此内容没有您所选择的语言版本。

Chapter 1. Red Hat OpenShift GitOps release notes


Release notes contain information about new and deprecated features, breaking changes, fixed issues, and known issues. The following release notes apply to the most recent OpenShift GitOps releases on OpenShift Container Platform.

Red Hat OpenShift GitOps is a declarative way to implement continuous deployment for cloud native applications. Red Hat OpenShift GitOps ensures consistency in applications when you deploy them to different clusters in different environments, such as development, staging, and production. Red Hat OpenShift GitOps helps you automate the following tasks:

  • Ensure that the clusters have similar states for configuration, monitoring, and storage.
  • Recover or recreate clusters from a known state.
  • Apply or revert configuration changes to multiple OpenShift Container Platform clusters.
  • Associate templated configuration with different environments.
  • Promote applications across clusters, from staging to production.

For an overview of Red Hat OpenShift GitOps, see About Red Hat OpenShift GitOps.

Note

For additional information about the OpenShift GitOps lifecycle and supported platforms, refer to the OpenShift Operator Life Cycles and Red Hat OpenShift Container Platform Life Cycle Policy.

1.1. Compatibility and support matrix

Some features in this release are currently in Technology Preview. These experimental features are not intended for production use.

In the table, features are marked with the following statuses:

  • TP: Technology Preview
  • GA: General Availability
  • NA: Not Applicable
Important
  • In OpenShift Container Platform 4.13, the stable channel has been removed. Before upgrading to OpenShift Container Platform 4.13, if you are already on the stable channel, choose the appropriate channel and switch to it.
  • The maintenance support for OpenShift Container Platform 4.12 on IBM Power has ended from 17 July 2024. If you are using Red Hat OpenShift GitOps on OpenShift Container Platform 4.12, upgrade to OpenShift Container Platform 4.13 or later.
Expand
Table 1.1. GitOps and component versions
GitOpsArgo CD CLIHelmKustomizeArgo CDArgo RolloutsDexRH SSOArgo CD AgentOpenShift Container Platform

1.19.0

3.1.9 TP

3.18.4 GA

5.7.0 GA

3.1.9 GA

1.8.3 GA

2.43.0 GA

NA

0.5.1 GA

4.14, 4.16-4.20

1.18.0

3.1.5 TP

3.18.4 GA

5.7.0 GA

3.1.6 GA

1.8.3 GA

2.43.0 GA

NA

0.4.1 TP

4.14, 4.16-4.20

1.17.0

3.0.12 TP

3.17.1 GA

5.6.0 GA

3.0.12 GA

1.8.3 GA

2.41.1 GA

7.6.0 GA

0.2.1 TP

4.12-4.19

Important
  • Starting from Red Hat OpenShift GitOps 1.18, support is no longer provided for Keycloak-based authentication. As an alternative, you can migrate to Dex or configure a self-managed Red Hat Build of Keycloak (RHBK) instance.
  • Starting from Red Hat OpenShift GitOps 1.15, support is no longer provided for the Red Hat OpenShift GitOps Application Manager command-line interface (CLI), kam.
  • RH SSO is an abbreviation for Red Hat SSO.

1.1.1. Technology Preview features

The features mentioned in the following table are currently in Technology Preview (TP). These experimental features are not intended for production use.

Expand
Table 1.2. Technology Preview tracker
FeatureTP in Red Hat OpenShift GitOps versionsGA in Red Hat OpenShift GitOps versions

Argo CD Agent

1.17.0

1.19.0

The GitOps argocd CLI tool

1.12.0

NA

Argo CD application sets in non-control plane namespaces

1.12.0

NA

The round-robin cluster sharding algorithm

1.10.0

NA

Dynamic scaling of shards

1.10.0

NA

Argo Rollouts

1.9.0

1.13.0

ApplicationSet Progressive Rollout Strategy

1.8.0

NA

Multiple sources for an application

1.8.0

1.15.0

Argo CD applications in non-control plane namespaces

1.7.0

1.13.0

The Red Hat OpenShift GitOps Environments page in the Developer perspective of the OpenShift Container Platform web console

1.1.0

NA

1.2. Release notes for Red Hat OpenShift GitOps 1.19.0

Red Hat OpenShift GitOps 1.19.0 is available on OpenShift Container Platform 4.14, 4.16, 4.17, 4.18, 4.19 and 4.20.

1.2.1. Errata updates

RHEA-2025:23541 - Red Hat OpenShift GitOps 1.19.0 enhancement update advisory

Issued: 2025-12-17

The list of enhancements that are included in this release are documented in the following advisory:

If you have installed the Red Hat OpenShift GitOps Operator in the default namespace, run the following command to view the container images in this release:

$ oc describe deployment gitops-operator-controller-manager -n openshift-gitops-operator
Copy to Clipboard Toggle word wrap

1.2.2. New features

Argo CD Agent-based architecture (General Availability)

With this update, the Argo CD Agent functionality in the Red Hat OpenShift GitOps Operator is promoted from Technology Preview (TP) to General Availability (GA). This feature enables Argo CD to use an agent-based, pull-based approach to Argo CD application deployment, which leads to improved scalability, security, reliability, and more. For more information, see the Additional Resources section, which includes the downstream documentation for the Argo CD Agent architecture and installation.

GITOPS-7740

Enhanced control over image pull policies for Argo CD components

The Red Hat OpenShift GitOps Operator now provides administrators with flexible, multi-level control over the imagePullPolicy for container images used by the Argo CD, GitOpsService, and RolloutsManager components. This enhancement enables organizations to define a consistent image pulling strategy across all managed instances. The Red Hat OpenShift GitOps Operator evaluates image pull policy settings in the following order:

  • Instance-level policy: Defined in the Custom Resource (CR) using the .spec.imagePullPolicy field. This overrides all other values for that instance.
  • Subscription-level policy: Configured using the IMAGE_PULL_POLICY environment variable in the Red Hat OpenShift GitOps Subscription.
  • Default policy: If no other policy is set, defaults to IfNotPresent.

    The Red Hat OpenShift GitOps Operator supports the following standard Kubernetes imagePullPolicy values:

  • Always: Argo CD always pulls the image from the registry.
  • IfNotPresent: Argo CD pulls the image only if it is not already present on the cluster node.
  • Never: Argo CD never pulls the image and uses only the locally available image.

    For more information, see the Additional Resources section, which includes the downstream documentation for Image pull policies. GITOPS-7721

Delegated management of Argo CD notification settings

With this update, cluster administrators can delegate the management of Argo CD notification settings to specific namespaces, enabling users to manage their configurations. Teams can now configure their own triggers, templates, and subscriptions for their Applications without requiring access to the control plane namespace configurations. Administrators can enable this capability by adding the target namespace to the .spec.sourceNamespaces and .spec.notifications.sourceNamespaces fields in the Argo CD CR. For more information, see the Additional Resources section, which includes information about Configuring Notifications in any Namespace.

GITOPS-7704

Argo CD Image Updater (Technology Preview)

With this update, Argo CD Image Updater is now available as a Technology Preview feature in Red Hat OpenShift GitOps. Argo CD Image Updater automatically updates container images for Kubernetes workloads managed by Argo CD. It tracks image versions in applications as defined by ImageUpdater CRs and updates it by applying parameter overrides through the Argo CD API or by using the Git write-back method. The image updater supports applications built with Kustomize or Helm. In this release, the Red Hat OpenShift GitOps Operator provides a productized container image of the Argo CD Image Updater and introduces a new property in the Argo CD CR to enable or disable the feature.

The following example shows how to configure the Argo CD Image Updater feature in the Argo CD CR:

spec:
  imageUpdater:
    enabled: true
    env:
      - name: IMAGE_UPDATER_LOGLEVEL
        value: trace
    resources:
      limits:
        cpu: 500m
        memory: 1024Mi
      requests:
        cpu: 250m
        memory: 512Mi
Copy to Clipboard Toggle word wrap

For more information, see the Additional Resources section, which includes an upstream documentation link for the Argo CD Image Updater.

Important

The Argo CD Image Updater feature is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

GITOPS-7491

Configurable resource limits and requests for GitOps plugin components

With this update, you can configure resource requests and limits for the cluster and GitOps plugin components through the GitOpsService CR. Administrators can define these values by using the following fields:

  • .spec.consolePlugin.backend.resources
  • .spec.consolePlugin.gitopsPlugin.resources

    This enhancement allows administrators to assign distinct or identical resource allocations to the GitOps plugin components, providing greater flexibility in resource management.

    The following example shows how to configure resource requests and limits for the console plugin backend and GitOps plugin components in the GitopsService CR:

    apiVersion: pipelines.openshift.io/v1alpha1
    kind: GitopsService
    metadata:
      name: cluster
    spec:
      consolePlugin:
        backend:
          resources:
            limits:
              cpu: 100m
              memory: 1Gi
            requests:
              cpu: 100m
              memory: 1Gi
        gitopsPlugin:
          resources:
            limits:
              cpu: 200m
              memory: 2Gi
            requests:
              cpu: 100m
              memory: 1Gi
    Copy to Clipboard Toggle word wrap

    For more information, see the Additional Resources section, which includes information about Configurable resource limits and requests for the GitOps plugin.

    GITOPS-7416

Argo CD Agent is built with FIPS-validated cryptographic modules

With this update, the Argo CD Agent component is built and verified with FIPS-validated cryptographic modules, ensuring that all cryptographic operations conform to Federal Information Processing Standards (FIPS). This enhancement enables the Argo CD Agent to operate in FIPS-enabled Red Hat Enterprise Linux and OpenShift environments and aligns the component with Red Hat’s FIPS certification standards.

GITOPS-6366

Optimized memory usage in the Red Hat OpenShift GitOps Operator manager

With this update, the Red Hat OpenShift GitOps Operator introduces memory usage optimizations in the Red Hat OpenShift GitOps Operator manager. The enhancement uses controller-runtime Transform functions to remove unnecessary fields from cached secrets and config maps that the Red Hat OpenShift GitOps Operator does not require. This approach helps reduce memory consumption, especially in clusters with a large number of secrets and config maps. These improvements can lower the memory footprint of the openshift-gitops-operator-controller-manager deployment. The optimization is enabled by default. If you encounter unexpected behavior, you can disable the feature by adding the following environment variable to the Red Hat OpenShift GitOps Operator Subscription CR:

apiVersion: operators.coreos.com/v1alpha1
kind: Subscription
metadata:
  name: openshift-gitops-operator
spec:
  config:
    env:
      - name: MEMORY_OPTIMIZATION_ENABLED
        value: "false"
Copy to Clipboard Toggle word wrap

GITOPS-6281

1.2.3. Known issues

redis-ha-haproxy deployment does not automatically scale after upgrade

When upgrading the Red Hat OpenShift GitOps Operator from a version earlier than 1.17.x, the redis-ha-haproxy deployment might not automatically scale to 3 replicas, even if high availability (HA) mode was enabled before the upgrade. This issue occurs only when HA mode was configured before upgrading to version 1.17.x.

Workaround: Manually scale the redis-ha-haproxy deployment to the expected replica count by running the following command:

$ oc scale deployment <argocd instance>-redis-ha-haproxy \
  -n <argocd namespace> --replicas=3
Copy to Clipboard Toggle word wrap

GITOPS-8225

1.2.4. Breaking changes

Annotation-based resource tracking enabled by default

With this update, the Red Hat OpenShift GitOps Operator changes the default resource tracking behavior from label-based tracking to annotation-based tracking. Annotation-based tracking provides improved reliability and reduces the risk of errors caused by external tools or automation that might unintentionally copy tracking labels between resources. This change aligns the Red Hat OpenShift GitOps Operator with the upstream Argo CD defaults. After upgrading, you should complete remediation steps to ensure a smooth transition to annotation-based tracking. For guidance, see the upstream documentation. If you want to continue using label-based tracking, you can configure it by setting the .spec.resourceTrackingMethod field to label in the Argo CD CR. For more details, see the Additional Resources section, which includes the upstream link for the Argo CD Annotation-based resource tracking.

GITOPS-7385

argocd-cmp-server requires glibc for FIPS compliance

With this update, the argocd-cmp-server binary is not statically linked. To meet FIPS compliance requirements, the binary is now dynamically linked and uses the OpenSSL implementation for cryptographic operations. As a result, the binary has a hard dependency on glibc and can run only on container images that include glibc support. Minimal images such as BusyBox or Alpine (without glibc) do not meet this requirement, and running the binary on those images causes it to crash. Before upgrading, ensure that your CMP sidecar container image includes glibc. If it does not, use one of the following options:

  • Switch to an image that includes glibc, such as UBI or Fedora.
  • Use the default Argo CD base image, which includes glibc, is fully compatible, and is the recommended approach.

    You can switch to the default Argo CD image by removing the image field from your sidecar container configuration under .spec.repo.sidecarContainers in the Argo CD CR. During reconciliation, the Red Hat OpenShift GitOps Operator automatically applies the default image.

    GITOPS-7000

1.2.5. Deprecated and removed features

Deprecated RPM package for openshift-gitops-argocd-cli (Technology Preview)

In Red Hat OpenShift GitOps 1.19, the openshift-gitops-argocd-cli RPM package for RHEL 8 and RHEL 9 is deprecated. These RPMs are still supported in the current release, Red Hat OpenShift GitOps 1.19, to provide a transition period. To avoid disruption, update your deployment pipelines to download the openshift-gitops-argocd-cli binaries directly from the Red Hat Content Gateway. For more information, see the Additional resources section, which includes a link to the Content Gateway hosting the Red Hat OpenShift GitOps client binaries.

Important

The openshift-gitops-argocd-cli RPM package is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.

For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.

GITOPS-8497

返回顶部
Red Hat logoGithubredditYoutubeTwitter

学习

尝试、购买和销售

社区

关于红帽文档

通过我们的产品和服务,以及可以信赖的内容,帮助红帽用户创新并实现他们的目标。 了解我们当前的更新.

让开源更具包容性

红帽致力于替换我们的代码、文档和 Web 属性中存在问题的语言。欲了解更多详情,请参阅红帽博客.

關於紅帽

我们提供强化的解决方案,使企业能够更轻松地跨平台和环境(从核心数据中心到网络边缘)工作。

Theme

© 2025 Red Hat