Skip to content

Commit 43819e7

Browse files
committed
RHDEVDOCS-4871 - Logging 5.5.6 Release Notes.
1 parent 19d99d1 commit 43819e7

File tree

2 files changed

+55
-0
lines changed

2 files changed

+55
-0
lines changed

logging/cluster-logging-release-notes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -13,6 +13,8 @@ include::snippets/logging-stable-updates-snip.adoc[]
1313

1414
include::modules/cluster-logging-rn-5.6.adoc[leveloffset=+1]
1515

16+
include::modules/cluster-logging-rn-5.5.6.adoc[leveloffset=+1]
17+
1618
include::modules/cluster-logging-rn-5.5.5.adoc[leveloffset=+1]
1719

1820
include::modules/cluster-logging-rn-5.5.4.adoc[leveloffset=+1]

modules/cluster-logging-rn-5.5.6.adoc

Lines changed: 53 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,53 @@
1+
//module included in cluster-logging-release-notes.adoc
2+
:_content-type: REFERENCE
3+
[id="cluster-logging-release-notes-5-5-6_{context}"]
4+
= Logging 5.5.6
5+
This release includes link:https://access.redhat.com/errata/RHBA-2023:0386[OpenShift Logging Bug Fix Release 5.5.6].
6+
7+
== Known issues
8+
[id="openshift-logging-5-5-6-known-issues"]
9+
10+
11+
[id="openshift-logging-5-5-6-bug-fixes"]
12+
== Bug fixes
13+
* Before this update, the Pod Security admission controller added the label `podSecurityLabelSync = true` to the `openshift-logging` namespace. This resulted in our specified security labels being overwritten, and as a result Collector pods would not start. With this update, the label `podSecurityLabelSync = false` preserves security labels. Collector pods deploy as expected. (link:https://issues.redhat.com/browse/LOG-3340[LOG-3340])
14+
15+
* Before this update, the Operator installed the console view plugin, even when it was not enabled on the cluster. This caused the Operator to crash. With this update, if an account for a cluster does not have the console view enabled, the Operator functions normally and does not install the console view. (link:https://issues.redhat.com/browse/LOG-3407[LOG-3407])
16+
17+
* Before this update, a prior fix to support a regression where the status of the Elasticsearch deployment was not being updated caused the Operator to crash unless the `Red Hat Elasticsearch Operator` was deployed. With this update, that fix has been reverted so the Operator is now stable but re-introduces the previous issue related to the reported status. (link:https://issues.redhat.com/browse/LOG-3428[LOG-3428])
18+
19+
* Before this update, the Loki Operator only deployed one replica of the LokiStack gateway regardless of the chosen stack size. With this update, the number of replicas is correctly configured according to the selected size. (link:https://issues.redhat.com/browse/LOG-3478[LOG-3478])
20+
21+
* Before this update, records written to Elasticsearch would fail if multiple label keys had the same prefix and some keys included dots. With this update, underscores replace dots in label keys, resolving the issue. (link:https://issues.redhat.com/browse/LOG-3341[LOG-3341])
22+
23+
* Before this update, the logging view plugin contained an incompatible feature for certain versions of {product-title}. With this update, the correct release stream of the plugin resolves the issue. (link:https://issues.redhat.com/browse/LOG-3467[LOG-3467])
24+
25+
* Before this update, the reconciliation of the `ClusterLogForwarder` custom resource would incorrectly report a degraded status of one or more pipelines causing the collector pods to restart every 8-10 seconds. With this update, reconciliation of the `ClusterLogForwarder` custom resource processes correctly, resolving the issue. (link:https://issues.redhat.com/browse/LOG-3469[LOG-3469])
26+
27+
* Before this change the spec for the `outputDefaults` field of the ClusterLogForwarder custom resource would apply the settings to every declared Elasticsearch output type. This change corrects the behavior to match the enhancement specification where the setting specifically applies to the default managed Elasticsearch store. (link:https://issues.redhat.com/browse/LOG-3342[LOG-3342])
28+
29+
* Before this update, the the OpenShift CLI (oc) `must-gather` script did not complete because the OpenShift CLI (oc) needs a folder with write permission to build its cache. With this update, the OpenShift CLI (oc) has write permissions to a folder, and the `must-gather` script completes successfully. (link:https://issues.redhat.com/browse/LOG-3472[LOG-3472])
30+
31+
* Before this update, the Loki Operator webhook server caused TLS errors. With this update, the Loki Operator webhook PKI is managed by the Operator Lifecycle Manager's dynamic webhook management resolving the issue. (link:https://issues.redhat.com/browse/LOG-3511[LOG-3511])
32+
33+
[id="openshift-logging-5-5-6-CVEs"]
34+
== CVEs
35+
* link:https://access.redhat.com/security/cve/CVE-2021-46848[CVE-2021-46848]
36+
* link:https://access.redhat.com/security/cve/CVE-2022-2056[CVE-2022-2056]
37+
* link:https://access.redhat.com/security/cve/CVE-2022-2057[CVE-2022-2057]
38+
* link:https://access.redhat.com/security/cve/CVE-2022-2058[CVE-2022-2058]
39+
* link:https://access.redhat.com/security/cve/CVE-2022-2519[CVE-2022-2519]
40+
* link:https://access.redhat.com/security/cve/CVE-2022-2520[CVE-2022-2520]
41+
* link:https://access.redhat.com/security/cve/CVE-2022-2521[CVE-2022-2521]
42+
* link:https://access.redhat.com/security/cve/CVE-2022-2867[CVE-2022-2867]
43+
* link:https://access.redhat.com/security/cve/CVE-2022-2868[CVE-2022-2868]
44+
* link:https://access.redhat.com/security/cve/CVE-2022-2869[CVE-2022-2869]
45+
* link:https://access.redhat.com/security/cve/CVE-2022-2953[CVE-2022-2953]
46+
* link:https://access.redhat.com/security/cve/CVE-2022-2964[CVE-2022-2964]
47+
* link:https://access.redhat.com/security/cve/CVE-2022-4139[CVE-2022-4139]
48+
* link:https://access.redhat.com/security/cve/CVE-2022-35737[CVE-2022-35737]
49+
* link:https://access.redhat.com/security/cve/CVE-2022-42010[CVE-2022-42010]
50+
* link:https://access.redhat.com/security/cve/CVE-2022-42011[CVE-2022-42011]
51+
* link:https://access.redhat.com/security/cve/CVE-2022-42012[CVE-2022-42012]
52+
* link:https://access.redhat.com/security/cve/CVE-2022-42898[CVE-2022-42898]
53+
* link:https://access.redhat.com/security/cve/CVE-2022-43680[CVE-2022-43680]

0 commit comments

Comments
 (0)