You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardexpand all lines: modules/release-notes/ref-release-notes-breaking-changes.adoc
+4-4
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ This section lists breaking changes in {product} {product-version}.
7
7
[id="removed-functionality-rhidp-4572"]
8
8
== Updated monitoring and logging metrics
9
9
10
-
Prom-client metrics have been removed and replaced with OpenTelemetry metrics. As a result, the metrics port has changed from `7007` to `9464`. Deprecated metrics have also been removed. If you had dependencies on these, ensure your prometheus queries are updated. For further information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/monitoring_and_logging/index[Monitoring and logging]
10
+
Prom-client metrics have been removed and replaced with OpenTelemetry metrics. As a result, the metrics port has changed from `7007` to `9464`. Deprecated metrics have also been removed. If you had dependencies on these, ensure your prometheus queries are updated. For further information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/monitoring_and_logging/index[Monitoring and logging].
11
11
12
12
13
13
.Additional resources
@@ -22,7 +22,7 @@ With this update, the following plugins, previously under the `@janus-idp` scope
Copy file name to clipboardexpand all lines: modules/release-notes/ref-release-notes-deprecated-functionalities.adoc
+1-1
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ The `./dynamic-plugins/dist/janus-idp-backstage-plugin-aap-backend-dynamic` plug
16
16
[id="deprecated-functionality-rhidp-4913"]
17
17
== Audit log rotation is deprecated
18
18
19
-
With this update, you can evaluate your platform's log forwarding solutions to align with your security and compliance needs. Most of these solutions offer configurable options to minimize the loss of logs in the event of an outage.
19
+
With this update, you can evaluate your platform's log forwarding solutions to align with your security and compliance needs. Most of these solutions offer configurable options to minimize the loss of logs in the event of an outage.
=== notification backend and catalog backend gitlab org failing to load with MODULE_NOT_FOUND
28
-
29
-
In the previous version of {product-short}, the GitLab Org catalog backend plugin (`plugin-catalog-backend-module-gitlab-org`)and the Notification backend plugin (`plugin-notifications-backend`) fail to load when configured with a `MODULE_NOT_FOUND` error. This has been fixed by embedding the missing dependencies in the dynamic plugins.
30
-
31
-
See similar issue https://issues.redhat.com/browse/RHIDP-5319
Copy file name to clipboardexpand all lines: modules/release-notes/ref-release-notes-known-issues.adoc
+4-31
Original file line number
Diff line number
Diff line change
@@ -7,45 +7,18 @@ This section lists known issues in {product} {product-version}.
7
7
[id="known-issue-rhidp-5344"]
8
8
== Multi-Attached error for Volume (PVC)
9
9
10
-
Currently, when deploying {product-short} using the Helm Chart, two replicas cannot run on different cluster nodes. This might also affect the upgrade from 1.3 to 1.4.0 if the new pod is scheduled on a different node.
11
-
12
-
Possible workarounds for the upgrade include the following actions:
13
-
* Manually scale down the number of replicas to 0 before upgrading your Helm release.
14
-
* Manually remove the old {product-short} pod after upgrading the Helm release. However, this would imply some application downtime.
15
-
* Leverage a Pod Affinity rule to force the cluster scheduler to run your {product-short} pods on the same node.
10
+
Currently, when deploying {product-short} using the Helm Chart, two replicas cannot run on different cluster nodes. This might also affect the upgrade from 1.3 to 1.4.0 if the new pod is scheduled on a different node.
11
+
12
+
A possible workaround for the upgrade is to manually scale down the number of replicas to 0 before upgrading your Helm release. Or manually remove the old {product-short} pod after upgrading the Helm release. However, this would imply some application downtime. You can also leverage a Pod Affinity rule to force the cluster scheduler to run your {product-short} pods on the same node.
== [Helm] Cannot run two RHDH replicas on different nodes due to Multi-Attach errors on the dynamic plugins root PVC
23
-
24
-
If you are deploying {product-short} using the Helm Chart, it is currently impossible to have 2 replicas running on different cluster nodes. This might also affect the upgrade from 1.3 to 1.4.0 if the new pod is scheduled on a different node.
25
-
26
-
A possible workaround for the upgrade is to manually scale down the number of replicas to 0 before upgrading your Helm release. Or manually remove the old {product-short} pod after upgrading the Helm release. However, this would imply some application downtime.
27
-
You can also leverage a Pod Affinity rule to force the cluster scheduler to run your {product-short} pods on the same node.
When using {rhsso-brand-name} or {rhbk-brand-name} as an OIDC provider, the default access token lifespan is set to 5 minutes, which corresponds to the token refresh grace period set in {product-short}. This 5-minute grace period is the threshold used to trigger a new refresh token call. Since the token is always near expiration, frequent refresh token requests will cause performance issues.
38
-
39
-
This issue will be resolved in the 1.5 release. To prevent the performance issues, increase the lifespan in the {rhsso-brand-name} or {rhbk-brand-name} server by setting *Configure > Realm Settings > Access Token Lifespan* to a value greater than five minutes (preferably 10 or 15 minutes).
== Topology plugin permission is not displayed in the RBAC front-end UI
47
20
48
-
Permissions associated only with front-end plugins do not appear in the UI because they require a backend plugin to expose the permission framework's well-known endpoint. As a workaround, you can apply these permissions by using a CSV file or directly calling the REST API of the RBAC backend plugin. Affected plugins include Topology (`topology.view.read`), Tekton (`tekton.view.read`), ArgoCD (`argocd.view.read`), and Quay (`quay.view.read`).
21
+
Permissions associated only with front-end plugins do not appear in the UI because they require a backend plugin to expose the permission framework's well-known endpoint. As a workaround, you can apply these permissions by using a CSV file or directly calling the REST API of the RBAC backend plugin. Affected plugins include Topology (`topology.view.read`), Tekton (`tekton.view.read`), ArgoCD (`argocd.view.read`), and Quay (`quay.view.read`).
Copy file name to clipboardexpand all lines: modules/release-notes/ref-release-notes-new-features.adoc
+22-15
Original file line number
Diff line number
Diff line change
@@ -22,24 +22,24 @@ This update removes the `kube-rbac-proxy` sidecar container from the RHDH Operat
22
22
[id="feature-rhidp-4414"]
23
23
== Identifying Backstage flavor for plugins by using the `developerHub.flavor` field
24
24
25
-
With this update, you can use the `developerHub.flavor` field to identify whether plugins are running on {product-very-short}, {rhtap-very-short}, or vanilla Backstage, as shown in the following example:
26
-
27
-
.`app-config.yaml` fragment with the `developerhub.flavor` field
28
-
29
-
[source,yaml,subs="+quotes"]
30
-
----
31
-
developerHub:
32
-
flavor: <flavor>
33
-
----
34
-
35
-
`flavor`::
25
+
With this update, you can use the `developerHub.flavor` field to identify whether plugins are running on {product-very-short}, {rhtap-very-short}, or vanilla Backstage, as shown in the following example:
26
+
27
+
.`app-config.yaml` fragment with the `developerhub.flavor` field
28
+
29
+
[source,yaml,subs="+quotes"]
30
+
----
31
+
developerHub:
32
+
flavor: <flavor>
33
+
----
34
+
35
+
`flavor`::
36
36
Identify the flavor of Backstage that is running. Default value: `rhdh`
37
37
38
38
[id="feature-rhidp-4419"]
39
39
== Ability to manage Persistent Volume Claim (PVCs) in {product-very-short} Operator
40
40
41
-
You can now mount directories from pre-created PersistentVolumeClaims (PVCs) using the `spec.application.extraFiles.pvcs` field, while configuring {product-very-short} Operator.
42
-
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/configuring/index#configuring-the-deployment[Configuring {product} deployment when using the Operator].
41
+
You can now mount directories from pre-created PersistentVolumeClaims (PVCs) using the `spec.application.extraFiles.pvcs` field, while configuring {product-very-short} Operator.
42
+
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/configuring/index#configuring-the-deployment[Configuring {product} deployment when using the Operator].
43
43
44
44
45
45
[id="feature-rhidp-4805"]
@@ -50,14 +50,21 @@ With this update, you can use {rhbk-brand-name} as an authentication provider. T
50
50
[id="feature-rhidp-4806"]
51
51
== Ability to install third-party plugins in {product-very-short}
52
52
53
-
You can now install third-party plugins in {product} without rebuilding the {product-very-short} application.
54
-
53
+
You can now install third-party plugins in {product} without rebuilding the {product-very-short} application.
54
+
55
55
For more information, see link:https://docs.redhat.com/en/documentation/red_hat_developer_hub/{product-version}/html-single/installing_and_viewing_plugins_in_red_hat_developer_hub/index#assembly-install-third-party-plugins-rhdh[Installing third-party plugins in {product}].
56
56
57
57
[id="feature-rhidp-5156"]
58
58
== The catalog backend module logs plugin is enabled
59
59
60
60
With this update, the `backstage-plugin-catalog-backend-module-logs` is enabled and converted to a static plugin improving performance and stability. The dynamic plugin was disabled in version `1.3`.
61
61
62
+
[id="feature-rhidp-5734"]
63
+
== {gke-brand-name} now supported
64
+
65
+
{gke-brand-name} ({gke-short}) is out of Developer Preview and is now fully supported as of {product-very-short} {product-version}.
66
+
67
+
See the full list of supported platforms on the link:https://access.redhat.com/support/policy/updates/developerhub[Life Cycle page].
0 commit comments