Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.
Chapter 1. {sandboxed-containers-first} {sandboxed-containers-version} release notes
1.1. About this release Link kopierenLink in die Zwischenablage kopiert!
These release notes track the development of OpenShift sandboxed containers 1.2 alongside Red Hat OpenShift Container Platform 4.10.
This product was previously released as a Technology Preview product in OpenShift Container Platform 4.9 and is now generally available and enabled by default in OpenShift Container Platform 4.10.
1.2. New features and enhancements Link kopierenLink in die Zwischenablage kopiert!
This release adds the following features to OpenShift sandboxed containers.
1.2.1. Kata specific metrics and dashboard Link kopierenLink in die Zwischenablage kopiert!
The OpenShift sandboxed containers Operator now deploys an osc-monitor daemon set. This enables the collection of metrics specific to workloads running in sandboxed containers, including metrics about the hypervisor and the Guest OS instances. In addition, a pre-configured dashboard provides insights into OpenShift sandboxed containers components, such as the total number of lightweight VMs enabled in a cluster and the CPU and memory consumption per VM. All metrics, as well as the dashboard, are available in the web console. For more information, see Monitoring OpenShift sandboxed containers.
1.2.2. Enhanced logging Link kopierenLink in die Zwischenablage kopiert!
Administrators can now collect enhanced logs for OpenShift sandboxed containers runtime components. Enhanced logs are available when the CRI-O log level is set to debug. These logs are collected by the must-gather tool, or can be viewed in the node journal. For more information, see Enabling debug logs for OpenShift sandboxed containers.
1.2.3. Check node eligibility to run OpenShift sandboxed containers Link kopierenLink in die Zwischenablage kopiert!
Administrators can now check the eligibility of cluster nodes to run OpenShift sandboxed containers. This feature uses the Node Feature Discovery (NFD) Operator to detect node capabilities. Eligible nodes are labeled with feature.node.kubernetes.io/runtime.kata, and the OpenShift sandboxed containers Operator uses this label to select candidate nodes for installation.
The administrator must deploy the NFD Operator to use this feature, create a specific NodeFeatureDiscovery custom resource, and enable checkNodeEligibility when creating the KataConfig custom resource. For more information, see Checking the eligibility of cluster nodes to run OpenShift sandboxed containers.
1.2.4. OpenShift sandboxed containers compatibility with OpenShift Virtualization Link kopierenLink in die Zwischenablage kopiert!
Users can now run OpenShift sandboxed containers on clusters with OpenShift Virtualization when VMs are configured correctly. For more information, see Using OpenShift sandboxed containers with OpenShift Virtualization
1.2.5. OpenShift sandboxed containers availability on AWS bare metal (Technology Preview) Link kopierenLink in die Zwischenablage kopiert!
Users can now install OpenShift sandboxed containers on AWS bare-metal clusters. This feature is in Technology Preview and not fully supported. For more information, see Understanding OpenShift sandboxed containers.
1.3. Bug fixes Link kopierenLink in die Zwischenablage kopiert!
- Previously, using loop devices in a sandboxed container was not possible due to missing kernel modules. With this release, these kernel modules are included in the package. (KATA-1334)
-
Previously, the
MachineConfigPool(MCP) object created by the Operator to track nodes with theKataruntime installed was not automatically removed on deletion of theKataConfigcustom resource (CR). With this release, the deletion of theKataConfigCR results in the removal of thekata-ocMCPobject. (KATA-1184) -
Previously, when you created a
kataConfigPoolSelectorfield and changed it, the OpenShift sandboxed containers Operator did not apply the change. With this release, the Operator acts on changes to thekataConfigPoolSelectorfield in the custom resource definition and adapts installations of the runtime on nodes accordingly. (KATA-1190) -
Previously, the
SourceImagefield was displayed on the web console and using the field had no effect on the installation. With this release, the unusedSourceImagefield is no longer displayed when creating theKataConfigCR from the web console. (KATA-1015)
1.4. Known issues Link kopierenLink in die Zwischenablage kopiert!
If you are using OpenShift sandboxed containers, you might receive SELinux denials when accessing files or directories mounted from the
hostPathvolume in an OpenShift Container Platform cluster. These denials can occur even when running privileged sandboxed containers because privileged sandboxed containers do not disable SELinux checks.Following SELinux policy on the host guarantees full isolation of the host file system from the sandboxed workload by default, and provides stronger protection against potential security flaws in the
virtiofsddaemon or QEMU.If the mounted files or directories do not have specific SELinux requirements on the host, you can use local persistent volumes as an alternative. Files are automatically relabeled to
container_file_t, following SELinux policy for container runtimes. See Persistent storage using local volumes for more information.Automatic relabeling is not an option when mounted files or directories are expected to have specific SELinux labels on the host. Instead, you can set custom SELinux rules on the host in order to allow the
virtiofsddaemon to access these specific labels. (BZ#1904609)You might encounter an issue where the Machine Config Operator (MCO) pod changes to a
CrashLoopBackOffstate and theopenshift.io/sccannotation of the pod displayssandboxed-containers-operator-sccinstead of the defaulthostmount-anyuidvalue.If this happens, temporarily change the
seLinuxOptionsstrategy in thesandboxed-containers-operator-sccSCC to the less restrictiveRunAsAny, so that the admission process does not prefer it over thehostmount-anyuidSCC.Change the
seLinuxOptionsstrategy by running the following command:$ oc patch scc sandboxed-containers-operator-scc --type=merge --patch '{"seLinuxContext":{"type": "RunAsAny"}}'Restart the MCO pod by running the following commands:
$ oc scale deployments/machine-config-operator -n openshift-machine-config-operator --replicas=0$ oc scale deployments/machine-config-operator -n openshift-machine-config-operator --replicas=1Revert the
seLinuxOptionsstrategy of thesandboxed-containers-operator-sccto its original value ofMustRunAsby running the following command:$ oc patch scc sandboxed-containers-operator-scc --type=merge --patch '{"seLinuxContext":{"type": "MustRunAs"}}'Verify that the
hostmount-anyuidSCC is applied to the MCO pod by running the following command:$ oc get pods -n openshift-machine-config-operator -l k8s-app=machine-config-operator -o yaml | grep scc openshift.io/scc: hostmount-anyuid
The OpenShift sandboxed containers Operator pods that use container CPU resource limits to increase the number of available CPUs for the pod might receive fewer CPUs than requested. If the functionality is available inside the container, you can diagnose CPU resources by using
oc rsh <pod>and running thelscpucommand.$ lscpuExample output
CPU(s): 16 On-line CPU(s) list: 0-12,14,15 Off-line CPU(s) list: 13The list of available offline CPUs will likely change from run to run in an unpredictable manner.
As a workaround, you can use a pod annotation to request additional CPUs rather than setting a CPU limit. The method of allocating processors is different, and CPUs requested by means of pod annotation are not affected by this issue. Rather than setting a CPU limit, the following
annotationmust be added to the metadata of the pod:metadata: annotations: io.katacontainers.config.hypervisor.default_vcpus: "16"The progress of the runtime installation is shown in the
statussection of thekataConfigCR. However, the progress is not shown if all of the following conditions are true:-
The cluster has a machine config pool
workerwithout any members (machinecount=0). -
No
kataConfigPoolSelectoris specified to select nodes for installation.
In this case, the installation starts on the master nodes because the Operator assumes it is a converged cluster where nodes have both master and worker roles. The
statussection of thekataConfigCR is not updated during the installation. (KATA-1017)-
The cluster has a machine config pool
-
When creating the
KataConfigCR and observing the pod status under theopenshift-sandboxed-containers-operatornamespace, a huge number of restarts for monitor pods is shown. The monitor pods use a specific SELinux policy that is installed as part ofsandboxed-containersextension installation. The monitor pod gets created immediately, however the SELinux policy is not yet available, which results in a pod creation error, followed by a pod restart. When the extension installation succeeds, the SELinux policy is available and the monitor pod transitions to aRunningstate. This does not affect any of the OpenShift sandboxed containers Operator functionality. (KATA-1338)
1.5. Asynchronous errata updates Link kopierenLink in die Zwischenablage kopiert!
Security, bug fix, and enhancement updates for OpenShift sandboxed containers 1.2 are released as asynchronous errata through the Red Hat Network. All OpenShift Container Platform 4.10 errata is available on the Red Hat Customer Portal. See the OpenShift Container Platform Life Cycle for more information about asynchronous errata.
Red Hat Customer Portal users can enable errata notifications in the account settings for Red Hat Subscription Management (RHSM). When errata notifications are enabled, users are notified via email whenever new errata relevant to their registered systems are released.
Red Hat Customer Portal user accounts must have systems registered and consuming OpenShift Container Platform entitlements for OpenShift Container Platform errata notification emails to generate.
This section will continue to be updated over time to provide notes on enhancements and bug fixes for future asynchronous errata releases of OpenShift sandboxed containers 1.2.
1.5.1. RHSA-2022:1508 - OpenShift sandboxed containers 1.2.2 bug fix advisory. Link kopierenLink in die Zwischenablage kopiert!
Issued: 2022-07-26
OpenShift sandboxed containers release 1.2.2 is now available. This advisory contains an update for OpenShift sandboxed containers with bug fixes.
The list of bug fixes included in the update is documented in the RHSA-2022:5725 advisory.
1.5.2. RHSA-2022:1508 - OpenShift sandboxed containers 1.2.1 bug fix advisory. Link kopierenLink in die Zwischenablage kopiert!
Issued: 2022-04-21
OpenShift sandboxed containers release 1.2.1 is now available. This advisory contains an update for OpenShift sandboxed containers with bug fixes.
The list of bug fixes included in the update is documented in the RHSA-2022:1508 advisory.
1.5.3. RHSA-2022:0855 - OpenShift sandboxed containers 1.2.0 image release, security update, bug fix, and enhancement advisory. Link kopierenLink in die Zwischenablage kopiert!
Issued: 2022-03-14
OpenShift sandboxed containers release 1.2.0 is now available. This advisory contains an update for OpenShift sandboxed containers with enhancements, security updates, and bug fixes.
The list of bug fixes included in the update is documented in the RHSA-2022:0855 advisory.