이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Chapter 1. Red Hat OpenShift GitOps release notes
Release notes contain information about new and deprecated features, breaking changes, fixed issues, and known issues. The following release notes apply to the most recent OpenShift GitOps releases on OpenShift Container Platform.
Red Hat OpenShift GitOps is a declarative way to implement continuous deployment for cloud native applications. Red Hat OpenShift GitOps ensures consistency in applications when you deploy them to different clusters in different environments, such as development, staging, and production. Red Hat OpenShift GitOps helps you automate the following tasks:
- Ensure that the clusters have similar states for configuration, monitoring, and storage.
- Recover or recreate clusters from a known state.
- Apply or revert configuration changes to multiple OpenShift Container Platform clusters.
- Associate templated configuration with different environments.
- Promote applications across clusters, from staging to production.
For an overview of Red Hat OpenShift GitOps, see About Red Hat OpenShift GitOps.
For additional information about the OpenShift GitOps lifecycle and supported platforms, refer to the OpenShift Operator Life Cycles and Red Hat OpenShift Container Platform Life Cycle Policy.
1.1. Compatibility and support matrix 링크 복사링크가 클립보드에 복사되었습니다!
Some features in this release are currently in Technology Preview. These experimental features are not intended for production use.
In the table, features are marked with the following statuses:
- TP: Technology Preview
- GA: General Availability
- NA: Not Applicable
-
In OpenShift Container Platform 4.13, the
stablechannel has been removed. Before upgrading to OpenShift Container Platform 4.13, if you are already on thestablechannel, choose the appropriate channel and switch to it. - The maintenance support for OpenShift Container Platform 4.12 on IBM Power has ended from 17 July 2024. If you are using Red Hat OpenShift GitOps on OpenShift Container Platform 4.12, upgrade to OpenShift Container Platform 4.13 or later.
| GitOps | Argo CD CLI | Helm | Kustomize | Argo CD | Argo Rollouts | Dex | RH SSO | Argo CD Agent | OpenShift Container Platform |
|---|---|---|---|---|---|---|---|---|---|
| 1.19.0 | 3.1.9 TP | 3.18.4 GA | 5.7.0 GA | 3.1.9 GA | 1.8.3 GA | 2.43.0 GA | NA | 0.5.1 GA | 4.14, 4.16-4.20 |
| 1.18.0 | 3.1.5 TP | 3.18.4 GA | 5.7.0 GA | 3.1.6 GA | 1.8.3 GA | 2.43.0 GA | NA | 0.4.1 TP | 4.14, 4.16-4.20 |
| 1.17.0 | 3.0.12 TP | 3.17.1 GA | 5.6.0 GA | 3.0.12 GA | 1.8.3 GA | 2.41.1 GA | 7.6.0 GA | 0.2.1 TP | 4.12-4.19 |
- Starting from Red Hat OpenShift GitOps 1.18, support is no longer provided for Keycloak-based authentication. As an alternative, you can migrate to Dex or configure a self-managed Red Hat Build of Keycloak (RHBK) instance.
-
Starting from Red Hat OpenShift GitOps 1.15, support is no longer provided for the Red Hat OpenShift GitOps Application Manager command-line interface (CLI),
kam. - RH SSO is an abbreviation for Red Hat SSO.
1.1.1. Technology Preview features 링크 복사링크가 클립보드에 복사되었습니다!
The features mentioned in the following table are currently in Technology Preview (TP). These experimental features are not intended for production use.
| Feature | TP in Red Hat OpenShift GitOps versions | GA in Red Hat OpenShift GitOps versions |
|---|---|---|
| Argo CD Agent | 1.17.0 | 1.19.0 |
|
The GitOps | 1.12.0 | NA |
| Argo CD application sets in non-control plane namespaces | 1.12.0 | NA |
|
The | 1.10.0 | NA |
| Dynamic scaling of shards | 1.10.0 | NA |
| Argo Rollouts | 1.9.0 | 1.13.0 |
| ApplicationSet Progressive Rollout Strategy | 1.8.0 | NA |
| Multiple sources for an application | 1.8.0 | 1.15.0 |
| Argo CD applications in non-control plane namespaces | 1.7.0 | 1.13.0 |
| The Red Hat OpenShift GitOps Environments page in the Developer perspective of the OpenShift Container Platform web console | 1.1.0 | NA |
1.2. Release notes for Red Hat OpenShift GitOps 1.19.0 링크 복사링크가 클립보드에 복사되었습니다!
Red Hat OpenShift GitOps 1.19.0 is available on OpenShift Container Platform 4.14, 4.16, 4.17, 4.18, 4.19 and 4.20.
1.2.1. Errata updates 링크 복사링크가 클립보드에 복사되었습니다!
- RHEA-2025:23541 - Red Hat OpenShift GitOps 1.19.0 enhancement update advisory
Issued: 2025-12-17
The list of enhancements that are included in this release are documented in the following advisory:
If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:
oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
1.2.2. New features 링크 복사링크가 클립보드에 복사되었습니다!
- Argo CD Agent-based architecture (General Availability)
With this update, the Argo CD Agent functionality in the Red Hat OpenShift GitOps Operator is promoted from Technology Preview (TP) to General Availability (GA). This feature enables Argo CD to use an agent-based, pull-based approach to Argo CD application deployment, which leads to improved scalability, security, reliability, and more. For more information, see the Additional Resources section, which includes the downstream documentation for the Argo CD Agent architecture and installation.
- Enhanced control over image pull policies for Argo CD components
The Red Hat OpenShift GitOps Operator now provides administrators with flexible, multi-level control over the
imagePullPolicyfor container images used by the Argo CD, GitOpsService, and RolloutsManager components. This enhancement enables organizations to define a consistent image pulling strategy across all managed instances. The Red Hat OpenShift GitOps Operator evaluates image pull policy settings in the following order:-
Instance-level policy: Defined in the Custom Resource (CR) using the
.spec.imagePullPolicyfield. This overrides all other values for that instance. -
Subscription-level policy: Configured using the
IMAGE_PULL_POLICYenvironment variable in the Red Hat OpenShift GitOps Subscription. Default policy: If no other policy is set, defaults to
IfNotPresent.The Red Hat OpenShift GitOps Operator supports the following standard Kubernetes
imagePullPolicyvalues:-
Always: Argo CD always pulls the image from the registry. -
IfNotPresent: Argo CD pulls the image only if it is not already present on the cluster node. Never: Argo CD never pulls the image and uses only the locally available image.For more information, see the Additional Resources section, which includes the downstream documentation for Image pull policies. GITOPS-7721
-
Instance-level policy: Defined in the Custom Resource (CR) using the
- Delegated management of Argo CD notification settings
With this update, cluster administrators can delegate the management of Argo CD notification settings to specific namespaces, enabling users to manage their configurations. Teams can now configure their own triggers, templates, and subscriptions for their Applications without requiring access to the control plane namespace configurations. Administrators can enable this capability by adding the target namespace to the
.spec.sourceNamespacesand.spec.notifications.sourceNamespacesfields in the Argo CD CR. For more information, see the Additional Resources section, which includes information about Configuring Notifications in any Namespace.- Argo CD Image Updater (Technology Preview)
With this update, Argo CD Image Updater is now available as a Technology Preview feature in Red Hat OpenShift GitOps. Argo CD Image Updater automatically updates container images for Kubernetes workloads managed by Argo CD. It tracks image versions in applications as defined by ImageUpdater CRs and updates it by applying parameter overrides through the Argo CD API or by using the Git write-back method. The image updater supports applications built with Kustomize or Helm. In this release, the Red Hat OpenShift GitOps Operator provides a productized container image of the Argo CD Image Updater and introduces a new property in the Argo CD CR to enable or disable the feature.
The following example shows how to configure the Argo CD Image Updater feature in the Argo CD CR:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more information, see the Additional Resources section, which includes an upstream documentation link for the Argo CD Image Updater.
ImportantThe Argo CD Image Updater feature is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
- Configurable resource limits and requests for GitOps plugin components
With this update, you can configure resource requests and limits for the cluster and GitOps plugin components through the
GitOpsServiceCR. Administrators can define these values by using the following fields:-
.spec.consolePlugin.backend.resources .spec.consolePlugin.gitopsPlugin.resourcesThis enhancement allows administrators to assign distinct or identical resource allocations to the GitOps plugin components, providing greater flexibility in resource management.
The following example shows how to configure resource requests and limits for the console plugin backend and GitOps plugin components in the
GitopsServiceCR:Copy to Clipboard Copied! Toggle word wrap Toggle overflow For more information, see the Additional Resources section, which includes information about Configurable resource limits and requests for the GitOps plugin.
-
- Argo CD Agent is built with FIPS-validated cryptographic modules
With this update, the Argo CD Agent component is built and verified with FIPS-validated cryptographic modules, ensuring that all cryptographic operations conform to Federal Information Processing Standards (FIPS). This enhancement enables the Argo CD Agent to operate in FIPS-enabled Red Hat Enterprise Linux and OpenShift environments and aligns the component with Red Hat’s FIPS certification standards.
- Optimized memory usage in the Red Hat OpenShift GitOps Operator manager
With this update, the Red Hat OpenShift GitOps Operator introduces memory usage optimizations in the Red Hat OpenShift GitOps Operator manager. The enhancement uses controller-runtime
Transformfunctions to remove unnecessary fields from cached secrets and config maps that the Red Hat OpenShift GitOps Operator does not require. This approach helps reduce memory consumption, especially in clusters with a large number of secrets and config maps. These improvements can lower the memory footprint of theopenshift-gitops-operator-controller-managerdeployment. The optimization is enabled by default. If you encounter unexpected behavior, you can disable the feature by adding the following environment variable to the Red Hat OpenShift GitOps OperatorSubscriptionCR:Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.3. Known issues 링크 복사링크가 클립보드에 복사되었습니다!
redis-ha-haproxydeployment does not automatically scale after upgradeWhen upgrading the Red Hat OpenShift GitOps Operator from a version earlier than 1.17.x, the
redis-ha-haproxydeployment might not automatically scale to 3 replicas, even if high availability (HA) mode was enabled before the upgrade. This issue occurs only when HA mode was configured before upgrading to version 1.17.x.Workaround: Manually scale the
redis-ha-haproxydeployment to the expected replica count by running the following command:oc scale deployment <argocd instance>-redis-ha-haproxy \ -n <argocd namespace> --replicas=3
$ oc scale deployment <argocd instance>-redis-ha-haproxy \ -n <argocd namespace> --replicas=3Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.2.4. Breaking changes 링크 복사링크가 클립보드에 복사되었습니다!
- Annotation-based resource tracking enabled by default
With this update, the Red Hat OpenShift GitOps Operator changes the default resource tracking behavior from label-based tracking to annotation-based tracking. Annotation-based tracking provides improved reliability and reduces the risk of errors caused by external tools or automation that might unintentionally copy tracking labels between resources. This change aligns the Red Hat OpenShift GitOps Operator with the upstream Argo CD defaults. After upgrading, you should complete remediation steps to ensure a smooth transition to annotation-based tracking. For guidance, see the upstream documentation. If you want to continue using label-based tracking, you can configure it by setting the
.spec.resourceTrackingMethodfield tolabelin the Argo CD CR. For more details, see the Additional Resources section, which includes the upstream link for the Argo CD Annotation-based resource tracking.- argocd-cmp-server requires glibc for FIPS compliance
With this update, the
argocd-cmp-server binaryis not statically linked. To meet FIPS compliance requirements, the binary is now dynamically linked and uses the OpenSSL implementation for cryptographic operations. As a result, the binary has a hard dependency onglibcand can run only on container images that includeglibcsupport. Minimal images such as BusyBox or Alpine (without glibc) do not meet this requirement, and running the binary on those images causes it to crash. Before upgrading, ensure that your CMP sidecar container image includesglibc. If it does not, use one of the following options:- Switch to an image that includes glibc, such as UBI or Fedora.
Use the default Argo CD base image, which includes glibc, is fully compatible, and is the recommended approach.
You can switch to the default Argo CD image by removing the image field from your sidecar container configuration under
.spec.repo.sidecarContainersin the Argo CD CR. During reconciliation, the Red Hat OpenShift GitOps Operator automatically applies the default image.
1.2.5. Deprecated and removed features 링크 복사링크가 클립보드에 복사되었습니다!
- Deprecated RPM package for openshift-gitops-argocd-cli (Technology Preview)
In Red Hat OpenShift GitOps 1.19, the
openshift-gitops-argocd-cliRPM package for RHEL 8 and RHEL 9 is deprecated. These RPMs are still supported in the current release, Red Hat OpenShift GitOps 1.19, to provide a transition period. To avoid disruption, update your deployment pipelines to download theopenshift-gitops-argocd-clibinaries directly from the Red Hat Content Gateway. For more information, see the Additional resources section, which includes a link to the Content Gateway hosting the Red Hat OpenShift GitOps client binaries.ImportantThe
openshift-gitops-argocd-cliRPM package is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.