You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{product-title} 4.19 now includes a _Tutorials_ guide, which takes the place of the _Getting started_ guide in previous releases. The existing tutorials were refreshed and the guide now focuses solely on hands-on tutorial content. It also provides a jumping off point to other recommended hands-on learning resources for {product-title} across Red{nbsp}Hat.
71
+
72
+
For more information, see xref:../tutorials/index.adoc#tutorials-overview[Tutorials].
73
+
64
74
[id="ocp-release-notes-edge-computing_{context}"]
65
75
=== Edge computing
66
76
@@ -456,7 +466,7 @@ For more information, see xref:../updating/preparing_for_updates/updating-cluste
==== Creating a route with externally managed certificate (General Availability)
469
+
==== Creating a route with externally managed certificate (General Availability)
460
470
461
471
With this release, {product-title} routes can be configured with third-party certificate management solutions, utilising the `.spec.tls.externalCertificate` field in the route API. This allows you to reference externally managed TLS certificates through secrets, streamlining the process by eliminating manual certificate management. By using externally managed certificates, you reduce errors, ensure a smoother certificate update process, and enable the OpenShift router to promptly serve renewed certificates. For more information, see xref:../networking/routes/secured-routes.adoc#nw-ingress-route-secret-load-external-cert_secured-routes[Creating a route with externally managed certificate].
462
472
@@ -558,7 +568,7 @@ This release introduces the following updates to the *Developer* perspective of
=== Pods deploy with readOnlyRootFilesystem set to true
560
570
561
-
With this release, Cloud Credential Operator pods now deploy with the `readOnlyRootFilesystem` security context setting set to `true`. This enhances security by ensuring that the container root file system is mounted as read-only.
571
+
With this release, Cloud Credential Operator pods now deploy with the `readOnlyRootFilesystem` security context setting set to `true`. This enhances security by ensuring that the container root file system is mounted as read-only.
0 commit comments