-
Previously, the Compliance Operator hard-coded notifications to the default openshift-compliance
namespace. If the Operator were installed in a non-default namespace, the notifications would not work as expected. Now, notifications work in non-default openshift-compliance
namespaces. (BZ#2060726)
-
Previously, the Compliance Operator was unable to evaluate default configurations used by kubelet objects, resulting in inaccurate results and false positives. This new feature evaluates the kubelet configuration and now reports accurately. (BZ#2075041)
-
Previously, the Compliance Operator reported the ocp4-kubelet-configure-event-creation
rule in a FAIL
state after applying an automatic remediation because the eventRecordQPS
value was set higher than the default value. Now, the ocp4-kubelet-configure-event-creation
rule remediation sets the default value, and the rule applies correctly. (BZ#2082416)
-
The ocp4-configure-network-policies
rule requires manual intervention to perform effectively. New descriptive instructions and rule updates increase applicability of the ocp4-configure-network-policies
rule for clusters using Calico CNIs. (BZ#2091794)
-
Previously, the Compliance Operator would not clean up pods used to scan infrastructure when using the debug=true
option in the scan settings. This caused pods to be left on the cluster even after deleting the ScanSettingBinding
. Now, pods are always deleted when a ScanSettingBinding
is deleted.(BZ#2092913)
-
Previously, the Compliance Operator used an older version of the operator-sdk
command that caused alerts about deprecated functionality. Now, an updated version of the operator-sdk
command is included and there are no more alerts for deprecated functionality. (BZ#2098581)
-
Previously, the Compliance Operator would fail to apply remediations if it could not determine the relationship between kubelet and machine configurations. Now, the Compliance Operator has improved handling of the machine configurations and is able to determine if a kubelet configuration is a subset of a machine configuration. (BZ#2102511)
-
Previously, the rule for ocp4-cis-node-master-kubelet-enable-cert-rotation
did not properly describe success criteria. As a result, the requirements for RotateKubeletClientCertificate
were unclear. Now, the rule for ocp4-cis-node-master-kubelet-enable-cert-rotation
reports accurately regardless of the configuration present in the kubelet configuration file. (BZ#2105153)
-
Previously, the rule for checking idle streaming timeouts did not consider default values, resulting in inaccurate rule reporting. Now, more robust checks ensure increased accuracy in results based on default configuration values. (BZ#2105878)
-
Previously, the Compliance Operator would fail to fetch API resources when parsing machine configurations without Ignition specifications, which caused the api-check-pods
processes to crash loop. Now, the Compliance Operator handles Machine Config Pools that do not have Ignition specifications correctly. (BZ#2117268)
-
Previously, rules evaluating the modprobe
configuration would fail even after applying remediations due to a mismatch in values for the modprobe
configuration. Now, the same values are used for the modprobe
configuration in checks and remediations, ensuring consistent results. (BZ#2117747)