You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: hardware_enablement/kmm-release-notes.adoc
+17-17Lines changed: 17 additions & 17 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,7 +36,7 @@ toc::[]
36
36
* In this release, you now have the option to configure the Kernel Module Management (KMM) module to not load an out-of-tree kernel driver and use the in-tree driver instead, and run only the device plugin. For more information, see xref:../hardware_enablement/kmm-kernel-module-management.adoc#kmm-using-intree-modules_kernel-module-management-operator[Using in-tree modules with the device plugin].
37
37
38
38
// TELCODOCS-2304
39
-
* In this release, KMM configurations are now persistent after cluster and KMM Operator upgrades and redeployments of KMM.
39
+
* In this release, KMM configurations are now persistent after cluster and KMM Operator upgrades and redeployments of KMM.
40
40
+
41
41
In earlier releases, a cluster or KMM upgrade, or any other action, such as upgrading a non-default configuration like the firmware path that redeploys KMM, could create the need to reconfigure KMM. In this release, KMM configurations now remain persistent regardless of any of such actions.
42
42
+
@@ -46,22 +46,22 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
46
46
* Improvements have been added to KMM so that GPU Operator vendors do not need to replicate KMM functionality in their code, but instead use KMM as is. This change greatly improves Operators' code size, tests, and reliability.
47
47
48
48
// MGMT-18966
49
-
* In this release, KMM no longer uses HTTP(S) direct requests to check if a kmod image exists. Instead, CRI-O is used internally to check for the images. This mitigates the need to access container image registries directly from HTTP(S) requests and manually handle tasks such as reading `/etc/containers/registries.conf` for mirroring configuration, accessing the image cluster resource for TLS configuration, mounting the CAs from the node, and maintaining your own cache in Hub & Spoke.
49
+
* In this release, KMM no longer uses HTTP(S) direct requests to check if a kmod image exists. Instead, CRI-O is used internally to check for the images. This mitigates the need to access container image registries directly from HTTP(S) requests and manually handle tasks such as reading `/etc/containers/registries.conf` for mirroring configuration, accessing the image cluster resource for TLS configuration, mounting the CAs from the node, and maintaining your own cache in Hub & Spoke.
50
50
51
51
// MGMT-19383
52
-
* The KMM and KMM-hub Operators have been assigned the "Meets Best Practices" label in the
52
+
* The KMM and KMM-hub Operators have been assigned the "Meets Best Practices" label in the
53
53
https://catalog.redhat.com/search?searchType=software[Red Hat Catalog].
54
54
55
55
// MGMT20613
56
-
* You can now install KMM on compute nodes, if needed. Previously, it was not possible to deploy workloads on the control-plane nodes. Because the compute nodes do not have the `node-role.kubernetes.io/control-plane` or `node-role.kubernetes.io/master` labels, the Kernel Module Management Operator might need further configurations. An internal code change has resolved this issue.
56
+
* You can now install KMM on compute nodes, if needed. Previously, it was not possible to deploy workloads on the control-plane nodes. Because the compute nodes do not have the `node-role.kubernetes.io/control-plane` or `node-role.kubernetes.io/master` labels, the Kernel Module Management Operator might need further configurations. An internal code change has resolved this issue.
57
57
58
58
// MGMT-20249
59
59
* In this release, the heartbeat filter for the NMC reconciler has been updated to filter the following events on nodes:
60
60
61
61
** `node.spec`
62
62
** `metadata.labels`
63
63
** `status.nodeInfo`
64
-
** `status.conditions[]` (`NodeReady` only) and still filtering heartbeats
64
+
** `status.conditions[]` (`NodeReady` only) and still filtering heartbeats
65
65
66
66
=== Notable technical changes
67
67
// TELCODOCS-2343
@@ -82,23 +82,23 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
82
82
83
83
** *Consequence*: Two services were generated for the same deployment. One generated by `controller-gen` and added to the bundle manifests and the other that the OLM created.
84
84
85
-
** *Fix*: Make OLM find an already existing service called `webhook-service` in the cluster because the deployment is called `webhook`.
85
+
** *Fix*: Make OLM find an already existing service called `webhook-service` in the cluster because the deployment is called `webhook`.
86
86
87
87
** *Result*: A second service is no longer created.
88
88
89
-
// MGMT-20892
89
+
// MGMT-20892
90
90
* Using `imageRepoSecret` object in conjunction with DTK as the image stream results in `authorization required` error.
91
91
92
-
** *Cause*: On the Kernel Module Management (KMM) Operator, when you set `imageRepoSecret` object in the KMM module, and the build's resulting container image is defined to be stored in the cluster's internal registry, the build fails to push the final image and generate an `authorization required` error.
92
+
** *Cause*: On the Kernel Module Management (KMM) Operator, when you set `imageRepoSecret` object in the KMM module, and the build's resulting container image is defined to be stored in the cluster's internal registry, the build fails to push the final image and generate an `authorization required` error.
93
93
94
-
** *Consequence*: The KMM Operator does not work as expected.
94
+
** *Consequence*: The KMM Operator does not work as expected.
95
95
96
-
** *Fix*: When the `imageRepoSecret` object is user-defined, it is used as both a pull and push secret by the build process. To support using the cluster's internal registry, you must add the authorization token for that registry to the `imageRepoSecret` object. You can obtain the token from the "build" service account of the KMM module's namespace.
96
+
** *Fix*: When the `imageRepoSecret` object is user-defined, it is used as both a pull and push secret by the build process. To support using the cluster's internal registry, you must add the authorization token for that registry to the `imageRepoSecret` object. You can obtain the token from the "build" service account of the KMM module's namespace.
97
97
98
-
** *Result*: The KMM Operator works as expected.
98
+
** *Result*: The KMM Operator works as expected.
99
99
100
100
// MGMT-16797
101
-
* Creating or deleting the image or creating an MCM module does not load the module on the spoke.
101
+
* Creating or deleting the image or creating an MCM module does not load the module on the spoke.
102
102
103
103
** *Cause*: In a hub and spoke environment, when creating or deleting the image in registry, or when creating a `ManagedClusterModule` (MCM), the module on the spoke cluster is not loaded.
104
104
@@ -120,7 +120,7 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
120
120
** *Result:* You can now use private registries when doing in-cluster builds.
121
121
122
122
// MGMT-19897
123
-
* KMM worker pod is orphaned when deleting a module with a container image that can not be pulled.
123
+
* KMM worker pod is orphaned when deleting a module with a container image that can not be pulled.
124
124
125
125
** *Cause*: A Kernel Module Management (KMM) Operator worker pod is orphaned when deleting a module with a container image that can not be pulled.
126
126
@@ -164,7 +164,7 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
164
164
** *Result:* The NMC controller only gets real events and filters out node heartbeats.
165
165
166
166
// MGMT-20286
167
-
* NMC status contains toleration values, even though there are no tolerations in the `NMC.spec` or in the module.
167
+
* NMC status contains toleration values, even though there are no tolerations in the `NMC.spec` or in the module.
168
168
169
169
** *Cause*: The Node Machine Configuration (NMC) status contains toleration values, even though there are no tolerations in the `NMC.spec` or in the module.
170
170
@@ -175,7 +175,7 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
175
175
** *Result:* The NMC status only contains the module's tolerations.
176
176
177
177
// MGMT-20725
178
-
* The KMM Operator version 2.4 fails to start properly and cannot list the `\modulebuildsignconfigs\` resource.
178
+
* The KMM Operator version 2.4 fails to start properly and cannot list the `\modulebuildsignconfigs\` resource.
179
179
180
180
** *Cause*: On the Kernel Module Management (KMM) Operator, when the Operator is installed using Red Hat Konflux, it does not start properly because the log files contain errors.
181
181
@@ -225,7 +225,7 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
225
225
226
226
** *Consequence*: Resources are not used appropriately or as intended.
227
227
228
-
** *Fix*: The `CreateOrPatch` MIC API receives a slice of `ImageSpecs`, as the input is created by going over the the target nodes and adding their images to the slice, so any duplicate `ImageSpecs`, are now filtered out.
228
+
** *Fix*: The `CreateOrPatch` MIC API receives a slice of `ImageSpecs`, as the input is created by going over the target nodes and adding their images to the slice, so any duplicate `ImageSpecs`, are now filtered out.
229
229
230
230
** *Result:* The KMM Operator works as expected.
231
231
@@ -305,7 +305,7 @@ For more information, see xref:../hardware_enablement/kmm-kernel-module-manageme
305
305
306
306
** *Fix*: Introduce an alerting mechanism for this potential behavior and for awareness when working with modules.
307
307
308
-
** *Result:* Not yet available.
308
+
** *Result:* Not yet available.
309
309
310
310
[id="kmm-2-4-1-RN"]
311
311
== Release notes for Kernel Module Management Operator 2.4.1
Copy file name to clipboardExpand all lines: modules/creating-manifest-file-customized-br-ex-bridge.adoc
+3-4Lines changed: 3 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ As an alternative to using the `configure-ovs.sh` shell script to set a `br-ex`
23
23
24
24
[IMPORTANT]
25
25
====
26
-
After creating the `NodeNetworkConfigurationPolicy` CR, copy content from the NMState configuration file that was created during cluster installation into the NNCP CR. An incomplete NNCP CR file means that the the network policy described in the file cannot get applied to nodes in the cluster.
26
+
After creating the `NodeNetworkConfigurationPolicy` CR, copy content from the NMState configuration file that was created during cluster installation into the NNCP CR. An incomplete NNCP CR file means that the network policy described in the file cannot get applied to nodes in the cluster.
As a post-installation task, you can configure most parameters for a customized `br-ex` bridge that you defined in an existing NNCP CR, except for the primary IP address of the customized `br-ex` bridge.
174
+
As a post-installation task, you can configure most parameters for a customized `br-ex` bridge that you defined in an existing NNCP CR, except for the primary IP address of the customized `br-ex` bridge.
175
175
176
176
If you want to convert your single-stack cluster network to a dual-stack cluster network, you can add or change a secondary IPv6 address in the NNCP CR, but the existing primary IP address cannot be changed.
0 commit comments