MicroShift is Technology Preview software only.
For more information about the support scope of Red Hat Technology Preview software, see Technology Preview Support Scope.Chapter 1. Red Hat build of MicroShift 4.13 release notes
Red Hat build of MicroShift provides developers and IT organizations with small-form-factor and edge computing, delivered as an application that customers can deploy on top of their managed Red Hat Enterprise Linux (RHEL) devices at the edge. Built on OpenShift Container Platform and Kubernetes, Red Hat build of MicroShift provides an efficient way to operate single-node clusters in low-resource edge environments.
Red Hat build of MicroShift is designed to make control plane restarts economical and be lifecycle-managed as a single unit by the operating system. Updates, roll-backs, and configuration changes consist of simply staging another version in parallel and then - without relying on a network - flipping to and from that version and restarting.
1.1. About this release
The Red Hat build of MicroShift is Technology Preview only. Features and known issues that pertain to Red Hat build of MicroShift 4.13 are included in this topic. This Technology Preview software is not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using Red Hat build of MicroShift in production. Technology Preview provides early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, read Technology Preview Features Support Scope.
Red Hat does not support an update path from the Technology Preview version to later versions of Red Hat build of MicroShift. A new installation is necessary.
1.2. New features and enhancements
This release adds improvements related to the following components and concepts.
1.2.1. Red Hat Enterprise Linux (RHEL) for Edge 9.2
- Red Hat build of MicroShift runs on RHEL for Edge version 9.2 or later.
Red Hat build of MicroShift uses crun and Control Group v2 (cgroup v2). OpenShift Container Platform 4.13 defaults to Control Group v1. The divergence of control group versions is not anticipated to have a noticeable behavior difference on most workloads. If workloads rely on the cgroup file system layout, they may need to be updated to be compatible with cgroup v2.
- If you run third-party monitoring and security agents that depend on the cgroup file system, update the agents to versions that support cgroup v2.
- If you run cAdvisor as a standalone DaemonSet for monitoring pods and containers, update it to v0.43.0 or later.
- If you deploy Java applications with the JDK, ensure you are using JDK 11.0.16 and later or JDK 15 and later, which fully support cgroup v2.
1.2.2. Installation
This release includes integration with the greenboot health check framework. Greenboot assesses system health and automates a rollback to the last healthy state in the event of software trouble. You can add the optional greenboot RPM to your installation. For more information, read the Greenboot documentation.
1.2.3. Support
1.2.3.1. Red Hat build of MicroShift sos reports
With this release you can run an sos
report to collect troubleshooting information about a host. The report generates a detailed report with data from all enabled plugins and different components and applications in a system.
For more information, read About MicroShift sos reports.
1.2.3.2. Red Hat build of MicroShift etcd
With this release, Red Hat build of MicroShift etcd is run as a separate process whose lifecycle is managed automatically by Red Hat build of MicroShift. You can gather journalctl
logs to observe and debug the etcd server logs.
For more information, read Observe and debug the MicroShift etcd server.
1.2.4. Networking
1.2.4.1. Deploying network load balancers on Red Hat build of MicroShift
Red Hat build of MicroShift now offers a built-in implementation of network load balancers. For more details, read Deploying a TCP load balancer on a workload.
1.2.5. Storage
1.2.5.1. LVMS system requirements
Red Hat build of MicroShift configures LVMS dynamically based on the Volume Groups present. For more details, read the LVMS system requirements section of this documentation.
1.3. Bug fixes
-
Previously, Red Hat build of MicroShift generated
kubeconfig
files using certificate authorities (CA) shared by all embedded components. With this update, the CAs and certificates are reconfigured to ensure thekubeconfig
files are independent. (OCPBUGS#10223) -
Previously, the
systemd-resolved
configuration was used by kubelet as an alternative DNS resolver, but the DNS Corefile configuration did not use the samesystemd-resolved
configuration. With this update, Red Hat build of MicroShift uses the network name resolution provided bysystemd-resolved
for both kubelet and cluster DNS when thesystemd-resolved.service
is enabled. (OCPBUGS-6786)
1.4. Known issues
OVN-Kubernetes sets up an iptable chain in the network address translation (NAT) table to handle incoming traffic to the NodePort service. When the NodePort service is not reachable or the connection is refused, check the iptable rules on the host to make sure the relevant rules are properly inserted.
View the iptable rules for the NodePort service by running the following command:
$ sudo iptables-save | grep NODEPORT
Example output
-A OUTPUT -j OVN-KUBE-NODEPORT -A OVN-KUBE-NODEPORT -p tcp -m addrtype --dst-type LOCAL -m tcp --dport 30326 -j DNAT --to-destination 10.43.95.170:80
OVN-Kubernetes configures the
OVN-KUBE-NODEPORT
iptable chain in the NAT table to match the packet with the destination port and Destination Network Address Translates (DNATs) the packet to theclusterIP
service. The packet is then routed to the OVN network through the gateway bridgebr-ex
using routing rules on the host.View the hosts routing table by running the following command:
$ ip route
Example output
10.43.0.0/16 via 192.168.122.1 dev br-ex mtu 1400
This routing rule matches the Kubernetes service IP address range and forwards the packet to the gateway bridge
br-ex
. You must enableip_forward
on the host. After the packet is forwarded to the OVS bridgebr-ex
, it is handled by OpenFlow rules in OVS. OpenFlow then steers the packet to the OVN network and eventually to the pod.
1.5. Asynchronous errata updates
Security, bug fix, and enhancement updates for Red Hat build of MicroShift 4.13 are released as asynchronous errata through the Red Hat Network. All Red Hat build of MicroShift 4.13 errata are available on the Red Hat Customer Portal. Read the Red Hat build of MicroShift Life Cycle for more information about asynchronous errata.
Red Hat Customer Portal users can enable errata notifications in the account settings for Red Hat Subscription Management (RHSM). When errata notifications are enabled, you are notified through email whenever new errata relevant to your registered systems are released.
Red Hat Customer Portal user accounts must have systems registered and consuming Red Hat build of MicroShift entitlements for Red Hat build of MicroShift errata notification emails to generate.
This section will continue to be updated over time to provide notes on enhancements and bug fixes for future asynchronous errata releases of Red Hat build of MicroShift 4.13. Versioned asynchronous releases, for example with the form Red Hat build of MicroShift 4.13.z, will be detailed in subsections. In addition, releases in which the errata text cannot fit in the space provided by the advisory will be detailed in subsections that follow.
1.5.1. RHSA-2023:1329 - Red Hat build of MicroShift 4.13.0 bug fix and security update
Issued: 2023-05-17
Red Hat build of MicroShift release 4.13.0 is now available. The list of bug fixes that are included in the update is documented in the RHSA-2023:1329 advisory. The images that are included in the update are provided by the RHSA-2023:1326 advisory.
For the TopoLVM
image, read lvms4/topolvm-rhel9.
1.5.2. RHSA-2023:3307 - Red Hat build of MicroShift 4.13.1 bug fix and security update
Issued: 2023-05-30
Red Hat build of MicroShift release 4.13.1, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:3307 advisory. The images that are included in the update are provided by the RHSA-2023:3304 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.3. RHSA-2023:3540 - Red Hat build of MicroShift 4.13.3 bug fix and security update
Issued: 2023-06-13
Red Hat build of MicroShift release 4.13.3, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHSA-2023:3540 advisory. The images that are included in the update are provided by the RHSA-2023:3537 advisory.
1.5.3.1. Bug Fixes
- Previously, when the operating system was not set to the default route, OVN-Kubernetes caused the cluster to function improperly. With this update, the default routes were removed and the OVN-Kubernetes pod runs as expected. (OCPBUGS-13548)
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.4. RHBA-2023:3620 - Red Hat build of MicroShift 4.13.4 bug fix and security update
Issued: 2023-06-23
Red Hat build of MicroShift release 4.13.4, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:3620 advisory. The images that are included in the update are provided by the RHSA-2023:3614 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.5. RHBA-2023:3620 - Red Hat build of MicroShift 4.13.5 bug fix and security update
Issued: 2023-07-20
Red Hat build of MicroShift release 4.13.5, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4094 advisory. The images that are included in the update are provided by the RHSA-2023:4091 advisory.
1.5.5.1. Bug Fixes
-
Red Hat build of MicroShift uses the OVN-Kubernetes
local gateway
mode. All pod egress traffic goes through the host kernel before entering or leaving the host. With this release, the flagexternalGatewayInterface
to specify a second gateway interface is removed.(OCPBUGS-14880)
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.6. RHBA-2023:4428 - Red Hat build of MicroShift 4.13.6 bug fix and security update
Issued: 2023-07-26
Red Hat build of MicroShift release 4.13.6, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4428 advisory. The images that are included in the update are provided by the RHSA-2023:4426 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.7. RHBA-2023:4458 - Red Hat build of MicroShift 4.13.8 bug fix and security update
Issued: 2023-08-08
Red Hat build of MicroShift release 4.13.8, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4458 advisory. The images that are included in the update are provided by the RHSA-2023:4456 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.8. RHBA-2023:4605 - Red Hat build of MicroShift 4.13.9 bug fix and security update
Issued: 2023-08-16
Red Hat build of MicroShift release 4.13.9, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4605 advisory. The images that are included in the update are provided by the RHSA-2023:4603 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.9. RHBA-2023:4733 - Red Hat build of MicroShift 4.13.10 bug fix and security update
Issued: 2023-08-30
Red Hat build of MicroShift release 4.13.10, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4733 advisory. The images that are included in the update are provided by the RHSA-2023:4731 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.10. RHBA-2023:4733 - Red Hat build of MicroShift 4.13.11 bug fix update
Issued: 2023-09-05
Red Hat build of MicroShift release 4.13.11 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:4907 advisory. The images that are included in the update are provided by the RHBA-2023:4905 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.11. RHBA-2023:5013 - Red Hat build of MicroShift 4.13.12 bug fix update
Issued: 2023-09-12
Red Hat build of MicroShift release 4.13.12 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5013 advisory. The images that are included in the update are provided by the RHBA-2023:5011 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.12. RHBA-2023:5157 - Red Hat build of MicroShift 4.13.13 bug fix and security update
Issued: 2023-09-19
Red Hat build of MicroShift release 4.13.13 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5157 advisory. The images that are included in the update are provided by the RHSA-2023:5155 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.13. RHBA-2023:5386 - Red Hat build of MicroShift 4.13.14 bug fix update
Issued: 2023-10-05
Red Hat build of MicroShift release 4.13.14 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5386 advisory. The images that are included in the update are provided by the RHBA-2023:5382 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.14. RHBA-2023:5386 - Red Hat build of MicroShift 4.13.15 bug fix update
Issued: 2023-10-10
Red Hat build of MicroShift release 4.13.15 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5469 advisory. The images that are included in the update are provided by the RHBA-2023:5467 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.15. RHBA-2023:5674 - Red Hat build of MicroShift 4.13.17 bug fix and security update
Issued: 2023-10-17
Red Hat build of MicroShift release 4.13.17, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5674 advisory. The images that are included in the update are provided by the RHSA-2023:5672 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.16. RHBA-2023:5904 - Red Hat build of MicroShift 4.13.18 bug fix and security update
Issued: 2023-10-24
Red Hat build of MicroShift release 4.13.18, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:5904 advisory. The images that are included in the update are provided by the RHSA-2023:5902 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.17. RHBA-2023:6132 - Red Hat build of MicroShift 4.13.19 bug fix update and security update
Issued: 2023-10-30
Red Hat build of MicroShift release 4.13.19, which includes security updates, is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:6132 advisory. The images that are included in the update are provided by the RHSA-2023:6130 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.
1.5.18. RHBA-2023:6259 - Red Hat build of MicroShift 4.13.21 bug fix and enhancement update
Issued: 2023-11-08
Red Hat build of MicroShift release 4.13.21 is now available. The list of bug fixes that are included in the update is documented in the RHBA-2023:6259 advisory. The images that are included in the update are provided by the RHSA-2023:6257 advisory.
For the TopoLVM
image, see lvms4/topolvm-rhel9.