You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: release_notes/ocp-4-15-release-notes.adoc
+15-7Lines changed: 15 additions & 7 deletions
Original file line number
Diff line number
Diff line change
@@ -93,7 +93,7 @@ For more information, see xref:../installing/installing_nutanix/nutanix-failure-
93
93
{product-title} {product-version} now supports the ability to enable 64k page sizes in the {op-system} kernel using the Machine Config Operator (MCO). This setting is exclusive to machines with 64-bit ARM architectures. For more information, see the xref:../post_installation_configuration/machine-configuration-tasks.adoc#machine-configuration-tasks[Machine configuration tasks] documentation.
In {product-title} 4.15, you can disable the Operator Lifecycle Manager (OLM) capability during installation. For further information, see xref:../installing/cluster-capabilities.adoc#olm-overview_cluster-capabilities[Operator Lifecycle Manager capability].
@@ -507,7 +507,7 @@ This feature provides support for deploying {lvms} on multi-node clusters. Prior
507
507
[WARNING]
508
508
====
509
509
{lvms} only supports node local storage on multi-node clusters. It does not support storage data replication mechanism across nodes. When using {lvms} on multi-node clusters, you must ensure storage data replication through active or passive replication mechanisms to avoid a single point of failure.
510
-
====
510
+
====
511
511
512
512
For more information, see xref:../storage/persistent_storage/persistent_storage_local/persistent-storage-using-lvms.adoc#lvms-preface-sno-ran_logical-volume-manager-storage[Deploying {lvms}].
513
513
@@ -655,7 +655,7 @@ For more information, see xref:../monitoring/config-map-reference-for-the-cluste
==== Improved alert querying for user-defined projects
658
-
Applications in user-defined projects now have API access to query alerts for application namespaces via the rules tenancy port for Thanos Querier.
658
+
Applications in user-defined projects now have API access to query alerts for application namespaces via the rules tenancy port for Thanos Querier.
659
659
You can now construct queries that access the `/api/v1/alerts` endpoint via port 9093 for Thanos Querier, provided that the HTTP request contains a `namespace` parameter.
660
660
In previous releases, the rules tenancy port for Thanos Querier did not provide API access to the `/api/v1/alerts` endpoint.
661
661
@@ -772,21 +772,21 @@ If you are receiving pod security violations, see the following resources:
772
772
773
773
[discrete]
774
774
[id="ocp-4-15-auth-generated-secrets"]
775
-
==== Secrets are no longer automatically generated when the integrated {product-registry} is disabled
775
+
=== Secrets are no longer automatically generated when the integrated {product-registry} is disabled
776
776
777
-
If you disable the `ImageRegistry` capability or if you disable the integrated {product-registry} in the Cluster Image Registry Operator's configuration, a service account token secret and image pull secret are no longer generated for each service account.
777
+
If you disable the `ImageRegistry` cluster capability or if you disable the integrated {product-registry} in the Cluster Image Registry Operator's configuration, a service account token secret and image pull secret are no longer generated for each service account.
778
778
779
779
For more information, see xref:../nodes/pods/nodes-pods-secrets.adoc#auto-generated-sa-token-secrets_nodes-pods-secrets[Automatically generated secrets].
780
780
781
781
[discrete]
782
782
[id="ocp-4-15-ovnic-default-range"]
783
-
==== Open Virtual Network Infrastructure Controller default range
783
+
=== Open Virtual Network Infrastructure Controller default range
784
784
785
785
Previously, the IP address range `168.254.0.0/16` was the default IP address range that the Open Virtual Network Infrastructure Controller used for the transit switch subnet. With this update, the Controller uses `100.88.0.0/16` as the default IP address range. Do not use this IP range in your production infrastructure network. (link:https://issues.redhat.com/browse/OCPBUGS-20178[*OCPBUGS-20178*])
786
786
787
787
[discrete]
788
788
[id="ocp-4-15-no-strict-limits-variable"]
789
-
==== Introduction of HAProxy no strict-limits variable
789
+
=== Introduction of HAProxy no strict-limits variable
790
790
791
791
The transition to HAProxy 2.6 included enforcement for the `strict-limits` configuration, which resulted in fatal errors when `maxConnections` requirements could not be met. The `strict-limits` setting is not configurable by end users and remains under the control of the HAProxy template.
792
792
@@ -797,6 +797,14 @@ This release introduces a configuration adjustment in response to the transition
797
797
798
798
To resolve these warnings, we recommend specifying `-1` or `auto` for the `maxConnections` field when tuning an IngressController. This choice allows HAProxy to dynamically calculate the maximum value based on the available resource limitations in the running container, which eliminates these warnings. (https://issues.redhat.com/browse/OCPBUGS-21803[*OCPBUGS-21803*])
799
799
800
+
[discrete]
801
+
[id="ocp-4-15-auth-deployer-sa"]
802
+
=== The deployer service account is no longer created if the DeploymentConfig cluster capability is disabled
803
+
804
+
If you disable the `DeploymentConfig` cluster capability, the `deployer` service account and its corresponding secrets are no longer created.
805
+
806
+
For more information, see xref:../installing/cluster-capabilities.adoc#deployment-config-capability_cluster-capabilities[DeploymentConfig capability].
0 commit comments