Skip to content

Commit 6585a4f

Browse files
authored
Merge pull request openshift#89156 from AedinC/OSDOCS-13448
OSDOCS-13448:Moved egress tech preview note into correct bullet point.
2 parents 8830df0 + 7049649 commit 6585a4f

File tree

1 file changed

+12
-12
lines changed

1 file changed

+12
-12
lines changed

rosa_release_notes/rosa-release-notes.adoc

+12-12
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
:_mod-docs-content-type: ASSEMBLY
22
[id="rosa-whats-new"]
33
= What's new with {product-title}
4+
include::_attributes/common-attributes.adoc[]
45
include::_attributes/attributes-openshift-dedicated.adoc[]
56
:context: rosa-whats-new
67

@@ -39,26 +40,25 @@ If your cluster uses the OpenShift SDN network plugin, you cannot upgrade to fut
3940
+
4041
For more information about migrating to OVN-Kubernetes, see xref:../networking/ovn_kubernetes_network_provider/migrate-from-openshift-sdn.adoc#migrate-from-openshift-sdn[Migrating from OpenShift SDN network plugin to OVN-Kubernetes network plugin].
4142
+
42-
[IMPORTANT]
43-
====
44-
Egress lockdown is a Technology Preview feature.
45-
====
46-
+
4743
* **Egress lockdown is now available as a Technology Preview on {product-title} clusters.** You can create a fully operational cluster that does not require a public egress by configuring a virtual private cloud (VPC) and using the `--properties zero_egress:true` flag when creating your cluster. For more information, see xref:../rosa_hcp/rosa-hcp-egress-lockdown-install.adoc#rosa-hcp-egress-lockdown-install[Creating a {product-title} cluster with egress lockdown].
48-
44+
+
45+
--
46+
:FeatureName: Egress lockdown
47+
include::snippets/technology-preview.adoc[]
48+
--
4949
* **ROSA with HCP now creates independent security groups for the AWS PrivateLink endpoint and worker nodes.** {hcp-title} clusters version 4.17.2 and greater can now add additional AWS security groups to the AWS PrivateLink endpoint to allow additional ingress traffic to the cluster's API. For more information, see xref:../rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc#rosa-hcp-aws-private-security-groups_rosa-hcp-aws-private-creating-cluster[Adding additional AWS security groups to the AWS PrivateLink endpoint].
5050

5151
* **Red{nbsp}Hat SRE log-based alerting endpoints have been updated.** {rosa-classic} customers who are using a firewall to control egress traffic can now remove all references to `*.osdsecuritylogs.splunkcloud.com:9997` from your firewall allowlist. {rosa-classic} clusters still require the `http-inputs-osdsecuritylogs.splunkcloud.com:443` log-based alerting endpoint to be accessible from the cluster.
5252
endif::openshift-rosa[]
5353
ifdef::openshift-rosa-hcp[]
5454
* **ROSA with HCP now creates independent security groups for the AWS PrivateLink endpoint and worker nodes.** {hcp-title} clusters version 4.17.2 and greater can now add additional AWS security groups to the AWS PrivateLink endpoint to allow additional ingress traffic to the cluster's API. For more information, see xref:../rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc#rosa-hcp-aws-private-security-groups_rosa-hcp-aws-private-creating-cluster[Adding additional AWS security groups to the AWS PrivateLink endpoint].
55-
+
56-
[IMPORTANT]
57-
====
58-
Egress lockdown is a Technology Preview feature.
59-
====
60-
+
55+
6156
* **Egress lockdown is now available as a Technology Preview on {product-title} clusters.** You can create a fully operational cluster that does not require a public egress by configuring a virtual private cloud (VPC) and using the `--properties zero_egress:true` flag when creating your cluster. For more information, see xref:../rosa_hcp/rosa-hcp-egress-lockdown-install.adoc#rosa-hcp-egress-lockdown-install[Creating a {product-title} cluster with egress lockdown].
57+
+
58+
--
59+
:FeatureName: Egress lockdown
60+
include::snippets/technology-preview.adoc[]
61+
--
6262
endif::openshift-rosa-hcp[]
6363
ifdef::openshift-rosa[]
6464

0 commit comments

Comments
 (0)