此内容没有您所选择的语言版本。
Chapter 3. Enhancements
This section describes the major enhancements introduced in Red Hat OpenShift Data foundation 4.13.
3.1. Disable Multicloud Object Gateway external service during deployment
With this release, there is an option to deploy OpenShift data Foundation without the Multicloud Object Gateway load balancer service using the command line interface (CLI). You need to use the disableLoadBalancerService
variable in the storagecluster
CRD. This provides enhanced security and does not expose services externally to the cluster.
For more information, see the knowledgebase article Install Red Hat OpenShift Data Foundation (previously known as OpenShift Container Storage) 4.X in internal mode using command line interface and Disabling Multicloud Object Gateway external service after deploying OpenShift Data Foundation.
3.2. Network File System metrics for enhanced observability
Network File System (NFS) metrics dashboard provides observability for NFS mounts such as the following:
- Mount point for any exported NFS shares
- Number of client mounts
- A breakdown statistics of the clients that are connected to help determine internal versus the external client mounts
- Grace period status of the Ganesha server
- Health statuses of the Ganesha server
For more information, see Network File System metrics.
3.3. Metrics to improve reporting of unhealthy blocklisted nodes
With this enhancement, alerts are displayed in OpenShift Web Console to inform about the blocklisted kernel RBD client on a worker node. This helps to reduce any potential operational issue or troubleshooting time.
3.4. Enable Ceph exporter with labeled performance counters in Rook
With this enhancement, Ceph exporter is enabled in Rook and provided with labeled performance counters for rbd-mirror
metrics thereby enhancing scalability for a larger number of images.
3.5. New Amazon Web Services (AWS) regions for Multicloud Object Gateway backing store
With this enhancement, the new regions that were recently added to AWS are included in the list of regions for Multicloud Object Gateway backing store. As a result, it is now possible to deploy default backing store on the new regions.
3.6. Allow RBD pool name with an underscore or period
Previously, creating a storage system in OpenShift Data Foundation using an external Ceph cluster would fail if the RADOS block device (RBD) pool name contained an underscore (_) or a period(.).
With this fix, the Python script (ceph-external-cluster-details-exporter.py
) is enhanced to contain underscore and period so that an alias for the RBD pool names can be passed in. This alias allows the OpenShift Data Foundation to adopt an external Ceph cluster with RBD pool names containing an underscore(_) or a period(.).
3.7. OSD replicas are set to match the number of failure domains
Previously, an unbalanced situation used to occur when the number of repliacas did not match the number of failure domains.
With this enhancement, OSD replicas are set to match the number of failure domains thereby avoiding the imbalance. For example, when a cluster is deployed on 4 zone cluster with 4 nodes, 4 OSD replicas are created.
3.8. Change in default permission and FSGroupPolicy
Permissions of newly created volumes now defaults to a more secure 755 instead of 777. FSGroupPolicy is now set to File (instead of ReadWriteOnceWithFSType in ODF 4.11) to allow application access to volumes based on FSGroup. This involves Kubernetes using fsGroup to change permissions and ownership of the volume to match user requested fsGroup in the pod’s SecurityPolicy.
Existing volumes with a huge number of files may take a long time to mount since changing permissions and ownership takes a lot of time.
For more information, see this knowledgebase solution.