1
0
mirror of https://github.com/openshift/openshift-docs.git synced 2026-02-05 12:46:18 +01:00

OSDOCS#15096: 4.19 -> 4.20 version bump sweep

This commit is contained in:
Andrea Hoffer
2025-10-14 09:45:09 -04:00
committed by openshift-cherrypick-robot
parent 9c4aecedc1
commit 0a1fc5c090
82 changed files with 172 additions and 172 deletions

View File

@@ -44,7 +44,7 @@ include::modules/das-operator-installing-web-console.adoc[leveloffset=+2]
** xref:../hardware_enablement/psap-node-feature-discovery-operator.adoc#psap-node-feature-discovery-operator[Node Feature Discovery (NFD) Operator]
** link:https://docs.nvidia.com/datacenter/cloud-native/openshift/latest/index.html[NVIDIA GPU Operator]
** link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-web-console_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR]
** link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-web-console_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR]
//Installing the Dynamic Accelerator Slicer Operator using the CLI
include::modules/das-operator-installing-cli.adoc[leveloffset=+2]
@@ -53,7 +53,7 @@ include::modules/das-operator-installing-cli.adoc[leveloffset=+2]
* xref:../security/cert_manager_operator/cert-manager-operator-install.adoc#cert-manager-operator-install[{cert-manager-operator}]
* xref:../hardware_enablement/psap-node-feature-discovery-operator.adoc#psap-node-feature-discovery-operator[Node Feature Discovery (NFD) Operator]
* link:https://docs.nvidia.com/datacenter/cloud-native/openshift/latest/index.html[NVIDIA GPU Operator]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-cli_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-cli_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR]
//Uninstalling the Dynamic Accelerator Slicer Operator
include::modules/das-operator-uninstalling.adoc[leveloffset=+1]

View File

@@ -26,4 +26,4 @@ include::modules/microshift-cni-multus-troubleshoot.adoc[leveloffset=+1]
== Additional resources
* xref:../../microshift_networking/microshift_multiple_networks/microshift-cni-multus.adoc#microshift-cni-multus[About using multiple networks]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/hardware_networks/configuring-sriov-net-attach#nw-multus-ipam-object_configuring-sriov-net-attach[Configuration of IP address assignment for a network attachment]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/hardware_networks/configuring-sriov-net-attach#nw-multus-ipam-object_configuring-sriov-net-attach[Configuration of IP address assignment for a network attachment]

View File

@@ -40,7 +40,7 @@ include::modules/microshift-oc-mirror-install-catalog-node.adoc[leveloffset=+1]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-custom-resources-v2_about-installing-oc-mirror-v2[About custom resources generated by oc-mirror plugin v2]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-about-cache-and-workspace-dirs_about-installing-oc-mirror-v2[About the --cache-dir and --workspace flags]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-restricted-networks[Using Operator Lifecycle Manager in disconnected environments]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-procedure-delete-v2_about-installing-oc-mirror-v2[Deleting images from a disconnected environment]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-procedure-delete-v2_about-installing-oc-mirror-v2[Deleting images from a disconnected environment]
{microshift-short} links::
* xref:../../microshift_install_get_ready/microshift-deploy-with-mirror-registry.adoc#microshift-configuring-hosts-for-mirror_microshift-deployment-mirror[Configuring hosts for mirror registry access]

View File

@@ -8,7 +8,7 @@ toc::[]
Operator Lifecycle Manager (OLM) is used in {microshift-short} for installing and running optional add-on Operators. See the following link for more information:
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/operators/understanding-operators#operator-lifecycle-manager-olm[Operator Lifecycle Manager]
* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/operators/understanding-operators#operator-lifecycle-manager-olm[Operator Lifecycle Manager]
[id="microshift-olm-considerations_{context}"]
== Considerations for using OLM with {microshift-short}

View File

@@ -27,7 +27,7 @@ $ ./openshift-install version
.Example output
[source,terminal]
----
./openshift-install 4.19.0
./openshift-install 4.20.0
built from commit abc123def456
release image quay.io/openshift-release-dev/ocp-release@sha256:123abc456def789ghi012jkl345mno678pqr901stu234vwx567yz0
release architecture amd64

View File

@@ -39,7 +39,7 @@ $ oc --kubeconfig="$MGMT_KUBECONFIG" get np -A
[source,terminal]
----
NAMESPACE NAME CLUSTER DESIRED NODES CURRENT NODES AUTOSCALING AUTOREPAIR VERSION UPDATINGVERSION UPDATINGCONFIG MESSAGE
clusters democluster-us-east-1a democluster 1 1 False False 4.19.0 False False
clusters democluster-us-east-1a democluster 1 1 False False 4.20.0 False False
----
+
The `node-pool-name` is the `NAME` field in the output. In this example, the `node-pool-name` is `democluster-us-east-1a`.

View File

@@ -60,9 +60,9 @@ $ ./openshift-install version
.Example output for a shared registry binary
[source,terminal,subs="quotes"]
----
./openshift-install 4.19.0
./openshift-install 4.20.0
built from commit ae7977b7d1ca908674a0d45c5c243c766fa4b2ca
release image registry.ci.openshift.org/origin/release:4.19ocp-release@sha256:0da6316466d60a3a4535d5fed3589feb0391989982fba59d47d4c729912d6363
release image registry.ci.openshift.org/origin/release:4.20ocp-release@sha256:0da6316466d60a3a4535d5fed3589feb0391989982fba59d47d4c729912d6363
release architecture amd64
----
====

View File

@@ -132,7 +132,7 @@ $ oc get co kube-apiserver
[source,terminal]
----
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE
kube-apiserver 4.19.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 8; 1 node is at revision 10
kube-apiserver 4.20.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 8; 1 node is at revision 10
----
+
The message in the preceding example shows that one node has progressed to the new revision and two nodes have not yet updated. It can take 20 minutes or more to roll out the new revision to all nodes, depending on the size of your cluster.

View File

@@ -42,7 +42,7 @@ $ oc get co kube-apiserver
[source,terminal]
----
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE
kube-apiserver 4.19.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 12; 1 node is at revision 14
kube-apiserver 4.20.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 12; 1 node is at revision 14
----
+
The message in the preceding example shows that one node has progressed to the new revision and two nodes have not yet updated. It can take 20 minutes or more to roll out the new revision to all nodes, depending on the size of your cluster.

View File

@@ -57,14 +57,14 @@ $ oc get clusteroperators
[source,terminal]
----
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE
authentication 4.19.0-0 True False False 51m
baremetal 4.19.0-0 True False False 72m
cloud-controller-manager 4.19.0-0 True False False 75m
cloud-credential 4.19.0-0 True False False 77m
cluster-api 4.19.0-0 True False False 42m
cluster-autoscaler 4.19.0-0 True False False 72m
config-operator 4.19.0-0 True False False 72m
console 4.19.0-0 True False False 55m
authentication 4.20.0-0 True False False 51m
baremetal 4.20.0-0 True False False 72m
cloud-controller-manager 4.20.0-0 True False False 75m
cloud-credential 4.20.0-0 True False False 77m
cluster-api 4.20.0-0 True False False 42m
cluster-autoscaler 4.20.0-0 True False False 72m
config-operator 4.20.0-0 True False False 72m
console 4.20.0-0 True False False 55m
...
----
+

View File

@@ -104,14 +104,14 @@ $ oc get clusteroperators
[source,terminal]
----
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE
authentication 4.19.0-0 True False False 51m
baremetal 4.19.0-0 True False False 72m
cloud-controller-manager 4.19.0-0 True False False 75m
cloud-credential 4.19.0-0 True False False 77m
cluster-api 4.19.0-0 True False False 42m
cluster-autoscaler 4.19.0-0 True False False 72m
config-operator 4.19.0-0 True False False 72m
console 4.19.0-0 True False False 55m
authentication 4.20.0-0 True False False 51m
baremetal 4.20.0-0 True False False 72m
cloud-controller-manager 4.20.0-0 True False False 75m
cloud-credential 4.20.0-0 True False False 77m
cluster-api 4.20.0-0 True False False 42m
cluster-autoscaler 4.20.0-0 True False False 72m
config-operator 4.20.0-0 True False False 72m
console 4.20.0-0 True False False 55m
...
----
+

View File

@@ -59,8 +59,8 @@ kind: ImageBasedInstallationConfig
metadata:
name: example-image-based-installation-config
# The following fields are required
seedImage: quay.io/openshift-kni/seed-image:4.19.0
seedVersion: 4.19.0
seedImage: quay.io/openshift-kni/seed-image:4.20.0
seedVersion: 4.20.0
installationDisk: /dev/vda
pullSecret: '<your_pull_secret>'
# networkConfig is optional and contains the network configuration for the host in NMState format.
@@ -89,7 +89,7 @@ kind: ImageBasedInstallationConfig
metadata:
name: example-image-based-installation-config
seedImage: quay.io/repo-id/seed:latest
seedVersion: "4.19.0"
seedVersion: "4.20.0"
extraPartitionStart: "-240G"
installationDisk: /dev/disk/by-id/wwn-0x62c...
sshKey: 'ssh-ed25519 AAAA...'

View File

@@ -27,7 +27,7 @@ kind: ImageBasedInstallationConfig
metadata:
name: example-extra-partition
seedImage: quay.io/repo-id/seed:latest
seedVersion: "4.19.0"
seedVersion: "4.20.0"
installationDisk: /dev/sda
pullSecret: '{"auths": ...}'
# ...

View File

@@ -20,7 +20,7 @@ You must run a gather operation to create an Insights Operator archive.
+
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/insights-operator/release-4.19/docs/gather-job.yaml[]
include::https://raw.githubusercontent.com/openshift/insights-operator/release-4.20/docs/gather-job.yaml[]
----
. Copy your `insights-operator` image version:
+

View File

@@ -20,10 +20,10 @@ bootstrap machine that you need for your {product-title} cluster:
[source,json]
----
ifndef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/04_bootstrap.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/04_bootstrap.json[]
endif::ash[]
ifdef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/04_bootstrap.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/04_bootstrap.json[]
endif::ash[]
----
====

View File

@@ -20,10 +20,10 @@ control plane machines that you need for your {product-title} cluster:
[source,json]
----
ifndef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/05_masters.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/05_masters.json[]
endif::ash[]
ifdef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/05_masters.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/05_masters.json[]
endif::ash[]
----
====

View File

@@ -21,10 +21,10 @@ cluster:
[source,json]
----
ifndef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/03_infra.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/03_infra.json[]
endif::ash[]
ifdef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/03_infra.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/03_infra.json[]
endif::ash[]
----
====

View File

@@ -20,10 +20,10 @@ stored {op-system-first} image that you need for your {product-title} cluster:
[source,json]
----
ifndef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/02_storage.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/02_storage.json[]
endif::ash[]
ifdef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/02_storage.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/02_storage.json[]
endif::ash[]
----
====

View File

@@ -20,10 +20,10 @@ VNet that you need for your {product-title} cluster:
[source,json]
----
ifndef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/01_vnet.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/01_vnet.json[]
endif::ash[]
ifdef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/01_vnet.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/01_vnet.json[]
endif::ash[]
----
====

View File

@@ -20,10 +20,10 @@ worker machines that you need for your {product-title} cluster:
[source,json]
----
ifndef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/06_workers.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/06_workers.json[]
endif::ash[]
ifdef::ash[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/06_workers.json[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/06_workers.json[]
endif::ash[]
----
====

View File

@@ -22,5 +22,5 @@ Use the machine types included in the following charts for your AWS ARM instance
.Machine types based on 64-bit ARM architecture
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/aws/tested_instance_types_aarch64.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/aws/tested_instance_types_aarch64.md[]
====

View File

@@ -46,7 +46,7 @@ ifndef::local-zone,wavelength-zone,secretregion[]
.Machine types based on 64-bit x86 architecture
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/aws/tested_instance_types_x86_64.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/aws/tested_instance_types_x86_64.md[]
====
endif::local-zone,wavelength-zone,secretregion[]
ifdef::local-zone[]

View File

@@ -18,5 +18,5 @@ The following Microsoft Azure ARM64 instance types have been tested with {produc
.Machine types based on 64-bit ARM architecture
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/azure/tested_instance_types_aarch64.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/azure/tested_instance_types_aarch64.md[]
====

View File

@@ -17,5 +17,5 @@ The following Microsoft Azure instance types have been tested with {product-titl
.Machine types based on 64-bit x86 architecture
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/azure/tested_instance_types_x86_64.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/azure/tested_instance_types_x86_64.md[]
====

View File

@@ -13,6 +13,6 @@ You can use the following CloudFormation template to deploy the bootstrap machin
====
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/04_cluster_bootstrap.yaml[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/04_cluster_bootstrap.yaml[]
----
====

View File

@@ -14,6 +14,6 @@ machines that you need for your {product-title} cluster.
====
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/05_cluster_master_nodes.yaml[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/05_cluster_master_nodes.yaml[]
----
====

View File

@@ -14,7 +14,7 @@ objects and load balancers that you need for your {product-title} cluster.
====
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/02_cluster_infra.yaml[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/02_cluster_infra.yaml[]
----
====

View File

@@ -14,6 +14,6 @@ that you need for your {product-title} cluster.
====
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/03_cluster_security.yaml[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/03_cluster_security.yaml[]
----
====

View File

@@ -14,6 +14,6 @@ you need for your {product-title} cluster.
====
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/01_vpc.yaml[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/01_vpc.yaml[]
----
====

View File

@@ -14,6 +14,6 @@ You can deploy the compute machines that you need for your {product-title} clust
====
[source,yaml]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/06_cluster_worker_node.yaml[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/06_cluster_worker_node.yaml[]
----
====

View File

@@ -14,6 +14,6 @@ machine that you need for your {product-title} cluster:
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/04_bootstrap.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/04_bootstrap.py[]
----
====

View File

@@ -14,6 +14,6 @@ plane machines that you need for your {product-title} cluster:
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/05_control_plane.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/05_control_plane.py[]
----
====

View File

@@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the external loa
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/02_lb_ext.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/02_lb_ext.py[]
----
====

View File

@@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the firewall rue
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/03_firewall.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/03_firewall.py[]
----
====

View File

@@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the IAM roles th
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/03_iam.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/03_iam.py[]
----
====

View File

@@ -12,7 +12,7 @@ You can use the following Deployment Manager template to deploy the internal loa
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/02_lb_int.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/02_lb_int.py[]
----
====

View File

@@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the private DNS
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/02_dns.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/02_dns.py[]
----
====

View File

@@ -14,6 +14,6 @@ you need for your {product-title} cluster:
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/01_vpc.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/01_vpc.py[]
----
====

View File

@@ -14,6 +14,6 @@ that you need for your {product-title} cluster:
====
[source,python]
----
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/06_worker.py[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/06_worker.py[]
----
====

View File

@@ -18,5 +18,5 @@ The following Google Cloud Platform (GCP) 64-bit ARM instance types have been te
.Machine series for 64-bit ARM machines
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/gcp/tested_instance_types_arm.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/gcp/tested_instance_types_arm.md[]
====

View File

@@ -25,5 +25,5 @@ Some instance types require the use of Hyperdisk storage. If you use an instance
.Machine series
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/gcp/tested_instance_types.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/gcp/tested_instance_types.md[]
====

View File

@@ -15,5 +15,5 @@ The following {ibm-cloud-name} instance types have been tested with {product-tit
.Machine series
[%collapsible]
====
include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/ibmcloud/tested_instance_types_x86_64.md[]
include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/ibmcloud/tested_instance_types_x86_64.md[]
====

View File

@@ -239,10 +239,10 @@ $ sudo spkut 44
.Example output
[source,terminal]
----
KVC: wrapper simple-kmod for 4.19.0-147.3.1.el8_1.x86_64
KVC: wrapper simple-kmod for 4.20.0-147.3.1.el8_1.x86_64
Running userspace wrapper using the kernel module container...
+ podman run -i --rm --privileged
simple-kmod-dd1a7d4:4.19.0-147.3.1.el8_1.x86_64 spkut 44
simple-kmod-dd1a7d4:4.20.0-147.3.1.el8_1.x86_64 spkut 44
simple-procfs-kmod number = 0
simple-procfs-kmod number = 44
----

View File

@@ -120,7 +120,7 @@ sh-4.4# uname -a
.Example output
[source,terminal]
----
Linux <worker_node> 4.19.0-147.3.1.rt24.96.el8_1.x86_64 #1 SMP PREEMPT RT
Linux <worker_node> 4.20.0-147.3.1.rt24.96.el8_1.x86_64 #1 SMP PREEMPT RT
Wed Nov 27 18:29:55 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux
----
+

View File

@@ -88,10 +88,10 @@ $ openshift-install coreos print-stream-json | grep '\.iso[^.]'
[source,terminal]
ifndef::openshift-origin[]
----
"location": "<url>/art/storage/releases/rhcos-4.19-aarch64/<release>/aarch64/rhcos-<release>-live.aarch64.iso",
"location": "<url>/art/storage/releases/rhcos-4.19-ppc64le/<release>/ppc64le/rhcos-<release>-live.ppc64le.iso",
"location": "<url>/art/storage/releases/rhcos-4.19-s390x/<release>/s390x/rhcos-<release>-live.s390x.iso",
"location": "<url>/art/storage/releases/rhcos-4.19/<release>/x86_64/rhcos-<release>-live.x86_64.iso",
"location": "<url>/art/storage/releases/rhcos-4.20-aarch64/<release>/aarch64/rhcos-<release>-live.aarch64.iso",
"location": "<url>/art/storage/releases/rhcos-4.20-ppc64le/<release>/ppc64le/rhcos-<release>-live.ppc64le.iso",
"location": "<url>/art/storage/releases/rhcos-4.20-s390x/<release>/s390x/rhcos-<release>-live.s390x.iso",
"location": "<url>/art/storage/releases/rhcos-4.20/<release>/x86_64/rhcos-<release>-live.x86_64.iso",
----
endif::openshift-origin[]
ifdef::openshift-origin[]

View File

@@ -101,18 +101,18 @@ $ openshift-install coreos print-stream-json | grep -Eo '"https.*(kernel-|initra
[source,terminal]
ifndef::openshift-origin[]
----
"<url>/art/storage/releases/rhcos-4.19-aarch64/<release>/aarch64/rhcos-<release>-live-kernel-aarch64"
"<url>/art/storage/releases/rhcos-4.19-aarch64/<release>/aarch64/rhcos-<release>-live-initramfs.aarch64.img"
"<url>/art/storage/releases/rhcos-4.19-aarch64/<release>/aarch64/rhcos-<release>-live-rootfs.aarch64.img"
"<url>/art/storage/releases/rhcos-4.19-ppc64le/49.84.202110081256-0/ppc64le/rhcos-<release>-live-kernel-ppc64le"
"<url>/art/storage/releases/rhcos-4.19-ppc64le/<release>/ppc64le/rhcos-<release>-live-initramfs.ppc64le.img"
"<url>/art/storage/releases/rhcos-4.19-ppc64le/<release>/ppc64le/rhcos-<release>-live-rootfs.ppc64le.img"
"<url>/art/storage/releases/rhcos-4.19-s390x/<release>/s390x/rhcos-<release>-live-kernel-s390x"
"<url>/art/storage/releases/rhcos-4.19-s390x/<release>/s390x/rhcos-<release>-live-initramfs.s390x.img"
"<url>/art/storage/releases/rhcos-4.19-s390x/<release>/s390x/rhcos-<release>-live-rootfs.s390x.img"
"<url>/art/storage/releases/rhcos-4.19/<release>/x86_64/rhcos-<release>-live-kernel-x86_64"
"<url>/art/storage/releases/rhcos-4.19/<release>/x86_64/rhcos-<release>-live-initramfs.x86_64.img"
"<url>/art/storage/releases/rhcos-4.19/<release>/x86_64/rhcos-<release>-live-rootfs.x86_64.img"
"<url>/art/storage/releases/rhcos-4.20-aarch64/<release>/aarch64/rhcos-<release>-live-kernel-aarch64"
"<url>/art/storage/releases/rhcos-4.20-aarch64/<release>/aarch64/rhcos-<release>-live-initramfs.aarch64.img"
"<url>/art/storage/releases/rhcos-4.20-aarch64/<release>/aarch64/rhcos-<release>-live-rootfs.aarch64.img"
"<url>/art/storage/releases/rhcos-4.20-ppc64le/49.84.202110081256-0/ppc64le/rhcos-<release>-live-kernel-ppc64le"
"<url>/art/storage/releases/rhcos-4.20-ppc64le/<release>/ppc64le/rhcos-<release>-live-initramfs.ppc64le.img"
"<url>/art/storage/releases/rhcos-4.20-ppc64le/<release>/ppc64le/rhcos-<release>-live-rootfs.ppc64le.img"
"<url>/art/storage/releases/rhcos-4.20-s390x/<release>/s390x/rhcos-<release>-live-kernel-s390x"
"<url>/art/storage/releases/rhcos-4.20-s390x/<release>/s390x/rhcos-<release>-live-initramfs.s390x.img"
"<url>/art/storage/releases/rhcos-4.20-s390x/<release>/s390x/rhcos-<release>-live-rootfs.s390x.img"
"<url>/art/storage/releases/rhcos-4.20/<release>/x86_64/rhcos-<release>-live-kernel-x86_64"
"<url>/art/storage/releases/rhcos-4.20/<release>/x86_64/rhcos-<release>-live-initramfs.x86_64.img"
"<url>/art/storage/releases/rhcos-4.20/<release>/x86_64/rhcos-<release>-live-rootfs.x86_64.img"
----
endif::openshift-origin[]
ifdef::openshift-origin[]

View File

@@ -22,7 +22,7 @@ $ ./openshift-install version
.Example output
[source,terminal]
----
./openshift-install 4.19.0
./openshift-install 4.20.0
built from commit abc123etc
release image quay.io/openshift-release-dev/ocp-release@sha256:abc123wxyzetc
release architecture multi

View File

@@ -38,14 +38,14 @@ $ oc get --namespace openshift-nmstate clusterserviceversion
[source,terminal]
----
NAME DISPLAY VERSION REPLACES PHASE
kubernetes-nmstate-operator.v4.19.0 Kubernetes NMState Operator 4.19.0 Succeeded
kubernetes-nmstate-operator.v4.20.0 Kubernetes NMState Operator 4.20.0 Succeeded
----
. Delete the CSV resource. After you delete the file, {olm} deletes certain resources, such as `RBAC`, that it created for the Operator.
+
[source,terminal]
----
$ oc delete --namespace openshift-nmstate clusterserviceversion kubernetes-nmstate-operator.v4.19.0
$ oc delete --namespace openshift-nmstate clusterserviceversion kubernetes-nmstate-operator.v4.20.0
----
. Delete the `nmstate` CR and any associated `Deployment` resources by running the following commands:

View File

@@ -15,13 +15,13 @@ You can obtain the image by running one of the following commands in the cluster
[source,terminal]
----
# For x86_64 image:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.19.0-x86_64 --image-for=driver-toolkit
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.20.0-x86_64 --image-for=driver-toolkit
----
+
[source,terminal]
----
# For ARM64 image:
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.19.0-aarch64 --image-for=driver-toolkit
$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.20.0-aarch64 --image-for=driver-toolkit
----
`kernelVersion`:: Required field that provides the version of the kernel that the cluster is upgraded to.
@@ -30,7 +30,7 @@ You can obtain the version by running the following command in the cluster:
+
[source,terminal]
----
$ podman run -it --rm $(oc adm release info quay.io/openshift-release-dev/ocp-release:4.19.0-x86_64 --image-for=driver-toolkit) cat /etc/driver-toolkit-release.json
$ podman run -it --rm $(oc adm release info quay.io/openshift-release-dev/ocp-release:4.20.0-x86_64 --image-for=driver-toolkit) cat /etc/driver-toolkit-release.json
----
`pushBuiltImage`:: If `true`, then the images created during the Build and Sign validation are pushed to their repositories. This field is `false` by default.

View File

@@ -32,7 +32,7 @@ The output of this command includes pull specs for the available updates similar
Recommended updates:
VERSION IMAGE
4.19.0 quay.io/openshift-release-dev/ocp-release@sha256:6a899c54dda6b844bb12a247e324a0f6cde367e880b73ba110c056df6d018032
4.20.0 quay.io/openshift-release-dev/ocp-release@sha256:6a899c54dda6b844bb12a247e324a0f6cde367e880b73ba110c056df6d018032
...
----

View File

@@ -6,4 +6,4 @@
[id="mirror-registry-release-notes-1-3_{context}"]
= Mirror registry for Red{nbsp}Hat OpenShift 1.3 release notes
To view the _mirror registry for Red{nbsp}Hat OpenShift_ 1.3 release notes, see link:https://docs.openshift.com/container-platform/4.19/installing/disconnected_install/installing-mirroring-creating-registry.html#mirror-registry-release-notes-1-3_installing-mirroring-creating-registry[Mirror registry for Red{nbsp}Hat OpenShift 1.3 release notes].
To view the _mirror registry for Red{nbsp}Hat OpenShift_ 1.3 release notes, see link:https://docs.openshift.com/container-platform/4.20/installing/disconnected_install/installing-mirroring-creating-registry.html#mirror-registry-release-notes-1-3_installing-mirroring-creating-registry[Mirror registry for Red{nbsp}Hat OpenShift 1.3 release notes].

View File

@@ -14,7 +14,7 @@ include::snippets/unified-perspective-web-console.adoc[]
* You have access to the cluster as a developer or as a user.
* You have view permissions for the project that you are viewing the dashboard for.
* A cluster administrator has link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/web_console/index#enabling-developer-perspective_web-console_web-console-overview[enabled the *Developer* perspective] in the web console.
* A cluster administrator has link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/web_console/index#enabling-developer-perspective_web-console_web-console-overview[enabled the *Developer* perspective] in the web console.
.Procedure

View File

@@ -23,13 +23,13 @@ Additionally, consider the following dynamic port ranges when managing ingress t
To view or download the complete raw CSV content for an environment, see the following resources:
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/bm.csv[{product-title} on bare metal]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/bm.csv[{product-title} on bare metal]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/none-sno.csv[{sno-caps} with other platforms]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/none-sno.csv[{sno-caps} with other platforms]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/aws.csv[{product-title} on {aws-short}]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/aws.csv[{product-title} on {aws-short}]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/aws-sno.csv[{sno-caps} on {aws-short}]
* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/aws-sno.csv[{sno-caps} on {aws-short}]
[NOTE]
====
@@ -50,14 +50,14 @@ For base ingress flows to {sno} clusters, see the _Control plane node base flows
.Control plane node base flows
[%header,format=csv]
|===
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/common-master.csv[]
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/common-master.csv[]
|===
[id="network-flow-matrix-worker_{context}"]
.Worker node base flows
[%header,format=csv]
|===
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/common-worker.csv[]
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/common-worker.csv[]
|===
[id="network-flow-matrix-bm_{context}"]
@@ -68,7 +68,7 @@ In addition to the base network flows, the following matrix describes the ingres
.{product-title} on bare metal
[%header,format=csv]
|===
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/bm.csv[]
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/bm.csv[]
|===
[id="network-flow-matrix-sno_{context}"]
@@ -79,7 +79,7 @@ In addition to the base network flows, the following matrix describes the ingres
.{sno-caps} with other platforms
[%header,format=csv]
|===
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/none-sno.csv[]
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/none-sno.csv[]
|===
[id="network-flow-matrix-aws_{context}"]
@@ -90,7 +90,7 @@ In addition to the base network flows, the following matrix describes the ingres
.{product-title} on AWS
[%header,format=csv]
|===
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/aws.csv[]
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/aws.csv[]
|===
[id="network-flow-matrix-aws-sno_{context}"]
@@ -101,5 +101,5 @@ In addition to the base network flows, the following matrix describes the ingres
.{sno-caps} on AWS
[%header,format=csv]
|===
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/aws-sno.csv[]
include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/aws-sno.csv[]
|===

View File

@@ -60,9 +60,9 @@ $ oc get nodes -o wide
[source,terminal]
----
NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME
master.example.com Ready master 171m v1.33.4 10.0.129.108 <none> Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.19.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev
node1.example.com Ready worker 72m v1.33.4 10.0.129.222 <none> Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.19.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev
node2.example.com Ready worker 164m v1.33.4 10.0.142.150 <none> Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.19.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev
master.example.com Ready master 171m v1.33.4 10.0.129.108 <none> Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.20.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev
node1.example.com Ready worker 72m v1.33.4 10.0.129.222 <none> Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.20.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev
node2.example.com Ready worker 164m v1.33.4 10.0.142.150 <none> Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.20.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev
----
* The following command lists information about a single node:

View File

@@ -50,14 +50,14 @@ $ oc get csv -n openshift-dpu-operator
[source,terminal]
----
NAME DISPLAY VERSION REPLACES PHASE
dpu-operator.v4.19.0-202503130333 DPU Operator 4.19.0-202503130333 Failed
dpu-operator.v4.20.0-202503130333 DPU Operator 4.20.0-202503130333 Failed
----
.. Delete the DPU Operator by running the following command:
+
[source,terminal]
----
$ oc delete csv dpu-operator.v4.19.0-202503130333 -n openshift-dpu-operator
$ oc delete csv dpu-operator.v4.20.0-202503130333 -n openshift-dpu-operator
----
. Delete the namespace that was created for the DPU Operator by running the following command:

View File

@@ -26,12 +26,12 @@ apiVersion: mirror.openshift.io/v2alpha1
mirror:
platform:
channels:
- name: stable-4.19 <1>
minVersion: 4.19.2
maxVersion: 4.19.2
- name: stable-4.20 <1>
minVersion: 4.20.2
maxVersion: 4.20.2
graph: true <2>
operators:
- catalog: registry.redhat.io/redhat/redhat-operator-index:v4.19 <3>
- catalog: registry.redhat.io/redhat/redhat-operator-index:v4.20 <3>
packages: <4>
- name: aws-load-balancer-operator
- name: 3scale-operator

View File

@@ -298,12 +298,12 @@ mirror:
architectures:
- "multi"
channels:
- name: stable-4.19
minVersion: 4.19.0
maxVersion: 4.19.1
- name: stable-4.20
minVersion: 4.20.0
maxVersion: 4.20.1
type: ocp
operators:
- catalog: registry.redhat.io/redhat/redhat-operator-index:v4.19
- catalog: registry.redhat.io/redhat/redhat-operator-index:v4.20
packages:
- name: multicluster-engine
----

View File

@@ -323,7 +323,7 @@ The default value is `false`
----
mirror:
operators:
- catalog: registry.redhat.io/redhat/redhat-operator-index:v4.19
- catalog: registry.redhat.io/redhat/redhat-operator-index:v4.20
packages:
- name: rhods-operator
defaultChannel: fast

View File

@@ -351,7 +351,7 @@ Tags that are added by Red{nbsp}Hat are required for clusters to stay in complia
====
|--version string
|The version of {product-title} that will be used to install the cluster or cluster resources. For `cluster` use an `X.Y.Z` format, for example, `4.19.0`. For `account-role` use an `X.Y` format, for example, `4.19`.
|The version of {product-title} that will be used to install the cluster or cluster resources. For `cluster` use an `X.Y.Z` format, for example, `4.20.0`. For `account-role` use an `X.Y` format, for example, `4.20`.
|--worker-iam-role string
|The ARN of the IAM role that will be attached to compute instances.

View File

@@ -43,10 +43,10 @@ ifdef::sts[]
----
I: Fetching account roles
ROLE NAME ROLE TYPE ROLE ARN OPENSHIFT VERSION
ManagedOpenShift-ControlPlane-Role Control plane arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role 4.19
ManagedOpenShift-Installer-Role Installer arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role 4.19
ManagedOpenShift-Support-Role Support arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role 4.19
ManagedOpenShift-Worker-Role Worker arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role 4.19
ManagedOpenShift-ControlPlane-Role Control plane arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role 4.20
ManagedOpenShift-Installer-Role Installer arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role 4.20
ManagedOpenShift-Support-Role Support arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role 4.20
ManagedOpenShift-Worker-Role Worker arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role 4.20
----
endif::sts[]
ifdef::hcp[]
@@ -55,9 +55,9 @@ ifdef::hcp[]
----
I: Fetching account roles
ROLE NAME ROLE TYPE ROLE ARN OPENSHIFT VERSION AWS Managed
ManagedOpenShift-HCP-ROSA-Installer-Role Installer arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-HCP-ROSA-Installer-Role 4.19 Yes
ManagedOpenShift-HCP-ROSA-Support-Role Support arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-HCP-ROSA-Support-Role 4.19 Yes
ManagedOpenShift-HCP-ROSA-Worker-Role Worker arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-HCP-ROSA-Worker-Role 4.19 Yes
ManagedOpenShift-HCP-ROSA-Installer-Role Installer arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-HCP-ROSA-Installer-Role 4.20 Yes
ManagedOpenShift-HCP-ROSA-Support-Role Support arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-HCP-ROSA-Support-Role 4.20 Yes
ManagedOpenShift-HCP-ROSA-Worker-Role Worker arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-HCP-ROSA-Worker-Role 4.20 Yes
----
endif::hcp[]
+

View File

@@ -40,7 +40,7 @@ Display Name: test_cluster
ID: <cluster_id> <1>
External ID: <external_id>
Control Plane: ROSA Service Hosted
OpenShift Version: 4.19.0
OpenShift Version: 4.20.0
Channel Group: stable
DNS: test_cluster.l3cn.p3.openshiftapps.com
AWS Account: <AWS_id>

View File

@@ -56,7 +56,7 @@ Display Name: rosa-ext-test
ID: <cluster_id>
External ID: <cluster_ext_id>
Control Plane: ROSA Service Hosted
OpenShift Version: 4.19.0
OpenShift Version: 4.20.0
Channel Group: stable
DNS: <dns>
AWS Account: <AWS_id>

View File

@@ -53,7 +53,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_trust_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_trust_policy.json[]
----
====
@@ -62,7 +62,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_permission_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_permission_policy.json[]
----
====
@@ -85,7 +85,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_controlplane_trust_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_controlplane_trust_policy.json[]
----
====
@@ -94,7 +94,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_controlplane_permission_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_controlplane_permission_policy.json[]
----
====
@@ -117,7 +117,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_worker_trust_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_worker_trust_policy.json[]
----
====
@@ -126,7 +126,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_worker_permission_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_worker_permission_policy.json[]
----
====
@@ -149,7 +149,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_support_trust_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_support_trust_policy.json[]
----
====
@@ -158,7 +158,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_support_permission_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_support_permission_policy.json[]
----
====
@@ -178,7 +178,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_ocm_trust_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_ocm_trust_policy.json[]
----
====
@@ -198,7 +198,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_trust_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_trust_policy.json[]
----
====
@@ -255,7 +255,7 @@ I: Attached policy 'arn:aws:iam::000000000000:policy/testrole-Worker-Role-Policy
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_ingress_operator_cloud_credentials_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_ingress_operator_cloud_credentials_policy.json[]
----
====
@@ -275,7 +275,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_cluster_csi_drivers_ebs_cloud_credentials_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_cluster_csi_drivers_ebs_cloud_credentials_policy.json[]
----
====
@@ -295,7 +295,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_machine_api_aws_cloud_credentials_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_machine_api_aws_cloud_credentials_policy.json[]
----
====
@@ -315,7 +315,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_cloud_credential_operator_cloud_credential_operator_iam_ro_creds_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_cloud_credential_operator_cloud_credential_operator_iam_ro_creds_policy.json[]
----
====
@@ -335,7 +335,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_image_registry_installer_cloud_credentials_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_image_registry_installer_cloud_credentials_policy.json[]
----
====
endif::openshift-rosa-hcp[]

View File

@@ -44,7 +44,7 @@ This example procedure is applicable for an installer role and policy with the m
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_core_permission_boundary_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_core_permission_boundary_policy.json[]
----
====
@@ -67,7 +67,7 @@ While the ROSA (`rosa`) CLI offers a permission boundary function, it applies to
+
[source,terminal]
----
$ curl -o ./rosa-installer-core.json https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/sts/4.19/sts_installer_core_permission_boundary_policy.json
$ curl -o ./rosa-installer-core.json https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/sts/4.20/sts_installer_core_permission_boundary_policy.json
----
. Create the policy in AWS and gather its Amazon Resource Name (ARN) by entering the following command:
@@ -128,7 +128,7 @@ For more examples of PL and VPC permission boundary policies see:
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_privatelink_permission_boundary_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_privatelink_permission_boundary_policy.json[]
----
====
+
@@ -137,6 +137,6 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs
====
[source,json]
----
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_vpc_permission_boundary_policy.json[]
include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_vpc_permission_boundary_policy.json[]
----
====

View File

@@ -258,7 +258,7 @@ I: Using arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role for th
? Disable Workload monitoring (optional): No
I: Creating cluster '<cluster_name>'
I: To create this cluster again in the future, you can run:
rosa create cluster --cluster-name <cluster_name> --role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role --support-role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role --master-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role --worker-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role --operator-roles-prefix <cluster_name>-<random_string> --region us-east-1 --version 4.19.0 --additional-compute-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-infra-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-control-plane-security-group-ids sg-0e375ff0ec4a6cfa2 --replicas 2 --machine-cidr 10.0.0.0/16 --service-cidr 172.30.0.0/16 --pod-cidr 10.128.0.0/14 --host-prefix 23 <16>
rosa create cluster --cluster-name <cluster_name> --role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Installer-Role --support-role-arn arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Support-Role --master-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-ControlPlane-Role --worker-iam-role arn:aws:iam::<aws_account_id>:role/ManagedOpenShift-Worker-Role --operator-roles-prefix <cluster_name>-<random_string> --region us-east-1 --version 4.20.0 --additional-compute-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-infra-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-control-plane-security-group-ids sg-0e375ff0ec4a6cfa2 --replicas 2 --machine-cidr 10.0.0.0/16 --service-cidr 172.30.0.0/16 --pod-cidr 10.128.0.0/14 --host-prefix 23 <16>
I: To view a list of clusters and their status, run 'rosa list clusters'
I: Cluster '<cluster_name>' has been created.
I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information.
@@ -267,7 +267,7 @@ I: Once the cluster is installed you will need to add an Identity Provider befor
<1> Optional. When creating your cluster, you can customize the subdomain for your cluster on `*.openshiftapps.com` using the `--domain-prefix` flag. The value for this flag must be unique within your organization, cannot be longer than 15 characters, and cannot be changed after cluster creation. If the flag is not supplied, an autogenerated value is created that depends on the length of the cluster name. If the cluster name is fewer than or equal to 15 characters, that name is used for the domain prefix. If the cluster name is longer than 15 characters, the domain prefix is randomly generated to a 15 character string.
<2> When creating your cluster, you can create a local administrator user (`cluster-admin`) for your cluster. This automatically configures an `htpasswd` identity provider for the `cluster-admin` user.
<3> You can create a custom password for the `cluster-admin` user, or have the system generate a password. If you do not create a custom password, the generated password is displayed in the command-line output. If you specify a custom password, the password must be at least 14 characters (ASCII-standard) without any whitespace. When defined, the password is hashed and transported securely.
<4> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.19.0`.
<4> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.20.0`.
<5> Optional: Specify `optional` to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify `required` to configure all EC2 instances to use IMDSv2 only.
+
ifdef::openshift-rosa[]

View File

@@ -82,7 +82,7 @@ spec:
+
[IMPORTANT]
====
Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims].
Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims].
====
+
* To enable data obfuscation, define the `dataPolicy` key and required values. For example, to obfuscate IP addresses and workload names, add the following configuration:

View File

@@ -86,7 +86,7 @@ spec:
+
[IMPORTANT]
====
Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims].
Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims].
====
* To enable data obfuscation, define the `dataPolicy` key and required values. For example, to obfuscate IP addresses and workload names, add the following configuration:
+

View File

@@ -43,7 +43,7 @@ endif::openshift-enterprise,openshift-origin[]
ifdef::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
* Maximum number of PIDs per node.
+
The default value depends on link:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.19/html-single/nodes/index#nodes-nodes-resources-configuring[node resources]. In {product-title}, this value is controlled by the link:https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/#system-reserved[`--system-reserved`] parameter, which reserves PIDs on each node based on the total resources of the node.
The default value depends on link:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.20/html-single/nodes/index#nodes-nodes-resources-configuring[node resources]. In {product-title}, this value is controlled by the link:https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/#system-reserved[`--system-reserved`] parameter, which reserves PIDs on each node based on the total resources of the node.
endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[]
When a pod exceeds the allowed maximum number of PIDs per pod, the pod might stop functioning correctly and might be evicted from the node. See link:https://kubernetes.io/docs/concepts/scheduling-eviction/node-pressure-eviction/#eviction-signals-and-thresholds[the Kubernetes documentation for eviction signals and thresholds] for more information.

View File

@@ -45,7 +45,7 @@ Both `http` and `event` trigger functions have the same template structure:
<dependency>
<groupId>junit</groupId>
<artifactId>junit</artifactId>
<version>4.19</version>
<version>4.20</version>
<scope>test</scope>
</dependency>
<dependency>

View File

@@ -39,7 +39,7 @@ $ mkdir -p ./out
+
[source,terminal]
----
$ podman run -it registry.redhat.io/openshift4/openshift-telco-core-rds-rhel9:v4.19 | base64 -d | tar xv -C out
$ podman run -it registry.redhat.io/openshift4/openshift-telco-core-rds-rhel9:v4.20 | base64 -d | tar xv -C out
----
+
You can view the reference configuration in the `out/telco-core-rds/configuration/reference-crs-kube-compare` directory by running the following command:

View File

@@ -100,9 +100,9 @@ $ oc get co
[source,terminal]
----
NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE
authentication 4.19.0-0 True False False 6m18s
baremetal 4.19.0-0 True False False 2m42s
network 4.19.0-0 True True False 5m58s Progressing: …
authentication 4.20.0-0 True False False 6m18s
baremetal 4.20.0-0 True False False 2m42s
network 4.20.0-0 True True False 5m58s Progressing: …
----

View File

@@ -167,11 +167,11 @@ data:
status.failureReason: "" # <2>
status.startTimestamp: "2023-07-31T13:14:38Z" # <3>
status.completionTimestamp: "2023-07-31T13:19:41Z" # <4>
status.result.cnvVersion: 4.19.2 # <5>
status.result.cnvVersion: 4.20.2 # <5>
status.result.defaultStorageClass: trident-nfs <6>
status.result.goldenImagesNoDataSource: <data_import_cron_list> # <7>
status.result.goldenImagesNotUpToDate: <data_import_cron_list> # <8>
status.result.ocpVersion: 4.19.0 # <9>
status.result.ocpVersion: 4.20.0 # <9>
status.result.pvcBound: "true" # <10>
status.result.storageProfileMissingVolumeSnapshotClass: <storage_class_list> # <11>
status.result.storageProfilesWithEmptyClaimPropertySets: <storage_profile_list> # <12>

View File

@@ -53,7 +53,7 @@ spec:
spec:
containers:
- name: kubevirt-api-lifecycle-automation
image: quay.io/openshift-virtualization/kubevirt-api-lifecycle-automation:v4.19 <1>
image: quay.io/openshift-virtualization/kubevirt-api-lifecycle-automation:v4.20 <1>
imagePullPolicy: Always
env:
- name: MACHINE_TYPE_GLOB <2>

View File

@@ -203,7 +203,7 @@ spec:
fieldRef:
fieldPath: spec.nodeName
image: >-
quay.io/openshift-virtualization/wasp-agent:v4.19 <1>
quay.io/openshift-virtualization/wasp-agent:v4.20 <1>
imagePullPolicy: Always
name: wasp-agent
resources:

View File

@@ -14,9 +14,9 @@ The managed route uses the External Route Certificate feature to set the `tls.ex
* You have deployed the SPIRE Server, SPIRE Agent, SPIFFEE CSI Driver, and the SPIRE OIDC Discovery Provider operands in the cluster.
* You have installed the {cert-manager-operator}. For more information, link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/security_and_compliance/index#cert-manager-operator-install[Installing the cert-manager Operator for Red{nbsp}Hat OpenShift].
* You have installed the {cert-manager-operator}. For more information, link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#cert-manager-operator-install[Installing the cert-manager Operator for Red{nbsp}Hat OpenShift].
* You have created a `ClusterIssuer` or `Issuer` configured with a publicly trusted CA service. For example, an Automated Certificate Management Environment (ACME) type `Issuer` with the "Let's Encrypt ACME" service. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/security_and_compliance/index#cert-manager-operator-issuer-acme[Configuring an ACME issuer]
* You have created a `ClusterIssuer` or `Issuer` configured with a publicly trusted CA service. For example, an Automated Certificate Management Environment (ACME) type `Issuer` with the "Let's Encrypt ACME" service. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#cert-manager-operator-issuer-acme[Configuring an ACME issuer]
.Procedure

View File

@@ -11,7 +11,7 @@ Before Vault is used as an OIDC, you need to install Vault.
.Prerequisites
* Configure a route. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/ingress_and_load_balancing/configuring-routes#route-configuration[Route configuration]
* Configure a route. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/ingress_and_load_balancing/configuring-routes#route-configuration[Route configuration]
* Helm is installed.

View File

@@ -34,8 +34,8 @@ spec:
- spoke4
ibuSpec:
seedImageRef:
image: quay.io/seed/image:4.19.0-rc.1
version: 4.19.0-rc.1
image: quay.io/seed/image:4.20.0-rc.1
version: 4.20.0-rc.1
pullSecretRef:
name: "<seed_pull_secret>"
extraManifests:

View File

@@ -34,7 +34,7 @@ spec:
baseDomain: "example.com"
pullSecretRef:
name: "assisted-deployment-pull-secret"
clusterImageSetNameRef: "openshift-4.19"
clusterImageSetNameRef: "openshift-4.20"
sshPublicKey: "ssh-rsa AAAA..."
clusters:
# ...

View File

@@ -49,7 +49,7 @@ a|Configure this field to enable disk encryption with Trusted Platform Module (T
[NOTE]
====
Configuring disk encryption by using the `diskEncryption` field in the `SiteConfig` CR is a Technology Preview feature in {product-title} 4.19.
Configuring disk encryption by using the `diskEncryption` field in the `SiteConfig` CR is a Technology Preview feature in {product-title} 4.20.
====
|`spec.clusters.diskEncryption.type`

View File

@@ -40,7 +40,7 @@ This release of {zero-trust-full} is a Technology Preview.
* The `managedRoute` field is boolean and is set to `true` by default. If set to `false`, the Operator stops managing the route and the existing route will not be deleted automatically. If set back to `true`, the Operator resumes managing the route. If a route does not exist, the Operator creates a new one. If a route already exists, the Operator will override the user configuration if a conflict exists.
* The `externalSecretRef` references an externally managed Secret that has the TLS certificate for the `oidc-discovery-provider` Route host. When provided, this populates the route's `.Spec.TLS.ExternalCertificate` field. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/ingress_and_load_balancing/index#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate]
* The `externalSecretRef` references an externally managed Secret that has the TLS certificate for the `oidc-discovery-provider` Route host. When provided, this populates the route's `.Spec.TLS.ExternalCertificate` field. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/ingress_and_load_balancing/index#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate]
[id="zero-trust-manager-0-2-0-features-ca-ttl_{context}"]
==== Enabling the custom Certificate Authority Time-To-Live for the SPIRE bundle

View File

@@ -16,8 +16,8 @@ spec:
- spoke6
ibuSpec:
seedImageRef: # <2>
image: quay.io/seed/image:4.19.0-rc.1
version: 4.19.0-rc.1
image: quay.io/seed/image:4.20.0-rc.1
version: 4.20.0-rc.1
pullSecretRef:
name: "<seed_pull_secret>"
extraManifests: # <3>