Chapter 3. Enhancements


This section describes the major enhancements introduced in Red Hat OpenShift Data foundation 4.13.

3.1. Disable Multicloud Object Gateway external service during deployment

With this release, there is an option to deploy OpenShift data Foundation without the Multicloud Object Gateway load balancer service using the command line interface (CLI). You need to use the disableLoadBalancerService variable in the storagecluster CRD. This provides enhanced security and does not expose services externally to the cluster.

For more information, see the knowledgebase article Install Red Hat OpenShift Data Foundation (previously known as OpenShift Container Storage) 4.X in internal mode using command line interface and Disabling Multicloud Object Gateway external service after deploying OpenShift Data Foundation.

3.2. Network File System metrics for enhanced observability

Network File System (NFS) metrics dashboard provides observability for NFS mounts such as the following:

  • Mount point for any exported NFS shares
  • Number of client mounts
  • A breakdown statistics of the clients that are connected to help determine internal versus the external client mounts
  • Grace period status of the Ganesha server
  • Health statuses of the Ganesha server

For more information, see Network File System metrics.

3.3. Metrics to improve reporting of unhealthy blocklisted nodes

With this enhancement, alerts are displayed in OpenShift Web Console to inform about the blocklisted kernel RBD client on a worker node. This helps to reduce any potential operational issue or troubleshooting time.

3.4. Enable Ceph exporter with labeled performance counters in Rook

With this enhancement, Ceph exporter is enabled in Rook and provided with labeled performance counters for rbd-mirror metrics thereby enhancing scalability for a larger number of images.

3.5. New Amazon Web Services (AWS) regions for Multicloud Object Gateway backing store

With this enhancement, the new regions that were recently added to AWS are included in the list of regions for Multicloud Object Gateway backing store. As a result, it is now possible to deploy default backing store on the new regions.

3.6. Allow RBD pool name with an underscore or period

Previously, creating a storage system in OpenShift Data Foundation using an external Ceph cluster would fail if the RADOS block device (RBD) pool name contained an underscore (_) or a period(.).

With this fix, the Python script (ceph-external-cluster-details-exporter.py) is enhanced to contain underscore and period so that an alias for the RBD pool names can be passed in. This alias allows the OpenShift Data Foundation to adopt an external Ceph cluster with RBD pool names containing an underscore(_) or a period(.).

3.7. OSD replicas are set to match the number of failure domains

Previously, an unbalanced situation used to occur when the number of repliacas did not match the number of failure domains.

With this enhancement, OSD replicas are set to match the number of failure domains thereby avoiding the imbalance. For example, when a cluster is deployed on 4 zone cluster with 4 nodes, 4 OSD replicas are created.

3.8. Change in default permission and FSGroupPolicy

Permissions of newly created volumes now defaults to a more secure 755 instead of 777. FSGroupPolicy is now set to File (instead of ReadWriteOnceWithFSType in ODF 4.11) to allow application access to volumes based on FSGroup. This involves Kubernetes using fsGroup to change permissions and ownership of the volume to match user requested fsGroup in the pod’s SecurityPolicy.

Note

Existing volumes with a huge number of files may take a long time to mount since changing permissions and ownership takes a lot of time.

For more information, see this knowledgebase solution.

Red Hat logoGithubRedditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.