Releases: splunk/splunk-library-javalogging
Releases · splunk/splunk-library-javalogging
Version 1.11.8
Version 1.11.8
Minor Changes
- Force okio version and upgrade okhttp3 to latest stable release to address CVE-2023-3635
Version 1.11.7
Version 1.11.6
Version 1.11.6
Enhancements
- Sending Java Throwable object instead of exception message in event.
- Formatter support added in formatting event message in Java Util Logging.
- Any message formatter can be added from properties file.
- By default, SimpleFormatter is used to format event message.
- Layout (deprecated) in socket appender configuration (TcpAppender) is replaced with Encoder.
Minor Changes
- Starting a new Dispatcher always for OkHttpClient builder. (PR #193)
- README file modified with dependency management guidance. (PR #217)
- JsonHttpContentType in HttpEventCollectorSender is fixed based on RFC7231 specs. (PR #256)
- Event message strings starting with commenting characters (#, // & /**/) are allowed.
Version 1.11.5
Version 1.11.5
Critical Security Update
- Bump Log4J version to latest 2.17.2 @see CVE-2021-44832 Log4j<2.17.1
- Bump Logback version to latest 1.2.11 @see CVE-2021-42550 Logback<1.2.8
Enhancements
- Added StandardErrorCallback class. Register ErrorCallback implementations via logback or log4j xml config. (PR #215)
- ErrorCallback class used to handle errors other than Server errors.
Minor Changes
- Bump org.slf4j:slf4j-api version to latest 1.7.36
- Bump com.squareup.okhttp3:okhttp to latest 4.9.3
- Bump com.google.code.gson:gson to latest 2.9.0
- Flush HttpClient after flushing appenders. (PR #207)
- Timeout settings modified for OKHttpClient. (PR #199)
- Default behavior of Splunk event header & body are reverted back to v1.7.3. (PR #198)
1.6.3
Security Update:
- Log4j2 version is upgraded to v2.17.1 for java-logging.
Version 1.11.4
Version 1.11.3
Version 1.11.3
Critical Security Update
Upgrade Log4J again v2.17.0 related to CVE-2021-45046 & CVE-2021-44228
Version 1.6.2-0-2
Version 1.6.2-0-2
Critical backport
- Upgrading to 2.17 per CVE-2021-45046 & CVE-2021-44228 & CVE-2021-45105.