Skip to content

Commit 99441c4

Browse files
authored
Merge pull request #69187 from shreyasiddhartha/logging-5.8.1-rn
2 parents 88795f1 + cced842 commit 99441c4

File tree

2 files changed

+128
-0
lines changed

2 files changed

+128
-0
lines changed

logging/logging_release_notes/logging-5-8-release-notes.adoc

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,4 +10,6 @@ include::snippets/logging-compatibility-snip.adoc[]
1010

1111
include::snippets/logging-stable-updates-snip.adoc[]
1212

13+
include::modules/logging-release-notes-5-8-1.adoc[leveloffset=+1]
14+
1315
include::modules/logging-release-notes-5-8-0.adoc[leveloffset=+1]
Lines changed: 126 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,126 @@
1+
//module included in logging-5-8-release-notes.adoc
2+
:content-type: REFERENCE
3+
[id="logging-release-notes-5-8-1_{context}"]
4+
= Logging 5.8.1
5+
This release includes link:https://access.redhat.com/errata/RHBA-2023:7720[OpenShift Logging Bug Fix Release 5.8.1] and link:https://access.redhat.com/errata/RHBA-2023:7717[OpenShift Logging Bug Fix Release 5.8.1 Kibana].
6+
7+
[id="logging-release-notes-5-8-1-enhancements"]
8+
== Enhancements
9+
10+
[id="logging-release-notes-5-8-1-log-collection"]
11+
=== Log Collection
12+
13+
* With this update, while configuring Vector as a collector, you can add logic to the {clo} to use a token specified in the secret in place of the token associated with the service account. (link:https://issues.redhat.com/browse/LOG-4780[LOG-4780])
14+
15+
* With this update, the *BoltDB Shipper* Loki dashboards are now renamed to *Index* dashboards. (link:https://issues.redhat.com/browse/LOG-4828[LOG-4828])
16+
17+
[id="logging-release-notes-5-8-1-bug-fixes"]
18+
== Bug fixes
19+
20+
* Before this update, the `ClusterLogForwarder` created empty indices after enabling the parsing of JSON logs, even when the rollover conditions were not met. With this update, the `ClusterLogForwarder` skips the rollover when the `write-index` is empty. (link:https://issues.redhat.com/browse/LOG-4452[LOG-4452])
21+
22+
* Before this update, the Vector set the `default` log level incorrectly. With this update, the correct log level is set by improving the enhancement of regular expression, or `regexp`, for log level detection. (link:https://issues.redhat.com/browse/LOG-4480[LOG-4480])
23+
24+
* Before this update, during the process of creating index patterns, the default alias was missing from the initial index in each log output. As a result, Kibana users were unable to create index patterns by using {es-op}. This update adds the missing aliases to {es-op}, resolving the issue. Kibana users can now create index patterns that include the `{app,infra,audit}-000001` indexes. (link:https://issues.redhat.com/browse/LOG-4683[LOG-4683])
25+
26+
* Before this update, Fluentd collector pods were in a `CrashLoopBackOff` state due to binding of the Prometheus server on IPv6 clusters. With this update, the collectors work properly on IPv6 clusters. (link:https://issues.redhat.com/browse/LOG-4706[LOG-4706])
27+
28+
* Before this update, the {clo} would undergo numerous reconciliations whenever there was a change in the `ClusterLogForwarder`. With this update, the {clo} disregards the status changes in the collector daemonsets that triggered the reconciliations. (link:https://issues.redhat.com/browse/LOG-4741[LOG-4741])
29+
30+
* Before this update, the Vector log collector pods were stuck in the `CrashLoopBackOff` state on {ibm-power-title} machines. With this update, the Vector log collector pods start successfully on {ibm-power-title} architecture machines. (link:https://issues.redhat.com/browse/LOG-4768[LOG-4768])
31+
32+
* Before this update, forwarding with a legacy forwarder to an internal LokiStack would produce SSL certificate errors using Fluentd collector pods. With this update, the log collector service account is used by default for authentication, using the associated token and `ca.crt`. (link:https://issues.redhat.com/browse/LOG-4791[LOG-4791])
33+
34+
* Before this update, forwarding with a legacy forwarder to an internal LokiStack would produce SSL certificate errors using Vector collector pods. With this update, the log collector service account is used by default for authentication and also using the associated token and `ca.crt`. (link:https://issues.redhat.com/browse/LOG-4852[LOG-4852])
35+
36+
* Before this fix, IPv6 addresses would not be parsed correctly after evaluating a host or multiple hosts for placeholders. With this update, IPv6 addresses are correctly parsed. (link:https://issues.redhat.com/browse/LOG-4811[LOG-4811])
37+
38+
* Before this update, it was necessary to create a `ClusterRoleBinding` to collect audit permissions for HTTP receiver inputs. With this update, it is not necessary to create the `ClusterRoleBinding` because the endpoint already depends upon the cluster certificate authority. (link:https://issues.redhat.com/browse/LOG-4815[LOG-4815])
39+
40+
* Before this update, the {loki-op} did not mount a custom CA bundle to the ruler pods. As a result, during the process to evaluate alerting or recording rules, object storage access failed. With this update, the {loki-op} mounts the custom CA bundle to all ruler pods. The ruler pods can download logs from object storage to evaluate alerting or recording rules. (link:https://issues.redhat.com/browse/LOG-4836[LOG-4836])
41+
42+
* Before this update, while removing the `inputs.receiver` section in the `ClusterLogForwarder`, the HTTP input services and its associated secrets were not deleted. With this update, the HTTP input resources are deleted when not needed. (link:https://issues.redhat.com/browse/LOG-4612[LOG-4612])
43+
44+
* Before this update, the `ClusterLogForwarder` indicated validation errors in the status, but the outputs and the pipeline status did not accurately reflect the specific issues. With this update, the pipeline status displays the validation failure reasons correctly in case of misconfigured outputs, inputs, or filters. (link:https://issues.redhat.com/browse/LOG-4821[LOG-4821])
45+
46+
* Before this update, changing a `LogQL` query that used controls such as time range or severity changed the label matcher operator defining it like a regular expression. With this update, regular expression operators remain unchanged when updating the query. (link:https://issues.redhat.com/browse/LOG-4841[LOG-4841])
47+
48+
[id="logging-release-notes-5-8-1-CVEs"]
49+
== CVEs
50+
51+
* link:https://access.redhat.com/security/cve/CVE-2007-4559[CVE-2007-4559]
52+
* link:https://access.redhat.com/security/cve/CVE-2021-3468[CVE-2021-3468]
53+
* link:https://access.redhat.com/security/cve/CVE-2021-3502[CVE-2021-3502]
54+
* link:https://access.redhat.com/security/cve/CVE-2021-3826[CVE-2021-3826]
55+
* link:https://access.redhat.com/security/cve/CVE-2021-43618[CVE-2021-43618]
56+
* link:https://access.redhat.com/security/cve/CVE-2022-3523[CVE-2022-3523]
57+
* link:https://access.redhat.com/security/cve/CVE-2022-3565[CVE-2022-3565]
58+
* link:https://access.redhat.com/security/cve/CVE-2022-3594[CVE-2022-3594]
59+
* link:https://access.redhat.com/security/cve/CVE-2022-4285[CVE-2022-4285]
60+
* link:https://access.redhat.com/security/cve/CVE-2022-38457[CVE-2022-38457]
61+
* link:https://access.redhat.com/security/cve/CVE-2022-40133[CVE-2022-40133]
62+
* link:https://access.redhat.com/security/cve/CVE-2022-40982[CVE-2022-40982]
63+
* link:https://access.redhat.com/security/cve/CVE-2022-41862[CVE-2022-41862]
64+
* link:https://access.redhat.com/security/cve/CVE-2022-42895[CVE-2022-42895]
65+
* link:https://access.redhat.com/security/cve/CVE-2023-0597[CVE-2023-0597]
66+
* link:https://access.redhat.com/security/cve/CVE-2023-1073[CVE-2023-1073]
67+
* link:https://access.redhat.com/security/cve/CVE-2023-1074[CVE-2023-1074]
68+
* link:https://access.redhat.com/security/cve/CVE-2023-1075[CVE-2023-1075]
69+
* link:https://access.redhat.com/security/cve/CVE-2023-1076[CVE-2023-1076]
70+
* link:https://access.redhat.com/security/cve/CVE-2023-1079[CVE-2023-1079]
71+
* link:https://access.redhat.com/security/cve/CVE-2023-1206[CVE-2023-1206]
72+
* link:https://access.redhat.com/security/cve/CVE-2023-1249[CVE-2023-1249]
73+
* link:https://access.redhat.com/security/cve/CVE-2023-1252[CVE-2023-1252]
74+
* link:https://access.redhat.com/security/cve/CVE-2023-1652[CVE-2023-1652]
75+
* link:https://access.redhat.com/security/cve/CVE-2023-1855[CVE-2023-1855]
76+
* link:https://access.redhat.com/security/cve/CVE-2023-1981[CVE-2023-1981]
77+
* link:https://access.redhat.com/security/cve/CVE-2023-1989[CVE-2023-1989]
78+
* link:https://access.redhat.com/security/cve/CVE-2023-2731[CVE-2023-2731]
79+
* link:https://access.redhat.com/security/cve/CVE-2023-3138[CVE-2023-3138]
80+
* link:https://access.redhat.com/security/cve/CVE-2023-3141[CVE-2023-3141]
81+
* link:https://access.redhat.com/security/cve/CVE-2023-3161[CVE-2023-3161]
82+
* link:https://access.redhat.com/security/cve/CVE-2023-3212[CVE-2023-3212]
83+
* link:https://access.redhat.com/security/cve/CVE-2023-3268[CVE-2023-3268]
84+
* link:https://access.redhat.com/security/cve/CVE-2023-3316[CVE-2023-3316]
85+
* link:https://access.redhat.com/security/cve/CVE-2023-3358[CVE-2023-3358]
86+
* link:https://access.redhat.com/security/cve/CVE-2023-3576[CVE-2023-3576]
87+
* link:https://access.redhat.com/security/cve/CVE-2023-3609[CVE-2023-3609]
88+
* link:https://access.redhat.com/security/cve/CVE-2023-3772[CVE-2023-3772]
89+
* link:https://access.redhat.com/security/cve/CVE-2023-3773[CVE-2023-3773]
90+
* link:https://access.redhat.com/security/cve/CVE-2023-4016[CVE-2023-4016]
91+
* link:https://access.redhat.com/security/cve/CVE-2023-4128[CVE-2023-4128]
92+
* link:https://access.redhat.com/security/cve/CVE-2023-4155[CVE-2023-4155]
93+
* link:https://access.redhat.com/security/cve/CVE-2023-4194[CVE-2023-4194]
94+
* link:https://access.redhat.com/security/cve/CVE-2023-4206[CVE-2023-4206]
95+
* link:https://access.redhat.com/security/cve/CVE-2023-4207[CVE-2023-4207]
96+
* link:https://access.redhat.com/security/cve/CVE-2023-4208[CVE-2023-4208]
97+
* link:https://access.redhat.com/security/cve/CVE-2023-4273[CVE-2023-4273]
98+
* link:https://access.redhat.com/security/cve/CVE-2023-4641[CVE-2023-4641]
99+
* link:https://access.redhat.com/security/cve/CVE-2023-22745[CVE-2023-22745]
100+
* link:https://access.redhat.com/security/cve/CVE-2023-26545[CVE-2023-26545]
101+
* link:https://access.redhat.com/security/cve/CVE-2023-26965[CVE-2023-26965]
102+
* link:https://access.redhat.com/security/cve/CVE-2023-26966[CVE-2023-26966]
103+
* link:https://access.redhat.com/security/cve/CVE-2023-27522[CVE-2023-27522]
104+
* link:https://access.redhat.com/security/cve/CVE-2023-29491[CVE-2023-29491]
105+
* link:https://access.redhat.com/security/cve/CVE-2023-29499[CVE-2023-29499]
106+
* link:https://access.redhat.com/security/cve/CVE-2023-30456[CVE-2023-30456]
107+
* link:https://access.redhat.com/security/cve/CVE-2023-31486[CVE-2023-31486]
108+
* link:https://access.redhat.com/security/cve/CVE-2023-32324[CVE-2023-32324]
109+
* link:https://access.redhat.com/security/cve/CVE-2023-32573[CVE-2023-32573]
110+
* link:https://access.redhat.com/security/cve/CVE-2023-32611[CVE-2023-32611]
111+
* link:https://access.redhat.com/security/cve/CVE-2023-32665[CVE-2023-32665]
112+
* link:https://access.redhat.com/security/cve/CVE-2023-33203[CVE-2023-33203]
113+
* link:https://access.redhat.com/security/cve/CVE-2023-33285[CVE-2023-33285]
114+
* link:https://access.redhat.com/security/cve/CVE-2023-33951[CVE-2023-33951]
115+
* link:https://access.redhat.com/security/cve/CVE-2023-33952[CVE-2023-33952]
116+
* link:https://access.redhat.com/security/cve/CVE-2023-34241[CVE-2023-34241]
117+
* link:https://access.redhat.com/security/cve/CVE-2023-34410[CVE-2023-34410]
118+
* link:https://access.redhat.com/security/cve/CVE-2023-35825[CVE-2023-35825]
119+
* link:https://access.redhat.com/security/cve/CVE-2023-36054[CVE-2023-36054]
120+
* link:https://access.redhat.com/security/cve/CVE-2023-37369[CVE-2023-37369]
121+
* link:https://access.redhat.com/security/cve/CVE-2023-38197[CVE-2023-38197]
122+
* link:https://access.redhat.com/security/cve/CVE-2023-38545[CVE-2023-38545]
123+
* link:https://access.redhat.com/security/cve/CVE-2023-38546[CVE-2023-38546]
124+
* link:https://access.redhat.com/security/cve/CVE-2023-39191[CVE-2023-39191]
125+
* link:https://access.redhat.com/security/cve/CVE-2023-39975[CVE-2023-39975]
126+
* link:https://access.redhat.com/security/cve/CVE-2023-44487[CVE-2023-44487]

0 commit comments

Comments
 (0)