-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenShift 3.6 Release Notes Tracker #4021
Comments
Custom roles that reference OpenShift resources should be updated to include the appropriate API groups |
OpenShift will now reject EgressNetworkPolicy, ClusterNetwork, HostSubnet, and NetNamespace objects with ambiguous CIDR values. Before, an EgressNetworkPolicyRule such as
would have been interpreted as meaning "allow to 192.168.1.0/24". But the user most likely meant "allow to 192.168.1.15/32". In 3.6, trying to create such a rule (or to modify an existing such rule without fixing it) will result in an error. (The same validation is also now performed on CIDR-valued fields in ClusterNetwork, HostSubnet, and NetNamespace objects, but these are normally only created/modified by OpenShift itself.) |
In prior versions, pod volumes remained attached until the pod resource was deleted from the master. This prevented local disk and memory resources from being reclaim as a result of pod eviction. |
Init Containers |
Pod tolerations and node taints have moved from annotations to API fields in pod specifications (PodSpec) and node specification (NodeSpec) files, respectively. Pod tolerations and node taints that are defined in the annotations will be ignored. The annotation keys: |
Limited resources in quota is in Tech Preview for 3.6: #4531 |
Mount Options in Additional Concepts > Storage is in Technology Preview #4499 |
In OCP 3.6, Daemon pods do respect taints and tolerations, but they are created with NoExecute tolerations for the node.alpha.kubernetes.io/notReady and node.alpha.kubernetes.io/unreachable taints with no tolerationSeconds. This ensures that when the TaintBasedEvictions alpha feature is enabled, they will not be evicted when there are node problems such as a network partition. (When the TaintBasedEvictions feature is not enabled, they are also not evicted in these scenarios, but due to hard-coded behavior of the NodeController rather than due to tolerations). https://trello.com/c/5Ui6Ankz/463-document-tolerations-daemonsets-should-respect-taints-and-tolerations |
The OpenShift router will no longer allow SSLv3 (to prevent the POODLE attack). No modern web browser should require this. openshift/origin#7638 |
The router cipher list has changed to reflect the current "intermediate" cipher suite recommendations from Mozilla. We have also made it possible to set the cipher suite explicitly, or choose from a list of named preset security levels: openshift/origin#14505. |
The
as well as the following
The use of cc @adellape |
When using the In particular, the To preserve compatibility when upgrading:
|
The |
Breaking API change: Unless explicitly documented otherwise, API fields containing lists of items no longer distinguish between |
When using system containers with OpenShift the |
Tech Preview: Deploying basic CFME as an OpenShift App https://trello.com/c/Zvrc7Qu4 |
Container launched by the build pod (e.g. the s2i assemble container or the "docker build" process) now run under the build pod's parent cgroup. Previously the containers had their own cgroup and the memory/cpu limits were mirrored from the pod's cgroup limits. With this change, the secondary containers will now be sharing the memory limit that is consumed by the build pod, meaning the secondary containers will have slightly less memory available to them. |
SecurityContextConstraints are now also available via a groupified API at |
Openshift Volume Recycler is being deprecated. Anyone using recycler should use dynamic provision and volume deletion instead. |
https://bugzilla.redhat.com/show_bug.cgi?id=1464025 should be listed as a Known Issue per @sdodson. |
DNS changes for 3.6 Prior to 3.6 cluster dns was provided by the API server running on the master and the use of dnsmasq could be disabled by setting openshift_use_dnsmasq=false. Starting with 3.6 the use of dnsmasq is now mandatory and upgrades will be blocked if this variable is set to false. Also, when upgrading to 3.6 the playbooks will configure the node service to serve dns requests on 127.0.0.1:53 and dnsmasq will be reconfigured to route queries for FYI @rjhowe, how's this sound? |
Known issue for 3.6 https://bugzilla.redhat.com/show_bug.cgi?id=1463393 When upgrading from a release of OCP less than 3.5.5.18 the upgrade process may remove data on persistent volumes that fail to unmount correctly. If you're running a version less than 3.5.5.18 than please perform the following steps prior to performing the normal upgrade process.
|
All notes related to the Origin / OCP 3.6 release
The text was updated successfully, but these errors were encountered: