This is a cache of https://docs.openshift.com/container-platform/4.16/nodes/scheduling/secondary_scheduler/nodes-secondary-scheduler-release-notes.html. It is a snapshot of the page at 2024-11-22T09:48:28.171+0000.
Secondary Scheduler Operator release notes - Controlling pod placement onto nodes (scheduling) | Nodes | OpenShift Container Platform 4.16
×

The Secondary Scheduler Operator for Red Hat OpenShift allows you to deploy a custom secondary scheduler in your OpenShift Container Platform cluster.

These release notes track the development of the Secondary Scheduler Operator for Red Hat OpenShift.

For more information, see About the Secondary Scheduler Operator.

Release notes for Secondary Scheduler Operator for Red Hat OpenShift 1.3.1

Issued: 3 October 2024

The following advisory is available for the Secondary Scheduler Operator for Red Hat OpenShift 1.3.1:

Bug fixes

  • This release of the Secondary Scheduler Operator addresses several Common Vulnerabilities and Exposures (CVEs).

Known issues

  • Currently, you cannot deploy additional resources, such as config maps, CRDs, or RBAC policies through the Secondary Scheduler Operator. Any resources other than roles and role bindings that are required by your custom secondary scheduler must be applied externally. (WRKLDS-645)

Release notes for Secondary Scheduler Operator for Red Hat OpenShift 1.3.0

Issued: 1 July 2024

The following advisory is available for the Secondary Scheduler Operator for Red Hat OpenShift 1.3.0:

New features and enhancements

  • You can now install and use the Secondary Scheduler Operator in an OpenShift Container Platform cluster running in fips mode.

    To enable fips mode for your cluster, you must run the installation program from a Red Hat Enterprise Linux (RHEL) computer configured to operate in fips mode. For more information about configuring fips mode on RHEL, see Switching RHEL to fips mode.

    When running Red Hat Enterprise Linux (RHEL) or Red Hat Enterprise Linux CoreOS (RHCOS) booted in fips mode, OpenShift Container Platform core components use the RHEL cryptographic libraries that have been submitted to NIST for fips 140-2/140-3 Validation on only the x86_64, ppc64le, and s390x architectures.

Bug fixes

  • This release of the Secondary Scheduler Operator addresses several Common Vulnerabilities and Exposures (CVEs).

Known issues

  • Currently, you cannot deploy additional resources, such as config maps, CRDs, or RBAC policies through the Secondary Scheduler Operator. Any resources other than roles and role bindings that are required by your custom secondary scheduler must be applied externally. (WRKLDS-645)