Skip to content

Commit fdfedee

Browse files
Merge pull request #27271 from sjhala-ccs/cnv-2-5-rn
OpenShift Virtualization 2.5 release notes
2 parents 66182a1 + 4af2bdf commit fdfedee

File tree

1 file changed

+32
-56
lines changed

1 file changed

+32
-56
lines changed

virt/virt-2-5-release-notes.adoc

Lines changed: 32 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -7,25 +7,33 @@ toc::[]
77

88
== About Red Hat {VirtProductName}
99

10-
Red Hat {VirtProductName} {VirtVersion} is supported for use on {product-title} 4.6 clusters. {VirtProductName} enables you to bring traditional virtual machines (VMs) into {product-title} where they run alongside containers, and are managed as native Kubernetes objects.
10+
Red Hat {VirtProductName} enables you to bring traditional virtual machines (VMs) into {product-title} where they run alongside containers, and are managed as native Kubernetes objects.
1111

1212
//Branding-Logo
1313
{VirtProductName} is represented by the image:Operator_Icon-OpenShift_Virtualization-5.png[{VirtProductName},40,40] logo.
1414

15-
include::modules/virt-what-you-can-do-with-virt.adoc[leveloffset=+2]
16-
// This line is attached to the above `virt-what-you-can-do-with-virt` module.
17-
// It is included here in the assembly because of the xref ban.
1815
You can use {VirtProductName} with either the xref:../networking/ovn_kubernetes_network_provider/about-ovn-kubernetes.adoc#about-ovn-kubernetes[OVN-Kubernetes] or the xref:../networking/openshift_sdn/about-openshift-sdn.adoc#about-openshift-sdn[OpenShiftSDN] default Container Network Interface (CNI) network provider.
19-
//Commented out because for GA release we have special text that covers this info. But going forward, we will want to include the following:
16+
17+
Learn more about xref:../virt/about-virt.adoc#about-virt[what you can do with {VirtProductName}].
2018

2119
include::modules/virt-supported-cluster-version.adoc[leveloffset=+2]
2220

21+
//CNV-4572-Guest-OS
22+
[id="virt-guest-os-new"]
23+
=== Supported guest operating systems
24+
{VirtProductName} guests can use the following operating systems:
25+
26+
* Red Hat Enterprise Linux 6, 7, and 8.
27+
* Microsoft Windows Server 2012 R2, 2016, and 2019.
28+
* Microsoft Windows 10.
29+
30+
Other operating system templates shipped with {VirtProductName} are not supported.
31+
2332
[id="virt-2-5-new"]
2433
== New and changed features
2534
//Placeholder for new content.
2635

2736
//CNV-4904 Microsoft's SVVP certification applies to RHCOS workers. The content below from the 2.4 release notes seems to cover this already.
28-
2937
* {VirtProductName} is certified in Microsoft's Windows Server Virtualization Validation Program (SVVP) to run Windows Server workloads.
3038
+
3139
The SVVP Certification applies to:
@@ -34,10 +42,7 @@ The SVVP Certification applies to:
3442

3543
** Intel and AMD CPUs.
3644

37-
//CNV-7294 - Cluster admin can now influence node placement using new API on HCO CR
38-
3945
//CNV-7160 - New virtctl commands to expose raw QEMU guest agent data
40-
4146
* {VirtProductName} {VirtVersion} adds three new xref:../virt/virt-using-the-cli-tools.adoc#virt-virtctl-commands_virt-using-the-cli-tools[`virtctl` commands] to manage QEMU guest agent data:
4247

4348
** `virtctl fslist <vmi_name>` returns a full list of file systems available on the guest machine.
@@ -47,17 +52,6 @@ The SVVP Certification applies to:
4752
//CNV-7295 - Download virtctl binary from the CLI Tools page
4853
* You can now download the `virtctl` client from the xref:../virt/install/virt-installing-virtctl.adoc#virt-installing-virtctl-client-web_virt-installing-virtctl[*Command Line Tools* page in the web console].
4954

50-
//CNV-4572-Guest-OS Should we still keep this info from the 2.4 release notes?
51-
[id="virt-guest-os-new"]
52-
=== Supported guest operating systems
53-
{VirtProductName} guests can use the following operating systems:
54-
55-
* Red Hat Enterprise Linux 6, 7, and 8.
56-
* Microsoft Windows Server 2012 R2, 2016, and 2019.
57-
* Microsoft Windows 10.
58-
59-
Other operating system templates shipped with {VirtProductName} are not supported.
60-
6155
[id="virt-2-5-networking-new"]
6256
=== Networking
6357
//Placeholder for new content.
@@ -70,13 +64,13 @@ Other operating system templates shipped with {VirtProductName} are not supporte
7064
//Placeholder for new content.
7165

7266
//CNV-7170 - CDI import of container disks is faster and more efficient
73-
* The Containerized Data Importer (CDI) can now import containerDisk storage volumes from the container image registry at a faster speed and allocate storage capacity more efficiently. CDI can pull a containerDisk image from the registry in about the same amount of time as it would take to import from an HTTP endpoint. You can import the disk into a PersistentVolumeClaim (PVC) equal in size to the disk image to use the underlying storage more efficiently.
67+
* The Containerized Data Importer (CDI) can now xref:../virt/virtual_machines/virtual_disks/virt-using-container-disks-with-vms.adoc#virt-using-container-disks-with-vms[import container disk storage volumes] from the container image registry at a faster speed and allocate storage capacity more efficiently. CDI can pull a container disk image from the registry in about the same amount of time as it would take to import from an HTTP endpoint. You can import the disk into a persistent volume claim (PVC) equal in size to the disk image to use the underlying storage more efficiently.
7468

7569
//CNV-7168 - DataVolume and storage diagnostics
76-
* It is now easier to diagnose and troubleshoot issues when preparing virtual machine (VM) disks that are managed by DataVolumes:
70+
* It is now easier to xref:../virt/logging_events_monitoring/virt-diagnosing-datavolumes-using-events-and-conditions.adoc#virt-diagnosing-datavolumes-using-events-and-conditions[diagnose and troubleshoot issues] when preparing virtual machine (VM) disks that are managed by DataVolumes:
7771
+
7872
** For asynchronous image upload, if the virtual size of the disk image is larger than the size of the target DataVolume, an error message is returned before the connection is closed.
79-
** You can use the `oc describe dv` command to monitor changes in the PersistentVolumeClaim (PVC) `Bound` conditions or transfer failures. If the value of the `Status:Phase` field is `Succeeded`, then the DataVolume is ready to be used.
73+
** You can use the `oc describe dv` command to monitor changes in the `PersistentVolumeClaim` (PVC) `Bound` conditions or transfer failures. If the value of the `Status:Phase` field is `Succeeded`, then the DataVolume is ready to be used.
8074

8175
//CNV-6824 - Offline virtual machine snapshots
8276
* You can create, restore, and delete virtual machine (VM) snapshots in the CLI for VMs that are powered off (offline). {VirtProductName} supports
@@ -88,7 +82,7 @@ xref:../virt/virtual_machines/virtual_disks/virt-managing-offline-vm-snapshots.a
8882
//CNV-6825 - Smart cloning with snapshots
8983
//CNV-4089 - Cloning a disk quickly using the storage array
9084
// These two release note stories are combined in a single release note.
91-
* You can now clone virtual disks efficiently and quickly using smart-cloning. Smart-cloning occurs automatically when you create a DataVolume with a PersistentVolumeClaim (PVC) source. Your storage provider must support the CSI Snapshots API to use smart-cloning.
85+
* You can now clone virtual disks efficiently and quickly using xref:../virt/virtual_machines/virtual_disks/virt-cloning-a-datavolume-using-smart-cloning#virt-cloning-a-datavolume-using-smart-cloning[smart-cloning]. Smart-cloning occurs automatically when you create a DataVolume with a `PersistentVolumeClaim` (PVC) source. Your storage provider must support the CSI Snapshots API to use smart-cloning.
9286

9387
[id="virt-2-5-web-new"]
9488
=== Web console
@@ -108,13 +102,13 @@ The *Pending Changes* banner at the top of the page displays a list of all chang
108102
* You can now xref:../virt/virtual_machines/virt-accessing-vm-consoles.adoc#virt-vm-serial-console-web_virt-accessing-vm-consoles[open a virtual machine console] in a separate window.
109103

110104
//CNV-7169 - Auto-clone base images when creating VM in UI
111-
* You can now create default OS images and automatically upload them using the {product-title} web console. A _default OS image_ is a bootable disk containing an operating system and all of the operating system's configuration settings, such as drivers. You use a default OS image to create bootable virtual machines with specific configurations.
105+
* You can now xref:../virt/virtual_machines/virtual_disks/virt-creating-and-using-default-os-images#virt-creating-and-using-default-os-images[create default OS images] and automatically upload them using the {product-title} web console. A _default OS image_ is a bootable disk containing an operating system and all of the operating system's configuration settings, such as drivers. You use a default OS image to create bootable virtual machines with specific configurations.
112106

113107
//CNV-7314 - Expose VM image upload in UI
114108
* You can now xref:../virt/virtual_machines/virtual_disks/virt-uploading-local-disk-images-web.adoc#virt-uploading-local-disk-images-web[upload a virtual machine image file] to a new persistent volume claim by using the web console.
115109

116110
//CNV-7317 - Expose qemu guest agent data in the UI
117-
* When the QEMU guest agent runs on the virtual machine, you can use the web console to view information about the virtual machine, users, file systems, and secondary networks.
111+
* When the QEMU guest agent runs on the virtual machine, you can use the web console to xref:../virt/virtual_machines/virt-viewing-qemu-guest-agent-web#virt-viewing-qemu-guest-agent-web[view information] about the virtual machine, users, file systems, and secondary networks.
118112

119113
[id="virt-2-5-changes"]
120114
== Notable technical changes
@@ -145,9 +139,10 @@ The *Pending Changes* banner at the top of the page displays a list of all chang
145139

146140
//This section is work in progress
147141

148-
* When a node fails in user-provisioned installations of {product-title} on bare metal deployments, the virtual machine does not automatically restart on another node. Automatic restart is supported only for installer-provisioned installations that have machine health checks enabled. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1886437[*BZ#1886437*])
142+
//CNV-7548
143+
* When a node fails in user-provisioned installations of {product-title} on bare metal deployments, the virtual machine does not automatically restart on another node. Automatic restart is supported only for installer-provisioned installations that have machine health checks enabled. Learn more about xref:/../virt/install/preparing-cluster-for-virt#preparing-cluster-for-virt[configuring your cluster for {VirtProductName}].
149144

150-
* If your {product-title} cluster uses OVN-Kubernetes as the default Container Network Interface (CNI) provider, you cannot attach a Linux bridge or bonding to the default interface of a host because of a change in the host network topology of OVN-Kubernetes. As a workaround, you can use a secondary network interface connected to your host or switch to the OpenShift SDN default CNI provider. link:https://bugzilla.redhat.com/show_bug.cgi?id=1887456[(*BZ#1887456*)]
145+
* If your {product-title} cluster uses OVN-Kubernetes as the default Container Network Interface (CNI) provider, you cannot attach a Linux bridge or bonding to the default interface of a host because of a change in the host network topology of OVN-Kubernetes. As a workaround, you can use a secondary network interface connected to your host or switch to the OpenShift SDN default CNI provider. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1887456[*BZ#1887456*])
151146

152147
//This defect is on Verified status but the fix is not ideal. This known issue is likely to be removed for 2.6.
153148
* If you xref:../virt/virtual_machines/importing_vms/virt-importing-vmware-vm.adoc#virt-creating-vddk-image_virt-importing-vmware-vm[add a VMware Virtual Disk Development Kit (VDDK) image] to the `openshift-cnv/v2v-vmware` config map by using the web console, a *Managed resource* error message displays. You can safely ignore this error. Save the config map by clicking *Save*. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1884538[*BZ#1884538*])
@@ -159,7 +154,7 @@ The *Pending Changes* banner at the top of the page displays a list of all chang
159154
//This defect is on Verified status
160155
* If you enable a MAC address pool for a namespace by applying the KubeMacPool label and using the `io` attribute for virtual machines in that namespace, the `io` attribute configuration is not retained for the VMs. As a workaround, do not use the `io` attribute for VMs. Alternatively, you can disable KubeMacPool for the namespace. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1869527[*BZ#1869527*])
161156

162-
//This defect is still unresolved, moved to 2.6
157+
//Unresolved, moved to 2.6
163158
* If you upgrade to {VirtProductName} {VirtVersion}, both older and newer versions of common templates are available for each combination of operating system, workload, and flavor. When you create a virtual machine by using a common template, you must use the newer version of the template. Disregard the older version to avoid issues. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1859235[*BZ#1859235*])
164159

165160
//Unresolved
@@ -174,9 +169,7 @@ As a workaround, you can reconfigure the virtual machines so that they can be po
174169
* For unknown reasons, memory consumption for the `containerDisk` volume type might gradually increase until it exceeds the memory limit. To resolve this issue, restart the VM. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1855067[*BZ#1855067*])
175170

176171
//Unresolved, on ASSIGNED status
177-
* Sometimes, when attempting to edit the subscription channel of the *{VirtProductName} Operator* in the web console, clicking the
178-
*Channel* button of the *Subscription Overview* results in a JavaScript error.
179-
(link:https://bugzilla.redhat.com/show_bug.cgi?id=1796410[*BZ#1796410*])
172+
* Sometimes, when attempting to edit the subscription channel of the *{VirtProductName} Operator* in the web console, clicking the *Channel* button of the *Subscription Overview* results in a JavaScript error. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1796410[*BZ#1796410*])
180173

181174
** As a workaround, trigger the upgrade process to {VirtProductName} {VirtVersion} from the CLI by running the following `oc` patch command:
182175
+
@@ -187,19 +180,14 @@ $ export TARGET_NAMESPACE=openshift-cnv CNV_CHANNEL=2.5 && oc patch -n "${TARGET
187180
+
188181
This command points your subscription to upgrade channel `2.5` and enables automatic updates.
189182

190-
//This defect is in POST status [*BZ#1760028*]
191-
* Live migration fails when nodes have different CPU models. Even in cases where
192-
nodes have the same physical CPU model, differences introduced by microcode
193-
updates have the same effect. This is because the default settings trigger
194-
host CPU passthrough behavior, which is incompatible with live migration.
195-
(link:https://bugzilla.redhat.com/show_bug.cgi?id=1760028[*BZ#1760028*])
183+
//This defect is on POST status
184+
* Live migration fails when nodes have different CPU models. Even in cases where nodes have the same physical CPU model, differences introduced by microcode updates have the same effect. This is because the default settings trigger host CPU passthrough behavior, which is incompatible with live migration. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1760028[*BZ#1760028*])
196185

197186
** As a workaround, set the default CPU model in the `kubevirt-config` ConfigMap, as shown in the following example:
198187
+
199188
[NOTE]
200189
====
201-
You must make this change before starting the virtual machines that support
202-
live migration.
190+
You must make this change before starting the virtual machines that support live migration.
203191
====
204192
+
205193
. Open the `kubevirt-config` ConfigMap for editing by running the following command:
@@ -219,34 +207,22 @@ metadata:
219207
data:
220208
default-cpu-model: "<cpu-model>" <1>
221209
----
222-
<1> Replace `<cpu-model>` with the actual CPU model value. You can determine this
223-
value by running `oc describe node <node>` for all nodes and looking at the
224-
`cpu-model-<name>` labels. Select the CPU model that is present on all of your
225-
nodes.
210+
<1> Replace `<cpu-model>` with the actual CPU model value. You can determine this value by running `oc describe node <node>` for all nodes and looking at the `cpu-model-<name>` labels. Select the CPU model that is present on all of your nodes.
226211

227212
//Jira story for the following content https://issues.redhat.com/browse/CNV-4757.
228-
* {VirtProductName} cannot reliably identify node drains that are triggered by
229-
running either `oc adm drain` or `kubectl drain`. Do not run these commands on
230-
the nodes of any clusters where {VirtProductName} is deployed. The nodes might not
231-
drain if there are virtual machines running on top of them.
213+
* {VirtProductName} cannot reliably identify node drains that are triggered by running either `oc adm drain` or `kubectl drain`. Do not run these commands on the nodes of any clusters where {VirtProductName} is deployed. The nodes might not drain if there are virtual machines running on top of them.
232214

233215
** The current solution is to xref:../virt/node_maintenance/virt-setting-node-maintenance.adoc#virt-setting-node-maintenance[put nodes into maintenance].
234216

235217
//This defect is on Verified status
236218
* If the {VirtProductName} storage PV is not suitable for importing a RHV VM, the progress bar remains at 10% and the import does not complete. The VM Import Controller Pod log displays the following error message: `Failed to bind volumes: provisioning failed for PVC`. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1857784[*BZ#1857784*])
237219

238-
//This defect is ON_QA
239-
* If you enter the wrong credentials for the RHV Manager while importing a RHV VM, the Manager might lock the admin user account because the `vm-import-operator` tries repeatedly to connect to the RHV API. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1854425[*BZ#1854425*])
220+
//Unresolved
221+
* If you enter the wrong credentials for the RHV Manager while importing a RHV VM, the Manager might lock the admin user account because the `vm-import-operator` tries repeatedly to connect to the RHV API. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1887140[*BZ#1887140*])
240222
+
241223
To unlock the account, log in to the Manager and enter the following command:
242224
+
243225
[source,terminal]
244226
----
245227
$ ovirt-aaa-jdbc-tool user unlock admin
246228
----
247-
248-
//This defect is on Verified status
249-
* `cloud-init` settings are not imported with a RHV virtual machine. You must recreate `cloud-init` after the import process. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1850574[*BZ#1850574*])
250-
251-
// This defect is ON_QA
252-
* {VirtProductName} does not support UEFI. If you import a VMware VM with UEFI BIOS into OpenShift Virtualization, the VM will not boot. (link:https://bugzilla.redhat.com/show_bug.cgi?id=1880083[*BZ#1880083*])

0 commit comments

Comments
 (0)