Este contenido no está disponible en el idioma seleccionado.
Chapter 1. Release notes for the Red Hat OpenShift Distributed Tracing Platform 3.9
1.1. About this release Copiar enlaceEnlace copiado en el portapapeles!
Distributed Tracing Platform 3.9 is provided through the Tempo Operator 0.20.0 and based on the open source Grafana Tempo 2.10.0.
Only supported features are documented. Undocumented features are currently unsupported. If you need assistance with a feature, contact Red Hat’s support.
1.2. New features and enhancements Copiar enlaceEnlace copiado en el portapapeles!
The Distributed Tracing Platform 3.9 release adds the following features and enhancements.
- Upgrade to UBI 9
- This release upgrades the Red Hat Universal Base Image (UBI) to version 9.
- Network policies in
TempoStackCRD This update extends the
TempoStackCustom Resource Definition (CRD) with a network policy option that enables the Operator to reconcile network policies among all components. This option is enabled by default.- Environment variables for Operator configuration
This update adds support for overriding the Operator configuration by using environment variables. You can configure Operator settings through the
Subscriptioncustom resource of the Operator Lifecycle Manager (OLM) without modifying ConfigMaps. The--configflag remains available for custom configuration files if needed.- T-shirt sizes for
TempoStackdeployments This update introduces the
sizefield forTempoStackdeployments, which provides predefined t-shirt size configurations. Instead of manually calculating CPU, memory, and storage for each component, you can select a size that matches your workload scale. The following sizes are available:1x.demo,1x.pico,1x.extra-small,1x.small, and1x.medium. This field is optional and existing configurations usingresources.totalor per-component overrides continue to work unchanged.- Improved memory management for
TempoMonolithicdeployments The Operator now automatically sets the
GOMEMLIMITsoft memory limit for the Go garbage collector to 80% of the container memory limit for all Tempo components in a Tempo monolithic deployment. This reduces the likelihood of out-of-memory terminations.- A
TempoStackorTempoMonolithicinstance without the gateway is not supported This update requires tenant configuration and an enabled gateway for
TempoStackandTempoMonolithicinstances. If you do not enable the gateway, the Operator displays a warning. For aTempoStackinstance, enable the gateway by setting.spec.template.gateway.enabledtotrue. For aTempoMonolithicinstance, the gateway is enabled automatically when any tenant is configured.TempoStackandTempoMonolithicinstances without an enabled gateway are not supported.
Some linked Jira tickets are accessible only with Red Hat credentials.
1.3. Known issues Copiar enlaceEnlace copiado en el portapapeles!
The Distributed Tracing Platform 3.9 release has the following known issue.
- Gateway fails to forward OTLP HTTP traffic when receiver TLS is enabled
When Tempo Monolithic is configured with
multitenancy.enabled: trueandingestion.otlp.http.tls.enabled: true, the gateway forwards OTLP HTTP traffic to the Tempo receiver using plain HTTP instead of HTTPS. As a consequence, the connection fails with aconnection reset by peererror because the receiver expects TLS connections. OTLP gRPC ingestion through the gateway is not affected.To work around this problem, disable TLS on the OTLP HTTP receiver by setting
ingestion.otlp.http.tls.enabled: false.
1.4. Fixed issues Copiar enlaceEnlace copiado en el portapapeles!
The Distributed Tracing Platform 3.9 release fixes the following issues.
- Fixed network policies for managed OpenShift services
Before this update, the Operator network policies used a hard-coded port 6443 for the API server. As a consequence, the Operator failed to connect to managed OpenShift services that expose the API on port 443. With this update, the Operator dynamically retrieves the control plane address from service endpoints. As a result, network policies work correctly on all OpenShift environments.
- CVE-2025-61726
Before this update, a flaw existed in the
net/urlpackage in the Go standard library. As a consequence, a denial-of-service HTTP request with a massive number of query parameters could cause the application to consume an excessive amount of memory and eventually become unresponsive. This release eliminates this flaw.- CVE-2025-61729
Before this update, the
HostnameError.Error()function in the Gocrypto/x509package used string concatenation in a loop without limiting the number of printed hostnames. As a consequence, processing a malicious certificate with many hostnames could cause excessive CPU and memory consumption, leading to a denial-of-service condition. This release includes the fix for this flaw.- CVE-2025-68121
Before this update, a flaw existed in the
crypto/tlspackage in the Go standard library. As a consequence, during TLS session resumption, unauthorized clients or servers could bypass certificate validation if CA pools were mutated between handshakes. This release includes the fix for this flaw.
Some linked Jira tickets are accessible only with Red Hat credentials.
1.5. Getting support Copiar enlaceEnlace copiado en el portapapeles!
If you experience difficulty with a procedure described in this documentation, or with OpenShift Container Platform in general, visit the Red Hat Customer Portal.
From the Customer Portal, you can:
- Search or browse through the Red Hat Knowledgebase of articles and solutions relating to Red Hat products.
- Submit a support case to Red Hat Support.
- Access other product documentation.
To identify issues with your cluster, you can use Insights in OpenShift Cluster Manager. Insights provides details about issues and, if available, information on how to solve a problem.
If you have a suggestion for improving this documentation or have found an error, submit a Jira issue for the most relevant documentation component. Please provide specific details, such as the section name and OpenShift Container Platform version.
The deprecated Red Hat OpenShift Distributed Tracing Platform (Jaeger) 3.5 was the last release of the Red Hat OpenShift Distributed Tracing Platform (Jaeger) that Red Hat supported.
All support and maintenance for the deprecated Red Hat OpenShift Distributed Tracing Platform (Jaeger) 3.5 ended on November 3, 2025.
If you still use Red Hat OpenShift Distributed Tracing Platform (Jaeger), you must migrate to Red Hat build of OpenTelemetry Operator and Tempo Operator for distributed tracing collection and storage. For more information, see "Migrating" in the Red Hat build of OpenTelemetry documentation, "Installing" in the Red Hat build of OpenTelemetry documentation, and "Installing" in the Red Hat OpenShift Distributed Tracing Platform documentation.
For more information, see the Red Hat Knowledgebase solution Jaeger Deprecation and Removal in OpenShift.