You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: release_notes/ocp-4-16-release-notes.adoc
+33Lines changed: 33 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3366,6 +3366,39 @@ This section will continue to be updated over time to provide notes on enhanceme
3366
3366
For any {product-title} release, always review the instructions on xref:../updating/updating_a_cluster/updating-cluster-web-console.adoc#updating-cluster-web-console[updating your cluster] properly.
3367
3367
====
3368
3368
3369
+
//4.16.44
3370
+
[id="ocp-4-16-44_{context}"]
3371
+
=== RHSA-2025:10781 - {product-title} {product-version}.44 bug fix and security update
3372
+
3373
+
Issued: 16 July 2025
3374
+
3375
+
{product-title} release {product-version}.44 is now available. The list of bug fixes that are included in the update is documented in the link:https://access.redhat.com/errata/RHSA-2025:10781[RHSA-2025:10781] advisory.
3376
+
3377
+
You can view the container images in this release by running the following command:
3378
+
3379
+
[source,terminal]
3380
+
----
3381
+
$ oc adm release info 4.16.44 --pullspecs
3382
+
----
3383
+
3384
+
[id="ocp-4-16-44-bug-fixes_{context}"]
3385
+
==== Bug fixes
3386
+
3387
+
* Before this update, Kubernetes API server loopback certificates expired prematurely. As the certificates were self-signed, their short lifespan caused them to terminate, resulting in communication problems in the API server. With this update, the validity period of the self-signed loopback certificate is extended, which prevents future certificate expiration and makes the API server more stable in Kubernetes version 4.16.z. (link:https://issues.redhat.com/browse/OCPBUGS-58054[OCPBUGS-58054])
3388
+
3389
+
* Before this update, when you tried to install an {product-title} cluster on {aws-first} with primary nodes distributed across multiple subnets, the installation failed. This error occurred because the Network Load Balancer (NLB) had an incorrect security group configuration. With this update, the security group for the NLB is updated. During an {aws-short} cluster installation, security group traffic for all primary nodes is permitted, regardless of the subnet they are in, during an AWS cluster installation. As a result, your cluster installations successfully support multiple primary subnets. (link:https://issues.redhat.com/browse/OCPBUGS-57498[OCPBUGS-57498])
3390
+
3391
+
* Before this update, if you tried to import an Open Virtual Appliance (OVA) into a cluster when an ESXi host within that cluster was powered off, the import failed. With this release, you can successfully import OVAs into your cluster when an ESXi host is powered off. (link:https://issues.redhat.com/browse/OCPBUGS-57460[OCPBUGS-57460])
3392
+
3393
+
* Before this update, the Open Virtual Network (OVN) networking component created duplicate static routes on two cluster nodes. These duplicate routes caused network traffic to drop intermittently, and led to unreliable network communication. With this update, duplicate static routes in the OVN databases for cluster nodes are allowed, and the packet drops are eliminated. (link:https://issues.redhat.com/browse/OCPBUGS-57396[OCPBUGS-57396])
3394
+
3395
+
* Before this update, no direct API controlled the way that the high availability proxy (HAProxy) handled idle connections during graceful shutdowns, which limited the flexibility of managing connection termination behavior. With this release, the management of the HAProxy connection during graceful shutdowns is fixed, and administrators can choose between preserving ongoing responses or closing idle connections. (link:https://issues.redhat.com/browse/OCPBUGS-56424[OCPBUGS-56424])
3396
+
3397
+
[id="ocp-4-16-44-updating_{context}"]
3398
+
==== Updating
3399
+
3400
+
To update an existing {product-title} {product-version} cluster to this latest release, see xref:../updating/updating_a_cluster/updating-cluster-cli.adoc#updating-cluster-cli[Updating a cluster using the CLI].
3401
+
3369
3402
//4.16.43
3370
3403
[id="ocp-4-16-43_{context}"]
3371
3404
=== RHSA-2025:9765 - {product-title} {product-version}.43 bug fix and security update
0 commit comments