- Issued:
- 2025-04-16
- Updated:
- 2025-04-17
RHBA-2025:3908 - Bug Fix Advisory
Synopsis
Logging for Red Hat OpenShift - 6.2.1
Type/Severity
Bug Fix Advisory
Topic
Logging for Red Hat OpenShift - 6.2.1
Description
Logging for Red Hat OpenShift - 6.2.1
Solution
For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:
For Red Hat OpenShift Logging 6.2, see the following instructions to apply this update:
https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/logging/logging-6-2
Affected Products
- Logging Subsystem for Red Hat OpenShift for ARM 64 6 aarch64
- Logging Subsystem for Red Hat OpenShift 6 x86_64
- Logging Subsystem for Red Hat OpenShift for IBM Power, little endian 6 ppc64le
- Logging Subsystem for Red Hat OpenShift for IBM Z and LinuxONE 6 s390x
Fixes
- LOG-4445 - [release-5.8] Forwarder must use hosted cluster_id on HCP cluster
- LOG-6753 - Missing the parse and detectMultilineException filters when using `oc explain clusterlogforwarders.spec.filters`
- LOG-6758 - Collector configmap not generated when same input used twice for the same output
- LOG-6869 - Improve description for rfc and enrichment in "clusterlogforwarder.spec.outputs.syslog"
- LOG-6878 - CLF errors out when dataModel is Otel and tuning config is empty
- LOG-6879 - [release-6.2] Permission Error due to operator updating the SCC in OpenShift Logging 6.x
- LOG-6896 - clusterlogforwarder.spec.outputs.syslog.url does not support `udps`
- LOG-6953 - cluster-logging-operator: the object has been modified
- LOG-6992 - [release-6.2] Change Loki configuration to update memberlist ring when ingester becomes unhealthy
- LOG-6997 - When forwarding logs with Otel data module, vector pod cannot forward ovn audit logs.
References
(none)
aarch64
openshift-logging/cluster-logging-rhel9-operator@sha256:a4b285ecb76c2a8b3a0559c72b954a4184c0880e2d285a10c50f8625656bfe65 |
openshift-logging/eventrouter-rhel9@sha256:cb8ea2e61ff36b344d36b687da2ddd648738dc3c541406621bb25b96d5686603 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:b49aa342da32755f51ee40087c222a345faa5a46d3e92183c1494e9ed8d4bf56 |
openshift-logging/logging-loki-rhel9@sha256:7fd8235ffaa160b68a0753d4e18bc9d26c687d50a6c8d531236cf616b64f8a42 |
openshift-logging/loki-rhel9-operator@sha256:8698ea3326c6245a72d818385e6d892d20b6e5fad138dfea1664f4b4c9b9617d |
openshift-logging/lokistack-gateway-rhel9@sha256:615690423204cacaae3abea852036f3f487b8dcfd7c526463d3df6f2ce2a32b6 |
openshift-logging/opa-openshift-rhel9@sha256:192d8e2fde105a5de9a23bae7338f16d5f1e68125943cf279ef43ec3543cc6e3 |
openshift-logging/vector-rhel9@sha256:c06bfa9532a8acc350509cc2c208fd98234d01c55113d2131d4f306d0e5db615 |
ppc64le
openshift-logging/cluster-logging-rhel9-operator@sha256:37f022088db78bd792fcfe99c5d65fe11c870951fe0842b8d4a0736b42da9c39 |
openshift-logging/eventrouter-rhel9@sha256:2786272ea2747739fa15033078742ee4347bc30752737d91aa7aca17e5a696f1 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:4e015c9d8dd01e97cce6a3dc68544262a726f68f9391484c5e880232ca74bdd9 |
openshift-logging/logging-loki-rhel9@sha256:5f294f6e8af981d7754f75f27f1c2d5a9490180262d026b6643341ab2c8396e8 |
openshift-logging/loki-rhel9-operator@sha256:cb24d59c9938dbdea794d0ac7d13c0672e0a67d6871f5496a749179625ca30f7 |
openshift-logging/lokistack-gateway-rhel9@sha256:263b6185bda4f4765fa8e1008e89591cfab3338afaeac48f8af537afc61a6833 |
openshift-logging/opa-openshift-rhel9@sha256:1167fba69312bf1b62e2fd1d586d669a267e5fa9f78467a391fb745131d107fd |
openshift-logging/vector-rhel9@sha256:86bdf366e55199d6f539aefcc0c26be428910397f08dfcf768290eacd4b9a6d6 |
s390x
openshift-logging/cluster-logging-rhel9-operator@sha256:2fec3dc0d21f2214e992c9ba62ffe1e1af6c4139864bdc20aca0fe8a221a49de |
openshift-logging/eventrouter-rhel9@sha256:d22833ab1801459c93b6a989318a7381e790c3db32a95671b78f5efca0f00fb4 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:6535bad4e23a691a12cb59e74660fabfee48fe4bad31da39df520196c1150527 |
openshift-logging/logging-loki-rhel9@sha256:d966c70eefe7c500b2a0f5948ad7ede3b5f4317ade9eb983083c975d447d68ab |
openshift-logging/loki-rhel9-operator@sha256:3de687f8254ad308493d050f15312a4b9b87577f32fa56f0f9a85df893d8d6d6 |
openshift-logging/lokistack-gateway-rhel9@sha256:9263da10e2f5a8cb53ff21f5bf39d02c217314cfc7ba66fc2783574018c6a41f |
openshift-logging/opa-openshift-rhel9@sha256:01ca9daee12ce0dd53a9b9fd8f15f7b1cba2e02e2311e4f36212c49e84fabfd1 |
openshift-logging/vector-rhel9@sha256:51f4403a230c468ce5f41554436eb93405653676de55d45e88f6af9b741c11b0 |
x86_64
openshift-logging/cluster-logging-operator-bundle@sha256:54f134e2f5978d68af40496e161c511bad7a5c23a48c56853b013d656dcf2422 |
openshift-logging/cluster-logging-rhel9-operator@sha256:7ae5b68a10a63bb2b0e186a4152b5297abbf4e06be0962fd492f4b3b533fe95a |
openshift-logging/eventrouter-rhel9@sha256:d322d90d0f3f3837398c04fb993f10ba1062db0f7f513dcb8ab748eebc34e1e5 |
openshift-logging/log-file-metric-exporter-rhel9@sha256:36b5113cc2f42c2e94dc95f028f291138fe69b7a74887ec09af46a240db8ee26 |
openshift-logging/logging-loki-rhel9@sha256:6878b0987012d6fbff7b11938b6b02732d2a70b687fdc82c2bdb9cecfc927d13 |
openshift-logging/loki-operator-bundle@sha256:2b0f454bcc44bf4d068f68be0136a057548ded2ec4f6aaa820d7f971b2e4704b |
openshift-logging/loki-rhel9-operator@sha256:e144287ca659a9a3fe7b1e2a39e4ee5eb1b5caaba6f567749902bc6dc2ebb7be |
openshift-logging/lokistack-gateway-rhel9@sha256:53f321134a45d033973758a963cc4bd27087d490351b9f43334ea06e4d250f8f |
openshift-logging/opa-openshift-rhel9@sha256:19fba7ed9b6385b74e9037b26ad10bddb817ccbf49b0605b203582c087bb9c13 |
openshift-logging/vector-rhel9@sha256:7ecb811d1642a9ad69ada0dc46c1d245b027e32c24d6ce032f24bf3e9864f4c5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.