Skip to content

OSDOCS-18380 created zstream RNs for 4-21-3#107067

Merged
lahinson merged 1 commit intoopenshift:enterprise-4.21from
wgabor0427:OSDOCS-18380
Feb 24, 2026
Merged

OSDOCS-18380 created zstream RNs for 4-21-3#107067
lahinson merged 1 commit intoopenshift:enterprise-4.21from
wgabor0427:OSDOCS-18380

Conversation

@wgabor0427
Copy link
Contributor

@wgabor0427 wgabor0427 commented Feb 23, 2026

@openshift-ci openshift-ci bot added the size/M Denotes a PR that changes 30-99 lines, ignoring generated files. label Feb 23, 2026
@ocpdocs-previewbot
Copy link

ocpdocs-previewbot commented Feb 23, 2026

🤖 Tue Feb 24 19:52:47 - Prow CI generated the docs preview:

https://107067--ocpdocs-pr.netlify.app/openshift-enterprise/latest/release_notes/ocp-4-21-release-notes.html

[id="zstream-4-21-3-updating_{context}"]
== Updating

To update an {product-title} 4.21 cluster to this latest release, see xref:../updating/updating_a_cluster/updating-cluster-cli.adoc#updating-cluster-cli[Updating a cluster using the CLI]. No newline at end of file
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🤖 [error] OpenShiftAsciiDoc.NoXrefInModules: Do not include xrefs in modules, only assemblies (exception: release notes modules).

@wgabor0427
Copy link
Contributor Author

/label merge-review-needed

@openshift-ci openshift-ci bot added the merge-review-needed Signifies that the merge review team needs to review this PR label Feb 24, 2026
@lahinson lahinson added merge-review-in-progress Signifies that the merge review team is reviewing this PR and removed merge-review-needed Signifies that the merge review team needs to review this PR labels Feb 24, 2026
@lahinson lahinson added this to the Continuous Release milestone Feb 24, 2026
Copy link
Contributor

@lahinson lahinson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@wgabor0427 Just a few little things to address. Let me know when you've made your changes, and I'll be happy to merge.


* Before this update, the Machine API Provider OpenStack (MAPO) created an event for every single reconcile, even when no significant state changes such as a create, update, or delete had occurred. This event generation led to cluttered event logs, strained system performance, and frequently disrupted monitoring and alerting systems. With this release, the reconcile function has been modified to capture the original `ResourceVersion` and only emit an event when the machine `ResourceVersion` changes. Additionally, the event name was changed from `Reconciled` to `Updated` to better align with other machine API providers. (link:https://issues.redhat.com/browse/OCPBUGS-69644[OCPBUGS-69644])

* Before this update, when a HyperShift `HostedCluster` using external Domain Name Service (DNS) domains was updated to remove existing `allowedCIDRBlocks`, the external router `LoadBalancer` service was not updated to reflect this change. This resulted in external clients being able to access the kube-apiserver from any IP address, bypassing the configured Classless Inter-Domain Routing (CIDR) restrictions. With this release, the `LoadBalancerSourceRanges` configuration is not removed from the external kube-apiserver service when `allowedCIDRBlocks` is removed from the `HostedCluster` ensuring consistent security across both internal and external traffic. (link:https://issues.redhat.com/browse/OCPBUGS-71133[OCPBUGS-71133])
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, when a HyperShift `HostedCluster` using external Domain Name Service (DNS) domains was updated to remove existing `allowedCIDRBlocks`, the external router `LoadBalancer` service was not updated to reflect this change. This resulted in external clients being able to access the kube-apiserver from any IP address, bypassing the configured Classless Inter-Domain Routing (CIDR) restrictions. With this release, the `LoadBalancerSourceRanges` configuration is not removed from the external kube-apiserver service when `allowedCIDRBlocks` is removed from the `HostedCluster` ensuring consistent security across both internal and external traffic. (link:https://issues.redhat.com/browse/OCPBUGS-71133[OCPBUGS-71133])
* Before this update, when a `HostedCluster` resource using external Domain Name Service (DNS) domains was updated to remove an `allowedCIDRBlocks` configuration, the external router `LoadBalancer` service was not updated to reflect this change. This resulted in external clients being able to access the `kube-apiserver` service from any IP address, bypassing the configured Classless Inter-Domain Routing (CIDR) restrictions. With this release, the `LoadBalancerSourceRanges` configuration is not removed from the external `kube-apiserver` service when the `allowedCIDRBlocks` configuration is removed from the `HostedCluster` resource, ensuring consistent security across both internal and external traffic. (link:https://issues.redhat.com/browse/OCPBUGS-71133[OCPBUGS-71133])

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done


* Before this update, catalogs rebuilt by `oc-mirror` were only in Open Container Initiative (OCI) format, which created compatibility issues because certain container registries did not accept this specific format. This often resulted in failed image uploads or registry errors during the mirroring process. With this release, the code has been updated to allow for the conversion of the catalog format to one that is accepted by the target container registry. As a result, the conversion of catalog images generated by `oc-mirror` no longer fail. (link:https://issues.redhat.com/browse/OCPBUGS-74981[OCPBUGS-74981])

* Before this update, the system failed to correctly parse registry configuration files when the `use-sigstore-attachments parameter` was explicitly set to `false`. These files were misinterpreted as uninitialized. This meant that `oc-mirror` would ignore the existing user-defined setup and generate a new configuration file. With this release, the code has been fixed to recognize an explicit `false` value as a valid user configuration. As a result, `oc-mirror` now properly adheres to the existing user-defined settings, preventing unnecessary file overwrites and ensuring that signature attachment preferences are preserved. (link:https://issues.redhat.com/browse/OCPBUGS-76126[OCPBUGS-76126])
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, the system failed to correctly parse registry configuration files when the `use-sigstore-attachments parameter` was explicitly set to `false`. These files were misinterpreted as uninitialized. This meant that `oc-mirror` would ignore the existing user-defined setup and generate a new configuration file. With this release, the code has been fixed to recognize an explicit `false` value as a valid user configuration. As a result, `oc-mirror` now properly adheres to the existing user-defined settings, preventing unnecessary file overwrites and ensuring that signature attachment preferences are preserved. (link:https://issues.redhat.com/browse/OCPBUGS-76126[OCPBUGS-76126])
* Before this update, the system failed to correctly parse registry configuration files when the `use-sigstore-attachments` parameter was explicitly set to `false`. These files were misinterpreted as uninitialized. This meant that the `oc-mirror` plugin would ignore the existing user-defined setup and generate a new configuration file. With this release, the code has been fixed to recognize an explicit `false` value as a valid user configuration. As a result, the `oc-mirror` plugin now properly adheres to the existing user-defined settings, preventing unnecessary file overwrites and ensuring that signature attachment preferences are preserved. (link:https://issues.redhat.com/browse/OCPBUGS-76126[OCPBUGS-76126])

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done


* Before this update, when a HyperShift `HostedCluster` using external Domain Name Service (DNS) domains was updated to remove existing `allowedCIDRBlocks`, the external router `LoadBalancer` service was not updated to reflect this change. This resulted in external clients being able to access the kube-apiserver from any IP address, bypassing the configured Classless Inter-Domain Routing (CIDR) restrictions. With this release, the `LoadBalancerSourceRanges` configuration is not removed from the external kube-apiserver service when `allowedCIDRBlocks` is removed from the `HostedCluster` ensuring consistent security across both internal and external traffic. (link:https://issues.redhat.com/browse/OCPBUGS-71133[OCPBUGS-71133])

* Before this update, catalogs rebuilt by `oc-mirror` were only in Open Container Initiative (OCI) format, which created compatibility issues because certain container registries did not accept this specific format. This often resulted in failed image uploads or registry errors during the mirroring process. With this release, the code has been updated to allow for the conversion of the catalog format to one that is accepted by the target container registry. As a result, the conversion of catalog images generated by `oc-mirror` no longer fail. (link:https://issues.redhat.com/browse/OCPBUGS-74981[OCPBUGS-74981])
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, catalogs rebuilt by `oc-mirror` were only in Open Container Initiative (OCI) format, which created compatibility issues because certain container registries did not accept this specific format. This often resulted in failed image uploads or registry errors during the mirroring process. With this release, the code has been updated to allow for the conversion of the catalog format to one that is accepted by the target container registry. As a result, the conversion of catalog images generated by `oc-mirror` no longer fail. (link:https://issues.redhat.com/browse/OCPBUGS-74981[OCPBUGS-74981])
* Before this update, catalogs rebuilt by the `oc-mirror` plugin were only in Open Container Initiative (OCI) format, which created compatibility issues because certain container registries did not accept this specific format. This often resulted in failed image uploads or registry errors during the mirroring process. With this release, the code has been updated to allow for the conversion of the catalog format to one that is accepted by the target container registry. As a result, the conversion of catalog images generated by the `oc-mirror` plugin no longer fail. (link:https://issues.redhat.com/browse/OCPBUGS-74981[OCPBUGS-74981])

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Done

@openshift-ci
Copy link

openshift-ci bot commented Feb 24, 2026

@wgabor0427: all tests passed!

Full PR test history. Your PR dashboard.

Details

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here.

@lahinson lahinson merged commit 67c6200 into openshift:enterprise-4.21 Feb 24, 2026
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

branch/enterprise-4.21 merge-review-in-progress Signifies that the merge review team is reviewing this PR size/M Denotes a PR that changes 30-99 lines, ignoring generated files.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants