|
| 1 | +// Module included in the following assemblies: |
| 2 | +// |
| 3 | +// * hosted_control_planes/hcp-updating.adoc |
| 4 | + |
| 5 | +:_mod-docs-content-type: CONCEPT |
| 6 | +[id="hcp-get-ocp-channel_{context}"] |
| 7 | += Setting channels in a hosted cluster |
| 8 | + |
| 9 | +You can see available updates in the `HostedCluster.Status` field of the `HostedCluster` custom resource (CR). |
| 10 | + |
| 11 | +The available updates are not fetched from the Cluster Version Operator (CVO) of a hosted cluster. The list of the available updates can be different from the available updates from the following fields of the `HostedCluster` custom resource (CR): |
| 12 | + |
| 13 | +* `status.version.availableUpdates` |
| 14 | +* `status.version.conditionalUpdates` |
| 15 | +
|
| 16 | +The initial `HostedCluster` CR does not have any information in the `status.version.availableUpdates` and `status.version.conditionalUpdates` fields. After you set the `spec.channel` field to the stable {product-title} release version, the HyperShift Operator reconciles the `HostedCluster` CR and updates the `status.version` field with the available and conditional updates. |
| 17 | + |
| 18 | +See the following example of the `HostedCluster` CR that contains the channel configuration: |
| 19 | + |
| 20 | +[source,yaml] |
| 21 | +---- |
| 22 | +spec: |
| 23 | + autoscaling: {} |
| 24 | + channel: stable-4.y <1> |
| 25 | + clusterID: d6d42268-7dff-4d37-92cf-691bd2d42f41 |
| 26 | + configuration: {} |
| 27 | + controllerAvailabilityPolicy: SingleReplica |
| 28 | + dns: |
| 29 | + baseDomain: dev11.red-chesterfield.com |
| 30 | + privateZoneID: Z0180092I0DQRKL55LN0 |
| 31 | + publicZoneID: Z00206462VG6ZP0H2QLWK |
| 32 | +---- |
| 33 | +<1> Replace `<4.y>` with the {product-title} release version you specified in `spec.release`. For example, if you set the `spec.release` to `ocp-release:4.16.4-multi`, you must set `spec.channel` to `stable-4.16`. |
| 34 | + |
| 35 | +After you configure the channel in the `HostedCluster` CR, to view the output of the `status.version.availableUpdates` and `status.version.conditionalUpdates` fields, run the following command: |
| 36 | + |
| 37 | +[source,terminal] |
| 38 | +---- |
| 39 | +$ oc get -n <hosted_cluster_namespace> hostedcluster <hosted_cluster_name> -o yaml |
| 40 | +---- |
| 41 | + |
| 42 | +.Example output |
| 43 | +[source,yaml] |
| 44 | +---- |
| 45 | +version: |
| 46 | + availableUpdates: |
| 47 | + - channels: |
| 48 | + - candidate-4.16 |
| 49 | + - candidate-4.17 |
| 50 | + - eus-4.16 |
| 51 | + - fast-4.16 |
| 52 | + - stable-4.16 |
| 53 | + image: quay.io/openshift-release-dev/ocp-release@sha256:b7517d13514c6308ae16c5fd8108133754eb922cd37403ed27c846c129e67a9a |
| 54 | + url: https://access.redhat.com/errata/RHBA-2024:6401 |
| 55 | + version: 4.16.11 |
| 56 | + - channels: |
| 57 | + - candidate-4.16 |
| 58 | + - candidate-4.17 |
| 59 | + - eus-4.16 |
| 60 | + - fast-4.16 |
| 61 | + - stable-4.16 |
| 62 | + image: quay.io/openshift-release-dev/ocp-release@sha256:d08e7c8374142c239a07d7b27d1170eae2b0d9f00ccf074c3f13228a1761c162 |
| 63 | + url: https://access.redhat.com/errata/RHSA-2024:6004 |
| 64 | + version: 4.16.10 |
| 65 | + - channels: |
| 66 | + - candidate-4.16 |
| 67 | + - candidate-4.17 |
| 68 | + - eus-4.16 |
| 69 | + - fast-4.16 |
| 70 | + - stable-4.16 |
| 71 | + image: quay.io/openshift-release-dev/ocp-release@sha256:6a80ac72a60635a313ae511f0959cc267a21a89c7654f1c15ee16657aafa41a0 |
| 72 | + url: https://access.redhat.com/errata/RHBA-2024:5757 |
| 73 | + version: 4.16.9 |
| 74 | + - channels: |
| 75 | + - candidate-4.16 |
| 76 | + - candidate-4.17 |
| 77 | + - eus-4.16 |
| 78 | + - fast-4.16 |
| 79 | + - stable-4.16 |
| 80 | + image: quay.io/openshift-release-dev/ocp-release@sha256:ea624ae7d91d3f15094e9e15037244679678bdc89e5a29834b2ddb7e1d9b57e6 |
| 81 | + url: https://access.redhat.com/errata/RHSA-2024:5422 |
| 82 | + version: 4.16.8 |
| 83 | + - channels: |
| 84 | + - candidate-4.16 |
| 85 | + - candidate-4.17 |
| 86 | + - eus-4.16 |
| 87 | + - fast-4.16 |
| 88 | + - stable-4.16 |
| 89 | + image: quay.io/openshift-release-dev/ocp-release@sha256:e4102eb226130117a0775a83769fe8edb029f0a17b6cbca98a682e3f1225d6b7 |
| 90 | + url: https://access.redhat.com/errata/RHSA-2024:4965 |
| 91 | + version: 4.16.6 |
| 92 | + - channels: |
| 93 | + - candidate-4.16 |
| 94 | + - candidate-4.17 |
| 95 | + - eus-4.16 |
| 96 | + - fast-4.16 |
| 97 | + - stable-4.16 |
| 98 | + image: quay.io/openshift-release-dev/ocp-release@sha256:f828eda3eaac179e9463ec7b1ed6baeba2cd5bd3f1dd56655796c86260db819b |
| 99 | + url: https://access.redhat.com/errata/RHBA-2024:4855 |
| 100 | + version: 4.16.5 |
| 101 | + conditionalUpdates: |
| 102 | + - conditions: |
| 103 | + - lastTransitionTime: "2024-09-23T22:33:38Z" |
| 104 | + message: |- |
| 105 | + Could not evaluate exposure to update risk SRIOVFailedToConfigureVF (creating PromQL round-tripper: unable to load specified CA cert /etc/tls/service-ca/service-ca.crt: open /etc/tls/service-ca/service-ca.crt: no such file or directory) |
| 106 | + SRIOVFailedToConfigureVF description: OCP Versions 4.14.34, 4.15.25, 4.16.7 and ALL subsequent versions include kernel datastructure changes which are not compatible with older versions of the SR-IOV operator. Please update SR-IOV operator to versions dated 20240826 or newer before updating OCP. |
| 107 | + SRIOVFailedToConfigureVF URL: https://issues.redhat.com/browse/NHE-1171 |
| 108 | + reason: EvaluationFailed |
| 109 | + status: Unknown |
| 110 | + type: Recommended |
| 111 | + release: |
| 112 | + channels: |
| 113 | + - candidate-4.16 |
| 114 | + - candidate-4.17 |
| 115 | + - eus-4.16 |
| 116 | + - fast-4.16 |
| 117 | + - stable-4.16 |
| 118 | + image: quay.io/openshift-release-dev/ocp-release@sha256:fb321a3f50596b43704dbbed2e51fdefd7a7fd488ee99655d03784d0cd02283f |
| 119 | + url: https://access.redhat.com/errata/RHSA-2024:5107 |
| 120 | + version: 4.16.7 |
| 121 | + risks: |
| 122 | + - matchingRules: |
| 123 | + - promql: |
| 124 | + promql: | |
| 125 | + group(csv_succeeded{_id="d6d42268-7dff-4d37-92cf-691bd2d42f41", name=~"sriov-network-operator[.].*"}) |
| 126 | + or |
| 127 | + 0 * group(csv_count{_id="d6d42268-7dff-4d37-92cf-691bd2d42f41"}) |
| 128 | + type: PromQL |
| 129 | + message: OCP Versions 4.14.34, 4.15.25, 4.16.7 and ALL subsequent versions |
| 130 | + include kernel datastructure changes which are not compatible with older |
| 131 | + versions of the SR-IOV operator. Please update SR-IOV operator to versions |
| 132 | + dated 20240826 or newer before updating OCP. |
| 133 | + name: SRIOVFailedToConfigureVF |
| 134 | + url: https://issues.redhat.com/browse/NHE-1171 |
| 135 | +---- |
0 commit comments