Este contenido no está disponible en el idioma seleccionado.
Chapter 1. Red Hat OpenShift GitOps release notes
For additional information about the OpenShift GitOps lifecycle and supported platforms, refer to the OpenShift Operator Life Cycles and Red Hat OpenShift Container Platform Life Cycle Policy.
Release notes contain information about new and deprecated features, breaking changes, and known issues. The following release notes apply for the most recent OpenShift GitOps releases on OpenShift Container Platform.
Red Hat OpenShift GitOps is a declarative way to implement continuous deployment for cloud native applications. Red Hat OpenShift GitOps ensures consistency in applications when you deploy them to different clusters in different environments, such as development, staging, and production. Red Hat OpenShift GitOps helps you automate the following tasks:
- Ensure that the clusters have similar states for configuration, monitoring, and storage
- Recover or recreate clusters from a known state
- Apply or revert configuration changes to multiple OpenShift Container Platform clusters
- Associate templated configuration with different environments
- Promote applications across clusters, from staging to production
For an overview of Red Hat OpenShift GitOps, see About Red Hat OpenShift GitOps.
1.1. Compatibility and support matrix Copiar enlaceEnlace copiado en el portapapeles!
Some features in this release are currently in Technology Preview. These experimental features are not intended for production use.
In the table, features are marked with the following statuses:
- TP: Technology Preview
- GA: General Availability
- NA: Not Applicable
-
In OpenShift Container Platform 4.13, the
stable
channel has been removed. Before upgrading to OpenShift Container Platform 4.13, if you are already on thestable
channel, choose the appropriate channel and switch to it. - The maintenance support for OpenShift Container Platform 4.12 on IBM Power has ended from 17 July 2024. If you are using Red Hat OpenShift GitOps on OpenShift Container Platform 4.12, upgrade to OpenShift Container Platform 4.13 or later.
OpenShift GitOps | Component Versions | OpenShift Versions | |||||||
---|---|---|---|---|---|---|---|---|---|
Version | kam | Argo CD CLI | Helm | Kustomize | Argo CD | Argo Rollouts | Dex | RH SSO | |
1.15.0 | NA | 2.13.1 TP | 3.15.4 GA | 5.4.3 GA | 2.13.1 GA | 1.7.2 GA | 2.41.1 GA | 7.6.0 GA | 4.14-4.17 |
1.14.0 | 0.0.51 TP | 2.12.3 TP | 3.15.2 GA | 5.4.2 GA | 2.12.3 GA | 1.7.1 GA | 2.39.1 GA | 7.6.0 GA | 4.12-4.17 |
1.13.0 | 0.0.51 TP | 2.11.3 TP | 3.14.4 GA | 5.2.1 GA | 2.11.3 GA | 1.6.6 GA | 2.37.0 GA | 7.6.0 GA | 4.12-4.16 |
-
Starting from Red Hat OpenShift GitOps 1.15, support is no longer provided for the Red Hat OpenShift GitOps Application Manager command-line interface (CLI),
kam
. - RH SSO is an abbreviation for Red Hat SSO.
1.1.1. Technology Preview features Copiar enlaceEnlace copiado en el portapapeles!
The features mentioned in the following table are currently in Technology Preview (TP). These experimental features are not intended for production use.
Feature | TP in Red Hat OpenShift GitOps versions | GA in Red Hat OpenShift GitOps versions |
---|---|---|
The GitOps | 1.12.0 | NA |
Argo CD application sets in non-control plane namespaces | 1.12.0 | NA |
The | 1.10.0 | NA |
Dynamic scaling of shards | 1.10.0 | NA |
Argo Rollouts | 1.9.0 | 1.13.0 |
ApplicationSet Progressive Rollout Strategy | 1.8.0 | NA |
Multiple sources for an application | 1.8.0 | 1.15.0 |
Argo CD applications in non-control plane namespaces | 1.7.0 | 1.13.0 |
The Red Hat OpenShift GitOps Environments page in the Developer perspective of the OpenShift Container Platform web console | 1.1.0 | NA |
1.2. Release notes for Red Hat OpenShift GitOps 1.15.4 Copiar enlaceEnlace copiado en el portapapeles!
Red Hat OpenShift GitOps 1.15.4 is now available on OpenShift Container Platform 4.12, 4.14, 4.15, 4.16, and 4.17.
1.2.1. Errata updates Copiar enlaceEnlace copiado en el portapapeles!
1.2.1.1. RHSA-2025:15387 - Red Hat OpenShift GitOps 1.15.4 security update advisory Copiar enlaceEnlace copiado en el portapapeles!
Issued: 2025-09-04
The list of security fixes that are included in this release is documented in the following advisory:
If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:
oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
1.3. Release notes for Red Hat OpenShift GitOps 1.15.3 Copiar enlaceEnlace copiado en el portapapeles!
Red Hat OpenShift GitOps 1.15.3 is now available on OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17.
1.3.1. Errata updates Copiar enlaceEnlace copiado en el portapapeles!
1.3.1.1. RHSA-2025:8277 - Red Hat OpenShift GitOps 1.15.3 security update advisory Copiar enlaceEnlace copiado en el portapapeles!
Issued: 2025-06-28
The list of security fixes that are included in this release is documented in the following advisory:
If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:
oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
1.3.2. Fixed issues Copiar enlaceEnlace copiado en el portapapeles!
-
Before this update, the scope configuration in the RBAC
argocd-rbac-cm
config map was configured with'[groups,email]'
without the corresponding change in.spec.rbac.scopes
. This discrepancy led to conflicts during config map synchronization when transitioning to Keycloak SSO. With this update, the Red Hat OpenShift GitOps Operator now maintains the existing RBAC scope configuration. GITOPS-5977
1.4. Release notes for Red Hat OpenShift GitOps 1.15.2 Copiar enlaceEnlace copiado en el portapapeles!
Red Hat OpenShift GitOps 1.15.2 is now available on OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17.
1.4.1. Errata updates Copiar enlaceEnlace copiado en el portapapeles!
1.4.1.1. RHSA-2025:7753 - Red Hat OpenShift GitOps 1.15.2 security update advisory Copiar enlaceEnlace copiado en el portapapeles!
Issued: 2025-05-15
The list of security fixes that are included in this release is documented in the following advisory:
If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:
oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
1.4.2. Fixed issues Copiar enlaceEnlace copiado en el portapapeles!
-
Before this update, you might have experienced crashes in the Argo CD components, such as,
server
,repo-server
, andapplication-controller
, when accessing the Redis instance due to network or DNS instabilities within the cluster. These crashes occured from a race condition in thego-redis
client library when multiple connections in a connection pool call thedial hook
function. With this update, integrating an updatedgo-redis
client library that eliminates race conditions duringdial hook
function calls resolves the issue, and improves the handling and recovery from network and DNS errors, ensuring greater stability for Argo CD components. GITOPS-6287 -
Before this update, upgrading the Red Hat OpenShift GitOps Operator to v1.15.1 raised a health check error that prevented Red Hat Advanced Cluster Management (RHACM) policies from syncing. With this update, adding a missing nil check to
.status.placement
for Policy resolves the issue. GITOPS-6664 -
Before this update, when
.spec.source.targetRevision
was set to an annotated Git tag, Argo CD treated resource drift as needing reconciliation and reverted the manual changes on the cluster, despite self-healing being disabled. This behavior was inconsistent with that of lightweight tags. With this update, whenselfHeal
is set tofalse
, manual changes to live resources are no longer reverted, even if you are using an annotated Git tag as the source, and Argo CD now handles annotated and lightweight tags consistently. GITOPS-6150 - Before this update, Argo CD monitoring worked automatically when deployed in any namespace and user-workload monitoring support for workloads did not require any manual configuration. With this update, if you deploy Argo CD in a non-OpenShift Container Platform namespace, you must enable user-workload monitoring in OpenShift Container Platform. For more information, see Enabling monitoring for user-defined projects. GITOPS-6251
1.5. Release notes for Red Hat OpenShift GitOps 1.15.1 Copiar enlaceEnlace copiado en el portapapeles!
Red Hat OpenShift GitOps 1.15.1 is now available on OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17.
1.5.1. Errata updates Copiar enlaceEnlace copiado en el portapapeles!
1.5.1.1. RHSA-2025:1888 - Red Hat OpenShift GitOps 1.15.1 security update advisory Copiar enlaceEnlace copiado en el portapapeles!
Issued: 2025-02-26
The list of security fixes that are included in this release is documented in the following advisory:
If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:
oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
1.5.2. Fixed issues Copiar enlaceEnlace copiado en el portapapeles!
-
Before this update, any changes to the
serviceAccountName
andserviceAccount
fields in the Redis deployment were not reconciled by the Red Hat OpenShift GitOps Operator. With this update, this issue is fixed by ensuring that any unintended changes to these fields are reset to their expected value,<argocd-instance-name>-argocd-redis
. GITOPS-6032 - Before this update, the Notifications Controller reconciled continuously if the context field included multiple entries, generating a large number of logs. With this update, the controller’s reconciliation behavior is fixed, preventing repeated log entries when multiple context entries are used. GITOPS-5970
-
Before this update, the health check status of a policy, a
Policy
resource frompolicy.open-cluster-management.io
, displayed asProgressing
even when no clusters were targeted by the policy. With this update, the health check status remainsHealthy
when no clusters are targeted by the policy. GITOPS-6162
1.6. Release notes for Red Hat OpenShift GitOps 1.15.0 Copiar enlaceEnlace copiado en el portapapeles!
Red Hat OpenShift GitOps 1.15.0 is now available on OpenShift Container Platform 4.14, 4.15, 4.16, and 4.17.
1.6.1. Errata updates Copiar enlaceEnlace copiado en el portapapeles!
1.6.1.1. RHEA-2024:11002 - Red Hat OpenShift GitOps 1.15.0 security update advisory Copiar enlaceEnlace copiado en el portapapeles!
Issued: 2024-12-12
The list of security fixes that are included in this release are documented in the following advisory:
If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:
oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
1.6.2. New features Copiar enlaceEnlace copiado en el portapapeles!
With this update, Red Hat OpenShift GitOps supports the addition of extra volumes and volume mounts to the
ApplicationSet
Controller components. You can configure these additional resources by specifying the.spec.applicationSet.volumes
and.spec.applicationSet.volumeMounts
fields in the Argo CD Custom Resource (CR). GITOPS-5739Example
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Specifies the name of the
volume
for the Argo CDApplicationSet
Controller. - 2
- Specifies the
volume
type. It can be any Kubernetes supported volume type, such asemptyDir
,hostPath
,configMap
, and so on. - 3
- Specifies the name of the volume to be mounted, which must match the name of the
volume
defined in volumes. - 4
- Specifies the path inside the container where the volume will be mounted.
With this update, users can add custom labels and annotations to the server, repo-server, applicationset-controller, and application-controller pods. This enhancement improves observability for external systems that depend on resource labels or annotations for monitoring purposes. The following fields are introduced in the Argo CD CR to support this functionality:
-
.spec.server.labels
-
.spec.server.annotations
-
.spec.repo.labels
-
.spec.repo.annotations
-
.spec.controller.labels
-
.spec.controller.annotations
-
.spec. applicationSet.labels
-
.spec. applicationSet.annotations
For more information, see Custom Annotations and Labels. GITOPS-5674
-
Before this update, users could not configure some replicas for the Argo Rollouts controller by using the
RolloutManager
custom resource (CR). With this update, high availability (HA) support is introduced by adding a new.spec.ha
field to theRolloutManager
CR.When you enable high availability, the GitOps Operator automatically sets the number of replicas to 2, the leader election is activated, and default anti-affinity rules are applied to ensure redundancy and reliability. GITOPS-5622
- With this update, the Argo CD multi-source application functionality in GitOps Operator is promoted from Technology Preview (TP) to General Availability (GA). Use this feature to define and manage applications with multiple source repositories. GITOPS-5511
With this update, you can now use Kubernetes TLS-type secrets to configure custom TLS certificates for Routes in the Argo CD CR. Previously, TLS data had to be embedded directly in the Argo CD CR as plain text, which could pose security risks due to the sensitive nature of TLS information.
To enhance security, you must use Kubernetes secrets to manage TLS data. The following fields are introduced in the Argo CD CR to reference Kubernetes secrets of type
kubernetes.io/tls
containing TLS data:-
.spec.server.route.tls.externalCertificate
-
.spec.applicationSet.webhookServer.route.tls.externalCertificate
-
.spec.prometheus.route.tls.externalCertificate
-
.spec.grafana.route.tls.externalCertificate
For more information about configuring a route for custom TLS certificate, see examples in Custom TLS certificates for Routes. GITOPS-5232
-
-
With this update, Restricted pod security admission (PSA) labels are applied to the
openshift-gitops
namespace to ensure compliance with OpenShift Container Platform standards. If you are running additional workloads in theopenshift-gitops
namespace, ensure they comply with restricted PSA requirements. If compliance with restricted PSA is not feasible, use a user-defined, cluster-scoped Argo CD instance. In such instances, PSA labels are not applied or controlled by the GitOps Operator. GITOPS-5221 -
Before this update,
trafficmanagement
andmetric
plugins could not be configured by using theRolloutManager
CR in Argo Rollouts. With this update, you can now specifytrafficmanagement
andmetric
plugins in theRolloutManager
CR. The GitOps Operator automatically updates the config map when these plugin fields are added, modified, or removed. This enhancement allows users to managetrafficmanagement
andmetric
plugins natively through theRolloutManager
CR, eliminating the need for manual config map updates. GITOPS-4217 With this update, the Sources tab in the Details panel of a multi-source application now includes two new buttons:
- Add Source: Opens a new form-based panel for adding a new source entry. You can specify the repository URL and other source-specific details in this panel.
- Delete: Allows you to remove a specific source from the application.
With this update, users can now enable or disable the Argo Rollouts UI in Argo CD instances by setting a new boolean field,
enableRolloutsUI
, in the server component of the Argo CD CR. GITOPS-3604Example
Copy to Clipboard Copied! Toggle word wrap Toggle overflow - 1
- Set this value to
true
to configure theenableRolloutsUI
field.
-
With this update, you can access documentation on configuring the
ApplicationSet
controller in the Argo CD CR to use different policies. For more information, see ApplicationSet Controller policies. GITOPS-5236
1.6.3. Fixed issues Copiar enlaceEnlace copiado en el portapapeles!
- Before this update, when the desired state for an existing Ingress changed the host, the new host information was not applied. This update fixes the issue by adding Ingress checks to ensure the Ingress is updated when the host changes. If there is a change in the Ingress host, it will be correctly updated with the new value, ensuring that the desired state is reflected. GITOPS-5386
-
Before this update, when the desired state for the server service type changes, for example, from
ClusterIP
toNodePort
, the change was not applied automatically to the cluster without first deleting the resource. This update fixes the issue by adding a server service check to apply changes to the server service. If the desired state for the server service type changes, it is applied automatically to the cluster without deleting the resource. GITOPS-5385 -
Before this update, users were unable to set a custom image for the
ApplicationSet
Controller after specifying it in the Argo CD CR. This update fixes the issue by allowing users to set a custom image for theApplicationSet
Controller. GITOPS-5395 - Before this update, Argo CD was unable to retrieve the correct TLS certificate for Helm OCI registries if the URL contained a path or port number. This update fixes the issue by using a fix in upstream Argo CD that ensures the URL is correctly parsed, allowing Argo CD to retrieve and return a valid TLS certificate. GITOPS-5081
1.6.4. Deprecated and removed features Copiar enlaceEnlace copiado en el portapapeles!
1.6.4.1. Removal of Red Hat OpenShift GitOps Application Manager CLI, kam Copiar enlaceEnlace copiado en el portapapeles!
With this release, support for the Red Hat OpenShift GitOps Application Manager command-line interface (CLI),
kam
, has been removed. Thekam
component is no longer included in new installations, and all references have been removed from the Red Hat OpenShift GitOps documentation. GITOPS-4466To remove
kam
resources after an update, run the following command:$ oc delete deployment,service,route kam -n openshift-gitops
$ oc delete deployment,service,route kam -n openshift-gitops
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.6.5. Breaking change Copiar enlaceEnlace copiado en el portapapeles!
1.6.5.1. Updated OpenShift API schemas and insecureEdgeTerminationPolicy field change Copiar enlaceEnlace copiado en el portapapeles!
With this update, the OpenShift API schemas used by the Red Hat OpenShift GitOps Operator have been changed to include the latest fields from the Route API, resulting in a breaking change. If the following fields are configured with the Disable option in the Argo CD CR, they must be changed to None before updating to ensure compatibility with the new schema:
-
.spec.server.route.tls.insecureEdgeTerminationPolicy
-
.spec.applicationSet.webhookServer.route.tls.insecureEdgeTerminationPolicy
-
.spec.prometheus.route.tls.insecureEdgeTerminationPolicy
-
.spec.grafana.route.tls.insecureEdgeTerminationPolicy
-