Skip to content

Commit 425197f

Browse files
committed
OADP-7028: Prepare OADP 1.5 RNs for DITA
1 parent 09a204a commit 425197f

File tree

8 files changed

+171
-177
lines changed

8 files changed

+171
-177
lines changed

_topic_maps/_topic_map.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3675,6 +3675,8 @@ Topics:
36753675
Topics:
36763676
- Name: OADP 1.5 release notes
36773677
File: oadp-1-5-release-notes
3678+
- Name: Upgrading OADP 1.4 to 1.5
3679+
File: oadp-upgrade-notes-1-5
36783680
- Name: OADP 1.4 release notes
36793681
File: oadp-1-4-release-notes
36803682
- Name: OADP performance

backup_and_restore/application_backup_and_restore/release-notes/oadp-1-5-release-notes.adoc

Lines changed: 2 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -9,11 +9,11 @@ include::_attributes/attributes-openshift-dedicated.adoc[]
99
toc::[]
1010

1111
[role="_abstract"]
12-
The release notes for {oadp-first} describe new features and enhancements, deprecated features, product recommendations, known issues, and resolved issues.
12+
The release notes for {oadp-first} 1.5 describe new features and enhancements, deprecated features, product recommendations, known issues, and resolved issues.
1313

1414
[NOTE]
1515
====
16-
For additional information about {oadp-short}, see link:https://access.redhat.com/articles/5456281[{oadp-first} FAQs]
16+
For additional information about {oadp-short}, see link:https://access.redhat.com/articles/5456281[{oadp-first} FAQ].
1717
====
1818

1919
include::modules/oadp-1-5-3-release-notes.adoc[leveloffset=+1]
@@ -23,17 +23,3 @@ include::modules/oadp-1-5-2-release-notes.adoc[leveloffset=+1]
2323
include::modules/oadp-1-5-1-release-notes.adoc[leveloffset=+1]
2424

2525
include::modules/oadp-1-5-0-release-notes.adoc[leveloffset=+1]
26-
27-
[id="upgrade-notes-1-5_{context}"]
28-
== Upgrading OADP 1.4 to 1.5
29-
30-
[NOTE]
31-
====
32-
Always upgrade to the next minor version. Do not skip versions. To update to a later version, upgrade only one channel at a time. For example, to upgrade from {oadp-short} 1.1 to 1.3, upgrade first to 1.2, and then to 1.3.
33-
====
34-
35-
include::modules/changes-from-oadp-1-4-to-1-5.adoc[leveloffset=+2]
36-
include::modules/oadp-backing-up-dpa-configuration-1-5-0.adoc[leveloffset=+2]
37-
include::modules/oadp-upgrading-oadp-operator-1-5-0.adoc[leveloffset=+2]
38-
include::modules/converting-dpa-to-the-new-version-for-oadp-1-5-0.adoc[leveloffset=+2]
39-
include::modules/oadp-verifying-upgrade-1-5-0.adoc[leveloffset=+2]
Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,27 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
[id="upgrade-notes-1-5_{context}"]
4+
= Upgrading OADP 1.4 to 1.5
5+
include::_attributes/common-attributes.adoc[]
6+
include::_attributes/attributes-openshift-dedicated.adoc[]
7+
:context: oadp-upgrade-notes-1-5
8+
9+
toc::[]
10+
11+
[role="_abstract"]
12+
Learn how to upgrade your existing {oadp-short} 1.4 installation to {oadp-short} 1.5.
13+
14+
[NOTE]
15+
====
16+
Always upgrade to the next minor version. Do not skip versions. To update to a later version, upgrade only one channel at a time. For example, to upgrade from {oadp-short} 1.1 to 1.3, upgrade first to 1.2, and then to 1.3.
17+
====
18+
19+
include::modules/changes-from-oadp-1-4-to-1-5.adoc[leveloffset=+1]
20+
21+
include::modules/oadp-backing-up-dpa-configuration-1-5-0.adoc[leveloffset=+1]
22+
23+
include::modules/oadp-upgrading-oadp-operator-1-5-0.adoc[leveloffset=+1]
24+
25+
include::modules/converting-dpa-to-the-new-version-for-oadp-1-5-0.adoc[leveloffset=+1]
26+
27+
include::modules/oadp-verifying-upgrade-1-5-0.adoc[leveloffset=+1]

modules/changes-from-oadp-1-4-to-1-5.adoc

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77
= Changes from OADP 1.4 to 1.5
88

99
[role="_abstract"]
10-
The Velero server has been updated from version 1.14 to 1.16.
10+
The Velero server has been updated from version 1.14 to 1.16.
1111

1212
This changes the following:
1313

modules/oadp-1-5-0-release-notes.adoc

Lines changed: 76 additions & 83 deletions
Large diffs are not rendered by default.

modules/oadp-1-5-1-release-notes.adoc

Lines changed: 51 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -8,163 +8,147 @@
88
= OADP 1.5.1 release notes
99

1010
[role="_abstract"]
11-
The {oadp-first} 1.5.1 release notes lists new features, resolved issues, known issues, and deprecated features.
11+
The {oadp-first} 1.5.1 release notes list new features, resolved issues, known issues, and deprecated features.
1212

1313

1414
[id="new-features-1-5-1_{context}"]
1515
== New features
1616

17-
*`CloudStorage` API is fully supported*
18-
17+
`CloudStorage` API is fully supported::
1918
The `CloudStorage` API feature, available as a Technology Preview before this update, is fully supported from {oadp-short} 1.5.1. The `CloudStorage` API automates the creation of a bucket for object storage.
20-
19+
+
2120
link:https://issues.redhat.com/browse/OADP-3307[OADP-3307]
2221

23-
*New `DataProtectionTest` custom resource is available*
24-
25-
The `DataProtectionTest` (DPT) is a custom resource (CR) that provides a framework to validate your {oadp-short} configuration. The DPT CR checks and reports information for the following parameters:
22+
New `DataProtectionTest` custom resource is available::
23+
The `DataProtectionTest` (DPT) is a custom resource (CR) that provides a framework to validate your {oadp-short} configuration.
24+
+
25+
--
26+
The DPT CR checks and reports information for the following parameters:
2627

2728
* The upload performance of the backups to the object storage.
2829
* The Container Storage Interface (CSI) snapshot readiness for persistent volume claims.
2930
* The storage bucket configuration, such as encryption and versioning.
30-
31+
--
32+
+
3133
Using this information in the DPT CR, you can ensure that your data protection environment is properly configured and performing according to the set configuration.
32-
34+
+
3335
Note that you must configure `STORAGE_ACCOUNT_ID` when using DPT with {oadp-short} on Azure.
34-
36+
+
3537
link:https://issues.redhat.com/browse/OADP-6300[OADP-6300]
3638

37-
*New node agent load affinity configurations are available*
39+
New node agent load affinity configurations are available::
3840

3941
* *Node agent load affinity:* You can schedule the node agent pods on specific nodes by using the `spec.podConfig.nodeSelector` object of the `DataProtectionApplication` (DPA) custom resource (CR). You can add more restrictions on the node agent pods scheduling by using the `nodeagent.loadAffinity` object in the DPA spec.
4042
* *Repository maintenance job affinity configurations:* You can use the repository maintenance job affinity configurations in the `DataProtectionApplication` (DPA) custom resource (CR) only if you use Kopia as the backup repository.
4143
+
4244
You have the option to configure the load affinity at the global level affecting all repositories, or for each repository. You can also use a combination of global and per-repository configuration.
4345
* *Velero load affinity:* You can use the `podConfig.nodeSelector` object to assign the Velero pod to specific nodes. You can also configure the `velero.loadAffinity` object for pod-level affinity and anti-affinity.
4446

47+
+
4548
link:https://issues.redhat.com/browse/OADP-5832[OADP-5832]
4649

47-
*Node agent load concurrency is available*
48-
50+
Node agent load concurrency is available::
4951
With this update, users can control the maximum number of node agent operations that can run simultaneously on each node within their cluster. It also enables better resource management, optimizing backup and restore workflows for improved performance and a more streamlined experience.
5052

5153

5254
[id="resolved-issues-1-5-1_{context}"]
5355
== Resolved issues
5456

55-
*`DataProtectionApplicationSpec` overflowed annotation limit, causing potential misconfiguration in deployments*
56-
57+
`DataProtectionApplicationSpec` overflowed annotation limit, causing potential misconfiguration in deployments::
5758
Before this update, the `DataProtectionApplicationSpec` used deprecated `PodAnnotations`, which led to an annotation limit overflow. This caused potential misconfigurations in deployments. In this release, we have added `PodConfig` for annotations in pods deployed by the Operator, ensuring consistent annotations and improved manageability for end users. As a result, deployments should now be more reliable and easier to manage.
58-
59+
+
5960
link:https://issues.redhat.com/browse/OADP-6454[OADP-6454]
6061

61-
*Root file system for {oadp-short} controller manager is now read-only*
62-
62+
Root file system for {oadp-short} controller manager is now read-only::
6363
Before this update, the `manager` container of the `openshift-adp-controller-manager-*` pod was configured to run with a writable root file system. As a consequence, this could allow for tampering with the container's file system or the writing of foreign executables. With this release, the container's security context has been updated to set the root file system to read-only while ensuring necessary functions that require write access, such as the Kopia cache, continue to operate correctly. As a result, the container is hardened against potential threats.
6464

65-
*`nonAdmin.enable: false` in multiple DPAs no longer causes reconcile issues*
66-
65+
`nonAdmin.enable: false` in multiple DPAs no longer causes reconcile issues::
6766
Before this update, when a user attempted to create a second non-admin `DataProtectionApplication` (DPA) on a cluster where one already existed, the new DPA failed to reconcile. With this release, the restriction on Non-Admin Controller installation to one per cluster has been removed. As a result, users can install multiple Non-Admin Controllers across the cluster without encountering errors.
68-
67+
+
6968
link:https://issues.redhat.com/browse/OADP-6500[OADP-6500]
7069

71-
*{oadp-short} supports self-signed certificates*
72-
70+
{oadp-short} supports self-signed certificates::
7371
Before this update, using a self-signed certificate for backup images with a storage provider such as Minio resulted in an `x509: certificate signed by unknown authority` error during the backup process. With this release, certificate validation has been updated to support self-signed certificates in {oadp-short}, ensuring successful backups.
74-
72+
+
7573
link:https://issues.redhat.com/browse/OADP-641[OADP-641]
7674

77-
*`velero describe` includes `defaultVolumesToFsBackup`*
78-
75+
`velero describe` includes `defaultVolumesToFsBackup`::
7976
Before this update, the `velero describe` output command omitted the `defaultVolumesToFsBackup` flag. This affected the visibility of backup configuration details for users. With this release, the `velero describe` output includes the `defaultVolumesToFsBackup` flag information, improving the visibility of backup settings.
80-
77+
+
8178
link:https://issues.redhat.com/browse/OADP-5762[OADP-5762]
8279

83-
*DPT CR no longer fail when `s3Url` is secured*
84-
80+
DPT CR no longer fail when `s3Url` is secured::
8581
Before this update, `DataProtectionTest` (DPT) failed to run when `s3Url` was secured due to an unverified certificate because the DPT CR lacked the ability to skip or add the caCert in the spec field. As a consequence, data upload failure occurred due to an unverified certificate. With this release, DPT CR has been updated to accept and skip CA cert in spec field, resolving SSL verification errors. As a result, DPT no longer fails when using secured `s3Url`.
86-
82+
+
8783
link:https://issues.redhat.com/browse/OADP-6235[OADP-6235]
8884

89-
*Adding a backupLocation to DPA with an existing backupLocation name is not rejected*
90-
85+
Adding a backupLocation to DPA with an existing backupLocation name is not rejected::
9186
Before this update, adding a second `backupLocation` with the same name in `DataProtectionApplication` (DPA) caused {oadp-short} to enter an invalid state, leading to Backup and Restore failures due to Velero's inability to read Secret credentials. As a consequence, Backup and Restore operations failed. With this release, the duplicate `backupLocation` names in DPA are no longer allowed, preventing Backup and Restore failures. As a result, duplicate `backupLocation` names are rejected, ensuring seamless data protection.
92-
87+
+
9388
link:https://issues.redhat.com/browse/OADP-6459[OADP-6459]
9489

9590

9691
[id="known-issues-1-5-1_{context}"]
9792
== Known issues
9893

99-
*The restore fails for backups created on OpenStack using the Cinder CSI driver*
100-
94+
The restore fails for backups created on OpenStack using the Cinder CSI driver::
10195
When you start a restore operation for a backup that was created on an OpenStack platform using the Cinder Container Storage Interface (CSI) driver, the initial backup only succeeds after the source application is manually scaled down. The restore job fails, preventing you from successfully recovering your application's data and state from the backup. No known workaround exists.
102-
96+
+
10397
link:https://issues.redhat.com/browse/OADP-5552[OADP-5552]
10498

105-
*Datamover pods scheduled on unexpected nodes during backup if the `nodeAgent.loadAffinity` parameter has many elements*
106-
99+
Datamover pods scheduled on unexpected nodes during backup if the `nodeAgent.loadAffinity` parameter has many elements::
107100
Due to an issue in Velero 1.14 and later, the {oadp-short} node-agent only processes the first `nodeSelector` element within the `loadAffinity` array. As a consequence, if you define multiple `nodeSelector` objects, all objects except the first are ignored, potentially causing datamover pods to be scheduled on unexpected nodes during a backup.
108-
101+
+
109102
To work around this problem, consolidate all required `matchExpressions` from multiple `nodeSelector` objects into the first `nodeSelector` object. As a result, all node affinity rules are correctly applied, ensuring datamover pods are scheduled to the appropriate nodes.
110-
103+
+
111104
link:https://issues.redhat.com/browse/OADP-6469[OADP-6469]
112105

113-
*{oadp-short} Backup fails when using CA certificates with aliased command*
114-
106+
{oadp-short} Backup fails when using CA certificates with aliased command::
115107
The CA certificate is not stored as a file on the running Velero container. As a consequence, the user experience degraded due to missing `caCert` in Velero container, requiring manual setup and downloads.
116108
To work around this problem, manually add cert to the Velero deployment. For instructions, see link:https://access.redhat.com/articles/5456281#using-cacert-with-velero-command-aliased-via-velero-deployment-48[Using cacert with velero command aliased via velero deployment].
117-
109+
+
118110
link:https://issues.redhat.com/browse/OADP-4668[OADP-4668]
119111

120-
*The `nodeSelector` spec is not supported for the Data Mover restore action*
121-
112+
The `nodeSelector` spec is not supported for the Data Mover restore action::
122113
When a Data Protection Application (DPA) is created with the `nodeSelector` field set in the `nodeAgent` parameter, Data Mover restore partially fails instead of completing the restore operation. No known workaround exists.
123-
114+
+
124115
link:https://issues.redhat.com/browse/OADP-4743[OADP-4743]
125116

126-
*Image streams backups are partially failing when the DPA is configured with `caCert`*
127-
117+
Image streams backups are partially failing when the DPA is configured with `caCert`::
128118
An unverified certificate in the S3 connection during backups with `caCert` in `DataProtectionApplication` (DPA) causes the `ocp-django` application's backup to partially fail and result in data loss. No known workaround exists.
129-
119+
+
130120
link:https://issues.redhat.com/browse/OADP-4817[OADP-4817]
131121

132-
*Kopia does not delete cache on worker node*
133-
122+
Kopia does not delete cache on worker node::
134123
When the `ephemeral-storage` parameter is configured and running file system restore, the cache is not automatically deleted from the worker node. As a consequence, the `/var` partition overflows during backup restore, causing increased storage usage and potential resource exhaustion. To work around this problem, restart the node agent pod, which clears the cache. As a result, cache is deleted.
135-
124+
+
136125
link:https://issues.redhat.com/browse/OADP-4855[OADP-4855]
137126

138-
*{gcp-short} VSL backups fail with Workload Identity because of invalid project configuration*
139-
127+
{gcp-short} VSL backups fail with Workload Identity because of invalid project configuration::
140128
When performing a `volumeSnapshotLocation` (VSL) backup on {gcp-short} Workload Identity, the Velero {gcp-short} plugin creates an invalid API request if the {gcp-short} project is also specified in the `snapshotLocations` configuration of `DataProtectionApplication` (DPA). As a consequence, the {gcp-short} API returns a `RESOURCE_PROJECT_INVALID` error, and the backup job finishes with a `PartiallyFailed` status. No known workaround exists.
141-
129+
+
142130
link:https://issues.redhat.com/browse/OADP-6697[OADP-6697]
143131

144-
*VSL backups fail for `CloudStorage` API on AWS with STS*
145-
132+
VSL backups fail for `CloudStorage` API on AWS with STS::
146133
The `volumeSnapshotLocation` (VSL) backup fails because of missing the `AZURE_RESOURCE_GROUP` parameter in the credentials file, even if `AZURE_RESOURCE_GROUP` is already mentioned in the `DataProtectionApplication` (DPA) config for VSL. No known workaround exists.
147-
134+
+
148135
link:https://issues.redhat.com/browse/OADP-6676[OADP-6676]
149136

150-
*Backups of applications with `ImageStreams` fail on Azure with STS*
151-
137+
Backups of applications with `ImageStreams` fail on Azure with STS::
152138
When backing up applications that include image stream resources on an Azure cluster using STS, the {oadp-short} plugin incorrectly attempts to locate a secret-based credential for the container registry. As a consequence, the required secret is not found in the STS environment, causing the `ImageStream` custom backup action to fail. This results in the overall backup status marked as `PartiallyFailed`. No known workaround exists.
153-
139+
+
154140
link:https://issues.redhat.com/browse/OADP-6675[OADP-6675]
155141

156-
*DPA reconciliation fails for `CloudStorageRef` configuration*
157-
142+
DPA reconciliation fails for `CloudStorageRef` configuration::
158143
When a user creates a bucket and uses the `backupLocations.bucket.cloudStorageRef` configuration, bucket credentials are not present in the `DataProtectionApplication` (DPA) custom resource (CR). As a result, the DPA reconciliation fails even if bucket credentials are present in the `CloudStorage` CR. To work around this problem, add the same credentials to the `backupLocations` section of the DPA CR.
159-
144+
+
160145
link:https://issues.redhat.com/browse/OADP-6669[OADP-6669]
161146

162147

163148
[id="deprecated-features-1-5-1_{context}"]
164149
== Deprecated features
165150

166-
*The `configuration.restic` specification field has been deprecated*
167-
151+
The `configuration.restic` specification field has been deprecated::
168152
With {oadp-short} 1.5.0, the `configuration.restic` specification field has been deprecated. Use the `nodeAgent` section with the `uploaderType` field for selecting `kopia` or `restic` as a `uploaderType`. Note that Restic is deprecated in {oadp-short} 1.5.0.
169-
153+
+
170154
link:https://issues.redhat.com/browse/OADP-5158[OADP-5158]

modules/oadp-1-5-2-release-notes.adoc

Lines changed: 8 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -8,22 +8,24 @@
88
= OADP 1.5.2 release notes
99

1010
[role="_abstract"]
11-
The {oadp-first} 1.5.2 release notes lists resolved issues.
11+
The {oadp-first} 1.5.2 release notes list resolved issues.
1212

1313
[id="resolved-issues-1-5-2_{context}"]
1414
== Resolved issues
1515

16-
*Self-signed certificate for internal image backup should not break other BSLs*
17-
18-
Before this update, {oadp-short} would only process the first custom CA certificate found among all backup storage locations (BSLs) and apply it globally. This behavior prevented multiple BSLs with different CA certificates from working correctly.
16+
Self-signed certificate for internal image backup should not break other BSLs::
17+
Before this update, {oadp-short} would only process the first custom CA certificate found among all backup storage locations (BSLs) and apply it globally. This behavior prevented multiple BSLs with different CA certificates from working correctly.
1918
Additionally, system-trusted certificates were not included, causing failures when connecting to standard services.
19+
+
20+
--
2021
With this update, {oadp-short} now:
2122

2223
* Concatenates all unique CA certificates from {aws-short} BSLs into a single bundle.
2324
* Includes system-trusted certificates automatically.
2425
* Enables multiple BSLs with different custom CA certificates to operate simultaneously.
2526
* Only processes CA certificates when image backup is enabled (default behavior).
26-
27+
--
28+
+
2729
This enhancement improves compatibility for environments using multiple storage providers with different certificate requirements, particularly when backing up internal images to {aws-short} S3-compatible storage with self-signed certificates.
28-
30+
+
2931
link:https://issues.redhat.com/browse/OADP-6765[OADP-6765]

modules/oadp-verifying-upgrade-1-5-0.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ $ oc get dpa dpa-sample -n openshift-adp
1919
----
2020
+
2121
.Example output
22-
+
22+
[source,terminal]
2323
----
2424
NAME RECONCILED AGE
2525
dpa-sample True 2m51s
@@ -38,7 +38,7 @@ $ oc get all -n openshift-adp
3838
----
3939
+
4040
.Example output
41-
+
41+
[source,terminal]
4242
----
4343
NAME READY STATUS RESTARTS AGE
4444
pod/node-agent-9pjz9 1/1 Running 0 3d17h
@@ -78,9 +78,9 @@ In {oadp-short} 1.4.0 and {oadp-short} 1.3.0 version, the `node-agent` pods are
7878
----
7979
$ oc get backupstoragelocations.velero.io -n openshift-adp
8080
----
81-
.Example output
82-
[source,yaml]
8381
+
82+
.Example output
83+
[source,terminal]
8484
----
8585
NAME PHASE LAST VALIDATED AGE DEFAULT
8686
dpa-sample-1 Available 1s 3d16h true

0 commit comments

Comments
 (0)