Skip to content

OpsCenter 6.8.48 Release#252

Merged
orion104 merged 5 commits intomasterfrom
opscenter-6.8.48-release
Mar 6, 2026
Merged

OpsCenter 6.8.48 Release#252
orion104 merged 5 commits intomasterfrom
opscenter-6.8.48-release

Conversation

@orion104
Copy link
Collaborator


Release Notes Automation

If you name your pull-request as "Product x.y.z Release ...", after merging the
PR, a GitHub Action will automatically create a product version tag "product-x.y.z".

Supported product names are:

  • DSE
  • OpsCenter
  • Studio
  • Luna Streaming

Version supports 3 sets or 4 sets of digits.

5 March 2026

## Backup Service
* Updated the version of the java aws sdk used by OpsCenter. (OPSC-17745)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Updated the version of the java aws sdk used by OpsCenter. (OPSC-17745)
* Updated the version of the Java AWS SDK that OpsCenter uses. (OPSC-17745)


## Backup Service
* Updated the version of the java aws sdk used by OpsCenter. (OPSC-17745)
* Fixed a bug that could cause the backup status of a node to be switched from “completed” to “running” preventing cleanup from running. (OPSC-17775)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixed a bug that could cause the backup status of a node to be switched from “completed” to “running” preventing cleanup from running. (OPSC-17775)
* Fixed a bug that could cause the backup status of a node to be switched from “completed” to “running” and thus prevent cleanup from running. (OPSC-17775)

* Fixed an issue where backup location validation would fail for non-Azure locations. (OPSC-17780)

## Best Practice Service
* The authentication error triggered when a cluster connection attempt is initiated by a Best Practice rule has been downgraded to a non-blocking debug message, preventing false failure notifications. (OPSC-16230)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* The authentication error triggered when a cluster connection attempt is initiated by a Best Practice rule has been downgraded to a non-blocking debug message, preventing false failure notifications. (OPSC-16230)
* The authentication error triggered when a cluster connection attempt is initiated by a Best Practice rule is downgraded to a non-blocking debug message to prevent false failure notifications. (OPSC-16230)


## Best Practice Service
* The authentication error triggered when a cluster connection attempt is initiated by a Best Practice rule has been downgraded to a non-blocking debug message, preventing false failure notifications. (OPSC-16230)
* The "Use prepared statements" best practice rule has been updated to correctly handle bind markers, preventing false failures when querying the OpsCenter events table. (OPSC-17777)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* The "Use prepared statements" best practice rule has been updated to correctly handle bind markers, preventing false failures when querying the OpsCenter events table. (OPSC-17777)
* The "Use prepared statements" best practice rule is updated to correctly handle bind markers and prevent false failures when querying the OpsCenter events table. (OPSC-17777)

* Removed the deprecated "DataStax public repository" option from LCM as the service is being shut down. (OPSC-17766)

## Core
* Fixed CVE-2023-6378 by upgrading logback library to 1.2.13 (OPSC-17791)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixed CVE-2023-6378 by upgrading logback library to 1.2.13 (OPSC-17791)
* Fixed CVE-2023-6378 by upgrading logback library to v1.2.13. (OPSC-17791)


## Core
* Fixed CVE-2023-6378 by upgrading logback library to 1.2.13 (OPSC-17791)
* Fixed CVE-2023-2976 by upgrading Google Guava to 32.0.0-jre (OPSC-17792)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixed CVE-2023-2976 by upgrading Google Guava to 32.0.0-jre (OPSC-17792)
* Fixed CVE-2023-2976 by upgrading Google Guava to version 32.0.0-jre. (OPSC-17792)

## Core
* Fixed CVE-2023-6378 by upgrading logback library to 1.2.13 (OPSC-17791)
* Fixed CVE-2023-2976 by upgrading Google Guava to 32.0.0-jre (OPSC-17792)
* Fixed CVE-2025-48924 by upgrading org.apache.commons:commons-lang to 3:3.20.0 (OPSC-17784)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixed CVE-2025-48924 by upgrading org.apache.commons:commons-lang to 3:3.20.0 (OPSC-17784)
* Fixed CVE-2025-48924 by upgrading org.apache.commons:commons-lang to version 3:3.20.0. (OPSC-17784)

* The "Use prepared statements" best practice rule has been updated to correctly handle bind markers, preventing false failures when querying the OpsCenter events table. (OPSC-17777)

## Monitoring
* Fixed an issue where hints-on-disk alerts triggered continuously even with zero hints, disabled alerts, or deleted alerts. (OPSC-17763)
Copy link

@annieden annieden Mar 4, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixed an issue where hints-on-disk alerts triggered continuously even with zero hints, disabled alerts, or deleted alerts. (OPSC-17763)
* Fixed an issue where 'hints-on-disk' alerts triggered continuously even with zero hints, disabled alerts, or deleted alerts. (OPSC-17763)

* Fixed CVE-2023-6378 by upgrading logback library to 1.2.13 (OPSC-17791)
* Fixed CVE-2023-2976 by upgrading Google Guava to 32.0.0-jre (OPSC-17792)
* Fixed CVE-2025-48924 by upgrading org.apache.commons:commons-lang to 3:3.20.0 (OPSC-17784)
* Upgraded the Cassandra driver used by opscenterd and the agent to 4.x. Local datacenter is now auto-detected. If auto-detection fails, configure `local_dc_pref` in the cluster configuration or via the new "Data Center" field in the UI. (OPSC-17253)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Upgraded the Cassandra driver used by opscenterd and the agent to 4.x. Local datacenter is now auto-detected. If auto-detection fails, configure `local_dc_pref` in the cluster configuration or via the new "Data Center" field in the UI. (OPSC-17253)
* Upgraded the Cassandra driver used by 'opscenterd' and the agent to v4.x. Local datacenter is now auto-detected. If auto-detection fails, configure `local_dc_pref` in the cluster configuration or through the new "Data Center" field in the User Interface (UI). (OPSC-17253)

* Fixed CVE-2025-48924 by upgrading org.apache.commons:commons-lang to 3:3.20.0 (OPSC-17784)
* Upgraded the Cassandra driver used by opscenterd and the agent to 4.x. Local datacenter is now auto-detected. If auto-detection fails, configure `local_dc_pref` in the cluster configuration or via the new "Data Center" field in the UI. (OPSC-17253)
* Added SSL truststore and client certificate support to the PostUrl event plugin for secure integration with external HTTPS alerting systems. For full SSL support including SNI, set `enable_curl=True`. (OPSC-17422)
* Added `azcopy_upload_with_sync` to the agent config with a default of false. When set to true uploads done with azcopy will use a sync command instead of a copy adding another layer of insurance that files will not be uploaded if they are already present on the destination. When using this option it is strongly recommended that the `backup_tmp_dir` be on the cassandra data partition as limitations with azcopy prevent the use of symlinks when staging the files for upload. (OPSC-17716)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Added `azcopy_upload_with_sync` to the agent config with a default of false. When set to true uploads done with azcopy will use a sync command instead of a copy adding another layer of insurance that files will not be uploaded if they are already present on the destination. When using this option it is strongly recommended that the `backup_tmp_dir` be on the cassandra data partition as limitations with azcopy prevent the use of symlinks when staging the files for upload. (OPSC-17716)
* Added `azcopy_upload_with_sync` to the agent configuration with a default of 'false'. When set to 'true' an 'azcopy' upload uses a 'sync' rather than a 'copy. This adds another layer of insurance that no files are uploaded if they are already present on the destination. When using this option it is strongly recommended that the `backup_tmp_dir` be on the 'cassandra' data partition because limitations with 'azcopy' prevent the use of symlinks when staging the files for upload. (OPSC-17716)

* Added SSL truststore and client certificate support to the PostUrl event plugin for secure integration with external HTTPS alerting systems. For full SSL support including SNI, set `enable_curl=True`. (OPSC-17422)
* Added `azcopy_upload_with_sync` to the agent config with a default of false. When set to true uploads done with azcopy will use a sync command instead of a copy adding another layer of insurance that files will not be uploaded if they are already present on the destination. When using this option it is strongly recommended that the `backup_tmp_dir` be on the cassandra data partition as limitations with azcopy prevent the use of symlinks when staging the files for upload. (OPSC-17716)
* Fixed an issue where an agent would continuously retry startup if the API port was already in use. (OPSC-17204)
* Fixed an issue where sessions configured with timeout=0 were unexpectedly garbage-collected under heap pressure. (OPSC-17762)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Fixed an issue where sessions configured with timeout=0 were unexpectedly garbage-collected under heap pressure. (OPSC-17762)
* Fixed an issue where sessions configured with 'timeout=0' were unexpectedly garbage-collected under heap pressure. (OPSC-17762)

* Added `azcopy_upload_with_sync` to the agent config with a default of false. When set to true uploads done with azcopy will use a sync command instead of a copy adding another layer of insurance that files will not be uploaded if they are already present on the destination. When using this option it is strongly recommended that the `backup_tmp_dir` be on the cassandra data partition as limitations with azcopy prevent the use of symlinks when staging the files for upload. (OPSC-17716)
* Fixed an issue where an agent would continuously retry startup if the API port was already in use. (OPSC-17204)
* Fixed an issue where sessions configured with timeout=0 were unexpectedly garbage-collected under heap pressure. (OPSC-17762)
* Added a new configuration parameter, `extra_user_search_bases`, in the [ldap] section of the opscenterd.conf file. This parameter allows specifying additional LDAP user search bases for authentication, enabling users from multiple Organizational Units (OUs) to authenticate. The parameter accepts a semicolon-separated list of LDAP search bases. This parameter is optional and backward-compatible with existing configurations. (OPSC-17753)
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
* Added a new configuration parameter, `extra_user_search_bases`, in the [ldap] section of the opscenterd.conf file. This parameter allows specifying additional LDAP user search bases for authentication, enabling users from multiple Organizational Units (OUs) to authenticate. The parameter accepts a semicolon-separated list of LDAP search bases. This parameter is optional and backward-compatible with existing configurations. (OPSC-17753)
* Added a new configuration parameter, `extra_user_search_bases`, in the [ldap] section of the 'opscenterd.conf' file. Specify additional LDAP user search bases for authentication with this parameter to enable users from multiple Organizational Units (OUs) to authenticate. The parameter accepts a semicolon-separated list of LDAP search bases. This parameter is optional and backward-compatible with existing configurations. (OPSC-17753)

Copy link

@annieden annieden left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi, Orion! I've asked for minor grammatical and tense updates to your RNs. Suggested changes are inline. I can approve once you've reviewed. ~Annette

Copy link

@annieden annieden left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks awesome, Orion!

@orion104 orion104 merged commit fc7eb0d into master Mar 6, 2026
@orion104 orion104 deleted the opscenter-6.8.48-release branch March 6, 2026 17:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants