Skip to content

Commit 523d9dc

Browse files
Merge pull request #351 from syedriko/syedriko-ols-1771
OLS-1771: Python deps and docs update, week of 2025/05/19
2 parents 4509051 + 912f351 commit 523d9dc

File tree

191 files changed

+5966
-3153
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

191 files changed

+5966
-3153
lines changed

ocp-product-docs-plaintext/4.15/hosted_control_planes/hcp-observability.txt

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -127,9 +127,9 @@ cvo:
127127

128128
# Enabling monitoring dashboards in a hosted cluster
129129

130-
To enable monitoring dashboards in a hosted cluster, complete the following steps:
130+
You can enable monitoring dashboards in a hosted cluster by creating a config map.
131131

132-
1. Create the hypershift-operator-install-flags config map in the local-cluster namespace, being sure to specify the --monitoring-dashboards flag in the data.installFlagsToAdd section. For example:
132+
1. Create the hypershift-operator-install-flags config map in the local-cluster namespace. See the following example configuration:
133133

134134
```yaml
135135
kind: ConfigMap
@@ -138,10 +138,11 @@ metadata:
138138
name: hypershift-operator-install-flags
139139
namespace: local-cluster
140140
data:
141-
installFlagsToAdd: "--monitoring-dashboards"
141+
installFlagsToAdd: "--monitoring-dashboards --metrics-set=All" 1
142142
installFlagsToRemove: ""
143143
```
144144

145+
The --monitoring-dashboards --metrics-set=All flag adds the monitoring dashboard for all metrics.
145146
2. Wait a couple of minutes for the HyperShift Operator deployment in the hypershift namespace to be updated to include the following environment variable:
146147

147148
```yaml
@@ -152,7 +153,7 @@ data:
152153

153154
When monitoring dashboards are enabled, for each hosted cluster that the HyperShift Operator manages, the Operator creates a config map named cp-<hosted_cluster_namespace>-<hosted_cluster_name> in the openshift-config-managed namespace, where <hosted_cluster_namespace> is the namespace of the hosted cluster and <hosted_cluster_name> is the name of the hosted cluster. As a result, a new dashboard is added in the administrative console of the management cluster.
154155
3. To view the dashboard, log in to the management cluster's console and go to the dashboard for the hosted cluster by clicking Observe -> Dashboards.
155-
4. Optional: To disable a monitoring dashboards in a hosted cluster, remove the --monitoring-dashboards flag from the hypershift-operator-install-flags config map. When you delete a hosted cluster, its corresponding dashboard is also deleted.
156+
4. Optional: To disable monitoring dashboards in a hosted cluster, remove the --monitoring-dashboards --metrics-set=All flag from the hypershift-operator-install-flags config map. When you delete a hosted cluster, its corresponding dashboard is also deleted.
156157

157158
## Dashboard customization
158159

ocp-product-docs-plaintext/4.15/installing/installing_bare_metal_ipi/ipi-install-installation-workflow.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -88,10 +88,10 @@ $ sudo firewall-cmd --zone=public --add-service=http --permanent
8888
$ sudo firewall-cmd --reload
8989
```
9090

91-
9. Start and enable the libvirtd service:
91+
9. Start the modular libvirt daemon sockets:
9292

9393
```terminal
94-
$ sudo systemctl enable libvirtd --now
94+
$ for drv in qemu interface network nodedev nwfilter secret storage; do sudo systemctl start virt${drv}d{,-ro,-admin}.socket; done
9595
```
9696

9797
10. Create the default storage pool and start it:

ocp-product-docs-plaintext/4.15/observability/logging/logging_release_notes/logging-5-8-release-notes.txt

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,33 @@ Logging is provided as an installable component, with a distinct release cycle f
1212
The stable channel only provides updates to the most recent release of logging. To continue receiving updates for prior releases, you must change your subscription channel to stable-x.y, where x.y represents the major and minor version of logging you have installed. For example, stable-5.7.
1313
----
1414

15+
# Logging 5.8.20
16+
17+
This release includes RHBA-2025:7450 and RHSA-2025:7451.
18+
19+
## CVEs
20+
21+
* CVE-2019-12900
22+
* CVE-2020-11023
23+
* CVE-2024-2236
24+
* CVE-2024-2511
25+
* CVE-2024-3596
26+
* CVE-2024-4603
27+
* CVE-2024-4741
28+
* CVE-2024-5535
29+
* CVE-2024-8176
30+
* CVE-2024-12133
31+
* CVE-2024-12243
32+
* CVE-2024-12797
33+
* CVE-2024-42292
34+
* CVE-2024-42322
35+
* CVE-2024-44990
36+
* CVE-2024-45338
37+
* CVE-2024-46826
38+
* CVE-2025-0395
39+
* CVE-2025-21927
40+
* CVE-2025-27363
41+
1542
# Logging 5.8.19
1643

1744
This release includes RHBA-2025:3447 and RHSA-2025:3448.

ocp-product-docs-plaintext/4.15/observability/logging/logging_release_notes/logging-5-9-release-notes.txt

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,30 @@ Logging is provided as an installable component, with a distinct release cycle f
88
The stable channel only provides updates to the most recent release of logging. To continue receiving updates for prior releases, you must change your subscription channel to stable-x.y, where x.y represents the major and minor version of logging you have installed. For example, stable-5.7.
99
----
1010

11+
# Logging 5.9.14
12+
13+
This release includes RHSA-2025:7449.
14+
15+
## CVEs
16+
17+
* CVE-2019-12900
18+
* CVE-2020-11023
19+
* CVE-2024-2236
20+
* CVE-2024-2511
21+
* CVE-2024-3596
22+
* CVE-2024-4603
23+
* CVE-2024-4741
24+
* CVE-2024-5535
25+
* CVE-2024-12797
26+
* CVE-2024-45338
27+
* CVE-2025-0395
28+
29+
30+
[NOTE]
31+
----
32+
For detailed information on Red Hat security ratings, review Severity ratings.
33+
----
34+
1135
# Logging 5.9.13
1236

1337
This release includes RHSA-2025:3906.

ocp-product-docs-plaintext/4.15/observability/monitoring/configuring-core-platform-monitoring/configuring-alerts-and-notifications.txt

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -400,6 +400,8 @@ Routing tree:
400400
```
401401

402402

403+
* Send test alerts to Alertmanager in OpenShift 4 (Red Hat Customer Portal)
404+
403405
## Configuring alert routing with the Red Hat OpenShift Container Platform web console
404406

405407
You can configure alert routing through the Red Hat OpenShift Container Platform web console to ensure that you learn about important issues with your cluster.
@@ -442,6 +444,8 @@ Alternatively, you can go to the same page through the notification drawer. Sele
442444
2. Click Add label to add further routing labels.
443445
6. Click Create to create the receiver.
444446

447+
* Send test alerts to Alertmanager in OpenShift 4 (Red Hat Customer Portal)
448+
445449
## Configuring different alert receivers for default platform alerts and user-defined alerts
446450

447451
You can configure different alert receivers for default platform alerts and user-defined alerts to ensure the following results:

ocp-product-docs-plaintext/4.15/observability/monitoring/configuring-core-platform-monitoring/configuring-metrics.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,9 @@ data:
110110

111111
4. Save the file to apply the changes. The new configuration is applied automatically.
112112

113+
* writeRelabelConfigs
114+
* relabel_config (Prometheus documentation)
115+
113116
## Supported remote write authentication settings
114117

115118
You can use different methods to authenticate with a remote write endpoint. Currently supported authentication methods are AWS Signature Version 4, basic authentication, authorization, OAuth 2.0, and TLS client. The following table provides details about supported authentication methods for use with remote write.

ocp-product-docs-plaintext/4.15/observability/monitoring/configuring-user-workload-monitoring/configuring-alerts-and-notifications-uwm.txt

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -264,6 +264,8 @@ $ oc apply -f example-app-alert-routing.yaml
264264

265265
The configuration is automatically applied to the Alertmanager pods.
266266

267+
* Send test alerts to Alertmanager in OpenShift 4 (Red Hat Customer Portal)
268+
267269
## Configuring alert routing for user-defined projects with the Alertmanager secret
268270

269271
If you have enabled a separate instance of Alertmanager that is dedicated to user-defined alert routing, you can customize where and how the instance sends notifications by editing the alertmanager-user-workload secret in the openshift-user-workload-monitoring namespace.
@@ -311,6 +313,8 @@ $ oc -n openshift-user-workload-monitoring create secret generic alertmanager-us
311313
```
312314

313315

316+
* Send test alerts to Alertmanager in OpenShift 4 (Red Hat Customer Portal)
317+
314318
## Configuring different alert receivers for default platform alerts and user-defined alerts
315319

316320
You can configure different alert receivers for default platform alerts and user-defined alerts to ensure the following results:

ocp-product-docs-plaintext/4.15/observability/monitoring/configuring-user-workload-monitoring/configuring-metrics-uwm.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,9 @@ data:
110110

111111
4. Save the file to apply the changes. The new configuration is applied automatically.
112112

113+
* writeRelabelConfigs
114+
* relabel_config (Prometheus documentation)
115+
113116
## Supported remote write authentication settings
114117

115118
You can use different methods to authenticate with a remote write endpoint. Currently supported authentication methods are AWS Signature Version 4, basic authentication, authorization, OAuth 2.0, and TLS client. The following table provides details about supported authentication methods for use with remote write.

ocp-product-docs-plaintext/4.15/observability/monitoring/managing-alerts/managing-alerts-as-a-developer.txt

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -233,10 +233,10 @@ You can remove alerting rules for user-defined projects.
233233
* You are logged in as a cluster administrator or as a user that has the monitoring-rules-edit cluster role for the project where you want to create an alerting rule.
234234
* You have installed the OpenShift CLI (oc).
235235

236-
* To remove rule <foo> in <namespace>, run the following:
236+
* To remove rule <alerting_rule> in <namespace>, run the following:
237237

238238
```terminal
239-
$ oc -n <namespace> delete prometheusrule <foo>
239+
$ oc -n <namespace> delete prometheusrule <alerting_rule>
240240
```
241241

242242

ocp-product-docs-plaintext/4.15/observability/monitoring/managing-alerts/managing-alerts-as-an-administrator.txt

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ To obtain information about alerts:
3131
5. Click the name of an alert to view its Alert details page. The page includes a graph that illustrates alert time series data. It also provides the following information about the alert:
3232
* A description of the alert
3333
* Messages associated with the alert
34+
* A link to the runbook page on GitHub for the alert, if the page exists
3435
* Labels attached to the alert
3536
* A link to its governing alerting rule
3637
* Silences for the alert, if any exist
@@ -348,10 +349,10 @@ You can remove alerting rules for user-defined projects.
348349
* You are logged in as a cluster administrator or as a user that has the monitoring-rules-edit cluster role for the project where you want to create an alerting rule.
349350
* You have installed the OpenShift CLI (oc).
350351

351-
* To remove rule <foo> in <namespace>, run the following:
352+
* To remove rule <alerting_rule> in <namespace>, run the following:
352353

353354
```terminal
354-
$ oc -n <namespace> delete prometheusrule <foo>
355+
$ oc -n <namespace> delete prometheusrule <alerting_rule>
355356
```
356357

357358

0 commit comments

Comments
 (0)