-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCP 3.3 release notes tracker #2507
Comments
In 3.2 and earlier, if you were using the redhat/openshift-ovs-multitenant network plugin, and you manually created a service Endpoint pointing to a pod or service owned by another tenant, then that Endpoint would be ignored. In 3.3, it is no longer possible for ordinary users to create such an endpoint (#2443, openshift/origin#9383) and so the plugin no longer bothers to filter them out (openshift/origin#9982). However, previously-created illegal endpoints might still exist; if so, the (old, pre-upgrade) logs will show warnings like:
indicating the illegal Endpoints object. These log messages are the simplest way to find such illegal endpoints, but if you no longer have the pre-upgrade logs, you can try commands like the following to search for them:
|
When tagging images across namespaces (e.g. |
OpenShift 1.3 / 3.3 has altered the DNS records returned by SRV requests for services to be compatible with Kubernetes 1.3 to support PetSets. The primary change is that SRV records for a name no longer enumerate the list of all available ports - instead, if you want to find a port named
|
From openshift/openshift-ansible#2227 1.3/3.3 will add init containers, which have security implications if the user has precreated pods with init containers their policy does not allow. It is possible for a user to precreate pods prior to an upgrade with the annotation that includes privileged init containers, allowing a user to escape their security policy. During upgrade, admins must do the following to address this vulnerability:
This will ensure that all pods with init containers created before policy was enforced are made to go through the security mechanisms again. |
https://bugzilla.redhat.com/show_bug.cgi?id=1371826 We broke the backward compatibility of the routing template structures. We have a document explaining what happened, how one could be affected and what to do when upgrading from 3.2. to 3.3 Can we have this doc (https://github.com/rajatchopra/routing_data_structure_changes/blob/master/README.md) be put into the docs in a suitable place? Please guide me on the correct place for it and I will put up the PR for openshift-docs 3.3 |
^ Was handled via #2935. |
Tracker for new features, enhancements, bug fixes to consider for inclusion in OCP 3.3 release notes.
The text was updated successfully, but these errors were encountered: