Skip to content

Commit 37046d8

Browse files
committed
RHDEVDOCS-4079 - Z Stream release notes: 5.2.12, 5.3.9, 5.4.3 w/ peer review feedback v5
1 parent 329b5ad commit 37046d8

File tree

4 files changed

+112
-0
lines changed

4 files changed

+112
-0
lines changed

logging/cluster-logging-release-notes.adoc

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,8 @@ toc::[]
1111
.Logging Compatibility
1212
The {logging-title} is provided as an installable component, with a distinct release cycle from the core {product-title}. The link:https://access.redhat.com/support/policy/updates/openshift#logging[Red Hat OpenShift Container Platform Life Cycle Policy] outlines release compatibility.
1313

14+
include::modules/cluster-logging-rn-5.4.3.adoc[leveloffset=+1]
15+
1416
include::modules/cluster-logging-rn-5.4.2.adoc[leveloffset=+1]
1517

1618
[id="cluster-logging-release-notes-5-4-1"]
@@ -110,6 +112,8 @@ include::modules/cluster-logging-loki-tech-preview.adoc[leveloffset=+2]
110112
* link:https://access.redhat.com/security/cve/CVE-2022-21698[CVE-2022-21698]
111113
** link:https://bugzilla.redhat.com/show_bug.cgi?id=2045880[BZ-2045880]
112114

115+
include::modules/cluster-logging-rn-5.3.9.adoc[leveloffset=+1]
116+
113117
include::modules/cluster-logging-rn-5.3.8.adoc[leveloffset=+1]
114118

115119
[id="cluster-logging-release-notes-5-3-7"]
@@ -528,6 +532,8 @@ In OpenShift Logging 5.3, the legacy configuration mechanism for log forwarding
528532
* link:https://www.redhat.com/security/data/cve/CVE-2021-42574.html[CVE-2021-42574]
529533
====
530534

535+
include::modules/cluster-logging-rn-5.2.12.adoc[leveloffset=+1]
536+
531537
include::modules/cluster-logging-rn-5.2.11.adoc[leveloffset=+1]
532538

533539
[id="cluster-logging-release-notes-5-2-10"]
Lines changed: 30 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,30 @@
1+
//module included in cluster-logging-release-notes.adoc
2+
:_content-type: REFERENCE
3+
[id="cluster-logging-release-notes-5-2-12"]
4+
= Logging 5.2.12
5+
This release includes link:https://access.redhat.com/errata/RHBA-2022:5558[RHBA-2022:5558-OpenShift Logging Bug Fix Release 5.2.12].
6+
7+
[id="openshift-logging-5-2-12-bug-fixes"]
8+
== Bug fixes
9+
None.
10+
11+
[id="openshift-logging-5-2-12-CVEs"]
12+
== CVEs
13+
.Click to expand CVEs
14+
[%collapsible]
15+
====
16+
* link:https://access.redhat.com/security/cve/CVE-2020-28915[CVE-2020-28915]
17+
* link:https://access.redhat.com/security/cve/CVE-2021-40528[CVE-2021-40528]
18+
* link:https://access.redhat.com/security/cve/CVE-2022-1271[CVE-2022-1271]
19+
* link:https://access.redhat.com/security/cve/CVE-2022-1621[CVE-2022-1621]
20+
* link:https://access.redhat.com/security/cve/CVE-2022-1629[CVE-2022-1629]
21+
* link:https://access.redhat.com/security/cve/CVE-2022-22576[CVE-2022-22576]
22+
* link:https://access.redhat.com/security/cve/CVE-2022-25313[CVE-2022-25313]
23+
* link:https://access.redhat.com/security/cve/CVE-2022-25314[CVE-2022-25314]
24+
* link:https://access.redhat.com/security/cve/CVE-2022-26691[CVE-2022-26691]
25+
* link:https://access.redhat.com/security/cve/CVE-2022-27666[CVE-2022-27666]
26+
* link:https://access.redhat.com/security/cve/CVE-2022-27774[CVE-2022-27774]
27+
* link:https://access.redhat.com/security/cve/CVE-2022-27776[CVE-2022-27776]
28+
* link:https://access.redhat.com/security/cve/CVE-2022-27782[CVE-2022-27782]
29+
* link:https://access.redhat.com/security/cve/CVE-2022-29824[CVE-2022-29824]
30+
====

modules/cluster-logging-rn-5.3.9.adoc

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,32 @@
1+
//module included in cluster-logging-release-notes.adoc
2+
:_content-type: REFERENCE
3+
[id="cluster-logging-release-notes-5-3-9"]
4+
= Logging 5.3.9
5+
This release includes link:https://access.redhat.com/errata/RHBA-2022:5557[RHBA-2022:5557-OpenShift Logging Bug Fix Release 5.3.9].
6+
7+
[id="openshift-logging-5-3-9-bug-fixes"]
8+
== Bug fixes
9+
10+
* Before this update, the logging collector included a path as a label for the metrics it produced. This path changed frequently and contributed to significant storage changes for the Prometheus server. With this update, the label has been dropped to resolve the issue and reduce storage consumption. (link:https://issues.redhat.com/browse/LOG-2682[LOG-2682])
11+
12+
13+
[id="openshift-logging-5-3-9-CVEs"]
14+
== CVEs
15+
.Click to expand CVEs
16+
[%collapsible]
17+
====
18+
* link:https://access.redhat.com/security/cve/CVE-2020-28915[CVE-2020-28915]
19+
* link:https://access.redhat.com/security/cve/CVE-2021-40528[CVE-2021-40528]
20+
* link:https://access.redhat.com/security/cve/CVE-2022-1271[CVE-2022-1271]
21+
* link:https://access.redhat.com/security/cve/CVE-2022-1621[CVE-2022-1621]
22+
* link:https://access.redhat.com/security/cve/CVE-2022-1629[CVE-2022-1629]
23+
* link:https://access.redhat.com/security/cve/CVE-2022-22576[CVE-2022-22576]
24+
* link:https://access.redhat.com/security/cve/CVE-2022-25313[CVE-2022-25313]
25+
* link:https://access.redhat.com/security/cve/CVE-2022-25314[CVE-2022-25314]
26+
* link:https://access.redhat.com/security/cve/CVE-2022-26691[CVE-2022-26691]
27+
* link:https://access.redhat.com/security/cve/CVE-2022-27666[CVE-2022-27666]
28+
* link:https://access.redhat.com/security/cve/CVE-2022-27774[CVE-2022-27774]
29+
* link:https://access.redhat.com/security/cve/CVE-2022-27776[CVE-2022-27776]
30+
* link:https://access.redhat.com/security/cve/CVE-2022-27782[CVE-2022-27782]
31+
* link:https://access.redhat.com/security/cve/CVE-2022-29824[CVE-2022-29824]
32+
====

modules/cluster-logging-rn-5.4.3.adoc

Lines changed: 44 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,44 @@
1+
//module included in cluster-logging-release-notes.adoc
2+
:_content-type: REFERENCE
3+
[id="cluster-logging-release-notes-5-4-3"]
4+
= Logging 5.4.3
5+
This release includes link:https://access.redhat.com/errata/RHBA-2022:5556[RHBA-2022:5556-OpenShift Logging Bug Fix Release 5.4.3].
6+
7+
[id="openshift-logging-elasticsearch-dep"]
8+
== Elasticsearch Operator deprecation notice
9+
In {logging} 5.4.3 the Elasticsearch Operator is deprecated and is planned to be removed in a future release. Red Hat will provide bug fixes and support for this feature during the current release lifecycle, but this feature will no longer receive enhancements and will be removed. As an alternative to using the Elasticsearch Operator to manage the default log storage, you can use the Loki Operator.
10+
11+
[id="openshift-logging-5-4-3-bug-fixes"]
12+
== Bug fixes
13+
* Before this update, the OpenShift Logging Dashboard showed the number of active primary shards instead of all active shards. With this update, the dashboard displays all active shards. (link:https://issues.redhat.com//browse/LOG-2781[LOG-2781])
14+
15+
* Before this update, a bug in a library used by `elasticsearch-operator` contained a denial of service attack vulnerability. With this update, the library has been updated to a version that does not contain this vulnerability. (link:https://issues.redhat.com//browse/LOG-2816[LOG-2816])
16+
17+
* Before this update, when configuring Vector to forward logs to Loki, it was not possible to set a custom bearer token or use the default token if Loki had TLS enabled. With this update, Vector can forward logs to Loki using tokens with TLS enabled. (link:https://issues.redhat.com//browse/https://issues.redhat.com//browse/LOG-2786[LOG-2786]
18+
19+
* Before this update, the ElasticSearch Operator omitted the `referencePolicy` property of the `ImageStream` custom resource when selecting an `oauth-proxy` image. This omission caused the Kibana deployment to fail in specific environments. With this update, using `referencePolicy` resolves the issue, and the Operator can deploy Kibana successfully. (link:https://issues.redhat.com/browse/LOG-2791[LOG-2791])
20+
21+
* Before this update, alerting rules for the `ClusterLogForwarder` custom resource did not take multiple forward outputs into account. This update resolves the issue. (link:https://issues.redhat.com/browse/LOG-2640[LOG-2640])
22+
23+
* Before this update, clusters configured to forward logs to Amazon CloudWatch wrote rejected log files to temporary storage, causing cluster instability over time. With this update, chunk backup for CloudWatch has been disabled, resolving the issue. (link:https://issues.redhat.com/browse/LOG-2768[LOG-2768])
24+
25+
[id="openshift-logging-5-4-3-CVEs"]
26+
== CVEs
27+
.Click to expand CVEs
28+
[%collapsible]
29+
====
30+
* link:https://access.redhat.com/security/cve/CVE-2020-28915[CVE-2020-28915]
31+
* link:https://access.redhat.com/security/cve/CVE-2021-40528[CVE-2021-40528]
32+
* link:https://access.redhat.com/security/cve/CVE-2022-1271[CVE-2022-1271]
33+
* link:https://access.redhat.com/security/cve/CVE-2022-1621[CVE-2022-1621]
34+
* link:https://access.redhat.com/security/cve/CVE-2022-1629[CVE-2022-1629]
35+
* link:https://access.redhat.com/security/cve/CVE-2022-22576[CVE-2022-22576]
36+
* link:https://access.redhat.com/security/cve/CVE-2022-25313[CVE-2022-25313]
37+
* link:https://access.redhat.com/security/cve/CVE-2022-25314[CVE-2022-25314]
38+
* link:https://access.redhat.com/security/cve/CVE-2022-26691[CVE-2022-26691]
39+
* link:https://access.redhat.com/security/cve/CVE-2022-27666[CVE-2022-27666]
40+
* link:https://access.redhat.com/security/cve/CVE-2022-27774[CVE-2022-27774]
41+
* link:https://access.redhat.com/security/cve/CVE-2022-27776[CVE-2022-27776]
42+
* link:https://access.redhat.com/security/cve/CVE-2022-27782[CVE-2022-27782]
43+
* link:https://access.redhat.com/security/cve/CVE-2022-29824[CVE-2022-29824]
44+
====

0 commit comments

Comments
 (0)