You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
By default, for {gcp-first} and {aws-first} clusters, the Machine Config Operator (MCO) updates the boot image in the machine sets in your cluster whenever you update your cluster.
10
+
[role="_abstract"]
11
+
With boot image management enabled, the Machine Config Operator (MCO) manages and updates the {op-system-first} version of the boot image in the machine sets for your control plane or worker nodes. This means that the MCO updates the boot image whenever you update your cluster. Without boot image management enabled, if your cluster was originally created with an older {product-title} version, the boot image that the MCO would use to create new nodes is an older {op-system-first} version, even if your cluster is at a later {product-title} version.
11
12
12
-
For {vmw-first}, you can enable boot image management as a Technology Preview feature. For information on how to enable this feature, see "Enabling boot image management".
13
+
New nodes created after enabling the feature use the updated boot image. This feature has no effect on existing nodes.
13
14
14
-
:FeatureName: Boot image management on {vmw-short}
You can disable the boot image management feature, if needed. When the feature is disabled, the boot image no longer updates with the cluster. For example, with the feature disabled, if your cluster was originally created with {product-title} 4.16, the boot image that the MCO would use to create nodes is the same 4.16 version, even if your cluster is at a later version.
20
+
For example, with the feature disabled, if your cluster was originally created with {product-title} 4.16, the boot image that the MCO would use to create new nodes is the same {op-system} version that was installed for the cluster, even if your cluster is currently at a later{product-title} version.
18
21
19
-
However, using an older boot image could cause the following issues:
22
+
Using an older boot image could cause the following issues:
20
23
21
24
* Extra time to start nodes
22
25
* Certificate expiration issues
23
26
* Version skew issues
24
27
25
-
For information on how to disable this feature, see "Disabling boot image management". If you disable this feature, you can re-enable the feature at any time. For information, see "Enabling boot image management".
26
-
27
-
[NOTE]
28
-
====
29
-
The ability to configure boot image management is available for only {gcp-short} and {aws-short} clusters. It is not supported for clusters managed by the {cluster-capi-operator}.
30
-
====
28
+
You can disable the boot image management feature, if needed. When the feature is disabled, the boot image version no longer updates with the cluster. For example, you could disable the boot image management feature in order to use a custom boot image that you do not want changed. For information on how to disable this feature, see "Disabling boot image management". If you disable this feature, you can re-enable the feature at any time. For information, see "Enabling boot image management".
31
29
32
30
How the cluster behaves after disabling or re-enabling the feature, depends upon when you made the change, including the following scenarios:
33
31
@@ -49,78 +47,20 @@ How the cluster behaves after disabling or re-enabling the feature, depends upon
49
47
Because a boot image is used only when a node is scaled up, this feature has no effect on existing nodes.
50
48
====
51
49
52
-
To view the current boot image used in your cluster, use one of the following methods, based on your platform:
53
-
54
-
* For {gcp-short} and {aws-short}, you can examine a machine set.
55
-
+
56
-
[NOTE]
57
-
====
58
-
The location and format of the boot image within the machine set differs, based on the platform. However, the boot image is always listed in the `spec.template.spec.providerSpec.` parameter.
59
-
====
60
-
+
61
-
.Example {gcp-short} machine set with the boot image reference
50
+
To view the current {op-system-first} boot image version used in your cluster, you can view the `/sysroot/.coreos-aleph-version.json` file on that node.
62
51
52
+
.Example coreos-aleph-version.json file with an older boot image
<1> This boot image is the same as the originally-installed {product-title} version, in this example {product-title} 4.12, regardless of the current version of the cluster. The way that the boot image is represented in the machine set depends on the platform, as the structure of the `providerSpec` field differs from platform to platform.
86
-
+
87
-
.Example {aws-short} machine set with the boot image reference
61
+
where:
88
62
89
-
[source,yaml]
90
-
----
91
-
apiVersion: machine.openshift.io/v1beta1
92
-
kind: MachineSet
93
-
metadata:
94
-
name: ci-ln-hmy310k-72292-5f87z-worker-a
95
-
namespace: openshift-machine-api
96
-
spec:
97
-
# ...
98
-
template:
99
-
# ...
100
-
spec:
101
-
# ...
102
-
providerSpec:
103
-
value:
104
-
ami:
105
-
id: ami-0e8fd9094e487d1ff
106
-
# ...
107
-
----
108
-
109
-
* For {vmw-first}, examine an affected node by opening an `oc debug` session to the node and using the `rpm-ostree status` command.
110
-
+
111
-
[source,terminal]
112
-
----
113
-
sh-5.1# rpm-ostree status
114
-
----
115
-
+
116
-
.Example {aws-short} node with the boot image reference
`<version>`:: Specifies the {op-system-first} boot image version. In this example, the boot image is from the originally-installed {product-title} 4.18 version, regardless of the current version of the cluster.
124
64
125
65
// The following admonition is intended to address https://issues.redhat.com/browse//OSDOCS-14592
0 commit comments