-
Notifications
You must be signed in to change notification settings - Fork 1.8k
[RHACS] Added release notes for 4.8 #95013
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: rhacs-docs-main
Are you sure you want to change the base?
[RHACS] Added release notes for 4.8 #95013
Conversation
🤖 Fri Jun 20 09:49:09 - Prow CI generated the docs preview: https://95013--ocpdocs-pr.netlify.app/openshift-acs/latest/release_notes/48-release-notes.html |
@gaurav-nelson: all tests passed! Full PR test history. Your PR dashboard. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. I understand the commands that are listed here. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a few comments. Otherwise, LGTM!
|
||
[id="notable-technical-changes-rn-48_{context}"] | ||
By default, this feature is disabled. However, when enabled, you will see external IPs in the Network Graph. Additionally, Unauthorized Network Flow violations automatically include detailed external IP information, which streamlines your investigation process. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
By default, this feature is disabled. However, when enabled, you will see external IPs in the Network Graph. Additionally, Unauthorized Network Flow violations automatically include detailed external IP information, which streamlines your investigation process. | |
By default, this feature is disabled. However, when enabled, you see external IPs in the Network Graph. Additionally, Unauthorized Network Flow violations automatically include detailed external IP information, which streamlines your investigation process. |
Avoid future tense.
//ROX-26577 | ||
* Starting with {product-title-short} 4.8, Scanner V4 is the default scanner for reporting vulnerabilities in User Workloads, Platforms, and Nodes for all new installations of {product-title-short} Central and Secured Clusters. | ||
|
||
* {product-title-short} 4.8 preserves the current scanner configuration for existing deployments that you upgrade. If you're using the StackRox Scanner, it remains in use after the upgrade. For switching to Scanner V4, see xref:../operating/examine-images-for-vulnerabilities.adoc#enabling_scanner_v4_examine-images-for-vulnerabilities[Enabling Scanner V4]. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* {product-title-short} 4.8 preserves the current scanner configuration for existing deployments that you upgrade. If you're using the StackRox Scanner, it remains in use after the upgrade. For switching to Scanner V4, see xref:../operating/examine-images-for-vulnerabilities.adoc#enabling_scanner_v4_examine-images-for-vulnerabilities[Enabling Scanner V4]. | |
* {product-title-short} 4.8 preserves the current scanner configuration for existing deployments that you upgrade. If you are using the StackRox Scanner, it remains in use after the upgrade. For switching to Scanner V4, see xref:../operating/examine-images-for-vulnerabilities.adoc#enabling_scanner_v4_examine-images-for-vulnerabilities[Enabling Scanner V4]. |
Do not use contractions.
|
||
* {product-title-short} 4.8 includes the updated `roxctl` help command output making it more readable. The output is now more consistent with other command-line tools. | ||
|
||
* Red Hat has moved the `SecurityPolicy`` Custom Resource Definition (CRD) to the template directory within the Helm chart. This change simplifies CRD maintenance if you are using Helm, as it will now automatically upgrade. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* Red Hat has moved the `SecurityPolicy`` Custom Resource Definition (CRD) to the template directory within the Helm chart. This change simplifies CRD maintenance if you are using Helm, as it will now automatically upgrade. | |
* Red Hat has moved the `SecurityPolicy`` Custom Resource Definition (CRD) to the template directory within the Helm chart. This change simplifies CRD maintenance if you are using Helm, as it now automatically upgrades. |
Avoid future tense.
$ kubectl annotate crd/securitypolicies.config.stackrox.io meta.helm.sh/release-namespace=stackrox <2> | ||
$ kubectl label crd/securitypolicies.config.stackrox.io app.kubernetes.io/managed-by=Helm | ||
---- | ||
<1> Update the `release-name` annotation to match the name if you used different name during your initial installation. The default value is `stackrox-central-services`. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
For this footnote, and the next, put the "if" statement first. This makes it easier for users to decide if they need to read the rest of the sentence.
*Release date*: 30 June 2025 | ||
*Release date*: 23 June 2025 | ||
|
||
* Previously, the Secured Cluster sensor would remain uninitialized and offline if messages contained non-UTF-8 characters. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Put "if" statement first.
|
||
* Previously, the **Cancel** button on the delegated scanning page provided no visual feedback if you made no changes, leading to confusion about its functionality. | ||
It was because the button only reset the form for unpersisted changes. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It was because the button only reset the form for unpersisted changes. | |
This lack of feedback occurred because the button only reset the form for unpersisted changes. |
For https://issues.redhat.com/browse/ROX-29255
Added release notes for RHACS 4.8
Cherrypick in
rhacs-docs-4.8
.Preview: https://95013--ocpdocs-pr.netlify.app/openshift-acs/latest/release_notes/48-release-notes.html