Release Notes
| This page lists notable changes in OpenShift releases which we find important. Reading release notes for you as a service. |
OpenShift 4.20
OpenShift version 4.20 is available since 2025-11-11. This version is based on Kubernetes 1.33 and CRI-O 1.33. The RHCOS image still uses RHEL 9.6 packages. Find the release notes in the upstream documentation at OpenShift Container Platform 4.20 release notes. The Red Hat unveils OpenShift 4.20 blog post is also a valuable resource.
- Custom Identity Providers are becoming Generally Available
-
OpenShift 4.20 now enables direct integration with external OIDC identity providers for issuing auth tokens. This gives more control over the authentication system to the cluster administrators and can simplify user management.
For more information, see the official documentation.
- External Secrets Operator becomes Generally Available
-
The External Secrets Operator is a cluster service that provides lifecycle management for secrets fetched from external secret management systems (such as AWS Secrets Manager, HashiCorp Vault, and Azure Key Vault). The operator provisions, fetches and refreshes the secret within the cluster, ensuring a secure and efficient secrets flow without direct application involvement.
For more information, see the official documentation.
- OpenShift AI gains new capabilities
-
OpenShift Container Platform 4.20 brings several new capabilities to OpenShift AI that improve the scalability of AI workflows, such as simplified deployments of distributed AI workloads (leveraging the LeaderWorkerSet resource), and improved load balancing for distributed inference with llm-d (leveraging the Kubernetes Gateway API Inference Extensions).
For more information, see the official documentation.
- Multiple network interface controllers on vSphere clusters becomes Generally Available
-
For clusters on VMware vSphere, it has been possible since OpenShift 4.18 to set up the cluster with multiple network interface controllers for one node. This feature is now becoming Generally Available.
For more information, see the official documentation.
- Linux User Namespace Support becomes Generally Available
-
Support for deploying pods into Linux user namespaces is now generally available and enabled by default. This feature improves isolation, mitigating security vulnerabilities that one compromised container can pose to other pods and the node itself.
This change includes two new security context constraints,
restricted-v3andnested-container, which are designed for use with user namespaces.For further information, see the official documentation.
- Docker v2 registries become Deprecated
-
Support for Docker v2 registries will be removed in a future release. At that point, all mirroring operations will require a registry that supports the OCI specification.
- Red Hat Marketplace becomes Deprecated
-
The Red Hat Marketplace index for OLM-based cluster operators is being sunset. Customers using software from the Marketplace should reach out to the software vendor to find out how to migrate away from the Marketplace Operator.
For further information, including a list of affected operators, see Sunset of the Red Hat Marketplace.
- Removal of deprecated APIs in Kubernetes 1.33
-
The following APIs are no longer available in Kubernetes 1.32 and need to be migrated:
-
MutatingWebhookConfigurationneeds to be migrated fromadmissionregistration.k8s.io/v1beta1toadmissionregistration.k8s.io/v1. -
ValidatingAdmissionPolicyneeds to be migrated fromadmissionregistration.k8s.io/v1beta1toadmissionregistration.k8s.io/v1. -
ValidatingAdmissionPolicyBindingneeds to be migrated fromadmissionregistration.k8s.io/v1beta1toadmissionregistration.k8s.io/v1. -
ValidatingWebhookConfigurationneeds to be migrated fromadmissionregistration.k8s.io/v1beta1toadmissionregistration.k8s.io/v1.For more information, see APIs removed from Kubernetes 1.33.
-
OpenShift 4.19
OpenShift version 4.19 is available since 2025-06-17. This version is based on Kubernetes 1.32 and CRI-O 1.32. The RHCOS image uses RHEL 9.6 packages. Find the release notes in the upstream documentation at OpenShift Container Platform 4.19 release notes. The Red Hat unveils OpenShift 4.19 blog post is also a valuable resource.
- Routes with externally managed certificates are becoming Generally Available
-
With this release, OpenShift Container Platform routes can be configured with third-party certificate management solutions, utilizing the
.spec.tls.externalCertificatefield in the route API. In this way, an externally managed TLS certificate can be referenced through secrets.For more information, see Creating a route with externally managed certificate.
- Gateway API support for configuring cluster ingress traffic is becoming Generally Available
-
With this release, ingress cluster traffic can be managed using Gateway API resources. Gateway API provides a robust networking solution within the transport layer, L4, and the application layer, L7, for OpenShift Container Platform clusters using a standardized open source ecosystem.
For further information, see Gateway API with OpenShift Container Platform networking.
- The Control Plane now supports TLS 1.3 and the Modern TLS security profile
-
For further information see Configuring the TLS security profile for the control plane.
- Customization options for control plane machine names
-
This release enables specifying a prefix for machine names in the control plane machine set by setting
spec.machineNamePrefixin theControlPlaneMachineSetresource.For further information see Adding a custom prefix to control plane machine names.
- New CLI command to show PVC usage
-
With 4.19, the
ocCLI supports a new admin command to see PVC usage:oc adm top pvc - Major version upgrade for Prometheus
-
In this release, Prometheus is upgraded from v2 to v3. This incurs some breaking changes that may affect user-managed configuration.
-
The
leandquantilelabels for classic histograms and summaries are now normalized during ingestion.For instance,
le="10"is ingested asle="10.0"- as a result, queries that reference these labels as integers may no longer work as intended. -
Configurations that send alerts to additional Alertmanager instances through
additionalAlertmanagerConfigsthrough the Alertmanager v1 API are no longer supported.
-
- cgroup v1 is removed
-
With 4.19, support for the deprecated cgroup v1 mode is dropped entirely.
- Removal of deprecated APIs in Kubernetes 1.32
-
The following APIs are no longer available in Kubernetes 1.32 and need to be migrated:
-
FlowSchemaneeds to be migrated fromflowcontrol.apiserver.k8s.io/v1beta3toflowcontrol.apiserver.k8s.io/v1 -
PriorityLevelConfigurationneeds to be migrated fromflowcontrol.apiserver.k8s.io/v1beta3toflowcontrol.apiserver.k8s.io/v1.This migration includes one notable change in the
spec.limited.nominalConcurrencySharesfield, which now only defaults to30when unspecified - an explicit value of0is left unchanged.For more information, see APIs removed from Kubernetes 1.32.
-