From 42a5c1ca95a17102cd0a8f3beb9a9fba2c8c35f2 Mon Sep 17 00:00:00 2001 From: Andrea Hoffer Date: Tue, 14 Oct 2025 09:45:09 -0400 Subject: [PATCH] OSDOCS#15096: 4.19 -> 4.20 version bump sweep --- ...t-dynamic-accelerator-slicer-operator.adoc | 4 +-- .../microshift-cni-multus-using.adoc | 2 +- .../microshift-operators-oc-mirror.adoc | 2 +- .../microshift-operators-olm.adoc | 2 +- modules/agent-installer-architectures.adoc | 2 +- ...creating-nrop-cr-hosted-control-plane.adoc | 2 +- ...ting-config-files-cluster-install-oci.adoc | 4 +-- modules/external-auth-configuring.adoc | 2 +- modules/external-auth-disabling.adoc | 2 +- modules/hibernating-cluster-hibernate.adoc | 16 +++++----- modules/hibernating-cluster-resume.adoc | 16 +++++----- modules/ibi-create-iso-for-bmh.adoc | 6 ++-- .../ibi-extra-partition-ibi-install-iso.adoc | 2 +- .../insights-operator-one-time-gather.adoc | 2 +- modules/installation-arm-bootstrap.adoc | 4 +-- modules/installation-arm-control-plane.adoc | 4 +-- modules/installation-arm-dns.adoc | 4 +-- modules/installation-arm-image-storage.adoc | 4 +-- modules/installation-arm-vnet.adoc | 4 +-- modules/installation-arm-worker.adoc | 4 +-- ...allation-aws-arm-tested-machine-types.adoc | 2 +- ...installation-aws-tested-machine-types.adoc | 2 +- ...lation-azure-arm-tested-machine-types.adoc | 2 +- ...stallation-azure-tested-machine-types.adoc | 2 +- ...installation-cloudformation-bootstrap.adoc | 2 +- ...allation-cloudformation-control-plane.adoc | 2 +- modules/installation-cloudformation-dns.adoc | 2 +- .../installation-cloudformation-security.adoc | 2 +- modules/installation-cloudformation-vpc.adoc | 2 +- .../installation-cloudformation-worker.adoc | 2 +- ...allation-deployment-manager-bootstrap.adoc | 2 +- ...tion-deployment-manager-control-plane.adoc | 2 +- ...nstallation-deployment-manager-ext-lb.adoc | 2 +- ...ion-deployment-manager-firewall-rules.adoc | 2 +- ...ion-deployment-manager-iam-shared-vpc.adoc | 2 +- ...nstallation-deployment-manager-int-lb.adoc | 2 +- ...lation-deployment-manager-private-dns.adoc | 2 +- .../installation-deployment-manager-vpc.adoc | 2 +- ...nstallation-deployment-manager-worker.adoc | 2 +- ...allation-gcp-tested-machine-types-arm.adoc | 2 +- ...installation-gcp-tested-machine-types.adoc | 2 +- ...lation-ibm-cloud-tested-machine-types.adoc | 2 +- modules/installation-special-config-kmod.adoc | 4 +-- .../installation-special-config-rtkernel.adoc | 2 +- .../installation-user-infra-machines-iso.adoc | 8 ++--- .../installation-user-infra-machines-pxe.adoc | 24 +++++++-------- ...ling-a-cluster-with-multiarch-support.adoc | 2 +- modules/k8s-nmstate-uninstall-operator.adoc | 4 +-- modules/kmm-validation-kickoff.adoc | 6 ++-- ...aintained-credentials-upgrade-extract.adoc | 2 +- .../mirror-registry-release-notes-1-3.adoc | 2 +- ...ewing-monitoring-dashboards-developer.adoc | 2 +- modules/network-flow-matrix.adoc | 20 ++++++------- modules/nodes-nodes-viewing-listing.adoc | 6 ++-- modules/nw-dpu-operator-uninstall.adoc | 4 +-- ...c-mirror-building-image-set-config-v2.adoc | 8 ++--- .../oc-mirror-image-set-config-examples.adoc | 8 ++--- ...-mirror-imageset-config-parameters-v2.adoc | 2 +- modules/rosa-create-objects.adoc | 2 +- ...g-account-wide-iam-roles-and-policies.adoc | 14 ++++----- modules/rosa-hcp-deleting-cluster.adoc | 2 +- ...g-a-cluster-external-auth-cluster-cli.adoc | 2 +- ...a-sts-account-wide-roles-and-policies.adoc | 30 +++++++++---------- ...equirements-attaching-boundary-policy.adoc | 8 ++--- ...ing-a-cluster-with-customizations-cli.adoc | 4 +-- .../running-insights-operator-gather-cli.adoc | 2 +- ...-insights-operator-gather-web-console.adoc | 2 +- .../sd-understanding-process-id-limits.adoc | 2 +- modules/serverless-quarkus-template.adoc | 2 +- modules/using-cluster-compare-telco-core.adoc | 2 +- ...fying-cluster-install-oci-agent-based.adoc | 6 ++-- .../virt-checking-storage-configuration.adoc | 4 +-- modules/virt-updating-multiple-vms.adoc | 2 +- ...-configure-higher-vm-workload-density.adoc | 2 +- .../zero-trust-manager-create-route-oidc.adoc | 4 +-- ...zero-trust-manager-install-vault-oidc.adoc | 2 +- ...mage-based-upgrade-procedure-rollback.adoc | 4 +-- modules/ztp-sno-accelerated-ztp.adoc | 2 +- .../ztp-sno-siteconfig-config-reference.adoc | 2 +- .../nodes-cma-autoscaling-custom-rn.adoc | 2 +- .../zero-trust-manager-release-notes.adoc | 2 +- snippets/ibu-ImageBasedGroupUpgrade.adoc | 4 +-- 82 files changed, 172 insertions(+), 172 deletions(-) diff --git a/hardware_accelerators/das-about-dynamic-accelerator-slicer-operator.adoc b/hardware_accelerators/das-about-dynamic-accelerator-slicer-operator.adoc index 8518cb91d5..eb26fe079b 100644 --- a/hardware_accelerators/das-about-dynamic-accelerator-slicer-operator.adoc +++ b/hardware_accelerators/das-about-dynamic-accelerator-slicer-operator.adoc @@ -44,7 +44,7 @@ include::modules/das-operator-installing-web-console.adoc[leveloffset=+2] ** xref:../hardware_enablement/psap-node-feature-discovery-operator.adoc#psap-node-feature-discovery-operator[Node Feature Discovery (NFD) Operator] ** link:https://docs.nvidia.com/datacenter/cloud-native/openshift/latest/index.html[NVIDIA GPU Operator] -** link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-web-console_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR] +** link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-web-console_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR] //Installing the Dynamic Accelerator Slicer Operator using the CLI include::modules/das-operator-installing-cli.adoc[leveloffset=+2] @@ -53,7 +53,7 @@ include::modules/das-operator-installing-cli.adoc[leveloffset=+2] * xref:../security/cert_manager_operator/cert-manager-operator-install.adoc#cert-manager-operator-install[{cert-manager-operator}] * xref:../hardware_enablement/psap-node-feature-discovery-operator.adoc#psap-node-feature-discovery-operator[Node Feature Discovery (NFD) Operator] * link:https://docs.nvidia.com/datacenter/cloud-native/openshift/latest/index.html[NVIDIA GPU Operator] -* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-cli_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR] +* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/specialized_hardware_and_driver_enablement/psap-node-feature-discovery-operator#creating-nfd-cr-cli_psap-node-feature-discovery-operator[NodeFeatureDiscovery CR] //Uninstalling the Dynamic Accelerator Slicer Operator include::modules/das-operator-uninstalling.adoc[leveloffset=+1] diff --git a/microshift_networking/microshift_multiple_networks/microshift-cni-multus-using.adoc b/microshift_networking/microshift_multiple_networks/microshift-cni-multus-using.adoc index 92f4b839df..b11d0ade4c 100644 --- a/microshift_networking/microshift_multiple_networks/microshift-cni-multus-using.adoc +++ b/microshift_networking/microshift_multiple_networks/microshift-cni-multus-using.adoc @@ -26,4 +26,4 @@ include::modules/microshift-cni-multus-troubleshoot.adoc[leveloffset=+1] == Additional resources * xref:../../microshift_networking/microshift_multiple_networks/microshift-cni-multus.adoc#microshift-cni-multus[About using multiple networks] -* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/hardware_networks/configuring-sriov-net-attach#nw-multus-ipam-object_configuring-sriov-net-attach[Configuration of IP address assignment for a network attachment] \ No newline at end of file +* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/hardware_networks/configuring-sriov-net-attach#nw-multus-ipam-object_configuring-sriov-net-attach[Configuration of IP address assignment for a network attachment] \ No newline at end of file diff --git a/microshift_running_apps/microshift_operators/microshift-operators-oc-mirror.adoc b/microshift_running_apps/microshift_operators/microshift-operators-oc-mirror.adoc index 8afad988bc..2717a576fd 100644 --- a/microshift_running_apps/microshift_operators/microshift-operators-oc-mirror.adoc +++ b/microshift_running_apps/microshift_operators/microshift-operators-oc-mirror.adoc @@ -40,7 +40,7 @@ include::modules/microshift-oc-mirror-install-catalog-node.adoc[leveloffset=+1] * link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-custom-resources-v2_about-installing-oc-mirror-v2[About custom resources generated by oc-mirror plugin v2] * link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-about-cache-and-workspace-dirs_about-installing-oc-mirror-v2[About the --cache-dir and --workspace flags] * link:https://docs.redhat.com/en/documentation/openshift_container_platform/latest/html/operators/administrator-tasks#olm-restricted-networks[Using Operator Lifecycle Manager in disconnected environments] -* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-procedure-delete-v2_about-installing-oc-mirror-v2[Deleting images from a disconnected environment] +* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/disconnected_environments/mirroring-in-disconnected-environments#oc-mirror-procedure-delete-v2_about-installing-oc-mirror-v2[Deleting images from a disconnected environment] {microshift-short} links:: * xref:../../microshift_install_get_ready/microshift-deploy-with-mirror-registry.adoc#microshift-configuring-hosts-for-mirror_microshift-deployment-mirror[Configuring hosts for mirror registry access] diff --git a/microshift_running_apps/microshift_operators/microshift-operators-olm.adoc b/microshift_running_apps/microshift_operators/microshift-operators-olm.adoc index 468b8c8854..c9362c6d22 100644 --- a/microshift_running_apps/microshift_operators/microshift-operators-olm.adoc +++ b/microshift_running_apps/microshift_operators/microshift-operators-olm.adoc @@ -8,7 +8,7 @@ toc::[] Operator Lifecycle Manager (OLM) is used in {microshift-short} for installing and running optional add-on Operators. See the following link for more information: -* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/operators/understanding-operators#operator-lifecycle-manager-olm[Operator Lifecycle Manager] +* link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/operators/understanding-operators#operator-lifecycle-manager-olm[Operator Lifecycle Manager] [id="microshift-olm-considerations_{context}"] == Considerations for using OLM with {microshift-short} diff --git a/modules/agent-installer-architectures.adoc b/modules/agent-installer-architectures.adoc index 65be004525..cfb3bf0e89 100644 --- a/modules/agent-installer-architectures.adoc +++ b/modules/agent-installer-architectures.adoc @@ -27,7 +27,7 @@ $ ./openshift-install version .Example output [source,terminal] ---- -./openshift-install 4.19.0 +./openshift-install 4.20.0 built from commit abc123def456 release image quay.io/openshift-release-dev/ocp-release@sha256:123abc456def789ghi012jkl345mno678pqr901stu234vwx567yz0 release architecture amd64 diff --git a/modules/cnf-creating-nrop-cr-hosted-control-plane.adoc b/modules/cnf-creating-nrop-cr-hosted-control-plane.adoc index a5aac43842..2241289c99 100644 --- a/modules/cnf-creating-nrop-cr-hosted-control-plane.adoc +++ b/modules/cnf-creating-nrop-cr-hosted-control-plane.adoc @@ -39,7 +39,7 @@ $ oc --kubeconfig="$MGMT_KUBECONFIG" get np -A [source,terminal] ---- NAMESPACE NAME CLUSTER DESIRED NODES CURRENT NODES AUTOSCALING AUTOREPAIR VERSION UPDATINGVERSION UPDATINGCONFIG MESSAGE -clusters democluster-us-east-1a democluster 1 1 False False 4.19.0 False False +clusters democluster-us-east-1a democluster 1 1 False False 4.20.0 False False ---- + The `node-pool-name` is the `NAME` field in the output. In this example, the `node-pool-name` is `democluster-us-east-1a`. diff --git a/modules/creating-config-files-cluster-install-oci.adoc b/modules/creating-config-files-cluster-install-oci.adoc index 1280d68782..e22d08e9d3 100644 --- a/modules/creating-config-files-cluster-install-oci.adoc +++ b/modules/creating-config-files-cluster-install-oci.adoc @@ -60,9 +60,9 @@ $ ./openshift-install version .Example output for a shared registry binary [source,terminal,subs="quotes"] ---- -./openshift-install 4.19.0 +./openshift-install 4.20.0 built from commit ae7977b7d1ca908674a0d45c5c243c766fa4b2ca -release image registry.ci.openshift.org/origin/release:4.19ocp-release@sha256:0da6316466d60a3a4535d5fed3589feb0391989982fba59d47d4c729912d6363 +release image registry.ci.openshift.org/origin/release:4.20ocp-release@sha256:0da6316466d60a3a4535d5fed3589feb0391989982fba59d47d4c729912d6363 release architecture amd64 ---- ==== diff --git a/modules/external-auth-configuring.adoc b/modules/external-auth-configuring.adoc index 2d8db90bc6..aabdbb3350 100644 --- a/modules/external-auth-configuring.adoc +++ b/modules/external-auth-configuring.adoc @@ -132,7 +132,7 @@ $ oc get co kube-apiserver [source,terminal] ---- NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE -kube-apiserver 4.19.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 8; 1 node is at revision 10 +kube-apiserver 4.20.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 8; 1 node is at revision 10 ---- + The message in the preceding example shows that one node has progressed to the new revision and two nodes have not yet updated. It can take 20 minutes or more to roll out the new revision to all nodes, depending on the size of your cluster. diff --git a/modules/external-auth-disabling.adoc b/modules/external-auth-disabling.adoc index f4b195baa3..f37d9a6ba9 100644 --- a/modules/external-auth-disabling.adoc +++ b/modules/external-auth-disabling.adoc @@ -42,7 +42,7 @@ $ oc get co kube-apiserver [source,terminal] ---- NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE -kube-apiserver 4.19.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 12; 1 node is at revision 14 +kube-apiserver 4.20.0 True True False 85m NodeInstallerProgressing: 2 node are at revision 12; 1 node is at revision 14 ---- + The message in the preceding example shows that one node has progressed to the new revision and two nodes have not yet updated. It can take 20 minutes or more to roll out the new revision to all nodes, depending on the size of your cluster. diff --git a/modules/hibernating-cluster-hibernate.adoc b/modules/hibernating-cluster-hibernate.adoc index 041597d264..bddff97a1d 100644 --- a/modules/hibernating-cluster-hibernate.adoc +++ b/modules/hibernating-cluster-hibernate.adoc @@ -57,14 +57,14 @@ $ oc get clusteroperators [source,terminal] ---- NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE -authentication 4.19.0-0 True False False 51m -baremetal 4.19.0-0 True False False 72m -cloud-controller-manager 4.19.0-0 True False False 75m -cloud-credential 4.19.0-0 True False False 77m -cluster-api 4.19.0-0 True False False 42m -cluster-autoscaler 4.19.0-0 True False False 72m -config-operator 4.19.0-0 True False False 72m -console 4.19.0-0 True False False 55m +authentication 4.20.0-0 True False False 51m +baremetal 4.20.0-0 True False False 72m +cloud-controller-manager 4.20.0-0 True False False 75m +cloud-credential 4.20.0-0 True False False 77m +cluster-api 4.20.0-0 True False False 42m +cluster-autoscaler 4.20.0-0 True False False 72m +config-operator 4.20.0-0 True False False 72m +console 4.20.0-0 True False False 55m ... ---- + diff --git a/modules/hibernating-cluster-resume.adoc b/modules/hibernating-cluster-resume.adoc index 237d45d98f..b52a82c284 100644 --- a/modules/hibernating-cluster-resume.adoc +++ b/modules/hibernating-cluster-resume.adoc @@ -104,14 +104,14 @@ $ oc get clusteroperators [source,terminal] ---- NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE -authentication 4.19.0-0 True False False 51m -baremetal 4.19.0-0 True False False 72m -cloud-controller-manager 4.19.0-0 True False False 75m -cloud-credential 4.19.0-0 True False False 77m -cluster-api 4.19.0-0 True False False 42m -cluster-autoscaler 4.19.0-0 True False False 72m -config-operator 4.19.0-0 True False False 72m -console 4.19.0-0 True False False 55m +authentication 4.20.0-0 True False False 51m +baremetal 4.20.0-0 True False False 72m +cloud-controller-manager 4.20.0-0 True False False 75m +cloud-credential 4.20.0-0 True False False 77m +cluster-api 4.20.0-0 True False False 42m +cluster-autoscaler 4.20.0-0 True False False 72m +config-operator 4.20.0-0 True False False 72m +console 4.20.0-0 True False False 55m ... ---- + diff --git a/modules/ibi-create-iso-for-bmh.adoc b/modules/ibi-create-iso-for-bmh.adoc index de379821c2..256c511d6b 100644 --- a/modules/ibi-create-iso-for-bmh.adoc +++ b/modules/ibi-create-iso-for-bmh.adoc @@ -59,8 +59,8 @@ kind: ImageBasedInstallationConfig metadata: name: example-image-based-installation-config # The following fields are required -seedImage: quay.io/openshift-kni/seed-image:4.19.0 -seedVersion: 4.19.0 +seedImage: quay.io/openshift-kni/seed-image:4.20.0 +seedVersion: 4.20.0 installationDisk: /dev/vda pullSecret: '' # networkConfig is optional and contains the network configuration for the host in NMState format. @@ -89,7 +89,7 @@ kind: ImageBasedInstallationConfig metadata: name: example-image-based-installation-config seedImage: quay.io/repo-id/seed:latest -seedVersion: "4.19.0" +seedVersion: "4.20.0" extraPartitionStart: "-240G" installationDisk: /dev/disk/by-id/wwn-0x62c... sshKey: 'ssh-ed25519 AAAA...' diff --git a/modules/ibi-extra-partition-ibi-install-iso.adoc b/modules/ibi-extra-partition-ibi-install-iso.adoc index 22deecade2..a3577647d0 100644 --- a/modules/ibi-extra-partition-ibi-install-iso.adoc +++ b/modules/ibi-extra-partition-ibi-install-iso.adoc @@ -27,7 +27,7 @@ kind: ImageBasedInstallationConfig metadata: name: example-extra-partition seedImage: quay.io/repo-id/seed:latest -seedVersion: "4.19.0" +seedVersion: "4.20.0" installationDisk: /dev/sda pullSecret: '{"auths": ...}' # ... diff --git a/modules/insights-operator-one-time-gather.adoc b/modules/insights-operator-one-time-gather.adoc index 98beec0d5d..50e62a2d73 100644 --- a/modules/insights-operator-one-time-gather.adoc +++ b/modules/insights-operator-one-time-gather.adoc @@ -20,7 +20,7 @@ You must run a gather operation to create an Insights Operator archive. + [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/insights-operator/release-4.19/docs/gather-job.yaml[] +include::https://raw.githubusercontent.com/openshift/insights-operator/release-4.20/docs/gather-job.yaml[] ---- . Copy your `insights-operator` image version: + diff --git a/modules/installation-arm-bootstrap.adoc b/modules/installation-arm-bootstrap.adoc index 6bc87abfb9..c133a23849 100644 --- a/modules/installation-arm-bootstrap.adoc +++ b/modules/installation-arm-bootstrap.adoc @@ -20,10 +20,10 @@ bootstrap machine that you need for your {product-title} cluster: [source,json] ---- ifndef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/04_bootstrap.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/04_bootstrap.json[] endif::ash[] ifdef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/04_bootstrap.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/04_bootstrap.json[] endif::ash[] ---- ==== diff --git a/modules/installation-arm-control-plane.adoc b/modules/installation-arm-control-plane.adoc index 713277d2cb..afda343861 100644 --- a/modules/installation-arm-control-plane.adoc +++ b/modules/installation-arm-control-plane.adoc @@ -20,10 +20,10 @@ control plane machines that you need for your {product-title} cluster: [source,json] ---- ifndef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/05_masters.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/05_masters.json[] endif::ash[] ifdef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/05_masters.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/05_masters.json[] endif::ash[] ---- ==== diff --git a/modules/installation-arm-dns.adoc b/modules/installation-arm-dns.adoc index f44e3e1aa7..169eea0367 100644 --- a/modules/installation-arm-dns.adoc +++ b/modules/installation-arm-dns.adoc @@ -21,10 +21,10 @@ cluster: [source,json] ---- ifndef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/03_infra.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/03_infra.json[] endif::ash[] ifdef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/03_infra.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/03_infra.json[] endif::ash[] ---- ==== diff --git a/modules/installation-arm-image-storage.adoc b/modules/installation-arm-image-storage.adoc index f786b7b9bb..6c3371ef36 100644 --- a/modules/installation-arm-image-storage.adoc +++ b/modules/installation-arm-image-storage.adoc @@ -20,10 +20,10 @@ stored {op-system-first} image that you need for your {product-title} cluster: [source,json] ---- ifndef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/02_storage.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/02_storage.json[] endif::ash[] ifdef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/02_storage.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/02_storage.json[] endif::ash[] ---- ==== diff --git a/modules/installation-arm-vnet.adoc b/modules/installation-arm-vnet.adoc index e68e6fb183..198a3d2a53 100644 --- a/modules/installation-arm-vnet.adoc +++ b/modules/installation-arm-vnet.adoc @@ -20,10 +20,10 @@ VNet that you need for your {product-title} cluster: [source,json] ---- ifndef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/01_vnet.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/01_vnet.json[] endif::ash[] ifdef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/01_vnet.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/01_vnet.json[] endif::ash[] ---- ==== diff --git a/modules/installation-arm-worker.adoc b/modules/installation-arm-worker.adoc index 991a652134..9b968bbdca 100644 --- a/modules/installation-arm-worker.adoc +++ b/modules/installation-arm-worker.adoc @@ -20,10 +20,10 @@ worker machines that you need for your {product-title} cluster: [source,json] ---- ifndef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azure/06_workers.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azure/06_workers.json[] endif::ash[] ifdef::ash[] -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/azurestack/06_workers.json[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/azurestack/06_workers.json[] endif::ash[] ---- ==== diff --git a/modules/installation-aws-arm-tested-machine-types.adoc b/modules/installation-aws-arm-tested-machine-types.adoc index 7450b6686e..d978c621fe 100644 --- a/modules/installation-aws-arm-tested-machine-types.adoc +++ b/modules/installation-aws-arm-tested-machine-types.adoc @@ -22,5 +22,5 @@ Use the machine types included in the following charts for your AWS ARM instance .Machine types based on 64-bit ARM architecture [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/aws/tested_instance_types_aarch64.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/aws/tested_instance_types_aarch64.md[] ==== diff --git a/modules/installation-aws-tested-machine-types.adoc b/modules/installation-aws-tested-machine-types.adoc index c21d061a59..222998420b 100644 --- a/modules/installation-aws-tested-machine-types.adoc +++ b/modules/installation-aws-tested-machine-types.adoc @@ -46,7 +46,7 @@ ifndef::local-zone,wavelength-zone,secretregion[] .Machine types based on 64-bit x86 architecture [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/aws/tested_instance_types_x86_64.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/aws/tested_instance_types_x86_64.md[] ==== endif::local-zone,wavelength-zone,secretregion[] ifdef::local-zone[] diff --git a/modules/installation-azure-arm-tested-machine-types.adoc b/modules/installation-azure-arm-tested-machine-types.adoc index 3c3a93840d..a66b350629 100644 --- a/modules/installation-azure-arm-tested-machine-types.adoc +++ b/modules/installation-azure-arm-tested-machine-types.adoc @@ -18,5 +18,5 @@ The following Microsoft Azure ARM64 instance types have been tested with {produc .Machine types based on 64-bit ARM architecture [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/azure/tested_instance_types_aarch64.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/azure/tested_instance_types_aarch64.md[] ==== diff --git a/modules/installation-azure-tested-machine-types.adoc b/modules/installation-azure-tested-machine-types.adoc index 232e9668c0..43a77c99bd 100644 --- a/modules/installation-azure-tested-machine-types.adoc +++ b/modules/installation-azure-tested-machine-types.adoc @@ -17,5 +17,5 @@ The following Microsoft Azure instance types have been tested with {product-titl .Machine types based on 64-bit x86 architecture [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/azure/tested_instance_types_x86_64.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/azure/tested_instance_types_x86_64.md[] ==== diff --git a/modules/installation-cloudformation-bootstrap.adoc b/modules/installation-cloudformation-bootstrap.adoc index 3636aacb21..42e812fc98 100644 --- a/modules/installation-cloudformation-bootstrap.adoc +++ b/modules/installation-cloudformation-bootstrap.adoc @@ -13,6 +13,6 @@ You can use the following CloudFormation template to deploy the bootstrap machin ==== [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/04_cluster_bootstrap.yaml[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/04_cluster_bootstrap.yaml[] ---- ==== diff --git a/modules/installation-cloudformation-control-plane.adoc b/modules/installation-cloudformation-control-plane.adoc index e2d98f7943..79ef5e8bf0 100644 --- a/modules/installation-cloudformation-control-plane.adoc +++ b/modules/installation-cloudformation-control-plane.adoc @@ -14,6 +14,6 @@ machines that you need for your {product-title} cluster. ==== [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/05_cluster_master_nodes.yaml[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/05_cluster_master_nodes.yaml[] ---- ==== diff --git a/modules/installation-cloudformation-dns.adoc b/modules/installation-cloudformation-dns.adoc index f2501cad99..efc203a1b5 100644 --- a/modules/installation-cloudformation-dns.adoc +++ b/modules/installation-cloudformation-dns.adoc @@ -14,7 +14,7 @@ objects and load balancers that you need for your {product-title} cluster. ==== [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/02_cluster_infra.yaml[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/02_cluster_infra.yaml[] ---- ==== diff --git a/modules/installation-cloudformation-security.adoc b/modules/installation-cloudformation-security.adoc index 2136330ba8..94cde8cb92 100644 --- a/modules/installation-cloudformation-security.adoc +++ b/modules/installation-cloudformation-security.adoc @@ -14,6 +14,6 @@ that you need for your {product-title} cluster. ==== [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/03_cluster_security.yaml[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/03_cluster_security.yaml[] ---- ==== diff --git a/modules/installation-cloudformation-vpc.adoc b/modules/installation-cloudformation-vpc.adoc index 598da4d294..300666fecb 100644 --- a/modules/installation-cloudformation-vpc.adoc +++ b/modules/installation-cloudformation-vpc.adoc @@ -14,6 +14,6 @@ you need for your {product-title} cluster. ==== [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/01_vpc.yaml[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/01_vpc.yaml[] ---- ==== diff --git a/modules/installation-cloudformation-worker.adoc b/modules/installation-cloudformation-worker.adoc index 4748dfc7a6..b938227eab 100644 --- a/modules/installation-cloudformation-worker.adoc +++ b/modules/installation-cloudformation-worker.adoc @@ -14,6 +14,6 @@ You can deploy the compute machines that you need for your {product-title} clust ==== [source,yaml] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/aws/cloudformation/06_cluster_worker_node.yaml[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/aws/cloudformation/06_cluster_worker_node.yaml[] ---- ==== \ No newline at end of file diff --git a/modules/installation-deployment-manager-bootstrap.adoc b/modules/installation-deployment-manager-bootstrap.adoc index 0311596bfd..77e144d803 100644 --- a/modules/installation-deployment-manager-bootstrap.adoc +++ b/modules/installation-deployment-manager-bootstrap.adoc @@ -14,6 +14,6 @@ machine that you need for your {product-title} cluster: ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/04_bootstrap.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/04_bootstrap.py[] ---- ==== diff --git a/modules/installation-deployment-manager-control-plane.adoc b/modules/installation-deployment-manager-control-plane.adoc index 580fe3f9de..e417eec895 100644 --- a/modules/installation-deployment-manager-control-plane.adoc +++ b/modules/installation-deployment-manager-control-plane.adoc @@ -14,6 +14,6 @@ plane machines that you need for your {product-title} cluster: ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/05_control_plane.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/05_control_plane.py[] ---- ==== diff --git a/modules/installation-deployment-manager-ext-lb.adoc b/modules/installation-deployment-manager-ext-lb.adoc index 429bf065a4..96c35b69a9 100644 --- a/modules/installation-deployment-manager-ext-lb.adoc +++ b/modules/installation-deployment-manager-ext-lb.adoc @@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the external loa ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/02_lb_ext.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/02_lb_ext.py[] ---- ==== diff --git a/modules/installation-deployment-manager-firewall-rules.adoc b/modules/installation-deployment-manager-firewall-rules.adoc index 1e3ee736cf..7d3ee5fcc8 100644 --- a/modules/installation-deployment-manager-firewall-rules.adoc +++ b/modules/installation-deployment-manager-firewall-rules.adoc @@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the firewall rue ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/03_firewall.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/03_firewall.py[] ---- ==== diff --git a/modules/installation-deployment-manager-iam-shared-vpc.adoc b/modules/installation-deployment-manager-iam-shared-vpc.adoc index 1052abc053..0df58ace83 100644 --- a/modules/installation-deployment-manager-iam-shared-vpc.adoc +++ b/modules/installation-deployment-manager-iam-shared-vpc.adoc @@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the IAM roles th ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/03_iam.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/03_iam.py[] ---- ==== diff --git a/modules/installation-deployment-manager-int-lb.adoc b/modules/installation-deployment-manager-int-lb.adoc index 88789b2656..b8212d51fd 100644 --- a/modules/installation-deployment-manager-int-lb.adoc +++ b/modules/installation-deployment-manager-int-lb.adoc @@ -12,7 +12,7 @@ You can use the following Deployment Manager template to deploy the internal loa ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/02_lb_int.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/02_lb_int.py[] ---- ==== diff --git a/modules/installation-deployment-manager-private-dns.adoc b/modules/installation-deployment-manager-private-dns.adoc index d9e09580b4..be123c0586 100644 --- a/modules/installation-deployment-manager-private-dns.adoc +++ b/modules/installation-deployment-manager-private-dns.adoc @@ -12,6 +12,6 @@ You can use the following Deployment Manager template to deploy the private DNS ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/02_dns.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/02_dns.py[] ---- ==== diff --git a/modules/installation-deployment-manager-vpc.adoc b/modules/installation-deployment-manager-vpc.adoc index e74f7b8d4b..f08f9f121d 100644 --- a/modules/installation-deployment-manager-vpc.adoc +++ b/modules/installation-deployment-manager-vpc.adoc @@ -14,6 +14,6 @@ you need for your {product-title} cluster: ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/01_vpc.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/01_vpc.py[] ---- ==== diff --git a/modules/installation-deployment-manager-worker.adoc b/modules/installation-deployment-manager-worker.adoc index 563a85543b..784c607871 100644 --- a/modules/installation-deployment-manager-worker.adoc +++ b/modules/installation-deployment-manager-worker.adoc @@ -14,6 +14,6 @@ that you need for your {product-title} cluster: ==== [source,python] ---- -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/upi/gcp/06_worker.py[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/upi/gcp/06_worker.py[] ---- ==== diff --git a/modules/installation-gcp-tested-machine-types-arm.adoc b/modules/installation-gcp-tested-machine-types-arm.adoc index 61f4f9c17d..fb088e573b 100644 --- a/modules/installation-gcp-tested-machine-types-arm.adoc +++ b/modules/installation-gcp-tested-machine-types-arm.adoc @@ -18,5 +18,5 @@ The following Google Cloud Platform (GCP) 64-bit ARM instance types have been te .Machine series for 64-bit ARM machines [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/gcp/tested_instance_types_arm.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/gcp/tested_instance_types_arm.md[] ==== \ No newline at end of file diff --git a/modules/installation-gcp-tested-machine-types.adoc b/modules/installation-gcp-tested-machine-types.adoc index cecebccd05..3e9c2432bb 100644 --- a/modules/installation-gcp-tested-machine-types.adoc +++ b/modules/installation-gcp-tested-machine-types.adoc @@ -25,5 +25,5 @@ Some instance types require the use of Hyperdisk storage. If you use an instance .Machine series [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/gcp/tested_instance_types.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/gcp/tested_instance_types.md[] ==== diff --git a/modules/installation-ibm-cloud-tested-machine-types.adoc b/modules/installation-ibm-cloud-tested-machine-types.adoc index c5dfd3beb2..10f4ebe49d 100644 --- a/modules/installation-ibm-cloud-tested-machine-types.adoc +++ b/modules/installation-ibm-cloud-tested-machine-types.adoc @@ -15,5 +15,5 @@ The following {ibm-cloud-name} instance types have been tested with {product-tit .Machine series [%collapsible] ==== -include::https://raw.githubusercontent.com/openshift/installer/release-4.19/docs/user/ibmcloud/tested_instance_types_x86_64.md[] +include::https://raw.githubusercontent.com/openshift/installer/release-4.20/docs/user/ibmcloud/tested_instance_types_x86_64.md[] ==== \ No newline at end of file diff --git a/modules/installation-special-config-kmod.adoc b/modules/installation-special-config-kmod.adoc index 4c0fbc5433..4490d81bf3 100644 --- a/modules/installation-special-config-kmod.adoc +++ b/modules/installation-special-config-kmod.adoc @@ -239,10 +239,10 @@ $ sudo spkut 44 .Example output [source,terminal] ---- -KVC: wrapper simple-kmod for 4.19.0-147.3.1.el8_1.x86_64 +KVC: wrapper simple-kmod for 4.20.0-147.3.1.el8_1.x86_64 Running userspace wrapper using the kernel module container... + podman run -i --rm --privileged - simple-kmod-dd1a7d4:4.19.0-147.3.1.el8_1.x86_64 spkut 44 + simple-kmod-dd1a7d4:4.20.0-147.3.1.el8_1.x86_64 spkut 44 simple-procfs-kmod number = 0 simple-procfs-kmod number = 44 ---- diff --git a/modules/installation-special-config-rtkernel.adoc b/modules/installation-special-config-rtkernel.adoc index 0c9a13a6af..ec24e148e9 100644 --- a/modules/installation-special-config-rtkernel.adoc +++ b/modules/installation-special-config-rtkernel.adoc @@ -120,7 +120,7 @@ sh-4.4# uname -a .Example output [source,terminal] ---- -Linux 4.19.0-147.3.1.rt24.96.el8_1.x86_64 #1 SMP PREEMPT RT +Linux 4.20.0-147.3.1.rt24.96.el8_1.x86_64 #1 SMP PREEMPT RT Wed Nov 27 18:29:55 UTC 2019 x86_64 x86_64 x86_64 GNU/Linux ---- + diff --git a/modules/installation-user-infra-machines-iso.adoc b/modules/installation-user-infra-machines-iso.adoc index cbc99a8375..1503ae260c 100644 --- a/modules/installation-user-infra-machines-iso.adoc +++ b/modules/installation-user-infra-machines-iso.adoc @@ -88,10 +88,10 @@ $ openshift-install coreos print-stream-json | grep '\.iso[^.]' [source,terminal] ifndef::openshift-origin[] ---- -"location": "/art/storage/releases/rhcos-4.19-aarch64//aarch64/rhcos--live.aarch64.iso", -"location": "/art/storage/releases/rhcos-4.19-ppc64le//ppc64le/rhcos--live.ppc64le.iso", -"location": "/art/storage/releases/rhcos-4.19-s390x//s390x/rhcos--live.s390x.iso", -"location": "/art/storage/releases/rhcos-4.19//x86_64/rhcos--live.x86_64.iso", +"location": "/art/storage/releases/rhcos-4.20-aarch64//aarch64/rhcos--live.aarch64.iso", +"location": "/art/storage/releases/rhcos-4.20-ppc64le//ppc64le/rhcos--live.ppc64le.iso", +"location": "/art/storage/releases/rhcos-4.20-s390x//s390x/rhcos--live.s390x.iso", +"location": "/art/storage/releases/rhcos-4.20//x86_64/rhcos--live.x86_64.iso", ---- endif::openshift-origin[] ifdef::openshift-origin[] diff --git a/modules/installation-user-infra-machines-pxe.adoc b/modules/installation-user-infra-machines-pxe.adoc index 4d7d2abc26..5af4bbac9b 100644 --- a/modules/installation-user-infra-machines-pxe.adoc +++ b/modules/installation-user-infra-machines-pxe.adoc @@ -101,18 +101,18 @@ $ openshift-install coreos print-stream-json | grep -Eo '"https.*(kernel-|initra [source,terminal] ifndef::openshift-origin[] ---- -"/art/storage/releases/rhcos-4.19-aarch64//aarch64/rhcos--live-kernel-aarch64" -"/art/storage/releases/rhcos-4.19-aarch64//aarch64/rhcos--live-initramfs.aarch64.img" -"/art/storage/releases/rhcos-4.19-aarch64//aarch64/rhcos--live-rootfs.aarch64.img" -"/art/storage/releases/rhcos-4.19-ppc64le/49.84.202110081256-0/ppc64le/rhcos--live-kernel-ppc64le" -"/art/storage/releases/rhcos-4.19-ppc64le//ppc64le/rhcos--live-initramfs.ppc64le.img" -"/art/storage/releases/rhcos-4.19-ppc64le//ppc64le/rhcos--live-rootfs.ppc64le.img" -"/art/storage/releases/rhcos-4.19-s390x//s390x/rhcos--live-kernel-s390x" -"/art/storage/releases/rhcos-4.19-s390x//s390x/rhcos--live-initramfs.s390x.img" -"/art/storage/releases/rhcos-4.19-s390x//s390x/rhcos--live-rootfs.s390x.img" -"/art/storage/releases/rhcos-4.19//x86_64/rhcos--live-kernel-x86_64" -"/art/storage/releases/rhcos-4.19//x86_64/rhcos--live-initramfs.x86_64.img" -"/art/storage/releases/rhcos-4.19//x86_64/rhcos--live-rootfs.x86_64.img" +"/art/storage/releases/rhcos-4.20-aarch64//aarch64/rhcos--live-kernel-aarch64" +"/art/storage/releases/rhcos-4.20-aarch64//aarch64/rhcos--live-initramfs.aarch64.img" +"/art/storage/releases/rhcos-4.20-aarch64//aarch64/rhcos--live-rootfs.aarch64.img" +"/art/storage/releases/rhcos-4.20-ppc64le/49.84.202110081256-0/ppc64le/rhcos--live-kernel-ppc64le" +"/art/storage/releases/rhcos-4.20-ppc64le//ppc64le/rhcos--live-initramfs.ppc64le.img" +"/art/storage/releases/rhcos-4.20-ppc64le//ppc64le/rhcos--live-rootfs.ppc64le.img" +"/art/storage/releases/rhcos-4.20-s390x//s390x/rhcos--live-kernel-s390x" +"/art/storage/releases/rhcos-4.20-s390x//s390x/rhcos--live-initramfs.s390x.img" +"/art/storage/releases/rhcos-4.20-s390x//s390x/rhcos--live-rootfs.s390x.img" +"/art/storage/releases/rhcos-4.20//x86_64/rhcos--live-kernel-x86_64" +"/art/storage/releases/rhcos-4.20//x86_64/rhcos--live-initramfs.x86_64.img" +"/art/storage/releases/rhcos-4.20//x86_64/rhcos--live-rootfs.x86_64.img" ---- endif::openshift-origin[] ifdef::openshift-origin[] diff --git a/modules/installing-a-cluster-with-multiarch-support.adoc b/modules/installing-a-cluster-with-multiarch-support.adoc index 8bcfad7774..3a9eca63f7 100644 --- a/modules/installing-a-cluster-with-multiarch-support.adoc +++ b/modules/installing-a-cluster-with-multiarch-support.adoc @@ -22,7 +22,7 @@ $ ./openshift-install version .Example output [source,terminal] ---- -./openshift-install 4.19.0 +./openshift-install 4.20.0 built from commit abc123etc release image quay.io/openshift-release-dev/ocp-release@sha256:abc123wxyzetc release architecture multi diff --git a/modules/k8s-nmstate-uninstall-operator.adoc b/modules/k8s-nmstate-uninstall-operator.adoc index 4a51eefe9f..24e894ea6b 100644 --- a/modules/k8s-nmstate-uninstall-operator.adoc +++ b/modules/k8s-nmstate-uninstall-operator.adoc @@ -38,14 +38,14 @@ $ oc get --namespace openshift-nmstate clusterserviceversion [source,terminal] ---- NAME DISPLAY VERSION REPLACES PHASE -kubernetes-nmstate-operator.v4.19.0 Kubernetes NMState Operator 4.19.0 Succeeded +kubernetes-nmstate-operator.v4.20.0 Kubernetes NMState Operator 4.20.0 Succeeded ---- . Delete the CSV resource. After you delete the file, {olm} deletes certain resources, such as `RBAC`, that it created for the Operator. + [source,terminal] ---- -$ oc delete --namespace openshift-nmstate clusterserviceversion kubernetes-nmstate-operator.v4.19.0 +$ oc delete --namespace openshift-nmstate clusterserviceversion kubernetes-nmstate-operator.v4.20.0 ---- . Delete the `nmstate` CR and any associated `Deployment` resources by running the following commands: diff --git a/modules/kmm-validation-kickoff.adoc b/modules/kmm-validation-kickoff.adoc index acd5a543d8..6793e265a7 100644 --- a/modules/kmm-validation-kickoff.adoc +++ b/modules/kmm-validation-kickoff.adoc @@ -15,13 +15,13 @@ You can obtain the image by running one of the following commands in the cluster [source,terminal] ---- # For x86_64 image: -$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.19.0-x86_64 --image-for=driver-toolkit +$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.20.0-x86_64 --image-for=driver-toolkit ---- + [source,terminal] ---- # For ARM64 image: -$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.19.0-aarch64 --image-for=driver-toolkit +$ oc adm release info quay.io/openshift-release-dev/ocp-release:4.20.0-aarch64 --image-for=driver-toolkit ---- `kernelVersion`:: Required field that provides the version of the kernel that the cluster is upgraded to. @@ -30,7 +30,7 @@ You can obtain the version by running the following command in the cluster: + [source,terminal] ---- -$ podman run -it --rm $(oc adm release info quay.io/openshift-release-dev/ocp-release:4.19.0-x86_64 --image-for=driver-toolkit) cat /etc/driver-toolkit-release.json +$ podman run -it --rm $(oc adm release info quay.io/openshift-release-dev/ocp-release:4.20.0-x86_64 --image-for=driver-toolkit) cat /etc/driver-toolkit-release.json ---- `pushBuiltImage`:: If `true`, then the images created during the Build and Sign validation are pushed to their repositories. This field is `false` by default. diff --git a/modules/manually-maintained-credentials-upgrade-extract.adoc b/modules/manually-maintained-credentials-upgrade-extract.adoc index 6dd837d1ec..eaf9f1c4f5 100644 --- a/modules/manually-maintained-credentials-upgrade-extract.adoc +++ b/modules/manually-maintained-credentials-upgrade-extract.adoc @@ -32,7 +32,7 @@ The output of this command includes pull specs for the available updates similar Recommended updates: VERSION IMAGE -4.19.0 quay.io/openshift-release-dev/ocp-release@sha256:6a899c54dda6b844bb12a247e324a0f6cde367e880b73ba110c056df6d018032 +4.20.0 quay.io/openshift-release-dev/ocp-release@sha256:6a899c54dda6b844bb12a247e324a0f6cde367e880b73ba110c056df6d018032 ... ---- diff --git a/modules/mirror-registry-release-notes-1-3.adoc b/modules/mirror-registry-release-notes-1-3.adoc index 6c686f6191..85317f7634 100644 --- a/modules/mirror-registry-release-notes-1-3.adoc +++ b/modules/mirror-registry-release-notes-1-3.adoc @@ -6,4 +6,4 @@ [id="mirror-registry-release-notes-1-3_{context}"] = Mirror registry for Red{nbsp}Hat OpenShift 1.3 release notes -To view the _mirror registry for Red{nbsp}Hat OpenShift_ 1.3 release notes, see link:https://docs.openshift.com/container-platform/4.19/installing/disconnected_install/installing-mirroring-creating-registry.html#mirror-registry-release-notes-1-3_installing-mirroring-creating-registry[Mirror registry for Red{nbsp}Hat OpenShift 1.3 release notes]. \ No newline at end of file +To view the _mirror registry for Red{nbsp}Hat OpenShift_ 1.3 release notes, see link:https://docs.openshift.com/container-platform/4.20/installing/disconnected_install/installing-mirroring-creating-registry.html#mirror-registry-release-notes-1-3_installing-mirroring-creating-registry[Mirror registry for Red{nbsp}Hat OpenShift 1.3 release notes]. \ No newline at end of file diff --git a/modules/monitoring-reviewing-monitoring-dashboards-developer.adoc b/modules/monitoring-reviewing-monitoring-dashboards-developer.adoc index 3eb1fe0ee1..7376dd971d 100644 --- a/modules/monitoring-reviewing-monitoring-dashboards-developer.adoc +++ b/modules/monitoring-reviewing-monitoring-dashboards-developer.adoc @@ -14,7 +14,7 @@ include::snippets/unified-perspective-web-console.adoc[] * You have access to the cluster as a developer or as a user. * You have view permissions for the project that you are viewing the dashboard for. -* A cluster administrator has link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/web_console/index#enabling-developer-perspective_web-console_web-console-overview[enabled the *Developer* perspective] in the web console. +* A cluster administrator has link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/web_console/index#enabling-developer-perspective_web-console_web-console-overview[enabled the *Developer* perspective] in the web console. .Procedure diff --git a/modules/network-flow-matrix.adoc b/modules/network-flow-matrix.adoc index f6ce44de15..2bbb7f664c 100644 --- a/modules/network-flow-matrix.adoc +++ b/modules/network-flow-matrix.adoc @@ -23,13 +23,13 @@ Additionally, consider the following dynamic port ranges when managing ingress t To view or download the complete raw CSV content for an environment, see the following resources: -* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/bm.csv[{product-title} on bare metal] +* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/bm.csv[{product-title} on bare metal] -* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/none-sno.csv[{sno-caps} with other platforms] +* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/none-sno.csv[{sno-caps} with other platforms] -* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/aws.csv[{product-title} on {aws-short}] +* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/aws.csv[{product-title} on {aws-short}] -* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/raw/aws-sno.csv[{sno-caps} on {aws-short}] +* link:https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/raw/aws-sno.csv[{sno-caps} on {aws-short}] [NOTE] ==== @@ -50,14 +50,14 @@ For base ingress flows to {sno} clusters, see the _Control plane node base flows .Control plane node base flows [%header,format=csv] |=== -include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/common-master.csv[] +include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/common-master.csv[] |=== [id="network-flow-matrix-worker_{context}"] .Worker node base flows [%header,format=csv] |=== -include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/common-worker.csv[] +include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/common-worker.csv[] |=== [id="network-flow-matrix-bm_{context}"] @@ -68,7 +68,7 @@ In addition to the base network flows, the following matrix describes the ingres .{product-title} on bare metal [%header,format=csv] |=== -include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/bm.csv[] +include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/bm.csv[] |=== [id="network-flow-matrix-sno_{context}"] @@ -79,7 +79,7 @@ In addition to the base network flows, the following matrix describes the ingres .{sno-caps} with other platforms [%header,format=csv] |=== -include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/none-sno.csv[] +include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/none-sno.csv[] |=== [id="network-flow-matrix-aws_{context}"] @@ -90,7 +90,7 @@ In addition to the base network flows, the following matrix describes the ingres .{product-title} on AWS [%header,format=csv] |=== -include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/aws.csv[] +include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/aws.csv[] |=== [id="network-flow-matrix-aws-sno_{context}"] @@ -101,5 +101,5 @@ In addition to the base network flows, the following matrix describes the ingres .{sno-caps} on AWS [%header,format=csv] |=== -include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.19/docs/stable/unique/aws-sno.csv[] +include::https://raw.githubusercontent.com/openshift-kni/commatrix/release-4.20/docs/stable/unique/aws-sno.csv[] |=== \ No newline at end of file diff --git a/modules/nodes-nodes-viewing-listing.adoc b/modules/nodes-nodes-viewing-listing.adoc index b0a6b1aecc..3fab77913d 100644 --- a/modules/nodes-nodes-viewing-listing.adoc +++ b/modules/nodes-nodes-viewing-listing.adoc @@ -60,9 +60,9 @@ $ oc get nodes -o wide [source,terminal] ---- NAME STATUS ROLES AGE VERSION INTERNAL-IP EXTERNAL-IP OS-IMAGE KERNEL-VERSION CONTAINER-RUNTIME -master.example.com Ready master 171m v1.33.4 10.0.129.108 Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.19.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev -node1.example.com Ready worker 72m v1.33.4 10.0.129.222 Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.19.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev -node2.example.com Ready worker 164m v1.33.4 10.0.142.150 Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.19.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev +master.example.com Ready master 171m v1.33.4 10.0.129.108 Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.20.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev +node1.example.com Ready worker 72m v1.33.4 10.0.129.222 Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.20.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev +node2.example.com Ready worker 164m v1.33.4 10.0.142.150 Red Hat Enterprise Linux CoreOS 48.83.202103210901-0 (Ootpa) 4.20.0-240.15.1.el8_3.x86_64 cri-o://1.33.4-30.rhaos4.10.gitf2f339d.el8-dev ---- * The following command lists information about a single node: diff --git a/modules/nw-dpu-operator-uninstall.adoc b/modules/nw-dpu-operator-uninstall.adoc index 848fc1e019..812d755a62 100644 --- a/modules/nw-dpu-operator-uninstall.adoc +++ b/modules/nw-dpu-operator-uninstall.adoc @@ -50,14 +50,14 @@ $ oc get csv -n openshift-dpu-operator [source,terminal] ---- NAME DISPLAY VERSION REPLACES PHASE -dpu-operator.v4.19.0-202503130333 DPU Operator 4.19.0-202503130333 Failed +dpu-operator.v4.20.0-202503130333 DPU Operator 4.20.0-202503130333 Failed ---- .. Delete the DPU Operator by running the following command: + [source,terminal] ---- -$ oc delete csv dpu-operator.v4.19.0-202503130333 -n openshift-dpu-operator +$ oc delete csv dpu-operator.v4.20.0-202503130333 -n openshift-dpu-operator ---- . Delete the namespace that was created for the DPU Operator by running the following command: diff --git a/modules/oc-mirror-building-image-set-config-v2.adoc b/modules/oc-mirror-building-image-set-config-v2.adoc index 6079bcde95..d42ffec54b 100644 --- a/modules/oc-mirror-building-image-set-config-v2.adoc +++ b/modules/oc-mirror-building-image-set-config-v2.adoc @@ -26,12 +26,12 @@ apiVersion: mirror.openshift.io/v2alpha1 mirror: platform: channels: - - name: stable-4.19 <1> - minVersion: 4.19.2 - maxVersion: 4.19.2 + - name: stable-4.20 <1> + minVersion: 4.20.2 + maxVersion: 4.20.2 graph: true <2> operators: - - catalog: registry.redhat.io/redhat/redhat-operator-index:v4.19 <3> + - catalog: registry.redhat.io/redhat/redhat-operator-index:v4.20 <3> packages: <4> - name: aws-load-balancer-operator - name: 3scale-operator diff --git a/modules/oc-mirror-image-set-config-examples.adoc b/modules/oc-mirror-image-set-config-examples.adoc index 8d75425fd1..459a81f793 100644 --- a/modules/oc-mirror-image-set-config-examples.adoc +++ b/modules/oc-mirror-image-set-config-examples.adoc @@ -298,12 +298,12 @@ mirror: architectures: - "multi" channels: - - name: stable-4.19 - minVersion: 4.19.0 - maxVersion: 4.19.1 + - name: stable-4.20 + minVersion: 4.20.0 + maxVersion: 4.20.1 type: ocp operators: - - catalog: registry.redhat.io/redhat/redhat-operator-index:v4.19 + - catalog: registry.redhat.io/redhat/redhat-operator-index:v4.20 packages: - name: multicluster-engine ---- \ No newline at end of file diff --git a/modules/oc-mirror-imageset-config-parameters-v2.adoc b/modules/oc-mirror-imageset-config-parameters-v2.adoc index 32b814381e..207e196c67 100644 --- a/modules/oc-mirror-imageset-config-parameters-v2.adoc +++ b/modules/oc-mirror-imageset-config-parameters-v2.adoc @@ -323,7 +323,7 @@ The default value is `false` ---- mirror: operators: - - catalog: registry.redhat.io/redhat/redhat-operator-index:v4.19 + - catalog: registry.redhat.io/redhat/redhat-operator-index:v4.20 packages: - name: rhods-operator defaultChannel: fast diff --git a/modules/rosa-create-objects.adoc b/modules/rosa-create-objects.adoc index 61d87faa00..09fc522247 100644 --- a/modules/rosa-create-objects.adoc +++ b/modules/rosa-create-objects.adoc @@ -351,7 +351,7 @@ Tags that are added by Red{nbsp}Hat are required for clusters to stay in complia ==== |--version string -|The version of {product-title} that will be used to install the cluster or cluster resources. For `cluster` use an `X.Y.Z` format, for example, `4.19.0`. For `account-role` use an `X.Y` format, for example, `4.19`. +|The version of {product-title} that will be used to install the cluster or cluster resources. For `cluster` use an `X.Y.Z` format, for example, `4.20.0`. For `account-role` use an `X.Y` format, for example, `4.20`. |--worker-iam-role string |The ARN of the IAM role that will be attached to compute instances. diff --git a/modules/rosa-deleting-account-wide-iam-roles-and-policies.adoc b/modules/rosa-deleting-account-wide-iam-roles-and-policies.adoc index 916b591943..a5f7417672 100644 --- a/modules/rosa-deleting-account-wide-iam-roles-and-policies.adoc +++ b/modules/rosa-deleting-account-wide-iam-roles-and-policies.adoc @@ -43,10 +43,10 @@ ifdef::sts[] ---- I: Fetching account roles ROLE NAME ROLE TYPE ROLE ARN OPENSHIFT VERSION -ManagedOpenShift-ControlPlane-Role Control plane arn:aws:iam:::role/ManagedOpenShift-ControlPlane-Role 4.19 -ManagedOpenShift-Installer-Role Installer arn:aws:iam:::role/ManagedOpenShift-Installer-Role 4.19 -ManagedOpenShift-Support-Role Support arn:aws:iam:::role/ManagedOpenShift-Support-Role 4.19 -ManagedOpenShift-Worker-Role Worker arn:aws:iam:::role/ManagedOpenShift-Worker-Role 4.19 +ManagedOpenShift-ControlPlane-Role Control plane arn:aws:iam:::role/ManagedOpenShift-ControlPlane-Role 4.20 +ManagedOpenShift-Installer-Role Installer arn:aws:iam:::role/ManagedOpenShift-Installer-Role 4.20 +ManagedOpenShift-Support-Role Support arn:aws:iam:::role/ManagedOpenShift-Support-Role 4.20 +ManagedOpenShift-Worker-Role Worker arn:aws:iam:::role/ManagedOpenShift-Worker-Role 4.20 ---- endif::sts[] ifdef::hcp[] @@ -55,9 +55,9 @@ ifdef::hcp[] ---- I: Fetching account roles ROLE NAME ROLE TYPE ROLE ARN OPENSHIFT VERSION AWS Managed -ManagedOpenShift-HCP-ROSA-Installer-Role Installer arn:aws:iam:::role/ManagedOpenShift-HCP-ROSA-Installer-Role 4.19 Yes -ManagedOpenShift-HCP-ROSA-Support-Role Support arn:aws:iam:::role/ManagedOpenShift-HCP-ROSA-Support-Role 4.19 Yes -ManagedOpenShift-HCP-ROSA-Worker-Role Worker arn:aws:iam:::role/ManagedOpenShift-HCP-ROSA-Worker-Role 4.19 Yes +ManagedOpenShift-HCP-ROSA-Installer-Role Installer arn:aws:iam:::role/ManagedOpenShift-HCP-ROSA-Installer-Role 4.20 Yes +ManagedOpenShift-HCP-ROSA-Support-Role Support arn:aws:iam:::role/ManagedOpenShift-HCP-ROSA-Support-Role 4.20 Yes +ManagedOpenShift-HCP-ROSA-Worker-Role Worker arn:aws:iam:::role/ManagedOpenShift-HCP-ROSA-Worker-Role 4.20 Yes ---- endif::hcp[] + diff --git a/modules/rosa-hcp-deleting-cluster.adoc b/modules/rosa-hcp-deleting-cluster.adoc index 2f26e34d3a..2dc531b96a 100644 --- a/modules/rosa-hcp-deleting-cluster.adoc +++ b/modules/rosa-hcp-deleting-cluster.adoc @@ -40,7 +40,7 @@ Display Name: test_cluster ID: <1> External ID: Control Plane: ROSA Service Hosted -OpenShift Version: 4.19.0 +OpenShift Version: 4.20.0 Channel Group: stable DNS: test_cluster.l3cn.p3.openshiftapps.com AWS Account: diff --git a/modules/rosa-hcp-sts-creating-a-cluster-external-auth-cluster-cli.adoc b/modules/rosa-hcp-sts-creating-a-cluster-external-auth-cluster-cli.adoc index a9e0b14125..27353a20c6 100644 --- a/modules/rosa-hcp-sts-creating-a-cluster-external-auth-cluster-cli.adoc +++ b/modules/rosa-hcp-sts-creating-a-cluster-external-auth-cluster-cli.adoc @@ -56,7 +56,7 @@ Display Name: rosa-ext-test ID: External ID: Control Plane: ROSA Service Hosted -OpenShift Version: 4.19.0 +OpenShift Version: 4.20.0 Channel Group: stable DNS: AWS Account: diff --git a/modules/rosa-sts-account-wide-roles-and-policies.adoc b/modules/rosa-sts-account-wide-roles-and-policies.adoc index 9808efeadd..b0c90c1c14 100644 --- a/modules/rosa-sts-account-wide-roles-and-policies.adoc +++ b/modules/rosa-sts-account-wide-roles-and-policies.adoc @@ -53,7 +53,7 @@ The account number present in the `sts_installer_trust_policy.json` and `sts_sup ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_trust_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_trust_policy.json[] ---- ==== @@ -62,7 +62,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_permission_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_permission_policy.json[] ---- ==== @@ -85,7 +85,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_controlplane_trust_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_controlplane_trust_policy.json[] ---- ==== @@ -94,7 +94,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_controlplane_permission_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_controlplane_permission_policy.json[] ---- ==== @@ -117,7 +117,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_worker_trust_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_worker_trust_policy.json[] ---- ==== @@ -126,7 +126,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_instance_worker_permission_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_instance_worker_permission_policy.json[] ---- ==== @@ -149,7 +149,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_support_trust_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_support_trust_policy.json[] ---- ==== @@ -158,7 +158,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_support_permission_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_support_permission_policy.json[] ---- ==== @@ -178,7 +178,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_ocm_trust_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_ocm_trust_policy.json[] ---- ==== @@ -198,7 +198,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_trust_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_trust_policy.json[] ---- ==== @@ -255,7 +255,7 @@ I: Attached policy 'arn:aws:iam::000000000000:policy/testrole-Worker-Role-Policy ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_ingress_operator_cloud_credentials_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_ingress_operator_cloud_credentials_policy.json[] ---- ==== @@ -275,7 +275,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_cluster_csi_drivers_ebs_cloud_credentials_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_cluster_csi_drivers_ebs_cloud_credentials_policy.json[] ---- ==== @@ -295,7 +295,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_machine_api_aws_cloud_credentials_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_machine_api_aws_cloud_credentials_policy.json[] ---- ==== @@ -315,7 +315,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_cloud_credential_operator_cloud_credential_operator_iam_ro_creds_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_cloud_credential_operator_cloud_credential_operator_iam_ro_creds_policy.json[] ---- ==== @@ -335,7 +335,7 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/openshift_image_registry_installer_cloud_credentials_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/openshift_image_registry_installer_cloud_credentials_policy.json[] ---- ==== endif::openshift-rosa-hcp[] diff --git a/modules/rosa-sts-aws-requirements-attaching-boundary-policy.adoc b/modules/rosa-sts-aws-requirements-attaching-boundary-policy.adoc index 09408ab77c..c83682605e 100644 --- a/modules/rosa-sts-aws-requirements-attaching-boundary-policy.adoc +++ b/modules/rosa-sts-aws-requirements-attaching-boundary-policy.adoc @@ -44,7 +44,7 @@ This example procedure is applicable for an installer role and policy with the m ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_core_permission_boundary_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_core_permission_boundary_policy.json[] ---- ==== @@ -67,7 +67,7 @@ While the ROSA (`rosa`) CLI offers a permission boundary function, it applies to + [source,terminal] ---- -$ curl -o ./rosa-installer-core.json https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/sts/4.19/sts_installer_core_permission_boundary_policy.json +$ curl -o ./rosa-installer-core.json https://raw.githubusercontent.com/openshift/managed-cluster-config/master/resources/sts/4.20/sts_installer_core_permission_boundary_policy.json ---- . Create the policy in AWS and gather its Amazon Resource Name (ARN) by entering the following command: @@ -128,7 +128,7 @@ For more examples of PL and VPC permission boundary policies see: ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_privatelink_permission_boundary_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_privatelink_permission_boundary_policy.json[] ---- ==== + @@ -137,6 +137,6 @@ include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs ==== [source,json] ---- -include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.19/sts_installer_vpc_permission_boundary_policy.json[] +include::https://raw.githubusercontent.com/openshift/managed-cluster-config/refs/heads/master/resources/sts/4.20/sts_installer_vpc_permission_boundary_policy.json[] ---- ==== diff --git a/modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc b/modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc index 7e1bcff2ec..2106a375cc 100644 --- a/modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc +++ b/modules/rosa-sts-creating-a-cluster-with-customizations-cli.adoc @@ -258,7 +258,7 @@ I: Using arn:aws:iam:::role/ManagedOpenShift-Support-Role for th ? Disable Workload monitoring (optional): No I: Creating cluster '' I: To create this cluster again in the future, you can run: - rosa create cluster --cluster-name --role-arn arn:aws:iam:::role/ManagedOpenShift-Installer-Role --support-role-arn arn:aws:iam:::role/ManagedOpenShift-Support-Role --master-iam-role arn:aws:iam:::role/ManagedOpenShift-ControlPlane-Role --worker-iam-role arn:aws:iam:::role/ManagedOpenShift-Worker-Role --operator-roles-prefix - --region us-east-1 --version 4.19.0 --additional-compute-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-infra-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-control-plane-security-group-ids sg-0e375ff0ec4a6cfa2 --replicas 2 --machine-cidr 10.0.0.0/16 --service-cidr 172.30.0.0/16 --pod-cidr 10.128.0.0/14 --host-prefix 23 <16> + rosa create cluster --cluster-name --role-arn arn:aws:iam:::role/ManagedOpenShift-Installer-Role --support-role-arn arn:aws:iam:::role/ManagedOpenShift-Support-Role --master-iam-role arn:aws:iam:::role/ManagedOpenShift-ControlPlane-Role --worker-iam-role arn:aws:iam:::role/ManagedOpenShift-Worker-Role --operator-roles-prefix - --region us-east-1 --version 4.20.0 --additional-compute-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-infra-security-group-ids sg-0e375ff0ec4a6cfa2 --additional-control-plane-security-group-ids sg-0e375ff0ec4a6cfa2 --replicas 2 --machine-cidr 10.0.0.0/16 --service-cidr 172.30.0.0/16 --pod-cidr 10.128.0.0/14 --host-prefix 23 <16> I: To view a list of clusters and their status, run 'rosa list clusters' I: Cluster '' has been created. I: Once the cluster is installed you will need to add an Identity Provider before you can login into the cluster. See 'rosa create idp --help' for more information. @@ -267,7 +267,7 @@ I: Once the cluster is installed you will need to add an Identity Provider befor <1> Optional. When creating your cluster, you can customize the subdomain for your cluster on `*.openshiftapps.com` using the `--domain-prefix` flag. The value for this flag must be unique within your organization, cannot be longer than 15 characters, and cannot be changed after cluster creation. If the flag is not supplied, an autogenerated value is created that depends on the length of the cluster name. If the cluster name is fewer than or equal to 15 characters, that name is used for the domain prefix. If the cluster name is longer than 15 characters, the domain prefix is randomly generated to a 15 character string. <2> When creating your cluster, you can create a local administrator user (`cluster-admin`) for your cluster. This automatically configures an `htpasswd` identity provider for the `cluster-admin` user. <3> You can create a custom password for the `cluster-admin` user, or have the system generate a password. If you do not create a custom password, the generated password is displayed in the command-line output. If you specify a custom password, the password must be at least 14 characters (ASCII-standard) without any whitespace. When defined, the password is hashed and transported securely. -<4> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.19.0`. +<4> When creating the cluster, the listed `OpenShift version` options include the major, minor, and patch versions, for example `4.20.0`. <5> Optional: Specify `optional` to configure all EC2 instances to use both v1 and v2 endpoints of EC2 Instance Metadata Service (IMDS). This is the default value. Specify `required` to configure all EC2 instances to use IMDSv2 only. + ifdef::openshift-rosa[] diff --git a/modules/running-insights-operator-gather-cli.adoc b/modules/running-insights-operator-gather-cli.adoc index 1b8d22ed6d..d190b30cf5 100644 --- a/modules/running-insights-operator-gather-cli.adoc +++ b/modules/running-insights-operator-gather-cli.adoc @@ -82,7 +82,7 @@ spec: + [IMPORTANT] ==== -Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims]. +Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims]. ==== + * To enable data obfuscation, define the `dataPolicy` key and required values. For example, to obfuscate IP addresses and workload names, add the following configuration: diff --git a/modules/running-insights-operator-gather-web-console.adoc b/modules/running-insights-operator-gather-web-console.adoc index fecfbd65fa..59dfd621ce 100644 --- a/modules/running-insights-operator-gather-web-console.adoc +++ b/modules/running-insights-operator-gather-web-console.adoc @@ -86,7 +86,7 @@ spec: + [IMPORTANT] ==== -Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims]. +Ensure that the volume name specified matches the existing `PersistentVolumeClaim` value in the `openshift-insights` namespace. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/storage/understanding-persistent-storage#persistent-volume-claims_understanding-persistent-storage[Persistent volume claims]. ==== * To enable data obfuscation, define the `dataPolicy` key and required values. For example, to obfuscate IP addresses and workload names, add the following configuration: + diff --git a/modules/sd-understanding-process-id-limits.adoc b/modules/sd-understanding-process-id-limits.adoc index f75a87ed5f..ad88765d09 100644 --- a/modules/sd-understanding-process-id-limits.adoc +++ b/modules/sd-understanding-process-id-limits.adoc @@ -43,7 +43,7 @@ endif::openshift-enterprise,openshift-origin[] ifdef::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[] * Maximum number of PIDs per node. + -The default value depends on link:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.19/html-single/nodes/index#nodes-nodes-resources-configuring[node resources]. In {product-title}, this value is controlled by the link:https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/#system-reserved[`--system-reserved`] parameter, which reserves PIDs on each node based on the total resources of the node. +The default value depends on link:https://access.redhat.com/documentation/en-us/openshift_container_platform/4.20/html-single/nodes/index#nodes-nodes-resources-configuring[node resources]. In {product-title}, this value is controlled by the link:https://kubernetes.io/docs/tasks/administer-cluster/reserve-compute-resources/#system-reserved[`--system-reserved`] parameter, which reserves PIDs on each node based on the total resources of the node. endif::openshift-dedicated,openshift-rosa,openshift-rosa-hcp[] When a pod exceeds the allowed maximum number of PIDs per pod, the pod might stop functioning correctly and might be evicted from the node. See link:https://kubernetes.io/docs/concepts/scheduling-eviction/node-pressure-eviction/#eviction-signals-and-thresholds[the Kubernetes documentation for eviction signals and thresholds] for more information. diff --git a/modules/serverless-quarkus-template.adoc b/modules/serverless-quarkus-template.adoc index 973d0ce05f..4b51c4696f 100644 --- a/modules/serverless-quarkus-template.adoc +++ b/modules/serverless-quarkus-template.adoc @@ -45,7 +45,7 @@ Both `http` and `event` trigger functions have the same template structure: junit junit - 4.19 + 4.20 test diff --git a/modules/using-cluster-compare-telco-core.adoc b/modules/using-cluster-compare-telco-core.adoc index d79b7a1bbb..ee07631358 100644 --- a/modules/using-cluster-compare-telco-core.adoc +++ b/modules/using-cluster-compare-telco-core.adoc @@ -39,7 +39,7 @@ $ mkdir -p ./out + [source,terminal] ---- -$ podman run -it registry.redhat.io/openshift4/openshift-telco-core-rds-rhel9:v4.19 | base64 -d | tar xv -C out +$ podman run -it registry.redhat.io/openshift4/openshift-telco-core-rds-rhel9:v4.20 | base64 -d | tar xv -C out ---- + You can view the reference configuration in the `out/telco-core-rds/configuration/reference-crs-kube-compare` directory by running the following command: diff --git a/modules/verifying-cluster-install-oci-agent-based.adoc b/modules/verifying-cluster-install-oci-agent-based.adoc index 0fca2a4dba..12be51d1a0 100644 --- a/modules/verifying-cluster-install-oci-agent-based.adoc +++ b/modules/verifying-cluster-install-oci-agent-based.adoc @@ -100,9 +100,9 @@ $ oc get co [source,terminal] ---- NAME VERSION AVAILABLE PROGRESSING DEGRADED SINCE MESSAGE -authentication 4.19.0-0 True False False 6m18s -baremetal 4.19.0-0 True False False 2m42s -network 4.19.0-0 True True False 5m58s Progressing: … +authentication 4.20.0-0 True False False 6m18s +baremetal 4.20.0-0 True False False 2m42s +network 4.20.0-0 True True False 5m58s Progressing: … … ---- diff --git a/modules/virt-checking-storage-configuration.adoc b/modules/virt-checking-storage-configuration.adoc index 4a3fc5e4ba..1ccfe90d70 100644 --- a/modules/virt-checking-storage-configuration.adoc +++ b/modules/virt-checking-storage-configuration.adoc @@ -167,11 +167,11 @@ data: status.failureReason: "" # <2> status.startTimestamp: "2023-07-31T13:14:38Z" # <3> status.completionTimestamp: "2023-07-31T13:19:41Z" # <4> - status.result.cnvVersion: 4.19.2 # <5> + status.result.cnvVersion: 4.20.2 # <5> status.result.defaultStorageClass: trident-nfs <6> status.result.goldenImagesNoDataSource: # <7> status.result.goldenImagesNotUpToDate: # <8> - status.result.ocpVersion: 4.19.0 # <9> + status.result.ocpVersion: 4.20.0 # <9> status.result.pvcBound: "true" # <10> status.result.storageProfileMissingVolumeSnapshotClass: # <11> status.result.storageProfilesWithEmptyClaimPropertySets: # <12> diff --git a/modules/virt-updating-multiple-vms.adoc b/modules/virt-updating-multiple-vms.adoc index 4b231133b2..1b9451e190 100644 --- a/modules/virt-updating-multiple-vms.adoc +++ b/modules/virt-updating-multiple-vms.adoc @@ -53,7 +53,7 @@ spec: spec: containers: - name: kubevirt-api-lifecycle-automation - image: quay.io/openshift-virtualization/kubevirt-api-lifecycle-automation:v4.19 <1> + image: quay.io/openshift-virtualization/kubevirt-api-lifecycle-automation:v4.20 <1> imagePullPolicy: Always env: - name: MACHINE_TYPE_GLOB <2> diff --git a/modules/virt-using-wasp-agent-to-configure-higher-vm-workload-density.adoc b/modules/virt-using-wasp-agent-to-configure-higher-vm-workload-density.adoc index 4774f45166..6cda69a351 100644 --- a/modules/virt-using-wasp-agent-to-configure-higher-vm-workload-density.adoc +++ b/modules/virt-using-wasp-agent-to-configure-higher-vm-workload-density.adoc @@ -203,7 +203,7 @@ spec: fieldRef: fieldPath: spec.nodeName image: >- - quay.io/openshift-virtualization/wasp-agent:v4.19 <1> + quay.io/openshift-virtualization/wasp-agent:v4.20 <1> imagePullPolicy: Always name: wasp-agent resources: diff --git a/modules/zero-trust-manager-create-route-oidc.adoc b/modules/zero-trust-manager-create-route-oidc.adoc index fe1e60dc38..fd921cc482 100644 --- a/modules/zero-trust-manager-create-route-oidc.adoc +++ b/modules/zero-trust-manager-create-route-oidc.adoc @@ -14,9 +14,9 @@ The managed route uses the External Route Certificate feature to set the `tls.ex * You have deployed the SPIRE Server, SPIRE Agent, SPIFFEE CSI Driver, and the SPIRE OIDC Discovery Provider operands in the cluster. -* You have installed the {cert-manager-operator}. For more information, link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/security_and_compliance/index#cert-manager-operator-install[Installing the cert-manager Operator for Red{nbsp}Hat OpenShift]. +* You have installed the {cert-manager-operator}. For more information, link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#cert-manager-operator-install[Installing the cert-manager Operator for Red{nbsp}Hat OpenShift]. -* You have created a `ClusterIssuer` or `Issuer` configured with a publicly trusted CA service. For example, an Automated Certificate Management Environment (ACME) type `Issuer` with the "Let's Encrypt ACME" service. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/security_and_compliance/index#cert-manager-operator-issuer-acme[Configuring an ACME issuer] +* You have created a `ClusterIssuer` or `Issuer` configured with a publicly trusted CA service. For example, an Automated Certificate Management Environment (ACME) type `Issuer` with the "Let's Encrypt ACME" service. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/security_and_compliance/index#cert-manager-operator-issuer-acme[Configuring an ACME issuer] .Procedure diff --git a/modules/zero-trust-manager-install-vault-oidc.adoc b/modules/zero-trust-manager-install-vault-oidc.adoc index 529543d8ee..52777e8732 100644 --- a/modules/zero-trust-manager-install-vault-oidc.adoc +++ b/modules/zero-trust-manager-install-vault-oidc.adoc @@ -11,7 +11,7 @@ Before Vault is used as an OIDC, you need to install Vault. .Prerequisites -* Configure a route. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/ingress_and_load_balancing/configuring-routes#route-configuration[Route configuration] +* Configure a route. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/ingress_and_load_balancing/configuring-routes#route-configuration[Route configuration] * Helm is installed. diff --git a/modules/ztp-image-based-upgrade-procedure-rollback.adoc b/modules/ztp-image-based-upgrade-procedure-rollback.adoc index 71e4f03ce2..53979b05cc 100644 --- a/modules/ztp-image-based-upgrade-procedure-rollback.adoc +++ b/modules/ztp-image-based-upgrade-procedure-rollback.adoc @@ -34,8 +34,8 @@ spec: - spoke4 ibuSpec: seedImageRef: - image: quay.io/seed/image:4.19.0-rc.1 - version: 4.19.0-rc.1 + image: quay.io/seed/image:4.20.0-rc.1 + version: 4.20.0-rc.1 pullSecretRef: name: "" extraManifests: diff --git a/modules/ztp-sno-accelerated-ztp.adoc b/modules/ztp-sno-accelerated-ztp.adoc index 7cadb0ba4f..f4c57c4c8e 100644 --- a/modules/ztp-sno-accelerated-ztp.adoc +++ b/modules/ztp-sno-accelerated-ztp.adoc @@ -34,7 +34,7 @@ spec: baseDomain: "example.com" pullSecretRef: name: "assisted-deployment-pull-secret" - clusterImageSetNameRef: "openshift-4.19" + clusterImageSetNameRef: "openshift-4.20" sshPublicKey: "ssh-rsa AAAA..." clusters: # ... diff --git a/modules/ztp-sno-siteconfig-config-reference.adoc b/modules/ztp-sno-siteconfig-config-reference.adoc index 3fbf9af620..fb08dc0b45 100644 --- a/modules/ztp-sno-siteconfig-config-reference.adoc +++ b/modules/ztp-sno-siteconfig-config-reference.adoc @@ -49,7 +49,7 @@ a|Configure this field to enable disk encryption with Trusted Platform Module (T [NOTE] ==== -Configuring disk encryption by using the `diskEncryption` field in the `SiteConfig` CR is a Technology Preview feature in {product-title} 4.19. +Configuring disk encryption by using the `diskEncryption` field in the `SiteConfig` CR is a Technology Preview feature in {product-title} 4.20. ==== |`spec.clusters.diskEncryption.type` diff --git a/nodes/cma/nodes-cma-rn/nodes-cma-autoscaling-custom-rn.adoc b/nodes/cma/nodes-cma-rn/nodes-cma-autoscaling-custom-rn.adoc index 2f29670c89..6178be5e75 100644 --- a/nodes/cma/nodes-cma-rn/nodes-cma-autoscaling-custom-rn.adoc +++ b/nodes/cma/nodes-cma-rn/nodes-cma-autoscaling-custom-rn.adoc @@ -65,7 +65,7 @@ The following table defines the Custom Metrics Autoscaler Operator versions for Issued: 25 September 2025 -This release of the Custom Metrics Autoscaler Operator 2.17.2 addresses Common Vulnerabilities and Exposures (CVEs). The following advisory is available for the Custom Metrics Autoscaler Operator: +This release of the Custom Metrics Autoscaler Operator 2.17.2 addresses Common Vulnerabilities and Exposures (CVEs). The following advisory is available for the Custom Metrics Autoscaler Operator: * link:https://access.redhat.com/errata/RHSA-2025:16124[RHSA-2025:16124] diff --git a/security/zero_trust_workload_identity_manager/zero-trust-manager-release-notes.adoc b/security/zero_trust_workload_identity_manager/zero-trust-manager-release-notes.adoc index 231638738d..8809887b37 100644 --- a/security/zero_trust_workload_identity_manager/zero-trust-manager-release-notes.adoc +++ b/security/zero_trust_workload_identity_manager/zero-trust-manager-release-notes.adoc @@ -40,7 +40,7 @@ This release of {zero-trust-full} is a Technology Preview. * The `managedRoute` field is boolean and is set to `true` by default. If set to `false`, the Operator stops managing the route and the existing route will not be deleted automatically. If set back to `true`, the Operator resumes managing the route. If a route does not exist, the Operator creates a new one. If a route already exists, the Operator will override the user configuration if a conflict exists. -* The `externalSecretRef` references an externally managed Secret that has the TLS certificate for the `oidc-discovery-provider` Route host. When provided, this populates the route's `.Spec.TLS.ExternalCertificate` field. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/ingress_and_load_balancing/index#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate] +* The `externalSecretRef` references an externally managed Secret that has the TLS certificate for the `oidc-discovery-provider` Route host. When provided, this populates the route's `.Spec.TLS.ExternalCertificate` field. For more information, see link:https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/ingress_and_load_balancing/index#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate] [id="zero-trust-manager-0-2-0-features-ca-ttl_{context}"] ==== Enabling the custom Certificate Authority Time-To-Live for the SPIRE bundle diff --git a/snippets/ibu-ImageBasedGroupUpgrade.adoc b/snippets/ibu-ImageBasedGroupUpgrade.adoc index b4db01a766..f21dd02a54 100644 --- a/snippets/ibu-ImageBasedGroupUpgrade.adoc +++ b/snippets/ibu-ImageBasedGroupUpgrade.adoc @@ -16,8 +16,8 @@ spec: - spoke6 ibuSpec: seedImageRef: # <2> - image: quay.io/seed/image:4.19.0-rc.1 - version: 4.19.0-rc.1 + image: quay.io/seed/image:4.20.0-rc.1 + version: 4.20.0-rc.1 pullSecretRef: name: "" extraManifests: # <3>