- Issued:
- 2025-01-15
- Updated:
- 2025-01-15
RHBA-2024:10991 - Bug Fix Advisory
Synopsis
Logging for Red Hat OpenShift - 6.0.3
Type/Severity
Bug Fix Advisory
Topic
Logging for Red Hat OpenShift - 6.0.3
Description
Logging for Red Hat OpenShift - 6.0.3
Solution
For OpenShift Container Platform 4.16 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
https://docs.openshift.com/container-platform/4.16/release_notes/ocp-4-16-release-notes.html
For Red Hat OpenShift Logging 6.0, see the following instructions to apply this update:
Affected Products
- Logging Subsystem for Red Hat OpenShift for ARM 64 6 aarch64
- Logging Subsystem for Red Hat OpenShift 6 x86_64
- Logging Subsystem for Red Hat OpenShift for IBM Power, little endian 6 ppc64le
- Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE 6 s390x
Fixes
- LOG-6034 - [release-6.0] Vector not releasing deleted file handles
- LOG-6204 - [release-6.0]Multi CLF validation failure when adding a namespace which contains "kube" or "openshift"
- LOG-6343 - [release-6.0] When enabling inputs receivers in CLF, the tls secrets can't be created making collector pods can't be ready.
- LOG-6352 - Infinite validation messages for pipelines
- LOG-6406 - [Logging 6.0.z] Alerting rules for log-collection contains summary and message annotation instead of summary and description annotation
- LOG-6421 - [release-6.0] Operator - Add CCO support for GCP WIF for openshift-related tenant modes.
- LOG-6441 - [release-6.0] Named audit input causes nil pointer dereference error
- LOG-6486 - [release-6.0] Collector pods does not collect oauth-server audit logs
- LOG-6543 - [release-6.0] Collector pods don't mount `/var/log/oauth-apiserver/` directory correctly
CVEs
References
(none)
aarch64
openshift-logging/cluster-logging-rhel9-operator@sha256:cb5580b916e955e4eb7489e151dbaa98092065bbcc4d7c6f4d0395fb883765ae |
openshift-logging/eventrouter-rhel9@sha256:47f9f4b3c6a0514133de294efd3e30e9740653620c79c2cf85cd4c6824e03606 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:6e99c9ced19a9f898db6ddb1e5c3e210f669cf4acc8c7524cfa7578f5e621a04 |
openshift-logging/logging-loki-rhel9@sha256:8a5465cba197636c9cff64304c86e74dd3eb8e8e8f49dbe91921a6cd2efe0994 |
openshift-logging/loki-rhel9-operator@sha256:e68ac13a1c8a7bfbcb14f8607ff4720dfe525617ea56bab37bc2a18aa01effd5 |
openshift-logging/lokistack-gateway-rhel9@sha256:c2540f0c78ba98f0a4838f48672427025b78dc2f9af05b55cee70b4366b18296 |
openshift-logging/opa-openshift-rhel9@sha256:b0794a5f0d9f4d7db05fc2d015c7241412e99165d753d092276ada3e06dd33d6 |
openshift-logging/vector-rhel9@sha256:5913c0da6922bc06e9431875f5129dc875ab84986796bd737c96709adbfbc619 |
ppc64le
openshift-logging/cluster-logging-rhel9-operator@sha256:85b11bab9e3b3e986aa3559e27928a95691d270c713853f828b8de6e3443f81d |
openshift-logging/eventrouter-rhel9@sha256:b7762f60281ac072bdb71cdf01b11fff56fb862535493e4c7f4f93a62b8de2e0 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:c2875fc15ca37049ef45ffc463d394fc188e4672feee7a59aec7e1162c86bb58 |
openshift-logging/logging-loki-rhel9@sha256:9f605dee838241cb1db6d9f40268858a4a16bc247f608531e6deb7649d02df73 |
openshift-logging/loki-rhel9-operator@sha256:e154cb5c3ad04a24cc954af0794d5ff84e4e7d9c6046d506e803a2a0671de991 |
openshift-logging/lokistack-gateway-rhel9@sha256:fd67611543f9a9439cf9b16558f6b2d944188f5ee7d628e8e3ea50143f96953d |
openshift-logging/opa-openshift-rhel9@sha256:e1d4f13ad662a314f07c89c08f29de4ea36c04bdf41c1bcefdad5926c74ce752 |
openshift-logging/vector-rhel9@sha256:197c1c3e2ecda5e6fe98d77633e59183ac5c80560477307af6b63b657ddd1109 |
s390x
openshift-logging/cluster-logging-rhel9-operator@sha256:5a88937e713c8e8b68d1b594ce9f6ff9f5064c3ada1328429e624d8ee589dcbe |
openshift-logging/eventrouter-rhel9@sha256:b9f2918dbbee5cfe5eaa62619a987acd250c3b40a1e27f3152e66bd6b8f166b8 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:4ba8dc9ab100046e12493cd2cfee4679006ffa87a62ec37e9cfc975113091393 |
openshift-logging/logging-loki-rhel9@sha256:a80e7efbcc9eac28f8ed33c514be67b144754dafa23da78398a09f21da497058 |
openshift-logging/loki-rhel9-operator@sha256:923bebd3e6c36766be5973df0327fe4ca509806efb6251b211a00e39d680acb4 |
openshift-logging/lokistack-gateway-rhel9@sha256:a223375803904b4b8b9680cfc872937d603dc5197aef62c82e7678b887c54c32 |
openshift-logging/opa-openshift-rhel9@sha256:5a02364a5d53ba99b31f74975cbf4669fcee588adb6e5e53140b67eceafa48aa |
openshift-logging/vector-rhel9@sha256:bb41906f7af20c82da70eac8f3416bd071fbe0daacfdf4e47a5c776442039c7a |
x86_64
openshift-logging/cluster-logging-operator-bundle@sha256:c2b07b89547959c8c68bae32f2176aef2e47e69b711a8858cac436263cf01de6 |
openshift-logging/cluster-logging-rhel9-operator@sha256:59853ab040072110d6b6ad333864130642e59a39eb2ec6ff43771d459eb936f8 |
openshift-logging/eventrouter-rhel9@sha256:103da661c80c39ba8280c015f1e30eab4e5df2c388e02bda0d9c497c6785d61b |
openshift-logging/log-file-metric-exporter-rhel9@sha256:402f18da06308d777df271ed9c301870d4b796126e4e7f2658150e622cdd4be2 |
openshift-logging/logging-loki-rhel9@sha256:f1171e119f06a0496e046a6db34fe781709a71c99b53173dba33d37600d71ecf |
openshift-logging/loki-operator-bundle@sha256:5e19b8de8c84e6117832aea41171d698c2f9ae4e5c414513bd1885d3063c2fd0 |
openshift-logging/loki-rhel9-operator@sha256:6da22516112dfc2c66f5610be333efc46c68cb05d83b84161451807bfba77ef4 |
openshift-logging/lokistack-gateway-rhel9@sha256:cb01769fec50f32b7ea2cb50f56667f6975f10e1ab59f5998d6f94a74ba284b9 |
openshift-logging/opa-openshift-rhel9@sha256:8031d7caba6f4da30bd920da5a11d314c9ed9f38ad709d605541609031123a9b |
openshift-logging/vector-rhel9@sha256:fe4c436d41e97c241d65c890d1e37cbd7fd25232acaa18277507ea95075db639 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.