Skip to content

Commit c9cd10e

Browse files
authored
Merge pull request #100772 from wgabor0427/OSDOCS-15026
OSDOCS-15026 commenting out unused sections
2 parents 6577b4f + e1d3711 commit c9cd10e

File tree

1 file changed

+43
-64
lines changed

1 file changed

+43
-64
lines changed

release_notes/ocp-4-20-release-notes.adoc

Lines changed: 43 additions & 64 deletions
Original file line numberDiff line numberDiff line change
@@ -58,11 +58,11 @@ Before this update, the self-signed loopback certificate for the Kubernetes API
5858

5959
Before this update, deleting an `istag` resource with the `--dry-run=server` option unintentionally caused actual deletion of the image from the server. This unexpected deletion occurred due to the `dry-run` option being implemented incorrectly in the `oc delete istag` command. With this release, the `dry-run` option is wired to the `oc delete istag` command. As a result, the accidental deletion of image objects is prevented and the `istag` object remains intact when using the `--dry-run=server` option.
6060

61-
[id="ocp-release-notes-auth_{context}"]
62-
=== Authentication and authorization
61+
//[id="ocp-release-notes-auth_{context}"]
62+
//=== Authentication and authorization
6363

64-
[id="ocp-release-notes-documentation_{context}"]
65-
=== Documentation
64+
//[id="ocp-release-notes-documentation_{context}"]
65+
//=== Documentation
6666

6767
[id="ocp-release-notes-edge-computing_{context}"]
6868
=== Edge computing
@@ -1008,8 +1008,8 @@ This new feature enhances TLS certificate rotations in {product-title}, ensuring
10081008

10091009
With this update, the etcd product documentation is updated to include additional requirements for reducing {product-title} cluster latency. This update clarifies the prerequisites and setup procedures for using etcd, resulting in an improved user experience. As a result, this feature introduces support for Transport Layer Security (TLS) 1.3 in etcd, which enhances security and performance for data transmission, and enables etcd to comply with the latest security standards, reducing potential vulnerabilities. The improved encryption ensures more secure communication between etcd and its clients. For more information, see xref:../etcd/etcd-practices.adoc#recommended-cluster-latency-etcd_etcd-practices[Cluster latency requirements for etcd].
10101010

1011-
[id="ocp-release-notes-security_{context}"]
1012-
=== Security
1011+
//[id="ocp-release-notes-security_{context}"]
1012+
//=== Security
10131013

10141014
[id="ocp-release-notes-storage_{context}"]
10151015
=== Storage
@@ -1365,14 +1365,14 @@ This prevents users from discovering certain problems only after the cache is po
13651365
|====
13661366

13671367

1368-
[id="ocp-hardware-an-driver-dep-rem_{context}"]
1369-
=== Specialized hardware and driver enablement deprecated and removed features
1368+
//[id="ocp-hardware-an-driver-dep-rem_{context}"]
1369+
//=== Specialized hardware and driver enablement deprecated and removed features
13701370

1371-
.Specialized hardware and driver enablement deprecated and removed tracker
1372-
[cols="4,1,1,1",options="header"]
1373-
|====
1374-
|Feature |4.18 |4.19 |4.20
1375-
|====
1371+
//.Specialized hardware and driver enablement deprecated and removed tracker
1372+
//[cols="4,1,1,1",options="header"]
1373+
//|====
1374+
//|Feature |4.18 |4.19 |4.20
1375+
//|====
13761376

13771377

13781378
=== Storage deprecated and removed features
@@ -1389,14 +1389,14 @@ This prevents users from discovering certain problems only after the cache is po
13891389
|====
13901390

13911391

1392-
[id="ocp-clusters-dep-rem_{context}"]
1393-
=== Updating clusters deprecated and removed features
1392+
//[id="ocp-clusters-dep-rem_{context}"]
1393+
//=== Updating clusters deprecated and removed features
13941394

1395-
.Updating clusters deprecated and removed tracker
1396-
[cols="4,1,1,1",options="header"]
1397-
|====
1398-
|Feature |4.18 |4.19 |4.20
1399-
|====
1395+
//.Updating clusters deprecated and removed tracker
1396+
//[cols="4,1,1,1",options="header"]
1397+
//|====
1398+
//|Feature |4.18 |4.19 |4.20
1399+
//|====
14001400

14011401

14021402
[id="ocp-release-note-web-console-dep-rem_{context}"]
@@ -1517,8 +1517,8 @@ With this release, kubelet no longer reports resources for terminated pods, whic
15171517
//Telco Edge / ZTP
15181518

15191519

1520-
[id="ocp-release-note-api-auth-bug-fixes_{context}"]
1521-
=== API Server and Authentication
1520+
//[id="ocp-release-note-api-auth-bug-fixes_{context}"]
1521+
//=== API Server and Authentication
15221522

15231523

15241524
[id="ocp-release-note-bare-metal-hardware-bug-fixes_{context}"]
@@ -1659,12 +1659,8 @@ As a result, the controller handles errors during migration better.
16591659

16601660
* Before this update, when you created a cluster autoscaler object with the Cluster Autoscaler Operator enabled in the cluster, two `cluster-autoscaler-default` pods in the `openshift-machine-api` were sometimes created at the same time and one of the pods was immediately killed. With this release, only one pod is created. (link:https://issues.redhat.com/browse/OCPBUGS-57041[OCPBUGS-57041])
16611661

1662-
[id="ocp-release-note-cluster-override-admin-operator-bug-fixes_{context}"]
1663-
=== Cluster Resource Override Admission Operator
1664-
1665-
1666-
1667-
1662+
//[id="ocp-release-note-cluster-override-admin-operator-bug-fixes_{context}"]
1663+
//=== Cluster Resource Override Admission Operator
16681664

16691665
[id="ocp-release-note-cluster-version-operator-bug-fixes_{context}"]
16701666
=== Cluster Version Operator
@@ -1702,13 +1698,8 @@ As a result, the controller handles errors during migration better.
17021698

17031699
* Before this update, the catalogd and Operator Controller components did not display the correct version and commit information in the {oc-first}. With this update, the correct commit and version information is displayed. (link:https://issues.redhat.com/browse/OCPBUGS-23055[OCPBUGS-23055])
17041700

1705-
[id="ocp-release-note-image-streams-bug-fixes_{context}"]
1706-
=== ImageStreams
1707-
1708-
1709-
1710-
1711-
1701+
//[id="ocp-release-note-image-streams-bug-fixes_{context}"]
1702+
//=== ImageStreams
17121703

17131704
[id="ocp-release-note-installer-bug-fixes_{context}"]
17141705
=== Installer
@@ -1717,7 +1708,7 @@ As a result, the controller handles errors during migration better.
17171708

17181709
* Before this update, when you installed a cluster on {azure-short} Stack Hub with a user-provisioned infrastructure, the API and API-int load balancers could fail to be created. As a consequence, the installation failed. With this release, the user-provisioned infrastructure templates is updated so that the load balancers are created. As a result, installation is successful. (link:https://issues.redhat.com/browse/OCPBUGS-60545[OCPBUGS-60545])
17191710

1720-
* Before this update, when you installed a cluster on {gcp-short}, the installation program read and processed the `install-config.yaml` file even when an unrecoverable error was reported about not finding a matching public DNS zone. This error was due to an invalid `baseDomain` parameter. As a consequence, cluster administrators recreated the `install-config.yaml` file unnecessarily. With this release, when the installation program reports this error the installation progam does not read and process the `install-config.yaml` file. (link:https://issues.redhat.com/browse/OCPBUGS-59430[OCPBUGS-59430])
1711+
* Before this update, when you installed a cluster on {gcp-short}, the installation program read and processed the `install-config.yaml` file even when an unrecoverable error was reported about not finding a matching public DNS zone. This error was due to an invalid `baseDomain` parameter. As a consequence, cluster administrators recreated the `install-config.yaml` file unnecessarily. With this release, when the installation program reports this error the installation progam does not read and process the `install-config.yaml` file. (link:https://issues.redhat.com/browse/OCPBUGS-59430[OCPBUGS-59430])
17211712

17221713
* Before this update, {ibm-cloud-title} was omitted from the list of platforms that supported {sno} installation in the validation code. As a consequence, users could not install a single-node configuration on {ibm-cloud-title} because of a validation error. With this release, {ibm-cloud-title} support for single-node installations is enabled. As a result, users can complete single-node installations on {ibm-cloud-title}. (link:https://issues.redhat.com/browse/OCPBUGS-59220[OCPBUGS-59220])
17231714

@@ -2009,27 +2000,18 @@ With this release, the warning message no longer appears in the `metrics-server`
20092000

20102001
* Before this update, the catalog Operator scheduled catalog snapshots for every 5 minutes. On clusters with many namespaces and subscriptions, snapshots failed and cascaded across catalog sources. As a result, the spikes in CPU loads effectively blocked installing and updating Operators. With this update, catalog snapshots are scheduled for every 30 minutes to allow enough time for the snapshotes to resolve. (link:https://issues.redhat.com/browse/OCPBUGS-43966[OCPBUGS-43966])
20112002

2012-
[id="ocp-release-note-pao-bug-fixes_{context}"]
2013-
=== Performance Addon Operator
2003+
//[id="ocp-release-note-pao-bug-fixes_{context}"]
2004+
//=== Performance Addon Operator
20142005

2015-
2016-
2017-
2018-
2019-
2020-
[id="ocp-release-note-samples-operator-bug-fixes_{context}"]
2021-
=== Samples Operator
2006+
//[id="ocp-release-note-samples-operator-bug-fixes_{context}"]
2007+
//=== Samples Operator
20222008

20232009

20242010
[id="ocp-release-note-service-catalog-bug-fixes_{context}"]
20252011
=== Service Catalog
20262012

20272013
* Before this update, setting an invalid certificate secret name in the service annotation `service.beta.openshift.io/serving-cert-secret-name` would cause the service Certificate Authority (CA) Operator to hot loop. With this release, the Operator stops retrying to create the secret after 10 tries. The number of retries cannot be changed. (link:https://issues.redhat.com/browse/OCPBUGS-61966[OCPBUGS-61966])
20282014

2029-
2030-
2031-
2032-
20332015
[id="ocp-release-note-storage-bug-fixes_{context}"]
20342016
=== Storage
20352017

@@ -2038,11 +2020,8 @@ With this release, the warning message no longer appears in the `metrics-server`
20382020
* Before this update, a race condition would sometimes cause an intermittent failure, or _flake_, when a Persistent Volume Claim (PVC) was resized too quickly after being created. This resulted in an error where the system would incorrectly report that the bound Persistent Volume (PV) could not be found. With this release, the timing issue was fixed, so resizing a PVC right after its creation works. (link:https://issues.redhat.com/browse/OCPBUGS-61546[OCPBUGS-61546])
20392021

20402022

2041-
[id="ocp-release-note-rhcos-bug-fixes_{context}"]
2042-
=== {op-system-first}
2043-
2044-
2045-
2023+
//[id="ocp-release-note-rhcos-bug-fixes_{context}"]
2024+
//=== {op-system-first}
20462025

20472026
[id="ocp-release-technology-preview-tables_{context}"]
20482027
== Technology Preview features status
@@ -2655,14 +2634,14 @@ In the following tables, features are marked with the following statuses:
26552634
|====
26562635

26572636

2658-
[id="ocp-release-notes-special-hardware-tech-preview_{context}"]
2659-
=== Specialized hardware and driver enablement Technology Preview features
2637+
//[id="ocp-release-notes-special-hardware-tech-preview_{context}"]
2638+
//=== Specialized hardware and driver enablement Technology Preview features
26602639

2661-
.Specialized hardware and driver enablement Technology Preview tracker
2662-
[cols="4,1,1,1",options="header"]
2663-
|====
2664-
|Feature |4.18 |4.19 |4.20
2665-
|====
2640+
//.Specialized hardware and driver enablement Technology Preview tracker
2641+
//[cols="4,1,1,1",options="header"]
2642+
//|====
2643+
//|Feature |4.18 |4.19 |4.20
2644+
//|====
26662645

26672646

26682647
[id="ocp-release-notes-storage-tech-preview_{context}"]
@@ -2865,11 +2844,11 @@ For any {product-title} release, always review the instructions on xref:../updat
28652844

28662845
//Update with relevant advisory information
28672846
[id="ocp-4-20-0-ga_{context}"]
2868-
=== RHSA-202X:XXXXX - {product-title} {product-version}.0 image release, bug fix, and security update advisory
2847+
=== RHSA-2025:9562 - {product-title} {product-version}.0 image release, bug fix, and security update advisory
28692848

2870-
Issued: DD MMM YYYY
2849+
Issued: 21 Oct 2025
28712850

2872-
{product-title} release {product-version}.0, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the link:https://access.redhat.com/errata/RHSA-202X:XXXXX[RHSA-202X:XXXXX] advisory. The RPM packages that are included in the update are provided by the link:https://access.redhat.com/errata/RHEA-202X:XXXX[RHEA-202X:XXXX] advisory.
2851+
{product-title} release {product-version}.0, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the link:https://access.redhat.com/errata/RHSA-2025:9562[RHSA-2025:9562] advisory. The RPM packages that are included in the update are provided by the link:https://access.redhat.com/errata/RHEA-2025:4782[RHEA-2025:4782] advisory.
28732852

28742853
Space precluded documenting all of the container images for this release in the advisory.
28752854

0 commit comments

Comments
 (0)