|
1 | 1 | :_mod-docs-content-type: ASSEMBLY
|
2 | 2 | [id="rosa-whats-new"]
|
3 | 3 | = What's new with {product-title}
|
| 4 | +include::_attributes/common-attributes.adoc[] |
4 | 5 | include::_attributes/attributes-openshift-dedicated.adoc[]
|
5 | 6 | :context: rosa-whats-new
|
6 | 7 |
|
@@ -39,26 +40,25 @@ If your cluster uses the OpenShift SDN network plugin, you cannot upgrade to fut
|
39 | 40 | +
|
40 | 41 | For more information about migrating to OVN-Kubernetes, see xref:../networking/ovn_kubernetes_network_provider/migrate-from-openshift-sdn.adoc#migrate-from-openshift-sdn[Migrating from OpenShift SDN network plugin to OVN-Kubernetes network plugin].
|
41 | 42 | +
|
42 |
| -[IMPORTANT] |
43 |
| -==== |
44 |
| -Egress lockdown is a Technology Preview feature. |
45 |
| -==== |
46 |
| -+ |
47 | 43 | * **Egress lockdown is now available as a Technology Preview on {product-title} clusters.** You can create a fully operational cluster that does not require a public egress by configuring a virtual private cloud (VPC) and using the `--properties zero_egress:true` flag when creating your cluster. For more information, see xref:../rosa_hcp/rosa-hcp-egress-lockdown-install.adoc#rosa-hcp-egress-lockdown-install[Creating a {product-title} cluster with egress lockdown].
|
48 |
| - |
| 44 | ++ |
| 45 | +-- |
| 46 | +:FeatureName: Egress lockdown |
| 47 | +include::snippets/technology-preview.adoc[] |
| 48 | +-- |
49 | 49 | * **ROSA with HCP now creates independent security groups for the AWS PrivateLink endpoint and worker nodes.** {hcp-title} clusters version 4.17.2 and greater can now add additional AWS security groups to the AWS PrivateLink endpoint to allow additional ingress traffic to the cluster's API. For more information, see xref:../rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc#rosa-hcp-aws-private-security-groups_rosa-hcp-aws-private-creating-cluster[Adding additional AWS security groups to the AWS PrivateLink endpoint].
|
50 | 50 |
|
51 | 51 | * **Red{nbsp}Hat SRE log-based alerting endpoints have been updated.** {rosa-classic} customers who are using a firewall to control egress traffic can now remove all references to `*.osdsecuritylogs.splunkcloud.com:9997` from your firewall allowlist. {rosa-classic} clusters still require the `http-inputs-osdsecuritylogs.splunkcloud.com:443` log-based alerting endpoint to be accessible from the cluster.
|
52 | 52 | endif::openshift-rosa[]
|
53 | 53 | ifdef::openshift-rosa-hcp[]
|
54 | 54 | * **ROSA with HCP now creates independent security groups for the AWS PrivateLink endpoint and worker nodes.** {hcp-title} clusters version 4.17.2 and greater can now add additional AWS security groups to the AWS PrivateLink endpoint to allow additional ingress traffic to the cluster's API. For more information, see xref:../rosa_hcp/rosa-hcp-aws-private-creating-cluster.adoc#rosa-hcp-aws-private-security-groups_rosa-hcp-aws-private-creating-cluster[Adding additional AWS security groups to the AWS PrivateLink endpoint].
|
55 |
| -+ |
56 |
| -[IMPORTANT] |
57 |
| -==== |
58 |
| -Egress lockdown is a Technology Preview feature. |
59 |
| -==== |
60 |
| -+ |
| 55 | + |
61 | 56 | * **Egress lockdown is now available as a Technology Preview on {product-title} clusters.** You can create a fully operational cluster that does not require a public egress by configuring a virtual private cloud (VPC) and using the `--properties zero_egress:true` flag when creating your cluster. For more information, see xref:../rosa_hcp/rosa-hcp-egress-lockdown-install.adoc#rosa-hcp-egress-lockdown-install[Creating a {product-title} cluster with egress lockdown].
|
| 57 | ++ |
| 58 | +-- |
| 59 | +:FeatureName: Egress lockdown |
| 60 | +include::snippets/technology-preview.adoc[] |
| 61 | +-- |
62 | 62 | endif::openshift-rosa-hcp[]
|
63 | 63 | ifdef::openshift-rosa[]
|
64 | 64 |
|
|
0 commit comments