting {product-title} clusters will typically not require elevated access to customer clusters as part of the normal operations. In the unlikely event should Red{nbsp}Hat SRE (Site Reliability Engineer) need elevated access, the _Approved Access_ functionality provides an interface for customers to review and _approve_ or _deny_ access requests. |
| 21 | ++ |
| 22 | +Elevated access requests to {product-title} clusters and the corresponding cloud accounts can be created by Red{nbsp}Hat SRE either in response to a customer-initiated support ticket or in response to alerts received by a Red{nbsp}Hat SRE, as part of the standard incident response process. For more information, |
| 23 | +ifdef::openshift-rosa[] |
| 24 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/support/#approved-access[Approved Access]. |
| 25 | +endif::openshift-rosa[] |
| 26 | +ifdef::openshift-rosa-hcp[] |
| 27 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/support/index#approved-access[Approved Access]. |
| 28 | +endif::openshift-rosa-hcp[] |
| 29 | +
|
| 30 | +* **`rosa` command enhancement.** The `rosa describe` command has a new optional argument, `--get-role-policy-bindings`. This new argument allows users to view the policies attached to STS roles assigned to the selected cluster. For more information, |
| 31 | +ifdef::openshift-rosa[] |
| 32 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/cli_tools/index#rosa-describe-cluster_rosa-managing-objects-cli[describe cluster]. |
| 33 | +endif::openshift-rosa[] |
| 34 | +ifdef::openshift-rosa-hcp[] |
| 35 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/cli_tools/index#rosa-describe-cluster_rosa-managing-objects-cli[describe cluster]. |
| 36 | +endif::openshift-rosa-hcp[] |
| 37 | +
|
| 38 | +* **Expanded customer-managed policy capabilities.** You can now attach customer-managed policies to the IAM roles required to run {product-title} clusters. Furthermore, these customer-managed policies, including the permissions attached to those policies, are not modified during cluster or role upgrades. For more information, |
| 39 | +ifdef::openshift-rosa[] |
| 40 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/introduction_to_rosa/#rosa-aws-customer-managed-policies_rosa-sts-about-iam-resources[Customer-managed policies]. |
| 41 | +endif::openshift-rosa[] |
| 42 | +ifdef::openshift-rosa-hcp[] |
| 43 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/introduction_to_rosa/index#rosa-aws-customer-managed-policies_rosa-sts-about-iam-resources[Customer-managed policies]. |
| 44 | +endif::openshift-rosa-hcp[] |
| 45 | +
|
| 46 | +ifdef::openshift-rosa[] |
| 47 | +* **Permission boundaries for the installer role policy.** You can apply a policy as a _permissions boundary_ on the {product-title} installer role. The combination of policy and boundary policy limits the maximum permissions for the Amazon Web Services(AWS) Identity and Access Management (IAM) entity role. {product-title} includes a set of three prepared permission boundary policy files, with which you can restrict permissions for the installer role since changing the installer policy itself is not supported. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/introduction_to_rosa/index#rosa-sts-aws-requirements-attaching-boundary-policy_rosa-sts-about-iam-resources[Permission boundaries for the installer role]. |
| 48 | + |
| 49 | +* **Cluster delete protection.** You can now enable the cluster delete protection option, which helps to prevent you from accidentally deleting a cluster. For more information on using the cluster delete protection option with the ROSA CLI, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/cli_tools/index#rosa-edit-cluster_rosa-managing-objects-cli[edit cluster]. For more information on using the cluster delete protection option in the UI, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/install_rosa_classic_clusters/index#rosa-sts-creating-a-cluster-using-defaults-ocm_rosa-sts-creating-a-cluster-quickly[Creating a cluster with the default options using OpenShift Cluster Manager]. |
| 50 | +endif::openshift-rosa[] |
| 51 | +ifdef::openshift-rosa-hcp[] |
| 52 | +* **{product-title} regions added.** {product-title} is now available in the following regions: |
| 53 | ++ |
| 54 | +** Zurich (`eu-central-2`) |
| 55 | +** Hong Kong (`ap-east-1`) |
| 56 | +** Osaka (`ap-northeast-3`) |
| 57 | +** Spain (`eu-south-2`) |
| 58 | +** UAE (`me-central-1`) |
| 59 | ++ |
| 60 | +For more information on region availabilities, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/introduction_to_rosa/index#rosa-sdpolicy-regions-az_rosa-hcp-service-definition[Regions and availability zones]. |
| 61 | +
|
| 62 | +* **Added support for external authentication providers.** You can now create clusters configured with external authentication providers, such as Microsoft Entra ID and KeyCloak. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/install_clusters/index#rosa-hcp-sts-creating-a-cluster-ext-auth[Creating {product-title} clusters with external authentication]. |
| 63 | +endif::openshift-rosa-hcp[] |
| 64 | +
|
| 65 | +* **Longer cluster names enhancement.** You can now specify a cluster name that is longer than 15 characters. For cluster names that are longer than 15 characters, you can customize the domain prefix for the cluster URL by using the `domain-prefix` flag in the ROSA CLI (`rosa`) or by selecting the **Create custom domain prefix** checkbox in the {hybrid-console}. For more information, |
| 66 | +ifdef::openshift-rosa[] |
| 67 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/cli_tools/index#rosa-create-cluster-command_rosa-managing-objects-cli[create cluster in Managing objects with the ROSA CLI]. |
| 68 | +endif::openshift-rosa[] |
| 69 | +ifdef::openshift-rosa-hcp[] |
| 70 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/cli_tools/index#rosa-create-cluster-command_rosa-managing-objects-cli[create cluster in Managing objects with the ROSA CLI]. |
| 71 | +endif::openshift-rosa-hcp[] |
| 72 | +
|
| 73 | +ifdef::openshift-rosa-hcp[] |
| 74 | +* **Additional Security Groups for {product-title}.** Starting with ROSA CLI version 1.2.37, you can now use the `--additional-security-group-ids <sec_group_id>` when creating machine pools on {hcp-title} clusters. For more information, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/cluster_administration/index#creating_machine_pools_cli_rosa-managing-worker-nodes[Creating a machine pool using the ROSA CLI] and the link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/cli_tools/index#rosa-create-machinepool_rosa-managing-objects-cli[create machinepool] section of the ROSA CLI reference. |
| 75 | +endif::openshift-rosa-hcp[] |
| 76 | + |
| 77 | +* **Node management improvements.** Now, you can perform specific tasks to make clusters more efficient. You can cordon, uncordon, and drain a specific node. For more information, |
| 78 | +ifdef::openshift-rosa[] |
| 79 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws_classic_architecture/4/html-single/nodes/#working-with-nodes[Working with nodes]. |
| 80 | +endif::openshift-rosa[] |
| 81 | +ifdef::openshift-rosa-hcp[] |
| 82 | +see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/nodes/#working-with-nodes[Working with nodes]. |
| 83 | +endif::openshift-rosa-hcp[] |
| 84 | +
|
| 85 | +ifdef::openshift-rosa-hcp[] |
| 86 | +* **Node drain grace periods.** You can now configure node drain grace periods in {hcp-title} clusters with the `rosa` CLI. |
| 87 | ++ |
| 88 | +For more information about configuring node drain grace periods, see link:https://docs.redhat.com/en/documentation/red_hat_openshift_service_on_aws/4/html-single/cluster_administration/index#rosa-node-drain-grace-period_rosa-managing-worker-nodes[Configuring node drain grace periods in {product-title}]. |
| 89 | +endif::openshift-rosa-hcp[] |
0 commit comments