-
Notifications
You must be signed in to change notification settings - Fork 1.8k
OSDOCS#12512: Update the release notes for the 4.13.53 z-stream #84508
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
🤖 Thu Nov 07 14:12:52 - Prow CI generated the docs preview: |
/label peer-review-needed |
[id="ocp-4-13-53-bug-fixes"] | ||
==== Bug fixes | ||
|
||
* Previously, because of a {gcp-first} change, the Cloud Credential Operator (CCO) becomes degraded. With this release, `CredentialsRequests` is updated to set `skipServiceCheck`, and the CCO is not degraded. (link:https://issues.redhat.com/browse/OCPBUGS-43856[*OCPBUGS-43856*]) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
When I contacted Trevor, the note took a bit of a slightly different angle.
See https://issues.redhat.com/browse/OCPBUGS-43821 and #84485. I'd recommend checking with Trevor.
0f05f45
to
43c2738
Compare
/label merge-review-needed |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A few nits, the most important ones being those about adding contexts. Let me know when this is addressed and then I can merge!
To update an existing {product-title} 4.13 cluster to this latest release, see xref:../updating/updating-cluster-cli.adoc#updating-cluster-cli[Updating a cluster using the CLI]. | ||
|
||
// 4.13.53 | ||
[id="ocp-4-13-53"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
All IDs that are not the top ID of an assembly need to have a context at the end:
[id="ocp-4-13-53"] | |
[id="ocp-4-13-53_{context}"] |
$ oc adm release info 4.13.53 --pullspecs | ||
---- | ||
|
||
[id="ocp-4-13-53-bug-fixes"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same comment about adding a context
|
||
* Previously, upgrading to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before upgrading to {product-title} 4.13. Any issues can be corrected before causing service disruption.. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) | ||
|
||
[id="ocp-4-13-53-updating"] |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Same comment about adding a context
[id="ocp-4-13-53-bug-fixes"] | ||
==== Bug fixes | ||
|
||
* Previously, the Cloud Credential Operator (CCO) for a cluster installed on {gcp-first} was degraded. {gcp-short} clusters that were not in manual mode thought they needed the `backupdr` permissions. However, in accounts where the `backupdr` API was not enabled, the clusters correctly determined that they did not have those permissions. Manual mode {gcp-short} clusters were not affected. With this release, the `skipServiceCheck` parameter is set to `true` on the `CredentialsRequest` custom resource (CR), so this issue no longer occurs. (link:https://issues.redhat.com/browse/OCPBUGS-43856[*OCPBUGS-43856*]) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think "thought they needed" is a little anthropomorphic. If you think this would still be accurate, I'd suggest changing the wording to something like this:
* Previously, the Cloud Credential Operator (CCO) for a cluster installed on {gcp-first} was degraded. {gcp-short} clusters that were not in manual mode thought they needed the `backupdr` permissions. However, in accounts where the `backupdr` API was not enabled, the clusters correctly determined that they did not have those permissions. Manual mode {gcp-short} clusters were not affected. With this release, the `skipServiceCheck` parameter is set to `true` on the `CredentialsRequest` custom resource (CR), so this issue no longer occurs. (link:https://issues.redhat.com/browse/OCPBUGS-43856[*OCPBUGS-43856*]) | |
* Previously, the Cloud Credential Operator (CCO) for a cluster installed on {gcp-first} was degraded. {gcp-short} clusters that were not in manual mode incorrectly required `backupdr` permissions. However, in accounts where the `backupdr` API was not enabled, the clusters correctly determined that they did not have those permissions. Manual mode {gcp-short} clusters were not affected. With this release, the `skipServiceCheck` parameter is set to `true` on the `CredentialsRequest` custom resource (CR), so this issue no longer occurs. (link:https://issues.redhat.com/browse/OCPBUGS-43856[*OCPBUGS-43856*]) |
|
||
* Previously, the Cloud Credential Operator (CCO) for a cluster installed on {gcp-first} was degraded. {gcp-short} clusters that were not in manual mode thought they needed the `backupdr` permissions. However, in accounts where the `backupdr` API was not enabled, the clusters correctly determined that they did not have those permissions. Manual mode {gcp-short} clusters were not affected. With this release, the `skipServiceCheck` parameter is set to `true` on the `CredentialsRequest` custom resource (CR), so this issue no longer occurs. (link:https://issues.redhat.com/browse/OCPBUGS-43856[*OCPBUGS-43856*]) | ||
|
||
* Previously, upgrading to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before upgrading to {product-title} 4.13. Any issues can be corrected before causing service disruption.. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Update is the preferred term:
* Previously, upgrading to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before upgrading to {product-title} 4.13. Any issues can be corrected before causing service disruption.. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) | |
* Previously, updating to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before updating to {product-title} 4.13. Any issues can be corrected before causing service disruption.. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) |
|
||
* Previously, the Cloud Credential Operator (CCO) for a cluster installed on {gcp-first} was degraded. {gcp-short} clusters that were not in manual mode thought they needed the `backupdr` permissions. However, in accounts where the `backupdr` API was not enabled, the clusters correctly determined that they did not have those permissions. Manual mode {gcp-short} clusters were not affected. With this release, the `skipServiceCheck` parameter is set to `true` on the `CredentialsRequest` custom resource (CR), so this issue no longer occurs. (link:https://issues.redhat.com/browse/OCPBUGS-43856[*OCPBUGS-43856*]) | ||
|
||
* Previously, upgrading to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before upgrading to {product-title} 4.13. Any issues can be corrected before causing service disruption.. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
extra period here:
* Previously, upgrading to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before upgrading to {product-title} 4.13. Any issues can be corrected before causing service disruption.. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) | |
* Previously, upgrading to {product-title} 4.14 triggered service disruptions in applications that set duplicate `Transfer-Encoding` headers. This resulted in rejected responses, including a gateway error, which affected customer service. With this release, cluster administrators can use a procedure to detect applications that send duplicate `Transfer-Encoding` headers before upgrading to {product-title} 4.13. Any issues can be corrected before causing service disruption. (link:https://issues.redhat.com/browse/OCPBUGS-43095[*OCPBUGS-43095*]) |
@tmalove: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
New changes LGTM
Version(s):
4.13
Issue:
OSDOCS-12512
Link to docs preview:
4.13.53
QE review:
n/a