Skip to content

Commit f38fd03

Browse files
authored
Merge pull request #64646 from skopacz1/OSDOCS-7103
OSDOCS#7103: adding admin guideline for conditional updates
2 parents 018afad + 4f1e8a9 commit f38fd03

File tree

2 files changed

+41
-7
lines changed

2 files changed

+41
-7
lines changed
Lines changed: 22 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,22 @@
1+
// Module included in the following assemblies:
2+
//
3+
// * updating/preparing_for_updates/updating-cluster-prepare.adoc
4+
5+
:_content-type: PROCEDURE
6+
[id="update-preparing-conditional_{context}"]
7+
= Assessing the risk of conditional updates
8+
9+
A _conditional update_ is an update target that is available but not recommended due to a known risk that applies to your cluster.
10+
The Cluster Version Operator (CVO) periodically queries the OpenShift Update Service (OSUS) for the most recent data about update recommendations, and some potential update targets might have risks associated with them.
11+
12+
The CVO evaluates the conditional risks, and if the risks are not applicable to the cluster, then the target version is available as a recommended update path for the cluster.
13+
If the risk is determined to be applicable, or if for some reason CVO cannot evaluate the risk, then the update target is available to the cluster as a conditional update.
14+
15+
When you encounter a conditional update while you are trying to update to a target version, you must assess the risk of updating your cluster to that version.
16+
Generally, if you do not have a specific need to update to that target version, it is best to wait for a recommended update path from Red Hat.
17+
18+
However, if you have a strong reason to update to that version, for example, if you need to fix an important CVE, then the benefit of fixing the CVE might outweigh the risk of the update being problematic for your cluster.
19+
You can complete the following tasks to determine whether you agree with the Red Hat assessment of the update risk:
20+
21+
* Complete extensive testing in a non-production environment to the extent that you are comfortable completing the update in your production environment.
22+
* Follow the links provided in the conditional update description, investigate the bug, and determine if it is likely to cause issues for your cluster. If you need help understanding the risk, contact Red Hat Support.

updating/preparing_for_updates/updating-cluster-prepare.adoc

Lines changed: 19 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -12,31 +12,43 @@ WARNING: This assembly has been moved into a subdirectory for 4.14+. Changes to
1212
To do: Remove this comment once 4.13 docs are EOL.
1313
////
1414

15+
Learn more about administrative tasks that cluster admins must perform to successfully initialize an update, as well as optional guidelines for ensuring a successful update.
16+
17+
[id="kube-api-removals_{context}"]
18+
== Kubernetes API deprecations and removals
19+
1520
{product-title} 4.14 uses Kubernetes 1.27, which removed several deprecated APIs.
1621

1722
A cluster administrator must provide a manual acknowledgment before the cluster can be updated from {product-title} 4.13 to 4.14. This is to help prevent issues after upgrading to {product-title} 4.14, where APIs that have been removed are still in use by workloads, tools, or other components running on or interacting with the cluster. Administrators must evaluate their cluster for any APIs in use that will be removed and migrate the affected components to use the appropriate new API version. After this evaluation and migration is complete, the administrator can provide the acknowledgment.
1823

1924
Before you can update your {product-title} 4.13 cluster to 4.14, you must provide the administrator acknowledgment.
2025

2126
// Removed Kubernetes APIs
22-
include::modules/update-preparing-list.adoc[leveloffset=+1]
27+
include::modules/update-preparing-list.adoc[leveloffset=+2]
2328

2429
[id="evaluating-cluster-removed-apis"]
25-
== Evaluating your cluster for removed APIs
30+
=== Evaluating your cluster for removed APIs
2631

2732
There are several methods to help administrators identify where APIs that will be removed are in use. However, {product-title} cannot identify all instances, especially workloads that are idle or external tools that are used. It is the responsibility of the administrator to properly evaluate all workloads and other integrations for instances of removed APIs.
2833

2934
// Reviewing alerts to identify uses of removed APIs
30-
include::modules/update-preparing-evaluate-alerts.adoc[leveloffset=+2]
35+
include::modules/update-preparing-evaluate-alerts.adoc[leveloffset=+3]
3136

3237
// Using APIRequestCount to identify uses of removed APIs
33-
include::modules/update-preparing-evaluate-apirequestcount.adoc[leveloffset=+2]
38+
include::modules/update-preparing-evaluate-apirequestcount.adoc[leveloffset=+3]
3439

3540
// Using APIRequestCount to identify which workloads are using the removed APIs
36-
include::modules/update-preparing-evaluate-apirequestcount-workloads.adoc[leveloffset=+2]
41+
include::modules/update-preparing-evaluate-apirequestcount-workloads.adoc[leveloffset=+3]
3742

3843
// Migrating instances of removed APIs
39-
include::modules/update-preparing-migrate.adoc[leveloffset=+1]
44+
include::modules/update-preparing-migrate.adoc[leveloffset=+2]
4045

4146
// Providing the administrator acknowledgment
42-
include::modules/update-preparing-ack.adoc[leveloffset=+1]
47+
include::modules/update-preparing-ack.adoc[leveloffset=+2]
48+
49+
// Assessing the risk of conditional updates
50+
include::modules/update-preparing-conditional.adoc[leveloffset=+1]
51+
52+
[role="_additional-resources"]
53+
.Additional resources
54+
* xref:../../updating/understanding_updates/how-updates-work.adoc#update-evaluate-availability_how-updates-work[Evaluation of update availability]

0 commit comments

Comments
 (0)