Mirantis Container Cloud (MCC) becomes part of Mirantis OpenStack for Kubernetes (MOSK)!
Starting with MOSK 25.2, the MOSK documentation set covers all product layers, including MOSK management (formerly Container Cloud). This means everything you need is in one place. Some legacy names may remain in the code and documentation and will be updated in future releases. The separate Container Cloud documentation site will be retired, so please update your bookmarks for continued easy access to the latest content.
Enhancements¶
This section outlines new features and enhancements introduced in the Mirantis Container Cloud release 2.21.0. For the list of enhancements in the Cluster releases 11.5.0 and 7.11.0 that are introduced by the Container Cloud release 2.21.0, see the Cluster releases.
‘BareMetalHostCredential’ custom resource for bare metal hosts
Combining router and seed node settings on one Equinix Metal server
Add custom Docker registries using the Container Cloud web UI
‘BareMetalHostCredential’ custom resource for bare metal hosts¶
Implemented the BareMetalHostCredential custom resource to simplify
permissions and roles management on a bare metal management, regional, and
managed cluster.
Note
For MOSK-based deployments, the feature support is available since MOSK 22.5.
The BareMetalHostCredential object creation triggers the following
automatic actions:
Create an underlying
Secretobject containing data aboutusernameandpasswordof thebmcaccount of the relatedBareMetalHostCredentialobject.Erase sensitive
passworddata of thebmcaccount from theBareMetalHostCredentialobject.Add the created
Secretobject name to thespec.password.namesection of the relatedBareMetalHostCredentialobject.Update
BareMetalHost.spec.bmc.credentialsNamewith theBareMetalHostCredentialobject name.
Note
When you delete a BareMetalHost object, the related
BareMetalHostCredential object is deleted automatically.
Note
On existing clusters, a BareMetalHostCredential object is
automatically created for each BareMetalHost object during a cluster
update.
Dnsmasq configuration enhancements¶
Enhanced the logic of the dnsmasq server to listen on the PXE network of
the management cluster by using the dhcp-lb Kubernetes Service instead of
listening on the PXE interface of one management cluster node.
To configure the DHCP relay service, specify the external address of the
dhcp-lb Kubernetes Service as an upstream address for the relayed DHCP
requests, which is the IP helper address for DHCP. There is the dnsmasq
Deployment behind this service that can only accept relayed DHCP requests.
Container Cloud has its own DHCP relay running on one of the management cluster nodes. That DHCP relay serves for proxying DHCP requests in the same L2 domain where the management cluster nodes are located.
The enhancement comprises deprecation of the dnsmasq.dhcp_range parameter.
Use the Subnet object configuration for this purpose instead.
Note
If you configured multiple DHCP ranges before Container Cloud 2.21.0
during the management cluster bootstrap, the DHCP configuration will
automatically migrate to Subnet objects after cluster upgrade to 2.21.0.
Caution
Using of custom DNS server addresses for servers that boot over PXE is not supported.
Combining router and seed node settings on one Equinix Metal server¶
Implemented the ability to combine configuration of a router and seed node on
the same server when preparing infrastructure for an Equinix Metal based
Container Cloud with private networking using Terraform templates.
Set router_as_seed to true in the required Metro configuration while
preparing terraform.tfvars to combine both the router and seed node roles.
Learn more
Graceful machine deletion¶
TechPreview
Implemented the possibility to safely clean up a node resources using the
Container Cloud API before deleting it from a cluster. Using the
deletionPolicy: graceful parameter in the providerSpec.value section
of the Machine object, the cloud provider controller now prepares a
machine for deletion by cordoning, draining, and removing the related node
from Docker Swarm. If required, you can abort a machine deletion when using
deletionPolicy: graceful, but only before the related node is removed
from Docker Swarm.
Caution
For MKE clusters that are part of MOSK infrastructure, the feature support will become available in one of the following releases.
Learn more
Add custom Docker registries using the Container Cloud web UI¶
Enhanced support for custom Docker registries configuration in management, regional, and managed clusters by adding the Container Registries tab to the Container Cloud web UI. Using this tab, you can configure CA certificates on machines to access private Docker registries.
Note
For MOSK-based deployments, the feature support is available since MOSK 22.5.