Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion modules/bug-fixes-in-version-410.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

:_mod-docs-content-type: REFERENCE
[id="bug-fixes_410"]
= Bug fixes in version 4.10
= Bug fixes in version 4.10.0

[role="_abstract"]
This release contains bug fixes and enhancements.
Expand Down
37 changes: 37 additions & 0 deletions modules/bug-fixes-in-version-4101.adoc
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
// Module included in the following assemblies:
//
// * release_notes/410-release-notes.adoc

:_mod-docs-content-type: REFERENCE
[id="bug-fixes_4101"]
= Bug fixes in version 4.10.1

[role="_abstract"]
This release has bug fixes and patches addressing a security vulnerability.

This release provides the following bug fixes:

//ROX-33295
* Before this update, images with empty names were improperly uploaded, causing global search to return blank image results. With this release, empty-named images no longer appear in search results, enhancing search efficiency.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, images with empty names were improperly uploaded, causing global search to return blank image results. With this release, empty-named images no longer appear in search results, enhancing search efficiency.
* Before this update, images with empty names were improperly uploaded, causing global search to return blank image results. With this release, empty-named images no longer appear in search results.


//ROX-33325
* Before this update, the script failed to run on a Linux system due to missing executable program permissions, causing user interface elements to display incorrectly. With this release, the bug fix corrected the issue with inaccurate data processing in the report generator. As a result, the system no longer hangs during data transfer, enhancing user productivity.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, the script failed to run on a Linux system due to missing executable program permissions, causing user interface elements to display incorrectly. With this release, the bug fix corrected the issue with inaccurate data processing in the report generator. As a result, the system no longer hangs during data transfer, enhancing user productivity.
* Before this update, the script failed to run on a Linux system due to missing executable program permissions, causing user interface elements to display incorrectly. With this release, Red{nbsp}Hat corrected the issue with inaccurate data processing in the report generator. As a result, the system no longer hangs during data transfer.


//ROX-33548
* Before this update, missing executable permissions prevented the script from running on Linux, which caused user interface elements to display incorrectly. With this release, the update corrects the inaccurate data processing in the report generator. As a result, the system transfers data without hanging, which boosts user productivity.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, missing executable permissions prevented the script from running on Linux, which caused user interface elements to display incorrectly. With this release, the update corrects the inaccurate data processing in the report generator. As a result, the system transfers data without hanging, which boosts user productivity.
* Before this update, missing executable permissions prevented the script from running on Linux, which caused user interface elements to display incorrectly. With this release, the update corrects the inaccurate data processing in the report generator. As a result, the system transfers data without hanging.

I'm going to keep removing these statements about productivity. If they are bug fixes, obviously they are going to increase productivity if the system works properly. IMO this is one of the worst parts of AI - stating something obvious just to make up "benefits" to create words.


//ROX-33626
* Before this update, merging many alerts triggered heavy queries for unnecessary full alerts, which caused performance issues during non-merge cases. With this release, we have improved performance by fetching only the necessary fields in `mergeManyAlerts`. As a result, merging alerts occurs faster, improving overall system efficiency for users.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, merging many alerts triggered heavy queries for unnecessary full alerts, which caused performance issues during non-merge cases. With this release, we have improved performance by fetching only the necessary fields in `mergeManyAlerts`. As a result, merging alerts occurs faster, improving overall system efficiency for users.
* Before this update, merging many alerts triggered heavy queries for unnecessary full alerts, which caused performance issues during non-merge cases. With this release, Red{nbsp}Hat has improved performance by fetching only the necessary fields in `mergeManyAlerts`. As a result, merging alerts occurs faster, improving overall system efficiency for users.

IBM SG recommends against "we": https://www.ibm.com/docs/en/ibm-style?topic=word-usage#word-usage__w__title__1


//ROX-33686
* Before this update, {ocp} 4.22 dropped `PatternFly` 5 support, causing runtime issues with the plugin in {ocp} 4.21 and later. As a consequence, users encountered runtime issues due to the disabled plugin. With this release, Red{nbsp}Hat updated the {ocp} version list for the dynamic plugin in versions 4.19, 4.20, and 4.21, disabling `PatternFly` 5 in {ocp} 4.21 and later. As a result, this avoids runtime issues, improving overall stability.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This isn't a bug fix. This is actually a "known issue" that the plugin does not work with OCP 4.22, so it is disabled. This needs to not be stated as a bug fix, but as a "known issue" and reframed as, due to PatternFly 5 not being supported, the plugin is disabled for OCP version 4.22. In addition I don't think it's accurate to say that we disabled PatternFly support in 4.21 and later. OCP did, and that's not part of anything we did. We disabled the plugin because of that action. @dvail can you help with wording?

Suggest we create a separate module for known issues and list there.


//ROX-33757
* Before this update, the system did not check whether the cluster entities store history enabled or disabled history. With this release, we have added a check for cluster entities history to prevent unnecessary storage. As a result, the system maintains optimal memory usage and CPU load because it no longer stores unnecessary items in the cluster entities store history.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think, this statement is too strong. The missing check for the history being enabled was affecting only an edge-case scenario and the unnecessary memory consumption was limited to couple of MBs. The impact of that was small as we could not detect the lost memory from memory profiles (it should be visible there), but only by looking at the code.

Let me give it a shot:

Suggested change
* Before this update, the system did not check whether the cluster entities store history enabled or disabled history. With this release, we have added a check for cluster entities history to prevent unnecessary storage. As a result, the system maintains optimal memory usage and CPU load because it no longer stores unnecessary items in the cluster entities store history.
* Before this update, selected execution paths in Sensor did not check whether the cluster entities store history was enabled or disabled. This would lead to memory being allocated and never used for clusters with enabled history. With this release, we have added a check for cluster entities history to prevent unnecessary storage. As a result, the system maintains optimal memory usage because it no longer stores unnecessary items in the cluster entities store history.

I added a sentence about the consequences for the affected systems (memory allocated and never used) and specified that the issue was affecting only those Sensors where history was enabled.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, the system did not check whether the cluster entities store history enabled or disabled history. With this release, we have added a check for cluster entities history to prevent unnecessary storage. As a result, the system maintains optimal memory usage and CPU load because it no longer stores unnecessary items in the cluster entities store history.
* Before this update, the system did not check whether the cluster entities store history enabled or disabled history. With this release, Red{nbsp}Hat added a check for cluster entities history to prevent unnecessary storage. As a result, the system maintains optimal memory usage and CPU load because it no longer stores unnecessary items in the cluster entities store history.

Something is off with this sentence: "whether the cluster entities store history enabled or disabled history" - it doesn't make sense to me


//ROX-33758
* Before this update, the `endpointsStore.addToHistory` function caused quadratic complexity in large clusters, which increased sensor CPU load and elevated event-processing latency. With this release, we have improved CPU efficiency in `endpointsStore` mutations to reduce latency. As a result, the system processes events faster and maintains lower CPU usage in large clusters with many endpoints.
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Before this update, the `endpointsStore.addToHistory` function caused quadratic complexity in large clusters, which increased sensor CPU load and elevated event-processing latency. With this release, we have improved CPU efficiency in `endpointsStore` mutations to reduce latency. As a result, the system processes events faster and maintains lower CPU usage in large clusters with many endpoints.
* Before this update, the `endpointsStore.addToHistory` function ran with quadratic computational complexity in large clusters, which increased sensor CPU load and elevated event-processing latency. With this release, we have improved CPU efficiency in `endpointsStore` mutations to reduce latency. As a result, the system processes events faster and maintains lower CPU usage in large clusters with many endpoints.

or maybe simpler?

Suggested change
* Before this update, the `endpointsStore.addToHistory` function caused quadratic complexity in large clusters, which increased sensor CPU load and elevated event-processing latency. With this release, we have improved CPU efficiency in `endpointsStore` mutations to reduce latency. As a result, the system processes events faster and maintains lower CPU usage in large clusters with many endpoints.
* Before this update, the `endpointsStore.addToHistory` function performed unnecessary operations, which increased sensor CPU load and elevated event-processing latency in larger clusters. With this release, we have improved CPU efficiency in `endpointsStore` mutations to reduce latency. As a result, the system processes events faster and maintains lower CPU usage in large clusters with many endpoints.

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Oops, I was reviewing at the same time as you were, so Agil, please disregard my comments. :)

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is the kind of fix that I don't think needs to be in the Release Notes. It is more of an internal optimization and all customers really care about is that the system works better. If we do want to "advertise" it, I think it should be simplified as "Fixed an issue which resulted in improved CPU efficiency." or something similar. @vikin91 , WDYT?

Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Never mind, I see that Piotr reviewed as I was adding these comments.


This release also addresses the following security vulnerability:

* Incorrect IPv6 host literal parsing in net/url allows for improper URL validation and handling (link:https://access.redhat.com/security/cve/cve-2026-25679[CVE-2026-25679])
3 changes: 2 additions & 1 deletion modules/common-attributes.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -62,8 +62,9 @@ endif::[]
:product-registry: OpenShift image registry
:olm-first: Operator Lifecycle Manager (OLM)
:olm: OLM
:rhacs-version: 4.10.0
:rhacs-version: 4.10.1
:ga-date-410: 3 March 2026
:ga-date-4101: 31 March 2026
:ocp-supported-version: 4.12
:ocp-latest-version: 4.21
:pipelines-shortname: OpenShift Pipelines
Expand Down
1 change: 1 addition & 0 deletions modules/release-dates-410.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -16,5 +16,6 @@ Review the official release dates and update schedule for {product-title-short}
|{product-title-short} version |Released on

|`4.10.0` | {ga-date-410}
|`4.10.1` | {ga-date-4101}

|====
5 changes: 3 additions & 2 deletions release_notes/410-release-notes.adoc
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
:_mod-docs-content-type: ASSEMBLY
[id="release-notes-410"]
= Red{nbsp}Hat Advanced Cluster Security for Kubernetes 4.10
include::modules/common-attributes.adoc[]
:context: release-notes-410
:toc: macro
:toclevels: 3
Expand All @@ -12,8 +13,6 @@ Red{nbsp}Hat Advanced Cluster Security for Kubernetes (RHACS) is an enterprise-r

RHACS deploys into your infrastructure and integrates with your DevOps tools and workflows. This integration provides better security and compliance, enabling DevOps and InfoSec teams to operationalize security.

include::modules/common-attributes.adoc[]

include::modules/release-dates-410.adoc[leveloffset=+1]

include::modules/about-release-410.adoc[leveloffset=+1]
Expand Down Expand Up @@ -80,4 +79,6 @@ include::modules/deprecated-and-removed-features-410.adoc[leveloffset=+1]

include::modules/bug-fixes-in-version-410.adoc[leveloffset=+1]

include::modules/bug-fixes-in-version-4101.adoc[leveloffset=+1]

include::modules/image-versions.adoc[leveloffset=+1]