Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions logging/logging_release_notes/logging-5-7-release-notes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,8 @@ include::snippets/logging-compatibility-snip.adoc[]

include::snippets/logging-stable-updates-snip.adoc[]

include::modules/logging-rn-5.7.7.adoc[leveloffset=+1]

include::modules/logging-rn-5.7.6.adoc[leveloffset=+1]

// No release notes for 5.7.5 since this was a CVE only releases. In the future, add a link to the CVE.
Expand Down
43 changes: 43 additions & 0 deletions modules/logging-rn-5.7.7.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
// Module included in the following assemblies:
// cluster-logging-release-notes.adoc
// logging-5-7-release-notes.adoc
:_content-type: REFERENCE
[id="cluster-logging-release-notes-5-7-7_{context}"]
= Logging 5.7.7
This release includes link:https://access.redhat.com/errata/RHSA-2023:5530[OpenShift Logging Bug Fix Release 5.7.7].

[id="openshift-logging-5-7-7-bug-fixes_{context}"]
== Bug fixes
* Before this update, FluentD normalized the logs emitted by the EventRouter differently from Vector. With this update, the Vector produces log records in a consistent format. (link:https://issues.redhat.com/browse/LOG-4178[LOG-4178])

* Before this update, there was an error in the query used for the *FluentD Buffer Availability* graph in the metrics dashboard created by the Cluster Logging Operator as it showed the minimum buffer usage. With this update, the graph shows the maximum buffer usage and is now renamed to *FluentD Buffer Usage*. (link:https://issues.redhat.com/browse/LOG-4555[LOG-4555])

* Before this update, deploying a LokiStack on IPv6-only or dual-stack {product-title} clusters caused the LokiStack memberlist registration to fail. As a result, the distributor pods went into a crash loop. With this update, an administrator can enable IPv6 by setting the `lokistack.spec.hashRing.memberlist.enableIPv6:` value to `true`, which resolves the issue. (link:https://issues.redhat.com/browse/LOG-4569[LOG-4569])

* Before this update, the log collector relied on the default configuration settings for reading the container log lines. As a result, the log collector did not read the rotated files efficiently. With this update, there is an increase in the number of bytes read, which allows the log collector to efficiently process rotated files. (link:https://issues.redhat.com/browse/LOG-4575[LOG-4575])

* Before this update, the unused metrics in the Event Router caused the container to fail due to excessive memory usage. With this update, there is reduction in the memory usage of the Event Router by removing the unused metrics. (link:https://issues.redhat.com/browse/LOG-4686[LOG-4686])

[id="openshift-logging-5-7-7-CVEs_{context}"]
== CVEs
* link:https://access.redhat.com/security/cve/CVE-2023-0800[CVE-2023-0800]
* link:https://access.redhat.com/security/cve/CVE-2023-0801[CVE-2023-0801]
* link:https://access.redhat.com/security/cve/CVE-2023-0802[CVE-2023-0802]
* link:https://access.redhat.com/security/cve/CVE-2023-0803[CVE-2023-0803]
* link:https://access.redhat.com/security/cve/CVE-2023-0804[CVE-2023-0804]
* link:https://access.redhat.com/security/cve/CVE-2023-2002[CVE-2023-2002]
* link:https://access.redhat.com/security/cve/CVE-2023-3090[CVE-2023-3090]
* link:https://access.redhat.com/security/cve/CVE-2023-3390[CVE-2023-3390]
* link:https://access.redhat.com/security/cve/CVE-2023-3776[CVE-2023-3776]
* link:https://access.redhat.com/security/cve/CVE-2023-4004[CVE-2023-4004]
* link:https://access.redhat.com/security/cve/CVE-2023-4527[CVE-2023-4527]
* link:https://access.redhat.com/security/cve/CVE-2023-4806[CVE-2023-4806]
* link:https://access.redhat.com/security/cve/CVE-2023-4813[CVE-2023-4813]
* link:https://access.redhat.com/security/cve/CVE-2023-4863[CVE-2023-4863]
* link:https://access.redhat.com/security/cve/CVE-2023-4911[CVE-2023-4911]
* link:https://access.redhat.com/security/cve/CVE-2023-5129[CVE-2023-5129]
* link:https://access.redhat.com/security/cve/CVE-2023-20593[CVE-2023-20593]
* link:https://access.redhat.com/security/cve/CVE-2023-29491[CVE-2023-29491]
* link:https://access.redhat.com/security/cve/CVE-2023-30630[CVE-2023-30630]
* link:https://access.redhat.com/security/cve/CVE-2023-35001[CVE-2023-35001]
* link:https://access.redhat.com/security/cve/CVE-2023-35788[CVE-2023-35788]