Chapter 1. Red Hat build of MicroShift 4.13 release notes


Red Hat build of MicroShift provides developers and IT organizations with small-form-factor and edge computing, delivered as an application that customers can deploy on top of their managed Red Hat Enterprise Linux (RHEL) devices at the edge. Built on OpenShift Container Platform and Kubernetes, Red Hat build of MicroShift provides an efficient way to operate single-node clusters in low-resource edge environments.

Red Hat build of MicroShift is designed to make control plane restarts economical and be lifecycle-managed as a single unit by the operating system. Updates, roll-backs, and configuration changes consist of simply staging another version in parallel and then - without relying on a network - flipping to and from that version and restarting.

1.1. About this release

The Red Hat build of MicroShift is Technology Preview only. Features and known issues that pertain to Red Hat build of MicroShift 4.13 are included in this topic. This Technology Preview software is not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using Red Hat build of MicroShift in production. Technology Preview provides early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, read Technology Preview Features Support Scope.

Important

Red Hat does not support an update path from the Technology Preview version to later versions of Red Hat build of MicroShift. A new installation is necessary.

1.2. New features and enhancements

This release adds improvements related to the following components and concepts.

1.2.1. Red Hat Enterprise Linux (RHEL) for Edge 9.2

  • Red Hat build of MicroShift runs on RHEL for Edge version 9.2 or later.
  • Red Hat build of MicroShift uses crun and Control Group v2 (cgroup v2). OpenShift Container Platform 4.13 defaults to Control Group v1. The divergence of control group versions is not anticipated to have a noticeable behavior difference on most workloads. If workloads rely on the cgroup file system layout, they may need to be updated to be compatible with cgroup v2.

    • If you run third-party monitoring and security agents that depend on the cgroup file system, update the agents to versions that support cgroup v2.
    • If you run cAdvisor as a standalone DaemonSet for monitoring pods and containers, update it to v0.43.0 or later.
    • If you deploy Java applications with the JDK, ensure you are using JDK 11.0.16 and later or JDK 15 and later, which fully support cgroup v2.

1.2.2. Installation

This release includes integration with the greenboot health check framework. Greenboot assesses system health and automates a rollback to the last healthy state in the event of software trouble. You can add the optional greenboot RPM to your installation. For more information, read the Greenboot documentation.

1.2.3. Support

1.2.3.1. Red Hat build of MicroShift sos reports

With this release you can run an sos report to collect troubleshooting information about a host. The report generates a detailed report with data from all enabled plugins and different components and applications in a system.

For more information, read About MicroShift sos reports.

1.2.3.2. Red Hat build of MicroShift etcd

With this release, Red Hat build of MicroShift etcd is run as a separate process whose lifecycle is managed automatically by Red Hat build of MicroShift. You can gather journalctl logs to observe and debug the etcd server logs.

For more information, read Observe and debug the MicroShift etcd server.

1.2.4. Networking

1.2.4.1. Deploying network load balancers on Red Hat build of MicroShift

Red Hat build of MicroShift now offers a built-in implementation of network load balancers. For more details, read Deploying a TCP load balancer on a workload.

1.2.5. Storage

1.2.5.1. LVMS system requirements

Red Hat build of MicroShift configures LVMS dynamically based on the Volume Groups present. For more details, read the LVMS system requirements section of this documentation.

1.3. Bug fixes

  • Previously, Red Hat build of MicroShift generated kubeconfig files using certificate authorities (CA) shared by all embedded components. With this update, the CAs and certificates are reconfigured to ensure the kubeconfig files are independent. (OCPBUGS#10223)
  • Previously, the systemd-resolved configuration was used by kubelet as an alternative DNS resolver, but the DNS Corefile configuration did not use the same systemd-resolved configuration. With this update, Red Hat build of MicroShift uses the network name resolution provided by systemd-resolved for both kubelet and cluster DNS when the systemd-resolved.service is enabled. (OCPBUGS-6786)

1.4. Known issues

  • OVN-Kubernetes sets up an iptable chain in the network address translation (NAT) table to handle incoming traffic to the NodePort service. When the NodePort service is not reachable or the connection is refused, check the iptable rules on the host to make sure the relevant rules are properly inserted.

    1. View the iptable rules for the NodePort service by running the following command:

      $ sudo iptables-save | grep NODEPORT

      Example output

      -A OUTPUT -j OVN-KUBE-NODEPORT
      -A OVN-KUBE-NODEPORT -p tcp -m addrtype --dst-type LOCAL -m tcp --dport 30326 -j DNAT --to-destination 10.43.95.170:80

      OVN-Kubernetes configures the OVN-KUBE-NODEPORT iptable chain in the NAT table to match the packet with the destination port and Destination Network Address Translates (DNATs) the packet to the clusterIP service. The packet is then routed to the OVN network through the gateway bridge br-ex using routing rules on the host.

    2. View the hosts routing table by running the following command:

      $ ip route

      Example output

      10.43.0.0/16 via 192.168.122.1 dev br-ex mtu 1400

      This routing rule matches the Kubernetes service IP address range and forwards the packet to the gateway bridge br-ex. You must enable ip_forward on the host. After the packet is forwarded to the OVS bridge br-ex, it is handled by OpenFlow rules in OVS. OpenFlow then steers the packet to the OVN network and eventually to the pod.

1.5. Asynchronous errata updates

Security, bug fix, and enhancement updates for Red Hat build of MicroShift 4.13 are released as asynchronous errata through the Red Hat Network. All Red Hat build of MicroShift 4.13 errata are available on the Red Hat Customer Portal. Read the Red Hat build of MicroShift Life Cycle for more information about asynchronous errata.

Red Hat Customer Portal users can enable errata notifications in the account settings for Red Hat Subscription Management (RHSM). When errata notifications are enabled, you are notified through email whenever new errata relevant to your registered systems are released.

Note

Red Hat Customer Portal user accounts must have systems registered and consuming Red Hat build of MicroShift entitlements for Red Hat build of MicroShift errata notification emails to generate.

This section will continue to be updated over time to provide notes on enhancements and bug fixes for future asynchronous errata releases of Red Hat build of MicroShift 4.13. Versioned asynchronous releases, for example with the form Red Hat build of MicroShift 4.13.z, will be detailed in subsections. In addition, releases in which the errata text cannot fit in the space provided by the advisory will be detailed in subsections that follow.

1.5.1. RHSA-2023:1329 - Red Hat build of MicroShift 4.13.0 bug fix and security update

Issued: 2023-05-17

Red Hat build of MicroShift release 4.13.0 is now available. The list of bug fixes that are included in the update is documented in the RHSA-2023:1329 advisory. The images that are included in the update are provided by the RHSA-2023:1326 advisory.

For the TopoLVM image, read lvms4/topolvm-rhel9.

1.5.2. RHSA-2023:3307 - Red Hat build of MicroShift 4.13.1 bug fix and security update

Issued: 2023-05-30

Red Hat build of MicroShift release 4.13.1, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:3307 advisory. The images that are included in the update are provided by the RHSA-2023:3304 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.3. RHSA-2023:3540 - Red Hat build of MicroShift 4.13.3 bug fix and security update

Issued: 2023-06-13

Red Hat build of MicroShift release 4.13.3, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHSA-2023:3540 advisory. The images that are included in the update are provided by the RHSA-2023:3537 advisory.

1.5.3.1. Bug Fixes

  • Previously, when the operating system was not set to the default route, OVN-Kubernetes caused the cluster to function improperly. With this update, the default routes were removed and the OVN-Kubernetes pod runs as expected. (OCPBUGS-13548)

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.4. RHBA-2023:3620 - Red Hat build of MicroShift 4.13.4 bug fix and security update

Issued: 2023-06-23

Red Hat build of MicroShift release 4.13.4, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:3620 advisory. The images that are included in the update are provided by the RHSA-2023:3614 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.5. RHBA-2023:3620 - Red Hat build of MicroShift 4.13.5 bug fix and security update

Issued: 2023-07-20

Red Hat build of MicroShift release 4.13.5, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4094 advisory. The images that are included in the update are provided by the RHSA-2023:4091 advisory.

1.5.5.1. Bug Fixes

  • Red Hat build of MicroShift uses the OVN-Kubernetes local gateway mode. All pod egress traffic goes through the host kernel before entering or leaving the host. With this release, the flag externalGatewayInterface to specify a second gateway interface is removed.(OCPBUGS-14880)

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.6. RHBA-2023:4428 - Red Hat build of MicroShift 4.13.6 bug fix and security update

Issued: 2023-07-26

Red Hat build of MicroShift release 4.13.6, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4428 advisory. The images that are included in the update are provided by the RHSA-2023:4426 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.7. RHBA-2023:4458 - Red Hat build of MicroShift 4.13.8 bug fix and security update

Issued: 2023-08-08

Red Hat build of MicroShift release 4.13.8, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4458 advisory. The images that are included in the update are provided by the RHSA-2023:4456 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.8. RHBA-2023:4605 - Red Hat build of MicroShift 4.13.9 bug fix and security update

Issued: 2023-08-16

Red Hat build of MicroShift release 4.13.9, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4605 advisory. The images that are included in the update are provided by the RHSA-2023:4603 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.9. RHBA-2023:4733 - Red Hat build of MicroShift 4.13.10 bug fix and security update

Issued: 2023-08-30

Red Hat build of MicroShift release 4.13.10, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4733 advisory. The images that are included in the update are provided by the RHSA-2023:4731 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.10. RHBA-2023:4733 - Red Hat build of MicroShift 4.13.11 bug fix update

Issued: 2023-09-05

Red Hat build of MicroShift release 4.13.11 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4907 advisory. The images that are included in the update are provided by the RHBA-2023:4905 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.11. RHBA-2023:5013 - Red Hat build of MicroShift 4.13.12 bug fix update

Issued: 2023-09-12

Red Hat build of MicroShift release 4.13.12 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5013 advisory. The images that are included in the update are provided by the RHBA-2023:5011 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.12. RHBA-2023:5157 - Red Hat build of MicroShift 4.13.13 bug fix and security update

Issued: 2023-09-19

Red Hat build of MicroShift release 4.13.13 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5157 advisory. The images that are included in the update are provided by the RHSA-2023:5155 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.13. RHBA-2023:5386 - Red Hat build of MicroShift 4.13.14 bug fix update

Issued: 2023-10-05

Red Hat build of MicroShift release 4.13.14 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5386 advisory. The images that are included in the update are provided by the RHBA-2023:5382 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.14. RHBA-2023:5386 - Red Hat build of MicroShift 4.13.15 bug fix update

Issued: 2023-10-10

Red Hat build of MicroShift release 4.13.15 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5469 advisory. The images that are included in the update are provided by the RHBA-2023:5467 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.15. RHBA-2023:5674 - Red Hat build of MicroShift 4.13.17 bug fix and security update

Issued: 2023-10-17

Red Hat build of MicroShift release 4.13.17, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5674 advisory. The images that are included in the update are provided by the RHSA-2023:5672 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.16. RHBA-2023:5904 - Red Hat build of MicroShift 4.13.18 bug fix and security update

Issued: 2023-10-24

Red Hat build of MicroShift release 4.13.18, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5904 advisory. The images that are included in the update are provided by the RHSA-2023:5902 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.17. RHBA-2023:6132 - Red Hat build of MicroShift 4.13.19 bug fix update and security update

Issued: 2023-10-30

Red Hat build of MicroShift release 4.13.19, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:6132 advisory. The images that are included in the update are provided by the RHSA-2023:6130 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

1.5.18. RHBA-2023:6259 - Red Hat build of MicroShift 4.13.21 bug fix and enhancement update

Issued: 2023-11-08

Red Hat build of MicroShift release 4.13.21 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:6259 advisory. The images that are included in the update are provided by the RHSA-2023:6257 advisory.

For the TopoLVM image, see lvms4/topolvm-rhel9.

Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.