This is a cache of https://docs.openshift.com/container-platform/4.16/nodes/scheduling/descheduler/nodes-descheduler-release-notes.html. It is a snapshot of the page at 2024-11-22T09:48:22.744+0000.
Descheduler release notes - Controlling pod placement onto nodes (scheduling) | Nodes | OpenShift Container Platform 4.16
×

The Kube Descheduler Operator allows you to evict pods so that they can be rescheduled on more appropriate nodes.

These release notes track the development of the Kube Descheduler Operator.

For more information, see About the descheduler.

Release notes for Kube Descheduler Operator 5.0.1

Issued: 1 July 2024

The following advisory is available for the Kube Descheduler Operator 5.0.1:

New features and enhancements

  • You can now install and use the Kube Descheduler Operator in an OpenShift Container Platform cluster running in fips mode.

    To enable fips mode for your cluster, you must run the installation program from a Red Hat Enterprise Linux (RHEL) computer configured to operate in fips mode. For more information about configuring fips mode on RHEL, see Switching RHEL to fips mode.

    When running Red Hat Enterprise Linux (RHEL) or Red Hat Enterprise Linux CoreOS (RHCOS) booted in fips mode, OpenShift Container Platform core components use the RHEL cryptographic libraries that have been submitted to NIST for fips 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.

Bug fixes

  • This release of the Kube Descheduler Operator addresses several Common Vulnerabilities and Exposures (CVEs).

Release notes for Kube Descheduler Operator 5.0.0

Issued: 6 March 2024

The following advisory is available for the Kube Descheduler Operator 5.0.0:

Notable changes

  • With this release, the Kube Descheduler Operator delivers updates independent of the OpenShift Container Platform minor version release stream.

Bug fixes

  • Previously, the descheduler pod logs showed the following warning about the Operator’s version: failed to convert Descheduler minor version to float. With this update, the warning is no longer shown. (OCPBUGS-14042)