tls.verify_certificate = false
tls.verify_hostname = false
The {logging-title} is provided as an installable component, with a distinct release cycle from the core OpenShift Container Platform. The Red Hat OpenShift Container Platform Life Cycle Policy outlines release compatibility. |
The |
This release includes OpenShift logging Bug Fix Release 5.6.11.
Before this update, the LokiStack gateway cached authorized requests very broadly. As a result, this caused wrong authorization results. With this update, LokiStack gateway caches on a more fine-grained basis which resolves this issue. (LOG-4435)
This release includes OpenShift logging Bug Fix Release 5.6.8.
Before this update, the vector collector terminated unexpectedly when input match label values contained a /
character within the ClusterLogForwarder
. This update resolves the issue by quoting the match label, enabling the collector to start and collect logs. (LOG-4091)
Before this update, when viewing logs within the OpenShift Container Platform web console, clicking the more data available option loaded more log entries only the first time it was clicked. With this update, more entries are loaded with each click. (OU-187)
Before this update, when viewing logs within the OpenShift Container Platform web console, clicking the streaming option would only display the streaming logs message without showing the actual logs. With this update, both the message and the log stream are displayed correctly. (OU-189)
Before this update, the Loki Operator reset errors in a way that made identifying configuration problems difficult to troubleshoot. With this update, errors persist until the configuration error is resolved. (LOG-4158)
Before this update, clusters with more than 8,000 namespaces caused Elasticsearch to reject queries because the list of namespaces was larger than the http.max_header_size
setting. With this update, the default value for header size has been increased, resolving the issue. (LOG-4278)
This release includes OpenShift logging Bug Fix Release 5.6.7.
Before this update, the LokiStack gateway returned label values for namespaces without applying the access rights of a user. With this update, the LokiStack gateway applies permissions to label value requests, resolving the issue. (LOG-3728)
Before this update, the time
field of log messages did not parse as structured.time
by default in Fluentd when the messages included a timestamp. With this update, parsed log messages will include a structured.time
field if the output destination supports it. (LOG-4090)
Before this update, the LokiStack route configuration caused queries running longer than 30 seconds to time out. With this update, the LokiStack global and per-tenant queryTimeout
settings affect the route timeout settings, resolving the issue. (LOG-4130)
Before this update, LokiStack CRs with values defined for tenant limits but not global limits caused the Loki Operator to crash. With this update, the Operator is able to process LokiStack CRs with only tenant limits defined, resolving the issue. (LOG-4199)
Before this update, the OpenShift Container Platform web console generated errors after an upgrade due to cached files of the prior version retained by the web browser. With this update, these files are no longer cached, resolving the issue. (LOG-4099)
Before this update, Vector generated certificate errors when forwarding to the default Loki instance. With this update, logs can be forwarded without errors to Loki by using Vector. (LOG-4184)
Before this update, the Cluster logging Operator API required a certificate to be provided by a secret when the tls.insecureSkipVerify
option was set to true
. With this update, the Cluster logging Operator API no longer requires a certificate to be provided by a secret in such cases. The following configuration has been added to the Operator’s CR:
tls.verify_certificate = false
tls.verify_hostname = false
(LOG-4146)
This release includes OpenShift logging Bug Fix Release 5.6.6.
Before this update, dropping of messages occurred when configuring the ClusterLogForwarder
custom resource to write to a Kafka output topic that matched a key in the payload due to an error. With this update, the issue is resolved by prefixing Fluentd’s buffer name with an underscore. (LOG-3458)
Before this update, premature closure of watches occurred in Fluentd when inodes were reused and there were multiple entries with the same inode. With this update, the issue of premature closure of watches in the Fluentd position file is resolved. (LOG-3629)
Before this update, the detection of JavaScript client multi-line exceptions by Fluentd failed, resulting in printing them as multiple lines. With this update, exceptions are output as a single line, resolving the issue.(LOG-3761)
Before this update, direct upgrades from the Red Hat Openshift logging Operator version 4.6 to version 5.6 were allowed, resulting in functionality issues. With this update, upgrades must be within two versions, resolving the issue. (LOG-3837)
Before this update, metrics were not displayed for Splunk or Google logging outputs. With this update, the issue is resolved by sending metrics for HTTP endpoints.(LOG-3932)
Before this update, when the ClusterLogForwarder
custom resource was deleted, collector pods remained running. With this update, collector pods do not run when log forwarding is not enabled. (LOG-4030)
Before this update, a time range could not be selected in the OpenShift Container Platform web console by clicking and dragging over the logs histogram. With this update, clicking and dragging can be used to successfully select a time range. (LOG-4101)
Before this update, Fluentd hash values for watch files were generated using the paths to log files, resulting in a non unique hash upon log rotation. With this update, hash values for watch files are created with inode numbers, resolving the issue. (LOG-3633)
Before this update, clicking on the Show Resources link in the OpenShift Container Platform web console did not produce any effect. With this update, the issue is resolved by fixing the functionality of the Show Resources link to toggle the display of resources for each log entry. (LOG-4118)
This release includes OpenShift logging Bug Fix Release 5.6.5.
Before this update, the template definitions prevented Elasticsearch from indexing some labels and namespace_labels, causing issues with data ingestion. With this update, the fix replaces dots and slashes in labels to ensure proper ingestion, effectively resolving the issue. (LOG-3419)
Before this update, if the Logs page of the OpenShift Web Console failed to connect to the LokiStack, a generic error message was displayed, providing no additional context or troubleshooting suggestions. With this update, the error message has been enhanced to include more specific details and recommendations for troubleshooting. (LOG-3750)
Before this update, time range formats were not validated, leading to errors selecting a custom date range. With this update, time formats are now validated, enabling users to select a valid range. If an invalid time range format is selected, an error message is displayed to the user. (LOG-3583)
Before this update, when searching logs in Loki, even if the length of an expression did not exceed 5120 characters, the query would fail in many cases. With this update, query authorization label matchers have been optimized, resolving the issue. (LOG-3480)
Before this update, the Loki Operator failed to produce a memberlist configuration that was sufficient for locating all the components when using a memberlist for private IPs. With this update, the fix ensures that the generated configuration includes the advertised port, allowing for successful lookup of all components. (LOG-4008)
This release includes OpenShift logging Bug Fix Release 5.6.4.
Before this update, when LokiStack was deployed as the log store, the logs generated by Loki pods were collected and sent to LokiStack. With this update, the logs generated by Loki are excluded from collection and will not be stored. (LOG-3280)
Before this update, when the query editor on the Logs page of the OpenShift Web Console was empty, the drop-down menus did not populate. With this update, if an empty query is attempted, an error message is displayed and the drop-down menus now populate as expected. (LOG-3454)
Before this update, when the tls.insecureSkipVerify
option was set to true
, the Cluster logging Operator would generate incorrect configuration. As a result, the operator would fail to send data to Elasticsearch when attempting to skip certificate validation. With this update, the Cluster logging Operator generates the correct TLS configuration even when tls.insecureSkipVerify
is enabled. As a result, data can be sent successfully to Elasticsearch even when attempting to skip certificate validation. (LOG-3475)
Before this update, when structured parsing was enabled and messages were forwarded to multiple destinations, they were not deep copied. This resulted in some of the received logs including the structured message, while others did not. With this update, the configuration generation has been modified to deep copy messages before JSON parsing. As a result, all received messages now have structured messages included, even when they are forwarded to multiple destinations. (LOG-3640)
Before this update, if the collection
field contained {}
it could result in the Operator crashing. With this update, the Operator will ignore this value, allowing the operator to continue running smoothly without interruption. (LOG-3733)
Before this update, the nodeSelector
attribute for the Gateway component of LokiStack did not have any effect. With this update, the nodeSelector
attribute functions as expected. (LOG-3783)
Before this update, the static LokiStack memberlist configuration relied solely on private IP networks. As a result, when the OpenShift Container Platform cluster pod network was configured with a public IP range, the LokiStack pods would crashloop. With this update, the LokiStack administrator now has the option to use the pod network for the memberlist configuration. This resolves the issue and prevents the LokiStack pods from entering a crashloop state when the OpenShift Container Platform cluster pod network is configured with a public IP range. (LOG-3814)
Before this update, if the tls.insecureSkipVerify
field was set to true
, the Cluster logging Operator would generate an incorrect configuration. As a result, the Operator would fail to send data to Elasticsearch when attempting to skip certificate validation. With this update, the Operator generates the correct TLS configuration even when tls.insecureSkipVerify
is enabled. As a result, data can be sent successfully to Elasticsearch even when attempting to skip certificate validation. (LOG-3838)
Before this update, if the Cluster logging Operator (CLO) was installed without the Elasticsearch Operator, the CLO pod would continuously display an error message related to the deletion of Elasticsearch. With this update, the CLO now performs additional checks before displaying any error messages. As a result, error messages related to Elasticsearch deletion are no longer displayed in the absence of the Elasticsearch Operator.(LOG-3763)
This release includes OpenShift logging Bug Fix Release 5.6.3.
Before this update, the operator stored gateway tenant secret information in a config map. With this update, the operator stores this information in a secret. (LOG-3717)
Before this update, the Fluentd collector did not capture OAuth login events stored in /var/log/auth-server/audit.log
. With this update, Fluentd captures these OAuth login events, resolving the issue. (LOG-3729)
This release includes OpenShift logging Bug Fix Release 5.6.2.
Before this update, the collector did not set level
fields correctly based on priority for systemd logs. With this update, level
fields are set correctly. (LOG-3429)
Before this update, the Operator incorrectly generated incompatibility warnings on OpenShift Container Platform 4.12 or later. With this update, the Operator max OpenShift Container Platform version value has been corrected, resolving the issue. (LOG-3584)
Before this update, creating a ClusterLogForwarder
custom resource (CR) with an output value of default
did not generate any errors. With this update, an error warning that this value is invalid generates appropriately. (LOG-3437)
Before this update, when the ClusterLogForwarder
custom resource (CR) had multiple pipelines configured with one output set as default
, the collector pods restarted. With this update, the logic for output validation has been corrected, resolving the issue. (LOG-3559)
Before this update, collector pods restarted after being created. With this update, the deployed collector does not restart on its own. (LOG-3608)
Before this update, patch releases removed previous versions of the Operators from the catalog. This made installing the old versions impossible. This update changes bundle configurations so that previous releases of the same minor version stay in the catalog. (LOG-3635)
This release includes OpenShift logging Bug Fix Release 5.6.1.
Before this update, the compactor would report TLS certificate errors from communications with the querier when retention was active. With this update, the compactor and querier no longer communicate erroneously over HTTP. (LOG-3494)
Before this update, the Loki Operator would not retry setting the status of the LokiStack
CR, which caused stale status information. With this update, the Operator retries status information updates on conflict. (LOG-3496)
Before this update, the Loki Operator Webhook server caused TLS errors when the kube-apiserver-operator
Operator checked the webhook validity. With this update, the Loki Operator Webhook PKI is managed by the Operator Lifecycle Manager (OLM), resolving the issue. (LOG-3510)
Before this update, the LokiStack Gateway Labels Enforcer generated parsing errors for valid LogQL queries when using combined label filters with boolean expressions. With this update, the LokiStack LogQL implementation supports label filters with boolean expression and resolves the issue. (LOG-3441), (LOG-3397)
Before this update, records written to Elasticsearch would fail if multiple label keys had the same prefix and some keys included dots. With this update, underscores replace dots in label keys, resolving the issue. (LOG-3463)
Before this update, the Red Hat OpenShift logging
Operator was not available for OpenShift Container Platform 4.10 clusters because of an incompatibility between OpenShift Container Platform console and the logging-view-plugin. With this update, the plugin is properly integrated with the OpenShift Container Platform 4.10 admin console. (LOG-3447)
Before this update the reconciliation of the ClusterLogForwarder
custom resource would incorrectly report a degraded status of pipelines that reference the default logstore. With this update, the pipeline validates properly.(LOG-3477)
This release includes OpenShift logging Release 5.6.
In logging version 5.6, Fluentd is deprecated and is planned to be removed in a future release. Red Hat will provide bug fixes and support for this feature during the current release lifecycle, but this feature will no longer receive enhancements and will be removed. As an alternative to Fluentd, you can use Vector instead.
With this update, logging is compliant with OpenShift Container Platform cluster-wide cryptographic policies. (LOG-895)
With this update, you can declare per-tenant, per-stream, and global policies retention policies through the LokiStack custom resource, ordered by priority. (LOG-2695)
With this update, Splunk is an available output option for log forwarding. (LOG-2913)
With this update, Vector replaces Fluentd as the default Collector. (LOG-2222)
With this update, the Developer role can access the per-project workload logs they are assigned to within the Log Console Plugin on clusters running OpenShift Container Platform 4.11 and higher. (LOG-3388)
With this update, logs from any source contain a field openshift.cluster_id
, the unique identifier of the cluster in which the Operator is deployed. You can view the clusterID
value with the command below. (LOG-2715)
$ oc get clusterversion/version -o jsonpath='{.spec.clusterID}{"\n"}'
Before this update, Elasticsearch would reject logs if multiple label keys had the same prefix and some keys included the .
character. This fixes the limitation of Elasticsearch by replacing .
in the label keys with _
. As a workaround for this issue, remove the labels that cause errors, or add a namespace to the label. (LOG-3463)
Before this update, if you deleted the Kibana Custom Resource, the OpenShift Container Platform web console continued displaying a link to Kibana. With this update, removing the Kibana Custom Resource also removes that link. (LOG-2993)
Before this update, a user was not able to view the application logs of namespaces they have access to. With this update, the Loki Operator automatically creates a cluster role and cluster role binding allowing users to read application logs. (LOG-3072)
Before this update, the Operator removed any custom outputs defined in the ClusterLogForwarder
custom resource when using LokiStack as the default log storage. With this update, the Operator merges custom outputs with the default outputs when processing the ClusterLogForwarder
custom resource. (LOG-3090)
Before this update, the CA key was used as the volume name for mounting the CA into Loki, causing error states when the CA Key included non-conforming characters, such as dots. With this update, the volume name is standardized to an internal string which resolves the issue. (LOG-3331)
Before this update, a default value set within the LokiStack Custom Resource Definition, caused an inability to create a LokiStack instance without a ReplicationFactor
of 1
. With this update, the operator sets the actual value for the size used. (LOG-3296)
Before this update, Vector parsed the message field when JSON parsing was enabled without also defining structuredTypeKey
or structuredTypeName
values. With this update, a value is required for either structuredTypeKey
or structuredTypeName
when writing structured logs to Elasticsearch. (LOG-3195)
Before this update, the secret creation component of the Elasticsearch Operator modified internal secrets constantly. With this update, the existing secret is properly handled. (LOG-3161)
Before this update, the Operator could enter a loop of removing and recreating the collector daemonset while the Elasticsearch or Kibana deployments changed their status. With this update, a fix in the status handling of the Operator resolves the issue. (LOG-3157)
Before this update, Kibana had a fixed 24h
OAuth cookie expiration time, which resulted in 401 errors in Kibana whenever the accessTokenInactivityTimeout
field was set to a value lower than 24h
. With this update, Kibana’s OAuth cookie expiration time synchronizes to the accessTokenInactivityTimeout
, with a default value of 24h
. (LOG-3129)
Before this update, the Operators general pattern for reconciling resources was to try and create before attempting to get or update which would lead to constant HTTP 409 responses after creation. With this update, Operators first attempt to retrieve an object and only create or update it if it is either missing or not as specified. (LOG-2919)
Before this update, the .level
and`.structure.level` fields in Fluentd could contain different values. With this update, the values are the same for each field. (LOG-2819)
Before this update, the Operator did not wait for the population of the trusted CA bundle and deployed the collector a second time once the bundle updated. With this update, the Operator waits briefly to see if the bundle has been populated before it continues the collector deployment. (LOG-2789)
Before this update, logging telemetry info appeared twice when reviewing metrics. With this update, logging telemetry info displays as expected. (LOG-2315)
Before this update, Fluentd pod logs contained a warning message after enabling the JSON parsing addition. With this update, that warning message does not appear. (LOG-1806)
Before this update, the must-gather
script did not complete because oc
needs a folder with write permission to build its cache. With this update, oc
has write permissions to a folder, and the must-gather
script completes successfully. (LOG-3446)
Before this update the log collector SCC could be superseded by other SCCs on the cluster, rendering the collector unusable. This update sets the priority of the log collector SCC so that it takes precedence over the others. (LOG-3235)
Before this update, Vector was missing the field sequence
, which was added to fluentd as a way to deal with a lack of actual nanoseconds precision. With this update, the field openshift.sequence
has been added to the event logs. (LOG-3106)